rfc8447v1.txt | rfc8447.txt | |||
---|---|---|---|---|
Internet Engineering Task Force (IETF) J. Salowey | Internet Engineering Task Force (IETF) J. Salowey | |||
Request for Comments: 8447 Tableau Software | Request for Comments: 8447 Tableau Software | |||
Updates: 3749, 5077, 4680, 5246, 5705, S. Turner | Updates: 3749, 5077, 4680, 5246, 5705, S. Turner | |||
5878, 6520, 7301 sn3rd | 5878, 6520, 7301 sn3rd | |||
Category: Standards Track August 2018 | Category: Standards Track August 2018 | |||
ISSN: 2070-1721 | ISSN: 2070-1721 | |||
IANA Registry Updates for Transport Layer Security (TLS) | IANA Registry Updates for TLS and DTLS | |||
and Datagram Transport Layer Security (DTLS) | ||||
Abstract | Abstract | |||
This document describes a number of changes to TLS and DTLS IANA | This document describes a number of changes to TLS and DTLS IANA | |||
registries that range from adding notes to the registry all the way | registries that range from adding notes to the registry all the way | |||
to changing the registration policy. These changes were mostly | to changing the registration policy. These changes were mostly | |||
motivated by WG review of the TLS- and DTLS-related registries | motivated by WG review of the TLS- and DTLS-related registries | |||
undertaken as part of the TLS 1.3 development process. | undertaken as part of the TLS 1.3 development process. | |||
This document updates the following RFCs: 3749, 5077, 4680, 5246, | This document updates the following RFCs: 3749, 5077, 4680, 5246, | |||
skipping to change at page 2, line 11 | skipping to change at page 2, line 11 | |||
carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
described in the Simplified BSD License. | described in the Simplified BSD License. | |||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
3. Add "TLS" to Registry Names . . . . . . . . . . . . . . . . . 3 | 3. Adding "TLS" to Registry Names . . . . . . . . . . . . . . . 3 | |||
4. Aligning with RFC 8126 . . . . . . . . . . . . . . . . . . . 3 | 4. Aligning with RFC 8126 . . . . . . . . . . . . . . . . . . . 3 | |||
5. Adding Recommended Column . . . . . . . . . . . . . . . . . . 4 | 5. Adding "Recommended" Column . . . . . . . . . . . . . . . . . 4 | |||
6. Session Ticket TLS Extension . . . . . . . . . . . . . . . . 4 | 6. Session Ticket TLS Extension . . . . . . . . . . . . . . . . 4 | |||
7. TLS ExtensionType Values . . . . . . . . . . . . . . . . . . 4 | 7. TLS ExtensionType Values . . . . . . . . . . . . . . . . . . 4 | |||
8. TLS Cipher Suite Registry . . . . . . . . . . . . . . . . . . 7 | 8. TLS Cipher Suite Registry . . . . . . . . . . . . . . . . . . 7 | |||
9. TLS Supported Groups . . . . . . . . . . . . . . . . . . . . 9 | 9. TLS Supported Groups . . . . . . . . . . . . . . . . . . . . 9 | |||
10. TLS ClientCertificateType Identifiers . . . . . . . . . . . . 10 | 10. TLS ClientCertificateType Identifiers . . . . . . . . . . . . 10 | |||
11. New Session Ticket TLS Handshake Message Type . . . . . . . . 11 | 11. New Session Ticket TLS Handshake Message Type . . . . . . . . 11 | |||
12. TLS Exporter Label Registry . . . . . . . . . . . . . . . . . 12 | 12. TLS Exporter Label Registry . . . . . . . . . . . . . . . . . 12 | |||
13. Add Missing Item to TLS Alert Registry . . . . . . . . . . . 13 | 13. Adding Missing Item to TLS Alert Registry . . . . . . . . . . 13 | |||
14. TLS Certificate Types . . . . . . . . . . . . . . . . . . . . 13 | 14. TLS Certificate Types . . . . . . . . . . . . . . . . . . . . 13 | |||
15. Orphaned Extensions . . . . . . . . . . . . . . . . . . . . . 14 | 15. Orphaned Extensions . . . . . . . . . . . . . . . . . . . . . 14 | |||
16. Orphaned Registries . . . . . . . . . . . . . . . . . . . . . 14 | 16. Orphaned Registries . . . . . . . . . . . . . . . . . . . . . 14 | |||
17. Additional Notes . . . . . . . . . . . . . . . . . . . . . . 15 | 17. Additional Notes . . . . . . . . . . . . . . . . . . . . . . 15 | |||
18. Designated Expert Pool . . . . . . . . . . . . . . . . . . . 16 | 18. Designated Expert Pool . . . . . . . . . . . . . . . . . . . 16 | |||
19. Security Considerations . . . . . . . . . . . . . . . . . . . 17 | 19. Security Considerations . . . . . . . . . . . . . . . . . . . 17 | |||
20. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 17 | 20. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 17 | |||
21. References . . . . . . . . . . . . . . . . . . . . . . . . . 17 | 21. References . . . . . . . . . . . . . . . . . . . . . . . . . 17 | |||
21.1. Normative References . . . . . . . . . . . . . . . . . . 17 | 21.1. Normative References . . . . . . . . . . . . . . . . . . 17 | |||
21.2. Informative References . . . . . . . . . . . . . . . . . 19 | 21.2. Informative References . . . . . . . . . . . . . . . . . 19 | |||
skipping to change at page 3, line 15 | skipping to change at page 3, line 15 | |||
of their scarcity. | of their scarcity. | |||
2. Terminology | 2. Terminology | |||
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | |||
"OPTIONAL" in this document are to be interpreted as described in | "OPTIONAL" in this document are to be interpreted as described in | |||
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all | BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all | |||
capitals, as shown here. | capitals, as shown here. | |||
3. Add "TLS" to Registry Names | 3. Adding "TLS" to Registry Names | |||
For consistency amongst TLS registries, IANA has prepended "TLS" to | For consistency amongst TLS registries, IANA has prepended "TLS" to | |||
the following registries: | the following registries: | |||
o Application-Layer Protocol Negotiation (ALPN) Protocol IDs | o Application-Layer Protocol Negotiation (ALPN) Protocol IDs | |||
[RFC7301], | [RFC7301], | |||
o ExtensionType Values, | o ExtensionType Values, | |||
o Heartbeat Message Types [RFC6520], and | o Heartbeat Message Types [RFC6520], and | |||
skipping to change at page 4, line 5 | skipping to change at page 4, line 5 | |||
o TLS Supplemental Data Formats (SupplementalDataType) [RFC5878] | o TLS Supplemental Data Formats (SupplementalDataType) [RFC5878] | |||
This is not a universal change, as some registries originally defined | This is not a universal change, as some registries originally defined | |||
