<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.13 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-rfc8447bis-01" category="std" consensus="true" obsoletes="8447" updates="3749, 5077, 4680, 5246, 5705, 5878, 6520, 7301" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.13.0 -->
  <front>
    <title abbrev="(D)TLS IANA Registry Updates">IANA Registry Updates for TLS and DTLS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-01"/>
    <author initials="J." surname="Salowey" fullname="Joe Salowey">
      <organization>Salesforce</organization>
      <address>
        <email>joe@salowey.net</email>
      </address>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <date year="2022" month="July" day="08"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes a number of changes to TLS and DTLS IANA registries
that range from adding notes to the registry all the way to changing
the registration policy.  These changes were mostly motivated by WG
review of the TLS- and DTLS-related registries undertaken as part of the
TLS 1.3 development process.</t>
      <t>This document obsoletes RFC 8447 and updates the following RFCs:
3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-rfc8447bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/rfc8447bis"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>This document instructs IANA to make changes to a number of the IANA
registries related to Transport Layer Security (TLS) and Datagram
Transport Layer Security (DTLS).</t>
      <aside>
        <t>NOTE for IANA: Where we make new changes we used [<bcp14>SHALL</bcp14> / has].
  Otherwise, we left it as has, i.e., it matches the text in
  <xref target="RFC8447"/>.</t>
      </aside>
      <t>Most of the instructions included herein and previously included in
<xref target="RFC8447"/>, which this document obsoletes, were motivated by the
development of TLS 1.3 <xref target="RFC8446"/>. The changes ranged from simple,
e.g., adding notes, to complex, e.g., changing a registry's registration
policy. Instead of listing the changes and their rationale here in the
introduction, each section provides rationale for the proposed
change(s). The instructions in this document revise the values of
"Recommended" column, applies the new value to the registries, and adds
this column as noted in <xref target="orphaned-registries"/>. There are also instructions to
update references, including replacing references to <xref target="RFC8446"/> with
<xref target="I-D.ietf-tls-rfc8446bis"/> and <xref target="RFC8447"/> with <xref target="I-D.ietf-tls-rfc8447bis"/>.</t>
      <t>This document proposes no changes to the registration policies for TLS
Alerts <xref target="I-D.ietf-tls-rfc8446bis"/>, TLS ContentType <xref target="I-D.ietf-tls-rfc8446bis"/>,
TLS HandshakeType <xref target="I-D.ietf-tls-rfc8446bis"/>, and TLS Certificate Status
Types <xref target="RFC6961"/> registries; the existing policies (Standards Action
for the first three; IETF Review for the last), are appropriate for
these one-byte code points because of their scarcity.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="adding-tls-to-registry-names">
      <name>Adding "TLS" to Registry Names</name>
      <t>For consistency amongst TLS registries, IANA
has prepended "TLS" to the following registries:</t>
      <ul spacing="normal">
        <li>Application-Layer Protocol Negotiation (ALPN) Protocol IDs <xref target="RFC7301"/>,</li>
        <li>ExtensionType Values,</li>
        <li>Heartbeat Message Types <xref target="RFC6520"/>, and</li>
        <li>Heartbeat Modes <xref target="RFC6520"/>.</li>
      </ul>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for these four registries
to also refer to this document.  The remainder of this document will
use the registry names with the "TLS" prefix.</t>
    </section>
    <section anchor="aligning-with-rfc-8126">
      <name>Aligning with RFC 8126</name>
      <t>Many of the TLS-related IANA registries had the registration procedure
"IETF Consensus", which was changed to "IETF Review" by <xref target="RFC8126"/>.
To align with the new terminology, IANA has updated the following
registries to "IETF Review":</t>
      <ul spacing="normal">
        <li>TLS Authorization Data Formats <xref target="RFC4680"/></li>
        <li>TLS Supplemental Data Formats (SupplementalDataType) <xref target="RFC5878"/></li>
      </ul>
      <t>This is not a universal change, as some registries originally defined
with "IETF Consensus" are undergoing other changes either as a result
of this document or <xref target="RFC8422"/>.</t>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for these two registries
to also refer to this document.</t>
    </section>
    <section anchor="adding-recommended-column">
      <name>Adding "Recommended" Column</name>
      <t>The instructions in this document update the Recommended column,
originally added in <xref target="RFC8447"/> to add a third value, "D",
indicating that a value is "Discouraged". The permitted values
are:</t>
      <ul spacing="normal">
        <li>Y: Indicates that the IETF has consensus that the
  item is <bcp14>RECOMMENDED</bcp14>. This only means that the associated
  mechanism is fit for the purpose for which it was defined.
  Careful reading of the documentation for the mechanism is
  necessary to understand the applicability of that mechanism.
  The IETF could recommend mechanisms that have limited
  applicability, but will provide applicability statements that
  describe any limitations of the mechanism or necessary constraints
  on its use.</li>
        <li>N: Indicates that the item has not been evaluated by
  the IETF and that the IETF has made no statement about the
  suitability of the associated mechanism. This does not necessarily
  mean that the mechanism is flawed, only that no consensus exists.
  The IETF might have consensus to leave an items marked as "N" on
  the basis of it having limited applicability or usage constraints.</li>
        <li>D: Indicates that the item is discouraged and <bcp14>SHOULD
  NOT</bcp14> or <bcp14>MUST NOT</bcp14> be used. This marking could be used to identify
  mechanisms that might result in problems if they are used, such as
  a weak cryptographic algorithm or a mechanism that might cause
  interoperability problems in deployment.</li>
      </ul>
      <t>Setting the Recommended item to "Y" or "D" or changing a
item whose current value is "Y" or "D" requires Standards Action <xref target="RFC8126"/>.
