<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-tls12-frozen-06" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.25.0 -->
  <front>
    <title abbrev="tls1.2-frozen">TLS 1.2 is in Feature Freeze</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-tls12-frozen-06"/>
    <author fullname="Rich Salz">
      <organization>Akamai Technologies</organization>
      <address>
        <email>rsalz@akamai.com</email>
      </address>
    </author>
    <author fullname="Nimrod Aviram">
      <organization/>
      <address>
        <email>nimrod.aviram@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="January" day="29"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>TLS</keyword>
    <keyword>features</keyword>
    <abstract>
      <?line 67?>

<t>Use of TLS 1.3 is growing and fixes some known deficiencies in TLS 1.2.
This document specifies that outside of
urgent security fixes, new TLS Exporter Labels, or new
Application-Layer Protocol Negotiation (ALPN) Protocol IDs,
no changes will be approved for TLS 1.2.
This prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-tls12-frozen/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/tls12-frozen"/>.</t>
    </note>
  </front>
  <middle>
    <?line 77?>

<section anchor="sec-reasons">
      <name>Introduction</name>
      <t>Use of TLS 1.3 <xref target="TLS13"/> is growing, and it
fixes most known deficiencies with TLS 1.2 <xref target="TLS12"/>, such as
encrypting more of the traffic so that it is not readable by outsiders and
removing most cryptographic primitives now considered weak. Importantly, TLS
1.3 enjoys robust security proofs.</t>
      <t>Both versions have several extension points, so items like new cryptographic
algorithms, new supported groups (formerly "named curves"),  etc., can be
added without defining a new protocol. This document specifies that outside of
urgent security fixes, and the exceptions listed in <xref target="iana"/>,
no changes will be approved for TLS 1.2.
This prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
    </section>
    <section anchor="implications-for-post-quantum-cryptography">
      <name>Implications for post-quantum cryptography</name>
      <t>Cryptographically relevant quantum computers, once available, will have a
huge impact on RSA, FFDH, and ECC which are currently used in TLS.
In 2016, the US National Institute of Standards and Technology started a
multi-year effort to standardize algorithms that will be "safe"
once quantum computers are feasible <xref target="PQC"/>. First discussions in
the IETF community happened
around the same time <xref target="CFRGSLIDES"/>.</t>
      <t>In 2024 NIST released standards for <xref target="ML-KEM"/>, <xref target="ML-DSA"/>, and <xref target="SLH-DSA"/>.
While industry was waiting for NIST to finish standardization, the
IETF has had several efforts underway.
A working group was formed in early 2023 to work on use of PQC in IETF protocols,
<xref target="PQUIPWG"/>.
Several other working groups, including TLS <xref target="TLSWG"/>,
are working on
drafts to support hybrid algorithms and identifiers, for use during a
transition from classic to a post-quantum world.</t>
      <t>For TLS it is important to note that the focus of these efforts is exclusively
TLS 1.3 or later.
Put bluntly, post-quantum cryptography for
TLS 1.2 WILL NOT be supported (see <xref target="iana"/>) at any time and anyone wishing
to deploy post-quantum cryptography should expect to be using TLS 1.3.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This entire document is about security, and provides post-quantum concerns
as an additional reason to upgrade to TLS 1.3.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>No registries <xref target="TLS13REG"/> are being closed by this document.
Rather, this document modifies the instructions to IANA and the TLS
Designed Experts to constrain what type of entries can be added.</t>
      <t>There are no limits on the registrations for either of
the following two registries:</t>
      <ul spacing="normal">
        <li>
          <t>TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs</t>
        </li>
        <li>
          <t>TLS Exporter Labels</t>
        </li>
      </ul>
      <dl>
        <dt>All other registries should have this Note added to them:</dt>
        <dd>
          <t>Any entry added
after the IESG approves publication of {THIS RFC} is intended for TLS 1.3 or
later, and makes no requirement on DTLS.
Such entries should have an informal indication
indication like "For TLS 1.3 or later" in that entry, such as the
"Comment" column.</t>
        </dd>
      </dl>
      <t>At the time of publication, the list of other registries is as follows:</t>
      <ul spacing="normal">
        <li>
          <t>TLS Alerts</t>
        </li>
        <li>
          <t>TLS Authorization Data Formats</t>
        </li>
        <li>
          <t>TLS CachedInformationType Values</t>
        </li>
        <li>
          <t>TLS Certificate Compression Algorithm IDs</t>
        </li>
        <li>
          <t>TLS Certificate Status Types</t>
        </li>
        <li>
          <t>TLS Certificate Types</t>
        </li>
        <li>
          <t>TLS Cipher Suites</t>
        </li>
        <li>
          <t>TLS ClientCertificateType Identifiers</t>
        </li>
        <li>
          <t>TLS ContentType</t>
        </li>
        <li>
          <t>TLS EC Curve Types</t>
        </li>
        <li>
          <t>TLS EC Point Formats</t>
        </li>
        <li>
          <t>TLS ExtensionType Values</t>
        </li>
        <li>
          <t>TLS HandshakeType</t>
        </li>
        <li>
          <t>TLS HashAlgorithm</t>
        </li>
        <li>
          <t>TLS Heartbeat Message Types</t>
        </li>
        <li>
          <t>TLS Heartbeat Modes</t>
        </li>
        <li>
          <t>TLS KDF Identifiers</t>
        </li>
        <li>
          <t>TLS PskKeyExchangeMode</t>
        </li>
        <li>
          <t>TLS SignatureAlgorithm</t>
        </li>
        <li>
          <t>TLS SignatureScheme</t>
        </li>
        <li>
          <t>TLS Supplemental Data Formats (SupplementalDataType)</t>
        </li>
        <li>
          <t>TLS Supported Groups</t>
        </li>
        <li>
          <t>TLS UserMappingType Values</t>
        </li>
      </ul>
      <t>Any registries created after this document is approved for publication
should indicate whether the actions defined here are applicable.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="TLS12">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="14" month="September" year="2024"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-11"/>
        </reference>
        <reference anchor="TLS13REG">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="3" month="November" year="2024"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   recommended column of the selected TLS registries and adds a
   "Comments" column to all active registries.