with "IETF Consensus" are undergoing other changes either as a result | with "IETF Consensus" are undergoing other changes either as a result | |||
of this document or [RFC8422]. | of this document or [RFC8422]. | |||
IANA has updated the reference for these two registries to also refer | IANA has updated the reference for these two registries to also refer | |||
to this document. | to this document. | |||
5. Adding Recommended Column | 5. Adding "Recommended" Column | |||
Per this document, a Recommended column has been added to many of the | Per this document, a "Recommended" column has been added to many of | |||
TLS registries to indicate parameters that are generally recommended | the TLS registries to indicate parameters that are generally | |||
for implementations to support. Adding a Recommended parameter to a | recommended for implementations to support. Adding a "Recommended" | |||
registry or updating a parameter to Recommended status requires | parameter (i.e., "Y") to a registry or updating a parameter to | |||
Standards Action. Not all parameters defined in Standards Track | "Recommended" status requires Standards Action. Not all parameters | |||
documents need to be marked as Recommended. | defined in Standards Track documents need to be marked as | |||
"Recommended". | ||||
If an item is not marked as Recommended, it does not necessarily mean | If an item is not marked as "Recommended" (i.e., "N"), it does not | |||
that it is flawed; rather, it indicates that the item either has not | necessarily mean that it is flawed; rather, it indicates that the | |||
been through the IETF consensus process, has limited applicability, | item either has not been through the IETF consensus process, has | |||
or is intended only for specific use cases. | limited applicability, or is intended only for specific use cases. | |||
6. Session Ticket TLS Extension | 6. Session Ticket TLS Extension | |||
The nomenclature for the registry entries in the TLS ExtensionType | The nomenclature for the registry entries in the TLS ExtensionType | |||
Values registry correspond to the presentation language field name | Values registry correspond to the presentation language field name | |||
except for entry 35. To ensure that the values in the registry are | except for entry 35. To ensure that the values in the registry are | |||
consistently identified in the registry, IANA: | consistently identified in the registry, IANA: | |||
o has renamed entry 35 to "session_ticket" (renamed from | o has renamed entry 35 to "session_ticket" (renamed from | |||
"SessionTicket TLS")" [RFC5077]. | "SessionTicket TLS")" [RFC5077]. | |||
skipping to change at page 5, line 12 | skipping to change at page 5, line 12 | |||
See Section 18 for additional information about the designated expert | See Section 18 for additional information about the designated expert | |||
pool. | pool. | |||
Despite wanting to "loosen" the registration policies for TLS | Despite wanting to "loosen" the registration policies for TLS | |||
extensions, it is still useful to indicate in the IANA registry which | extensions, it is still useful to indicate in the IANA registry which | |||
extensions the WG recommends be supported. Therefore, IANA has | extensions the WG recommends be supported. Therefore, IANA has | |||
updated the TLS ExtensionType Values registry to: | updated the TLS ExtensionType Values registry to: | |||
o Add a "Recommended" column with the contents as listed below. | o Add a "Recommended" column with the contents as listed below. | |||
This table has been generated by marking Standards Track RFCs as | This table has been generated by marking Standards Track RFCs as | |||
"Yes" and all others as "No". Future extensions MUST define the | "Y" and all others as "N". Future extensions MUST define the | |||
value of the Recommended column. In order to register an | value of the "Recommended" column. In order to register an | |||
extension with the value "Yes", a Standards Track document | extension with the value "Y", a document produced through | |||
[RFC8126] is REQUIRED. IESG Approval is REQUIRED for a Yes->No | Standards Action [RFC8126] is REQUIRED. IESG Approval is REQUIRED | |||
transition. | for a Y->N transition. | |||
+----------------------------------------+-------------+ | +----------------------------------------+-------------+ | |||
| Extension | Recommended | | | Extension | Recommended | | |||
+----------------------------------------+-------------+ | +----------------------------------------+-------------+ | |||
| server_name | Yes | | | server_name | Y | | |||
| | | | | | | | |||
| max_fragment_length | Yes | | | max_fragment_length | N | | |||
| | | | | | | | |||
| client_certificate_url | Yes | | | client_certificate_url | Y | | |||
| | | | | | | | |||
| trusted_ca_keys | Yes | | | trusted_ca_keys | Y | | |||
| | | | | | | | |||
| truncated_hmac | Yes | | | truncated_hmac | Y | | |||
| | | | | | | | |||
| status_request | Yes | | | status_request | Y | | |||
| | | | | | | | |||
| user_mapping | Yes | | | user_mapping | Y | | |||
| | | | | | | | |||
| client_authz | No | | | client_authz | N | | |||
| | | | | | | | |||
| server_authz | No | | | server_authz | N | | |||
| | | | | | | | |||
| cert_type | No | | | cert_type | N | | |||
| | | | | | | | |||
| supported_groups | Yes | | | supported_groups | Y | | |||
| | | | | | | | |||
| ec_point_formats | Yes | | | ec_point_formats | Y | | |||
| | | | | | | | |||
| srp | No | | | srp | N | | |||
| | | | | | | | |||
| signature_algorithms | Yes | | | signature_algorithms | Y | | |||
| | | | | | | | |||
| use_srtp | Yes | | | use_srtp | Y | | |||
| | | | | | | | |||
| heartbeat | Yes | | | heartbeat | Y | | |||
| | | | | | | | |||
| application_layer_protocol_negotiation | Yes | | | application_layer_protocol_negotiation | Y | | |||
| | | | | | | | |||
| status_request_v2 | Yes | | | status_request_v2 | Y | | |||
| | | | | | | | |||
| signed_certificate_timestamp | No | | | signed_certificate_timestamp | N | | |||
| | | | | | | | |||
| client_certificate_type | Yes | | | client_certificate_type | Y | | |||
| | | | | | | | |||