Not all items defined in Standards Track RFCs need to be
marked as Recommended. Changing the Recommended status of an item in a
Standards Track RFC requires Standards Action <xref target="RFC8126"/>.</t>
      <aside>
        <t>Note: the registries in the rest of the document will need to have the
  recommended column updated appropriately, specifically to deprecate MD5
  and SHA-1, etc.</t>
      </aside>
    </section>
    <section anchor="session-ticket-tls-extension">
      <name>Session Ticket TLS Extension</name>
      <t>The nomenclature for the registry entries in the TLS ExtensionType
Values registry correspond to the presentation language field name
except for entry 35.  To ensure that the values in the registry are
consistently identified in the registry, IANA:</t>
      <ul spacing="normal">
        <li>has renamed entry 35 to "session_ticket (renamed from
"SessionTicket TLS")" <xref target="RFC5077"/>.</li>
        <li>[<bcp14>SHALL</bcp14> replace/has replaced] the reference to <xref target="RFC8447"/> with a
reference to this document in the "Reference" column for entry 35.</li>
      </ul>
    </section>
    <section anchor="tls-extensiontype-values">
      <name>TLS ExtensionType Values</name>
      <t>Experience has shown that the IETF Review registry policy for TLS
extensions was too strict.  Based on WG consensus, the decision was
taken to change the registration policy to Specification Required
while reserving a small part of the code space for Private Use
<xref target="RFC8126"/>.  Therefore, IANA [<bcp14>SHALL</bcp14> update/has updated] the TLS
ExtensionType Values registry as follows:</t>
      <ul spacing="normal">
        <li>Changed the registry policy to:</li>
      </ul>
      <artwork><![CDATA[
    Values with the first byte in the range 0-254 (decimal) are assigned
    via Specification Required [RFC8126].  Values with the first byte
    255 (decimal) are reserved for Private Use [RFC8126].
]]></artwork>
      <ul spacing="normal">
        <li>Updated the "Reference" to refer to this document instead of <xref target="RFC8447"/>.</li>
      </ul>
      <t>See <xref target="expert-pool"/> for additional information about the designated
expert pool.</t>
      <t>Despite wanting to "loosen" the registration policies for TLS
extensions, it is still useful to indicate in the IANA registry which
extensions the WG recommends be supported.  Therefore, IANA [<bcp14>SHALL</bcp14>
update/has updated] the TLS ExtensionType Values registry as follows:</t>
      <ul spacing="normal">
        <li>Add a "Recommended" column with the contents as listed below.  This
table has been generated by marking Standards Track RFCs as "Y",
"truncated_hmac" (4) and "connection_id (deprecated)" (53) as "D",
and all others as "N". The "Recommended" column is assigned a
value of "N" unless explicitly requested, and adding a value with
a "Recommended" value of "Y" requires Standards Action <xref target="RFC8126"/>.
IESG Approval is <bcp14>REQUIRED</bcp14> for a Y-&gt;N, Y-&gt;D, and D-&gt;Y|N transitions.</li>
      </ul>
      <aside>
        <t>Note: Should we also mark the Reserved 40 and 46 as "D"?</t>
      </aside>
      <table>
        <thead>
          <tr>
            <th align="left">Extension</th>
            <th align="right">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">server_name</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">max_fragment_length</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">client_certificate_url</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">trusted_ca_keys</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">truncated_hmac</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">status_request</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">user_mapping</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">client_authz</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">server_authz</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">cert_type</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">supported_groups</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">ec_point_formats</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">srp</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">signature_algorithms</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">use_srtp</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">heartbeat</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">application_layer_protocol_negotiation</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">status_request_v2</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">signed_certificate_timestamp</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">client_certificate_type</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">server_certificate_type</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">padding</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">encrypt_then_mac</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">extended_master_secret</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">cached_info</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">session_ticket</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">renegotiation_info</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">connection_id (deprecated)</td>
            <td align="right">D</td>
          </tr>
        </tbody>
      </table>
      <t>IANA [<bcp14>SHALL</bcp14> update/has added] the following notes:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in <xref target="I-D.ietf-tls-rfc8447bis"/>.
The designated expert <xref target="RFC8126"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft (that
is posted and never published as an RFC) or a document from another
standards body, industry consortium, university site, etc.  The expert
may provide more in-depth reviews, but their approval should not be
taken as an endorsement of the extension.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>As specified in <xref target="RFC8126"/>, assignments made in the Private Use
space are not generally useful for broad interoperability.  It is
the responsibility of those making use of the Private Use range to
ensure that no conflicts occur (within the intended scope of use).
