<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 3.1.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-rfc8447bis-02" category="std" consensus="true" obsoletes="8447" updates="3749, 5077, 4680, 5246, 5705, 5878, 6520, 7301" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.1 -->
  <front>
    <title abbrev="(D)TLS IANA Registry Updates">IANA Registry Updates for TLS and DTLS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-02"/>
    <author initials="J." surname="Salowey" fullname="Joe Salowey">
      <organization>Venafi</organization>
      <address>
        <email>joe@salowey.net</email>
      </address>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <date year="2022" month="October" day="24"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes a number of changes to TLS and DTLS IANA registries
that range from adding notes to the registry all the way to changing
the registration policy.  These changes were mostly motivated by WG
review of the TLS- and DTLS-related registries undertaken as part of the
TLS 1.3 development process.</t>
      <t>This document obsoletes RFC 8447 and updates the following RFCs:
3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-rfc8447bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/rfc8447bis"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>This document instructs IANA to make changes to a number of the IANA
registries related to Transport Layer Security (TLS) and Datagram
Transport Layer Security (DTLS).</t>
      <aside>
        <t>NOTE for IANA: Where we make new changes we used [<bcp14>SHALL</bcp14> / has].
  Otherwise, we left it as has, i.e., it matches the text in
  <xref target="RFC8447"/>.</t>
      </aside>
      <t>Most of the instructions included herein and previously included in
<xref target="RFC8447"/>, which this document obsoletes, were motivated by the
development of TLS 1.3 <xref target="RFC8446"/>. The changes ranged from simple,
e.g., adding notes, to complex, e.g., changing a registry's registration
policy. Instead of listing the changes and their rationale here in the
introduction, each section provides rationale for the proposed
change(s). The instructions in this document revise the values of
"Recommended" column, applies the new value to the registries, and adds
this column as noted in <xref target="orphaned-registries"/>. There are also instructions to
update references, including replacing references to <xref target="RFC8446"/> with
<xref target="I-D.ietf-tls-rfc8446bis"/> and <xref target="RFC8447"/> with <xref target="I-D.ietf-tls-rfc8447bis"/>.</t>
      <t>This document proposes no changes to the registration policies for TLS
Alerts <xref target="I-D.ietf-tls-rfc8446bis"/>, TLS ContentType <xref target="I-D.ietf-tls-rfc8446bis"/>,
TLS HandshakeType <xref target="I-D.ietf-tls-rfc8446bis"/>, and TLS Certificate Status
Types <xref target="RFC6961"/> registries; the existing policies (Standards Action
for the first three; IETF Review for the last), are appropriate for
these one-byte code points because of their scarcity.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="adding-tls-to-registry-names">
      <name>Adding "TLS" to Registry Names</name>
      <t>For consistency amongst TLS registries, IANA
has prepended "TLS" to the following registries:</t>
      <ul spacing="normal">
        <li>Application-Layer Protocol Negotiation (ALPN) Protocol IDs <xref target="RFC7301"/>,</li>
        <li>ExtensionType Values,</li>
        <li>Heartbeat Message Types <xref target="RFC6520"/>, and</li>
        <li>Heartbeat Modes <xref target="RFC6520"/>.</li>
      </ul>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for these four registries
to also refer to this document.  The remainder of this document will
use the registry names with the "TLS" prefix.</t>
    </section>
    <section anchor="aligning-with-rfc-8126">
      <name>Aligning with RFC 8126</name>
      <t>Many of the TLS-related IANA registries had the registration procedure
"IETF Consensus", which was changed to "IETF Review" by <xref target="RFC8126"/>.
To align with the new terminology, IANA has updated the following
registries to "IETF Review":</t>
      <ul spacing="normal">
        <li>TLS Authorization Data Formats <xref target="RFC4680"/></li>
        <li>TLS Supplemental Data Formats (SupplementalDataType) <xref target="RFC5878"/></li>
      </ul>
      <t>This is not a universal change, as some registries originally defined
with "IETF Consensus" are undergoing other changes either as a result
of this document or <xref target="RFC8422"/>.</t>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for these two registries
to also refer to this document.</t>
    </section>
    <section anchor="adding-recommended-column">
      <name>Adding "Recommended" Column</name>
      <t>The instructions in this document update the Recommended column,
originally added in <xref target="RFC8447"/> to add a third value, "D",
indicating that a value is "Discouraged". The permitted values
are:</t>
      <ul spacing="normal">
        <li>Y: Indicates that the IETF has consensus that the
  item is <bcp14>RECOMMENDED</bcp14>. This only means that the associated
  mechanism is fit for the purpose for which it was defined.
  Careful reading of the documentation for the mechanism is
  necessary to understand the applicability of that mechanism.
  The IETF could recommend mechanisms that have limited
  applicability, but will provide applicability statements that
  describe any limitations of the mechanism or necessary constraints
  on its use.</li>
        <li>N: Indicates that the item has not been evaluated by
  the IETF and that the IETF has made no statement about the
  suitability of the associated mechanism. This does not necessarily
  mean that the mechanism is flawed, only that no consensus exists.