| server_certificate_type | Yes | | | server_certificate_type | Y | | |||
| | | | | | | | |||
| padding | Yes | | | padding | Y | | |||
| | | | | | | | |||
| encrypt_then_mac | Yes | | | encrypt_then_mac | Y | | |||
| | | | | | | | |||
| extended_master_secret | Yes | | | extended_master_secret | Y | | |||
| | | | | | | | |||
| cached_info | Yes | | | cached_info | Y | | |||
| | | | | | | | |||
| session_ticket | Yes | | | session_ticket | Y | | |||
| | | | | | | | |||
| renegotiation_info | Yes | | | renegotiation_info | Y | | |||
+----------------------------------------+-------------+ | +----------------------------------------+-------------+ | |||
IANA has added the following notes: | IANA has added the following notes: | |||
Note: The role of the designated expert is described in RFC 8447. | Note: The role of the designated expert is described in RFC 8447. | |||
The designated expert [RFC8126] ensures that the specification is | The designated expert [RFC8126] ensures that the specification is | |||
publicly available. An Internet-Draft that is posted and never | publicly available. It's sufficient to have an Internet-Draft | |||
published or a standard in another standards body, industry | (that is posted and never published as an RFC) or a document from | |||
consortium, university site, etc., suffices. The expert may | another standards body, industry consortium, university site, etc. | |||
provide more in-depth reviews, but their approval should not be | The expert may provide more in-depth reviews, but their approval | |||
taken as an endorsement of the extension. | should not be taken as an endorsement of the extension. | |||
Note: As specified in [RFC8126], assignments made in the Private Use | Note: As specified in [RFC8126], assignments made in the Private Use | |||
space are not generally useful for broad interoperability. It is | space are not generally useful for broad interoperability. It is | |||
the responsibility of those making use of the Private Use range to | the responsibility of those making use of the Private Use range to | |||
ensure that no conflicts occur (within the intended scope of use). | ensure that no conflicts occur (within the intended scope of use). | |||
For widespread experiments, temporary reservations are available. | For widespread experiments, temporary reservations are available. | |||
Note: If an item is not marked as Recommended, it does not | Note: If an item is not marked as "Recommended", it does not | |||
necessarily mean that it is flawed; rather, it indicates that the | necessarily mean that it is flawed; rather, it indicates that the | |||
item either has not been through the IETF consensus process, has | item either has not been through the IETF consensus process, has | |||
limited applicability, or is intended only for specific use cases. | limited applicability, or is intended only for specific use cases. | |||
Note: token_binding is omitted from the above table; [TOKBIND] | Note: token_binding is omitted from the above table; [TOKBIND] | |||
specifies the Recommended column for this extension. | specifies the "Recommended" column for this extension. | |||
Note: The following is from [RFC8446] and is included here to ensure | Note: The following is from [RFC8446] and is included here to ensure | |||
alignment between these specifications. | alignment between these specifications. | |||
[RFC8446] also uses the TLS ExtensionType Values registry originally | [RFC8446] also uses the TLS ExtensionType Values registry originally | |||
created in [RFC4366]. IANA has updated it to reference this | created in [RFC4366]. IANA has updated it to reference this | |||
document. The registry and its allocation policy are listed below: | document. The registry and its allocation policy are listed below: | |||
o IANA has updated this registry to include the "key_share", | o IANA has updated this registry to include the "key_share", | |||
"pre_shared_key", "psk_key_exchange_modes", "early_data", | "pre_shared_key", "psk_key_exchange_modes", "early_data", | |||
"cookie", "supported_versions", "certificate_authorities", | "cookie", "supported_versions", "certificate_authorities", | |||
"oid_filters", "post_handshake_auth", and | "oid_filters", "post_handshake_auth", and | |||
"signature_algorithms_certs" extensions with the values defined in | "signature_algorithms_certs" extensions with the values defined in | |||
this document and the Recommended value of "Yes". | this document and the "Recommended" value of "Y". | |||
o IANA has updated this registry to include a "TLS 1.3" column that | o IANA has updated this registry to include a "TLS 1.3" column that | |||
lists the messages in which the extension may appear. This column | lists the messages in which the extension may appear. This column | |||
has been initially populated from the table in Section 4.2 of | has been initially populated from the table in Section 4.2 of | |||
[RFC8446] with any extension not listed there marked as "-" to | [RFC8446] with any extension not listed there marked as "-" to | |||
indicate that it is not used by TLS 1.3. | indicate that it is not used by TLS 1.3. | |||
8. TLS Cipher Suite Registry | 8. TLS Cipher Suite Registry | |||
Experience has shown that the IETF Consensus registry policy for TLS | Experience has shown that the IETF Consensus registry policy for TLS | |||
skipping to change at page 7, line 46 | skipping to change at page 7, line 46 | |||
first byte 255 (decimal) are reserved for Private Use [RFC8126]. | first byte 255 (decimal) are reserved for Private Use [RFC8126]. | |||
See Section 18 for additional information about the designated expert | See Section 18 for additional information about the designated expert | |||
pool. | pool. | |||
The TLS Cipher Suite registry has grown significantly and will | The TLS Cipher Suite registry has grown significantly and will | |||
continue to do so. To better guide those not intimately involved in | continue to do so. To better guide those not intimately involved in | |||
TLS, IANA has updated the TLS Cipher Suite registry as follows: | TLS, IANA has updated the TLS Cipher Suite registry as follows: | |||