For widespread experiments, temporary reservations are available.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>If an item is not marked as "Recommended", it does not necessarily mean
that it is flawed; rather, it indicates that the item either has not
been through the IETF consensus process, has limited applicability, or
is intended only for specific use cases.</t>
        </dd>
      </dl>
      <t>The extensions added by <xref target="I-D.ietf-tls-rfc8446bis"/> are omitted from the
above table. Likewise, extensions defined after <xref target="RFC8447"/> are also not
listed in the table as those RFCs specify the value of the extension's
"Recommended"; extensions points defined after <xref target="RFC8447"/> include
token_binding, compress_certificate, record_size_limit, pwd_protect,
pwd_clear, password_salt, ticket_pinning, tls_cert_with_extern_psk,
delegated_credentials, supported_ekt_ciphers, connection_id,
external_id_hash, external_session_id, quic_transport_parameters,
ticket_request, and dnssec_chain.</t>
      <t><xref target="I-D.ietf-tls-rfc8446bis"/> also uses the TLS ExtensionType Values
registry originally created in <xref target="RFC4366"/>. The following text is
from <xref target="I-D.ietf-tls-rfc8446bis"/> and is included here to ensure
alignment between these specifications.</t>
      <ul spacing="normal">
        <li>IANA [<bcp14>SHALL</bcp14> update/has updated] this registry to include the
"key_share", "pre_shared_key", "psk_key_exchange_modes",
"early_data", "cookie", "supported_versions",
"certificate_authorities", "oid_filters", "post_handshake_auth",
and "signature_algorithms_cert", extensions with the values
defined in <xref target="I-D.ietf-tls-rfc8446bis"/> and the "Recommended" value of "Y".</li>
        <li>IANA [<bcp14>SHALL</bcp14> update/has updated] this registry to include a "TLS
1.3" column that lists the messages in which the extension may
appear.  This column [<bcp14>SHALL</bcp14> be/has been] initially populated from
the table in Section 4.2 of <xref target="I-D.ietf-tls-rfc8446bis"/> with any
extension not listed there marked as "-" to indicate that it is not
used by TLS 1.3.</li>
      </ul>
    </section>
    <section anchor="tls-cipher-suites-registry">
      <name>TLS Cipher Suites Registry</name>
      <aside>
        <t>Note: Review in light of <xref target="I-D.ietf-tls-deprecate-obsolete-kex"/>.</t>
      </aside>
      <t>Experience has shown that the IETF Consensus registry policy for TLS
Cipher Suites was too strict.  Based on WG consensus, the decision was
taken to change the TLS Cipher Suites registry's registration policy
to Specification Required while reserving a small part of the code
space for Experimental and Private Use <xref target="RFC8126"/>.  Therefore, IANA
has updated the TLS Cipher Suites registry's policy as follows:</t>
      <artwork><![CDATA[
    Values with the first byte in the range 0-254 (decimal) are
    assigned via Specification Required [RFC8126].  Values with the
    first byte 255 (decimal) are reserved for Private Use [RFC8126].
]]></artwork>
      <t>See <xref target="expert-pool"/> for additional information about the designated
expert pool.</t>
      <t>The TLS Cipher Suites registry has grown significantly and will continue to
do so.  To better guide those not intimately involved in TLS, IANA
[<bcp14>SHALL</bcp14> update/has updated] the TLS Cipher Suites registry as follows:</t>
      <aside>
        <t>The following text needs to be update to reflect the new recommended policy.</t>
      </aside>
      <ul spacing="normal">
        <li>
          <t>Added a "Recommended" column to the TLS Cipher Suites registry.  The
cipher suites that follow in the two tables are marked as "Y".
All other cipher suites are marked as "N".  The "Recommended"
column is assigned a value of "N" unless explicitly requested, and
adding a value with a "Recommended" value of "Y" requires
Standards Action <xref target="RFC8126"/>.  IESG Approval is <bcp14>REQUIRED</bcp14> for a Y-&gt;N
transition.  </t>
          <t>
The cipher suites that follow are Standards Track server-authenticated
(and optionally client-authenticated) cipher suites that are
currently available in TLS 1.2.</t>
        </li>
      </ul>
      <t>RFC EDITOR: The previous paragraph is for document reviewers and is not
meant for the registry.</t>
      <artwork><![CDATA[
Cipher Suite Name                             | Value
----------------------------------------------+------------
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256           | {0x00,0x9E}
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384           | {0x00,0x9F}
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256       | {0xC0,0x2B}
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384       | {0xC0,0x2C}
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256         | {0xC0,0x2F}
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384         | {0xC0,0x30}
TLS_DHE_RSA_WITH_AES_128_CCM                  | {0xC0,0x9E}
TLS_DHE_RSA_WITH_AES_256_CCM                  | {0xC0,0x9F}
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256   | {0xCC,0xA8}
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 | {0xCC,0xA9}
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256     | {0xCC,0xAA}
]]></artwork>
      <t>The cipher suites that follow are Standards Track ephemeral pre-shared
  key cipher suites that are available in TLS 1.2.</t>
      <t>RFC EDITOR: The previous paragraph is for document reviewers and is not
meant for the registry.</t>
      <artwork><![CDATA[
Cipher Suite Name                             | Value
----------------------------------------------+------------
TLS_DHE_PSK_WITH_AES_128_GCM_SHA256           | {0x00,0xAA}
TLS_DHE_PSK_WITH_AES_256_GCM_SHA384           | {0x00,0xAB}
TLS_DHE_PSK_WITH_AES_128_CCM                  | {0xC0,0xA6}
TLS_DHE_PSK_WITH_AES_256_CCM                  | {0xC0,0xA7}
TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256         | {0xD0,0x01}
TLS_ECDHE_PSK_WITH_AES_256_GCM_SHA384         | {0xD0,0x02}
TLS_ECDHE_PSK_WITH_AES_128_CCM_SHA256         | {0xD0,0x05}
TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256   | {0xCC,0xAC}
TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256     | {0xCC,0xAD}
]]></artwork>
      <t>The TLS 1.3 cipher suites specified by <xref target="I-D.ietf-tls-rfc8446bis"/> are
not listed here; that document provides for their "Recommended" status.</t>
      <t>Despite the following behavior being misguided, experience has shown
that some customers use the IANA registry as a checklist against which
to measure an implementation's completeness, and some implementers
blindly implement cipher suites.  Therefore, IANA has added the
following warning to the registry:</t>
      <dl>
        <dt>WARNING:</dt>
        <dd>
          <t>Cryptographic algorithms and parameters will be broken or weakened
over time.  Blindly implementing cipher suites listed here is not
advised.  Implementers and users need to check that the cryptographic
algorithms listed continue to provide the expected level of security.</t>
        </dd>
      </dl>
      <t>IANA has added the following note to ensure that those that focus on
IANA registries are aware that TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/>
uses the same registry but defines ciphers differently:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>Although TLS 1.3 uses the same cipher suite space as previous
versions of TLS, TLS 1.3 cipher suites are defined differently, only
specifying the symmetric ciphers and hash functions, and cannot be
used for TLS 1.2.  Similarly, TLS 1.2 and lower cipher suite values
cannot be used with TLS 1.3.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following notes to document the rules
for populating the "Recommended" column:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>CCM_8 cipher suites are not marked as "Recommended".  These cipher
suites have a significantly truncated authentication tag that represents
a security trade-off that may not be appropriate for general
environments.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>If an item is not marked as "Recommended", it does not necessarily mean
that it is flawed; rather, it indicates that the item either has not
been through the IETF consensus process, has limited applicability, or
is intended only for specific use cases.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following notes for additional
information:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in <xref target="I-D.ietf-tls-rfc8447bis"/>.