  The IETF might have consensus to leave an items marked as "N" on
  the basis of it having limited applicability or usage constraints.</li>
        <li>D: Indicates that the item is discouraged and <bcp14>SHOULD
  NOT</bcp14> or <bcp14>MUST NOT</bcp14> be used. This marking could be used to identify
  mechanisms that might result in problems if they are used, such as
  a weak cryptographic algorithm or a mechanism that might cause
  interoperability problems in deployment.</li>
      </ul>
      <t>Setting the Recommended item to "Y" or "D" or changing a
item whose current value is "Y" or "D" requires Standards Action <xref target="RFC8126"/>.
Not all items defined in Standards Track RFCs need to be
marked as Recommended. Changing the Recommended status of an item in a
Standards Track RFC requires Standards Action <xref target="RFC8126"/>.</t>
      <aside>
        <t>Note: the registries in the rest of the document will need to have the
  recommended column updated appropriately, specifically to deprecate MD5
  and SHA-1, etc.</t>
      </aside>
    </section>
    <section anchor="session-ticket-tls-extension">
      <name>Session Ticket TLS Extension</name>
      <t>The nomenclature for the registry entries in the TLS ExtensionType
Values registry correspond to the presentation language field name
except for entry 35.  To ensure that the values in the registry are
consistently identified in the registry, IANA:</t>
      <ul spacing="normal">
        <li>has renamed entry 35 to "session_ticket (renamed from
"SessionTicket TLS")" <xref target="RFC5077"/>.</li>
        <li>[<bcp14>SHALL</bcp14> replace] the references to <xref target="RFC8447"/> with a
reference to this document in the "Reference" column for entry 35.</li>
      </ul>
    </section>
    <section anchor="tls-extensiontype-values">
      <name>TLS ExtensionType Values</name>
      <t>In order to refect the changes in the Recommended column allocation,
IANA <bcp14>SHALL</bcp14> update the TLS ExtensionType Values registry as follows:</t>
      <ul spacing="normal">
        <li>Change the registry policy to:</li>
      </ul>
      <artwork><![CDATA[
    Values with the first byte in the range 0-254 (decimal) are assigned
    via Specification Required [RFC8126].  Values with the first byte
    255 (decimal) are reserved for Private Use [RFC8126].  Adding a value
    Y to the "Recommended" column requires Standards Action {{RFC8126}}.
    IESG Approval is REQUIRED for a Y->N, Y->D, and D->Y|N
    "Recommended" column transitions.
]]></artwork>
      <ul spacing="normal">
        <li>Add a reference to this document under the reference heading.</li>
        <li>Update the "Recommended" column with the changes as listed below.  This
table has been generated by keeping existing "Y" and "N" entries except for
"truncated_hmac" (4), "connection_id (deprecated)" (53), "reserved" (40) and
"Reserved" (46) as "D". A reference to this document <bcp14>SHALL</bcp14> be added to these entries.</li>
      </ul>
      <table>
        <thead>
          <tr>
            <th align="left">Extension</th>
            <th align="right">Recommended</th>
            <th align="left"> </th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">4</td>
            <td align="right">truncated_hmac</td>
            <td align="left">D</td>
          </tr>
          <tr>
            <td align="left">53</td>
            <td align="right">connection_id (deprecated)</td>
            <td align="left">D</td>
          </tr>
          <tr>
            <td align="left">40</td>
            <td align="right">Reserved</td>
            <td align="left">D</td>
          </tr>
          <tr>
            <td align="left">46</td>
            <td align="right">Reserved</td>
            <td align="left">D</td>
          </tr>
        </tbody>
      </table>
      <ul spacing="normal">
        <li>Update the following note on the recommended column</li>
      </ul>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>If "Recommended" column is set to "N", it does not necessarily mean
that it is flawed; rather, it indicates that the item either has not
been through the IETF consensus process, has limited applicability, or
is intended only for specific use cases.  If the "Recommended" column
is set to "D" the item is discouraged and <bcp14>SHOULD NOT</bcp14> or <bcp14>MUST NOT</bcp14> be used.</t>
        </dd>
      </dl>
    </section>
    <section anchor="tls-cipher-suites-registry">
      <name>TLS Cipher Suites Registry</name>
      <aside>
        <t>Note: Review in light of <xref target="I-D.ietf-tls-deprecate-obsolete-kex"/>.</t>
      </aside>
      <t>Experience has shown that the IETF Consensus registry policy for TLS
Cipher Suites was too strict.  Based on WG consensus, the decision was
taken to change the TLS Cipher Suites registry's registration policy
to Specification Required while reserving a small part of the code
space for Experimental and Private Use <xref target="RFC8126"/>.  Therefore, IANA
has updated the TLS Cipher Suites registry's policy as follows:</t>
      <artwork><![CDATA[
    Values with the first byte in the range 0-254 (decimal) are
    assigned via Specification Required [RFC8126].  Values with the
    first byte 255 (decimal) are reserved for Private Use [RFC8126].
