<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.27 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-tls12-frozen-07" category="std" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.0 -->
  <front>
    <title abbrev="tls1.2-frozen">TLS 1.2 is in Feature Freeze</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-tls12-frozen-07"/>
    <author fullname="Rich Salz">
      <organization>Akamai Technologies</organization>
      <address>
        <email>rsalz@akamai.com</email>
      </address>
    </author>
    <author fullname="Nimrod Aviram">
      <organization/>
      <address>
        <email>nimrod.aviram@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="March" day="26"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>TLS</keyword>
    <keyword>features</keyword>
    <abstract>
      <?line 70?>

<t>Use of TLS 1.3, which  fixes some known deficiencies in TLS 1.2, is growing.
This document specifies that outside of
urgent security fixes, new TLS Exporter Labels, or new
Application-Layer Protocol Negotiation (ALPN) Protocol IDs,
no changes will be approved for TLS 1.2.
This prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-tls12-frozen/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/tls12-frozen"/>.</t>
    </note>
  </front>
  <middle>
    <?line 80?>

<section anchor="sec-reasons">
      <name>Introduction</name>
      <t>Use of TLS 1.3 <xref target="TLS13"/> is growing, and it
fixes most known deficiencies with TLS 1.2 <xref target="TLS12"/>.
Examples of this include
encrypting more of the traffic so that it is not readable by outsiders and
removing most cryptographic primitives now considered weak. Importantly, TLS
1.3 enjoys robust security proofs.</t>
      <t>Both versions have several extension points. Items like new cryptographic
algorithms, new supported groups (formerly "named curves"),  etc., can be
added without defining a new protocol. This document specifies that outside of
urgent security fixes, and the exceptions listed in <xref target="iana"/>,
no changes will be approved for TLS 1.2.
This prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
    </section>
    <section anchor="implications-for-post-quantum-cryptography">
      <name>Implications for post-quantum cryptography</name>
      <t>Cryptographically relevant quantum computers, once available, are likely to
greatly lessen the time and effort needed to break
RSA, FFDH, or ECC which are currently used in TLS.
In 2016, the US National Institute of Standards and Technology started a
multi-year effort to standardize algorithms that will be "safe"
once quantum computers are feasible <xref target="PQC"/>. First discussions in
the IETF community happened
around the same time <xref target="CFRGSLIDES"/>.</t>
      <t>In 2024 NIST released standards for <xref target="ML-KEM"/>, <xref target="ML-DSA"/>, and <xref target="SLH-DSA"/>.
Many other countries and organizations are publishing their roadmaps,
including the multi-national standards organization ETSI, <xref target="ETSI"/>.</t>
      <t>While industry was waiting for NIST to finish standardization, the
IETF has had several efforts underway.
A working group was formed in early 2023 to work on use of PQC in IETF protocols,
<xref target="PQUIPWG"/>.
Several other working groups, including TLS <xref target="TLSWG"/>,
are working on
drafts to support hybrid algorithms and identifiers, for use during a
transition from classic to a post-quantum world.</t>
      <t>For TLS it is important to note that the focus of efforts within the TLS Working Group
is exclusively TLS 1.3 or later.
Put bluntly, post-quantum cryptography for
TLS 1.2 WILL NOT be supported (see <xref target="iana"/>) at any time and anyone wishing
to deploy post-quantum cryptography should expect to be using TLS 1.3.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This entire document is about security, and provides post-quantum concerns
as an additional reason to upgrade to TLS 1.3.</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>No TLS registries <xref target="TLS13REG"/> are being closed by this document.
Rather, this document modifies the instructions to IANA and the TLS
Designed Experts to constrain what type of entries can be added.</t>
      <t>There are no limits on the registrations for either of
the following two registries:</t>
      <ul spacing="normal">
        <li>
          <t>TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs</t>
        </li>
        <li>
          <t>TLS Exporter Labels</t>
        </li>
      </ul>
      <dl>
        <dt>All other registries should have this Note added to them:</dt>
        <dd>
          <t>Any TLS entry added
after the IESG approves publication of {THIS RFC} is intended for TLS 1.3 or
later, and makes no requirement on DTLS.
Such entries should have an informal indication
like "For TLS 1.3 or later" in that entry, such as the
"Comment" column.</t>
        </dd>
      </dl>
      <t>At the time of publication, the list of other registries is as follows:</t>
      <ul spacing="normal">
        <li>
          <t>TLS Alerts</t>
        </li>
        <li>
          <t>TLS Authorization Data Formats</t>
        </li>
        <li>
          <t>TLS CachedInformationType Values</t>
        </li>
        <li>
          <t>TLS Certificate Compression Algorithm IDs</t>
        </li>
        <li>
          <t>TLS Certificate Status Types</t>
        </li>
        <li>
          <t>TLS Certificate Types</t>
        </li>
        <li>
          <t>TLS Cipher Suites</t>
        </li>
        <li>
          <t>TLS ClientCertificateType Identifiers</t>
        </li>
        <li>
          <t>TLS ContentType</t>
        </li>
        <li>
          <t>TLS EC Curve Types</t>
        </li>
        <li>
          <t>TLS EC Point Formats</t>
        </li>
        <li>
          <t>TLS ExtensionType Values</t>
        </li>
        <li>
          <t>TLS HandshakeType</t>
        </li>
        <li>
          <t>TLS HashAlgorithm</t>
        </li>
        <li>
          <t>TLS Heartbeat Message Types</t>
        </li>
        <li>
          <t>TLS Heartbeat Modes</t>
        </li>
        <li>
          <t>TLS KDF Identifiers</t>
        </li>
        <li>
          <t>TLS PskKeyExchangeMode</t>
        </li>
        <li>
          <t>TLS SignatureAlgorithm</t>
        </li>
        <li>
          <t>TLS SignatureScheme</t>
        </li>
        <li>
          <t>TLS Supplemental Data Formats (SupplementalDataType)</t>
        </li>
        <li>
          <t>TLS Supported Groups</t>
        </li>
        <li>
          <t>TLS UserMappingType Values</t>
        </li>
      </ul>
      <t>Any registries created after this document is approved for publication
should indicate whether the actions defined here are applicable.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="TLS12">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="17" month="February" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-12"/>
        </reference>
        <reference anchor="TLS13REG">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="11" month="March" year="2025"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   Recommended column of the selected TLS registries and adds a
   "Comments" column to all active registries.