The designated expert <xref target="RFC8126"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft (that
is posted and never published as an RFC) or a document from another
standards body, industry consortium, university site, etc.  The expert
may provide more in-depth reviews, but their approval should not be
taken as an endorsement of the cipher suite.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>As specified in <xref target="RFC8126"/>, assignments made in the Private Use
space are not generally useful for broad interoperability.  It is the
responsibility of those making use of the Private Use range to ensure
that no conflicts occur (within the intended scope of use).  For
widespread experiments, temporary reservations are available.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for this registry to
refer to this document instead of <xref target="RFC8447"/>.</t>
    </section>
    <section anchor="tls-supported-groups">
      <name>TLS Supported Groups</name>
      <t>Similar to cipher suites, supported groups have proliferated over time,
and some use the registry to measure implementations.  Therefore, IANA
[<bcp14>SHALL</bcp14> add/has added] a "Recommended" column with a "Y" for secp256r1,
secp384r1, x25519, and x448, while all others are "N".  These "Y"
groups are taken from Standards Track RFCs; <xref target="RFC8422"/> elevates
secp256r1 and secp384r1 to Standards Track.  Not all groups from
<xref target="RFC8422"/>, which is Standards Track, are marked as "Y"; these groups
apply to TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/> and previous versions of
TLS.  The "Recommended" column is assigned a value of "N" unless
explicitly requested, and adding a value with a "Recommended" value of "Y"
requires Standards Action <xref target="RFC8126"/>.  IESG Approval is
<bcp14>REQUIRED</bcp14> for a Y-&gt;N transition.</t>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following notes:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>If an item is not marked as "Recommended" it does not necessarily mean
that it is flawed; rather, it indicates that the item either has not
been through the IETF consensus process, has limited applicability, or
is intended only for specific use cases.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in <xref target="I-D.ietf-tls-rfc8447bis"/>.
The designated expert <xref target="RFC8126"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft (that
is posted and never published as an RFC) or a document from another
standards body, industry consortium, university site, etc.  The expert
may provide more in-depth reviews, but their approval should not be
taken as an endorsement of the supported groups.</t>
        </dd>
      </dl>
      <t>Despite the following behavior being misguided, experience has shown
that some customers use the IANA registry as a checklist against which
to measure an implementation's completeness, and some implementers
blindly implement supported group.  Therefore, IANA has added the
following warning to the registry:</t>
      <dl>
        <dt>WARNING:</dt>
        <dd>
          <t>Cryptographic algorithms and parameters will be broken or weakened
over time.  Blindly implementing supported groups listed here is not
advised.  Implementers and users need to check that the cryptographic
algorithms listed continue to provide the expected level of security.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for this registry to
refer to this document instead of <xref target="RFC8447"/>.</t>
      <t>The value 0 (0x0000) has been marked as reserved.</t>
    </section>
    <section anchor="tls-clientcertificatetype-identifiers">
      <name>TLS ClientCertificateType Identifiers</name>
      <t>Experience has shown that the IETF Consensus registry policy for TLS
ClientCertificateType Identifiers is too strict.  Based on WG
consensus, the decision was taken to change the registration policy to
Specification Required while reserving some of the code
space for Standards Track usage and a small part of the code space
for Private Use <xref target="RFC8126"/>.  Therefore, IANA has updated the TLS
ClientCertificateType Identifiers registry's policy as follows:</t>
      <artwork><![CDATA[
      Values in the range 0-63 are assigned via Standards Action [RFC8126].
      Values 64-223 are assigned via Specification Required [RFC8126].
      Values 224-255 are reserved for Private Use [RFC8126].
]]></artwork>
      <t>See <xref target="expert-pool"/> for additional information about the designated
expert pool.</t>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following notes:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in <xref target="I-D.ietf-tls-rfc8447bis"/>.
The designated expert <xref target="RFC8126"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft
(that is posted and never published as an RFC) or a document from
another standards body, industry consortium, university site, etc.
The expert may provide more in-depth reviews, but their approval
should not be taken as an endorsement of the identifier.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>As specified in <xref target="RFC8126"/>, assignments made in the Private Use
space are not generally useful for broad interoperability.  It is
the responsibility of those making use of the Private Use range to
ensure that no conflicts occur (within the intended scope of use).
