<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.5 (Ruby 3.0.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-rfc8447bis-00" category="std" consensus="true" obsoletes="8447" updates="3749, 5077, 4680, 5246, 5705, 5878, 6520, 7301" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.3 -->
  <front>
    <title abbrev="(D)TLS IANA Registry Updates">IANA Registry Updates for TLS and DTLS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-00"/>
    <author initials="J." surname="Salowey" fullname="Joe Salowey">
      <organization>Salesforce</organization>
      <address>
        <email>joe@salowey.net</email>
      </address>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <date year="2022" month="March" day="29"/>
    <area>Security</area>
    <workgroup>TLS WG</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes a number of changes to TLS and DTLS IANA registries
that range from adding notes to the registry all the way to changing
the registration policy.  These changes were mostly motivated by WG
review of the TLS- and DTLS-related registries undertaken as part of the
TLS 1.3 development process.</t>
      <t>This document obsoletes RFC8447 and updates the following RFCs:
3749, 5077, 4680, 5246, 5705, 5878, 6520, 7301.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-rfc8447bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security (TLS) Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/lamps/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/rfc8447bis"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>This document instructs IANA to make changes to a number of the IANA
registries related to Transport
Layer Security (TLS) and Datagram Transport Layer Security (DTLS).
These changes were almost entirely motivated by the
development of TLS 1.3 <xref target="I-D.ietf-tls-tls13"/>.</t>
      <t>The changes introduced by this document range from simple, e.g., adding
notes, to complex, e.g., changing a registry's registration policy.
Instead of listing the changes and their rationale here in the
introduction, each section provides rationale for the proposed
change(s).</t>
      <t>This document proposes no changes to the registration policies for TLS
Alerts <xref target="RFC8446"/>, TLS ContentType <xref target="RFC8446"/>,
TLS HandshakeType <xref target="RFC8446"/>, and TLS Certificate Status
Types <xref target="RFC6961"/> registries; the existing policies (Standards Action
for the first three; IETF Review for the last), are appropriate for
these one-byte code points because of their scarcity.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="adding-tls-to-registry-names">
      <name>Adding "TLS" to Registry Names</name>
      <t>For consistency amongst TLS registries, IANA
[<bcp14>SHALL</bcp14> prepend/has prepended] "TLS" to the following registries:</t>
      <ul spacing="normal">
        <li>Application-Layer Protocol Negotiation (ALPN) Protocol IDs <xref target="RFC7301"/>,</li>
        <li>ExtensionType Values,</li>
        <li>Heartbeat Message Types <xref target="RFC6520"/>, and</li>
        <li>Heartbeat Modes <xref target="RFC6520"/>.</li>
      </ul>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for these four registries
to also refer to this document.  The remainder of this document will
use the registry names with the "TLS" prefix.</t>
    </section>
    <section anchor="aligning-with-rfc-8126">
      <name>Aligning with RFC 8126</name>
      <t>Many of the TLS-related IANA registries had the registration procedure
"IETF Consensus", which was changed to "IETF Review" by <xref target="RFC8126"/>.
To align with the new terminology,
IANA [<bcp14>SHALL</bcp14> update/has updated] the following registries to "IETF
Review":</t>
      <ul spacing="normal">
        <li>TLS Authorization Data Formats <xref target="RFC4680"/></li>
        <li>TLS Supplemental Data Formats (SupplementalDataType) <xref target="RFC5878"/></li>
      </ul>
      <t>This is not a universal change, as some registries originally defined
with "IETF Consensus" are undergoing other changes either as a result
of this document or <xref target="RFC8422"/>.</t>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for these two registries
to also refer to this document.</t>
    </section>
    <section anchor="adding-recommended-column">
      <name>Adding "Recommended" Column</name>
      <t>The instructions in this document update the Recommended column,
originally added in <xref target="RFC8447"/> to add a third value, "D",
indicating that a value is "Discouraged". The permitted values
are:</t>
      <ul spacing="normal">
        <li>Y: Indicates that the IETF has consensus that the
  item is <bcp14>RECOMMENDED</bcp14>. This only means that the associated
  mechanism is fit for the purpose for which it was defined.
  Careful reading of the documentation for the mechanism is
  necessary to understand the applicability of that mechanism.
  The IETF could recommend mechanisms that have limited
  applicability, but will provide applicability statements that
  describe any limitations of the mechanism or necessary constraints
  on its use.</li>
        <li>N: Indicates that the item has not been evaluated by
  the IETF and that the IETF has made no statement about the
  suitability of the associated mechanism. This does not necessarily
  mean that the mechanism is flawed, only that no consensus exists.
  The IETF might have consensus to leave an items marked as "N" on
  the basis of it having limited applicability or usage constraints.</li>
        <li>D: Indicates that the item is discouraged and <bcp14>SHOULD
  NOT</bcp14> or <bcp14>MUST NOT</bcp14> be used. This marking could be used to identify
  mechanisms that might result in problems if they are used, such as
  a weak cryptographic algorithm or a mechanism that might cause
  interoperability problems in deployment.</li>
      </ul>
      <t>Setting the Recommended item to "Y" or "D" or changing a
item whose current value is "Y" or "D" requires standards action.