]]></artwork>
      <t>See <xref target="expert-pool"/> for additional information about the designated
expert pool.</t>
      <t>The TLS Cipher Suites registry has grown significantly and will continue to
do so.  To better guide those not intimately involved in TLS, IANA
[<bcp14>SHALL</bcp14> update/has updated] the TLS Cipher Suites registry as follows:</t>
      <aside>
        <t>The following text needs to be update to reflect the new recommended policy.</t>
      </aside>
      <ul spacing="normal">
        <li>
          <t>Added a "Recommended" column to the TLS Cipher Suites registry.  The
cipher suites that follow in the two tables are marked as "Y".
All other cipher suites are marked as "N".  The "Recommended"
column is assigned a value of "N" unless explicitly requested, and
adding a value with a "Recommended" value of "Y" requires
Standards Action <xref target="RFC8126"/>.  IESG Approval is <bcp14>REQUIRED</bcp14> for a Y-&gt;N
transition.  </t>
          <t>
The cipher suites that follow are Standards Track server-authenticated
(and optionally client-authenticated) cipher suites that are
currently available in TLS 1.2.</t>
        </li>
      </ul>
      <t>RFC EDITOR: The previous paragraph is for document reviewers and is not
meant for the registry.</t>
      <artwork><![CDATA[
Cipher Suite Name                             | Value
----------------------------------------------+------------
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256           | {0x00,0x9E}
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384           | {0x00,0x9F}
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256       | {0xC0,0x2B}
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384       | {0xC0,0x2C}
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256         | {0xC0,0x2F}
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384         | {0xC0,0x30}
TLS_DHE_RSA_WITH_AES_128_CCM                  | {0xC0,0x9E}
TLS_DHE_RSA_WITH_AES_256_CCM                  | {0xC0,0x9F}
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256   | {0xCC,0xA8}
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 | {0xCC,0xA9}
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256     | {0xCC,0xAA}
]]></artwork>
      <t>The cipher suites that follow are Standards Track ephemeral pre-shared
  key cipher suites that are available in TLS 1.2.</t>
      <t>RFC EDITOR: The previous paragraph is for document reviewers and is not
meant for the registry.</t>
      <artwork><![CDATA[
Cipher Suite Name                             | Value
----------------------------------------------+------------
TLS_DHE_PSK_WITH_AES_128_GCM_SHA256           | {0x00,0xAA}
TLS_DHE_PSK_WITH_AES_256_GCM_SHA384           | {0x00,0xAB}
TLS_DHE_PSK_WITH_AES_128_CCM                  | {0xC0,0xA6}
TLS_DHE_PSK_WITH_AES_256_CCM                  | {0xC0,0xA7}
TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256         | {0xD0,0x01}
TLS_ECDHE_PSK_WITH_AES_256_GCM_SHA384         | {0xD0,0x02}
TLS_ECDHE_PSK_WITH_AES_128_CCM_SHA256         | {0xD0,0x05}
TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256   | {0xCC,0xAC}
TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256     | {0xCC,0xAD}
]]></artwork>
      <t>The TLS 1.3 cipher suites specified by <xref target="I-D.ietf-tls-rfc8446bis"/> are
not listed here; that document provides for their "Recommended" status.</t>
      <t>Despite the following behavior being misguided, experience has shown
that some customers use the IANA registry as a checklist against which
to measure an implementation's completeness, and some implementers
blindly implement cipher suites.  Therefore, IANA has added the
following warning to the registry:</t>
      <dl>
        <dt>WARNING:</dt>
        <dd>
          <t>Cryptographic algorithms and parameters will be broken or weakened
over time.  Blindly implementing cipher suites listed here is not
advised.  Implementers and users need to check that the cryptographic
algorithms listed continue to provide the expected level of security.</t>
        </dd>
      </dl>
      <t>IANA has added the following note to ensure that those that focus on
IANA registries are aware that TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/>
uses the same registry but defines ciphers differently:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>Although TLS 1.3 uses the same cipher suite space as previous
versions of TLS, TLS 1.3 cipher suites are defined differently, only
specifying the symmetric ciphers and hash functions, and cannot be
used for TLS 1.2.  Similarly, TLS 1.2 and lower cipher suite values
cannot be used with TLS 1.3.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following notes to document the rules
for populating the "Recommended" column:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>CCM_8 cipher suites are not marked as "Recommended".  These cipher
suites have a significantly truncated authentication tag that represents
a security trade-off that may not be appropriate for general
environments.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>If an item is not marked as "Recommended", it does not necessarily mean
that it is flawed; rather, it indicates that the item either has not
been through the IETF consensus process, has limited applicability, or
is intended only for specific use cases.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following notes for additional
information:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in <xref target="I-D.ietf-tls-rfc8447bis"/>.