For widespread experiments, temporary reservations are available.</t>
        </dd>
      </dl>
    </section>
    <section anchor="new-session-ticket-tls-handshake-message-type">
      <name>New Session Ticket TLS Handshake Message Type</name>
      <t>To align with TLS implementations and to align the naming nomenclature
with other Handshake message types, IANA:</t>
      <ul spacing="normal">
        <li>has renamed entry 4 in the TLS HandshakeType registry to
"new_session_ticket (renamed from NewSessionTicket)" <xref target="RFC5077"/>.</li>
        <li>[<bcp14>SHALL</bcp14> replace/has replaced] a reference to <xref target="RFC8447"/> with a
reference to this document in the "Reference" column for entry 4 in
the TLS HandshakeType registry.</li>
      </ul>
    </section>
    <section anchor="tls-exporter-labels-registry">
      <name>TLS Exporter Labels Registry</name>
      <t>To aid those reviewers who start with the IANA registry, IANA [<bcp14>SHALL</bcp14>
add/has added]:</t>
      <ul spacing="normal">
        <li>
          <t>The following note to the TLS Exporter Labels registry:  </t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t><xref target="RFC5705"/> defines keying material exporters for TLS in terms of
  the TLS PRF.  <xref target="I-D.ietf-tls-rfc8446bis"/> replaced the PRF with HKDF, thus
  requiring a new construction. The exporter interface remains the same;
  however, the value is computed differently.</t>
            </dd>
          </dl>
        </li>
        <li>A "Recommended" column to the TLS Exporter Labels registry.  The table
that follows has been generated by marking Standards Track RFCs as "Y" and
all others as "N".  The "Recommended" column is assigned a value of "N"
unless explicitly requested, and adding a value with a "Recommended" value
of "Y" requires Standards Action <xref target="RFC8126"/>. IESG Approval is <bcp14>REQUIRED</bcp14> for a
Y-&gt;N, Y-&gt;D, or D-&gt;Y|N transitions.</li>
      </ul>
      <table>
        <thead>
          <tr>
            <th align="center">Exporter Value</th>
            <th align="center">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center">client finished</td>
            <td align="center">Y</td>
          </tr>
          <tr>
            <td align="center">server finished</td>
            <td align="center">Y</td>
          </tr>
          <tr>
            <td align="center">master secret</td>
            <td align="center">Y</td>
          </tr>
          <tr>
            <td align="center">key expansion</td>
            <td align="center">Y</td>
          </tr>
          <tr>
            <td align="center">client EAP encryption</td>
            <td align="center">Y</td>
          </tr>
          <tr>
            <td align="center">ttls keying material</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="center">ttls challenge</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="center">EXTRACTOR-dtls_srtp</td>
            <td align="center">Y</td>
          </tr>
          <tr>
            <td align="center">EXPORTER_DTLS_OVER_SCTP</td>
            <td align="center">Y</td>
          </tr>
          <tr>
            <td align="center">EXPORTER: teap session key seed</td>
            <td align="center">Y</td>
          </tr>
        </tbody>
      </table>
      <t>To provide additional information for the designated experts, IANA
[<bcp14>SHALL</bcp14> add/has added] the following notes:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in <xref target="I-D.ietf-tls-rfc8447bis"/>.
The designated expert <xref target="RFC8126"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft
(that is posted and never published as an RFC) or a document from
another standards body, industry consortium, university site, etc.
The expert may provide more in-depth reviews, but their approval
should not be taken as an endorsement of the exporter label.  The
expert also verifies that the label is a string consisting of
printable ASCII characters beginning with "EXPORTER".  IANA <bcp14>MUST</bcp14>
also verify that one label is not a prefix of any other label.
For example, labels "key" or "master secretary" are forbidden.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>If an item is not marked as "Recommended", it does not
necessarily mean that it is flawed; rather, it indicates that the
item either has not been through the IETF consensus process, has
limited applicability, or is intended only for specific use cases.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for this registry to refer
to refer to this document instead of <xref target="RFC8447"/>.</t>
    </section>
    <section anchor="adding-missing-item-to-tls-alerts-registry">
      <name>Adding Missing Item to TLS Alerts Registry</name>
      <t>IANA has added the following entry to the TLS Alerts registry;
the entry was omitted from the IANA instructions in <xref target="RFC7301"/>:</t>
      <artwork><![CDATA[
    120   no_application_protocol  Y  [RFC7301][This-document]
]]></artwork>
    </section>
    <section anchor="tls-certificate-types">
      <name>TLS Certificate Types</name>
      <t>Experience has shown that the IETF Consensus registry policy for TLS
Certificate Types is too strict.  Based on WG consensus, the decision
was taken to change registration policy to Specification Required
while reserving a small part of the code space for Private Use <xref target="RFC8126"/>.
Therefore, IANA has changed the TLS Certificate Types registry as follows:</t>
      <ul spacing="normal">
        <li>Changed the registry policy to:</li>
      </ul>
      <artwork><![CDATA[
    Values in the range 0-223 (decimal) are assigned via Specification
    Required [RFC8126]. Values in the range 224-255 (decimal) are
    reserved for Private Use [RFC8126].
]]></artwork>
      <ul spacing="normal">
        <li>Added a "Recommended" column to the registry.  X.509 and Raw
Public Key are "Y".  All others are "N".  The "Recommended" column
is assigned a value of "N" unless explicitly requested, and adding
a value with a "Recommended" value of "Y" requires Standards
Action <xref target="RFC8126"/>.  IESG Approval is <bcp14>REQUIRED</bcp14> for
a Y-&gt;N, Y-&gt;D, and D-&gt;Y|N transitions.</li>
      </ul>
      <t>See <xref target="expert-pool"/> for additional information about the designated
expert pool.</t>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following note:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in <xref target="I-D.ietf-tls-rfc8447bis"/>.