o Add a "Recommended" column to the TLS Cipher Suite registry. The | o Add a "Recommended" column to the TLS Cipher Suite registry. The | |||
cipher suites that follow in the two tables are marked as "Yes". | cipher suites that follow in the two tables are marked as "Y". | |||
All other cipher suites are marked as "No". Future cipher suites | All other cipher suites are marked as "N". Future cipher suites | |||
MUST define the value of the Recommended column. In order to | MUST define the value of the "Recommended" column. In order to | |||
register an extension with the value "Yes", a Standards Track | register an extension with the value "Y", a document produced | |||
document [RFC8126] is REQUIRED. IESG Approval is REQUIRED for a | through Standards Action [RFC8126] is REQUIRED. IESG Approval is | |||
Yes->No transition. | REQUIRED for a Y->N transition. | |||
o The cipher suites that follow are Standards Track server- | o The cipher suites that follow are Standards Track server- | |||
authenticated (and optionally client-authenticated) cipher suites | authenticated (and optionally client-authenticated) cipher suites | |||
that are currently available in TLS 1.2. | that are currently available in TLS 1.2. | |||
Cipher Suite Name | Value | Cipher Suite Name | Value | |||
----------------------------------------------+------------ | ----------------------------------------------+------------ | |||
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 | {0x00,0x9E} | TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 | {0x00,0x9E} | |||
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 | {0x00,0x9F} | TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 | {0x00,0x9F} | |||
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 | {0xC0,0x2B} | TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 | {0xC0,0x2B} | |||
skipping to change at page 9, line 16 | skipping to change at page 9, line 16 | |||
IANA registries are aware that TLS 1.3 [RFC8446] uses the same | IANA registries are aware that TLS 1.3 [RFC8446] uses the same | |||
registry but defines ciphers differently: | registry but defines ciphers differently: | |||
Note: Although TLS 1.3 uses the same cipher suite space as previous | Note: Although TLS 1.3 uses the same cipher suite space as previous | |||
versions of TLS, TLS 1.3 cipher suites are defined differently, | versions of TLS, TLS 1.3 cipher suites are defined differently, | |||
only specifying the symmetric ciphers, and cannot be used for TLS | only specifying the symmetric ciphers, and cannot be used for TLS | |||
1.2. Similarly, TLS 1.2 and lower cipher suite values cannot be | 1.2. Similarly, TLS 1.2 and lower cipher suite values cannot be | |||
used with TLS 1.3. | used with TLS 1.3. | |||
IANA has added the following notes to document the rules for | IANA has added the following notes to document the rules for | |||
populating the Recommended column: | populating the "Recommended" column: | |||
Note: CCM_8 cipher suites are not marked as Recommended. These | Note: CCM_8 cipher suites are not marked as "Recommended". These | |||
cipher suites have a significantly truncated authentication tag | cipher suites have a significantly truncated authentication tag | |||
that represents a security trade-off that may not be appropriate | that represents a security trade-off that may not be appropriate | |||
for general environments. | for general environments. | |||
Note: If an item is not marked as Recommended, it does not | Note: If an item is not marked as "Recommended", it does not | |||
necessarily mean that it is flawed; rather, it indicates that the | necessarily mean that it is flawed; rather, it indicates that the | |||
item either has not been through the IETF consensus process, has | item either has not been through the IETF consensus process, has | |||
limited applicability, or is intended only for specific use cases. | limited applicability, or is intended only for specific use cases. | |||
IANA has added the following notes for additional information: | IANA has added the following notes for additional information: | |||
Note: The role of the designated expert is described in RFC 8447. | Note: The role of the designated expert is described in RFC 8447. | |||
The designated expert [RFC8126] ensures that the specification is | The designated expert [RFC8126] ensures that the specification is | |||
publicly available. An Internet-Draft that is posted and never | publicly available. It's sufficient to have an Internet-Draft | |||
published or a standard in another standards body, industry | (that is posted and never published as an RFC) or a document from | |||
consortium, university site, etc., suffices. The expert may | another standards body, industry consortium, university site, etc. | |||
provide more in-depth reviews, but their approval should not be | The expert may provide more in-depth reviews, but their approval | |||
taken as an endorsement of the cipher suite. | should not be taken as an endorsement of the cipher suite. | |||
Note: As specified in [RFC8126], assignments made in the Private Use | Note: As specified in [RFC8126], assignments made in the Private Use | |||
space are not generally useful for broad interoperability. It is | space are not generally useful for broad interoperability. It is | |||
the responsibility of those making use of the Private Use range to | the responsibility of those making use of the Private Use range to | |||
ensure that no conflicts occur (within the intended scope of use). | ensure that no conflicts occur (within the intended scope of use). | |||
For widespread experiments, temporary reservations are available. | For widespread experiments, temporary reservations are available. | |||
IANA has updated the reference for this registry to also refer to | IANA has updated the reference for this registry to also refer to | |||
this document. | this document. | |||
9. TLS Supported Groups | 9. TLS Supported Groups | |||
Similar to cipher suites, supported groups have proliferated over | Similar to cipher suites, supported groups have proliferated over | |||
time, and some use the registry to measure implementations. | time, and some use the registry to measure implementations. | |||