   This document updates the following RFCs: 3749, 5077, 4680, 5246,
   5705, 5878, 6520, 7301, and 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-11"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="ML-KEM" target="https://csrc.nist.gov/pubs/fips/203/final">
          <front>
            <title>Module-Lattice-Based Key-Encapsulation Mechanism Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="ML-DSA" target="https://csrc.nist.gov/pubs/fips/204/final">
          <front>
            <title>Module-Lattice-Based Key Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="SLH-DSA" target="https://csrc.nist.gov/pubs/fips/205/final">
          <front>
            <title>Stateless Hash-Based Key-Digital Signature Standard</title>
            <author>
              <organization/>
            </author>
            <date year="2024" month="August"/>
          </front>
        </reference>
        <reference anchor="PQC" target="https://csrc.nist.gov/projects/post-quantum-cryptography">
          <front>
            <title>Post-Quantum Cryptography</title>
            <author>
              <organization/>
            </author>
            <date year="2017" month="January"/>
          </front>
        </reference>
        <reference anchor="CFRGSLIDES" target="https://www.ietf.org/proceedings/95/slides/slides-95-cfrg-4.pdf">
          <front>
            <title>Post Quantum Secure Cryptography Discussion</title>
            <author initials="D." surname="McGrew" fullname="David McGrew">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PQUIPWG" target="https://datatracker.ietf.org/wg/pquip/about/">
          <front>
            <title>Post-Quantum Use in Protocols</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TLSWG" target="https://datatracker.ietf.org/wg/tls/about/">
          <front>
            <title>Transport Layer Security</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="ETSI" target="https://www.etsi.org/deliver/etsi_tr/103600_103699/103619/01.01.01_60/tr_103619v010101p.pdf">
          <front>
            <title>CYBER; Migration strategies and recommendations to Quantum Safe schemes</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 184?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>We gratefully acknowledge Amanda Baber, David Dong, and Sabrina Tanamal
of IANA for their help in revising and clarifying <xref target="iana"/>.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