The designated expert <xref target="RFC8126"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft
(that is posted and never published as an RFC) or a document from
another standards body, industry consortium, university site, etc.
The expert may provide more in-depth reviews, but their approval
should not be taken as an endorsement of the certificate type.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>If an item is not marked as "Recommended", it does not
necessarily mean that it is flawed; rather, it indicates that the
item either has not been through the IETF consensus process, has
limited applicability, or is intended only for specific use cases.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for this registry to
refer this document instead of <xref target="RFC8447"/>.</t>
    </section>
    <section anchor="orphaned-registries">
      <name>Orphaned Registries</name>
      <t>To make it clear that (D)TLS 1.3 has orphaned certain registries (i.e.,
they are only applicable to version of (D)TLS protocol versions prior
to 1.3), IANA:</t>
      <ul spacing="normal">
        <li>
          <t>has added the following to the TLS Compression Method Identifiers
registry <xref target="RFC3749"/>:  </t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>Value 0 (NULL) is the only value in this registry applicable to (D)TLS
  protocol version 1.3 or later.</t>
            </dd>
          </dl>
        </li>
        <li>
          <t>has added the following to the TLS HashAlgorithm <xref target="RFC5246"/>
and TLS SignatureAlgorithm registries <xref target="RFC5246"/>:  </t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>The values in this registry are only applicable to (D)TLS protocol
  versions prior to 1.3.  (D)TLS 1.3 and later versions' values are
  registered in the TLS SignatureScheme registry.</t>
            </dd>
          </dl>
        </li>
        <li>[<bcp14>SHALL</bcp14> update/has updated] the "Reference" field in the TLS
Compression Method Identifiers, TLS HashAlgorithm and TLS
SignatureAlgorithm registries to refer to this document instead of
<xref target="RFC8447"/>.</li>
        <li>has updated the TLS HashAlgorithm registry to list
values 7 and 9-223 as "Reserved" and the TLS SignatureAlgorithm
registry to list values 4-6 and 9-223 as "Reserved".</li>
        <li>
          <t>has added the following to the TLS ClientCertificateType
Identifiers registry <xref target="RFC5246"/>:  </t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>The values in this registry are only applicable to (D)TLS
  protocol versions prior to 1.3.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <t>Despite the fact that the TLS HashAlgorithm and SignatureAlgorithm
registries are orphaned, it is still important to warn implementers
of pre-TLS1.3 implementations about the dangers of blindly
implementing cryptographic algorithms.  Therefore, IANA has added the
following warning to the TLS HashAlgorithm and SignatureAlgorithm
registries:</t>
      <dl>
        <dt>WARNING:</dt>
        <dd>
          <t>Cryptographic algorithms and parameters will be broken or weakened
over time.  Blindly implementing the cryptographic algorithms listed
here is not advised.  Implementers and users need to check that the
cryptographic algorithms listed continue to provide the expected level
of security.</t>
        </dd>
      </dl>
      <t>Though TLS 1.0 and TLS 1.1 were deprecated <xref target="RFC8996"/>, TLS 1.2 will
be in use for some time. IANA [<bcp14>SHALL</bcp14> update/has updated] the TLS
HashAlgorithm, TLS SignatureAlgorithm, and TLS ClientCertificateTypes
registries to add a "Recommended" column as follows:</t>
      <t>TLS HashAlgorithm registry:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Descsription</th>
            <th align="right">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">none</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">md5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">sha1</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">sha224</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">sha256</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">sha384</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">sha512</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">Intrinsic</td>
            <td align="right">Y</td>
          </tr>
        </tbody>
      </table>
      <t>TLS SignatureAlgorithm registry:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Descsription</th>
            <th align="right">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">anonymous</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">rsa</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">dsa</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">ecdsa</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">ed25519</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">ed448</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">gostr34102012_256</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">gostr34102012_512</td>
            <td align="right">N</td>
          </tr>
        </tbody>
      </table>
      <t>TLS ClientCertificateTypes registry:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Descsription</th>
            <th align="right">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">rsa_sign</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">dss_sign</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">rsa_fixed_dh</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">dss_fixed_dh</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">rsa_ephemeral_dh_RESERVED</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">dss_ephemeral_dh_RESERVED</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">fortezza_dms_RESERVED</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">ecdsa_sign</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">rsa_fixed_ecdh</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">ecdsa_fixed_ecdh</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">gost_sign256</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">gost_sign512</td>
            <td align="right">N</td>
          </tr>
        </tbody>
      </table>
      <t>In the TLS HashAlgorithm, TLS SignatureAlgorithm, and TLS
ClientCertificateTypes registries, all unassigned and reserved values
have a "Recommended" that is blank.</t>
    </section>
    <section anchor="Notes">
      <name>Additional Notes</name>
      <t>IANA has added the following warning and note to the TLS
SignatureScheme registry:</t>
      <dl>
        <dt>WARNING:</dt>
        <dd>
          <t>Cryptographic algorithms and parameters will be broken or
weakened over time.  Blindly implementing signature schemes listed
here is not advised.  Implementers and users need to check that
the cryptographic algorithms listed continue to provide the
expected level of security.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>As specified in <xref target="RFC8126"/>, assignments made in the Private Use
space are not generally useful for broad interoperability.  It is
the responsibility of those making use of the Private Use range to
ensure that no conflicts occur (within the intended scope of use).
For widespread experiments, temporary reservations are available.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] added the following notes to the
TLS PskKeyExchangeMode registry:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>If an item is not marked as "Recommended", it does not
necessarily mean that it is flawed; rather, it indicates that the
item either has not been through the IETF consensus process, has
limited applicability, or is intended only for specific use cases.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in <xref target="I-D.ietf-tls-rfc8447bis"/>.