The designated expert <xref target="RFC8126"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft (that
is posted and never published as an RFC) or a document from another
standards body, industry consortium, university site, etc.  The expert
may provide more in-depth reviews, but their approval should not be
taken as an endorsement of the cipher suite.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>As specified in <xref target="RFC8126"/>, assignments made in the Private Use
space are not generally useful for broad interoperability.  It is the
responsibility of those making use of the Private Use range to ensure
that no conflicts occur (within the intended scope of use).  For
widespread experiments, temporary reservations are available.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for this registry to
refer to this document instead of <xref target="RFC8447"/>.</t>
    </section>
    <section anchor="tls-supported-groups">
      <name>TLS Supported Groups</name>
      <t>Similar to cipher suites, supported groups have proliferated over time,
and some use the registry to measure implementations.  Therefore, IANA
[<bcp14>SHALL</bcp14> add/has added] a "Recommended" column with a "Y" for secp256r1,
secp384r1, x25519, and x448, while all others are "N".  These "Y"
groups are taken from Standards Track RFCs; <xref target="RFC8422"/> elevates
secp256r1 and secp384r1 to Standards Track.  Not all groups from
<xref target="RFC8422"/>, which is Standards Track, are marked as "Y"; these groups
apply to TLS 1.3 <xref target="I-D.ietf-tls-rfc8446bis"/> and previous versions of
TLS.  The "Recommended" column is assigned a value of "N" unless
explicitly requested, and adding a value with a "Recommended" value of "Y"
requires Standards Action <xref target="RFC8126"/>.  IESG Approval is
<bcp14>REQUIRED</bcp14> for a Y-&gt;N transition.</t>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following notes:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>If an item is not marked as "Recommended" it does not necessarily mean
that it is flawed; rather, it indicates that the item either has not
been through the IETF consensus process, has limited applicability, or
is intended only for specific use cases.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in <xref target="I-D.ietf-tls-rfc8447bis"/>.
The designated expert <xref target="RFC8126"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft (that
is posted and never published as an RFC) or a document from another
standards body, industry consortium, university site, etc.  The expert
may provide more in-depth reviews, but their approval should not be
taken as an endorsement of the supported groups.</t>
        </dd>
      </dl>
      <t>Despite the following behavior being misguided, experience has shown
that some customers use the IANA registry as a checklist against which
to measure an implementation's completeness, and some implementers
blindly implement supported group.  Therefore, IANA has added the
following warning to the registry:</t>
      <dl>
        <dt>WARNING:</dt>
        <dd>
          <t>Cryptographic algorithms and parameters will be broken or weakened
over time.  Blindly implementing supported groups listed here is not
advised.  Implementers and users need to check that the cryptographic
algorithms listed continue to provide the expected level of security.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for this registry to
refer to this document instead of <xref target="RFC8447"/>.</t>
      <t>The value 0 (0x0000) has been marked as reserved.</t>
    </section>
    <section anchor="tls-clientcertificatetype-identifiers">
      <name>TLS ClientCertificateType Identifiers</name>
      <t>Experience has shown that the IETF Consensus registry policy for TLS
ClientCertificateType Identifiers is too strict.  Based on WG
consensus, the decision was taken to change the registration policy to
Specification Required while reserving some of the code
space for Standards Track usage and a small part of the code space
for Private Use <xref target="RFC8126"/>.  Therefore, IANA has updated the TLS
ClientCertificateType Identifiers registry's policy as follows:</t>
      <artwork><![CDATA[
      Values in the range 0-63 are assigned via Standards Action [RFC8126].
      Values 64-223 are assigned via Specification Required [RFC8126].
      Values 224-255 are reserved for Private Use [RFC8126].
]]></artwork>
      <t>See <xref target="expert-pool"/> for additional information about the designated
expert pool.</t>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following notes:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in <xref target="I-D.ietf-tls-rfc8447bis"/>.
The designated expert <xref target="RFC8126"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft
(that is posted and never published as an RFC) or a document from
another standards body, industry consortium, university site, etc.
The expert may provide more in-depth reviews, but their approval
should not be taken as an endorsement of the identifier.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>As specified in <xref target="RFC8126"/>, assignments made in the Private Use
space are not generally useful for broad interoperability.  It is
the responsibility of those making use of the Private Use range to
ensure that no conflicts occur (within the intended scope of use).
