<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.5.21 -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-salowey-tls-rfc8447bis-01" category="std" consensus="true" obsoletes="8447" updates="3749, 5077, 4680, 5246, 5705, 5878, 6520, 7301" tocInclude="true" sortRefs="true" symRefs="true" submissionType="IETF" xml:lang="en" version="3">
  <!-- xml2rfc v2v3 conversion 3.11.1 -->
  <front>
    <title abbrev="(D)TLS IANA Registry Updates">IANA Registry Updates for TLS and DTLS</title>
    <seriesInfo name="Internet-Draft" value="draft-salowey-tls-rfc8447bis-01"/>
    <author initials="J." surname="Salowey" fullname="Joe Salowey">
      <organization>Salesforce</organization>
      <address>
        <email>joe@salowey.net</email>
      </address>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <date/>
    <area>Security</area>
    <workgroup>TLS WG</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document describes a number of changes to TLS and DTLS IANA registries
that range from adding notes to the registry all the way to changing
the registration policy.  These changes were mostly motivated by WG
review of the TLS- and DTLS-related registries undertaken as part of the
TLS 1.3 development process.</t>
      <t>This document obsoletes RFC8447 and updates the following RFCs:
3749, 5077, 4680, 5246, 5705, 5878, 6520, 7301.</t>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="default">
      <name>Introduction</name>
      <t>This document instructs IANA to make changes to a number of the IANA
registries related to Transport
Layer Security (TLS) and Datagram Transport Layer Security (DTLS).
These changes were almost entirely motivated by the
development of TLS 1.3 <xref target="I-D.ietf-tls-tls13" format="default"/>.</t>
      <t>The changes introduced by this document range from simple, e.g., adding
notes, to complex, e.g., changing a registry's registration policy.
Instead of listing the changes and their rationale here in the
introduction, each section provides rationale for the proposed
change(s).</t>
      <t>This document proposes no changes to the registration policies for TLS
Alerts <xref target="RFC8446" format="default"/>, TLS ContentType <xref target="RFC8446" format="default"/>,
TLS HandshakeType <xref target="RFC8446" format="default"/>, and TLS Certificate Status
Types <xref target="RFC6961" format="default"/> registries; the existing policies (Standards Action
for the first three; IETF Review for the last), are appropriate for
these one-byte code points because of their scarcity.</t>
    </section>
    <section anchor="terminology" numbered="true" toc="default">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119" format="default"/> <xref target="RFC8174" format="default"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="adding-tls-to-registry-names" numbered="true" toc="default">
      <name>Adding "TLS" to Registry Names</name>
      <t>For consistency amongst TLS registries, IANA
[<bcp14>SHALL</bcp14> prepend/has prepended] "TLS" to the following registries:</t>
      <ul spacing="normal">
        <li>Application-Layer Protocol Negotiation (ALPN) Protocol IDs <xref target="RFC7301" format="default"/>,</li>
        <li>ExtensionType Values,</li>
        <li>Heartbeat Message Types <xref target="RFC6520" format="default"/>, and</li>
        <li>Heartbeat Modes <xref target="RFC6520" format="default"/>.</li>
      </ul>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for these four registries
to also refer to this document.  The remainder of this document will
use the registry names with the "TLS" prefix.</t>
    </section>
    <section anchor="aligning-with-rfc-8126" numbered="true" toc="default">
      <name>Aligning with RFC 8126</name>
      <t>Many of the TLS-related IANA registries had the registration procedure
"IETF Consensus", which was changed to "IETF Review" by <xref target="RFC8126" format="default"/>.
To align with the new terminology,
IANA [<bcp14>SHALL</bcp14> update/has updated] the following registries to "IETF
Review":</t>
      <ul spacing="normal">
        <li>TLS Authorization Data Formats <xref target="RFC4680" format="default"/></li>
        <li>TLS Supplemental Data Formats (SupplementalDataType) <xref target="RFC5878" format="default"/></li>
      </ul>
      <t>This is not a universal change, as some registries originally defined
with "IETF Consensus" are undergoing other changes either as a result
of this document or <xref target="RFC8422" format="default"/>.</t>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for these two registries
to also refer to this document.</t>
    </section>
    <section anchor="adding-recommended-column" numbered="true" toc="default">
      <name>Adding "Recommended" Column</name>
      <t>The instructions in this document update the Recommended column,
originally added in <xref target="RFC8447" format="default"/> to add a third value, "D",
indicating that a value is "Discouraged". The permitted values
are:</t>
      <ul spacing="normal">
        <li>Y: Indicates that the IETF has consensus that the
  item is <bcp14>RECOMMENDED</bcp14>. This only means that the associated
  mechanism is fit for the purpose for which it was defined.
  Careful reading of the documentation for the mechanism is
  necessary to understand the applicability of that mechanism.
  The IETF could recommend mechanisms that have limited
  applicability, but will provide applicability statements that
  describe any limitations of the mechanism or necessary constraints
  on its use.</li>
        <li>N: Indicates that the item has not been evaluated by
  the IETF and that the IETF has made no statement about the
  suitability of the associated mechanism. This does not necessarily
  mean that the mechanism is flawed, only that no consensus exists.
  The IETF might have consensus to leave an items marked as "N" on
  the basis of it having limited applicability or usage constraints.</li>
        <li>D: Indicates that the item is discouraged and <bcp14>SHOULD
  NOT</bcp14> or <bcp14>MUST NOT</bcp14> be used. This marking could be used to identify
  mechanisms that might result in problems if they are used, such as
  a weak cryptographic algorithm or a mechanism that might cause
  interoperability problems in deployment.</li>
      </ul>
      <t>Setting the Recommended item to "Y" or "D" or changing a
item whose current value is "Y" or "D" requires standards action.