Not all items defined in standards track documents need to be
marked as Recommended. Changing the Recommended status of a standards
track item requires standards action.</t>
      <t>[Note: the registries in the rest of the document will need to have the recommended column updated
appropriately, specifically to deprecate MD5 and SHA-1, etc.]</t>
    </section>
    <section anchor="session-ticket-tls-extension">
      <name>Session Ticket TLS Extension</name>
      <t>The nomenclature for the registry entries in the TLS ExtensionType
Values registry correspond to the presentation language field name
except for entry 35.  To ensure that the values in the registry are
consistently identified in the registry, IANA:</t>
      <ul spacing="normal">
        <li>[<bcp14>SHALL</bcp14> rename/has renamed] entry 35 to "session_ticket (renamed from
"SessionTicket TLS")" <xref target="RFC5077"/>.</li>
        <li>[<bcp14>SHALL</bcp14> add/has added] a reference to this document in the "Reference"
column for entry 35.</li>
      </ul>
    </section>
    <section anchor="tls-extensiontype-values">
      <name>TLS ExtensionType Values</name>
      <t>Experience has shown that the IETF Review registry policy for TLS
extensions was too strict.  Based on WG consensus, the decision was
taken to change the registration policy to Specification Required
<xref target="RFC8126"/> while reserving a small part of the code space for
private use.  Therefore, IANA [<bcp14>SHALL</bcp14> update/has
updated] the TLS ExtensionType Values registry as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Changed the registry policy to:  </t>
          <t>
Values with the first byte in the range 0-254 (decimal) are assigned
  via Specification Required <xref target="RFC8126"/>.  Values with the first byte
  255 (decimal) are reserved for Private Use <xref target="RFC8126"/>.</t>
        </li>
        <li>Updated the "Reference" to also refer to this document.</li>
      </ul>
      <t>See <xref target="expert-pool"/> for additional information about the designated
expert pool.</t>
      <t>Despite wanting to "loosen" the registration policies for TLS
extensions, it is still useful to indicate in the IANA registry which
extensions the WG recommends be supported.  Therefore, IANA [<bcp14>SHALL</bcp14>
update/has updated] the TLS ExtensionType Values registry as follows:</t>
      <ul spacing="normal">
        <li>Add a "Recommended" column with the contents as listed below.  This
table has been generated by marking Standards Track RFCs as "Y" and
all others as "N". The "Recommended" column is assigned a
value of "N" unless explicitly requested, and adding a value with
a "Recommended" value of "Y" requires Standards Action <xref target="RFC8126"/>.
IESG Approval is <bcp14>REQUIRED</bcp14> for a Y-&gt;N transition.</li>
      </ul>
      <table>
        <thead>
          <tr>
            <th align="left">Extension</th>
            <th align="right">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">server_name</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">max_fragment_length</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">client_certificate_url</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">trusted_ca_keys</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">truncated_hmac</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">status_request</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">user_mapping</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">client_authz</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">server_authz</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">cert_type</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">supported_groups</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">ec_point_formats</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">srp</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">signature_algorithms</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">use_srtp</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">heartbeat</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">application_layer_protocol_negotiation</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">status_request_v2</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">signed_certificate_timestamp</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">client_certificate_type</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">server_certificate_type</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">padding</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">encrypt_then_mac</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">extended_master_secret</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">cached_info</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">session_ticket</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">renegotiation_info</td>
            <td align="right">Y</td>
          </tr>
        </tbody>
      </table>
      <t>IANA [<bcp14>SHALL</bcp14> update/has added] the following notes:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in <xref target="RFC8447"/>
The designated expert <xref target="RFC8126"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft (that is posted and never
published as an RFC) or a document from another standards body, industry
consortium, university site, etc.  The expert may provide
more in-depth reviews, but their approval should not be taken as an
endorsement of the extension.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>As specified in <xref target="RFC8126"/>, assignments made in the Private Use
space are not generally useful for broad interoperability.  It is
the responsibility of those making use of the Private Use range to
ensure that no conflicts occur (within the intended scope of use).