Therefore, IANA has added a "Recommended" column with a "Yes" for | Therefore, IANA has added a "Recommended" column with a "Y" for | |||
secp256r1, secp384r1, x25519, and x448, while all others are "No". | secp256r1, secp384r1, x25519, and x448, while all others are "N". | |||
These "Yes" groups are taken from Standards Track RFCs; [RFC8422] | These "Y" groups are taken from Standards Track RFCs; [RFC8422] | |||
elevates secp256r1 and secp384r1 to Standards Track. Not all groups | elevates secp256r1 and secp384r1 to Standards Track. Not all groups | |||
from [RFC8422], which is Standards Track, are marked as "Yes"; these | from [RFC8422], which is Standards Track, are marked as "Y"; these | |||
groups apply to TLS 1.3 [RFC8446] and previous versions of TLS. | groups apply to TLS 1.3 [RFC8446] and previous versions of TLS. | |||
Future supported groups MUST define the value of this column. In | Future supported groups MUST define the value of this column. In | |||
order to register an extension with the value "Yes", a Standards | order to register an extension with the value "Y", a document | |||
Track document [RFC8126] is REQUIRED. IESG Approval is REQUIRED for | produced through Standards Action [RFC8126] is REQUIRED. IESG | |||
a Yes->No transition. | Approval is REQUIRED for a Y->N transition. | |||
IANA has added the following note: | IANA has added the following note: | |||
Note: If an item is not marked as Recommended, it does not | Note: If an item is not marked as "Recommended", it does not | |||
necessarily mean that it is flawed; rather, it indicates that the | necessarily mean that it is flawed; rather, it indicates that the | |||
item either has not been through the IETF consensus process, has | item either has not been through the IETF consensus process, has | |||
limited applicability, or is intended only for specific use cases. | limited applicability, or is intended only for specific use cases. | |||
Note: The role of the designated expert is described in RFC 8447. | Note: The role of the designated expert is described in RFC 8447. | |||
The designated expert [RFC8126] ensures that the specification is | The designated expert [RFC8126] ensures that the specification is | |||
publicly available. An Internet-Draft that is posted and never | publicly available. It's sufficient to have an Internet-Draft | |||
published or a standard in another standards body, industry | (that is posted and never published as an RFC) or a document from | |||
consortium, university site, etc., suffices. The expert may | another standards body, industry consortium, university site, etc. | |||
provide more in-depth reviews, but their approval should not be | The expert may provide more in-depth reviews, but their approval | |||
taken as an endorsement of the supported group. | should not be taken as an endorsement of the supported group. | |||
Despite the following behavior being misguided, experience has shown | Despite the following behavior being misguided, experience has shown | |||
that some customers use the IANA registry as a checklist against | that some customers use the IANA registry as a checklist against | |||
which to measure an implementation's completeness, and some | which to measure an implementation's completeness, and some | |||
implementers blindly implement groups supported. Therefore, IANA has | implementers blindly implement groups supported. Therefore, IANA has | |||
added the following warning to the registry: | added the following warning to the registry: | |||
WARNING: Cryptographic algorithms and parameters will be broken or | WARNING: Cryptographic algorithms and parameters will be broken or | |||
weakened over time. Blindly implementing cipher suites listed | weakened over time. Blindly implementing cipher suites listed | |||
here is not advised. Implementers and users need to check that | here is not advised. Implementers and users need to check that | |||
skipping to change at page 11, line 17 | skipping to change at page 11, line 17 | |||
Values in the range 0-223 are assigned via Specification Required | Values in the range 0-223 are assigned via Specification Required | |||
[RFC8126]. Values 224-255 are reserved for Private Use. | [RFC8126]. Values 224-255 are reserved for Private Use. | |||
See Section 18 for additional information about the designated expert | See Section 18 for additional information about the designated expert | |||
pool. | pool. | |||
IANA has added the following notes: | IANA has added the following notes: | |||
Note: The role of the designated expert is described in RFC 8447. | Note: The role of the designated expert is described in RFC 8447. | |||
The designated expert [RFC8126] ensures that the specification is | The designated expert [RFC8126] ensures that the specification is | |||
publicly available. An Internet-Draft that is posted and never | publicly available. It's sufficient to have an Internet-Draft | |||
published or a standard in another standards body, industry | (that is posted and never published as an RFC) or a document from | |||
consortium, university site, etc., suffices. The expert may | another standards body, industry consortium, university site, etc. | |||
provide more in-depth reviews, but their approval should not be | The expert may provide more in-depth reviews, but their approval | |||
taken as an endorsement of the identifier. | should not be taken as an endorsement of the identifier. | |||
Note: As specified in [RFC8126], assignments made in the Private Use | Note: As specified in [RFC8126], assignments made in the Private Use | |||
space are not generally useful for broad interoperability. It is | space are not generally useful for broad interoperability. It is | |||
the responsibility of those making use of the Private Use range to | the responsibility of those making use of the Private Use range to | |||
ensure that no conflicts occur (within the intended scope of use). | ensure that no conflicts occur (within the intended scope of use). | |||
For widespread experiments, temporary reservations are available. | For widespread experiments, temporary reservations are available. | |||
Note: ClientCertificateType Identifiers marked as "Yes" are those | Note: ClientCertificateType Identifiers marked as "Y" are those | |||