For widespread experiments, temporary reservations are available.</t>
        </dd>
      </dl>
    </section>
    <section anchor="new-session-ticket-tls-handshake-message-type">
      <name>New Session Ticket TLS Handshake Message Type</name>
      <t>To align with TLS implementations and to align the naming nomenclature
with other Handshake message types, IANA:</t>
      <ul spacing="normal">
        <li>has renamed entry 4 in the TLS HandshakeType registry to
"new_session_ticket (renamed from NewSessionTicket)" <xref target="RFC5077"/>.</li>
        <li>[<bcp14>SHALL</bcp14> replace/has replaced] a reference to <xref target="RFC8447"/> with a
reference to this document in the "Reference" column for entry 4 in
the TLS HandshakeType registry.</li>
      </ul>
    </section>
    <section anchor="tls-exporter-labels-registry">
      <name>TLS Exporter Labels Registry</name>
      <t>To aid those reviewers who start with the IANA registry, IANA [<bcp14>SHALL</bcp14>
add/has added]:</t>
      <ul spacing="normal">
        <li>
          <t>The following note to the TLS Exporter Labels registry:  </t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t><xref target="RFC5705"/> defines keying material exporters for TLS in terms of
  the TLS PRF.  <xref target="I-D.ietf-tls-rfc8446bis"/> replaced the PRF with HKDF, thus
  requiring a new construction. The exporter interface remains the same;
  however, the value is computed differently.</t>
            </dd>
          </dl>
        </li>
        <li>A "Recommended" column to the TLS Exporter Labels registry.  The table
that follows has been generated by marking Standards Track RFCs as "Y" and
all others as "N".  The "Recommended" column is assigned a value of "N"
unless explicitly requested, and adding a value with a "Recommended" value
of "Y" requires Standards Action <xref target="RFC8126"/>. IESG Approval is <bcp14>REQUIRED</bcp14> for a
Y-&gt;N, Y-&gt;D, or D-&gt;Y|N transitions.</li>
      </ul>
      <table>
        <thead>
          <tr>
            <th align="center">Exporter Value</th>
            <th align="center">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="center">client finished</td>
            <td align="center">Y</td>
          </tr>
          <tr>
            <td align="center">server finished</td>
            <td align="center">Y</td>
          </tr>
          <tr>
            <td align="center">master secret</td>
            <td align="center">Y</td>
          </tr>
          <tr>
            <td align="center">key expansion</td>
            <td align="center">Y</td>
          </tr>
          <tr>
            <td align="center">client EAP encryption</td>
            <td align="center">Y</td>
          </tr>
          <tr>
            <td align="center">ttls keying material</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="center">ttls challenge</td>
            <td align="center">N</td>
          </tr>
          <tr>
            <td align="center">EXTRACTOR-dtls_srtp</td>
            <td align="center">Y</td>
          </tr>
          <tr>
            <td align="center">EXPORTER_DTLS_OVER_SCTP</td>
            <td align="center">Y</td>
          </tr>
          <tr>
            <td align="center">EXPORTER: teap session key seed</td>
            <td align="center">Y</td>
          </tr>
        </tbody>
      </table>
      <t>To provide additional information for the designated experts, IANA
[<bcp14>SHALL</bcp14> add/has added] the following notes:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in <xref target="I-D.ietf-tls-rfc8447bis"/>.
The designated expert <xref target="RFC8126"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft
(that is posted and never published as an RFC) or a document from
another standards body, industry consortium, university site, etc.
The expert may provide more in-depth reviews, but their approval
should not be taken as an endorsement of the exporter label.  The
expert also verifies that the label is a string consisting of
printable ASCII characters beginning with "EXPORTER".  IANA <bcp14>MUST</bcp14>
also verify that one label is not a prefix of any other label.
For example, labels "key" or "master secretary" are forbidden.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>If an item is not marked as "Recommended", it does not
necessarily mean that it is flawed; rather, it indicates that the
item either has not been through the IETF consensus process, has
limited applicability, or is intended only for specific use cases.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for this registry to refer
to refer to this document instead of <xref target="RFC8447"/>.</t>
    </section>
    <section anchor="adding-missing-item-to-tls-alerts-registry">
      <name>Adding Missing Item to TLS Alerts Registry</name>
      <t>IANA has added the following entry to the TLS Alerts registry;
the entry was omitted from the IANA instructions in <xref target="RFC7301"/>:</t>
      <artwork><![CDATA[
    120   no_application_protocol  Y  [RFC7301][This-document]
]]></artwork>
    </section>
    <section anchor="tls-certificate-types">
      <name>TLS Certificate Types</name>
      <t>Experience has shown that the IETF Consensus registry policy for TLS
Certificate Types is too strict.  Based on WG consensus, the decision
was taken to change registration policy to Specification Required
while reserving a small part of the code space for Private Use <xref target="RFC8126"/>.
Therefore, IANA has changed the TLS Certificate Types registry as follows:</t>
      <ul spacing="normal">
        <li>Changed the registry policy to:</li>
      </ul>
      <artwork><![CDATA[
    Values in the range 0-223 (decimal) are assigned via Specification
    Required [RFC8126]. Values in the range 224-255 (decimal) are
    reserved for Private Use [RFC8126].
]]></artwork>
      <ul spacing="normal">
        <li>Added a "Recommended" column to the registry.  X.509 and Raw
Public Key are "Y".  All others are "N".  The "Recommended" column
is assigned a value of "N" unless explicitly requested, and adding
a value with a "Recommended" value of "Y" requires Standards
Action <xref target="RFC8126"/>.  IESG Approval is <bcp14>REQUIRED</bcp14> for
a Y-&gt;N, Y-&gt;D, and D-&gt;Y|N transitions.</li>
      </ul>
      <t>See <xref target="expert-pool"/> for additional information about the designated
expert pool.</t>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following note:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in <xref target="I-D.ietf-tls-rfc8447bis"/>.
The designated expert <xref target="RFC8126"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft
(that is posted and never published as an RFC) or a document from
another standards body, industry consortium, university site, etc.