Not all items defined in standards track documents need to be
marked as Recommended. Changing the Recommended status of a standards
track item requires standards action.</t>
      <t>[Note: the registries in the rest of the document will need to have the recommended column updated
appropriately, specifically to deprecate MD5 and SHA-1, etc.]</t>
    </section>
    <section anchor="session-ticket-tls-extension" numbered="true" toc="default">
      <name>Session Ticket TLS Extension</name>
      <t>The nomenclature for the registry entries in the TLS ExtensionType
Values registry correspond to the presentation language field name
except for entry 35.  To ensure that the values in the registry are
consistently identified in the registry, IANA:</t>
      <ul spacing="normal">
        <li>[<bcp14>SHALL</bcp14> rename/has renamed] entry 35 to "session_ticket (renamed from
"SessionTicket TLS")" <xref target="RFC5077" format="default"/>.</li>
        <li>[<bcp14>SHALL</bcp14> add/has added] a reference to this document in the "Reference"
column for entry 35.</li>
      </ul>
    </section>
    <section anchor="tls-extensiontype-values" numbered="true" toc="default">
      <name>TLS ExtensionType Values</name>
      <t>Experience has shown that the IETF Review registry policy for TLS
extensions was too strict.  Based on WG consensus, the decision was
taken to change the registration policy to Specification Required
<xref target="RFC8126" format="default"/> while reserving a small part of the code space for
private use.  Therefore, IANA [<bcp14>SHALL</bcp14> update/has
updated] the TLS ExtensionType Values registry as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Changed the registry policy to:  </t>
          <t>
Values with the first byte in the range 0-254 (decimal) are assigned
  via Specification Required <xref target="RFC8126" format="default"/>.  Values with the first byte
  255 (decimal) are reserved for Private Use <xref target="RFC8126" format="default"/>.</t>
        </li>
        <li>Updated the "Reference" to also refer to this document.</li>
      </ul>
      <t>See <xref target="expert-pool" format="default"/> for additional information about the designated
expert pool.</t>
      <t>Despite wanting to "loosen" the registration policies for TLS
extensions, it is still useful to indicate in the IANA registry which
extensions the WG recommends be supported.  Therefore, IANA [<bcp14>SHALL</bcp14>
update/has updated] the TLS ExtensionType Values registry as follows:</t>
      <ul spacing="normal">
        <li>Add a "Recommended" column with the contents as listed below.  This
table has been generated by marking Standards Track RFCs as "Y" and
all others as "N". The "Recommended" column is assigned a
value of "N" unless explicitly requested, and adding a value with
a "Recommended" value of "Y" requires Standards Action <xref target="RFC8126" format="default"/>.
IESG Approval is <bcp14>REQUIRED</bcp14> for a Y-&gt;N transition.</li>
      </ul>
      <table align="center">
        <thead>
          <tr>
            <th align="left">Extension</th>
            <th align="right">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">server_name</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">max_fragment_length</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">client_certificate_url</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">trusted_ca_keys</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">truncated_hmac</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">status_request</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">user_mapping</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">client_authz</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">server_authz</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">cert_type</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">supported_groups</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">ec_point_formats</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">srp</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">signature_algorithms</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">use_srtp</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">heartbeat</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">application_layer_protocol_negotiation</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">status_request_v2</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">signed_certificate_timestamp</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">client_certificate_type</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">server_certificate_type</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">padding</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">encrypt_then_mac</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">extended_master_secret</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">cached_info</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">session_ticket</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">renegotiation_info</td>
            <td align="right">Y</td>
          </tr>
        </tbody>
      </table>
      <t>IANA [<bcp14>SHALL</bcp14> update/has added] the following notes:</t>
      <dl>
        <dt>
Note:  </dt>
        <dd>
          <t>The role of the designated expert is described in <xref target="RFC8447" format="default"/>
The designated expert <xref target="RFC8126" format="default"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft (that is posted and never
published as an RFC) or a document from another standards body, industry
consortium, university site, etc.  The expert may provide
more in-depth reviews, but their approval should not be taken as an
endorsement of the extension.</t>
        </dd>
        <dt>
Note:  </dt>
        <dd>
          <t>As specified in <xref target="RFC8126" format="default"/>, assignments made in the Private Use
space are not generally useful for broad interoperability.  It is
the responsibility of those making use of the Private Use range to
ensure that no conflicts occur (within the intended scope of use).
For widespread experiments, temporary reservations are available.</t>
        </dd>
        <dt>
Note:  </dt>
        <dd>
          <t>If an item is not marked as "Recommended", it does not necessarily mean
that it is flawed; rather, it indicates that the item either has not
been through the IETF consensus process, has limited applicability, or
is intended only for specific use cases.</t>
        </dd>
      </dl>
      <t>The extensions added by <xref target="RFC8446" format="default"/> are omitted from the above table;
additionally, token_binding is omitted, since
<xref target="I-D.ietf-tokbind-negotiation" format="default"/> specifies the value of the "Recommended" column
as for this extension.</t>
      <t><xref target="RFC8446" format="default"/> also uses the TLS ExtensionType Values registry originally
created in <xref target="RFC4366" format="default"/>. The following text is from <xref target="RFC8446" format="default"/> and is included
here to ensure alignment between these specifications.</t>
      <ul spacing="normal">
        <li>IANA [<bcp14>SHALL</bcp14> update/has updated] this registry to include the
"key_share", "pre_shared_key", "psk_key_exchange_modes",
"early_data", "cookie", "supported_versions",
"certificate_authorities", "oid_filters", "post_handshake_auth",
and "signature_algorithms_cert", extensions with the values
defined in <xref target="RFC8446" format="default"/> and the "Recommended" value of "Y".</li>
        <li>IANA [<bcp14>SHALL</bcp14> update/has updated] this registry to include a "TLS
1.3" column that lists the messages in which the extension may
appear.  This column [<bcp14>SHALL</bcp14> be/has been] initially populated from
the table in Section 4.2 of <xref target="RFC8446" format="default"/> with any
extension not listed there marked as "-" to indicate that it is not
used by TLS 1.3.</li>
      </ul>
    </section>
    <section anchor="tls-cipher-suites-registry" numbered="true" toc="default">
      <name>TLS Cipher Suites Registry</name>
      <t>Experience has shown that the IETF Consensus registry policy for TLS
Cipher Suites was too strict.  Based on WG consensus, the decision was
taken to change the TLS Cipher Suites registry's registration policy
to Specification Required <xref target="RFC8126" format="default"/> while reserving a small part of
the code space for experimental and private use.  Therefore, IANA
[<bcp14>SHALL</bcp14> update/has updated] the TLS Cipher Suites registry's policy as
follows:</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
Values with the first byte in the range 0-254 (decimal) are
assigned via Specification Required {{RFC8126}} .  Values with the
first byte 255 (decimal) are reserved for Private Use {{RFC8126}} .