allocated via Standards Track RFCs. ClientCertificateTypes marked | allocated via Standards Track RFCs. ClientCertificateTypes marked | |||
as "No" are not. | as "N" are not. | |||
Note: If an item is not marked as Recommended, it does not | Note: If an item is not marked as "Recommended", it does not | |||
necessarily mean that it is flawed; rather, it indicates that | necessarily mean that it is flawed; rather, it indicates that | |||
either the item has not been through the IETF consensus process, | either the item has not been through the IETF consensus process, | |||
has limited applicability, or is intended only for specific use | has limited applicability, or is intended only for specific use | |||
cases. | cases. | |||
11. New Session Ticket TLS Handshake Message Type | 11. New Session Ticket TLS Handshake Message Type | |||
To align with TLS implementations and to align the naming | To align with TLS implementations and to align the naming | |||
nomenclature with other Handshake message types, IANA: | nomenclature with other Handshake message types, IANA: | |||
skipping to change at page 12, line 19 | skipping to change at page 12, line 19 | |||
o The following note to the TLS Exporter Label registry: | o The following note to the TLS Exporter Label registry: | |||
Note: [RFC5705] defines keying material exporters for TLS in terms | Note: [RFC5705] defines keying material exporters for TLS in terms | |||
of the TLS PRF. [RFC8446] replaced the PRF with HKDF, thus | of the TLS PRF. [RFC8446] replaced the PRF with HKDF, thus | |||
requiring a new construction. The exporter interface remains the | requiring a new construction. The exporter interface remains the | |||
same; however, the value is computed differently. | same; however, the value is computed differently. | |||
o A "Recommended" column to the TLS Exporter Label registry. The | o A "Recommended" column to the TLS Exporter Label registry. The | |||
table that follows has been generated by marking Standards Track | table that follows has been generated by marking Standards Track | |||
RFCs as "Yes" and all others as "No". Future exporters MUST | RFCs as "Y" and all others as "N". Future exporters MUST define | |||
define the value of this column. In order to register an | the value of this column. In order to register an extension with | |||
extension with the value "Yes", a Standards Track document | the value "Y", a document produced through Standards Action | |||
[RFC8126] is REQUIRED. IESG Approval is REQUIRED for a Yes->No | [RFC8126] is REQUIRED. IESG Approval is REQUIRED for a Y->N | |||
transition. | transition. | |||
Exporter Value | Recommended | | Exporter Value | Recommended | | |||
--------------------------------|-------------| | --------------------------------|-------------| | |||
client finished | Yes | | client finished | Y | | |||
server finished | Yes | | server finished | Y | | |||
master secret | Yes | | master secret | Y | | |||
key expansion | Yes | | key expansion | Y | | |||
client EAP encryption | Yes | | client EAP encryption | Y | | |||
ttls keying material | No | | ttls keying material | N | | |||
ttls challenge | No | | ttls challenge | N | | |||
EXTRACTOR-dtls_srtp | Yes | | EXTRACTOR-dtls_srtp | Y | | |||
EXPORTER_DTLS_OVER_SCTP | Yes | | EXPORTER_DTLS_OVER_SCTP | Y | | |||
EXPORTER: teap session key seed | Yes | | EXPORTER: teap session key seed | Y | | |||
The following notes provide additional information for the designated | To provide additional information for the designated experts, IANA | |||
experts. | has added the following notes: | |||
Note: The role of the designated expert is described in RFC 8447. | Note: The role of the designated expert is described in RFC 8447. | |||
The designated expert [RFC8126] ensures that the specification is | The designated expert [RFC8126] ensures that the specification is | |||
publicly available. An Internet-Draft that is posted and never | publicly available. It's sufficient to have an Internet-Draft | |||
published or a standard in another standards body, industry | (that is posted and never published as an RFC) or a document from | |||
consortium, university site, etc. suffices. The expert may | another standards body, industry consortium, university site, etc. | |||
provide more in-depth reviews, but their approval should not be | The expert may provide more in-depth reviews, but their approval | |||
taken as an endorsement of the exporter. The expert also verifies | should not be taken as an endorsement of the exporter. The expert | |||
that the label is a string consisting of printable ASCII | also verifies that the label is a string consisting of printable | |||
characters beginning with "EXPORTER". IANA MUST also verify that | ASCII characters beginning with "EXPORTER". IANA MUST also verify | |||
one label is not a prefix of any other label. For example, labels | that one label is not a prefix of any other label. For example, | |||
"key" or "master secretary" are forbidden. | labels "key" or "master secretary" are forbidden. | |||
Note: Exporters Labels marked as "Yes" are those allocated via | ||||
Standards Track RFCs. Exporter Labels marked as "No" are not. | ||||
Note: If an item is not marked as Recommended, it does not | Note: If an item is not marked as "Recommended", it does not | |||
necessarily mean that it is flawed; rather, it indicates that | necessarily mean that it is flawed; rather, it indicates that | |||
either the item has not been through the IETF consensus process, | either the item has not been through the IETF consensus process, | |||
has limited applicability, or is intended only for specific use | has limited applicability, or is intended only for specific use | |||
cases. | cases. | |||
IANA has updated the reference for this registry to also refer to | IANA has updated the reference for this registry to also refer to | |||
this document. | this document. | |||
13. Add Missing Item to TLS Alert Registry | 13. Adding Missing Item to TLS Alert Registry | |||
IANA has added the following entry to the TLS Alert registry; the | IANA has added the following entry to the TLS Alert registry; the | |||