The designated expert <xref target="RFC8126"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft
(that is posted and never published as an RFC) or a document from
another standards body, industry consortium, university site, etc.
The expert may provide more in depth reviews, but their approval
should not be taken as an endorsement of the key exchange mode.</t>
        </dd>
      </dl>
    </section>
    <section anchor="expert-pool">
      <name>Designated Expert Pool</name>
      <t>Specification Required <xref target="RFC8126"/> registry requests are registered
after a three-week review period on the <eref target="mailto:tls-reg-review@ietf.org">tls-reg-review@ietf.org</eref>
mailing list, on the advice of one or more designated experts.
However, to allow for the allocation of values prior to publication,
the designated experts may approve registration once they are
satisfied that such a specification will be published.</t>
      <t>Registration requests sent to the mailing list for review <bcp14>SHOULD</bcp14> use an
appropriate subject (e.g., "Request to register value in TLS bar
registry").</t>
      <t>Within the review period, the designated experts will either approve or
deny the registration request, communicating this decision to the review
list and IANA.  Denials <bcp14>SHOULD</bcp14> include an explanation and, if applicable,
suggestions as to how to make the request successful.  Registration
requests that are undetermined for a period longer than 21 days can be
brought to the IESG's attention (using the <eref target="mailto:iesg@ietf.org">iesg@ietf.org</eref> mailing list)
for resolution.</t>
      <t>Criteria that <bcp14>SHOULD</bcp14> be applied by the designated experts includes
determining whether the proposed registration duplicates existing
functionality, whether it is likely to be of general applicability
or useful only for a single application, and whether the registration
description is clear.</t>
      <t>IANA <bcp14>MUST</bcp14> only accept registry updates from the designated experts and
<bcp14>SHOULD</bcp14> direct all requests for registration to the review mailing list.</t>
      <t>It is suggested that multiple designated experts be appointed who are
able to represent the perspectives of different applications using this
specification, in order to enable broadly informed review of
registration decisions.  In cases where a registration decision could
be perceived as creating a conflict of interest for a particular
Expert, that Expert <bcp14>SHOULD</bcp14> defer to the judgment of the other Experts.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The change to Specification Required from IETF Review lowers the amount
of review provided by the WG for cipher suites and supported groups.
This change reflects reality in that the WG essentially provided no
cryptographic review of the cipher suites or supported groups.  This
was especially true of national cipher suites.</t>
      <t>Recommended algorithms are regarded as secure for general use at the
time of registration; however, cryptographic algorithms and parameters
will be broken or weakened over time.  It is possible that the
"Recommended" status in the registry lags behind the most recent advances
in cryptanalysis.  Implementers and users need to check that the
cryptographic algorithms listed continue to provide the expected level
of security.</t>
      <t>Designated experts ensure the specification is publicly available.  They may
provide more in-depth reviews.  Their review should not be taken as an
endorsement of the cipher suite, extension, supported group, etc.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document is entirely about changes to TLS-related IANA registries.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla">
              <organization>Mozilla</organization>
            </author>
            <date day="7" month="March" year="2022"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-04"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8447bis">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joe Salowey">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Sean Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="29" month="March" year="2022"/>
            <abstract>
              <t>   This document describes a number of changes to TLS and DTLS IANA
   registries that range from adding notes to the registry all the way
   to changing the registration policy.  These changes were mostly
   motivated by WG review of the TLS- and DTLS-related registries
   undertaken as part of the TLS 1.3 development process.

   This document obsoletes RFC8447 and updates the following RFCs: 3749,
   5077, 4680, 5246, 5705, 5878, 6520, 7301.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-00"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7301">
          <front>
            <title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
            <author fullname="S. Friedl" initials="S." surname="Friedl">
              <organization/>
            </author>
            <author fullname="A. Popov" initials="A." surname="Popov">
              <organization/>
            </author>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <author fullname="E. Stephan" initials="E." surname="Stephan">
              <organization/>
            </author>
            <date month="July" year="2014"/>
            <abstract>
              <t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7301"/>
          <seriesInfo name="DOI" value="10.17487/RFC7301"/>
        </reference>
        <reference anchor="RFC6520">
          <front>
            <title>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Heartbeat Extension</title>
            <author fullname="R. Seggelmann" initials="R." surname="Seggelmann">
              <organization/>
            </author>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen">
              <organization/>
            </author>
            <author fullname="M. Williams" initials="M." surname="Williams">
              <organization/>
            </author>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes the Heartbeat Extension for the Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) protocols.</t>
              <t>The Heartbeat Extension provides a new protocol for TLS/DTLS allowing the usage of keep-alive functionality without performing a renegotiation and a basis for path MTU (PMTU) discovery for DTLS.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6520"/>
          <seriesInfo name="DOI" value="10.17487/RFC6520"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton">
              <organization/>
            </author>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <author fullname="T. Narten" initials="T." surname="Narten">
              <organization/>
            </author>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC4680">
          <front>
            <title>TLS Handshake Message for Supplemental Data</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <date month="October" year="2006"/>
            <abstract>
              <t>This specification defines a TLS handshake message for exchange of supplemental application data.  TLS hello message extensions are used to determine which supplemental data types are supported by both the TLS client and the TLS server.  Then, the supplemental data handshake message is used to exchange the data.  Other documents will define the syntax of these extensions and the syntax of the associated supplemental data types.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4680"/>
          <seriesInfo name="DOI" value="10.17487/RFC4680"/>
        </reference>
        <reference anchor="RFC5878">
          <front>
            <title>Transport Layer Security (TLS) Authorization Extensions</title>
            <author fullname="M. Brown" initials="M." surname="Brown">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="May" year="2010"/>