The expert may provide more in-depth reviews, but their approval
should not be taken as an endorsement of the certificate type.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>If an item is not marked as "Recommended", it does not
necessarily mean that it is flawed; rather, it indicates that the
item either has not been through the IETF consensus process, has
limited applicability, or is intended only for specific use cases.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for this registry to
refer this document instead of <xref target="RFC8447"/>.</t>
    </section>
    <section anchor="orphaned-registries">
      <name>Orphaned Registries</name>
      <t>To make it clear that (D)TLS 1.3 has orphaned certain registries (i.e.,
they are only applicable to version of (D)TLS protocol versions prior
to 1.3), IANA:</t>
      <ul spacing="normal">
        <li>
          <t>has added the following to the TLS Compression Method Identifiers
registry <xref target="RFC3749"/>:  </t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>Value 0 (NULL) is the only value in this registry applicable to (D)TLS
  protocol version 1.3 or later.</t>
            </dd>
          </dl>
        </li>
        <li>
          <t>has added the following to the TLS HashAlgorithm <xref target="RFC5246"/>
and TLS SignatureAlgorithm registries <xref target="RFC5246"/>:  </t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>The values in this registry are only applicable to (D)TLS protocol
  versions prior to 1.3.  (D)TLS 1.3 and later versions' values are
  registered in the TLS SignatureScheme registry.</t>
            </dd>
          </dl>
        </li>
        <li>[<bcp14>SHALL</bcp14> update/has updated] the "Reference" field in the TLS
Compression Method Identifiers, TLS HashAlgorithm and TLS
SignatureAlgorithm registries to refer to this document instead of
<xref target="RFC8447"/>.</li>
        <li>has updated the TLS HashAlgorithm registry to list
values 7 and 9-223 as "Reserved" and the TLS SignatureAlgorithm
registry to list values 4-6 and 9-223 as "Reserved".</li>
        <li>
          <t>has added the following to the TLS ClientCertificateType
Identifiers registry <xref target="RFC5246"/>:  </t>
          <dl>
            <dt>Note:</dt>
            <dd>
              <t>The values in this registry are only applicable to (D)TLS
  protocol versions prior to 1.3.</t>
            </dd>
          </dl>
        </li>
      </ul>
      <t>Despite the fact that the TLS HashAlgorithm and SignatureAlgorithm
registries are orphaned, it is still important to warn implementers
of pre-TLS1.3 implementations about the dangers of blindly
implementing cryptographic algorithms.  Therefore, IANA has added the
following warning to the TLS HashAlgorithm and SignatureAlgorithm
registries:</t>
      <dl>
        <dt>WARNING:</dt>
        <dd>
          <t>Cryptographic algorithms and parameters will be broken or weakened
over time.  Blindly implementing the cryptographic algorithms listed
here is not advised.  Implementers and users need to check that the
cryptographic algorithms listed continue to provide the expected level
of security.</t>
        </dd>
      </dl>
      <t>Though TLS 1.0 and TLS 1.1 were deprecated <xref target="RFC8996"/>, TLS 1.2 will
be in use for some time. IANA [<bcp14>SHALL</bcp14> update/has updated] the TLS
HashAlgorithm, TLS SignatureAlgorithm, and TLS ClientCertificateTypes
registries to add a "Recommended" column as follows:</t>
      <t>TLS HashAlgorithm registry:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Descsription</th>
            <th align="right">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">none</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">md5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">sha1</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">sha224</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">sha256</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">sha384</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">sha512</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">Intrinsic</td>
            <td align="right">Y</td>
          </tr>
        </tbody>
      </table>
      <t>TLS SignatureAlgorithm registry:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Descsription</th>
            <th align="right">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">anonymous</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">rsa</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">dsa</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">ecdsa</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">ed25519</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">ed448</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">gostr34102012_256</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">gostr34102012_512</td>
            <td align="right">N</td>
          </tr>
        </tbody>
      </table>
      <t>TLS ClientCertificateTypes registry:</t>
      <table>
        <thead>
          <tr>
            <th align="left">Descsription</th>
            <th align="right">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">rsa_sign</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">dss_sign</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">rsa_fixed_dh</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">dss_fixed_dh</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">rsa_ephemeral_dh_RESERVED</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">dss_ephemeral_dh_RESERVED</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">fortezza_dms_RESERVED</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">ecdsa_sign</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">rsa_fixed_ecdh</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">ecdsa_fixed_ecdh</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">gost_sign256</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">gost_sign512</td>
            <td align="right">N</td>
          </tr>
        </tbody>
      </table>
      <t>In the TLS HashAlgorithm, TLS SignatureAlgorithm, and TLS
ClientCertificateTypes registries, all unassigned and reserved values
have a "Recommended" that is blank.</t>
    </section>
    <section anchor="Notes">
      <name>Additional Notes</name>
      <t>IANA has added the following warning and note to the TLS
SignatureScheme registry:</t>
      <dl>
        <dt>WARNING:</dt>
        <dd>
          <t>Cryptographic algorithms and parameters will be broken or
weakened over time.  Blindly implementing signature schemes listed
here is not advised.  Implementers and users need to check that
the cryptographic algorithms listed continue to provide the
expected level of security.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>As specified in <xref target="RFC8126"/>, assignments made in the Private Use
space are not generally useful for broad interoperability.  It is
the responsibility of those making use of the Private Use range to
ensure that no conflicts occur (within the intended scope of use).
For widespread experiments, temporary reservations are available.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] added the following notes to the
TLS PskKeyExchangeMode registry:</t>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>If an item is not marked as "Recommended", it does not
necessarily mean that it is flawed; rather, it indicates that the
item either has not been through the IETF consensus process, has
limited applicability, or is intended only for specific use cases.</t>
        </dd>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in <xref target="I-D.ietf-tls-rfc8447bis"/>.