]]></artwork>
      <t>See <xref target="expert-pool" format="default"/> for additional information about the designated
expert pool.</t>
      <t>The TLS Cipher Suites registry has grown significantly and will continue to
do so.  To better guide those not intimately involved in TLS, IANA
[shall update/has updated] the TLS Cipher Suites registry as follows:</t>
      <t>[The following text needs to be update to reflect the new recommended policy]</t>
      <ul spacing="normal">
        <li>
          <t>Added a "Recommended" column to the TLS Cipher Suites registry.  The
cipher suites that follow in the two tables are marked as "Y". 
All other cipher suites are marked as "N".  The "Recommended"
column is assigned a value of "N" unless explicitly requested, and
adding a value with a "Recommended" value of "Y" requires
Standards Action <xref target="RFC8126" format="default"/>.  IESG Approval is <bcp14>REQUIRED</bcp14> for a Y-&gt;N
transition.  </t>
          <t>
The cipher suites that follow are Standards Track server-authenticated
(and optionally client-authenticated) cipher suites that are
currently available in TLS 1.2.</t>
        </li>
      </ul>
      <t>RFC EDITOR: The previous paragraph is for document reviewers and is not
meant for the registry.</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
Cipher Suite Name                             | Value
----------------------------------------------+------------
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256           | {0x00,0x9E}
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384           | {0x00,0x9F}
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256       | {0xC0,0x2B}
TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384       | {0xC0,0x2C}
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256         | {0xC0,0x2F}
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384         | {0xC0,0x30}
TLS_DHE_RSA_WITH_AES_128_CCM                  | {0xC0,0x9E}
TLS_DHE_RSA_WITH_AES_256_CCM                  | {0xC0,0x9F}
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256   | {0xCC,0xA8}
TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 | {0xCC,0xA9}
TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256     | {0xCC,0xAA}
]]></artwork>
      <t>The cipher suites that follow are Standards Track ephemeral pre-shared
  key cipher suites that are available in TLS 1.2.</t>
      <t>RFC EDITOR: The previous paragraph is for document reviewers and is not
meant for the registry.</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
Cipher Suite Name                             | Value
----------------------------------------------+------------
TLS_DHE_PSK_WITH_AES_128_GCM_SHA256           | {0x00,0xAA}
TLS_DHE_PSK_WITH_AES_256_GCM_SHA384           | {0x00,0xAB}
TLS_DHE_PSK_WITH_AES_128_CCM                  | {0xC0,0xA6}
TLS_DHE_PSK_WITH_AES_256_CCM                  | {0xC0,0xA7}
TLS_ECDHE_PSK_WITH_AES_128_GCM_SHA256         | {0xD0,0x01}
TLS_ECDHE_PSK_WITH_AES_256_GCM_SHA384         | {0xD0,0x02}
TLS_ECDHE_PSK_WITH_AES_128_CCM_SHA256         | {0xD0,0x05}
TLS_ECDHE_PSK_WITH_CHACHA20_POLY1305_SHA256   | {0xCC,0xAC}
TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256     | {0xCC,0xAD}
]]></artwork>
      <t>The TLS 1.3 cipher suites specified by <xref target="RFC8446" format="default"/> are not listed here;         <br/>
   that document provides for their "Recommended" status.</t>
      <t>Despite the following behavior being misguided, experience has shown
that some customers use the IANA registry as a checklist against which
to measure an implementation's completeness, and some implementers
blindly implement cipher suites.  Therefore, IANA [<bcp14>SHALL</bcp14> add/has added]
the following warning to the registry:</t>
      <dl>
        <dt>
WARNING:  </dt>
        <dd>
          <t>Cryptographic algorithms and parameters will be broken or weakened
over time.  Blindly implementing cipher suites listed here is not
advised.  Implementers and users need to check that the cryptographic
algorithms listed continue to provide the expected level of security.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following note to ensure that those that
focus on IANA registries are aware that TLS 1.3 <xref target="RFC8446" format="default"/>
uses the same registry but defines ciphers differently:</t>
      <dl>
        <dt>
Note:  </dt>
        <dd>
          <t>Although TLS 1.3 uses the same cipher suite space as previous
versions of TLS, TLS 1.3 cipher suites are defined differently, only
specifying the symmetric ciphers and hash functions, and cannot be used for TLS 1.2.
Similarly, TLS 1.2 and lower cipher suite values cannot be used with
TLS 1.3.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following notes to document the rules
for populating the "Recommended" column:</t>
      <dl>
        <dt>
Note:  </dt>
        <dd>
          <t>CCM_8 cipher suites are not marked as "Recommended".  These cipher
suites have a significantly truncated authentication tag that represents
a security trade-off that may not be appropriate for general
environments.</t>
        </dd>
        <dt>
Note:  </dt>
        <dd>
          <t>If an item is not marked as "Recommended", it does not necessarily mean
that it is flawed; rather, it indicates that the item either has not
been through the IETF consensus process, has limited applicability, or
is intended only for specific use cases.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following notes for additional
information:</t>
      <dl>
        <dt>
Note:  </dt>
        <dd>
          <t>The role of the designated expert is described in [this-RFC].
The designated expert <xref target="RFC8126" format="default"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft (that is posted and never
published as an RFC) or a document from another standards body, industry
consortium, university site, etc.  The expert may provide
more in-depth reviews, but their approval should not be taken as an
endorsement of the cipher suite.</t>
        </dd>
        <dt>
Note:  </dt>
        <dd>
          <t>As specified in <xref target="RFC8126" format="default"/>, assignments made in the Private Use
space are not generally useful for broad interoperability.  It is the
responsibility of those making use of the Private Use range to ensure
that no conflicts occur (within the intended scope of use).  For
widespread experiments, temporary reservations are available.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for this registry to
also refer to this document.</t>
    </section>
    <section anchor="tls-supported-groups" numbered="true" toc="default">
      <name>TLS Supported Groups</name>
      <t>Similar to cipher suites, supported groups have proliferated over time,
and some use the registry to measure implementations.  Therefore, IANA
[<bcp14>SHALL</bcp14> add/has added] a "Recommended" column with a "Y" for secp256r1,
secp384r1, x25519, and x448, while all others are "N".  These "Y"
groups are taken from Standards Track RFCs; <xref target="RFC8422" format="default"/>
elevates secp256r1 and secp384r1 to Standards Track.  Not all groups from
<xref target="RFC8422" format="default"/>, which is Standards Track, are marked as
"Y"; these groups apply to TLS 1.3 <xref target="RFC8446" format="default"/> and
previous versions of TLS.  The "Recommended" column is assigned a value of "N"
unless explicitly requested, and adding a value with a "Recommended" value of "Y"
requires Standards Action <xref target="RFC8126" format="default"/>.  IESG Approval is
<bcp14>REQUIRED</bcp14> for a Y-&gt;N transition.</t>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following notes:</t>
      <dl>
        <dt>
Note:  </dt>
        <dd>
          <t>If an item is not marked as "Recommended" it does not necessarily mean
that it is flawed; rather, it indicates that the item either has not
been through the IETF consensus process, has limited applicability, or
is intended only for specific use cases.</t>
        </dd>
        <dt>
Note:  </dt>
        <dd>
          <t>The role of the designated expert is described in <xref target="RFC8447" format="default"/> .
The designated expert <xref target="RFC8126" format="default"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft (that is posted and never
published as an RFC) or a document from another standards body, industry
consortium, university site, etc.  The expert may provide
more in-depth reviews, but their approval should not be taken as an
endorsement of the supported groups.</t>
        </dd>
      </dl>
      <t>Despite the following behavior being misguided, experience has shown
that some customers use the IANA registry as a checklist against which
to measure an implementation's completeness, and some implementers
blindly implement supported group.  Therefore, IANA
[<bcp14>SHALL</bcp14> add/has added] the following warning to the registry:</t>
      <dl>
        <dt>
WARNING:  </dt>
        <dd>
          <t>Cryptographic algorithms and parameters will be broken or weakened
over time.  Blindly implementing supported groups listed here is not
advised.  Implementers and users need to check that the cryptographic
algorithms listed continue to provide the expected level of security.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for this registry to also
refer to this document.</t>
      <t>The value 0 (0x0000) has been marked as reserved.</t>
    </section>
    <section anchor="tls-clientcertificatetype-identifiers" numbered="true" toc="default">
      <name>TLS ClientCertificateType Identifiers</name>
      <t>Experience has shown that the IETF Consensus registry policy for TLS
ClientCertificateType Identifiers is too strict.   Based on WG
consensus, the decision was taken to change the registration policy to
Specification Required <xref target="RFC8126" format="default"/> while reserving some of the code
   space for Standards Track usage and a small part of the code space
   for private use.  Therefore, IANA has updated the TLS
   ClientCertificateType Identifiers registry's policy as follows:</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
      Values in the range 0-63 are assigned via Standards Action.
      Values 64-223 are assigned via Specification Required [RFC8126].
      Values 224-255 are reserved for Private Use.
]]></artwork>
      <t>See <xref target="expert-pool" format="default"/> for additional information about the designated
expert pool.</t>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following notes:</t>
      <dl>
        <dt>
Note:  </dt>
        <dd>
          <t>The role of the designated expert is described in [this-RFC].
The designated expert <xref target="RFC8126" format="default"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft
(that is posted and never published as an RFC) or a document from
 another standards body, industry consortium, university site, etc.
 The expert may provide more in-depth reviews, but their approval
 should not be taken as an endorsement of the identifier.</t>
        </dd>
        <dt>
Note:  </dt>
        <dd>
          <t>As specified in <xref target="RFC8126" format="default"/>, assignments made in the Private Use
space are not generally useful for broad interoperability.  It is
the responsibility of those making use of the Private Use range to
ensure that no conflicts occur (within the intended scope of use).
For widespread experiments, temporary reservations are available.</t>
        </dd>
      </dl>
    </section>
    <section anchor="new-session-ticket-tls-handshake-message-type" numbered="true" toc="default">
      <name>New Session Ticket TLS Handshake Message Type</name>
      <t>To align with TLS implementations and to align the naming nomenclature
with other Handshake message types, IANA:</t>
      <ul spacing="normal">
        <li>[<bcp14>SHALL</bcp14> rename/has renamed] entry 4 in the TLS HandshakeType registry
to "new_session_ticket (renamed from NewSessionTicket)" <xref target="RFC5077" format="default"/>.</li>
        <li>[<bcp14>SHALL</bcp14> add/has added] a reference to this document in the "Reference"
column for entry 4 in the TLS HandshakeType registry.</li>
      </ul>
    </section>
    <section anchor="tls-exporter-labels-registry" numbered="true" toc="default">
      <name>TLS Exporter Labels Registry</name>
      <t>To aid those reviewers who start with the IANA registry, IANA [<bcp14>SHALL</bcp14>
add/has added]:</t>
      <ul spacing="normal">
        <li>The following note to the TLS Exporter Labels registry:</li>
      </ul>
      <dl>
        <dt>
Note:  </dt>
        <dd>
          <t><xref target="RFC5705" format="default"/> defines keying material exporters for TLS in terms of
the TLS PRF.  <xref target="RFC8446" format="default"/> replaced the PRF with HKDF, thus
requiring a new construction. The exporter interface remains the same;
however, the value is computed differently.</t>
        </dd>
      </dl>
      <ul spacing="normal">
        <li>A "Recommended" column to the TLS Exporter Labels registry.  The
table that follows has been generated by marking Standards Track
RFCs as "Y" and all others as "N".  The "Recommended" column is
assigned a value of "N" unless explicitly requested, and adding a
value with a "Recommended" value of "Y" requires Standards Action <xref target="RFC8126" format="default"/>.  IESG Approval is
<bcp14>REQUIRED</bcp14> for a Y-&gt;N transition.</li>
      </ul>
      <artwork name="" type="" align="left" alt=""><![CDATA[
Exporter Value                  | Recommended |
--------------------------------|-------------|
client finished                 |         Y |
server finished                 |         Y |
master secret                   |         Y |
key expansion                   |         Y |
client EAP encryption           |         Y |
ttls keying material            |         N |
ttls challenge                  |         N |
EXTRACTOR-dtls_srtp             |         Y |
EXPORTER_DTLS_OVER_SCTP         |         Y |
EXPORTER: teap session key seed |         Y |
]]></artwork>
      <t>To provide additional information for the designated experts, IANA
[<bcp14>SHALL</bcp14> add/has added] the following notes:</t>
      <dl>
        <dt>
Note:  </dt>
        <dd>
          <t>The role of the designated expert is described in <xref target="RFC8447" format="default"/> .
The designated expert <xref target="RFC8126" format="default"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft
(that is posted and never published as an RFC) or a document from
another standards body, industry consortium, university site, etc.
The expert may provide more in-depth reviews, but their approval
should not be taken as an endorsement of the exporter label.  The
expert also verifies that the label is a string consisting of
printable ASCII characters beginning with "EXPORTER".  IANA <bcp14>MUST</bcp14>
also verify that one label is not a prefix of any other label.
For example, labels "key" or "master secretary" are forbidden.</t>
        </dd>
        <dt>
Note:  </dt>
        <dd>
          <t>If an item is not marked as "Recommended", it does not
    necessarily mean that it is flawed; rather, it indicates that the
    item either has not been through the IETF consensus process, has
    limited applicability, or is intended only for specific use cases.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for this registry to also
refer to this document.</t>
    </section>
    <section anchor="adding-missing-item-to-tls-alerts-registry" numbered="true" toc="default">
      <name>Adding Missing Item to TLS Alerts Registry</name>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following entry to the TLS Alerts
registry; the entry was omitted from the IANA instructions in
<xref target="RFC7301" format="default"/>:</t>
      <artwork name="" type="" align="left" alt=""><![CDATA[
120   no_application_protocol  Y  [RFC7301][RFC8447]
]]></artwork>
    </section>
    <section anchor="tls-certificate-types" numbered="true" toc="default">
      <name>TLS Certificate Types</name>
      <t>Experience has shown that the IETF Consensus registry policy for TLS
Certificate Types is too strict.  Based on WG consensus, the decision
was taken to change registration policy to Specification Required
<xref target="RFC8126" format="default"/> while reserving a small part of the code space for
private use.  Therefore, IANA [<bcp14>SHALL</bcp14> change/has
changed] the TLS Certificate Types registry as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Changed the registry policy to:  </t>
          <t>
Values in the range 0-223 (decimal) are assigned via Specification
  Required  <xref target="RFC8126" format="default"/>. Values in the range 224-255 (decimal) are
  reserved for Private Use <xref target="RFC8126" format="default"/>.</t>
        </li>
        <li>Added a "Recommended" column to the registry.  X.509 and Raw
    Public Key are "Y".  All others are "N".  The "Recommended" column
    is assigned a value of "N" unless explicitly requested, and adding
    a value with a "Recommended" value of "Y" requires Standards
    Action <xref target="RFC8126" format="default"/>.  IESG Approval is <bcp14>REQUIRED</bcp14> for
    a Y-&gt;N transition.</li>
      </ul>
      <t>See <xref target="expert-pool" format="default"/> for additional information about the designated
expert pool.</t>
      <t>IANA [<bcp14>SHALL</bcp14> add/has added] the following note:</t>
      <dl>
        <dt>
Note:  </dt>
        <dd>
          <t>The role of the designated expert is described in [this-RFC].
The designated expert <xref target="RFC8126" format="default"/> ensures that the specification is
publicly available.  It is sufficient to have an Internet-Draft
    (that is posted and never published as an RFC) or a document from
    another standards body, industry consortium, university site, etc.
    The expert may provide more in-depth reviews, but their approval
    should not be taken as an endorsement of the certificate type.</t>
        </dd>
        <dt>
Note:  </dt>
        <dd>
          <t>If an item is not marked as "Recommended", it does not
    necessarily mean that it is flawed; rather, it indicates that the
    item either has not been through the IETF consensus process, has
    limited applicability, or is intended only for specific use cases.</t>
        </dd>
      </dl>
      <t>IANA [<bcp14>SHALL</bcp14> update/has updated] the reference for this registry to also
refer this document.</t>
    </section>
    <section anchor="orphaned-registries" numbered="true" toc="default">
      <name>Orphaned Registries</name>
      <t>To make it clear that (D)TLS 1.3 has orphaned certain registries (i.e.,
they are only applicable to version of (D)TLS protocol versions prior
to 1.3), IANA:</t>
      <ul spacing="normal">
        <li>[<bcp14>SHALL</bcp14> add/has added] the following to the TLS Compression Method
Identifiers registry <xref target="RFC3749" format="default"/>:</li>
      </ul>
      <dl>
        <dt>
Note:  </dt>
        <dd>
          <t>Value 0 (NULL) is the only value in this registry applicable to (D)TLS
protocol version 1.3 or later.</t>
        </dd>
      </dl>
      <ul spacing="normal">
        <li>[<bcp14>SHALL</bcp14> add/has added] the following to the TLS HashAlgorithm
<xref target="RFC5246" format="default"/> and TLS SignatureAlgorithm registries <xref target="RFC5246" format="default"/>:</li>
      </ul>
      <dl>
        <dt>
Note:  </dt>
        <dd>
          <t>The values in this registry are only applicable to (D)TLS protocol
versions prior to 1.3.  (D)TLS 1.3 and later versions' values are
registered in the TLS SignatureScheme registry.</t>
        </dd>
      </dl>
      <ul spacing="normal">
        <li>[<bcp14>SHALL</bcp14> update/has updated] the "Reference" field in the TLS
Compression Method Identifiers, TLS HashAlgorithm and TLS
SignatureAlgorithm registries to also refer to this document.</li>
        <li>[<bcp14>SHALL</bcp14> update/has updated] the TLS HashAlgorithm registry to list
values 7 and 9-223 as "Reserved" and the TLS SignatureAlgorithm
registry to list values 4-6 and 9-223 as "Reserved".</li>
        <li>has added the following to the TLS ClientCertificateType
    Identifiers registry <xref target="RFC5246" format="default"/>:</li>
      </ul>
      <t>Note: The values in this registry are only applicable to (D)TLS
      protocol versions prior to 1.3.</t>
      <t>Despite the fact that the TLS HashAlgorithm and SignatureAlgorithm
   registries are orphaned, it is still important to warn implementers
   of pre-TLS1.3 implementations about the dangers of blindly
   implementing cryptographic algorithms.  Therefore, IANA has added the
   following warning to the TLS HashAlgorithm and SignatureAlgorithm
   registries:</t>
      <dl>
        <dt>
WARNING:  </dt>
        <dd>
          <t>Cryptographic algorithms and parameters will be broken or weakened
over time.  Blindly implementing the cryptographic algorithms listed
here is not advised.  Implementers and users need to check that the
cryptographic algorithms listed continue to provide the expected level
of security.</t>
        </dd>
      </dl>
    </section>
    <section anchor="Notes" numbered="true" toc="default">
      <name>Additional Notes</name>
      <t>IANA has added the following warning and note to the TLS
   SignatureScheme registry:</t>
      <dl>
        <dt>
WARNING:  </dt>
        <dd>
          <t>Cryptographic algorithms and parameters will be broken or
   weakened over time.  Blindly implementing signature schemes listed
   here is not advised.  Implementers and users need to check that
   the cryptographic algorithms listed continue to provide the
   expected level of security.</t>
        </dd>
        <dt>
Note:  </dt>
        <dd>
          <t>As specified in <xref target="RFC8126" format="default"/>, assignments made in the Private Use
   space are not generally useful for broad interoperability.  It is
   the responsibility of those making use of the Private Use range to
   ensure that no conflicts occur (within the intended scope of use).
   For widespread experiments, temporary reservations are available.</t>
        </dd>
      </dl>
      <t>IANA has added the following notes to the TLS PskKeyExchangeMode
   registry:</t>
      <dl>
        <dt>
Note:  </dt>
        <dd>
          <t>If an item is not marked as "Recommended", it does not
   necessarily mean that it is flawed; rather, it indicates that the
   item either has not been through the IETF consensus process, has
   limited applicability, or is intended only for specific use cases.</t>
        </dd>
        <dt>
Note:  </dt>
        <dd>
          <t>The role of the designated expert is described in RFC 8447.
   The designated expert <xref target="RFC8126" format="default"/> ensures that the specification is
   publicly available.  It is sufficient to have an Internet-Draft
   (that is posted and never published as an RFC) or a document from
   another standards body, industry consortium, university site, etc.
   The expert may provide more in depth reviews, but their approval
   should not be taken as an endorsement of the key exchange mode.</t>
        </dd>
      </dl>
    </section>
    <section anchor="expert-pool" numbered="true" toc="default">
      <name>Designated Expert Pool</name>
      <t>Specification Required <xref target="RFC8126" format="default"/> registry requests are registered
after a three-week review period on the <eref target="mailto:tls-reg-review@ietf.org">tls-reg-review@ietf.org</eref>
mailing list, on the advice of one or more designated experts.
However, to allow for the allocation of values prior to publication,
the designated experts may approve registration once they are
satisfied that such a specification will be published.</t>
      <t>Registration requests sent to the mailing list for review <bcp14>SHOULD</bcp14> use an
appropriate subject (e.g., "Request to register value in TLS bar
registry").</t>
      <t>Within the review period, the designated experts will either approve or
deny the registration request, communicating this decision to the review
list and IANA.  Denials <bcp14>SHOULD</bcp14> include an explanation and, if applicable,
suggestions as to how to make the request successful.  Registration
requests that are undetermined for a period longer than 21 days can be
brought to the IESG's attention (using the <eref target="mailto:iesg@ietf.org">iesg@ietf.org</eref> mailing list)
for resolution.</t>
      <t>Criteria that <bcp14>SHOULD</bcp14> be applied by the designated experts includes
determining whether the proposed registration duplicates existing
functionality, whether it is likely to be of general applicability
or useful only for a single application, and whether the registration
description is clear.</t>
      <t>IANA <bcp14>MUST</bcp14> only accept registry updates from the designated experts and
<bcp14>SHOULD</bcp14> direct all requests for registration to the review mailing list.</t>
      <t>It is suggested that multiple designated experts be appointed who are
able to represent the perspectives of different applications using this
specification, in order to enable broadly informed review of
registration decisions.  In cases where a registration decision could
be perceived as creating a conflict of interest for a particular
Expert, that Expert <bcp14>SHOULD</bcp14> defer to the judgment of the other Experts.</t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="default">
      <name>Security Considerations</name>
      <t>The change to Specification Required from IETF Review lowers the amount
of review provided by the WG for cipher suites and supported groups.
This change reflects reality in that the WG essentially provided no
cryptographic review of the cipher suites or supported groups.  This
was especially true of national cipher suites.</t>
      <t>Recommended algorithms are regarded as secure for general use at the
time of registration; however, cryptographic algorithms and parameters
will be broken or weakened over time.  It is possible that the
"Recommended" status in the registry lags behind the most recent advances
in cryptanalysis.  Implementers and users need to check that the
cryptographic algorithms listed continue to provide the expected level
of security.</t>
      <t>Designated experts ensure the specification is publicly available.  They may
provide more in-depth reviews.  Their review should not be taken as an
endorsement of the cipher suite, extension, supported group, etc.</t>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="default">
      <name>IANA Considerations</name>
      <t>This document is entirely about changes to TLS-related IANA registries.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="I-D.ietf-tls-tls13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla">
              <organization>RTFM, Inc.</organization>
            </author>
            <date day="20" month="March" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.

 This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-tls13-28"/>
        </reference>
        <reference anchor="RFC8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC7301">
          <front>
            <title>Transport Layer Security (TLS) Application-Layer Protocol Negotiation Extension</title>
            <author fullname="S. Friedl" initials="S." surname="Friedl">
              <organization/>
            </author>
            <author fullname="A. Popov" initials="A." surname="Popov">
              <organization/>
            </author>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <author fullname="E. Stephan" initials="E." surname="Stephan">
              <organization/>
            </author>
            <date month="July" year="2014"/>
            <abstract>
              <t>This document describes a Transport Layer Security (TLS) extension for application-layer protocol negotiation within the TLS handshake. For instances in which multiple application protocols are supported on the same TCP or UDP port, this extension allows the application layer to negotiate which protocol will be used within the TLS connection.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7301"/>
          <seriesInfo name="DOI" value="10.17487/RFC7301"/>
        </reference>
        <reference anchor="RFC6520">
          <front>
            <title>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) Heartbeat Extension</title>
            <author fullname="R. Seggelmann" initials="R." surname="Seggelmann">
              <organization/>
            </author>
            <author fullname="M. Tuexen" initials="M." surname="Tuexen">
              <organization/>
            </author>
            <author fullname="M. Williams" initials="M." surname="Williams">
              <organization/>
            </author>
            <date month="February" year="2012"/>
            <abstract>
              <t>This document describes the Heartbeat Extension for the Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) protocols.</t>
              <t>The Heartbeat Extension provides a new protocol for TLS/DTLS allowing the usage of keep-alive functionality without performing a renegotiation and a basis for path MTU (PMTU) discovery for DTLS.   [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6520"/>
          <seriesInfo name="DOI" value="10.17487/RFC6520"/>
        </reference>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton">
              <organization/>
            </author>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <author fullname="T. Narten" initials="T." surname="Narten">
              <organization/>
            </author>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC4680">
          <front>
            <title>TLS Handshake Message for Supplemental Data</title>
            <author fullname="S. Santesson" initials="S." surname="Santesson">
              <organization/>
            </author>
            <date month="October" year="2006"/>
            <abstract>
              <t>This specification defines a TLS handshake message for exchange of supplemental application data.  TLS hello message extensions are used to determine which supplemental data types are supported by both the TLS client and the TLS server.  Then, the supplemental data handshake message is used to exchange the data.  Other documents will define the syntax of these extensions and the syntax of the associated supplemental data types.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4680"/>
          <seriesInfo name="DOI" value="10.17487/RFC4680"/>
        </reference>
        <reference anchor="RFC5878">
          <front>
            <title>Transport Layer Security (TLS) Authorization Extensions</title>
            <author fullname="M. Brown" initials="M." surname="Brown">
              <organization/>
            </author>
            <author fullname="R. Housley" initials="R." surname="Housley">
              <organization/>
            </author>
            <date month="May" year="2010"/>
            <abstract>
              <t>This document specifies authorization extensions to the Transport Layer Security (TLS) Handshake Protocol.  Extensions are carried in the client and server hello messages to confirm that both parties support the desired authorization data types.  Then, if supported by both the client and the server, authorization information, such as attribute certificates (ACs) or Security Assertion Markup Language (SAML)  assertions, is exchanged in the supplemental data handshake message. This document defines an Experimental Protocol for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5878"/>
          <seriesInfo name="DOI" value="10.17487/RFC5878"/>
        </reference>
        <reference anchor="RFC8447">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="S. Turner" initials="S." surname="Turner">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy.  These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC5077">
          <front>
            <title>Transport Layer Security (TLS) Session Resumption without Server-Side State</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="H. Zhou" initials="H." surname="Zhou">
              <organization/>
            </author>
            <author fullname="P. Eronen" initials="P." surname="Eronen">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <date month="January" year="2008"/>
            <abstract>
              <t>This document describes a mechanism that enables the Transport Layer Security (TLS) server to resume sessions and avoid keeping per-client session state.  The TLS server encapsulates the session state into a ticket and forwards it to the client.  The client can subsequently resume a session using the obtained ticket.  This document obsoletes RFC 4507.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5077"/>
          <seriesInfo name="DOI" value="10.17487/RFC5077"/>
        </reference>
        <reference anchor="RFC5705">
          <front>
            <title>Keying Material Exporters for Transport Layer Security (TLS)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="March" year="2010"/>
            <abstract>
              <t>A number of protocols wish to leverage Transport Layer Security (TLS) to perform key establishment but then use some of the keying material for their own purposes.  This document describes a general mechanism for allowing that.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5705"/>
          <seriesInfo name="DOI" value="10.17487/RFC5705"/>
        </reference>
        <reference anchor="RFC3749">
          <front>
            <title>Transport Layer Security Protocol Compression Methods</title>
            <author fullname="S. Hollenbeck" initials="S." surname="Hollenbeck">
              <organization/>
            </author>
            <date month="May" year="2004"/>
            <abstract>
              <t>The Transport Layer Security (TLS) protocol (RFC 2246) includes features to negotiate selection of a lossless data compression method as part of the TLS Handshake Protocol and to then apply the algorithm associated with the selected method as part of the TLS Record Protocol.  TLS defines one standard compression method which specifies that data exchanged via the record protocol will not be compressed.  This document describes an additional compression method associated with a lossless data compression algorithm for use with TLS, and it describes a method for the specification of additional TLS compression methods.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="3749"/>
          <seriesInfo name="DOI" value="10.17487/RFC3749"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="RFC6961">
          <front>
            <title>The Transport Layer Security (TLS) Multiple Certificate Status Request Extension</title>
            <author fullname="Y. Pettersen" initials="Y." surname="Pettersen">
              <organization/>
            </author>
            <date month="June" year="2013"/>
            <abstract>
              <t>This document defines the Transport Layer Security (TLS) Certificate Status Version 2 Extension to allow clients to specify and support several certificate status methods.  (The use of the Certificate Status extension is commonly referred to as "OCSP stapling".)  Also defined is a new method based on the Online Certificate Status Protocol (OCSP) that servers can use to provide status information about not only the server's own certificate but also the status of intermediate certificates in the chain.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6961"/>
          <seriesInfo name="DOI" value="10.17487/RFC6961"/>
        </reference>
        <reference anchor="RFC8422">
          <front>
            <title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir">
              <organization/>
            </author>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <author fullname="M. Pegourie-Gonnard" initials="M." surname="Pegourie-Gonnard">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol.  In particular, it specifies the use of Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement in a TLS handshake and the use of the Elliptic Curve Digital Signature Algorithm (ECDSA) and Edwards-curve Digital Signature Algorithm (EdDSA) as authentication mechanisms.</t>
              <t>This document obsoletes RFC 4492.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8422"/>
          <seriesInfo name="DOI" value="10.17487/RFC8422"/>
        </reference>
        <reference anchor="I-D.ietf-tokbind-negotiation">
          <front>
            <title>Transport Layer Security (TLS) Extension for Token Binding Protocol Negotiation</title>
            <author fullname="Andrei Popov">
              <organization>Microsoft Corp.</organization>
            </author>
            <author fullname="Magnus Nyström">
              <organization>Microsoft Corp.</organization>
            </author>
            <author fullname="Dirk Balfanz">
              <organization>Google Inc.</organization>
            </author>
            <author fullname="Adam Langley">
              <organization>Google Inc.</organization>
            </author>
            <date day="23" month="May" year="2018"/>
            <abstract>
              <t>This document specifies a Transport Layer Security (TLS) extension for the negotiation of Token Binding protocol version and key parameters.  Negotiation of Token Binding in TLS 1.3 and later versions is beyond the scope of this document.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tokbind-negotiation-14"/>
        </reference>
        <reference anchor="RFC4366">
          <front>
            <title>Transport Layer Security (TLS) Extensions</title>
            <author fullname="S. Blake-Wilson" initials="S." surname="Blake-Wilson">
              <organization/>
            </author>
            <author fullname="M. Nystrom" initials="M." surname="Nystrom">
              <organization/>
            </author>
            <author fullname="D. Hopwood" initials="D." surname="Hopwood">
              <organization/>
            </author>
            <author fullname="J. Mikkelsen" initials="J." surname="Mikkelsen">
              <organization/>
            </author>
            <author fullname="T. Wright" initials="T." surname="Wright">
              <organization/>
            </author>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document describes extensions that may be used to add functionality to Transport Layer Security (TLS).  It provides both generic extension mechanisms for the TLS handshake client and server hellos, and specific extensions using these generic mechanisms.</t>
              <t>The extensions may be used by TLS clients and servers.  The extensions are backwards compatible: communication is possible between TLS clients that support the extensions and TLS servers that do not support the extensions, and vice versa.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4366"/>
          <seriesInfo name="DOI" value="10.17487/RFC4366"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