            <abstract>
              <t>This document specifies authorization extensions to the Transport Layer Security (TLS) Handshake Protocol.  Extensions are carried in the client and server hello messages to confirm that both parties support the desired authorization data types.  Then, if supported by both the client and the server, authorization information, such as attribute certificates (ACs) or Security Assertion Markup Language (SAML)  assertions, is exchanged in the supplemental data handshake message. This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5878"/>
          <seriesInfo name="DOI" value="10.17487/RFC5878"/>
        </reference>
        <reference anchor="RFC5077">
          <front>
            <title>Transport Layer Security (TLS) Session Resumption without Server-Side State</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="H. Zhou" initials="H." surname="Zhou">
              <organization/>
            </author>
            <author fullname="P. Eronen" initials="P." surname="Eronen">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document describes a mechanism that enables the Transport Layer Security (TLS) server to resume sessions and avoid keeping per-client session state.  The TLS server encapsulates the session state into a ticket and forwards it to the client.  The client can subsequently resume a session using the obtained ticket.  This document obsoletes RFC 4507.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5077"/>
          <seriesInfo name="DOI" value="10.17487/RFC5077"/>
        </reference>
        <reference anchor="I-D.ietf-tls-deprecate-obsolete-kex">
          <front>
            <title>Deprecating Obsolete Key Exchange Methods in TLS</title>
            <author fullname="Carrick Bartle">
              <organization>Apple, Inc.</organization>
            </author>
            <author fullname="Nimrod Aviram">
	 </author>
            <date day="15" month="June" year="2022"/>
            <abstract>
              <t>   This document makes several prescriptions regarding the following key
   exchange methods in TLS, most of which have been superseded by better
   options:

1. This document deprecates the use of RSA key exchange in TLS.

2. It limits the use of Diffie Hellman key exchange over a finite field to avoid
known vulnerabilities and improper security properties.

3. It discourages the use of static elliptic curve Diffie Hellman cipher suites.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-deprecate-obsolete-kex-00"/>
        </reference>
        <reference anchor="RFC5705">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="March" year="2010"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes.  This document describes a general mechanism for allowing that.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
        <reference anchor="RFC3749">
          <front>
            <title>Transport Layer Security Protocol Compression Methods</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <date month="May" year="2004"/>
            <abstract>
              <t>The Transport Layer Security (TLS) protocol (RFC 2246) includes features to negotiate selection of a lossless data compression method as part of the TLS Handshake Protocol and to then apply the algorithm associated with the selected method as part of the TLS Record Protocol.  TLS defines one standard compression method which specifies that data exchanged via the record protocol will not be compressed.  This document describes an additional compression method associated with a lossless data compression algorithm for use with TLS, and it describes a method for the specification of additional TLS compression methods.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3749"/>
          <seriesInfo name="DOI" value="10.17487/RFC3749"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC8996">
          <front>
            <title>Deprecating TLS 1.0 and TLS 1.1</title>
            <author fullname="K. Moriarty" initials="K." surname="Moriarty">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <date month="March" year="2021"/>
            <abstract>
              <t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance. </t>
              <t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
              <t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="8996"/>
          <seriesInfo name="DOI" value="10.17487/RFC8996"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8447">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy.  These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC6961">
          <front>
            <title>The Transport Layer Security (TLS) Multiple Certificate Status Request Extension</title>
            <author fullname="Y. Pettersen" initials="Y." surname="Pettersen">
              <organization/>
            </author>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document defines the Transport Layer Security (TLS) Certificate Status Version 2 Extension to allow clients to specify and support several certificate status methods.  (The use of the Certificate Status extension is commonly referred to as "OCSP stapling".)  Also defined is a new method based on the Online Certificate Status Protocol (OCSP) that servers can use to provide status information about not only the server's own certificate but also the status of intermediate certificates in the chain.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6961"/>
          <seriesInfo name="DOI" value="10.17487/RFC6961"/>
        </reference>
        <reference anchor="RFC8422">
          <front>
            <title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir">
              <organization/>
            </author>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <author fullname="M. Pegourie-Gonnard" initials="M." surname="Pegourie-Gonnard">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol.  In particular, it specifies the use of Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement in a TLS handshake and the use of the Elliptic Curve Digital Signature Algorithm (ECDSA) and Edwards-curve Digital Signature Algorithm (EdDSA) as authentication mechanisms.</t>
              <t>This document obsoletes RFC 4492.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8422"/>
          <seriesInfo name="DOI" value="10.17487/RFC8422"/>
        </reference>
        <reference anchor="RFC4366">
          <front>
            <title>Transport Layer Security (TLS) Extensions</title>
            <author fullname="S. Blake-Wilson" initials="S." surname="Blake-Wilson">
              <organization/>
            </author>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom">
              <organization/>
            </author>
            <author fullname="D. Hopwood" initials="D." surname="Hopwood">
              <organization/>
            </author>
            <author fullname="J. Mikkelsen" initials="J." surname="Mikkelsen">
              <organization/>
            </author>
            <author fullname="T. Wright" initials="T." surname="Wright">
              <organization/>
            </author>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document describes extensions that may be used to add functionality to Transport Layer Security (TLS).  It provides both generic extension mechanisms for the TLS handshake client and server hellos, and specific extensions using these generic mechanisms.</t>
              <t>The extensions may be used by TLS clients and servers.  The extensions are backwards compatible: communication is possible between TLS clients that support the extensions and TLS servers that do not support the extensions, and vice versa.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4366"/>
          <seriesInfo name="DOI" value="10.17487/RFC4366"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