The designated expert <xref target="RFC8126"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft
(that is posted and never published as an RFC) or a document from
another standards body, industry consortium, university site, etc.
The expert may provide more in depth reviews, but their approval
should not be taken as an endorsement of the key exchange mode.</t>
        </dd>
      </dl>
    </section>
    <section anchor="expert-pool">
      <name>Designated Expert Pool</name>
      <t>Specification Required <xref target="RFC8126"/> registry requests are registered
after a three-week review period on the <eref target="mailto:tls-reg-review@ietf.org">tls-reg-review@ietf.org</eref>
mailing list, on the advice of one or more designated experts.
However, to allow for the allocation of values prior to publication,
the designated experts may approve registration once they are
satisfied that such a specification will be published.</t>
      <t>Registration requests sent to the mailing list for review <bcp14>SHOULD</bcp14> use an
appropriate subject (e.g., "Request to register value in TLS bar
registry").</t>
      <t>Within the review period, the designated experts will either approve or
deny the registration request, communicating this decision to the review
list and IANA.  Denials <bcp14>SHOULD</bcp14> include an explanation and, if applicable,
suggestions as to how to make the request successful.  Registration
requests that are undetermined for a period longer than 21 days can be
brought to the IESG's attention (using the <eref target="mailto:iesg@ietf.org">iesg@ietf.org</eref> mailing list)
for resolution.</t>
      <t>Criteria that <bcp14>SHOULD</bcp14> be applied by the designated experts includes
determining whether the proposed registration duplicates existing
functionality, whether it is likely to be of general applicability
or useful only for a single application, and whether the registration
description is clear.</t>
      <t>IANA <bcp14>MUST</bcp14> only accept registry updates from the designated experts and
<bcp14>SHOULD</bcp14> direct all requests for registration to the review mailing list.</t>
      <t>It is suggested that multiple designated experts be appointed who are
able to represent the perspectives of different applications using this
specification, in order to enable broadly informed review of
registration decisions.  In cases where a registration decision could
be perceived as creating a conflict of interest for a particular
Expert, that Expert <bcp14>SHOULD</bcp14> defer to the judgment of the other Experts.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The change to Specification Required from IETF Review lowers the amount
of review provided by the WG for cipher suites and supported groups.
This change reflects reality in that the WG essentially provided no
cryptographic review of the cipher suites or supported groups.  This
was especially true of national cipher suites.</t>
      <t>Recommended algorithms are regarded as secure for general use at the
time of registration; however, cryptographic algorithms and parameters
will be broken or weakened over time.  It is possible that the
"Recommended" status in the registry lags behind the most recent advances
in cryptanalysis.  Implementers and users need to check that the
cryptographic algorithms listed continue to provide the expected level
of security.</t>
      <t>Designated experts ensure the specification is publicly available.  They may
provide more in-depth reviews.  Their review should not be taken as an
endorsement of the cipher suite, extension, supported group, etc.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document is entirely about changes to TLS-related IANA registries.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Mozilla</organization>
            </author>
            <date day="7" month="March" year="2022"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-04"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8447bis">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Salesforce</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="7" month="July" year="2022"/>
            <abstract>
              <t>   This document describes a number of changes to TLS and DTLS IANA
   registries that range from adding notes to the registry all the way
   to changing the registration policy.  These changes were mostly
   motivated by WG review of the TLS- and DTLS-related registries
   undertaken as part of the TLS 1.3 development process.

   This document obsoletes RFC 8447 and updates the following RFCs:
   3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-01"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7301">
          <front>
            <title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
            <author fullname="S. Friedl" initials="S." surname="Friedl">
              <organization/>
            </author>
            <author fullname="A. Popov" initials="A." surname="Popov">
              <organization/>
            </author>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <author fullname="E. Stephan" initials="E." surname="Stephan">
              <organization/>
            </author>
            <date month="July" year="2014"/>
            <abstract>
              <t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7301"/>
          <seriesInfo name="DOI" value="10.17487/RFC7301"/>
        </reference>
        <reference anchor="RFC6520">
          <front>
            <title>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Heartbeat Extension</title>
            <author fullname="R. Seggelmann" initials="R." surname="Seggelmann">
              <organization/>
            </author>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen">
              <organization/>
            </author>
            <author fullname="M. Williams" initials="M." surname="Williams">
              <organization/>
            </author>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes the Heartbeat Extension for the Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) protocols.</t>
              <t>The Heartbeat Extension provides a new protocol for TLS/DTLS allowing the usage of keep-alive functionality without performing a renegotiation and a basis for path MTU (PMTU) discovery for DTLS.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6520"/>
          <seriesInfo name="DOI" value="10.17487/RFC6520"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton">
              <organization/>
            </author>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <author fullname="T. Narten" initials="T." surname="Narten">
              <organization/>
            </author>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC4680">
          <front>
            <title>TLS Handshake Message for Supplemental Data</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <date month="October" year="2006"/>
            <abstract>