For widespread experiments, temporary reservations are available.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>If an item is not marked as "Recommended", it does not necessarily mean
that it is flawed; rather, it indicates that the item either has not
been through the IETF consensus process, has limited applicability, or
is intended only for specific use cases.</t>
        </dd>
      </dl>
      <t>The extensions added by <xref target="RFC8446"/> are omitted from the above table;
additionally, token_binding is omitted, since
<xref target="I-D.ietf-tokbind-negotiation"/> specifies the value of the "Recommended" column
as for this extension.</t>
      <t><xref target="RFC8446"/> also uses the TLS ExtensionType Values registry originally
created in <xref target="RFC4366"/>. The following text is from <xref target="RFC8446"/> and is included
here to ensure alignment between these specifications.</t>
      <ul spacing="normal">
        <li>IANA [<bcp14>SHALL</bcp14> update/has updated] this registry to include the
"key_share", "pre_shared_key", "psk_key_exchange_modes",
"early_data", "cookie", "supported_versions",
"certificate_authorities", "oid_filters", "post_handshake_auth",
and "signature_algorithms_cert", extensions with the values
defined in <xref target="RFC8446"/> and the "Recommended" value of "Y".</li>
        <li>IANA [<bcp14>SHALL</bcp14> update/has updated] this registry to include a "TLS
1.3" column that lists the messages in which the extension may
appear.  This column [<bcp14>SHALL</bcp14> be/has been] initially populated from
the table in Section 4.2 of <xref target="RFC8446"/> with any
extension not listed there marked as "-" to indicate that it is not
used by TLS 1.3.</li>
      </ul>
    </section>
    <section anchor="tls-cipher-suites-registry">
      <name>TLS Cipher Suites Registry</name>
      <t>Experience has shown that the IETF Consensus registry policy for TLS
Cipher Suites was too strict.  Based on WG consensus, the decision was
taken to change the TLS Cipher Suites registry's registration policy
to Specification Required <xref target="RFC8126"/> while reserving a small part of
the code space for experimental and private use.  Therefore, IANA
[<bcp14>SHALL</bcp14> update/has updated] the TLS Cipher Suites registry's policy as
follows:</t>
      <artwork><![CDATA[
Values with the first byte in the range 0-254 (decimal) are
assigned via Specification Required {{RFC8126}} .  Values with the
first byte 255 (decimal) are reserved for Private Use {{RFC8126}} .
]]></artwork>
      <t>See <xref target="expert-pool"/> for additional information about the designated
expert pool.</t>
      <t>The TLS Cipher Suites registry has grown significantly and will continue to
do so.  To better guide those not intimately involved in TLS, IANA
[shall update/has updated] the TLS Cipher Suites registry as follows:</t>
      <t>[The following text needs to be update to reflect the new recommended policy]</t>
      <ul spacing="normal">
        <li>
          <t>Added a "Recommended" column to the TLS Cipher Suites registry.  The
cipher suites that follow in the two tables are marked as "Y". 
All other cipher suites are marked as "N".  The "Recommended"
column is assigned a value of "N" unless explicitly requested, and
adding a value with a "Recommended" value of "Y" requires
Standards Action <xref target="RFC8126"/>.  IESG Approval is <bcp14>REQUIRED</bcp14> for a Y-&gt;N
transition.  </t>
          <t>
The cipher suites that follow are Standards Track server-authenticated
(and optionally client-authenticated) cipher suites that are
currently available in TLS 1.2.</t>
        </li>
      </ul>
      <t>RFC EDITOR: The previous paragraph is for document reviewers and is not
meant for the registry.</t>
      <artwork><![CDATA[
Cipher Suite Name                             | Value
----------------------------------------------+------------
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256           | {0x00,0x9E}
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384           | {0x00,0x9F}
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256       | {0xC0,0x2B}
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384       | {0xC0,0x2C}
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256         | {0xC0,0x2F}
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384         | {0xC0,0x30}
TLS_DHE_RSA_WITH_AES_128_CCM                  | {0xC0,0x9E}
TLS_DHE_RSA_WITH_AES_256_CCM                  | {0xC0,0x9F}
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256   | {0xCC,0xA8}
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 | {0xCC,0xA9}
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256     | {0xCC,0xAA}
]]></artwork>
      <t>The cipher suites that follow are Standards Track ephemeral pre-shared
  key cipher suites that are available in TLS 1.2.</t>
      <t>RFC EDITOR: The previous paragraph is for document reviewers and is not
meant for the registry.</t>
      <artwork><![CDATA[
Cipher Suite Name                             | Value
----------------------------------------------+------------
TLS_DHE_PSK_WITH_AES_128_GCM_SHA256           | {0x00,0xAA}
TLS_DHE_PSK_WITH_AES_256_GCM_SHA384           | {0x00,0xAB}
TLS_DHE_PSK_WITH_AES_128_CCM                  | {0xC0,0xA6}
TLS_DHE_PSK_WITH_AES_256_CCM                  | {0xC0,0xA7}
TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256         | {0xD0,0x01}
TLS_ECDHE_PSK_WITH_AES_256_GCM_SHA384         | {0xD0,0x02}
TLS_ECDHE_PSK_WITH_AES_128_CCM_SHA256         | {0xD0,0x05}
TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256   | {0xCC,0xAC}
TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256     | {0xCC,0xAD}
]]></artwork>
      <t>The TLS 1.3 cipher suites specified by <xref target="RFC8446"/> are not listed here;         <br/>
   that document provides for their "Recommended" status.</t>
      <t>Despite the following behavior being misguided, experience has shown
that some customers use the IANA registry as a checklist against which
to measure an implementation's completeness, and some implementers
blindly implement cipher suites.  Therefore, IANA [<bcp14>SHALL</bcp14> add/has added]
the following warning to the registry:</t>
      <dl>
        <dt>WARNING:</dt>
        <dd>
          <t>Cryptographic algorithms and parameters will be broken or weakened
over time.  Blindly implementing cipher suites listed here is not
advised.  Implementers and users need to check that the cryptographic
algorithms listed continue to provide the expected level of security.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following note to ensure that those that
focus on IANA registries are aware that TLS 1.3 <xref target="RFC8446"/>
uses the same registry but defines ciphers differently:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>Although TLS 1.3 uses the same cipher suite space as previous
versions of TLS, TLS 1.3 cipher suites are defined differently, only
specifying the symmetric ciphers and hash functions, and cannot be used for TLS 1.2.