   This document updates the following RFCs: 3749, 5077, 4680, 5246,
   5705, 5878, 6520, 7301, and 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-10"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ML-KEM" target="https://csrc.nist.gov/pubs/fips/203/final">
          <front>
            <title>Module-Lattice-Based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="ML-DSA" target="https://csrc.nist.gov/pubs/fips/204/final">
          <front>
            <title>Module-Lattice-Based Key Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="SLH-DSA" target="https://csrc.nist.gov/pubs/fips/205/final">
          <front>
            <title>Stateless Hash-Based Key-Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="PQC" target="https://csrc.nist.gov/projects/post-quantum-cryptography">
          <front>
            <title>Post-Quantum Cryptography</title>
            <author>
              <organization/>
            </author>
            <date year="2017" month="January"/>
          </front>
        </reference>
        <reference anchor="CFRGSLIDES" target="https://www.ietf.org/proceedings/95/slides/slides-95-cfrg-4.pdf">
          <front>
            <title>Post Quantum Secure Cryptography Discussion</title>
            <author initials="D." surname="McGrew" fullname="David McGrew">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PQUIPWG" target="https://datatracker.ietf.org/wg/pquip/about/">
          <front>
            <title>Post-Quantum Use in Protocols</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TLSWG" target="https://datatracker.ietf.org/wg/tls/about/">
          <front>
            <title>Transport Layer Security</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 176?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We gratefully acknowledge Amanda Baber, David Dong, and Sabrina Tanamal
of IANA for their help in revising and clarifying <xref target="iana"/>.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