              <t>This specification defines a TLS handshake message for exchange of supplemental application data.  TLS hello message extensions are used to determine which supplemental data types are supported by both the TLS client and the TLS server.  Then, the supplemental data handshake message is used to exchange the data.  Other documents will define the syntax of these extensions and the syntax of the associated supplemental data types.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4680"/>
          <seriesInfo name="DOI" value="10.17487/RFC4680"/>
        </reference>
        <reference anchor="RFC5878">
          <front>
            <title>Transport Layer Security (TLS) Authorization Extensions</title>
            <author fullname="M. Brown" initials="M." surname="Brown">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="May" year="2010"/>
            <abstract>
              <t>This document specifies authorization extensions to the Transport Layer Security (TLS) Handshake Protocol.  Extensions are carried in the client and server hello messages to confirm that both parties support the desired authorization data types.  Then, if supported by both the client and the server, authorization information, such as attribute certificates (ACs) or Security Assertion Markup Language (SAML)  assertions, is exchanged in the supplemental data handshake message. This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5878"/>
          <seriesInfo name="DOI" value="10.17487/RFC5878"/>
        </reference>
        <reference anchor="RFC5077">
          <front>
            <title>Transport Layer Security (TLS) Session Resumption without Server-Side State</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="H. Zhou" initials="H." surname="Zhou">
              <organization/>
            </author>
            <author fullname="P. Eronen" initials="P." surname="Eronen">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document describes a mechanism that enables the Transport Layer Security (TLS) server to resume sessions and avoid keeping per-client session state.  The TLS server encapsulates the session state into a ticket and forwards it to the client.  The client can subsequently resume a session using the obtained ticket.  This document obsoletes RFC 4507.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5077"/>
          <seriesInfo name="DOI" value="10.17487/RFC5077"/>
        </reference>
        <reference anchor="I-D.ietf-tls-deprecate-obsolete-kex">
          <front>
            <title>Deprecating Obsolete Key Exchange Methods in TLS</title>
            <author fullname="Carrick" initials="C." surname="Carrick">
              <organization>Apple, Inc.</organization>
            </author>
            <author fullname="Nimrod Aviram" initials="N." surname="Aviram">
         </author>
            <date day="15" month="June" year="2022"/>
            <abstract>
              <t>   This document makes several prescriptions regarding the following key
   exchange methods in TLS, most of which have been superseded by better
   options:

1. This document deprecates the use of RSA key exchange in TLS.

2. It limits the use of Diffie Hellman key exchange over a finite field to avoid
known vulnerabilities and improper security properties.

3. It discourages the use of static elliptic curve Diffie Hellman cipher suites.


              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-deprecate-obsolete-kex-00"/>
        </reference>
        <reference anchor="RFC5705">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="March" year="2010"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes.  This document describes a general mechanism for allowing that.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
        <reference anchor="RFC3749">
          <front>
            <title>Transport Layer Security Protocol Compression Methods</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <date month="May" year="2004"/>
            <abstract>
              <t>The Transport Layer Security (TLS) protocol (RFC 2246) includes features to negotiate selection of a lossless data compression method as part of the TLS Handshake Protocol and to then apply the algorithm associated with the selected method as part of the TLS Record Protocol.  TLS defines one standard compression method which specifies that data exchanged via the record protocol will not be compressed.  This document describes an additional compression method associated with a lossless data compression algorithm for use with TLS, and it describes a method for the specification of additional TLS compression methods.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3749"/>
          <seriesInfo name="DOI" value="10.17487/RFC3749"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC8996">
          <front>
            <title>Deprecating TLS 1.0 and TLS 1.1</title>
            <author fullname="K. Moriarty" initials="K." surname="Moriarty">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <date month="March" year="2021"/>
            <abstract>
              <t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance. </t>
              <t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
              <t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="8996"/>
          <seriesInfo name="DOI" value="10.17487/RFC8996"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC8447">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy.  These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC6961">
          <front>
            <title>The Transport Layer Security (TLS) Multiple Certificate Status Request Extension</title>
            <author fullname="Y. Pettersen" initials="Y." surname="Pettersen">
              <organization/>
            </author>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document defines the Transport Layer Security (TLS) Certificate Status Version 2 Extension to allow clients to specify and support several certificate status methods.  (The use of the Certificate Status extension is commonly referred to as "OCSP stapling".)  Also defined is a new method based on the Online Certificate Status Protocol (OCSP) that servers can use to provide status information about not only the server's own certificate but also the status of intermediate certificates in the chain.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6961"/>
          <seriesInfo name="DOI" value="10.17487/RFC6961"/>
        </reference>
        <reference anchor="RFC8422">
          <front>
            <title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir">
              <organization/>
            </author>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <author fullname="M. Pegourie-Gonnard" initials="M." surname="Pegourie-Gonnard">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol.  In particular, it specifies the use of Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement in a TLS handshake and the use of the Elliptic Curve Digital Signature Algorithm (ECDSA) and Edwards-curve Digital Signature Algorithm (EdDSA) as authentication mechanisms.</t>
              <t>This document obsoletes RFC 4492.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8422"/>
          <seriesInfo name="DOI" value="10.17487/RFC8422"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