entry was omitted from the IANA instructions in [RFC7301]: | entry was omitted from the IANA instructions in [RFC7301]: | |||
120 no_application_protocol Y [RFC7301] RFC 8447 | 120 no_application_protocol Y [RFC7301] [RFC8447] | |||
14. TLS Certificate Types | 14. TLS Certificate Types | |||
Experience has shown that the IETF Consensus registry policy for TLS | Experience has shown that the IETF Consensus registry policy for TLS | |||
Certificate Types is too strict. Based on WG consensus, the decision | Certificate Types is too strict. Based on WG consensus, the decision | |||
was taken to change registration policy to Specification Required | was taken to change registration policy to Specification Required | |||
[RFC8126] while reserving a small part of the code space for | [RFC8126] while reserving a small part of the code space for | |||
experimental and private use. Therefore, IANA has changed the TLS | experimental and private use. Therefore, IANA has changed the TLS | |||
Certificate Types registry to: | Certificate Types registry to: | |||
o Change the registry policy to: | o Change the registry policy to: | |||
Values with the first byte in the range 0-223 (decimal) are | Values with the first byte in the range 0-223 (decimal) are | |||
assigned via Specification Required [RFC8126]. Values with the | assigned via Specification Required [RFC8126]. Values with the | |||
first byte 224-255 (decimal) are reserved for Private Use | first byte 224-255 (decimal) are reserved for Private Use | |||
[RFC8126]. | [RFC8126]. | |||
o Add a "Recommended" column to the registry. X.509 and Raw Public | o Add a "Recommended" column to the registry. X.509 and Raw Public | |||
Key are "Yes". All others are "No". In order to register an | Key are "Y". All others are "N". In order to register an | |||
extension with the value "Yes", a Standards Track document | extension with the value "Y", a Standards Track document [RFC8126] | |||
[RFC8126] is REQUIRED. Future Certificate Types MUST define the | is REQUIRED. Future Certificate Types MUST define the value of | |||
value of this column. A Standards Track document [RFC8126] is | this column. A Standards Track document [RFC8126] is REQUIRED to | |||
REQUIRED to register an entry with the value "Yes". IESG Approval | register an entry with the value "Y". IESG Approval is REQUIRED | |||
is REQUIRED for a Yes->No transition. | for a Y->N transition. | |||
See Section 18 for additional information about the designated expert | See Section 18 for additional information about the designated expert | |||
pool. | pool. | |||
IANA has added the following note: | IANA has added the following note: | |||
Note: The role of the designated expert is described in RFC 8447. | Note: The role of the designated expert is described in RFC 8447. | |||
The designated expert [RFC8126] ensures that the specification is | The designated expert [RFC8126] ensures that the specification is | |||
publicly available. An Internet-Draft that is posted and never | publicly available. It's sufficient to have an Internet-Draft | |||
published or a standard in another standards body, industry | (that is posted and never published as an RFC) or a document from | |||
consortium, university site, etc. suffices. The expert may | another standards body, industry consortium, university site, etc. | |||
provide more in-depth reviews, but their approval should not be | The expert may provide more in-depth reviews, but their approval | |||
taken as an endorsement of the certificate type. | should not be taken as an endorsement of the certificate type. | |||
Note: If an item is not marked as Recommended, it does not | Note: If an item is not marked as "Recommended", it does not | |||
necessarily mean that it is flawed; rather, it indicates that | necessarily mean that it is flawed; rather, it indicates that | |||
either the item has not been through the IETF consensus process, | either the item has not been through the IETF consensus process, | |||
has limited applicability, or is intended only for specific use | has limited applicability, or is intended only for specific use | |||
cases. | cases. | |||
IANA has updated the reference for this registry to also refer this | IANA has updated the reference for this registry to also refer this | |||
document. | document. | |||
15. Orphaned Extensions | 15. Orphaned Extensions | |||
skipping to change at page 15, line 17 | skipping to change at page 15, line 13 | |||
values are registered in the TLS SignatureScheme registry. | values are registered in the TLS SignatureScheme registry. | |||
o has updated the "Reference" field in the TLS Compression Method | o has updated the "Reference" field in the TLS Compression Method | |||
Identifiers, TLS HashAlgorithm and TLS SignatureAlgorithm | Identifiers, TLS HashAlgorithm and TLS SignatureAlgorithm | |||
registries to also refer to this document. | registries to also refer to this document. | |||
o has updated the TLS HashAlgorithm registry to list values 7 and | o has updated the TLS HashAlgorithm registry to list values 7 and | |||
9-223 as "Reserved" and the TLS SignatureAlgorithm registry to | 9-223 as "Reserved" and the TLS SignatureAlgorithm registry to | |||
list values 4-6 and 9-223 as "Reserved". | list values 4-6 and 9-223 as "Reserved". | |||
o has added the following to the TLS ClientCertificateType | ||||
Identifiers registry [RFC5246]: | ||||
Note: Note: The values in this registry are only applicable to | ||||
(D)TLS protocol versions prior to 1.3. | ||||
Despite the fact that the HashAlgorithm and SignatureAlgorithm | Despite the fact that the HashAlgorithm and SignatureAlgorithm | |||
registries are orphaned, it is still important to warn implementers | registries are orphaned, it is still important to warn implementers | |||
of pre-TLS1.3 implementations about the dangers of blindly | of pre-TLS1.3 implementations about the dangers of blindly | |||
implementing cryptographic algorithms. Therefore, IANA has added the | implementing cryptographic algorithms. Therefore, IANA has added the | |||
following warning to the HashAlgorithm and SignatureAlgorithm: | following warning to the HashAlgorithm and SignatureAlgorithm: | |||