Similarly, TLS 1.2 and lower cipher suite values cannot be used with
TLS 1.3.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following notes to document the rules
for populating the "Recommended" column:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>CCM_8 cipher suites are not marked as "Recommended".  These cipher
suites have a significantly truncated authentication tag that represents
a security trade-off that may not be appropriate for general
environments.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>If an item is not marked as "Recommended", it does not necessarily mean
that it is flawed; rather, it indicates that the item either has not
been through the IETF consensus process, has limited applicability, or
is intended only for specific use cases.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following notes for additional
information:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in [this-RFC].
The designated expert <xref target="RFC8126"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft (that is posted and never
published as an RFC) or a document from another standards body, industry
consortium, university site, etc.  The expert may provide
more in-depth reviews, but their approval should not be taken as an
endorsement of the cipher suite.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>As specified in <xref target="RFC8126"/>, assignments made in the Private Use
space are not generally useful for broad interoperability.  It is the
responsibility of those making use of the Private Use range to ensure
that no conflicts occur (within the intended scope of use).  For
widespread experiments, temporary reservations are available.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for this registry to
also refer to this document.</t>
    </section>
    <section anchor="tls-supported-groups">
      <name>TLS Supported Groups</name>
      <t>Similar to cipher suites, supported groups have proliferated over time,
and some use the registry to measure implementations.  Therefore, IANA
[<bcp14>SHALL</bcp14> add/has added] a "Recommended" column with a "Y" for secp256r1,
secp384r1, x25519, and x448, while all others are "N".  These "Y"
groups are taken from Standards Track RFCs; <xref target="RFC8422"/>
elevates secp256r1 and secp384r1 to Standards Track.  Not all groups from
<xref target="RFC8422"/>, which is Standards Track, are marked as
"Y"; these groups apply to TLS 1.3 <xref target="RFC8446"/> and
previous versions of TLS.  The "Recommended" column is assigned a value of "N"
unless explicitly requested, and adding a value with a "Recommended" value of "Y"
requires Standards Action <xref target="RFC8126"/>.  IESG Approval is
<bcp14>REQUIRED</bcp14> for a Y-&gt;N transition.</t>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following notes:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>If an item is not marked as "Recommended" it does not necessarily mean
that it is flawed; rather, it indicates that the item either has not
been through the IETF consensus process, has limited applicability, or
is intended only for specific use cases.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in <xref target="RFC8447"/> .
The designated expert <xref target="RFC8126"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft (that is posted and never
published as an RFC) or a document from another standards body, industry
consortium, university site, etc.  The expert may provide
more in-depth reviews, but their approval should not be taken as an
endorsement of the supported groups.</t>
        </dd>
      </dl>
      <t>Despite the following behavior being misguided, experience has shown
that some customers use the IANA registry as a checklist against which
to measure an implementation's completeness, and some implementers
blindly implement supported group.  Therefore, IANA
[<bcp14>SHALL</bcp14> add/has added] the following warning to the registry:</t>
      <dl>
        <dt>WARNING:</dt>
        <dd>
          <t>Cryptographic algorithms and parameters will be broken or weakened
over time.  Blindly implementing supported groups listed here is not
advised.  Implementers and users need to check that the cryptographic
algorithms listed continue to provide the expected level of security.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for this registry to also
refer to this document.</t>
      <t>The value 0 (0x0000) has been marked as reserved.</t>
    </section>
    <section anchor="tls-clientcertificatetype-identifiers">
      <name>TLS ClientCertificateType Identifiers</name>
      <t>Experience has shown that the IETF Consensus registry policy for TLS
ClientCertificateType Identifiers is too strict.   Based on WG
consensus, the decision was taken to change the registration policy to
Specification Required <xref target="RFC8126"/> while reserving some of the code
   space for Standards Track usage and a small part of the code space
   for private use.  Therefore, IANA has updated the TLS
   ClientCertificateType Identifiers registry's policy as follows:</t>
      <artwork><![CDATA[
      Values in the range 0-63 are assigned via Standards Action.
      Values 64-223 are assigned via Specification Required [RFC8126].
      Values 224-255 are reserved for Private Use.
]]></artwork>
      <t>See <xref target="expert-pool"/> for additional information about the designated
expert pool.</t>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following notes:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in [this-RFC].
The designated expert <xref target="RFC8126"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft
(that is posted and never published as an RFC) or a document from
 another standards body, industry consortium, university site, etc.
 The expert may provide more in-depth reviews, but their approval
 should not be taken as an endorsement of the identifier.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>As specified in <xref target="RFC8126"/>, assignments made in the Private Use
space are not generally useful for broad interoperability.  It is
the responsibility of those making use of the Private Use range to
ensure that no conflicts occur (within the intended scope of use).
For widespread experiments, temporary reservations are available.</t>
        </dd>
      </dl>
    </section>
    <section anchor="new-session-ticket-tls-handshake-message-type">
      <name>New Session Ticket TLS Handshake Message Type</name>
      <t>To align with TLS implementations and to align the naming nomenclature
with other Handshake message types, IANA:</t>
      <ul spacing="normal">
        <li>[<bcp14>SHALL</bcp14> rename/has renamed] entry 4 in the TLS HandshakeType registry
to "new_session_ticket (renamed from NewSessionTicket)" <xref target="RFC5077"/>.</li>
        <li>[<bcp14>SHALL</bcp14> add/has added] a reference to this document in the "Reference"
column for entry 4 in the TLS HandshakeType registry.</li>
      </ul>
    </section>
    <section anchor="tls-exporter-labels-registry">
      <name>TLS Exporter Labels Registry</name>
      <t>To aid those reviewers who start with the IANA registry, IANA [<bcp14>SHALL</bcp14>
add/has added]:</t>
      <ul spacing="normal">
        <li>The following note to the TLS Exporter Labels registry:</li>
      </ul>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t><xref target="RFC5705"/> defines keying material exporters for TLS in terms of
the TLS PRF.  <xref target="RFC8446"/> replaced the PRF with HKDF, thus
requiring a new construction. The exporter interface remains the same;
however, the value is computed differently.</t>
        </dd>
      </dl>
      <ul spacing="normal">
        <li>A "Recommended" column to the TLS Exporter Labels registry.  The
table that follows has been generated by marking Standards Track
RFCs as "Y" and all others as "N".  The "Recommended" column is
assigned a value of "N" unless explicitly requested, and adding a
value with a "Recommended" value of "Y" requires Standards Action <xref target="RFC8126"/>.  IESG Approval is
<bcp14>REQUIRED</bcp14> for a Y-&gt;N transition.</li>
      </ul>
      <artwork><![CDATA[
Exporter Value                  | Recommended |
--------------------------------|-------------|
client finished                 |         Y |
server finished                 |         Y |
master secret                   |         Y |
key expansion                   |         Y |
client EAP encryption           |         Y |
ttls keying material            |         N |
ttls challenge                  |         N |
EXTRACTOR-dtls_srtp             |         Y |
EXPORTER_DTLS_OVER_SCTP         |         Y |
EXPORTER: teap session key seed |         Y |
]]></artwork>
      <t>To provide additional information for the designated experts, IANA
[<bcp14>SHALL</bcp14> add/has added] the following notes:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in <xref target="RFC8447"/> .
The designated expert <xref target="RFC8126"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft
(that is posted and never published as an RFC) or a document from
another standards body, industry consortium, university site, etc.
The expert may provide more in-depth reviews, but their approval
should not be taken as an endorsement of the exporter label.  The
expert also verifies that the label is a string consisting of
printable ASCII characters beginning with "EXPORTER".  IANA <bcp14>MUST</bcp14>
also verify that one label is not a prefix of any other label.
For example, labels "key" or "master secretary" are forbidden.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>If an item is not marked as "Recommended", it does not
    necessarily mean that it is flawed; rather, it indicates that the
    item either has not been through the IETF consensus process, has
    limited applicability, or is intended only for specific use cases.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for this registry to also
refer to this document.</t>
    </section>
    <section anchor="adding-missing-item-to-tls-alerts-registry">
      <name>Adding Missing Item to TLS Alerts Registry</name>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following entry to the TLS Alerts
registry; the entry was omitted from the IANA instructions in
<xref target="RFC7301"/>:</t>
      <artwork><![CDATA[
120   no_application_protocol  Y  [RFC7301][RFC8447]
]]></artwork>
    </section>
    <section anchor="tls-certificate-types">
      <name>TLS Certificate Types</name>
      <t>Experience has shown that the IETF Consensus registry policy for TLS
Certificate Types is too strict.  Based on WG consensus, the decision
was taken to change registration policy to Specification Required
<xref target="RFC8126"/> while reserving a small part of the code space for
private use.  Therefore, IANA [<bcp14>SHALL</bcp14> change/has
changed] the TLS Certificate Types registry as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Changed the registry policy to:  </t>
          <t>
Values in the range 0-223 (decimal) are assigned via Specification
  Required  <xref target="RFC8126"/>. Values in the range 224-255 (decimal) are
  reserved for Private Use <xref target="RFC8126"/>.</t>
        </li>
        <li>Added a "Recommended" column to the registry.  X.509 and Raw
    Public Key are "Y".  All others are "N".  The "Recommended" column
    is assigned a value of "N" unless explicitly requested, and adding
    a value with a "Recommended" value of "Y" requires Standards
    Action <xref target="RFC8126"/>.  IESG Approval is <bcp14>REQUIRED</bcp14> for
    a Y-&gt;N transition.</li>
      </ul>
      <t>See <xref target="expert-pool"/> for additional information about the designated
expert pool.</t>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following note:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in [this-RFC].
The designated expert <xref target="RFC8126"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft
    (that is posted and never published as an RFC) or a document from
    another standards body, industry consortium, university site, etc.
    The expert may provide more in-depth reviews, but their approval
    should not be taken as an endorsement of the certificate type.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>If an item is not marked as "Recommended", it does not
    necessarily mean that it is flawed; rather, it indicates that the
    item either has not been through the IETF consensus process, has
    limited applicability, or is intended only for specific use cases.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for this registry to also
refer this document.</t>
    </section>
    <section anchor="orphaned-registries">
      <name>Orphaned Registries</name>
      <t>To make it clear that (D)TLS 1.3 has orphaned certain registries (i.e.,
they are only applicable to version of (D)TLS protocol versions prior
to 1.3), IANA:</t>
      <ul spacing="normal">
        <li>[<bcp14>SHALL</bcp14> add/has added] the following to the TLS Compression Method
Identifiers registry <xref target="RFC3749"/>:</li>
      </ul>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>Value 0 (NULL) is the only value in this registry applicable to (D)TLS
protocol version 1.3 or later.</t>
        </dd>
      </dl>
      <ul spacing="normal">
        <li>[<bcp14>SHALL</bcp14> add/has added] the following to the TLS HashAlgorithm
<xref target="RFC5246"/> and TLS SignatureAlgorithm registries <xref target="RFC5246"/>:</li>
      </ul>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>The values in this registry are only applicable to (D)TLS protocol
versions prior to 1.3.  (D)TLS 1.3 and later versions' values are
registered in the TLS SignatureScheme registry.</t>
        </dd>
      </dl>
      <ul spacing="normal">
        <li>[<bcp14>SHALL</bcp14> update/has updated] the "Reference" field in the TLS
Compression Method Identifiers, TLS HashAlgorithm and TLS
SignatureAlgorithm registries to also refer to this document.</li>
        <li>[<bcp14>SHALL</bcp14> update/has updated] the TLS HashAlgorithm registry to list
values 7 and 9-223 as "Reserved" and the TLS SignatureAlgorithm
registry to list values 4-6 and 9-223 as "Reserved".</li>
        <li>has added the following to the TLS ClientCertificateType
    Identifiers registry <xref target="RFC5246"/>:</li>
      </ul>
      <t>Note: The values in this registry are only applicable to (D)TLS
      protocol versions prior to 1.3.</t>
      <t>Despite the fact that the TLS HashAlgorithm and SignatureAlgorithm
   registries are orphaned, it is still important to warn implementers
   of pre-TLS1.3 implementations about the dangers of blindly
   implementing cryptographic algorithms.  Therefore, IANA has added the
   following warning to the TLS HashAlgorithm and SignatureAlgorithm
   registries:</t>
      <dl>
        <dt>WARNING:</dt>
        <dd>
          <t>Cryptographic algorithms and parameters will be broken or weakened
over time.  Blindly implementing the cryptographic algorithms listed
here is not advised.  Implementers and users need to check that the
cryptographic algorithms listed continue to provide the expected level
of security.</t>
        </dd>
      </dl>
    </section>
    <section anchor="Notes">
      <name>Additional Notes</name>
      <t>IANA has added the following warning and note to the TLS
   SignatureScheme registry:</t>
      <dl>
        <dt>WARNING:</dt>
        <dd>
          <t>Cryptographic algorithms and parameters will be broken or
   weakened over time.  Blindly implementing signature schemes listed
   here is not advised.  Implementers and users need to check that
   the cryptographic algorithms listed continue to provide the
   expected level of security.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>As specified in <xref target="RFC8126"/>, assignments made in the Private Use
   space are not generally useful for broad interoperability.  It is
   the responsibility of those making use of the Private Use range to
   ensure that no conflicts occur (within the intended scope of use).
   For widespread experiments, temporary reservations are available.</t>
        </dd>
      </dl>
      <t>IANA has added the following notes to the TLS PskKeyExchangeMode
   registry:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>If an item is not marked as "Recommended", it does not
   necessarily mean that it is flawed; rather, it indicates that the
   item either has not been through the IETF consensus process, has
   limited applicability, or is intended only for specific use cases.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in RFC 8447.
   The designated expert <xref target="RFC8126"/> ensures that the specification is
   publicly available.  It is sufficient to have an Internet-Draft
   (that is posted and never published as an RFC) or a document from
   another standards body, industry consortium, university site, etc.
   The expert may provide more in depth reviews, but their approval
   should not be taken as an endorsement of the key exchange mode.</t>
        </dd>
      </dl>
    </section>
    <section anchor="expert-pool">
      <name>Designated Expert Pool</name>
      <t>Specification Required <xref target="RFC8126"/> registry requests are registered
after a three-week review period on the <eref target="mailto:tls-reg-review@ietf.org">tls-reg-review@ietf.org</eref>
mailing list, on the advice of one or more designated experts.
However, to allow for the allocation of values prior to publication,
the designated experts may approve registration once they are
satisfied that such a specification will be published.</t>
      <t>Registration requests sent to the mailing list for review <bcp14>SHOULD</bcp14> use an
appropriate subject (e.g., "Request to register value in TLS bar
registry").</t>
      <t>Within the review period, the designated experts will either approve or
deny the registration request, communicating this decision to the review
list and IANA.  Denials <bcp14>SHOULD</bcp14> include an explanation and, if applicable,
suggestions as to how to make the request successful.  Registration
requests that are undetermined for a period longer than 21 days can be
brought to the IESG's attention (using the <eref target="mailto:iesg@ietf.org">iesg@ietf.org</eref> mailing list)
for resolution.</t>
      <t>Criteria that <bcp14>SHOULD</bcp14> be applied by the designated experts includes
determining whether the proposed registration duplicates existing
functionality, whether it is likely to be of general applicability
or useful only for a single application, and whether the registration
description is clear.</t>
      <t>IANA <bcp14>MUST</bcp14> only accept registry updates from the designated experts and
<bcp14>SHOULD</bcp14> direct all requests for registration to the review mailing list.</t>
      <t>It is suggested that multiple designated experts be appointed who are
able to represent the perspectives of different applications using this
specification, in order to enable broadly informed review of
registration decisions.  In cases where a registration decision could
be perceived as creating a conflict of interest for a particular
Expert, that Expert <bcp14>SHOULD</bcp14> defer to the judgment of the other Experts.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The change to Specification Required from IETF Review lowers the amount
of review provided by the WG for cipher suites and supported groups.
This change reflects reality in that the WG essentially provided no
cryptographic review of the cipher suites or supported groups.  This
was especially true of national cipher suites.</t>
      <t>Recommended algorithms are regarded as secure for general use at the
time of registration; however, cryptographic algorithms and parameters
will be broken or weakened over time.  It is possible that the
"Recommended" status in the registry lags behind the most recent advances
in cryptanalysis.  Implementers and users need to check that the
cryptographic algorithms listed continue to provide the expected level
of security.</t>
      <t>Designated experts ensure the specification is publicly available.  They may
provide more in-depth reviews.  Their review should not be taken as an
endorsement of the cipher suite, extension, supported group, etc.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document is entirely about changes to TLS-related IANA registries.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.ietf-tls-tls13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla">
              <organization>RTFM, Inc.</organization>
            </author>
            <date day="20" month="March" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.

 This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-tls13-28"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7301">
          <front>
            <title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
            <author fullname="S. Friedl" initials="S." surname="Friedl">
              <organization/>
            </author>
            <author fullname="A. Popov" initials="A." surname="Popov">
              <organization/>
            </author>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <author fullname="E. Stephan" initials="E." surname="Stephan">
              <organization/>
            </author>
            <date month="July" year="2014"/>
            <abstract>
              <t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7301"/>
          <seriesInfo name="DOI" value="10.17487/RFC7301"/>
        </reference>
        <reference anchor="RFC6520">
          <front>
            <title>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Heartbeat Extension</title>
            <author fullname="R. Seggelmann" initials="R." surname="Seggelmann">
              <organization/>
            </author>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen">
              <organization/>
            </author>
            <author fullname="M. Williams" initials="M." surname="Williams">
              <organization/>
            </author>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes the Heartbeat Extension for the Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) protocols.</t>
              <t>The Heartbeat Extension provides a new protocol for TLS/DTLS allowing the usage of keep-alive functionality without performing a renegotiation and a basis for path MTU (PMTU) discovery for DTLS.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6520"/>
          <seriesInfo name="DOI" value="10.17487/RFC6520"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton">
              <organization/>
            </author>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <author fullname="T. Narten" initials="T." surname="Narten">
              <organization/>
            </author>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC4680">
          <front>
            <title>TLS Handshake Message for Supplemental Data</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <date month="October" year="2006"/>
            <abstract>
              <t>This specification defines a TLS handshake message for exchange of supplemental application data.  TLS hello message extensions are used to determine which supplemental data types are supported by both the TLS client and the TLS server.  Then, the supplemental data handshake message is used to exchange the data.  Other documents will define the syntax of these extensions and the syntax of the associated supplemental data types.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4680"/>
          <seriesInfo name="DOI" value="10.17487/RFC4680"/>
        </reference>
        <reference anchor="RFC5878">
          <front>
            <title>Transport Layer Security (TLS) Authorization Extensions</title>
            <author fullname="M. Brown" initials="M." surname="Brown">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="May" year="2010"/>
            <abstract>
              <t>This document specifies authorization extensions to the Transport Layer Security (TLS) Handshake Protocol.  Extensions are carried in the client and server hello messages to confirm that both parties support the desired authorization data types.  Then, if supported by both the client and the server, authorization information, such as attribute certificates (ACs) or Security Assertion Markup Language (SAML)  assertions, is exchanged in the supplemental data handshake message. This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5878"/>
          <seriesInfo name="DOI" value="10.17487/RFC5878"/>
        </reference>
        <reference anchor="RFC8447">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy.  These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC5077">
          <front>
            <title>Transport Layer Security (TLS) Session Resumption without Server-Side State</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="H. Zhou" initials="H." surname="Zhou">
              <organization/>
            </author>
            <author fullname="P. Eronen" initials="P." surname="Eronen">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document describes a mechanism that enables the Transport Layer Security (TLS) server to resume sessions and avoid keeping per-client session state.  The TLS server encapsulates the session state into a ticket and forwards it to the client.  The client can subsequently resume a session using the obtained ticket.  This document obsoletes RFC 4507.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5077"/>
          <seriesInfo name="DOI" value="10.17487/RFC5077"/>
        </reference>
        <reference anchor="RFC5705">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="March" year="2010"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes.  This document describes a general mechanism for allowing that.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
        <reference anchor="RFC3749">
          <front>
            <title>Transport Layer Security Protocol Compression Methods</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <date month="May" year="2004"/>
            <abstract>
              <t>The Transport Layer Security (TLS) protocol (RFC 2246) includes features to negotiate selection of a lossless data compression method as part of the TLS Handshake Protocol and to then apply the algorithm associated with the selected method as part of the TLS Record Protocol.  TLS defines one standard compression method which specifies that data exchanged via the record protocol will not be compressed.  This document describes an additional compression method associated with a lossless data compression algorithm for use with TLS, and it describes a method for the specification of additional TLS compression methods.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3749"/>
          <seriesInfo name="DOI" value="10.17487/RFC3749"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC6961">
          <front>
            <title>The Transport Layer Security (TLS) Multiple Certificate Status Request Extension</title>
            <author fullname="Y. Pettersen" initials="Y." surname="Pettersen">
              <organization/>
            </author>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document defines the Transport Layer Security (TLS) Certificate Status Version 2 Extension to allow clients to specify and support several certificate status methods.  (The use of the Certificate Status extension is commonly referred to as "OCSP stapling".)  Also defined is a new method based on the Online Certificate Status Protocol (OCSP) that servers can use to provide status information about not only the server's own certificate but also the status of intermediate certificates in the chain.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6961"/>
          <seriesInfo name="DOI" value="10.17487/RFC6961"/>
        </reference>
        <reference anchor="RFC8422">
          <front>
            <title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir">
              <organization/>
            </author>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <author fullname="M. Pegourie-Gonnard" initials="M." surname="Pegourie-Gonnard">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol.  In particular, it specifies the use of Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement in a TLS handshake and the use of the Elliptic Curve Digital Signature Algorithm (ECDSA) and Edwards-curve Digital Signature Algorithm (EdDSA) as authentication mechanisms.</t>
              <t>This document obsoletes RFC 4492.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8422"/>
          <seriesInfo name="DOI" value="10.17487/RFC8422"/>
        </reference>
        <reference anchor="I-D.ietf-tokbind-negotiation">
          <front>
            <title>Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation</title>
            <author fullname="Andrei Popov">
              <organization>Microsoft Corp.</organization>
            </author>
            <author fullname="Magnus Nyström">
              <organization>Microsoft Corp.</organization>
            </author>
            <author fullname="Dirk Balfanz">
              <organization>Google Inc.</organization>
            </author>
            <author fullname="Adam Langley">
              <organization>Google Inc.</organization>
            </author>
            <date day="23" month="May" year="2018"/>
            <abstract>
              <t>This document specifies a Transport Layer Security (TLS) extension for the negotiation of Token Binding protocol version and key parameters.  Negotiation of Token Binding in TLS 1.3 and later versions is beyond the scope of this document.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tokbind-negotiation-14"/>
        </reference>
        <reference anchor="RFC4366">
          <front>
            <title>Transport Layer Security (TLS) Extensions</title>
            <author fullname="S. Blake-Wilson" initials="S." surname="Blake-Wilson">
              <organization/>
            </author>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom">
              <organization/>
            </author>
            <author fullname="D. Hopwood" initials="D." surname="Hopwood">
              <organization/>
            </author>
            <author fullname="J. Mikkelsen" initials="J." surname="Mikkelsen">
              <organization/>
            </author>
            <author fullname="T. Wright" initials="T." surname="Wright">
              <organization/>
            </author>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document describes extensions that may be used to add functionality to Transport Layer Security (TLS).  It provides both generic extension mechanisms for the TLS handshake client and server hellos, and specific extensions using these generic mechanisms.</t>
              <t>The extensions may be used by TLS clients and servers.  The extensions are backwards compatible: communication is possible between TLS clients that support the extensions and TLS servers that do not support the extensions, and vice versa.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4366"/>
          <seriesInfo name="DOI" value="10.17487/RFC4366"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