WARNING: Cryptographic algorithms and parameters will be broken or | WARNING: Cryptographic algorithms and parameters will be broken or | |||
weakened over time. Blindly implementing the cryptographic | weakened over time. Blindly implementing the cryptographic | |||
algorithms listed here is not advised. Implementers and users | algorithms listed here is not advised. Implementers and users | |||
need to check that the cryptographic algorithms listed continue to | need to check that the cryptographic algorithms listed continue to | |||
skipping to change at page 15, line 49 | skipping to change at page 15, line 51 | |||
Note: As specified in [RFC8126], assignments made in the Private Use | Note: As specified in [RFC8126], assignments made in the Private Use | |||
space are not generally useful for broad interoperability. It is | space are not generally useful for broad interoperability. It is | |||
the responsibility of those making use of the Private Use range to | the responsibility of those making use of the Private Use range to | |||
ensure that no conflicts occur (within the intended scope of use). | ensure that no conflicts occur (within the intended scope of use). | |||
For widespread experiments, temporary reservations are available. | For widespread experiments, temporary reservations are available. | |||
IANA has added the following notes to the TLS PskKeyExchangeMode | IANA has added the following notes to the TLS PskKeyExchangeMode | |||
registry: | registry: | |||
Note: If an item is not marked as Recommended it does not | Note: If an item is not marked as "Recommended", it does not | |||
necessarily mean that it is flawed; rather, it indicates that | necessarily mean that it is flawed; rather, it indicates that | |||
either the item has not been through the IETF consensus process, | either the item has not been through the IETF consensus process, | |||
has limited applicability, or is intended only for specific use | has limited applicability, or is intended only for specific use | |||
cases. | cases. | |||
Note: The role of the designated expert is described in RFC 8447. | Note: The role of the designated expert is described in RFC 8447. | |||
The designated expert [RFC8126] ensures that the specification is | The designated expert [RFC8126] ensures that the specification is | |||
publicly available. An Internet Draft that is posted and never | publicly available. It's sufficient to have an Internet-Draft | |||
published or a standard in another standards body, industry | (that is posted and never published as an RFC) or a document from | |||
consortium, university site, etc. suffices. The expert may | another standards body, industry consortium, university site, etc. | |||
provide more in depth reviews, but their approval should not be | The expert may provide more in depth reviews, but their approval | |||
taken as an endorsement of the key exchange mode. | should not be taken as an endorsement of the key exchange mode. | |||
18. Designated Expert Pool | 18. Designated Expert Pool | |||
Specification Required [RFC8126] registry requests are registered | Specification Required [RFC8126] registry requests are registered | |||
after a three-week review period on the <tls-reg-review@ietf.org> | after a three-week review period on the <tls-reg-review@ietf.org> | |||
mailing list, on the advice of one or more designated experts. | mailing list, on the advice of one or more designated experts. | |||
However, to allow for the allocation of values prior to publication, | However, to allow for the allocation of values prior to publication, | |||
the designated experts may approve registration once they are | the designated experts may approve registration once they are | |||
satisfied that such a specification will be published. | satisfied that such a specification will be published. | |||
skipping to change at page 17, line 18 | skipping to change at page 17, line 18 | |||
The change to Specification Required from IETF Review lowers the | The change to Specification Required from IETF Review lowers the | |||
amount of review provided by the WG for cipher suites and supported | amount of review provided by the WG for cipher suites and supported | |||
groups. This change reflects reality in that the WG essentially | groups. This change reflects reality in that the WG essentially | |||
provided no cryptographic review of the cipher suites or supported | provided no cryptographic review of the cipher suites or supported | |||
groups. This was especially true of national cipher suites. | groups. This was especially true of national cipher suites. | |||
Recommended algorithms are regarded as secure for general use at the | Recommended algorithms are regarded as secure for general use at the | |||
time of registration; however, cryptographic algorithms and | time of registration; however, cryptographic algorithms and | |||
parameters will be broken or weakened over time. It is possible that | parameters will be broken or weakened over time. It is possible that | |||
the Recommended status in the registry lags behind the most recent | the "Recommended" status in the registry lags behind the most recent | |||
advances in cryptanalysis. Implementers and users need to check that | advances in cryptanalysis. Implementers and users need to check that | |||
the cryptographic algorithms listed continue to provide the expected | the cryptographic algorithms listed continue to provide the expected | |||
level of security. | level of security. | |||
Designated experts ensure the specification is publicly available. | Designated experts ensure the specification is publicly available. | |||
They may provide more in-depth reviews. Their review should not be | They may provide more in-depth reviews. Their review should not be | |||
taken as an endorsement of the cipher suite, extension, supported | taken as an endorsement of the cipher suite, extension, supported | |||
group, etc. | group, etc. | |||
20. IANA Considerations | 20. IANA Considerations | |||
End of changes. 69 change blocks. | ||||
142 lines changed or deleted | 145 lines changed or added | |||
This html diff was produced by rfcdiff 1.41. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |