rfc8996xml2.original.xml | rfc8996.xml | |||
---|---|---|---|---|
<?xml version="1.0" encoding="US-ASCII"?> | <?xml version='1.0' encoding='utf-8'?> | |||
<!-- this is version 5 of this xml2rfc template --> | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="bcp" conse | |||
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [ | nsus="true" docName="draft-ietf-tls-oldversions-deprecate-12" indexInclude="true | |||
<!ENTITY rfc2119 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | " ipr="trust200902" number="8996" obsoletes="5469, 7507" prepTime="2021-03-22T15 | |||
C.2119.xml"> | :03:43" scripts="Common,Latin" sortRefs="true" submissionType="IETF" symRefs="tr | |||
<!ENTITY rfc2223 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ue" tocDepth="3" tocInclude="true" updates="3261, 3329, 3436, 3470, 3501, 3552, | |||
C.2223.xml"> | 3568, 3656, 3749, 3767, 3856, 3871, 3887, 3903, 3943, 3983, 4097, 4111, 4162, 4 | |||
<!ENTITY rfc2578 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | 168, 4217, 4235, 4261, 4279, 4497, 4513, 4531, 4540, 4582, 4616, 4642, 4680, 468 | |||
C.2578.xml"> | 1, 4712, 4732, 4743, 4744, 4785, 4791, 4823, 4851, 4964, 4975, 4976, 4992, 5018 | |||
<!ENTITY rfc2579 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | , 5019, 5023, 5024, 5049, 5054, 5091, 5158, 5216, 5238, 5263, 5281, 5364, 5415, | |||
C.2579.xml"> | 5422, 5456, 5734, 5878, 5953, 6012, 6042, 6083, 6084, 6176, 6347, 6353, 6367, | |||
<!ENTITY rfc2580 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | 6460, 6614, 6739, 6749, 6750, 7030, 7465, 7525, 7562, 7568, 8261, 8422" xml:lang | |||
C.2580.xml"> | ="en"> | |||
<!ENTITY rfc2629 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | <link href="https://datatracker.ietf.org/doc/draft-ietf-tls-oldversions-deprec | |||
C.2629.xml"> | ate-12" rel="prev"/> | |||
<!ENTITY rfc3261 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | <link href="https://dx.doi.org/10.17487/rfc8996" rel="alternate"/> | |||
C.3261.xml"> | <link href="urn:issn:2070-1721" rel="alternate"/> | |||
<!ENTITY rfc3316 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3316.xml"> | ||||
<!ENTITY rfc3329 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3329.xml"> | ||||
<!ENTITY rfc3410 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3410.xml"> | ||||
<!ENTITY rfc3436 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3436.xml"> | ||||
<!ENTITY rfc3470 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3470.xml"> | ||||
<!ENTITY rfc3489 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3489.xml"> | ||||
<!ENTITY rfc3501 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3501.xml"> | ||||
<!ENTITY rfc3546 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3546.xml"> | ||||
<!ENTITY rfc3552 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3552.xml"> | ||||
<!ENTITY rfc3568 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3568.xml"> | ||||
<!ENTITY rfc3588 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3588.xml"> | ||||
<!ENTITY rfc3656 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3656.xml"> | ||||
<!ENTITY rfc3734 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3734.xml"> | ||||
<!ENTITY rfc3749 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3749.xml"> | ||||
<!ENTITY rfc3767 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3767.xml"> | ||||
<!ENTITY rfc3856 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3856.xml"> | ||||
<!ENTITY rfc3887 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3887.xml"> | ||||
<!ENTITY rfc3903 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3903.xml"> | ||||
<!ENTITY rfc3920 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3920.xml"> | ||||
<!ENTITY rfc3943 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3943.xml"> | ||||
<!ENTITY rfc3983 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.3983.xml"> | ||||
<!ENTITY rfc4097 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4097.xml"> | ||||
<!ENTITY rfc4111 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4111.xml"> | ||||
<!ENTITY rfc4132 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4132.xml"> | ||||
<!ENTITY rfc4162 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4162.xml"> | ||||
<!ENTITY rfc4168 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4168.xml"> | ||||
<!ENTITY rfc4181 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4181.xml"> | ||||
<!ENTITY rfc4217 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4217.xml"> | ||||
<!ENTITY rfc4235 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4235.xml"> | ||||
<!ENTITY rfc4244 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4244.xml"> | ||||
<!ENTITY rfc4261 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4261.xml"> | ||||
<!ENTITY rfc4279 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4279.xml"> | ||||
<!ENTITY rfc4366 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4366.xml"> | ||||
<!ENTITY rfc4492 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4492.xml"> | ||||
<!ENTITY rfc4497 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4497.xml"> | ||||
<!ENTITY rfc4507 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4507.xml"> | ||||
<!ENTITY rfc4513 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4513.xml"> | ||||
<!ENTITY rfc4531 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4531.xml"> | ||||
<!ENTITY rfc4540 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4540.xml"> | ||||
<!ENTITY rfc4572 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4572.xml"> | ||||
<!ENTITY rfc4582 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4582.xml"> | ||||
<!ENTITY rfc4616 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4616.xml"> | ||||
<!ENTITY rfc4642 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4642.xml"> | ||||
<!ENTITY rfc4680 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4680.xml"> | ||||
<!ENTITY rfc4681 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4681.xml"> | ||||
<!ENTITY rfc4712 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4712.xml"> | ||||
<!ENTITY rfc4732 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4732.xml"> | ||||
<!ENTITY rfc4743 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4743.xml"> | ||||
<!ENTITY rfc4744 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4744.xml"> | ||||
<!ENTITY rfc4785 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4785.xml"> | ||||
<!ENTITY rfc4791 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4791.xml"> | ||||
<!ENTITY rfc4823 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4823.xml"> | ||||
<!ENTITY rfc4851 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4851.xml"> | ||||
<!ENTITY rfc4934 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4934.xml"> | ||||
<!ENTITY rfc4964 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4964.xml"> | ||||
<!ENTITY rfc4975 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4975.xml"> | ||||
<!ENTITY rfc4976 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4976.xml"> | ||||
<!ENTITY rfc4992 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.4992.xml"> | ||||
<!ENTITY rfc5018 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5018.xml"> | ||||
<!ENTITY rfc5019 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5019.xml"> | ||||
<!ENTITY rfc5023 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5023.xml"> | ||||
<!ENTITY rfc5024 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5024.xml"> | ||||
<!ENTITY rfc5049 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5049.xml"> | ||||
<!ENTITY rfc5054 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5054.xml"> | ||||
<!ENTITY rfc5077 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5077.xml"> | ||||
<!ENTITY rfc5081 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5081.xml"> | ||||
<!ENTITY rfc5091 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5091.xml"> | ||||
<!ENTITY rfc5101 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5101.xml"> | ||||
<!ENTITY rfc5158 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5158.xml"> | ||||
<!ENTITY rfc5216 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5216.xml"> | ||||
<!ENTITY rfc5238 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5238.xml"> | ||||
<!ENTITY rfc5281 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5281.xml"> | ||||
<!ENTITY rfc5364 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5364.xml"> | ||||
<!ENTITY rfc5422 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5422.xml"> | ||||
<!ENTITY rfc5469 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5469.xml"> | ||||
<!ENTITY rfc5734 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5734.xml"> | ||||
<!ENTITY rfc5878 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5878.xml"> | ||||
<!ENTITY rfc5953 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5953.xml"> | ||||
<!ENTITY rfc6042 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.6042.xml"> | ||||
<!ENTITY rfc6176 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.6176.xml"> | ||||
<!ENTITY rfc6353 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.6353.xml"> | ||||
<!ENTITY rfc6367 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.6367.xml"> | ||||
<!ENTITY rfc6614 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.6614.xml"> | ||||
<!ENTITY rfc6739 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.6739.xml"> | ||||
<!ENTITY rfc6749 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.6749.xml"> | ||||
<!ENTITY rfc6750 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.6750.xml"> | ||||
<!ENTITY rfc7030 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.7030.xml"> | ||||
<!ENTITY rfc7465 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.7465.xml"> | ||||
<!ENTITY rfc7507 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.7507.xml"> | ||||
<!ENTITY rfc7562 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.7562.xml"> | ||||
<!ENTITY rfc7568 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.7568.xml"> | ||||
<!ENTITY rfc8422 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.8422.xml"> | ||||
<!ENTITY rfc8143 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.8261.xml"> | ||||
<!ENTITY rfc6347 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.6347.xml"> | ||||
<!ENTITY rfc6460 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.6460.xml"> | ||||
<!ENTITY rfc6084 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.6084.xml"> | ||||
<!ENTITY rfc6083 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.6083.xml"> | ||||
<!ENTITY rfc6012 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.6012.xml"> | ||||
<!ENTITY rfc5456 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5456.xml"> | ||||
<!ENTITY rfc5415 SYSTEM "https://xml.resource.org/public/rfc/bibxml/reference.RF | ||||
C.5415.xml"> | ||||
]> | ||||
<?rfc toc="yes"?> | ||||
<?rfc symrefs="yes"?> | ||||
<?rfc compact="yes"?> | ||||
<?rfc subcompact="yes"?> | ||||
<?rfc strict="no"?> | ||||
<?rfc rfcedstyle="yes"?> | ||||
<?rfc comments="yes"?> | ||||
<?rfc inline="yes"?> | ||||
<rfc category="bcp" docName="draft-ietf-tls-oldversions-deprecate-12" | ||||
ipr="trust200902" | ||||
updates="8422 8261 7568 7562 7525 7465 7030 6750 6749 6739 6460 6614 6367 6 | ||||
353 6347 6176 6084 6083 6042 6012 5953 5878 5734 5456 5422 5415 5364 5281 5263 5 | ||||
238 5216 5158 5091 5054 5049 5024 5023 5019 5018 4992 4976 4975 4964 4851 4823 4 | ||||
791 4785 4744 4743 4732 4712 4681 4680 4642 4616 4582 4540 4531 4513 4497 4279 4 | ||||
261 4235 4217 4168 4162 4111 4097 3983 3943 3903 3887 3871 3856 3767 3749 3656 3 | ||||
568 3552 3501 3470 3436 3329 3261" | ||||
obsoletes="5469 7507"> | ||||
<front> | <front> | |||
<title abbrev="Deprecating TLSv1.0 and TLSv1.1">Deprecating TLSv1.0 and | <title abbrev="Deprecating TLS 1.0 and TLS 1.1">Deprecating TLS 1.0 and TLS | |||
TLSv1.1</title> | 1.1</title> | |||
<seriesInfo name="RFC" value="8996" stream="IETF"/> | ||||
<seriesInfo name="BCP" value="195" stream="IETF"/> | ||||
<author fullname="Kathleen Moriarty" initials="K" surname="Moriarty"> | <author fullname="Kathleen Moriarty" initials="K" surname="Moriarty"> | |||
<organization>Dell EMC</organization> | <organization abbrev="CIS" showOnFrontPage="true">Center for Internet Secu | |||
rity (CIS)</organization> | ||||
<address> | <address> | |||
<postal> | <postal> | |||
<street>176 South Street</street> | <street/> | |||
<city>East Greenbush</city> | ||||
<city>Hopkinton</city> | <region>NY</region> | |||
<country>United States of America</country> | ||||
<country>United States</country> | ||||
</postal> | </postal> | |||
<email>Kathleen.Moriarty.ietf@gmail.com</email> | <email>Kathleen.Moriarty.ietf@gmail.com</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<author fullname="Stephen Farrell" initials="S." surname="Farrell"> | <author fullname="Stephen Farrell" initials="S." surname="Farrell"> | |||
<organization>Trinity College Dublin</organization> | <organization showOnFrontPage="true">Trinity College Dublin</organization> | |||
<address> | <address> | |||
<postal> | <postal> | |||
<street/> | <street/> | |||
<city>Dublin</city> | <city>Dublin</city> | |||
<region/> | <region/> | |||
<code>2</code> | <code>2</code> | |||
<country>Ireland</country> | <country>Ireland</country> | |||
</postal> | </postal> | |||
<phone>+353-1-896-2354</phone> | <phone>+353-1-896-2354</phone> | |||
<email>stephen.farrell@cs.tcd.ie</email> | <email>stephen.farrell@cs.tcd.ie</email> | |||
</address> | </address> | |||
</author> | </author> | |||
<date month="03" year="2021"/> | ||||
<date year="2021"/> | ||||
<area>Security Area</area> | <area>Security Area</area> | |||
<workgroup>Internet Engineering Task Force</workgroup> | <workgroup>Internet Engineering Task Force</workgroup> | |||
<keyword>TLS</keyword> | <keyword>TLS</keyword> | |||
<keyword>deprecate</keyword> | <keyword>deprecate</keyword> | |||
<keyword>TLSv1.0</keyword> | <keyword>TLSv1.0</keyword> | |||
<keyword>TLSv1.1</keyword> | <keyword>TLSv1.1</keyword> | |||
<abstract pn="section-abstract"> | ||||
<t indent="0" pn="section-abstract-1"> | ||||
<abstract> | This document formally deprecates Transport Layer | |||
<t> | ||||
This document, if approved, formally deprecates Transport Layer | ||||
Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). | Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). | |||
Accordingly, those documents (will be moved|have been moved) | Accordingly, those documents have been moved | |||
to Historic status. These versions lack support for current | to Historic status. These versions lack support for current | |||
and recommended cryptographic algorithms and mechanisms, and | and recommended cryptographic algorithms and mechanisms, and | |||
various government and industry profiles of applications using | various government and industry profiles of applications using | |||
TLS now mandate avoiding these old TLS versions. TLSv1.2 | TLS now mandate avoiding these old TLS versions. TLS version 1.2 | |||
became the recommended version for IETF protocols in 2008, | became the recommended version for IETF protocols in 2008 | |||
(subsequently being obsoleted by TLSv1.3 in 2018), providing | (subsequently being obsoleted by TLS version 1.3 in 2018), providing | |||
sufficient time to transition away from older versions. | sufficient time to transition away from older versions. | |||
Removing support for older versions from implementations reduces the | Removing support for older versions from implementations reduces the | |||
attack surface, reduces opportunity for misconfiguration, and | attack surface, reduces opportunity for misconfiguration, and | |||
streamlines library and product maintenance. | streamlines library and product maintenance. | |||
</t> | </t> | |||
<t indent="0" pn="section-abstract-2">This document also deprecates Datagr | ||||
<t>This document also deprecates Datagram TLS (DTLS) version 1.0 | am TLS (DTLS) version 1.0 | |||
(RFC 4347), but not DTLS version 1.2, and there is no DTLS | (RFC 4347) but not DTLS version 1.2, and there is no DTLS | |||
version 1.1.</t> | version 1.1.</t> | |||
<t indent="0" pn="section-abstract-3">This document updates many RFCs that | ||||
<t>This document updates many RFCs that normatively refer to TLSv1.0 or | normatively refer to TLS version 1.0 or | |||
TLSv1.1 as described herein. This document also updates the best | TLS version 1.1, as described herein. This document also updates the best | |||
practices for TLS usage in RFC 7525 and hence is part of BCP 195.</t> | practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t> | |||
</abstract> | </abstract> | |||
<boilerplate> | ||||
<section anchor="status-of-memo" numbered="false" removeInRFC="false" toc= | ||||
"exclude" pn="section-boilerplate.1"> | ||||
<name slugifiedName="name-status-of-this-memo">Status of This Memo</name | ||||
> | ||||
<t indent="0" pn="section-boilerplate.1-1"> | ||||
This memo documents an Internet Best Current Practice. | ||||
</t> | ||||
<t indent="0" pn="section-boilerplate.1-2"> | ||||
This document is a product of the Internet Engineering Task Force | ||||
(IETF). It represents the consensus of the IETF community. It has | ||||
received public review and has been approved for publication by | ||||
the Internet Engineering Steering Group (IESG). Further information | ||||
on BCPs is available in Section 2 of RFC 7841. | ||||
</t> | ||||
<t indent="0" pn="section-boilerplate.1-3"> | ||||
Information about the current status of this document, any | ||||
errata, and how to provide feedback on it may be obtained at | ||||
<eref target="https://www.rfc-editor.org/info/rfc8996" brackets="non | ||||
e"/>. | ||||
</t> | ||||
</section> | ||||
<section anchor="copyright" numbered="false" removeInRFC="false" toc="excl | ||||
ude" pn="section-boilerplate.2"> | ||||
<name slugifiedName="name-copyright-notice">Copyright Notice</name> | ||||
<t indent="0" pn="section-boilerplate.2-1"> | ||||
Copyright (c) 2021 IETF Trust and the persons identified as the | ||||
document authors. All rights reserved. | ||||
</t> | ||||
<t indent="0" pn="section-boilerplate.2-2"> | ||||
This document is subject to BCP 78 and the IETF Trust's Legal | ||||
Provisions Relating to IETF Documents | ||||
(<eref target="https://trustee.ietf.org/license-info" brackets="none | ||||
"/>) in effect on the date of | ||||
publication of this document. Please review these documents | ||||
carefully, as they describe your rights and restrictions with | ||||
respect to this document. Code Components extracted from this | ||||
document must include Simplified BSD License text as described in | ||||
Section 4.e of the Trust Legal Provisions and are provided without | ||||
warranty as described in the Simplified BSD License. | ||||
</t> | ||||
</section> | ||||
</boilerplate> | ||||
<toc> | ||||
<section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" p | ||||
n="section-toc.1"> | ||||
<name slugifiedName="name-table-of-contents">Table of Contents</name> | ||||
<ul bare="true" empty="true" indent="2" spacing="compact" pn="section-to | ||||
c.1-1"> | ||||
<li pn="section-toc.1-1.1"> | ||||
<t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref der | ||||
ivedContent="1" format="counter" sectionFormat="of" target="section-1"/>. <xref | ||||
derivedContent="" format="title" sectionFormat="of" target="name-introduction"> | ||||
Introduction</xref></t> | ||||
<ul bare="true" empty="true" indent="2" spacing="compact" pn="sectio | ||||
n-toc.1-1.1.2"> | ||||
<li pn="section-toc.1-1.1.2.1"> | ||||
<t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.1.1">< | ||||
xref derivedContent="1.1" format="counter" sectionFormat="of" target="section-1. | ||||
1"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-rf | ||||
cs-updated">RFCs Updated</xref></t> | ||||
</li> | ||||
<li pn="section-toc.1-1.1.2.2"> | ||||
<t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.2.1">< | ||||
xref derivedContent="1.2" format="counter" sectionFormat="of" target="section-1. | ||||
2"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-te | ||||
rminology">Terminology</xref></t> | ||||
</li> | ||||
</ul> | ||||
</li> | ||||
<li pn="section-toc.1-1.2"> | ||||
<t indent="0" pn="section-toc.1-1.2.1"><xref derivedContent="2" form | ||||
at="counter" sectionFormat="of" target="section-2"/>. <xref derivedContent="" f | ||||
ormat="title" sectionFormat="of" target="name-support-for-deprecation">Support f | ||||
or Deprecation</xref></t> | ||||
</li> | ||||
<li pn="section-toc.1-1.3"> | ||||
<t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" form | ||||
at="counter" sectionFormat="of" target="section-3"/>. <xref derivedContent="" f | ||||
ormat="title" sectionFormat="of" target="name-sha-1-usage-problematic-in-">SHA-1 | ||||
Usage Problematic in TLS 1.0 and TLS 1.1</xref></t> | ||||
</li> | ||||
<li pn="section-toc.1-1.4"> | ||||
<t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" form | ||||
at="counter" sectionFormat="of" target="section-4"/>. <xref derivedContent="" f | ||||
ormat="title" sectionFormat="of" target="name-do-not-use-tls-10">Do Not Use TLS | ||||
1.0</xref></t> | ||||
</li> | ||||
<li pn="section-toc.1-1.5"> | ||||
<t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" form | ||||
at="counter" sectionFormat="of" target="section-5"/>. <xref derivedContent="" f | ||||
ormat="title" sectionFormat="of" target="name-do-not-use-tls-11">Do Not Use TLS | ||||
1.1</xref></t> | ||||
</li> | ||||
<li pn="section-toc.1-1.6"> | ||||
<t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" form | ||||
at="counter" sectionFormat="of" target="section-6"/>. <xref derivedContent="" f | ||||
ormat="title" sectionFormat="of" target="name-updates-to-rfc-7525">Updates to RF | ||||
C 7525</xref></t> | ||||
</li> | ||||
<li pn="section-toc.1-1.7"> | ||||
<t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" form | ||||
at="counter" sectionFormat="of" target="section-7"/>. <xref derivedContent="" f | ||||
ormat="title" sectionFormat="of" target="name-operational-considerations">Operat | ||||
ional Considerations</xref></t> | ||||
</li> | ||||
<li pn="section-toc.1-1.8"> | ||||
<t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" form | ||||
at="counter" sectionFormat="of" target="section-8"/>. <xref derivedContent="" f | ||||
ormat="title" sectionFormat="of" target="name-security-considerations">Security | ||||
Considerations</xref></t> | ||||
</li> | ||||
<li pn="section-toc.1-1.9"> | ||||
<t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="9" form | ||||
at="counter" sectionFormat="of" target="section-9"/>. <xref derivedContent="" f | ||||
ormat="title" sectionFormat="of" target="name-iana-considerations">IANA Consider | ||||
ations</xref></t> | ||||
</li> | ||||
<li pn="section-toc.1-1.10"> | ||||
<t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="10" fo | ||||
rmat="counter" sectionFormat="of" target="section-10"/>. <xref derivedContent="" | ||||
format="title" sectionFormat="of" target="name-references">References</xref></t | ||||
> | ||||
<ul bare="true" empty="true" indent="2" spacing="compact" pn="sectio | ||||
n-toc.1-1.10.2"> | ||||
<li pn="section-toc.1-1.10.2.1"> | ||||
<t indent="0" pn="section-toc.1-1.10.2.1.1"><xref derivedContent | ||||
="10.1" format="counter" sectionFormat="of" target="section-10.1"/>. <xref deri | ||||
vedContent="" format="title" sectionFormat="of" target="name-normative-reference | ||||
s">Normative References</xref></t> | ||||
</li> | ||||
<li pn="section-toc.1-1.10.2.2"> | ||||
<t indent="0" pn="section-toc.1-1.10.2.2.1"><xref derivedContent | ||||
="10.2" format="counter" sectionFormat="of" target="section-10.2"/>. <xref deri | ||||
vedContent="" format="title" sectionFormat="of" target="name-informative-referen | ||||
ces">Informative References</xref></t> | ||||
</li> | ||||
</ul> | ||||
</li> | ||||
<li pn="section-toc.1-1.11"> | ||||
<t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="" form | ||||
at="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent=" | ||||
" format="title" sectionFormat="of" target="name-acknowledgements">Acknowledgeme | ||||
nts</xref></t> | ||||
</li> | ||||
<li pn="section-toc.1-1.12"> | ||||
<t indent="0" pn="section-toc.1-1.12.1"><xref derivedContent="" form | ||||
at="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent=" | ||||
" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Add | ||||
resses</xref></t> | ||||
</li> | ||||
</ul> | ||||
</section> | ||||
</toc> | ||||
</front> | </front> | |||
<middle> | <middle> | |||
<section title="Introduction"> | <section numbered="true" toc="include" removeInRFC="false" pn="section-1"> | |||
<!-- | <name slugifiedName="name-introduction">Introduction</name> | |||
<t>[[Text in double-square brackets is intended | <t indent="0" pn="section-1-1">Transport Layer Security (TLS) versions 1.0 | |||
to be fixed as the draft evolves. You've seen that we need to | <xref target="RFC2246" format="default" sectionFormat="of" derivedContent="RFC2 | |||
figure out the list of RFCs that this'd update in the abstract. | 246"/> | |||
There is a repo for this at: https://github.com/tlswg/oldversions-depre | and 1.1 <xref target="RFC4346" format="default" sectionFormat="of" derived | |||
cate | Content="RFC4346"/> were superseded by TLS 1.2 <xref target="RFC5246" format="de | |||
- PRs (on the xml file) are welcome there.]]</t> | fault" sectionFormat="of" derivedContent="RFC5246"/> in 2008, which has now itse | |||
--> | lf been superseded by | |||
TLS 1.3 <xref target="RFC8446" format="default" sectionFormat="of" derived | ||||
<t>Transport Layer Security (TLS) versions 1.0 <xref target="RFC2246"/> | Content="RFC8446"/>. Datagram Transport Layer Security | |||
and 1.1 <xref target="RFC4346"/> were superseded by TLSv1.2 <xref | (DTLS) version 1.0 <xref target="RFC4347" format="default" sectionFormat=" | |||
target="RFC5246"/> in 2008, which has now itself been superseded by | of" derivedContent="RFC4347"/> was superseded by DTLS 1.2 | |||
TLSv1.3 <xref target="RFC8446"/>. Datagram Transport Layer Security | <xref target="RFC6347" format="default" sectionFormat="of" derivedContent= | |||
(DTLS) version 1.0 <xref target="RFC4347"/> was superseded by DTLSv1.2 | "RFC6347"/> in 2012. Therefore, it is timely to further | |||
<xref target="RFC6347"/> in 2012. It is therefore timely to further | deprecate TLS 1.0, TLS 1.1, and DTLS 1.0. | |||
deprecate TLSv1.0, TLSv1.1 and DTLSv1.0. | Accordingly, the aforementioned documents have been moved to Historic stat | |||
Accordingly, | us.</t> | |||
those documents (will be moved|have been moved) to Historic status.</t> | <t indent="0" pn="section-1-2">Technical reasons for deprecating these ver | |||
sions include:</t> | ||||
<!--The expectation is that TLSv1.2 will | <ul spacing="compact" bare="false" empty="false" indent="3" pn="section-1- | |||
continue to be used for many years alongside TLSv1.3.</t> | 3"> | |||
--> | <li pn="section-1-3.1">They require the implementation of older cipher s | |||
uites that are no | ||||
<!-- | longer desirable for cryptographic reasons, e.g., TLS 1.0 makes | |||
<t>TLSv1.1 and TLSv1.0 are also actively being deprecated in accordance | TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA mandatory to implement.</li> | |||
with guidance from government agencies (e.g. <xref | <li pn="section-1-3.2">There is a lack of support for current recommende | |||
target="NIST800-52r2"/>) and industry consortia | d cipher suites, especially | |||
such as the Payment Card Industry Association (PCI) <xref | authenticated encryption with associated data (AEAD) ciphers, | |||
target="PCI-TLS1"/>.</t> | which were not supported prior to TLS 1.2. Note that | |||
<t>3GPP have deprecated TLSv1.0 and DTLSv1.0 since their release-14 in | ||||
2016. <xref target="TGPP33310"/></t> | ||||
--> | ||||
<t>Technical reasons for deprecating these versions include:</t> | ||||
<t><list style="symbols"> | ||||
<t>They require implementation of older cipher suites that are no | ||||
longer desirable for cryptographic reasons, e.g., TLSv1.0 makes | ||||
TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA mandatory to implement</t> | ||||
<t>Lack of support for current recommended cipher suites, especially | ||||
AEAD ciphers which are not supported prior to TLSv1.2. Note: | ||||
registry entries for no-longer-desirable ciphersuites remain in the | registry entries for no-longer-desirable ciphersuites remain in the | |||
registries, but many TLS registries are being updated through <xref | registries, but many TLS registries were updated by <xref target="RFC8 | |||
target="RFC8447"/> which indicates that such entries are not | 447" format="default" sectionFormat="of" derivedContent="RFC8447"/>, which indic | |||
recommended by the IETF.</t> | ates that such entries are not | |||
recommended by the IETF.</li> | ||||
<t>Integrity of the handshake depends on SHA-1 hash.</t> | <li pn="section-1-3.3">The integrity of the handshake depends on SHA-1 h | |||
ash.</li> | ||||
<t>Authentication of the peers depends on SHA-1 signatures.</t> | <li pn="section-1-3.4">The authentication of the peers depends on SHA-1 | |||
signatures.</li> | ||||
<t>Support for four TLS protocol versions increases the likelihood of | <li pn="section-1-3.5">Support for four TLS protocol versions increases | |||
misconfiguration.</t> | the likelihood of | |||
misconfiguration.</li> | ||||
<t>At least one widely-used library has plans to drop TLSv1.1 and | <li pn="section-1-3.6">At least one widely used library has plans to dro | |||
TLSv1.0 support in upcoming releases; products using such libraries | p TLS 1.1 and | |||
would need to use older versions of the libraries to support TLSv1.0 | TLS 1.0 support in upcoming releases; products using such libraries | |||
and TLSv1.1, which is clearly undesirable.</t> | would need to use older versions of the libraries to support TLS 1.0 | |||
</list></t> | and TLS 1.1, which is clearly undesirable.</li> | |||
</ul> | ||||
<t>Deprecation of these versions is intended to assist developers as | <t indent="0" pn="section-1-4">Deprecation of these versions is intended t | |||
o assist developers as | ||||
additional justification to no longer support older (D)TLS versions and to | additional justification to no longer support older (D)TLS versions and to | |||
migrate to a minimum of (D)TLSv1.2. Deprecation also assists product teams | migrate to a minimum of (D)TLS 1.2. Deprecation also assists product teams | |||
with phasing out support for the older versions, to reduce the attack | with phasing out support for the older versions, to reduce the attack | |||
surface and the scope of maintenance for protocols in their | surface and the scope of maintenance for protocols in their | |||
offerings.</t> | offerings.</t> | |||
<section anchor="updates" numbered="true" toc="include" removeInRFC="false | ||||
<!-- duplication - already said in the bullet list above | " pn="section-1.1"> | |||
<t>Some TLS libraries are considering dropping support for TLSv1.0 and | <name slugifiedName="name-rfcs-updated">RFCs Updated</name> | |||
TLSv1.1 in upcoming releases. If products do not follow suit because the | <t indent="0" pn="section-1.1-1">This document updates the following RFC | |||
protocol has not been deprecated, multiple libraries may be needed for a | s that normatively reference | |||
very small number of deployments. While fixes have been developed to | TLS 1.0, TLS 1.1, or DTLS 1.0. The update is to obsolete usage of | |||
address the known vulnerabilities in TLSv1.0 and TLSv1.1, this may not | ||||
continue if library support is eliminated for new releases.</t> | ||||
--> | ||||
<!-- | ||||
<t>[[This draft is being written now so that the TLS WG chairs can just | ||||
hit the "publication requested" button as soon as there is WG consensus | ||||
to deprecate these ancient versions of TLS. The authors however think | ||||
that deprecation now is timely.]]</t> | ||||
--> | ||||
<!-- adding the boilerplate below for 2119 and 8174 | ||||
--> | ||||
<section anchor="updates" title="RFCs Updated"> | ||||
<t>This document updates the following RFCs that normatively reference | ||||
TLSv1.0 or TLSv1.1 or DTLS1.0. The update is to obsolete usage of | ||||
these older versions. Fallback to these versions is prohibited | these older versions. Fallback to these versions is prohibited | |||
through this update. Specific references to mandatory minimum protocol | through this update. Specific references to mandatory minimum protocol | |||
versions of TLSv1.0 or TLSv1.1 are replaced by TLSv1.2, and references | versions of TLS 1.0 or TLS 1.1 are replaced by TLS 1.2, and references | |||
to minimum protocol version DTLSv1.0 are replaced by DTLSv1.2. | to minimum protocol version DTLS 1.0 are replaced by DTLS 1.2. | |||
Statements that "TLSv1.0 is the most widely deployed version and will | Statements that "TLS 1.0 is the most widely deployed version and will | |||
provide the broadest interoperability" are removed without | provide the broadest interoperability" are removed without | |||
replacement.</t> | replacement.</t> | |||
<t indent="0" pn="section-1.1-2"> | ||||
<t> | <xref target="RFC3261" format="default" sectionFormat="of" derivedCont | |||
ent="RFC3261"/> | ||||
<xref target="RFC8422"/> | <xref target="RFC3329" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC8261"/> | ent="RFC3329"/> | |||
<xref target="RFC7568"/> | <xref target="RFC3436" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC7562"/> | ent="RFC3436"/> | |||
<xref target="RFC7525"/> | <xref target="RFC3470" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC7465"/> | ent="RFC3470"/> | |||
<xref target="RFC7030"/> | <xref target="RFC3501" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC6750"/> | ent="RFC3501"/> | |||
<xref target="RFC6749"/> | <xref target="RFC3552" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC6739"/> | ent="RFC3552"/> | |||
<xref target="RFC6084"/> | <xref target="RFC3568" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC6083"/> | ent="RFC3568"/> | |||
<xref target="RFC6367"/> | <xref target="RFC3656" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC6353"/> | ent="RFC3656"/> | |||
<xref target="RFC6176"/> | <xref target="RFC3749" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC6042"/> | ent="RFC3749"/> | |||
<xref target="RFC6012"/> | <xref target="RFC3767" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC5878"/> | ent="RFC3767"/> | |||
<xref target="RFC5734"/> | <xref target="RFC3856" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC5456"/> | ent="RFC3856"/> | |||
<xref target="RFC5422"/> | <xref target="RFC3871" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC5415"/> | ent="RFC3871"/> | |||
<xref target="RFC5364"/> | <xref target="RFC3887" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC5281"/> | ent="RFC3887"/> | |||
<xref target="RFC5263"/> | <xref target="RFC3903" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC5238"/> | ent="RFC3903"/> | |||
<xref target="RFC5216"/> | <xref target="RFC3943" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC5158"/> | ent="RFC3943"/> | |||
<xref target="RFC5091"/> | <xref target="RFC3983" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC5054"/> | ent="RFC3983"/> | |||
<xref target="RFC5049"/> | <xref target="RFC4097" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC5024"/> | ent="RFC4097"/> | |||
<xref target="RFC5023"/> | <xref target="RFC4111" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC5019"/> | ent="RFC4111"/> | |||
<xref target="RFC5018"/> | <xref target="RFC4162" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC4992"/> | ent="RFC4162"/> | |||
<xref target="RFC4976"/> | <xref target="RFC4168" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC4975"/> | ent="RFC4168"/> | |||
<xref target="RFC4964"/> | <xref target="RFC4217" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC4851"/> | ent="RFC4217"/> | |||
<xref target="RFC4823"/> | <xref target="RFC4235" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC4791"/> | ent="RFC4235"/> | |||
<xref target="RFC4785"/> | <xref target="RFC4261" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC4732"/> | ent="RFC4261"/> | |||
<xref target="RFC4712"/> | <xref target="RFC4279" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC4681"/> | ent="RFC4279"/> | |||
<xref target="RFC4680"/> | <xref target="RFC4497" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC4642"/> | ent="RFC4497"/> | |||
<xref target="RFC4616"/> | <xref target="RFC4513" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC4582"/> | ent="RFC4513"/> | |||
<xref target="RFC4540"/> | <xref target="RFC4531" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC4531"/> | ent="RFC4531"/> | |||
<xref target="RFC4513"/> | <xref target="RFC4540" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC4497"/> | ent="RFC4540"/> | |||
<xref target="RFC4279"/> | <xref target="RFC4582" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC4261"/> | ent="RFC4582"/> | |||
<xref target="RFC4235"/> | <xref target="RFC4616" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC4217"/> | ent="RFC4616"/> | |||
<xref target="RFC4168"/> | <xref target="RFC4642" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC4162"/> | ent="RFC4642"/> | |||
<xref target="RFC4111"/> | <xref target="RFC4680" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC4097"/> | ent="RFC4680"/> | |||
<xref target="RFC3983"/> | <xref target="RFC4681" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC3943"/> | ent="RFC4681"/> | |||
<xref target="RFC3903"/> | <xref target="RFC4712" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC3887"/> | ent="RFC4712"/> | |||
<xref target="RFC3871"/> | <xref target="RFC4732" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC3856"/> | ent="RFC4732"/> | |||
<xref target="RFC3767"/> | <xref target="RFC4785" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC3749"/> | ent="RFC4785"/> | |||
<xref target="RFC3656"/> | <xref target="RFC4791" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC3568"/> | ent="RFC4791"/> | |||
<xref target="RFC3552"/> | <xref target="RFC4823" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC3501"/> | ent="RFC4823"/> | |||
<xref target="RFC3470"/> | <xref target="RFC4851" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC3436"/> | ent="RFC4851"/> | |||
<xref target="RFC3329"/> | <xref target="RFC4964" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC3261"/> | ent="RFC4964"/> | |||
<xref target="RFC4975" format="default" sectionFormat="of" derivedCont | ||||
</t> | ent="RFC4975"/> | |||
<xref target="RFC4976" format="default" sectionFormat="of" derivedCont | ||||
<t>The status of <xref target="RFC7562"/>, <xref target="RFC6042"/>, | ent="RFC4976"/> | |||
<xref target="RFC5456"/>, <xref target="RFC5024"/>, | <xref target="RFC4992" format="default" sectionFormat="of" derivedCont | |||
<xref target="RFC4540"/>, and <xref target="RFC3656"/> will be | ent="RFC4992"/> | |||
updated with permission of the Independent Stream Editor. | <xref target="RFC5018" format="default" sectionFormat="of" derivedCont | |||
</t> | ent="RFC5018"/> | |||
<xref target="RFC5019" format="default" sectionFormat="of" derivedCont | ||||
<t>In addition these RFCs normatively refer to TLSv1.0 or TLSv1.1 and | ent="RFC5019"/> | |||
<xref target="RFC5023" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC5023"/> | ||||
<xref target="RFC5024" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC5024"/> | ||||
<xref target="RFC5049" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC5049"/> | ||||
<xref target="RFC5054" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC5054"/> | ||||
<xref target="RFC5091" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC5091"/> | ||||
<xref target="RFC5158" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC5158"/> | ||||
<xref target="RFC5216" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC5216"/> | ||||
<xref target="RFC5238" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC5238"/> | ||||
<xref target="RFC5263" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC5263"/> | ||||
<xref target="RFC5281" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC5281"/> | ||||
<xref target="RFC5364" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC5364"/> | ||||
<xref target="RFC5415" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC5415"/> | ||||
<xref target="RFC5422" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC5422"/> | ||||
<xref target="RFC5456" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC5456"/> | ||||
<xref target="RFC5734" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC5734"/> | ||||
<xref target="RFC5878" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC5878"/> | ||||
<xref target="RFC6012" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC6012"/> | ||||
<xref target="RFC6042" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC6042"/> | ||||
<xref target="RFC6083" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC6083"/> | ||||
<xref target="RFC6084" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC6084"/> | ||||
<xref target="RFC6176" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC6176"/> | ||||
<xref target="RFC6353" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC6353"/> | ||||
<xref target="RFC6367" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC6367"/> | ||||
<xref target="RFC6739" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC6739"/> | ||||
<xref target="RFC6749" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC6749"/> | ||||
<xref target="RFC6750" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC6750"/> | ||||
<xref target="RFC7030" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC7030"/> | ||||
<xref target="RFC7465" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC7465"/> | ||||
<xref target="RFC7525" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC7525"/> | ||||
<xref target="RFC7562" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC7562"/> | ||||
<xref target="RFC7568" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC7568"/> | ||||
<xref target="RFC8261" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC8261"/> | ||||
<xref target="RFC8422" format="default" sectionFormat="of" derivedCont | ||||
ent="RFC8422"/> | ||||
</t> | ||||
<t indent="0" pn="section-1.1-3">The status of <xref target="RFC7562" fo | ||||
rmat="default" sectionFormat="of" derivedContent="RFC7562"/>, <xref target="RFC6 | ||||
042" format="default" sectionFormat="of" derivedContent="RFC6042"/>, | ||||
<xref target="RFC5456" format="default" sectionFormat="of" derive | ||||
dContent="RFC5456"/>, <xref target="RFC5024" format="default" sectionFormat="of" | ||||
derivedContent="RFC5024"/>, | ||||
<xref target="RFC4540" format="default" sectionFormat="of" derive | ||||
dContent="RFC4540"/>, and <xref target="RFC3656" format="default" sectionFormat= | ||||
"of" derivedContent="RFC3656"/> will be | ||||
updated with permission of the Independent Submissions Editor. | ||||
</t> | ||||
<t indent="0" pn="section-1.1-4">In addition, these RFCs normatively ref | ||||
er to TLS 1.0 or TLS 1.1 and | ||||
have already been obsoleted; they are still listed here and marked as | have already been obsoleted; they are still listed here and marked as | |||
updated by this document in order to reiterate that any usage of the | updated by this document in order to reiterate that any usage of the | |||
obsolete protocol should still use modern TLS: | obsolete protocol should use modern TLS: | |||
<xref target="RFC5953"/> | <xref target="RFC3316" format="default" sectionFormat="of" derive | |||
<xref target="RFC5101"/> <xref target="RFC5081"/> | dContent="RFC3316"/>, | |||
<xref target="RFC5077"/> <xref target="RFC4934"/> <xref | <xref target="RFC3489" format="default" sectionFormat="of" derive | |||
target="RFC4572"/> <xref target="RFC4507"/> <xref target="RFC4492"/> | dContent="RFC3489"/>, | |||
<xref target="RFC4366"/> <xref target="RFC4347"/> <xref | <xref target="RFC3546" format="default" sectionFormat="of" derive | |||
target="RFC4244"/> <xref target="RFC4132"/> <xref target="RFC3920"/> | dContent="RFC3546"/>, | |||
<xref target="RFC3734"/> <xref target="RFC3588"/> <xref | <xref target="RFC3588" format="default" sectionFormat="of" derive | |||
target="RFC3546"/> <xref target="RFC3489"/> <xref | dContent="RFC3588"/>, | |||
target="RFC3316"/></t> | <xref target="RFC3734" format="default" sectionFormat="of" deriv | |||
edContent="RFC3734"/>, | ||||
<t>Note that <xref target="RFC4642"/> has already been | <xref target="RFC3920" format="default" sectionFormat="of" derive | |||
updated by <xref target="RFC8143"/>, which makes an overlapping, but | dContent="RFC3920"/>, | |||
<xref target="RFC4132" format="default" sectionFormat="of" derive | ||||
dContent="RFC4132"/>, | ||||
<xref target="RFC4244" format="default" sectionFormat="of" derive | ||||
dContent="RFC4244"/>, | ||||
<xref target="RFC4347" format="default" sectionFormat="of" derive | ||||
dContent="RFC4347"/>, | ||||
<xref target="RFC4366" format="default" sectionFormat="of" derive | ||||
dContent="RFC4366"/>, | ||||
<xref target="RFC4492" format="default" sectionFormat="of" derive | ||||
dContent="RFC4492"/>, | ||||
<xref target="RFC4507" format="default" sectionFormat="of" derive | ||||
dContent="RFC4507"/>, | ||||
<xref target="RFC4572" format="default" sectionFormat="of" derive | ||||
dContent="RFC4572"/>, | ||||
<xref target="RFC4582" format="default" sectionFormat="of" derive | ||||
dContent="RFC4582"/>, | ||||
<xref target="RFC4934" format="default" sectionFormat="of" derive | ||||
dContent="RFC4934"/>, | ||||
<xref target="RFC5077" format="default" sectionFormat="of" derive | ||||
dContent="RFC5077"/>, | ||||
<xref target="RFC5081" format="default" sectionFormat="of" derive | ||||
dContent="RFC5081"/>, | ||||
<xref target="RFC5101" format="default" sectionFormat="of" derive | ||||
dContent="RFC5101"/>, and | ||||
<xref target="RFC5953" format="default" sectionFormat="of" derive | ||||
dContent="RFC5953"/>.</t> | ||||
<t indent="0" pn="section-1.1-5">Note that <xref target="RFC4642" format | ||||
="default" sectionFormat="of" derivedContent="RFC4642"/> has already been | ||||
updated by <xref target="RFC8143" format="default" sectionFormat="of" de | ||||
rivedContent="RFC8143"/>, which makes an overlapping, but | ||||
not quite identical, update as this document.</t> | not quite identical, update as this document.</t> | |||
<t indent="0" pn="section-1.1-6"><xref target="RFC6614" format="default" | ||||
<t><xref target="RFC6614"/> has a requirement for TLSv1.1 or later, alth | sectionFormat="of" derivedContent="RFC6614"/> has a requirement for TLS 1.1 or | |||
ough | later, although it | |||
only makes an informative reference to <xref target="RFC4346"/>. | only makes an informative reference to <xref target="RFC4346" format | |||
This requirement is updated to be for TLSv1.2 or later.</t> | ="default" sectionFormat="of" derivedContent="RFC4346"/>. | |||
This requirement is updated to be for TLS 1.2 or later.</t> | ||||
<t><xref target="RFC6460"/>, <xref target="RFC4744"/>, and <xref target=" | <t indent="0" pn="section-1.1-7"><xref target="RFC6460" format="default" | |||
RFC4743"/> | sectionFormat="of" derivedContent="RFC6460"/>, <xref target="RFC4744" format="d | |||
efault" sectionFormat="of" derivedContent="RFC4744"/>, and <xref target="RFC4743 | ||||
" format="default" sectionFormat="of" derivedContent="RFC4743"/> | ||||
are already Historic; they are still listed here and marked as | are already Historic; they are still listed here and marked as | |||
updated by this document in order to reiterate that any usage of the | updated by this document in order to reiterate that any usage of the | |||
obsolete protocol should still use modern TLS.</t> | obsolete protocol should use modern TLS.</t> | |||
<t indent="0" pn="section-1.1-8">This document updates DTLS <xref target | ||||
<t>This document updates DTLS <xref target="RFC6347"/>. <xref | ="RFC6347" format="default" sectionFormat="of" derivedContent="RFC6347"/>. <xre | |||
target="RFC6347"/> had allowed for negotiating the use of DTLSv1.0, | f target="RFC6347" format="default" sectionFormat="of" derivedContent="RFC6347"/ | |||
> had allowed for negotiating the use of DTLS 1.0, | ||||
which is now forbidden.</t> | which is now forbidden.</t> | |||
<t indent="0" pn="section-1.1-9">The DES and International Data Encrypti | ||||
<t>The DES and IDEA cipher suites specified in <xref | on Algorithm (IDEA) cipher suites | |||
target="RFC5469"/> were specifically removed from TLSv1.2 by | specified in <xref target="RFC5469" format="default" sectionFormat="of" d | |||
<xref target="RFC5246"/>; since the only versions of TLS for which | erivedContent="RFC5469"/> were specifically removed from TLS 1.2 by | |||
their usage is defined are now Historic, RFC 5469 (will be|has been) | <xref target="RFC5246" format="default" sectionFormat="of" derivedConten | |||
t="RFC5246"/>; since the only versions of TLS for which | ||||
their usage is defined are now Historic, <xref target="RFC5469" format=" | ||||
default" sectionFormat="of" derivedContent="RFC5469"/> has been | ||||
moved to Historic as well.</t> | moved to Historic as well.</t> | |||
<t indent="0" pn="section-1.1-10">The version-fallback Signaling Cipher | ||||
<t>The version-fallback Signaling Cipher Suite Value specified in | Suite Value specified in | |||
<xref target="RFC7507"/> was defined to detect when a given client | <xref target="RFC7507" format="default" sectionFormat="of" derivedConten | |||
t="RFC7507"/> was defined to detect when a given client | ||||
and server negotiate a lower version of (D)TLS than their highest | and server negotiate a lower version of (D)TLS than their highest | |||
shared version. TLSv1.3 (<xref target="RFC8446"/>) incorporates a | shared version. TLS 1.3 (<xref target="RFC8446" format="default" sectio nFormat="of" derivedContent="RFC8446"/>) incorporates a | |||
different mechanism that achieves this purpose, via sentinel values in | different mechanism that achieves this purpose, via sentinel values in | |||
the ServerHello.Random field. With (D)TLS versions prior to 1.2 fully | the ServerHello.Random field. With (D)TLS versions prior to 1.2 fully | |||
deprecated, the only way for (D)TLS implementations to negotiate a | deprecated, the only way for (D)TLS implementations to negotiate a | |||
lower version than their highest shared version would be to negotiate | lower version than their highest shared version would be to negotiate | |||
(D)TLSv1.2 while supporting (D)TLSv1.3; supporting (D)TLSv1.3 implies | (D)TLS 1.2 while supporting (D)TLS 1.3; supporting (D)TLS 1.3 implies | |||
support for the ServerHello.Random mechanism. Accordingly, the | support for the ServerHello.Random mechanism. Accordingly, the | |||
functionality from <xref target="RFC7507"/> has been superseded, and | functionality from <xref target="RFC7507" format="default" sectionFormat ="of" derivedContent="RFC7507"/> has been superseded, and | |||
this document marks it as Obsolete.</t> | this document marks it as Obsolete.</t> | |||
</section> | </section> | |||
<section numbered="true" toc="include" removeInRFC="false" pn="section-1.2 | ||||
<section title="Terminology"> | "> | |||
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | <name slugifiedName="name-terminology">Terminology</name> | |||
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and | <t indent="0" pn="section-1.2-1"> | |||
"OPTIONAL" in this document are to be interpreted as described in BCP | The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQU | |||
14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only | IRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL NOT</bcp14>", "<bcp14>SHOUL | |||
when, they appear in all capitals, as shown here.</t> | D</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>N | |||
OT RECOMMENDED</bcp14>", | ||||
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to | ||||
be interpreted as | ||||
described in BCP 14 <xref target="RFC2119" format="default" sectionFormat="o | ||||
f" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFor | ||||
mat="of" derivedContent="RFC8174"/> | ||||
when, and only when, they appear in all capitals, as shown here. | ||||
</t> | ||||
</section> | </section> | |||
</section> | </section> | |||
<section numbered="true" toc="include" anchor="support" removeInRFC="false" | ||||
<section title="Support for Deprecation"> | pn="section-2"> | |||
<!-- Removing per WGLC Feedback from Martin Thomson | <name slugifiedName="name-support-for-deprecation">Support for Deprecation | |||
<t>Industry has actively followed guidance provided by NIST and the PCI | </name> | |||
Council to deprecate TLSv1.0 and TLSv1.1 by June 30, 2018. TLSv1.2 | <t indent="0" pn="section-2-1">Specific details on attacks against TLS 1.0 | |||
should remain a minimum baseline for TLS support at this time.</t> | and TLS 1.1, as well as | |||
--> | their mitigations, are provided in <xref target="NIST800-52r2" format="def | |||
ault" sectionFormat="of" derivedContent="NIST800-52r2"/>, | ||||
<t>Specific details on attacks against TLSv1.0 and TLSv1.1, as well as | <xref target="RFC7457" format="default" sectionFormat="of" derivedContent= | |||
their mitigations, are provided in <xref target="NIST800-52r2"/>, | "RFC7457"/>, and other | |||
RFC 7457 <xref target="RFC7457"/> and other | ||||
RFCs referenced therein. Although mitigations for the current known | RFCs referenced therein. Although mitigations for the current known | |||
vulnerabilities have been developed, any future issues discovered in old | vulnerabilities have been developed, any future issues discovered in old | |||
protocol versions might not be mitigated in older library versions when | protocol versions might not be mitigated in older library versions when | |||
newer library versions do not support those old protocols.</t> | newer library versions do not support those old protocols.</t> | |||
<t indent="0" pn="section-2-2">For example, NIST has provided the followin | ||||
<!-- | g rationale, copied with | |||
Note that the use of "TLS 1.1" etc in the NIST quote below is | permission from Section 1.1, "History of TLS", of <xref target="NIST800-52 | |||
deliberately not as used elsewhere in this document where we try | r2" format="default" sectionFormat="of" derivedContent="NIST800-52r2"/>: | |||
be consistent with e.g. "TLSv1.1" - that's just because this | </t> | |||
is a quote from NIST. | <blockquote pn="section-2-3"> | |||
--> | <t indent="0" pn="section-2-3.1">TLS 1.1, specified in RFC 4346 [24], wa | |||
s developed to | ||||
<t>NIST for example has provided the following rationale, copied with | ||||
permission from <xref target="NIST800-52r2"/>, | ||||
section 1.2 "History of TLS" (with references changed for RFC | ||||
formatting). | ||||
<list> | ||||
<t>TLS 1.1, specified in <xref target="RFC4346"/>, was developed to | ||||
address weaknesses discovered in TLS 1.0, primarily in the areas of | address weaknesses discovered in TLS 1.0, primarily in the areas of | |||
initialization vector selection and padding error processing. | initialization vector selection and padding error processing. | |||
Initialization vectors were made explicit to prevent a certain class | Initialization vectors were made explicit to prevent a certain class | |||
of attacks on the Cipher Block Chaining (CBC) mode of operation used | of attacks on the Cipher Block Chaining (CBC) mode of operation used | |||
by TLS. The handling of padding errors was altered to treat a | by TLS. The handling of padding errors was altered to treat a | |||
padding error as a bad message authentication code, rather than a | padding error as a bad message authentication code rather than a | |||
decryption failure. In addition, the TLS 1.1 RFC acknowledges | decryption failure. In addition, the TLS 1.1 RFC acknowledges | |||
attacks on CBC mode that rely on the time to compute the message | attacks on CBC mode that rely on the time to compute the message | |||
authentication code (MAC). The TLS 1.1 specification states that to | authentication code (MAC). The TLS 1.1 specification states that to | |||
defend against such attacks, an implementation must process records | defend against such attacks, an implementation must process records | |||
in the same manner regardless of whether padding errors exist. | in the same manner regardless of whether padding errors exist. | |||
Further implementation considerations for CBC modes (which were not | Further implementation considerations for CBC modes (which were not | |||
included in <xref target="RFC4346">RFC4346</xref>) are discussed in | included in RFC 4346 [24]) are discussed in | |||
Section 3.3.2.</t> | Section 3.3.2.</t> | |||
<t indent="0" pn="section-2-3.2">TLS 1.2, specified in RFC 5246 [25], ma | ||||
<!--subcompact="yes" above isn't nice here - add lines --> | de | |||
<t/> | ||||
<t>TLSv1.2, specified in <xref target="RFC5246">RFC5246</xref>, made | ||||
several cryptographic enhancements, particularly in the area of hash | several cryptographic enhancements, particularly in the area of hash | |||
functions, with the ability to use or specify the SHA-2 family | functions, with the ability to use or specify the SHA-2 family of | |||
algorithms for hash, MAC, and Pseudorandom Function (PRF) | algorithms for hash, MAC, and Pseudorandom Function (PRF) | |||
computations. TLSv1.2 also adds authenticated encryption with | computations. TLS 1.2 also adds authenticated encryption with | |||
associated data (AEAD) cipher suites.</t> | associated data (AEAD) cipher suites.</t> | |||
<t indent="0" pn="section-2-3.3">TLS 1.3, specified in RFC 8446 [57], | ||||
<t/> | ||||
<t>TLSv1.3, specified in <xref target="RFC8446">TLSv1.3</xref>, | ||||
represents a significant change to TLS that aims to address threats | represents a significant change to TLS that aims to address threats | |||
that have arisen over the years. Among the changes are a new | that have arisen over the years. Among the changes are a new handshak | |||
handshake protocol, a new key derivation process that uses the | e protocol, a new key derivation process that uses the HMAC-based Extract-and-Ex | |||
HMAC-based Extract-and-Expand Key Derivation Function (HKDF), and | pand Key Derivation Function (HKDF) [37], and the removal of cipher suites that | |||
the removal of cipher suites that use static RSA or DH key | use RSA key transport or static Diffie-Hellman ( DH) [sic] key exchanges, the CB | |||
exchanges, the CBC mode of operation, or SHA-1. The list of | C mode of operation, or SHA-1. Many extensions defined for use with TLS 1.2 and | |||
extensions that can be used with TLSv1.3 has been reduced | previous versions cannot be used with TLS 1.3.</t> | |||
considerably.</t> | </blockquote> | |||
</list></t> | ||||
<!-- | ||||
<t>The German Federal Office for Information Security, recommends | ||||
against use of TLS versions less than 1.2 in the publication <xref | ||||
target="TR-02102-2">Cryptographic Mechanisms: Recommendations and Key | ||||
Lengths</xref>.</t> | ||||
<!-- Removing per WGLC feedback from Martin Thomson | ||||
<t>The Canadian government treasury board have also mandated that these | ||||
old versions of TLS not be used. <xref target="Canada"/></t> | ||||
<t>Various companies and web sites have announced plans to deprecate | ||||
these old versions of TLS.</t> | ||||
--> | ||||
</section> | ||||
<!-- | ||||
removing as per IETF-103 meeting | ||||
<section title="Removing Support"> | ||||
<t>[[This section can be removed upon publication - or maybe keep it?]]</t | ||||
> | ||||
<t>Support for TLSv1.0 has been removed by the July 2018 PCI deadline from | ||||
the | ||||
following standards, products, and services:</t> | ||||
<t><list style="symbols"> | ||||
<t>3GPP 5G</t> | ||||
<t>Amazon Elastic Load Balancing <xref target="Amazon"/></t> | ||||
<t>CloudFlare <xref target="CloudFlare"/></t> | ||||
<t>Digicert <xref target="Digicert"/></t> | ||||
<t>GitHub <xref target="GIT"/></t> | ||||
<t>KeyCDN <xref target="KeyCDN"/></t> | ||||
<t>PayPal <xref target="paypal"/></t> | ||||
<t>Stripe <xref target="stripe"/></t> | ||||
<t>Google Chrome <xref target="chrome"/></t> | ||||
<t>Microsoft Edge <xref target="edge"/></t> | ||||
<t>[[Numerous web sites...]]</t> | ||||
</list></t> | ||||
<t>Many web sites have taken the action of including the deprecation of | ||||
TLSv1.1 into their plans for deprecating TLSv1.0 for the PCI council | ||||
deadline. Support for TLSv1.1 has been removed by the July 2018 PCI deadli | ||||
ne | ||||
from the following standards, products, and services:</t> | ||||
<t><list style="symbols"> | ||||
<t>3GPP 5G Release 16</t> | ||||
<t>Amazon Elastic Load Balancing <xref target="Amazon"/></t> | ||||
<t>CloudFlare <xref target="CloudFlare"/></t> | ||||
<t>GitHub <xref target="GIT"/></t> | ||||
<t>PayPal <xref target="paypal"/></t> | ||||
<t>Stripe <xref target="stripe"/></t> | ||||
<t>[[Numerous web sites...]]</t> | ||||
</list></t> | ||||
</section> | ||||
--> | ||||
<!-- | ||||
removing as per IETF-103 meeting | ||||
<section title="Usage"> | ||||
<t>[[This section can be removed upon publication - or maybe keep it?]]</t | ||||
> | ||||
<section title="Web"> | ||||
<t>Usage statistics for TLSv1.0 and TLSv1.1 on the publ | ||||
ic web vary, but have | ||||
been in general very low and declined fu | ||||
rther with the impending | ||||
PCI deadline to migrate off of TLSv1.0 by June 30, 2018. As of January | ||||
2018, <xref target="StackExchange"/> quoted 4 percent | ||||
of browsers using TLSv1.0.</t> | ||||
<t> The number of websites supporting TLSv1.2 is still growing (+0.4%), and | ||||
has | ||||
reached 92% according to sslpulse as of June 19, 2018. | ||||
<xref target="SSLpulse"/> Deprecating TLS 1.0 and | ||||
TLS 1.1 will thus not have a major impact on browser or web server | ||||
implementations. | ||||
</t> | ||||
--> | ||||
<!-- | ||||
<t><xref target="Alexa">The Top 1 Million Analysis</xref> from | ||||
February 2018 shows that for the sites surveyed, the vast majority | ||||
support TLSv1.2 (97.9 percent), with a mere 2.0 percent using TLSv1.0 | ||||
and an even smaller percentage using TLSv1.1. | ||||
--> | ||||
<!-- | ||||
<t><xref target="web-stats"/> presents statistics for use of TLS versions | ||||
in the web.</t> | ||||
<figure anchor="web-stats" title="Web Statistics" > | ||||
<artwork><![CDATA[ | ||||
+- - - - - - - - - - - - - - - - +- - - - - - - - - - +- - - - - - +- - - - - - | ||||
- +- - - - - - - +- - - - - - - +- - - - - - - + | ||||
| Name/Ref | Date | SSLv3|TLSv1.0|TLSv1.1|TLSv1.2|TLSv1.3| | ||||
+- - - - - - - - - - - - - - - - +- - - - - - - - - - +- - - - - - +- - - - - - | ||||
- +- - - - - - - +- - - - - - - +- - - - - - - + | ||||
! Alexa [1] | 20180226 | - | 2.0 | <0.1 | 97.9 | - | | ||||
| Cloudflare [2] | 20180518 | 0.0 | 9.3 | 0.2 | 84.9 | 5.5 | | ||||
| Firefox [3] | 20180709 | - | 1.0 | - | 94.0 | 5.0 | | ||||
| Chrome [4] | 20180711 | - | 0.4 | <0.1 | - | core - | | ||||
+- - - - - - - - - - - - - - - - +- - - - - - - - - - +- - - - - - +- - - - - - | ||||
- +- - - - - - - +- - - - - - - +- - - - - - - + | ||||
[https://scotthelme.co.uk/alexa-top-1-million-analysis-february-2018/ | ||||
[2] https://www.ietf.org/mail-archive/web/tls/current/msg26578.html | ||||
[3] https://www.ietf.org/mail-archive/web/tls/current/msg26575.html | ||||
[4] https://www.ietf.org/mail-archive/web/tls/current/msg26620.html | ||||
]]></artwork> | ||||
</figure> | ||||
</section> | ||||
<section title="Mail"> | ||||
<t>E-Mail uses TLS for SMTP, submission (port 587 | ||||
), POP/POP3 and IMAP. | ||||
Typically email deployments lag p | ||||
ublic web deployments in | ||||
terms of the rate of adoption of | ||||
new TLS versions. | ||||
<xref target="mail-stats"/> presents statistics for use of TLS versions i | ||||
n the email applications.</t> | ||||
<!-- | ||||
<t>In one 2018 ZMap-based study <xref target="clu | ||||
sters"/> of | ||||
~200,000 mail server IP addresses | ||||
in 10 countries, use | ||||
of TLSv1.0 for various TLS servic | ||||
es (both web and mail) | ||||
on IP addresses that host some ma | ||||
il service was seen at | ||||
10.6%. Use of TLSv1.1 was negligi | ||||
ble - at 0.01%, for | ||||
TLSv1.1, SSLv3 was twice as common | ||||
. TLSv1.2 was used for 89.3% of | ||||
services and no TLSv1.3 was seen. | ||||
</t> | ||||
--> | ||||
<!-- | ||||
<figure anchor="mail-stats" title="Mail Statistics" > | ||||
<artwork><![CDATA[ | ||||
+- - - - - - - - - - - - - - - - +- - - - - - - - - - +- - - - - - +- - - - - - | ||||
- +- - - - - - - +- - - - - - - +- - - - - - - + | ||||
| Name/Ref | Date | SSLv3|TLSv1.0|TLSv1.1|TLSv1.2|TLSv1.3| | ||||
+- - - - - - - - - - - - - - - - +- - - - - - - - - - +- - - - - - +- - - - - - | ||||
- +- - - - - - - +- - - - - - - +- - - - - - - + | ||||
| Clusters [1] | 20180316 | <0.1 | 10.6 | <0.1 | 89.3 | - | | ||||
| TLSA [2] | 20180710 | - | 1.4 | 0.1 | 98.5 | - | | ||||
| UK-ESP [3] | 20180710 | - | 19.9 | <0.1 | - | - | | ||||
+- - - - - - - - - - - - - - - - +- - - - - - - - - - +- - - - - - +- - - - - - | ||||
- +- - - - - - - +- - - - - - - +- - - - - - - + | ||||
[1] https://eprint.iacr.org/2018/299 | ||||
[2] https://www.ietf.org/mail-archive/web/tls/current/msg26603.html | ||||
[3] https://www.ietf.org/mail-archive/web/tls/current/msg26603.html | ||||
]]></artwork> | ||||
</figure> | ||||
</section> | ||||
<section title="Operating Systems"> | ||||
<t><xref target="os-stats"/> presents statistics for use of TLS versions | ||||
in operating systems.</t> | ||||
<figure anchor="os-stats" title="Operating System Statistics" > | ||||
<artwork><![CDATA[ | ||||
+- - - - - - - - - - - - - - - - +- - - - - - - - - - +- - - - - - +- - - - - - | ||||
- +- - - - - - - +- - - - - - - +- - - - - - - + | ||||
| Name/Ref | Date | SSLv3|TLSv1.0|TLSv1.1|TLSv1.2|TLSv1.3| | ||||
+- - - - - - - - - - - - - - - - +- - - - - - - - - - +- - - - - - +- - - - - - | ||||
- +- - - - - - - +- - - - - - - +- - - - - - - + | ||||
| Windows cli [1]| 20180709 | - | >10.0 | ~0.3 | - | - | | ||||
| Windows svr [1]| 20180709 | - | ~1.5 | ~0.0 | - | - | | ||||
| Apple [2] | 20180709 | - | 0.4 | - | 99.6 | - | | ||||
+- - - - - - - - - - - - - - - - +- - - - - - - - - - +- - - - - - +- - - - - - | ||||
- +- - - - - - - +- - - - - - - +- - - - - - - + | ||||
[1] https://www.ietf.org/mail-archive/web/tls/current/msg26577.html | ||||
[2] https://www.ietf.org/mail-archive/web/tls/current/msg26634.html | ||||
]]></artwork> | ||||
</figure> | ||||
</section> | ||||
<section title="Enterprise Networks"> | ||||
<t><xref target="intra-stats"/> presents statistics for use of TLS versio | ||||
ns in the enterprise networks. | ||||
The tcd.ie numbers below were the result of a student pro | ||||
ject and need further validation.</t> | ||||
<figure anchor="intra-stats" title="Enterprise Network Statistics" > | ||||
<artwork><![CDATA[ | ||||
+- - - - - - - - - - - - - - - - +- - - - - - - - - - +- - - - - - +- - - - - - | ||||
- +- - - - - - - +- - - - - - - +- - - - - - - + | ||||
| Name/Ref | Date | SSLv3|TLSv1.0|TLSv1.1|TLSv1.2|TLSv1.3| | ||||
+- - - - - - - - - - - - - - - - +- - - - - - - - - - +- - - - - - +- - - - - - | ||||
- +- - - - - - - +- - - - - - - +- - - - - - - + | ||||
| tcd.ie [1] | 20180713 | 18.0 | 35.0 | 0 | 45.0 | 0 | | ||||
+- - - - - - - - - - - - - - - - +- - - - - - - - - - +- - - - - - +- - - - - - | ||||
- +- - - - - - - +- - - - - - - +- - - - - - - + | ||||
[1] https://www.ietf.org/mail-archive/web/tls/current/msg26633.html | ||||
]]></artwork> | ||||
</figure> | ||||
</section> | ||||
</section> | </section> | |||
--> | <section numbered="true" toc="include" anchor="sha-1" removeInRFC="false" pn | |||
="section-3"> | ||||
<section title="SHA-1 Usage Problematic in TLSv1.0 and TLSv1.1"> | <name slugifiedName="name-sha-1-usage-problematic-in-">SHA-1 Usage Problem | |||
<t>The integrity of both TLSv1.0 and TLSv1.1 depends on a running SHA-1 | atic in TLS 1.0 and TLS 1.1</name> | |||
<t indent="0" pn="section-3-1">The integrity of both TLS 1.0 and TLS 1.1 d | ||||
epends on a running SHA-1 | ||||
hash of the exchanged messages. This makes it possible to perform a | hash of the exchanged messages. This makes it possible to perform a | |||
downgrade attack on the handshake by an attacker able to perform 2^77 | downgrade attack on the handshake by an attacker able to perform 2<sup>77< /sup> | |||
operations, well below the acceptable modern security margin.</t> | operations, well below the acceptable modern security margin.</t> | |||
<t indent="0" pn="section-3-2">Similarly, the authentication of the handsh | ||||
<t>Similarly, the authentication of the handshake depends on signatures | ake depends on signatures | |||
made using a SHA-1 hash or a not appreciably stronger concatenation of MD- | made using a SHA-1 hash or a concatenation of MD5 and SHA-1 | |||
5 and SHA-1 | hashes that is not appreciably stronger than a SHA-1 hash, allowing the at | |||
hashes, allowing the attacker to impersonate a server when it is able to | tacker to impersonate a server when it is able to | |||
break the severely weakened SHA-1 hash.</t> | break the severely weakened SHA-1 hash.</t> | |||
<t indent="0" pn="section-3-3">Neither TLS 1.0 nor TLS 1.1 allows the peer | ||||
<t>Neither TLSv1.0 nor TLSv1.1 allow the peers to select a stronger hash | s to select a stronger hash | |||
for signatures in the ServerKeyExchange or CertificateVerify messages, | for signatures in the ServerKeyExchange or CertificateVerify messages, | |||
making the only upgrade path the use of a newer protocol version.</t> | making the only upgrade path the use of a newer protocol version.</t> | |||
<t indent="0" pn="section-3-4">See <xref target="Bhargavan2016" format="de | ||||
<t>See <xref target="Bhargavan2016"/> for additional detail.</t> | fault" sectionFormat="of" derivedContent="Bhargavan2016"/> for additional detail | |||
s.</t> | ||||
</section> | </section> | |||
<section numbered="true" toc="include" removeInRFC="false" pn="section-4"> | ||||
<section title="Do Not Use TLSv1.0"> | <name slugifiedName="name-do-not-use-tls-10">Do Not Use TLS 1.0</name> | |||
<t>TLSv1.0 MUST NOT be used. <!-- I didn't get the reason for this here: < | <t indent="0" pn="section-4-1">TLS 1.0 <bcp14>MUST NOT</bcp14> be used. | |||
xref target="RFC8174"/>. --> | Negotiation of TLS 1.0 from any version of TLS <bcp14>MUST NOT</bcp14> be | |||
Negotiation of TLSv1.0 from any version of TLS MUST NOT be | ||||
permitted.</t> | permitted.</t> | |||
<t indent="0" pn="section-4-2">Any other version of TLS is more secure tha | ||||
<t>Any other version of TLS is more secure than TLSv1.0. While TLSv1.0 can | n TLS 1.0. While TLS 1.0 can be | |||
be | ||||
configured to prevent some types of interception, using the highest versio n | configured to prevent some types of interception, using the highest versio n | |||
available is preferred.</t> | available is preferred.</t> | |||
<t indent="0" pn="section-4-3">Pragmatically, clients <bcp14>MUST NOT</bcp | ||||
<t>Pragmatically, clients MUST NOT send a ClientHello with | 14> send a ClientHello with | |||
ClientHello.client_version set to {03,01}. Similarly, servers MUST NOT | ClientHello.client_version set to {03,01}. Similarly, servers <bcp14>MUST | |||
send a ServerHello with ServerHello.server_version set to {03,01}. Any | NOT</bcp14> | |||
send a ServerHello with ServerHello.server_version set to {03,01}. Any | ||||
party receiving a Hello message with the protocol version set to {03,01} | party receiving a Hello message with the protocol version set to {03,01} | |||
MUST respond with a "protocol_version" alert message and close the | <bcp14>MUST</bcp14> respond with a "protocol_version" alert message and cl ose the | |||
connection.</t> | connection.</t> | |||
<t indent="0" pn="section-4-4">Historically, TLS specifications were not c | ||||
<t>Historically, TLS specifications were not clear on what the record | lear on what the record | |||
layer version number (TLSPlaintext.version) could contain when sending | layer version number (TLSPlaintext.version) could contain when sending | |||
ClientHello. Appendix E of [RFC5246] notes that TLSPlaintext.version | a ClientHello message. <xref target="RFC5246" sectionFormat="of" section=" E" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5246#appendix-E" derivedContent="RFC5246"/> notes that TLSPlaintext.version | |||
could be selected to maximize interoperability, though no definitive | could be selected to maximize interoperability, though no definitive | |||
value is identified as ideal. That guidance is still applicable; | value is identified as ideal. That guidance is still applicable; | |||
therefore, TLS servers MUST accept any value {03,XX} (including {03,00}) | therefore, TLS servers <bcp14>MUST</bcp14> accept any value {03,XX} (inclu | |||
as the record layer version number for ClientHello, but they MUST NOT | ding {03,00}) | |||
negotiate TLSv1.0.</t> | as the record layer version number for ClientHello, but they <bcp14>MUST N | |||
OT</bcp14> | ||||
<!-- | negotiate TLS 1.0.</t> | |||
<t>[[Text here is derived (or stolen:-) from <xref target="RFC7568"/>]] | ||||
</t> | ||||
--> | ||||
</section> | </section> | |||
<section numbered="true" toc="include" removeInRFC="false" pn="section-5"> | ||||
<section title="Do Not Use TLSv1.1"> | <name slugifiedName="name-do-not-use-tls-11">Do Not Use TLS 1.1</name> | |||
<t>TLSv1.1 MUST NOT be used. Negotiation of TLSv1.1 from any version of | <t indent="0" pn="section-5-1">TLS 1.1 <bcp14>MUST NOT</bcp14> be used. Ne | |||
TLS MUST NOT be permitted.</t> | gotiation of TLS 1.1 from any version of | |||
TLS <bcp14>MUST NOT</bcp14> be permitted.</t> | ||||
<t>Pragmatically, clients MUST NOT send a ClientHello with | <t indent="0" pn="section-5-2">Pragmatically, clients <bcp14>MUST NOT</bcp | |||
ClientHello.client_version set to {03,02}. Similarly, servers MUST NOT | 14> send a ClientHello with | |||
send a ServerHello with ServerHello.server_version set to {03,02}. Any | ClientHello.client_version set to {03,02}. Similarly, servers <bcp14>MUST | |||
NOT</bcp14> | ||||
send a ServerHello with ServerHello.server_version set to {03,02}. Any | ||||
party receiving a Hello message with the protocol version set to {03,02} | party receiving a Hello message with the protocol version set to {03,02} | |||
MUST respond with a "protocol_version" alert message and close the | <bcp14>MUST</bcp14> respond with a "protocol_version" alert message and cl ose the | |||
connection.</t> | connection.</t> | |||
<t indent="0" pn="section-5-3">Any newer version of TLS is more secure tha | ||||
<t>Any newer version of TLS is more secure than TLSv1.1. While TLSv1.1 can | n TLS 1.1. While TLS 1.1 can be | |||
be | ||||
configured to prevent some types of interception, using the highest versio n | configured to prevent some types of interception, using the highest versio n | |||
available is preferred. Support for TLSv1.1 is dwindling in libraries | available is preferred. Support for TLS 1.1 is dwindling in libraries | |||
and will impact security going forward if mitigations for attacks cannot | and will impact security going forward if mitigations for attacks cannot | |||
be easily addressed and supported in older libraries.</t> | be easily addressed and supported in older libraries.</t> | |||
<t indent="0" pn="section-5-4">Historically, TLS specifications were not c | ||||
<t>Historically, TLS specifications were not clear on what the record | lear on what the record | |||
layer version number (TLSPlaintext.version) could contain when sending | layer version number (TLSPlaintext.version) could contain when sending | |||
ClientHello. Appendix E of [RFC5246] notes that TLSPlaintext.version | a ClientHello message. <xref target="RFC5246" sectionFormat="of" section=" E" format="default" derivedLink="https://rfc-editor.org/rfc/rfc5246#appendix-E" derivedContent="RFC5246"/> notes that TLSPlaintext.version | |||
could be selected to maximize interoperability, though no definitive | could be selected to maximize interoperability, though no definitive | |||
value is identified as ideal. That guidance is still applicable; | value is identified as ideal. That guidance is still applicable; | |||
therefore, TLS servers MUST accept any value {03,XX} (including {03,00}) | therefore, TLS servers <bcp14>MUST</bcp14> accept any value {03,XX} (inclu | |||
as the record layer version number for ClientHello, but they MUST NOT | ding {03,00}) | |||
negotiate TLSv1.1.</t> | as the record layer version number for ClientHello, but they <bcp14>MUST N | |||
</section> | OT</bcp14> | |||
negotiate TLS 1.1.</t> | ||||
<!-- | ||||
<section title="Do Not Use SHA-1 in TLSv1.2"> | ||||
<t>[[This section was suggested in PR#2 for the pre-WG draft repo | ||||
by Hubert Kario. We're not | ||||
clear if the WG would like this draft to include | ||||
this or not, | ||||
so will ask the TLS WG at the appropriate time.]] | ||||
</t> | ||||
<t>SHA-1 as a signature hash MUST NOT be used. That means that | ||||
clients MUST send signature_algorithms extension and that extension | ||||
MUST NOT include pairs that include SHA-1 hash. In particular, | ||||
values {2, 1}, {2, 2} and {2, 3} MUST NOT be present in the | ||||
extension.</t> | ||||
<t>Note: this does not affect cipher suites that use SHA-1 HMAC for | ||||
data integrity as the HMAC construction is still considered secure | ||||
and when they are used in TLSv1.2 SHA-256 is used for handshake | ||||
integrity.</t> | ||||
</section> | </section> | |||
--> | <section numbered="true" toc="include" removeInRFC="false" pn="section-6"> | |||
<name slugifiedName="name-updates-to-rfc-7525">Updates to RFC 7525</name> | ||||
<section title="Updates to RFC 7525"> | <t indent="0" pn="section-6-1"><xref target="RFC7525" format="default" sec | |||
<!-- | tionFormat="of" derivedContent="RFC7525">"Recommendations for Secure Use of Tran | |||
<t>[[Since RFC7525 is BCP 195, there'll probably be some process-fun to | sport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)"</xref> | |||
do an update of that. Formally, it may be that this document becomes a | is BCP 195, which is the | |||
new part of BCP 195 I guess, but we can figure that out with chairs and | most recent Best Current Practice for implementing TLS and was based on | |||
ADs.]]</t> | TLS 1.2. At the time of publication, TLS 1.0 and TLS 1.1 had not yet | |||
--> | ||||
<t>RFC7525 is BCP 195, "Recommendations for Secure Use of Transport Layer | ||||
Security (TLS) and Datagram Transport Layer Security (DTLS)", which is the | ||||
most recent best practice document for implementing TLS and was based on | ||||
TLSv1.2. At the time of publication, TLSv1.0 and TLSv1.1 had not yet | ||||
been deprecated. As such, BCP 195 is called out specifically to | been deprecated. As such, BCP 195 is called out specifically to | |||
update text implementing the deprecation recommendations of this | update text implementing the deprecation recommendations of this | |||
document.</t> | document.</t> | |||
<t indent="0" pn="section-6-2">This document updates <xref target="RFC7525 | ||||
<t>This document updates <xref target="RFC7525"/> Section 3.1.1 | " sectionFormat="of" section="3.1.1" format="default" derivedLink="https://rfc-e | |||
changing SHOULD NOT to MUST NOT as follows:</t> | ditor.org/rfc/rfc7525#section-3.1.1" derivedContent="RFC7525"/> by | |||
changing <bcp14>SHOULD NOT</bcp14> to <bcp14>MUST NOT</bcp14> as follows:< | ||||
<t><list style="symbols"> | /t> | |||
<t>Implementations MUST NOT negotiate TLS version 1.0 <xref | <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-6-3 | |||
target="RFC2246"/>. <vspace blankLines="1"/> Rationale: TLSv1.0 | "> | |||
<li pn="section-6-3.1"> | ||||
<t indent="0" pn="section-6-3.1.1">Implementations <bcp14>MUST NOT</bc | ||||
p14> negotiate TLS version 1.0 <xref target="RFC2246" format="default" sectionFo | ||||
rmat="of" derivedContent="RFC2246"/>.</t> | ||||
<t indent="0" pn="section-6-3.1.2"> Rationale: TLS 1.0 | ||||
(published in 1999) does not support many modern, strong cipher | (published in 1999) does not support many modern, strong cipher | |||
suites. In addition, TLSv1.0 lacks a per- record Initialization | suites. In addition, TLS 1.0 lacks a per-record Initialization | |||
Vector (IV) for CBC-based cipher suites and does not warn against | Vector (IV) for CBC-based cipher suites and does not warn against | |||
common padding errors. <vspace blankLines="1"/></t> | common padding errors. </t> | |||
</li> | ||||
<t>Implementations MUST NOT negotiate TLS version 1.1 <xref | <li pn="section-6-3.2"> | |||
target="RFC4346"/>. <vspace blankLines="1"/> Rationale: TLSv1.1 | <t indent="0" pn="section-6-3.2.1">Implementations <bcp14>MUST NOT</bc | |||
(published in 2006) is a security improvement over TLSv1.0 but still | p14> negotiate TLS version 1.1 <xref target="RFC4346" format="default" sectionFo | |||
rmat="of" derivedContent="RFC4346"/>. </t> | ||||
<t indent="0" pn="section-6-3.2.2"> Rationale: TLS 1.1 | ||||
(published in 2006) is a security improvement over TLS 1.0 but still | ||||
does not support certain stronger cipher suites.</t> | does not support certain stronger cipher suites.</t> | |||
</list></t> | </li> | |||
</ul> | ||||
<t>This documents updates <xref target="RFC7525"/> Section 3.1.2 | <t indent="0" pn="section-6-4">This document updates <xref target="RFC7525 | |||
changing SHOULD NOT to MUST NOT as follows:</t> | " sectionFormat="of" section="3.1.2" format="default" derivedLink="https://rfc-e | |||
ditor.org/rfc/rfc7525#section-3.1.2" derivedContent="RFC7525"/> by | ||||
<t><list style="symbols"> | changing <bcp14>SHOULD NOT</bcp14> to <bcp14>MUST NOT</bcp14> and adding a | |||
<t>Implementations MUST NOT negotiate DTLS version 1.0 <xref | reference to RFC 6347 as follows:</t> | |||
target="RFC4347"/>, <xref target="RFC6347"/>. <vspace | <ul spacing="normal" bare="false" empty="false" indent="3" pn="section-6-5 | |||
blankLines="1"/> Version 1.0 of DTLS correlates to version 1.1 of | "> | |||
<li pn="section-6-5.1"> | ||||
<t indent="0" pn="section-6-5.1.1">Implementations <bcp14>MUST NOT</bc | ||||
p14> negotiate DTLS version 1.0 <xref target="RFC4347" format="default" sectionF | ||||
ormat="of" derivedContent="RFC4347"/> <xref target="RFC6347" format="default" se | ||||
ctionFormat="of" derivedContent="RFC6347"/>. </t> | ||||
<t indent="0" pn="section-6-5.1.2"> Version 1.0 of DTLS correlates to | ||||
version 1.1 of | ||||
TLS (see above).</t> | TLS (see above).</t> | |||
</list></t> | </li> | |||
</ul> | ||||
</section> | </section> | |||
<section numbered="true" toc="include" removeInRFC="false" pn="section-7"> | ||||
<name slugifiedName="name-operational-considerations">Operational Consider | ||||
ations</name> | ||||
<t indent="0" pn="section-7-1"> | ||||
<section title="Operational Considerations"> | This document is part of BCP 195 and, as such, reflects the | |||
understanding of the IETF (at the time of this document's publicatio | ||||
<t> | n) as to the | |||
This document is part of BCP 195, and as such reflects the | ||||
understanding of the IETF (at the time of its publication) as to the | ||||
best practices for TLS and DTLS usage. | best practices for TLS and DTLS usage. | |||
</t> | </t> | |||
<t indent="0" pn="section-7-2"> | ||||
<t> | Though TLS 1.1 has been obsolete since the publication of <xref targ | |||
Though TLSv1.1 has been obsolete since the publication of RFC 5246 | et="RFC5246" format="default" sectionFormat="of" derivedContent="RFC5246"/> | |||
in 2008, and DTLSv1.0 has been obsolete since the publication of RFC | in 2008, and DTLS 1.0 has been obsolete since the publication of <xr | |||
6347 in 2012, there may remain some systems in operation that do not | ef target="RFC6347" format="default" sectionFormat="of" derivedContent="RFC6347" | |||
support (D)TLSv1.2 or higher. Adopting the practices recommended by | /> in 2012, there may remain some | |||
systems in operation that do not | ||||
support (D)TLS 1.2 or higher. Adopting the practices recommended by | ||||
this document for any systems that need to communicate with the | this document for any systems that need to communicate with the | |||
aforementioned class of systems will cause failure to interoperate. | aforementioned class of systems will cause failure to interoperate. | |||
However, disregarding the recommendations of this document in order | However, disregarding the recommendations of this document in order | |||
to continue to interoperate with the aforementioned class of systems | to continue to interoperate with the aforementioned class of systems | |||
incurs some amount of risk. The nature of the risks incurred by | incurs some amount of risk. The nature of the risks incurred by | |||
operating in contravention to the recommendations of this document | operating in contravention to the recommendations of this document | |||
are discussed in Sections 2 and 3, and knowledge of those risks | are discussed in Sections <xref target="support" format="counter" se | |||
ctionFormat="of" derivedContent="2"/> and | ||||
<xref target="sha-1" format="counter" sectionFormat="of" derivedConte | ||||
nt="3"/>, and knowledge of those risks | ||||
should be used along with any potential mitigating factors and the | should be used along with any potential mitigating factors and the | |||
risks inherent to updating the systems in question when deciding how | risks inherent to updating the systems in question when deciding how | |||
quickly to adopt the recommendations specified in this document. | quickly to adopt the recommendations specified in this document. | |||
</t> | </t> | |||
</section> | </section> | |||
<section numbered="true" toc="include" removeInRFC="false" pn="section-8"> | ||||
<section title="Security Considerations"> | <name slugifiedName="name-security-considerations">Security Considerations | |||
<t>This document deprecates two older TLS protocol versions and one older | </name> | |||
<t indent="0" pn="section-8-1">This document deprecates two older TLS prot | ||||
ocol versions and one older | ||||
DTLS protocol version for security | DTLS protocol version for security | |||
reasons already described. The attack surface is reduced when there are | reasons already described. The attack surface is reduced when there are | |||
a smaller number of supported protocols and fallback options are | a smaller number of supported protocols and fallback options are | |||
removed.</t> | removed.</t> | |||
</section> | </section> | |||
<section numbered="true" toc="include" removeInRFC="false" pn="section-9"> | ||||
<section title="Acknowledgements"> | <name slugifiedName="name-iana-considerations">IANA Considerations</name> | |||
<t>Thanks to those that provided usage data, reviewed and/or improved | <t indent="0" pn="section-9-1">This document has no IANA actions.</t> | |||
this document, including: Michael Ackermann, David Benjamin, David Bla | ||||
ck, | ||||
Deborah Brungard, Alan DeKok, Viktor Dukhovni, Julien Elie, | ||||
Adrian Farrelll, Gary Gapinski, Alessandro Ghedini, Peter | ||||
Gutmann, Jeremy Harris, Nick Hilliard, James | ||||
Hodgkinson, Russ Housley, Hubert Kario, Benjamin Kaduk, John Klensin, | ||||
Watson Ladd, Eliot Lear, Ted Lemon, John Mattsson, Keith Moore, Tom | ||||
Petch, Eric Mill, Yoav Nir, Andrei Popov, Michael Richardson, Eric | ||||
Rescorla, Rich Salz, Mohit Sethi, Yaron Sheffer, Rob Sayre, | ||||
Robert Sparks, Barbara Stark, Martin Thomson, Sean Turner, | ||||
Loganaden Velvindron, and Jakub Wilk. | ||||
</t> | ||||
<t>[[Note to RFC editor: At least Julien Elie's name above should have | ||||
an accent on the first letter of the surname. Please fix that and any | ||||
others needing a similar fix if you can, I'm not sure the tooling I have | ||||
now allows that.]]</t> | ||||
</section> | ||||
<section title="IANA Considerations"> | ||||
<t>[[This memo includes no request to IANA.]]</t> | ||||
</section> | </section> | |||
</middle> | </middle> | |||
<back> | <back> | |||
<references title="Normative References"> | <references pn="section-10"> | |||
<?rfc include='reference.RFC.8174'?> | <name slugifiedName="name-references">References</name> | |||
<references pn="section-10.1"> | ||||
<?rfc include='reference.RFC.2119'?> | <name slugifiedName="name-normative-references">Normative References</na | |||
me> | ||||
<?rfc include='reference.RFC.2246'?> | <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2 | |||
119" quoteTitle="true" derivedAnchor="RFC2119"> | ||||
<?rfc include='reference.RFC.4346'?> | <front> | |||
<title>Key words for use in RFCs to Indicate Requirement Levels</tit | ||||
<?rfc include='reference.RFC.7525'?> | le> | |||
<author initials="S." surname="Bradner" fullname="S. Bradner"> | ||||
<!-- these are from nonobsnorms.sh.refs --> | <organization showOnFrontPage="true"/> | |||
</author> | ||||
<?rfc include='reference.RFC.8422'?> | <date year="1997" month="March"/> | |||
<abstract> | ||||
<?rfc include='reference.RFC.7568'?> | <t indent="0">In many standards track documents several words are | |||
used to signify the requirements in the specification. These words are often ca | ||||
<?rfc include='reference.RFC.7562'?> | pitalized. This document defines these words as they should be interpreted in IE | |||
TF documents. This document specifies an Internet Best Current Practices for th | ||||
<?rfc include='reference.RFC.7507'?> | e Internet Community, and requests discussion and suggestions for improvements.< | |||
/t> | ||||
<?rfc include='reference.RFC.7465'?> | </abstract> | |||
</front> | ||||
<?rfc include='reference.RFC.7030'?> | <seriesInfo name="BCP" value="14"/> | |||
<seriesInfo name="RFC" value="2119"/> | ||||
<?rfc include='reference.RFC.6750'?> | <seriesInfo name="DOI" value="10.17487/RFC2119"/> | |||
</reference> | ||||
<?rfc include='reference.RFC.6749'?> | <reference anchor="RFC2246" target="https://www.rfc-editor.org/info/rfc2 | |||
246" quoteTitle="true" derivedAnchor="RFC2246"> | ||||
<?rfc include='reference.RFC.6739'?> | <front> | |||
<title>The TLS Protocol Version 1.0</title> | ||||
<?rfc include='reference.RFC.6353'?> | <author initials="T." surname="Dierks" fullname="T. Dierks"> | |||
<organization showOnFrontPage="true"/> | ||||
<?rfc include='reference.RFC.6367'?> | </author> | |||
<author initials="C." surname="Allen" fullname="C. Allen"> | ||||
<?rfc include='reference.RFC.6176'?> | <organization showOnFrontPage="true"/> | |||
</author> | ||||
<?rfc include='reference.RFC.6042'?> | <date year="1999" month="January"/> | |||
<abstract> | ||||
<?rfc include='reference.RFC.5953'?> | <t indent="0">This document specifies Version 1.0 of the Transport | |||
Layer Security (TLS) protocol. The TLS protocol provides communications privacy | ||||
<?rfc include='reference.RFC.5878'?> | over the Internet. The protocol allows client/server applications to communicat | |||
e in a way that is designed to prevent eavesdropping, tampering, or message forg | ||||
<?rfc include='reference.RFC.5734'?> | ery.</t> | |||
</abstract> | ||||
<?rfc include='reference.RFC.5469'?> | </front> | |||
<seriesInfo name="RFC" value="2246"/> | ||||
<?rfc include='reference.RFC.5422'?> | <seriesInfo name="DOI" value="10.17487/RFC2246"/> | |||
</reference> | ||||
<?rfc include='reference.RFC.5364'?> | <reference anchor="RFC3261" target="https://www.rfc-editor.org/info/rfc3 | |||
261" quoteTitle="true" derivedAnchor="RFC3261"> | ||||
<?rfc include='reference.RFC.5281'?> | <front> | |||
<title>SIP: Session Initiation Protocol</title> | ||||
<?rfc include='reference.RFC.5263'?> | <author initials="J." surname="Rosenberg" fullname="J. Rosenberg"> | |||
<organization showOnFrontPage="true"/> | ||||
<?rfc include='reference.RFC.5238'?> | </author> | |||
<author initials="H." surname="Schulzrinne" fullname="H. Schulzrinne | ||||
<?rfc include='reference.RFC.5216'?> | "> | |||
<organization showOnFrontPage="true"/> | ||||
<?rfc include='reference.RFC.5158'?> | </author> | |||
<author initials="G." surname="Camarillo" fullname="G. Camarillo"> | ||||
<?rfc include='reference.RFC.5091'?> | <organization showOnFrontPage="true"/> | |||
</author> | ||||
<?rfc include='reference.RFC.5054'?> | <author initials="A." surname="Johnston" fullname="A. Johnston"> | |||
<organization showOnFrontPage="true"/> | ||||
<?rfc include='reference.RFC.5049'?> | </author> | |||
<author initials="J." surname="Peterson" fullname="J. Peterson"> | ||||
<?rfc include='reference.RFC.5024'?> | <organization showOnFrontPage="true"/> | |||
</author> | ||||
<?rfc include='reference.RFC.5023'?> | <author initials="R." surname="Sparks" fullname="R. Sparks"> | |||
<organization showOnFrontPage="true"/> | ||||
<?rfc include='reference.RFC.5019'?> | </author> | |||
<author initials="M." surname="Handley" fullname="M. Handley"> | ||||
<?rfc include='reference.RFC.5018'?> | <organization showOnFrontPage="true"/> | |||
</author> | ||||
<?rfc include='reference.RFC.4992'?> | <author initials="E." surname="Schooler" fullname="E. Schooler"> | |||
<organization showOnFrontPage="true"/> | ||||
<?rfc include='reference.RFC.4976'?> | </author> | |||
<date year="2002" month="June"/> | ||||
<?rfc include='reference.RFC.4975'?> | <abstract> | |||
<t indent="0">This document describes Session Initiation Protocol | ||||
<?rfc include='reference.RFC.4964'?> | (SIP), an application-layer control (signaling) protocol for creating, modifying | |||
, and terminating sessions with one or more participants. These sessions includ | ||||
<?rfc include='reference.RFC.4851'?> | e Internet telephone calls, multimedia distribution, and multimedia conferences. | |||
[STANDARDS-TRACK]</t> | ||||
<?rfc include='reference.RFC.4823'?> | </abstract> | |||
</front> | ||||
<?rfc include='reference.RFC.4791'?> | <seriesInfo name="RFC" value="3261"/> | |||
<seriesInfo name="DOI" value="10.17487/RFC3261"/> | ||||
<?rfc include='reference.RFC.4785'?> | </reference> | |||
<reference anchor="RFC3329" target="https://www.rfc-editor.org/info/rfc3 | ||||
<?rfc include='reference.RFC.4744'?> | 329" quoteTitle="true" derivedAnchor="RFC3329"> | |||
<front> | ||||
<?rfc include='reference.RFC.4743'?> | <title>Security Mechanism Agreement for the Session Initiation Proto | |||
col (SIP)</title> | ||||
<?rfc include='reference.RFC.4732'?> | <author initials="J." surname="Arkko" fullname="J. Arkko"> | |||
<organization showOnFrontPage="true"/> | ||||
<?rfc include='reference.RFC.4712'?> | </author> | |||
<author initials="V." surname="Torvinen" fullname="V. Torvinen"> | ||||
<?rfc include='reference.RFC.4681'?> | <organization showOnFrontPage="true"/> | |||
</author> | ||||
<?rfc include='reference.RFC.4680'?> | <author initials="G." surname="Camarillo" fullname="G. Camarillo"> | |||
<organization showOnFrontPage="true"/> | ||||
<?rfc include='reference.RFC.4642'?> | </author> | |||
<author initials="A." surname="Niemi" fullname="A. Niemi"> | ||||
<?rfc include='reference.RFC.4616'?> | <organization showOnFrontPage="true"/> | |||
</author> | ||||
<?rfc include='reference.RFC.4582'?> | <author initials="T." surname="Haukka" fullname="T. Haukka"> | |||
<organization showOnFrontPage="true"/> | ||||
<?rfc include='reference.RFC.4540'?> | </author> | |||
<date year="2003" month="January"/> | ||||
<?rfc include='reference.RFC.4531'?> | </front> | |||
<seriesInfo name="RFC" value="3329"/> | ||||
<?rfc include='reference.RFC.4513'?> | <seriesInfo name="DOI" value="10.17487/RFC3329"/> | |||
</reference> | ||||
<?rfc include='reference.RFC.4497'?> | <reference anchor="RFC3436" target="https://www.rfc-editor.org/info/rfc3 | |||
436" quoteTitle="true" derivedAnchor="RFC3436"> | ||||
<?rfc include='reference.RFC.4279'?> | <front> | |||
<title>Transport Layer Security over Stream Control Transmission Pro | ||||
<?rfc include='reference.RFC.4261'?> | tocol</title> | |||
<author initials="A." surname="Jungmaier" fullname="A. Jungmaier"> | ||||
<?rfc include='reference.RFC.4235'?> | <organization showOnFrontPage="true"/> | |||
</author> | ||||
<?rfc include='reference.RFC.4217'?> | <author initials="E." surname="Rescorla" fullname="E. Rescorla"> | |||
<organization showOnFrontPage="true"/> | ||||
<?rfc include='reference.RFC.4168'?> | </author> | |||
<author initials="M." surname="Tuexen" fullname="M. Tuexen"> | ||||
<?rfc include='reference.RFC.4162'?> | <organization showOnFrontPage="true"/> | |||
</author> | ||||
<?rfc include='reference.RFC.4111'?> | <date year="2002" month="December"/> | |||
<abstract> | ||||
<?rfc include='reference.RFC.4097'?> | <t indent="0">This document describes the usage of the Transport L | |||
ayer Security (TLS) protocol, as defined in RFC 2246, over the Stream Control Tr | ||||
<?rfc include='reference.RFC.3983'?> | ansmission Protocol (SCTP), as defined in RFC 2960 and RFC 3309. The user of TLS | |||
can take advantage of the features provided by SCTP, namely the support of mult | ||||
<?rfc include='reference.RFC.3943'?> | iple streams to avoid head of line blocking and the support of multi-homing to p | |||
rovide network level fault tolerance. Additionally, discussions of extensions of | ||||
<?rfc include='reference.RFC.3903'?> | SCTP are also supported, meaning especially the support of dynamic reconfigurat | |||
ion of IP- addresses. [STANDARDS-TRACK]</t> | ||||
<?rfc include='reference.RFC.3887'?> | </abstract> | |||
</front> | ||||
<?rfc include='reference.RFC.3871'?> | <seriesInfo name="RFC" value="3436"/> | |||
<seriesInfo name="DOI" value="10.17487/RFC3436"/> | ||||
<?rfc include='reference.RFC.3856'?> | </reference> | |||
<reference anchor="RFC3470" target="https://www.rfc-editor.org/info/rfc3 | ||||
<?rfc include='reference.RFC.3767'?> | 470" quoteTitle="true" derivedAnchor="RFC3470"> | |||
<front> | ||||
<?rfc include='reference.RFC.3749'?> | <title>Guidelines for the Use of Extensible Markup Language (XML) wi | |||
thin IETF Protocols</title> | ||||
<?rfc include='reference.RFC.3656'?> | <author initials="S." surname="Hollenbeck" fullname="S. Hollenbeck"> | |||
<organization showOnFrontPage="true"/> | ||||
<?rfc include='reference.RFC.3568'?> | </author> | |||
<author initials="M." surname="Rose" fullname="M. Rose"> | ||||
<?rfc include='reference.RFC.3552'?> | <organization showOnFrontPage="true"/> | |||
</author> | ||||
<?rfc include='reference.RFC.3501'?> | <author initials="L." surname="Masinter" fullname="L. Masinter"> | |||
<organization showOnFrontPage="true"/> | ||||
<?rfc include='reference.RFC.3470'?> | </author> | |||
<date year="2003" month="January"/> | ||||
<?rfc include='reference.RFC.3436'?> | <abstract> | |||
<t indent="0">The Extensible Markup Language (XML) is a framework | ||||
<?rfc include='reference.RFC.3329'?> | for structuring data. While it evolved from Standard Generalized Markup Languag | |||
e (SGML) -- a markup language primarily focused on structuring documents -- XML | ||||
<?rfc include='reference.RFC.3261'?> | has evolved to be a widely-used mechanism for representing structured data. Ther | |||
</references> | e are a wide variety of Internet protocols being developed; many have need for a | |||
representation for structured data relevant to their application. There has be | ||||
<references title="Informative References"> | en much interest in the use of XML as a representation method. This document de | |||
<?rfc include='reference.RFC.7457'?> | scribes basic XML concepts, analyzes various alternatives in the use of XML, and | |||
provides guidelines for the use of XML within IETF standards-track protocols. | ||||
<!-- | This document specifies an Internet Best Current Practices for the Internet Comm | |||
<reference anchor="Alexa"> | unity, and requests discussion and suggestions for improvements.</t> | |||
<front> | </abstract> | |||
<title>The Alexa Top 1 Million Analysis | </front> | |||
https://scotthelme.co.uk/alexa-top-1-million-analysis-february-2018/</ | <seriesInfo name="BCP" value="70"/> | |||
title> | <seriesInfo name="RFC" value="3470"/> | |||
<seriesInfo name="DOI" value="10.17487/RFC3470"/> | ||||
<author> | </reference> | |||
<organization>Will be deleted before publication</organization> | <reference anchor="RFC3501" target="https://www.rfc-editor.org/info/rfc3 | |||
</author> | 501" quoteTitle="true" derivedAnchor="RFC3501"> | |||
<front> | ||||
<date year="2018"/> | <title>INTERNET MESSAGE ACCESS PROTOCOL - VERSION 4rev1</title> | |||
</front> | <author initials="M." surname="Crispin" fullname="M. Crispin"> | |||
</reference> | <organization showOnFrontPage="true"/> | |||
--> | </author> | |||
<date year="2003" month="March"/> | ||||
<!-- | <abstract> | |||
<reference anchor="StackExchange"> | <t indent="0">The Internet Message Access Protocol, Version 4rev1 | |||
<front> | (IMAP4rev1) allows a client to access and manipulate electronic mail messages on | |||
<title>Stackexchange | a server. IMAP4rev1 permits manipulation of mailboxes (remote message folders) | |||
https://security.stackexchange.com/questions/177182/is-there-a-list-of | in a way that is functionally equivalent to local folders. IMAP4rev1 also provi | |||
-old-browsers-that-only-support-tls-1-0</title> | des the capability for an offline client to resynchronize with the server. IMAP4 | |||
rev1 includes operations for creating, deleting, and renaming mailboxes, checkin | ||||
<author> | g for new messages, permanently removing messages, setting and clearing flags, R | |||
<organization>StackExchange - will be deleted before | FC 2822 and RFC 2045 parsing, searching, and selective fetching of message attri | |||
publication</organization> | butes, texts, and portions thereof. Messages in IMAP4rev1 are accessed by the u | |||
</author> | se of numbers. These numbers are either message sequence numbers or unique ident | |||
ifiers. IMAP4rev1 supports a single server. A mechanism for accessing configura | ||||
<date year="2018"/> | tion information to support multiple IMAP4rev1 servers is discussed in RFC 2244. | |||
</front> | IMAP4rev1 does not specify a means of posting mail; this function is handled by | |||
</reference> | a mail transfer protocol such as RFC 2821. [STANDARDS-TRACK]</t> | |||
--> | </abstract> | |||
</front> | ||||
<!-- | <seriesInfo name="RFC" value="3501"/> | |||
<reference anchor="Windows"> | <seriesInfo name="DOI" value="10.17487/RFC3501"/> | |||
<front> | </reference> | |||
<title>Windows | <reference anchor="RFC3552" target="https://www.rfc-editor.org/info/rfc3 | |||
<author> | 552" quoteTitle="true" derivedAnchor="RFC3552"> | |||
<organization>Andrei Popov</organization> | <front> | |||
</author> | <title>Guidelines for Writing RFC Text on Security Considerations</t | |||
<date year="2018"/> | itle> | |||
</front> | <author initials="E." surname="Rescorla" fullname="E. Rescorla"> | |||
</reference> | <organization showOnFrontPage="true"/> | |||
</author> | ||||
<reference anchor="FF"> | <author initials="B." surname="Korver" fullname="B. Korver"> | |||
<front> | <organization showOnFrontPage="true"/> | |||
<title>Firefox | </author> | |||
https://www.ietf.org/mail-archive/web/tls/current/msg26575.html</title | <date year="2003" month="July"/> | |||
> | <abstract> | |||
<author> | <t indent="0">All RFCs are required to have a Security Considerati | |||
<organization>Eric Rescorla</organization> | ons section. Historically, such sections have been relatively weak. This docume | |||
</author> | nt provides guidelines to RFC authors on how to write a good Security Considerat | |||
<date year="2018"/> | ions section. This document specifies an Internet Best Current Practices for t | |||
</front> | he Internet Community, and requests discussion and suggestions for improvements. | |||
</reference> | </t> | |||
--> | </abstract> | |||
</front> | ||||
<!-- | <seriesInfo name="BCP" value="72"/> | |||
<reference anchor="SSLpulse"> | <seriesInfo name="RFC" value="3552"/> | |||
<front> | <seriesInfo name="DOI" value="10.17487/RFC3552"/> | |||
<title>SSLpulse | </reference> | |||
https://www.ssllabs.com/ssl-pulse/</title> | <reference anchor="RFC3568" target="https://www.rfc-editor.org/info/rfc3 | |||
<author> | 568" quoteTitle="true" derivedAnchor="RFC3568"> | |||
<organization>SSLpulse - will be deleted before | <front> | |||
publication</organization> | <title>Known Content Network (CN) Request-Routing Mechanisms</title> | |||
</author> | <author initials="A." surname="Barbir" fullname="A. Barbir"> | |||
<date year="2018"/> | <organization showOnFrontPage="true"/> | |||
</front> | </author> | |||
</reference> | <author initials="B." surname="Cain" fullname="B. Cain"> | |||
--> | <organization showOnFrontPage="true"/> | |||
</author> | ||||
<reference anchor="NIST800-52r2"> | <author initials="R." surname="Nair" fullname="R. Nair"> | |||
<front> | <organization showOnFrontPage="true"/> | |||
<title>NIST SP800-52r2 | </author> | |||
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-52r2 | <author initials="O." surname="Spatscheck" fullname="O. Spatscheck"> | |||
.pdf</title> | <organization showOnFrontPage="true"/> | |||
</author> | ||||
<author> | <date year="2003" month="July"/> | |||
<organization>National Institute of Standards and | <abstract> | |||
Technology</organization> | <t indent="0">This document presents a summary of Request-Routing | |||
</author> | techniques that are used to direct client requests to surrogates based on variou | |||
s policies and a possible set of metrics. The document covers techniques that w | ||||
<date month="August" year="2019"/> | ere commonly used in the industry on or before December 2000. In this memo, the | |||
</front> | term Request-Routing represents techniques that is commonly called content rout | |||
</reference> | ing or content redirection. In principle, Request-Routing techniques can be cla | |||
ssified under: DNS Request-Routing, Transport-layer Request-Routing, and Applica | ||||
<!-- | tion-layer Request-Routing. This memo provides information for the Internet com | |||
<reference anchor="PCI-TLS1"> | munity.</t> | |||
<front> | </abstract> | |||
<title>Migrating from SSL and Early TLS | </front> | |||
https://www.pcisecuritystandards.org/documents/Migrating-from-SSL-Earl | <seriesInfo name="RFC" value="3568"/> | |||
y-TLS-Info-Supp-v1_1.pdf</title> | <seriesInfo name="DOI" value="10.17487/RFC3568"/> | |||
</reference> | ||||
<author> | <reference anchor="RFC3656" target="https://www.rfc-editor.org/info/rfc3 | |||
<organization>PCI Security Standards Council</organization> | 656" quoteTitle="true" derivedAnchor="RFC3656"> | |||
</author> | <front> | |||
<title>The Mailbox Update (MUPDATE) Distributed Mailbox Database Pro | ||||
<date year="2016"/> | tocol</title> | |||
</front> | <author initials="R." surname="Siemborski" fullname="R. Siemborski"> | |||
</reference> | <organization showOnFrontPage="true"/> | |||
--> | </author> | |||
<date year="2003" month="December"/> | ||||
<!-- | <abstract> | |||
<reference anchor="stripe"> | <t indent="0">As the demand for high-performance mail delivery age | |||
<front> | nts increases, it becomes apparent that single-machine solutions are inadequate | |||
<title>"Upgrading to SHA-2 and TLSv1.2" | to the task, both because of capacity limits and that the failure of the single | |||
https://stripe.com/blog/upgrading | machine means a loss of mail delivery for all users. It is preferable to allow | |||
-tls | many machines to share the responsibility of mail delivery. The Mailbox Update | |||
</title> | (MUPDATE) protocol allows a group of Internet Message Access Protocol (IMAP) or | |||
<author> | Post Office Protocol - Version 3 (POP3) servers to function with a unified mailb | |||
<organization>Stripe</organization> | ox namespace. This document is intended to serve as a reference guide to that p | |||
</author> | rotocol.</t> | |||
<date year="2018"/> | </abstract> | |||
</front> | </front> | |||
</reference> | <seriesInfo name="RFC" value="3656"/> | |||
--> | <seriesInfo name="DOI" value="10.17487/RFC3656"/> | |||
</reference> | ||||
<!-- | <reference anchor="RFC3749" target="https://www.rfc-editor.org/info/rfc3 | |||
<reference anchor="paypal"> | 749" quoteTitle="true" derivedAnchor="RFC3749"> | |||
<front> | <front> | |||
<title>"TLS1.2 and HTTP/1.1 Upgrade" | <title>Transport Layer Security Protocol Compression Methods</title> | |||
https://www.paypal-notice.com/en/TLS-1.2-and-HTTP1.1-Upgrade/ | <author initials="S." surname="Hollenbeck" fullname="S. Hollenbeck"> | |||
</title> | <organization showOnFrontPage="true"/> | |||
<author> | </author> | |||
<organization>Paypal</organization> | <date year="2004" month="May"/> | |||
</author> | <abstract> | |||
<date year="2018"/> | <t indent="0">The Transport Layer Security (TLS) protocol (RFC 224 | |||
</front> | 6) includes features to negotiate selection of a lossless data compression metho | |||
</reference> | d as part of the TLS Handshake Protocol and to then apply the algorithm associat | |||
--> | ed with the selected method as part of the TLS Record Protocol. TLS defines one | |||
standard compression method which specifies that data exchanged via the record | ||||
<!-- | protocol will not be compressed. This document describes an additional compress | |||
<reference anchor="GIT"> | ion method associated with a lossless data compression algorithm for use with TL | |||
<front> | S, and it describes a method for the specification of additional TLS compression | |||
<title>GitHub Deprecates TLSv1.0 and TLSv1.1 | methods. [STANDARDS-TRACK]</t> | |||
https://githubengineering.com/crypto-removal-notice/</title> | </abstract> | |||
<author> | </front> | |||
<organization>GitHub</organization> | <seriesInfo name="RFC" value="3749"/> | |||
</author> | <seriesInfo name="DOI" value="10.17487/RFC3749"/> | |||
<date year="2018"/> | </reference> | |||
</front> | <reference anchor="RFC3767" target="https://www.rfc-editor.org/info/rfc3 | |||
</reference> | 767" quoteTitle="true" derivedAnchor="RFC3767"> | |||
--> | <front> | |||
<title>Securely Available Credentials Protocol</title> | ||||
<!-- | <author initials="S." surname="Farrell" fullname="S. Farrell" role=" | |||
<reference anchor="CloudFlare"> | editor"> | |||
<front> | <organization showOnFrontPage="true"/> | |||
<title>CloudFlare Deprecated TLSv1.0 and TLSv1.1 | </author> | |||
https://blog.cloudflare.com/deprecating-old-tls-versions-on-cloudflare | <date year="2004" month="June"/> | |||
-dashboard-and-api/</title> | <abstract> | |||
<t indent="0">This document describes a protocol whereby a user ca | ||||
<author> | n acquire cryptographic credentials (e.g., private keys, PKCS #15 structures) fr | |||
<organization>CloudFlare</organization> | om a credential server, using a workstation that has locally trusted software in | |||
</author> | stalled, but with no user-specific configuration. The protocol's payloads are d | |||
escribed in XML. This memo also specifies a Blocks Extensible Exchange Protocol | ||||
<date year="2018"/> | (BEEP) profile of the protocol. Security requirements are met by mandating su | |||
</front> | pport for TLS and/or DIGEST-MD5 (through BEEP). [STANDARDS-TRACK]</t> | |||
</reference> | </abstract> | |||
--> | </front> | |||
<seriesInfo name="RFC" value="3767"/> | ||||
<!-- | <seriesInfo name="DOI" value="10.17487/RFC3767"/> | |||
<reference anchor="Canada" | </reference> | |||
target="https://www.canada.ca/en/treasury-board-secretariat/ser | <reference anchor="RFC3856" target="https://www.rfc-editor.org/info/rfc3 | |||
vices/information-technology/policy-implementation-notices/implementing-https-se | 856" quoteTitle="true" derivedAnchor="RFC3856"> | |||
cure-web-connections-itpin.html"> | <front> | |||
<front> | <title>A Presence Event Package for the Session Initiation Protocol | |||
<title>Implementing HTTPS for Secure Web Connections: Information | (SIP)</title> | |||
Technology Policy Implementation Notice (ITPIN)</title> | <author initials="J." surname="Rosenberg" fullname="J. Rosenberg"> | |||
<organization showOnFrontPage="true"/> | ||||
<author> | </author> | |||
<organization>Treasury Board of Canada Secretariat</organization> | <date year="2004" month="August"/> | |||
</author> | <abstract> | |||
<t indent="0">This document describes the usage of the Session Ini | ||||
<date day="27" month="June" year="2018"/> | tiation Protocol (SIP) for subscriptions and notifications of presence. Presenc | |||
</front> | e is defined as the willingness and ability of a user to communicate with other | |||
</reference> | users on the network. Historically, presence has been limited to "on-line" and | |||
--> | "off-line" indicators; the notion of presence here is broader. Subscriptions an | |||
d notifications of presence are supported by defining an event package within th | ||||
<!-- | e general SIP event notification framework. This protocol is also compliant wit | |||
<reference anchor="Digicert"> | h the Common Presence Profile (CPP) framework. [STANDARDS-TRACK]</t> | |||
<front> | </abstract> | |||
<title>Deprecating TLS 1.0 and 1.1 | </front> | |||
https://www.digicert.com/blog/depreciating-tls-1-0-and-1-1/</title> | <seriesInfo name="RFC" value="3856"/> | |||
<seriesInfo name="DOI" value="10.17487/RFC3856"/> | ||||
<author> | </reference> | |||
<organization>Digicert</organization> | <reference anchor="RFC3871" target="https://www.rfc-editor.org/info/rfc3 | |||
</author> | 871" quoteTitle="true" derivedAnchor="RFC3871"> | |||
<front> | ||||
<date year="2018"/> | <title>Operational Security Requirements for Large Internet Service | |||
</front> | Provider (ISP) IP Network Infrastructure</title> | |||
</reference> | <author initials="G." surname="Jones" fullname="G. Jones" role="edit | |||
--> | or"> | |||
<organization showOnFrontPage="true"/> | ||||
<!-- | </author> | |||
<reference anchor="KeyCDN"> | <date year="2004" month="September"/> | |||
<front> | <abstract> | |||
<title>Deprecating TLS 1.0 and 1.1 Enhancing Security for Everyone | <t indent="0">This document defines a list of operational security | |||
https://www.keycdn.com/blog/deprecating-tls-1-0-and-1-1/</title> | requirements for the infrastructure of large Internet Service Provider (ISP) IP | |||
networks (routers and switches). A framework is defined for specifying "profil | ||||
<author> | es", which are collections of requirements applicable to certain network topolog | |||
<organization>KeyCDN</organization> | y contexts (all, core-only, edge-only...). The goal is to provide network opera | |||
</author> | tors a clear, concise way of communicating their security requirements to vendor | |||
s. This memo provides information for the Internet community.</t> | ||||
<date year="2018"/> | </abstract> | |||
</front> | </front> | |||
</reference> | <seriesInfo name="RFC" value="3871"/> | |||
--> | <seriesInfo name="DOI" value="10.17487/RFC3871"/> | |||
</reference> | ||||
<!-- | <reference anchor="RFC3887" target="https://www.rfc-editor.org/info/rfc3 | |||
<reference anchor="chrome"> | 887" quoteTitle="true" derivedAnchor="RFC3887"> | |||
<front> | <front> | |||
<title>Modernizing Transport Security | <title>Message Tracking Query Protocol</title> | |||
https://security.googleblog.com/2018/10/modernizing-transport-security | <author initials="T." surname="Hansen" fullname="T. Hansen"> | |||
.html</title> | <organization showOnFrontPage="true"/> | |||
</author> | ||||
<author> | <date year="2004" month="September"/> | |||
<organization>Google</organization> | <abstract> | |||
</author> | <t indent="0">Customers buying enterprise message systems often as | |||
k: Can I track the messages? Message tracking is the ability to find out the pa | ||||
<date year="2018"/> | th that a particular message has taken through a messaging system and the curren | |||
</front> | t routing status of that message. This document describes the Message Tracking | |||
</reference> | Query Protocol that is used in conjunction with extensions to the ESMTP protocol | |||
--> | to provide a complete message tracking solution for the Internet. [STANDARDS-T | |||
RACK]</t> | ||||
<!-- | </abstract> | |||
<reference anchor="edge"> | </front> | |||
<front> | <seriesInfo name="RFC" value="3887"/> | |||
<title>Modernizing TLS connections in Microsoft Edge and Internet Expl | <seriesInfo name="DOI" value="10.17487/RFC3887"/> | |||
orer 11 | </reference> | |||
https://blogs.windows.com/msedgedev/2018/10/15/modernizing-tls-edge-ie | <reference anchor="RFC3903" target="https://www.rfc-editor.org/info/rfc3 | |||
11/</title> | 903" quoteTitle="true" derivedAnchor="RFC3903"> | |||
<front> | ||||
<author> | <title>Session Initiation Protocol (SIP) Extension for Event State P | |||
<organization>Microsoft</organization> | ublication</title> | |||
</author> | <author initials="A." surname="Niemi" fullname="A. Niemi" role="edit | |||
or"> | ||||
<date year="2018"/> | <organization showOnFrontPage="true"/> | |||
</front> | </author> | |||
</reference> | <date year="2004" month="October"/> | |||
--> | <abstract> | |||
<t indent="0">This document describes an extension to the Session | ||||
<!-- | Initiation Protocol (SIP) for publishing event state used within the SIP Events | |||
<reference anchor="Amazon"> | framework. The first application of this extension is for the publication of pr | |||
<front> | esence information. </t> | |||
<title>Amazon Elastic Load Balancing Support Deprecated TLSv1.0 and | <t indent="0"> The mechanism described in this document can be ext | |||
TLSv1.1 | ended to support publication of any event state for which there exists an approp | |||
https://aws.amazon.com/about-aws/whats-new/2017/02/elastic-load-balanc | riate event package. It is not intended to be a general-purpose mechanism for t | |||
ing-support-for-tls-1-1-and-tls-1-2-pre-defined-security-policies/</title> | ransport of arbitrary data, as there are better-suited mechanisms for this purpo | |||
se. [STANDARDS-TRACK]</t> | ||||
<author> | </abstract> | |||
<organization>Amazon</organization> | </front> | |||
</author> | <seriesInfo name="RFC" value="3903"/> | |||
<seriesInfo name="DOI" value="10.17487/RFC3903"/> | ||||
<date year="2017"/> | </reference> | |||
</front> | <reference anchor="RFC3943" target="https://www.rfc-editor.org/info/rfc3 | |||
</reference> | 943" quoteTitle="true" derivedAnchor="RFC3943"> | |||
--> | <front> | |||
<title>Transport Layer Security (TLS) Protocol Compression Using Lem | ||||
<!-- 2nd author name below - need to figure HOWTO get fullname correct wit | pel-Ziv-Stac (LZS)</title> | |||
h non-ASCII | <author initials="R." surname="Friend" fullname="R. Friend"> | |||
character - the "e" in "Gaetan" should be an "e" with two dots | <organization showOnFrontPage="true"/> | |||
above, as in PR#2 --> | </author> | |||
<date year="2004" month="November"/> | ||||
<reference anchor="Bhargavan2016"> | <abstract> | |||
<front> | <t indent="0">The Transport Layer Security (TLS) protocol (RFC 224 | |||
<title>Transcript Collision Attacks: Breaking Authentication in TLS, | 6) includes features to negotiate selection of a lossless data compression metho | |||
IKE, and SSH | d as part of the TLS Handshake Protocol and then to apply the algorithm associat | |||
https://www.mitls.org/downloads/transcript-collisions.pdf</title> | ed with the selected method as part of the TLS Record Protocol. TLS defines one | |||
standard compression method, which specifies that data exchanged via the record | ||||
<author fullname="Karthikeyan Bhargavan" initials="K.B." | protocol will not be compressed. This document describes an additional compres | |||
surname="Bhargavan"> | sion method associated with the Lempel-Ziv-Stac (LZS) lossless data compression | |||
<organization>INRIA</organization> | algorithm for use with TLS. This document also defines the application of the L | |||
</author> | ZS algorithm to the TLS Record Protocol. This memo provides information for the | |||
Internet community.</t> | ||||
<author fullname="Gaetan Leuren" initials="G.L." surname="Leuren"> | </abstract> | |||
<organization>INRIA</organization> | </front> | |||
</author> | <seriesInfo name="RFC" value="3943"/> | |||
<seriesInfo name="DOI" value="10.17487/RFC3943"/> | ||||
<date year="2016"/> | </reference> | |||
</front> | <reference anchor="RFC3983" target="https://www.rfc-editor.org/info/rfc3 | |||
</reference> | 983" quoteTitle="true" derivedAnchor="RFC3983"> | |||
<front> | ||||
<!-- | <title>Using the Internet Registry Information Service (IRIS) over t | |||
<reference anchor="TGPP33310"> | he Blocks Extensible Exchange Protocol (BEEP)</title> | |||
<front> | <author initials="A." surname="Newton" fullname="A. Newton"> | |||
<title>TS 33.310 - Network Domain Security (NDS); Authentication | <organization showOnFrontPage="true"/> | |||
Framework (AF)</title> | </author> | |||
<author initials="M." surname="Sanz" fullname="M. Sanz"> | ||||
<author> | <organization showOnFrontPage="true"/> | |||
<organization>3GPP</organization> | </author> | |||
</author> | <date year="2005" month="January"/> | |||
<abstract> | ||||
<date year="2016"/> | <t indent="0">This document specifies how to use the Blocks Extens | |||
</front> | ible Exchange Protocol (BEEP) as the application transport substrate for the Int | |||
</reference> | ernet Registry Information Service (IRIS). [STANDARDS-TRACK]</t> | |||
--> | </abstract> | |||
</front> | ||||
<!-- | <seriesInfo name="RFC" value="3983"/> | |||
<reference anchor="TR-02102-2"> | <seriesInfo name="DOI" value="10.17487/RFC3983"/> | |||
<front> | </reference> | |||
<title>Technical Guideline TR-02102-2 Cryptographic Mechanisms: | <reference anchor="RFC4097" target="https://www.rfc-editor.org/info/rfc4 | |||
Recommendations and Key Lengths</title> | 097" quoteTitle="true" derivedAnchor="RFC4097"> | |||
<front> | ||||
<author> | <title>Middlebox Communications (MIDCOM) Protocol Evaluation</title> | |||
<organization>The German Federal Office for Information Security | <author initials="M." surname="Barnes" fullname="M. Barnes" role="ed | |||
https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Tec | itor"> | |||
hGuidelines/TG02102/BSI-TR-02102-2.pdf</organization> | <organization showOnFrontPage="true"/> | |||
</author> | </author> | |||
<date year="2005" month="June"/> | ||||
<date year="2019"/> | <abstract> | |||
</front> | <t indent="0">This document provides an evaluation of the applicab | |||
</reference> | ility of SNMP (Simple Network Management Protocol), RSIP (Realm Specific Interne | |||
--> | t Protocol), Megaco, Diameter, and COPS (Common Open Policy Service) as the MIDC | |||
OM (Middlebox Communications) protocol. A summary of each of the proposed proto | ||||
<!-- | cols against the MIDCOM requirements and the MIDCOM framework is provided. Comp | |||
<reference anchor="clusters"> | liancy of each of the protocols against each requirement is detailed. A conclus | |||
<front> | ion summarizes how each of the protocols fares in the evaluation. This memo pro | |||
<title>"Clusters of re-used keys" | vides information for the Internet community.</t> | |||
https://eprint.iacr.org/2018/299</title | </abstract> | |||
> | </front> | |||
<author fullname="Stephen Farrell" init | <seriesInfo name="RFC" value="4097"/> | |||
ials="S." surname="Farrell" /> | <seriesInfo name="DOI" value="10.17487/RFC4097"/> | |||
<date year="2018" /> | </reference> | |||
</front> | <reference anchor="RFC4111" target="https://www.rfc-editor.org/info/rfc4 | |||
</reference> | 111" quoteTitle="true" derivedAnchor="RFC4111"> | |||
--> | <front> | |||
<title>Security Framework for Provider-Provisioned Virtual Private N | ||||
<?rfc include='reference.RFC.5246'?> | etworks (PPVPNs)</title> | |||
<author initials="L." surname="Fang" fullname="L. Fang" role="editor | ||||
<?rfc include='reference.RFC.6347'?> | "> | |||
<organization showOnFrontPage="true"/> | ||||
<?rfc include='reference.RFC.6460'?> | </author> | |||
<date year="2005" month="July"/> | ||||
<?rfc include='reference.RFC.6084'?> | <abstract> | |||
<t indent="0">This document addresses security aspects pertaining | ||||
<?rfc include='reference.RFC.6083'?> | to Provider-Provisioned Virtual Private Networks (PPVPNs). First, it describes | |||
the security threats in the context of PPVPNs and defensive techniques to combat | ||||
<?rfc include='reference.RFC.6012'?> | those threats. It considers security issues deriving both from malicious behav | |||
ior of anyone and from negligent or incorrect behavior of the providers. It als | ||||
<?rfc include='reference.RFC.5456'?> | o describes how these security attacks should be detected and reported. It then | |||
discusses possible user requirements for security of a PPVPN service. These us | ||||
<?rfc include='reference.RFC.5415'?> | er requirements translate into corresponding provider requirements. In addition | |||
, the provider may have additional requirements to make its network infrastructu | ||||
<!-- | re secure to a level that can meet the PPVPN customer's expectations. Finally, t | |||
<?rfc include='reference.RFC.7568'?> | his document defines a template that may be used to describe and analyze the sec | |||
--> | urity characteristics of a specific PPVPN technology. This memo provides inform | |||
ation for the Internet community.</t> | ||||
<?rfc include='reference.RFC.8143'?> | </abstract> | |||
</front> | ||||
<?rfc include='reference.RFC.8261'?> | <seriesInfo name="RFC" value="4111"/> | |||
<seriesInfo name="DOI" value="10.17487/RFC4111"/> | ||||
<?rfc include='reference.RFC.8446'?> | </reference> | |||
<reference anchor="RFC4162" target="https://www.rfc-editor.org/info/rfc4 | ||||
<?rfc include='reference.RFC.8447'?> | 162" quoteTitle="true" derivedAnchor="RFC4162"> | |||
<front> | ||||
<!-- these are from nonobsnorms.sh.irefs --> | <title>Addition of SEED Cipher Suites to Transport Layer Security (T | |||
LS)</title> | ||||
<?rfc include='reference.RFC.5101'?> | <author initials="H.J." surname="Lee" fullname="H.J. Lee"> | |||
<organization showOnFrontPage="true"/> | ||||
<?rfc include='reference.RFC.5081'?> | </author> | |||
<author initials="J.H." surname="Yoon" fullname="J.H. Yoon"> | ||||
<?rfc include='reference.RFC.5077'?> | <organization showOnFrontPage="true"/> | |||
</author> | ||||
<?rfc include='reference.RFC.4934'?> | <author initials="J.I." surname="Lee" fullname="J.I. Lee"> | |||
<organization showOnFrontPage="true"/> | ||||
<?rfc include='reference.RFC.4572'?> | </author> | |||
<date year="2005" month="August"/> | ||||
<?rfc include='reference.RFC.4507'?> | <abstract> | |||
<t indent="0">This document proposes the addition of new cipher su | ||||
<?rfc include='reference.RFC.4492'?> | ites to the Transport Layer Security (TLS) protocol to support the SEED encrypti | |||
on algorithm as a bulk cipher algorithm. [STANDARDS-TRACK]</t> | ||||
<?rfc include='reference.RFC.4366'?> | </abstract> | |||
</front> | ||||
<?rfc include='reference.RFC.4347'?> | <seriesInfo name="RFC" value="4162"/> | |||
<seriesInfo name="DOI" value="10.17487/RFC4162"/> | ||||
<?rfc include='reference.RFC.4244'?> | </reference> | |||
<reference anchor="RFC4168" target="https://www.rfc-editor.org/info/rfc4 | ||||
<?rfc include='reference.RFC.4132'?> | 168" quoteTitle="true" derivedAnchor="RFC4168"> | |||
<front> | ||||
<?rfc include='reference.RFC.3920'?> | <title>The Stream Control Transmission Protocol (SCTP) as a Transpor | |||
t for the Session Initiation Protocol (SIP)</title> | ||||
<?rfc include='reference.RFC.3734'?> | <author initials="J." surname="Rosenberg" fullname="J. Rosenberg"> | |||
<organization showOnFrontPage="true"/> | ||||
<?rfc include='reference.RFC.3588'?> | </author> | |||
<author initials="H." surname="Schulzrinne" fullname="H. Schulzrinne | ||||
<?rfc include='reference.RFC.3546'?> | "> | |||
<organization showOnFrontPage="true"/> | ||||
<?rfc include='reference.RFC.3489'?> | </author> | |||
<author initials="G." surname="Camarillo" fullname="G. Camarillo"> | ||||
<?rfc include='reference.RFC.3316'?> | <organization showOnFrontPage="true"/> | |||
</author> | ||||
<?rfc include='reference.RFC.6614'?> | <date year="2005" month="October"/> | |||
<abstract> | ||||
<t indent="0">This document specifies a mechanism for usage of SCT | ||||
P (the Stream Control Transmission Protocol) as the transport mechanism between | ||||
SIP (Session Initiation Protocol) entities. SCTP is a new protocol that provide | ||||
s several features that may prove beneficial for transport between SIP entities | ||||
that exchange a large amount of messages, including gateways and proxies. As SI | ||||
P is transport-independent, support of SCTP is a relatively straightforward proc | ||||
ess, nearly identical to support for TCP. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4168"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4168"/> | ||||
</reference> | ||||
<reference anchor="RFC4217" target="https://www.rfc-editor.org/info/rfc4 | ||||
217" quoteTitle="true" derivedAnchor="RFC4217"> | ||||
<front> | ||||
<title>Securing FTP with TLS</title> | ||||
<author initials="P." surname="Ford-Hutchinson" fullname="P. Ford-Hu | ||||
tchinson"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2005" month="October"/> | ||||
<abstract> | ||||
<t indent="0">This document describes a mechanism that can be used | ||||
by FTP clients and servers to implement security and authentication using the T | ||||
LS protocol defined by RFC 2246, "The TLS Protocol Version 1.0.", and the extens | ||||
ions to the FTP protocol defined by RFC 2228, "FTP Security Extensions". It desc | ||||
ribes the subset of the extensions that are required and the parameters to be us | ||||
ed, discusses some of the policy issues that clients and servers will need to ta | ||||
ke, considers some of the implications of those policies, and discusses some exp | ||||
ected behaviours of implementations to allow interoperation. This document is i | ||||
ntended to provide TLS support for FTP in a similar way to that provided for SMT | ||||
P in RFC 2487, "SMTP Service Extension for Secure SMTP over Transport Layer Secu | ||||
rity", and HTTP in RFC 2817, "Upgrading to TLS Within HTTP/1.1.".</t> | ||||
<t indent="0">This specification is in accordance with RFC 959, "F | ||||
ile Transfer Protocol". It relies on RFC 2246, "The TLS Protocol Version 1.0.", | ||||
and RFC 2228, "FTP Security Extensions". [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4217"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4217"/> | ||||
</reference> | ||||
<reference anchor="RFC4235" target="https://www.rfc-editor.org/info/rfc4 | ||||
235" quoteTitle="true" derivedAnchor="RFC4235"> | ||||
<front> | ||||
<title>An INVITE-Initiated Dialog Event Package for the Session Init | ||||
iation Protocol (SIP)</title> | ||||
<author initials="J." surname="Rosenberg" fullname="J. Rosenberg"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="H." surname="Schulzrinne" fullname="H. Schulzrinne | ||||
"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="R." surname="Mahy" fullname="R. Mahy" role="editor | ||||
"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2005" month="November"/> | ||||
<abstract> | ||||
<t indent="0">This document defines a dialog event package for the | ||||
SIP Events architecture, along with a data format used in notifications for thi | ||||
s package. The dialog package allows users to subscribe to another user and to | ||||
receive notification of the changes in state of INVITE-initiated dialog usages i | ||||
n which the subscribed-to user is involved. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4235"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4235"/> | ||||
</reference> | ||||
<reference anchor="RFC4261" target="https://www.rfc-editor.org/info/rfc4 | ||||
261" quoteTitle="true" derivedAnchor="RFC4261"> | ||||
<front> | ||||
<title>Common Open Policy Service (COPS) Over Transport Layer Securi | ||||
ty (TLS)</title> | ||||
<author initials="J." surname="Walker" fullname="J. Walker"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="A." surname="Kulkarni" fullname="A. Kulkarni" role | ||||
="editor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2005" month="December"/> | ||||
<abstract> | ||||
<t indent="0">This document describes how to use Transport Layer S | ||||
ecurity (TLS) to secure Common Open Policy Service (COPS) connections over the I | ||||
nternet.</t> | ||||
<t indent="0">This document also updates RFC 2748 by modifying the | ||||
contents of the Client-Accept message. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4261"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4261"/> | ||||
</reference> | ||||
<reference anchor="RFC4279" target="https://www.rfc-editor.org/info/rfc4 | ||||
279" quoteTitle="true" derivedAnchor="RFC4279"> | ||||
<front> | ||||
<title>Pre-Shared Key Ciphersuites for Transport Layer Security (TLS | ||||
)</title> | ||||
<author initials="P." surname="Eronen" fullname="P. Eronen" role="ed | ||||
itor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="H." surname="Tschofenig" fullname="H. Tschofenig" | ||||
role="editor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2005" month="December"/> | ||||
<abstract> | ||||
<t indent="0">This document specifies three sets of new ciphersuit | ||||
es for the Transport Layer Security (TLS) protocol to support authentication bas | ||||
ed on pre-shared keys (PSKs). These pre-shared keys are symmetric keys, shared | ||||
in advance among the communicating parties. The first set of ciphersuites uses | ||||
only symmetric key operations for authentication. The second set uses a Diffie-H | ||||
ellman exchange authenticated with a pre-shared key, and the third set combines | ||||
public key authentication of the server with pre-shared key authentication of th | ||||
e client. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4279"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4279"/> | ||||
</reference> | ||||
<reference anchor="RFC4346" target="https://www.rfc-editor.org/info/rfc4 | ||||
346" quoteTitle="true" derivedAnchor="RFC4346"> | ||||
<front> | ||||
<title>The Transport Layer Security (TLS) Protocol Version 1.1</titl | ||||
e> | ||||
<author initials="T." surname="Dierks" fullname="T. Dierks"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="E." surname="Rescorla" fullname="E. Rescorla"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2006" month="April"/> | ||||
<abstract> | ||||
<t indent="0">This document specifies Version 1.1 of the Transport | ||||
Layer Security (TLS) protocol. The TLS protocol provides communications securi | ||||
ty over the Internet. The protocol allows client/server applications to communi | ||||
cate in a way that is designed to prevent eavesdropping, tampering, or message f | ||||
orgery.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4346"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4346"/> | ||||
</reference> | ||||
<reference anchor="RFC4497" target="https://www.rfc-editor.org/info/rfc4 | ||||
497" quoteTitle="true" derivedAnchor="RFC4497"> | ||||
<front> | ||||
<title>Interworking between the Session Initiation Protocol (SIP) an | ||||
d QSIG</title> | ||||
<author initials="J." surname="Elwell" fullname="J. Elwell"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="F." surname="Derks" fullname="F. Derks"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="P." surname="Mourot" fullname="P. Mourot"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="O." surname="Rousseau" fullname="O. Rousseau"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2006" month="May"/> | ||||
<abstract> | ||||
<t indent="0">This document specifies interworking between the Ses | ||||
sion Initiation Protocol (SIP) and QSIG within corporate telecommunication netwo | ||||
rks (also known as enterprise networks). SIP is an Internet application-layer c | ||||
ontrol (signalling) protocol for creating, modifying, and terminating sessions w | ||||
ith one or more participants. These sessions include, in particular, telephone c | ||||
alls. QSIG is a signalling protocol for creating, modifying, and terminating ci | ||||
rcuit-switched calls (in particular, telephone calls) within Private Integrated | ||||
Services Networks (PISNs). QSIG is specified in a number of Ecma Standards and | ||||
published also as ISO/IEC standards. This document specifies an Internet Best C | ||||
urrent Practices for the Internet Community, and requests discussion and suggest | ||||
ions for improvements.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="BCP" value="117"/> | ||||
<seriesInfo name="RFC" value="4497"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4497"/> | ||||
</reference> | ||||
<reference anchor="RFC4513" target="https://www.rfc-editor.org/info/rfc4 | ||||
513" quoteTitle="true" derivedAnchor="RFC4513"> | ||||
<front> | ||||
<title>Lightweight Directory Access Protocol (LDAP): Authentication | ||||
Methods and Security Mechanisms</title> | ||||
<author initials="R." surname="Harrison" fullname="R. Harrison" role | ||||
="editor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2006" month="June"/> | ||||
<abstract> | ||||
<t indent="0">This document describes authentication methods and s | ||||
ecurity mechanisms of the Lightweight Directory Access Protocol (LDAP). This doc | ||||
ument details establishment of Transport Layer Security (TLS) using the StartTLS | ||||
operation.</t> | ||||
<t indent="0">This document details the simple Bind authentication | ||||
method including anonymous, unauthenticated, and name/password mechanisms and t | ||||
he Simple Authentication and Security Layer (SASL) Bind authentication method in | ||||
cluding the EXTERNAL mechanism.</t> | ||||
<t indent="0">This document discusses various authentication and a | ||||
uthorization states through which a session to an LDAP server may pass and the a | ||||
ctions that trigger these state changes.</t> | ||||
<t indent="0">This document, together with other documents in the | ||||
LDAP Technical Specification (see Section 1 of the specification's road map), ob | ||||
soletes RFC 2251, RFC 2829, and RFC 2830. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4513"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4513"/> | ||||
</reference> | ||||
<reference anchor="RFC4531" target="https://www.rfc-editor.org/info/rfc4 | ||||
531" quoteTitle="true" derivedAnchor="RFC4531"> | ||||
<front> | ||||
<title>Lightweight Directory Access Protocol (LDAP) Turn Operation</ | ||||
title> | ||||
<author initials="K." surname="Zeilenga" fullname="K. Zeilenga"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2006" month="June"/> | ||||
<abstract> | ||||
<t indent="0">This specification describes a Lightweight Directory | ||||
Access Protocol (LDAP) extended operation to reverse (or "turn") the roles of c | ||||
lient and server for subsequent protocol exchanges in the session, or to enable | ||||
each peer to act as both client and server with respect to the other. This memo | ||||
defines an Experimental Protocol for the Internet community.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4531"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4531"/> | ||||
</reference> | ||||
<reference anchor="RFC4540" target="https://www.rfc-editor.org/info/rfc4 | ||||
540" quoteTitle="true" derivedAnchor="RFC4540"> | ||||
<front> | ||||
<title>NEC's Simple Middlebox Configuration (SIMCO) Protocol Version | ||||
3.0</title> | ||||
<author initials="M." surname="Stiemerling" fullname="M. Stiemerling | ||||
"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="J." surname="Quittek" fullname="J. Quittek"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="C." surname="Cadar" fullname="C. Cadar"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2006" month="May"/> | ||||
<abstract> | ||||
<t indent="0">This document describes a protocol for controlling m | ||||
iddleboxes such as firewalls and network address translators. It is a fully com | ||||
pliant implementation of the Middlebox Communications (MIDCOM) semantics describ | ||||
ed in RFC 3989. Compared to earlier experimental versions of the SIMCO protocol | ||||
, this version (3.0) uses binary message encodings in order to reduce resource r | ||||
equirements. This memo defines an Experimental Protocol for the Internet commun | ||||
ity.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4540"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4540"/> | ||||
</reference> | ||||
<reference anchor="RFC4582" target="https://www.rfc-editor.org/info/rfc4 | ||||
582" quoteTitle="true" derivedAnchor="RFC4582"> | ||||
<front> | ||||
<title>The Binary Floor Control Protocol (BFCP)</title> | ||||
<author initials="G." surname="Camarillo" fullname="G. Camarillo"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="J." surname="Ott" fullname="J. Ott"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="K." surname="Drage" fullname="K. Drage"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2006" month="November"/> | ||||
<abstract> | ||||
<t indent="0">Floor control is a means to manage joint or exclusiv | ||||
e access to shared resources in a (multiparty) conferencing environment. Thereby | ||||
, floor control complements other functions -- such as conference and media sess | ||||
ion setup, conference policy manipulation, and media control -- that are realize | ||||
d by other protocols.</t> | ||||
<t indent="0">This document specifies the Binary Floor Control Pro | ||||
tocol (BFCP). BFCP is used between floor participants and floor control servers, | ||||
and between floor chairs (i.e., moderators) and floor control servers. [STANDA | ||||
RDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4582"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4582"/> | ||||
</reference> | ||||
<reference anchor="RFC4616" target="https://www.rfc-editor.org/info/rfc4 | ||||
616" quoteTitle="true" derivedAnchor="RFC4616"> | ||||
<front> | ||||
<title>The PLAIN Simple Authentication and Security Layer (SASL) Mec | ||||
hanism</title> | ||||
<author initials="K." surname="Zeilenga" fullname="K. Zeilenga" role | ||||
="editor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2006" month="August"/> | ||||
<abstract> | ||||
<t indent="0">This document defines a simple clear-text user/passw | ||||
ord Simple Authentication and Security Layer (SASL) mechanism called the PLAIN m | ||||
echanism. The PLAIN mechanism is intended to be used, in combination with data | ||||
confidentiality services provided by a lower layer, in protocols that lack a sim | ||||
ple password authentication command. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4616"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4616"/> | ||||
</reference> | ||||
<reference anchor="RFC4642" target="https://www.rfc-editor.org/info/rfc4 | ||||
642" quoteTitle="true" derivedAnchor="RFC4642"> | ||||
<front> | ||||
<title>Using Transport Layer Security (TLS) with Network News Transf | ||||
er Protocol (NNTP)</title> | ||||
<author initials="K." surname="Murchison" fullname="K. Murchison"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="J." surname="Vinocur" fullname="J. Vinocur"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="C." surname="Newman" fullname="C. Newman"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2006" month="October"/> | ||||
<abstract> | ||||
<t indent="0">This memo defines an extension to the Network News T | ||||
ransfer Protocol (NNTP) that allows an NNTP client and server to use Transport L | ||||
ayer Security (TLS). The primary goal is to provide encryption for single-link | ||||
confidentiality purposes, but data integrity, (optional) certificate-based peer | ||||
entity authentication, and (optional) data compression are also possible. [STAN | ||||
DARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4642"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4642"/> | ||||
</reference> | ||||
<reference anchor="RFC4680" target="https://www.rfc-editor.org/info/rfc4 | ||||
680" quoteTitle="true" derivedAnchor="RFC4680"> | ||||
<front> | ||||
<title>TLS Handshake Message for Supplemental Data</title> | ||||
<author initials="S." surname="Santesson" fullname="S. Santesson"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2006" month="October"/> | ||||
<abstract> | ||||
<t indent="0">This specification defines a TLS handshake message f | ||||
or exchange of supplemental application data. TLS hello message extensions are | ||||
used to determine which supplemental data types are supported by both the TLS cl | ||||
ient and the TLS server. Then, the supplemental data handshake message is used | ||||
to exchange the data. Other documents will define the syntax of these extension | ||||
s and the syntax of the associated supplemental data types. [STANDARDS-TRACK]</ | ||||
t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4680"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4680"/> | ||||
</reference> | ||||
<reference anchor="RFC4681" target="https://www.rfc-editor.org/info/rfc4 | ||||
681" quoteTitle="true" derivedAnchor="RFC4681"> | ||||
<front> | ||||
<title>TLS User Mapping Extension</title> | ||||
<author initials="S." surname="Santesson" fullname="S. Santesson"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="A." surname="Medvinsky" fullname="A. Medvinsky"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="J." surname="Ball" fullname="J. Ball"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2006" month="October"/> | ||||
<abstract> | ||||
<t indent="0">This document specifies a TLS extension that enables | ||||
clients to send generic user mapping hints in a supplemental data handshake mes | ||||
sage defined in RFC 4680. One such mapping hint is defined in an informative se | ||||
ction, the UpnDomainHint, which may be used by a server to locate a user in a di | ||||
rectory database. Other mapping hints may be defined in other documents in the | ||||
future. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4681"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4681"/> | ||||
</reference> | ||||
<reference anchor="RFC4712" target="https://www.rfc-editor.org/info/rfc4 | ||||
712" quoteTitle="true" derivedAnchor="RFC4712"> | ||||
<front> | ||||
<title>Transport Mappings for Real-time Application Quality-of-Servi | ||||
ce Monitoring (RAQMON) Protocol Data Unit (PDU)</title> | ||||
<author initials="A." surname="Siddiqui" fullname="A. Siddiqui"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="D." surname="Romascanu" fullname="D. Romascanu"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="E." surname="Golovinsky" fullname="E. Golovinsky"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="M." surname="Rahman" fullname="M. Rahman"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="Y." surname="Kim" fullname="Y. Kim"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2006" month="October"/> | ||||
<abstract> | ||||
<t indent="0">This memo specifies two transport mappings of the \% | ||||
Real-Time Application Quality-of-Service Monitoring (RAQMON) information model d | ||||
efined in RFC 4710 using TCP as a native transport and the Simple Network Manage | ||||
ment Protocol (SNMP) to carry the RAQMON information from a RAQMON Data Source ( | ||||
RDS) to a RAQMON Report Collector (RRC). [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4712"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4712"/> | ||||
</reference> | ||||
<reference anchor="RFC4732" target="https://www.rfc-editor.org/info/rfc4 | ||||
732" quoteTitle="true" derivedAnchor="RFC4732"> | ||||
<front> | ||||
<title>Internet Denial-of-Service Considerations</title> | ||||
<author initials="M." surname="Handley" fullname="M. Handley" role=" | ||||
editor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="E." surname="Rescorla" fullname="E. Rescorla" role | ||||
="editor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author> | ||||
<organization showOnFrontPage="true">IAB</organization> | ||||
</author> | ||||
<date year="2006" month="December"/> | ||||
<abstract> | ||||
<t indent="0">This document provides an overview of possible avenu | ||||
es for denial-of-service (DoS) attack on Internet systems. The aim is to encour | ||||
age protocol designers and network engineers towards designs that are more robus | ||||
t. We discuss partial solutions that reduce the effectiveness of attacks, and h | ||||
ow some solutions might inadvertently open up alternative vulnerabilities. This | ||||
memo provides information for the Internet community.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4732"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4732"/> | ||||
</reference> | ||||
<reference anchor="RFC4743" target="https://www.rfc-editor.org/info/rfc4 | ||||
743" quoteTitle="true" derivedAnchor="RFC4743"> | ||||
<front> | ||||
<title>Using NETCONF over the Simple Object Access Protocol (SOAP)</ | ||||
title> | ||||
<author initials="T." surname="Goddard" fullname="T. Goddard"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2006" month="December"/> | ||||
<abstract> | ||||
<t indent="0">The Network Configuration Protocol (NETCONF) is appl | ||||
icable to a wide range of devices in a variety of environments. Web Services is | ||||
one such environment and is presently characterized by the use of the Simple Ob | ||||
ject Access Protocol (SOAP). NETCONF finds many benefits in this environment: f | ||||
rom the reuse of existing standards, to ease of software development, to integra | ||||
tion with deployed systems. Herein, we describe SOAP over HTTP and SOAP over Bl | ||||
ocks Exchange Extensible Protocol (BEEP) bindings for NETCONF. [STANDARDS-TRACK | ||||
]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4743"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4743"/> | ||||
</reference> | ||||
<reference anchor="RFC4744" target="https://www.rfc-editor.org/info/rfc4 | ||||
744" quoteTitle="true" derivedAnchor="RFC4744"> | ||||
<front> | ||||
<title>Using the NETCONF Protocol over the Blocks Extensible Exchang | ||||
e Protocol (BEEP)</title> | ||||
<author initials="E." surname="Lear" fullname="E. Lear"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="K." surname="Crozier" fullname="K. Crozier"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2006" month="December"/> | ||||
<abstract> | ||||
<t indent="0">This document specifies an application protocol mapp | ||||
ing for the Network Configuration Protocol (NETCONF) over the Blocks Extensible | ||||
Exchange Protocol (BEEP). [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4744"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4744"/> | ||||
</reference> | ||||
<reference anchor="RFC4785" target="https://www.rfc-editor.org/info/rfc4 | ||||
785" quoteTitle="true" derivedAnchor="RFC4785"> | ||||
<front> | ||||
<title>Pre-Shared Key (PSK) Ciphersuites with NULL Encryption for Tr | ||||
ansport Layer Security (TLS)</title> | ||||
<author initials="U." surname="Blumenthal" fullname="U. Blumenthal"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="P." surname="Goel" fullname="P. Goel"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2007" month="January"/> | ||||
<abstract> | ||||
<t indent="0">This document specifies authentication-only ciphersu | ||||
ites (with no encryption) for the Pre-Shared Key (PSK) based Transport Layer Sec | ||||
urity (TLS) protocol. These ciphersuites are useful when authentication and int | ||||
egrity protection is desired, but confidentiality is not needed or not permitted | ||||
. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4785"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4785"/> | ||||
</reference> | ||||
<reference anchor="RFC4791" target="https://www.rfc-editor.org/info/rfc4 | ||||
791" quoteTitle="true" derivedAnchor="RFC4791"> | ||||
<front> | ||||
<title>Calendaring Extensions to WebDAV (CalDAV)</title> | ||||
<author initials="C." surname="Daboo" fullname="C. Daboo"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="B." surname="Desruisseaux" fullname="B. Desruissea | ||||
ux"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="L." surname="Dusseault" fullname="L. Dusseault"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2007" month="March"/> | ||||
<abstract> | ||||
<t indent="0">This document defines extensions to the Web Distribu | ||||
ted Authoring and Versioning (WebDAV) protocol to specify a standard way of acce | ||||
ssing, managing, and sharing calendaring and scheduling information based on the | ||||
iCalendar format. This document defines the "calendar-access" feature of CalDA | ||||
V. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4791"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4791"/> | ||||
</reference> | ||||
<reference anchor="RFC4823" target="https://www.rfc-editor.org/info/rfc4 | ||||
823" quoteTitle="true" derivedAnchor="RFC4823"> | ||||
<front> | ||||
<title>FTP Transport for Secure Peer-to-Peer Business Data Interchan | ||||
ge over the Internet</title> | ||||
<author initials="T." surname="Harding" fullname="T. Harding"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="R." surname="Scott" fullname="R. Scott"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2007" month="April"/> | ||||
<abstract> | ||||
<t indent="0">This Applicability Statement (AS) describes how to e | ||||
xchange structured business data securely using the File Transfer Protocol (FTP) | ||||
for XML, Binary, Electronic Data Interchange (EDI - ANSI X12 or UN/EDIFACT), or | ||||
other data used for business-to-business data interchange for which MIME packag | ||||
ing can be accomplished using standard MIME content types. Authentication and da | ||||
ta confidentiality are obtained by using Cryptographic Message Syntax (S/MIME) s | ||||
ecurity body parts. Authenticated acknowledgements employ multipart/signed repli | ||||
es to the original message. This memo provides information for the Internet com | ||||
munity.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4823"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4823"/> | ||||
</reference> | ||||
<reference anchor="RFC4851" target="https://www.rfc-editor.org/info/rfc4 | ||||
851" quoteTitle="true" derivedAnchor="RFC4851"> | ||||
<front> | ||||
<title>The Flexible Authentication via Secure Tunneling Extensible A | ||||
uthentication Protocol Method (EAP-FAST)</title> | ||||
<author initials="N." surname="Cam-Winget" fullname="N. Cam-Winget"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="D." surname="McGrew" fullname="D. McGrew"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="J." surname="Salowey" fullname="J. Salowey"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="H." surname="Zhou" fullname="H. Zhou"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2007" month="May"/> | ||||
<abstract> | ||||
<t indent="0">This document defines the Extensible Authentication | ||||
Protocol (EAP) based Flexible Authentication via Secure Tunneling (EAP-FAST) pro | ||||
tocol. EAP-FAST is an EAP method that enables secure communication between a pe | ||||
er and a server by using the Transport Layer Security (TLS) to establish a mutua | ||||
lly authenticated tunnel. Within the tunnel, Type-Length-Value (TLV) objects are | ||||
used to convey authentication related data between the peer and the EAP server. | ||||
This memo provides information for the Internet community.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4851"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4851"/> | ||||
</reference> | ||||
<reference anchor="RFC4964" target="https://www.rfc-editor.org/info/rfc4 | ||||
964" quoteTitle="true" derivedAnchor="RFC4964"> | ||||
<front> | ||||
<title>The P-Answer-State Header Extension to the Session Initiation | ||||
Protocol for the Open Mobile Alliance Push to Talk over Cellular</title> | ||||
<author initials="A." surname="Allen" fullname="A. Allen" role="edit | ||||
or"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="J." surname="Holm" fullname="J. Holm"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="T." surname="Hallin" fullname="T. Hallin"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2007" month="September"/> | ||||
<abstract> | ||||
<t indent="0">This document describes a private Session Initiation | ||||
Protocol (SIP) header (P-header) used by the Open Mobile Alliance (OMA) for Pus | ||||
h to talk over Cellular (PoC) along with its applicability, which is limited to | ||||
the OMA PoC application. The P-Answer-State header is used for indicating the a | ||||
nswering mode of the handset, which is particular to the PoC application. This | ||||
memo provides information for the Internet community.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4964"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4964"/> | ||||
</reference> | ||||
<reference anchor="RFC4975" target="https://www.rfc-editor.org/info/rfc4 | ||||
975" quoteTitle="true" derivedAnchor="RFC4975"> | ||||
<front> | ||||
<title>The Message Session Relay Protocol (MSRP)</title> | ||||
<author initials="B." surname="Campbell" fullname="B. Campbell" role | ||||
="editor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="R." surname="Mahy" fullname="R. Mahy" role="editor | ||||
"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="C." surname="Jennings" fullname="C. Jennings" role | ||||
="editor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2007" month="September"/> | ||||
<abstract> | ||||
<t indent="0">This document describes the Message Session Relay Pr | ||||
otocol, a protocol for transmitting a series of related instant messages in the | ||||
context of a session. Message sessions are treated like any other media stream | ||||
when set up via a rendezvous or session creation protocol such as the Session In | ||||
itiation Protocol. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4975"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4975"/> | ||||
</reference> | ||||
<reference anchor="RFC4976" target="https://www.rfc-editor.org/info/rfc4 | ||||
976" quoteTitle="true" derivedAnchor="RFC4976"> | ||||
<front> | ||||
<title>Relay Extensions for the Message Sessions Relay Protocol (MSR | ||||
P)</title> | ||||
<author initials="C." surname="Jennings" fullname="C. Jennings"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="R." surname="Mahy" fullname="R. Mahy"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="A. B." surname="Roach" fullname="A. B. Roach"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2007" month="September"/> | ||||
<abstract> | ||||
<t indent="0">Two separate models for conveying instant messages h | ||||
ave been defined. Page-mode messages stand alone and are not part of a Session I | ||||
nitiation Protocol (SIP) session, whereas session-mode messages are set up as pa | ||||
rt of a session using SIP. The Message Session Relay Protocol (MSRP) is a proto | ||||
col for near real-time, peer-to-peer exchanges of binary content without interme | ||||
diaries, which is designed to be signaled using a separate rendezvous protocol s | ||||
uch as SIP. This document introduces the notion of message relay intermediaries | ||||
to MSRP and describes the extensions necessary to use them. [STANDARDS-TRACK]< | ||||
/t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4976"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4976"/> | ||||
</reference> | ||||
<reference anchor="RFC4992" target="https://www.rfc-editor.org/info/rfc4 | ||||
992" quoteTitle="true" derivedAnchor="RFC4992"> | ||||
<front> | ||||
<title>XML Pipelining with Chunks for the Internet Registry Informat | ||||
ion Service</title> | ||||
<author initials="A." surname="Newton" fullname="A. Newton"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2007" month="August"/> | ||||
<abstract> | ||||
<t indent="0">This document describes a simple TCP transfer protoc | ||||
ol for the Internet Registry Information Service (IRIS). Data is transferred be | ||||
tween clients and servers using chunks to achieve pipelining. [STANDARDS-TRACK] | ||||
</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4992"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4992"/> | ||||
</reference> | ||||
<reference anchor="RFC5018" target="https://www.rfc-editor.org/info/rfc5 | ||||
018" quoteTitle="true" derivedAnchor="RFC5018"> | ||||
<front> | ||||
<title>Connection Establishment in the Binary Floor Control Protocol | ||||
(BFCP)</title> | ||||
<author initials="G." surname="Camarillo" fullname="G. Camarillo"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2007" month="September"/> | ||||
<abstract> | ||||
<t indent="0">This document specifies how a Binary Floor Control P | ||||
rotocol (BFCP) client establishes a connection to a BFCP floor control server ou | ||||
tside the context of an offer/answer exchange. Client and server authentication | ||||
are based on Transport Layer Security (TLS). [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5018"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5018"/> | ||||
</reference> | ||||
<reference anchor="RFC5019" target="https://www.rfc-editor.org/info/rfc5 | ||||
019" quoteTitle="true" derivedAnchor="RFC5019"> | ||||
<front> | ||||
<title>The Lightweight Online Certificate Status Protocol (OCSP) Pro | ||||
file for High-Volume Environments</title> | ||||
<author initials="A." surname="Deacon" fullname="A. Deacon"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="R." surname="Hurst" fullname="R. Hurst"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2007" month="September"/> | ||||
<abstract> | ||||
<t indent="0">This specification defines a profile of the Online C | ||||
ertificate Status Protocol (OCSP) that addresses the scalability issues inherent | ||||
when using OCSP in large scale (high volume) Public Key Infrastructure (PKI) en | ||||
vironments and/or in PKI environments that require a lightweight solution to min | ||||
imize communication bandwidth and client-side processing. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5019"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5019"/> | ||||
</reference> | ||||
<reference anchor="RFC5023" target="https://www.rfc-editor.org/info/rfc5 | ||||
023" quoteTitle="true" derivedAnchor="RFC5023"> | ||||
<front> | ||||
<title>The Atom Publishing Protocol</title> | ||||
<author initials="J." surname="Gregorio" fullname="J. Gregorio" role | ||||
="editor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="B." surname="de hOra" fullname="B. de hOra" role=" | ||||
editor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2007" month="October"/> | ||||
<abstract> | ||||
<t indent="0">The Atom Publishing Protocol (AtomPub) is an applica | ||||
tion-level protocol for publishing and editing Web resources. The protocol is b | ||||
ased on HTTP transfer of Atom-formatted representations. The Atom format is doc | ||||
umented in the Atom Syndication Format. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5023"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5023"/> | ||||
</reference> | ||||
<reference anchor="RFC5024" target="https://www.rfc-editor.org/info/rfc5 | ||||
024" quoteTitle="true" derivedAnchor="RFC5024"> | ||||
<front> | ||||
<title>ODETTE File Transfer Protocol 2.0</title> | ||||
<author initials="I." surname="Friend" fullname="I. Friend"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2007" month="November"/> | ||||
<abstract> | ||||
<t indent="0">This memo updates the ODETTE File Transfer Protocol, | ||||
an established file transfer protocol facilitating electronic data interchange | ||||
of business data between trading partners, to version 2.</t> | ||||
<t indent="0">The protocol now supports secure and authenticated c | ||||
ommunication over the Internet using Transport Layer Security, provides file enc | ||||
ryption, signing, and compression using Cryptographic Message Syntax, and provid | ||||
es signed receipts for the acknowledgement of received files.</t> | ||||
<t indent="0">The protocol supports both direct peer-to-peer commu | ||||
nication and indirect communication via a Value Added Network and may be used wi | ||||
th TCP/IP, X.25, and ISDN-based networks. This memo provides information for th | ||||
e Internet community.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5024"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5024"/> | ||||
</reference> | ||||
<reference anchor="RFC5049" target="https://www.rfc-editor.org/info/rfc5 | ||||
049" quoteTitle="true" derivedAnchor="RFC5049"> | ||||
<front> | ||||
<title>Applying Signaling Compression (SigComp) to the Session Initi | ||||
ation Protocol (SIP)</title> | ||||
<author initials="C." surname="Bormann" fullname="C. Bormann"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="Z." surname="Liu" fullname="Z. Liu"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="R." surname="Price" fullname="R. Price"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="G." surname="Camarillo" fullname="G. Camarillo" ro | ||||
le="editor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2007" month="December"/> | ||||
<abstract> | ||||
<t indent="0">This document describes some specifics that apply wh | ||||
en Signaling Compression (SigComp) is applied to the Session Initiation Protocol | ||||
(SIP), such as default minimum values of SigComp parameters, compartment and st | ||||
ate management, and a few issues on SigComp over TCP. Any implementation of Sig | ||||
Comp for use with SIP must conform to this document and SigComp, and in addition | ||||
, support the SIP and Session Description Protocol (SDP) static dictionary. [ST | ||||
ANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5049"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5049"/> | ||||
</reference> | ||||
<reference anchor="RFC5054" target="https://www.rfc-editor.org/info/rfc5 | ||||
054" quoteTitle="true" derivedAnchor="RFC5054"> | ||||
<front> | ||||
<title>Using the Secure Remote Password (SRP) Protocol for TLS Authe | ||||
ntication</title> | ||||
<author initials="D." surname="Taylor" fullname="D. Taylor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="T." surname="Wu" fullname="T. Wu"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="N." surname="Mavrogiannopoulos" fullname="N. Mavro | ||||
giannopoulos"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="T." surname="Perrin" fullname="T. Perrin"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2007" month="November"/> | ||||
<abstract> | ||||
<t indent="0">This memo presents a technique for using the Secure | ||||
Remote Password protocol as an authentication method for the Transport Layer Sec | ||||
urity protocol. This memo provides information for the Internet community.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5054"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5054"/> | ||||
</reference> | ||||
<reference anchor="RFC5091" target="https://www.rfc-editor.org/info/rfc5 | ||||
091" quoteTitle="true" derivedAnchor="RFC5091"> | ||||
<front> | ||||
<title>Identity-Based Cryptography Standard (IBCS) #1: Supersingular | ||||
Curve Implementations of the BF and BB1 Cryptosystems</title> | ||||
<author initials="X." surname="Boyen" fullname="X. Boyen"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="L." surname="Martin" fullname="L. Martin"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2007" month="December"/> | ||||
<abstract> | ||||
<t indent="0">This document describes the algorithms that implemen | ||||
t Boneh-Franklin (BF) and Boneh-Boyen (BB1) Identity-based Encryption. This doc | ||||
ument is in part based on IBCS #1 v2 of Voltage Security's Identity-based Crypto | ||||
graphy Standards (IBCS) documents, from which some irrelevant sections have been | ||||
removed to create the content of this document. This memo provides information | ||||
for the Internet community.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5091"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5091"/> | ||||
</reference> | ||||
<reference anchor="RFC5158" target="https://www.rfc-editor.org/info/rfc5 | ||||
158" quoteTitle="true" derivedAnchor="RFC5158"> | ||||
<front> | ||||
<title>6to4 Reverse DNS Delegation Specification</title> | ||||
<author initials="G." surname="Huston" fullname="G. Huston"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2008" month="March"/> | ||||
<abstract> | ||||
<t indent="0">This memo describes the service mechanism for enteri | ||||
ng a delegation of DNS servers that provide reverse lookup of 6to4 IPv6 addresse | ||||
s into the 6to4 reverse zone file. The mechanism is based on a conventional DNS | ||||
delegation service interface, allowing the service client to enter the details | ||||
of a number of DNS servers for the delegated domain. In the context of a 6to4 r | ||||
everse delegation, the client is primarily authenticated by its source address u | ||||
sed in the delegation request, and is authorized to use the function if its IPv6 | ||||
address prefix corresponds to an address from within the requested 6to4 delegat | ||||
ion address block. This memo provides information for the Internet community.</ | ||||
t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5158"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5158"/> | ||||
</reference> | ||||
<reference anchor="RFC5216" target="https://www.rfc-editor.org/info/rfc5 | ||||
216" quoteTitle="true" derivedAnchor="RFC5216"> | ||||
<front> | ||||
<title>The EAP-TLS Authentication Protocol</title> | ||||
<author initials="D." surname="Simon" fullname="D. Simon"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="B." surname="Aboba" fullname="B. Aboba"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="R." surname="Hurst" fullname="R. Hurst"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2008" month="March"/> | ||||
<abstract> | ||||
<t indent="0">The Extensible Authentication Protocol (EAP), define | ||||
d in RFC 3748, provides support for multiple authentication methods. Transport | ||||
Layer Security (TLS) provides for mutual authentication, integrity-protected cip | ||||
hersuite negotiation, and key exchange between two endpoints. This document def | ||||
ines EAP-TLS, which includes support for certificate-based mutual authentication | ||||
and key derivation.</t> | ||||
<t indent="0">This document obsoletes RFC 2716. A summary of the | ||||
changes between this document and RFC 2716 is available in Appendix A. [STANDAR | ||||
DS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5216"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5216"/> | ||||
</reference> | ||||
<reference anchor="RFC5238" target="https://www.rfc-editor.org/info/rfc5 | ||||
238" quoteTitle="true" derivedAnchor="RFC5238"> | ||||
<front> | ||||
<title>Datagram Transport Layer Security (DTLS) over the Datagram Co | ||||
ngestion Control Protocol (DCCP)</title> | ||||
<author initials="T." surname="Phelan" fullname="T. Phelan"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2008" month="May"/> | ||||
<abstract> | ||||
<t indent="0">This document specifies the use of Datagram Transpor | ||||
t Layer Security (DTLS) over the Datagram Congestion Control Protocol (DCCP). D | ||||
TLS provides communications privacy for applications that use datagram transport | ||||
protocols and allows client/server applications to communicate in a way that is | ||||
designed to prevent eavesdropping and detect tampering or message forgery. DCC | ||||
P is a transport protocol that provides a congestion-controlled unreliable datag | ||||
ram service. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5238"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5238"/> | ||||
</reference> | ||||
<reference anchor="RFC5263" target="https://www.rfc-editor.org/info/rfc5 | ||||
263" quoteTitle="true" derivedAnchor="RFC5263"> | ||||
<front> | ||||
<title>Session Initiation Protocol (SIP) Extension for Partial Notif | ||||
ication of Presence Information</title> | ||||
<author initials="M." surname="Lonnfors" fullname="M. Lonnfors"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="J." surname="Costa-Requena" fullname="J. Costa-Req | ||||
uena"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="E." surname="Leppanen" fullname="E. Leppanen"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="H." surname="Khartabil" fullname="H. Khartabil"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2008" month="September"/> | ||||
<abstract> | ||||
<t indent="0">By default, presence delivered using the presence ev | ||||
ent package for the Session Initiation Protocol (SIP) is represented in the Pres | ||||
ence Information Data Format (PIDF). A PIDF document contains a set of elements | ||||
, each representing a different aspect of the presence being reported. When any | ||||
subset of the elements change, even just a single element, a new document conta | ||||
ining the full set of elements is delivered. This memo defines an extension all | ||||
owing delivery of only the presence data that has actually changed. [STANDARDS- | ||||
TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5263"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5263"/> | ||||
</reference> | ||||
<reference anchor="RFC5281" target="https://www.rfc-editor.org/info/rfc5 | ||||
281" quoteTitle="true" derivedAnchor="RFC5281"> | ||||
<front> | ||||
<title>Extensible Authentication Protocol Tunneled Transport Layer S | ||||
ecurity Authenticated Protocol Version 0 (EAP-TTLSv0)</title> | ||||
<author initials="P." surname="Funk" fullname="P. Funk"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="S." surname="Blake-Wilson" fullname="S. Blake-Wils | ||||
on"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2008" month="August"/> | ||||
<abstract> | ||||
<t indent="0">EAP-TTLS is an EAP (Extensible Authentication Protoc | ||||
ol) method that encapsulates a TLS (Transport Layer Security) session, consistin | ||||
g of a handshake phase and a data phase. During the handshake phase, the server | ||||
is authenticated to the client (or client and server are mutually authenticated | ||||
) using standard TLS procedures, and keying material is generated in order to cr | ||||
eate a cryptographically secure tunnel for information exchange in the subsequen | ||||
t data phase. During the data phase, the client is authenticated to the server | ||||
(or client and server are mutually authenticated) using an arbitrary authenticat | ||||
ion mechanism encapsulated within the secure tunnel. The encapsulated authentic | ||||
ation mechanism may itself be EAP, or it may be another authentication protocol | ||||
such as PAP, CHAP, MS-CHAP, or MS-CHAP-V2. Thus, EAP-TTLS allows legacy passwor | ||||
d-based authentication protocols to be used against existing authentication data | ||||
bases, while protecting the security of these legacy protocols against eavesdrop | ||||
ping, man-in-the-middle, and other attacks. The data phase may also be used for | ||||
additional, arbitrary data exchange. This memo provides information for the I | ||||
nternet community.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5281"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5281"/> | ||||
</reference> | ||||
<reference anchor="RFC5364" target="https://www.rfc-editor.org/info/rfc5 | ||||
364" quoteTitle="true" derivedAnchor="RFC5364"> | ||||
<front> | ||||
<title>Extensible Markup Language (XML) Format Extension for Represe | ||||
nting Copy Control Attributes in Resource Lists</title> | ||||
<author initials="M." surname="Garcia-Martin" fullname="M. Garcia-Ma | ||||
rtin"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="G." surname="Camarillo" fullname="G. Camarillo"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2008" month="October"/> | ||||
<abstract> | ||||
<t indent="0">In certain types of multimedia communications, a Ses | ||||
sion Initiation Protocol (SIP) request is distributed to a group of SIP User Age | ||||
nts (UAs). The sender sends a single SIP request to a server which further dist | ||||
ributes the request to the group. This SIP request contains a list of Uniform R | ||||
esource Identifiers (URIs), which identify the recipients of the SIP request. T | ||||
his URI list is expressed as a resource list XML document. This specification d | ||||
efines an XML extension to the XML resource list format that allows the sender o | ||||
f the request to qualify a recipient with a copy control level similar to the co | ||||
py control level of existing email systems. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5364"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5364"/> | ||||
</reference> | ||||
<reference anchor="RFC5422" target="https://www.rfc-editor.org/info/rfc5 | ||||
422" quoteTitle="true" derivedAnchor="RFC5422"> | ||||
<front> | ||||
<title>Dynamic Provisioning Using Flexible Authentication via Secure | ||||
Tunneling Extensible Authentication Protocol (EAP-FAST)</title> | ||||
<author initials="N." surname="Cam-Winget" fullname="N. Cam-Winget"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="D." surname="McGrew" fullname="D. McGrew"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="J." surname="Salowey" fullname="J. Salowey"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="H." surname="Zhou" fullname="H. Zhou"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2009" month="March"/> | ||||
<abstract> | ||||
<t indent="0">The Flexible Authentication via Secure Tunneling Ext | ||||
ensible Authentication Protocol (EAP-FAST) method enables secure communication b | ||||
etween a peer and a server by using Transport Layer Security (TLS) to establish | ||||
a mutually authenticated tunnel. EAP- FAST also enables the provisioning creden | ||||
tials or other information through this protected tunnel. This document describ | ||||
es the use of EAP-FAST for dynamic provisioning. This memo provides information | ||||
for the Internet community.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5422"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5422"/> | ||||
</reference> | ||||
<reference anchor="RFC5469" target="https://www.rfc-editor.org/info/rfc5 | ||||
469" quoteTitle="true" derivedAnchor="RFC5469"> | ||||
<front> | ||||
<title>DES and IDEA Cipher Suites for Transport Layer Security (TLS) | ||||
</title> | ||||
<author initials="P." surname="Eronen" fullname="P. Eronen" role="ed | ||||
itor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2009" month="February"/> | ||||
<abstract> | ||||
<t indent="0">Transport Layer Security (TLS) versions 1.0 (RFC 224 | ||||
6) and 1.1 (RFC 4346) include cipher suites based on DES (Data Encryption Standa | ||||
rd) and IDEA (International Data Encryption Algorithm) algorithms. DES (when us | ||||
ed in single-DES mode) and IDEA are no longer recommended for general use in TLS | ||||
, and have been removed from TLS version 1.2 (RFC 5246). This document specifie | ||||
s these cipher suites for completeness and discusses reasons why their use is no | ||||
longer recommended. This memo provides information for the Internet community. | ||||
</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5469"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5469"/> | ||||
</reference> | ||||
<reference anchor="RFC5734" target="https://www.rfc-editor.org/info/rfc5 | ||||
734" quoteTitle="true" derivedAnchor="RFC5734"> | ||||
<front> | ||||
<title>Extensible Provisioning Protocol (EPP) Transport over TCP</ti | ||||
tle> | ||||
<author initials="S." surname="Hollenbeck" fullname="S. Hollenbeck"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2009" month="August"/> | ||||
<abstract> | ||||
<t indent="0">This document describes how an Extensible Provisioni | ||||
ng Protocol (EPP) session is mapped onto a single Transmission Control Protocol | ||||
(TCP) connection. This mapping requires use of the Transport Layer Security (TL | ||||
S) protocol to protect information exchanged between an EPP client and an EPP se | ||||
rver. This document obsoletes RFC 4934. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="STD" value="69"/> | ||||
<seriesInfo name="RFC" value="5734"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5734"/> | ||||
</reference> | ||||
<reference anchor="RFC5878" target="https://www.rfc-editor.org/info/rfc5 | ||||
878" quoteTitle="true" derivedAnchor="RFC5878"> | ||||
<front> | ||||
<title>Transport Layer Security (TLS) Authorization Extensions</titl | ||||
e> | ||||
<author initials="M." surname="Brown" fullname="M. Brown"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="R." surname="Housley" fullname="R. Housley"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2010" month="May"/> | ||||
<abstract> | ||||
<t indent="0">This document specifies authorization extensions to | ||||
the Transport Layer Security (TLS) Handshake Protocol. Extensions are carried i | ||||
n the client and server hello messages to confirm that both parties support the | ||||
desired authorization data types. Then, if supported by both the client and the | ||||
server, authorization information, such as attribute certificates (ACs) or Secu | ||||
rity Assertion Markup Language (SAML) assertions, is exchanged in the supplemen | ||||
tal data handshake message. This document defines an Experimental Protocol for t | ||||
he Internet community.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5878"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5878"/> | ||||
</reference> | ||||
<reference anchor="RFC5953" target="https://www.rfc-editor.org/info/rfc5 | ||||
953" quoteTitle="true" derivedAnchor="RFC5953"> | ||||
<front> | ||||
<title>Transport Layer Security (TLS) Transport Model for the Simple | ||||
Network Management Protocol (SNMP)</title> | ||||
<author initials="W." surname="Hardaker" fullname="W. Hardaker"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2010" month="August"/> | ||||
<abstract> | ||||
<t indent="0">This document describes a Transport Model for the Si | ||||
mple Network Management Protocol (SNMP), that uses either the Transport Layer Se | ||||
curity protocol or the Datagram Transport Layer Security (DTLS) protocol. The T | ||||
LS and DTLS protocols provide authentication and privacy services for SNMP appli | ||||
cations. This document describes how the TLS Transport Model (TLSTM) implements | ||||
the needed features of a SNMP Transport Subsystem to make this protection possi | ||||
ble in an interoperable way.</t> | ||||
<t indent="0">This Transport Model is designed to meet the securit | ||||
y and operational needs of network administrators. It supports the sending of S | ||||
NMP messages over TLS/TCP and DTLS/UDP. The TLS mode can make use of TCP's impr | ||||
oved support for larger packet sizes and the DTLS mode provides potentially supe | ||||
rior operation in environments where a connectionless (e.g., UDP) transport is p | ||||
referred. Both TLS and DTLS integrate well into existing public keying infrastr | ||||
uctures.</t> | ||||
<t indent="0">This document also defines a portion of the Manageme | ||||
nt Information Base (MIB) for use with network management protocols. In particu | ||||
lar, it defines objects for managing the TLS Transport Model for SNMP. [STANDA | ||||
RDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5953"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5953"/> | ||||
</reference> | ||||
<reference anchor="RFC6042" target="https://www.rfc-editor.org/info/rfc6 | ||||
042" quoteTitle="true" derivedAnchor="RFC6042"> | ||||
<front> | ||||
<title>Transport Layer Security (TLS) Authorization Using KeyNote</t | ||||
itle> | ||||
<author initials="A." surname="Keromytis" fullname="A. Keromytis"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2010" month="October"/> | ||||
<abstract> | ||||
<t indent="0">This document specifies the use of the KeyNote trust | ||||
-management system as an authorization extension in the Transport Layer Security | ||||
(TLS) Handshake Protocol, according to guidelines in RFC 5878. Extensions carr | ||||
ied in the client and server hello messages confirm that both parties support th | ||||
e desired authorization data types. Then, if supported by both the client and t | ||||
he server, KeyNote credentials are exchanged in the supplemental data handshake | ||||
message. This document is not an Internet Standards Track specification; it is | ||||
published for informational purposes.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="6042"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6042"/> | ||||
</reference> | ||||
<reference anchor="RFC6176" target="https://www.rfc-editor.org/info/rfc6 | ||||
176" quoteTitle="true" derivedAnchor="RFC6176"> | ||||
<front> | ||||
<title>Prohibiting Secure Sockets Layer (SSL) Version 2.0</title> | ||||
<author initials="S." surname="Turner" fullname="S. Turner"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="T." surname="Polk" fullname="T. Polk"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2011" month="March"/> | ||||
<abstract> | ||||
<t indent="0">This document requires that when Transport Layer Sec | ||||
urity (TLS) clients and servers establish connections, they never negotiate the | ||||
use of Secure Sockets Layer (SSL) version 2.0. This document updates the back | ||||
ward compatibility sections found in the Transport Layer Security (TLS). [STANDA | ||||
RDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="6176"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6176"/> | ||||
</reference> | ||||
<reference anchor="RFC6353" target="https://www.rfc-editor.org/info/rfc6 | ||||
353" quoteTitle="true" derivedAnchor="RFC6353"> | ||||
<front> | ||||
<title>Transport Layer Security (TLS) Transport Model for the Simple | ||||
Network Management Protocol (SNMP)</title> | ||||
<author initials="W." surname="Hardaker" fullname="W. Hardaker"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2011" month="July"/> | ||||
<abstract> | ||||
<t indent="0">This document describes a Transport Model for the Si | ||||
mple Network Management Protocol (SNMP), that uses either the Transport Layer Se | ||||
curity protocol or the Datagram Transport Layer Security (DTLS) protocol. The T | ||||
LS and DTLS protocols provide authentication and privacy services for SNMP appli | ||||
cations. This document describes how the TLS Transport Model (TLSTM) implements | ||||
the needed features of an SNMP Transport Subsystem to make this protection poss | ||||
ible in an interoperable way.</t> | ||||
<t indent="0">This Transport Model is designed to meet the securit | ||||
y and operational needs of network administrators. It supports the sending of S | ||||
NMP messages over TLS/TCP and DTLS/UDP. The TLS mode can make use of TCP's impr | ||||
oved support for larger packet sizes and the DTLS mode provides potentially supe | ||||
rior operation in environments where a connectionless (e.g., UDP) transport is p | ||||
referred. Both TLS and DTLS integrate well into existing public keying infrastr | ||||
uctures.</t> | ||||
<t indent="0">This document also defines a portion of the Manageme | ||||
nt Information Base (MIB) for use with network management protocols. In particu | ||||
lar, it defines objects for managing the TLS Transport Model for SNMP. [STANDAR | ||||
DS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="STD" value="78"/> | ||||
<seriesInfo name="RFC" value="6353"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6353"/> | ||||
</reference> | ||||
<reference anchor="RFC6367" target="https://www.rfc-editor.org/info/rfc6 | ||||
367" quoteTitle="true" derivedAnchor="RFC6367"> | ||||
<front> | ||||
<title>Addition of the Camellia Cipher Suites to Transport Layer Sec | ||||
urity (TLS)</title> | ||||
<author initials="S." surname="Kanno" fullname="S. Kanno"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="M." surname="Kanda" fullname="M. Kanda"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2011" month="September"/> | ||||
<abstract> | ||||
<t indent="0">This document specifies forty-two cipher suites for | ||||
the Transport Security Layer (TLS) protocol to support the Camellia encryption a | ||||
lgorithm as a block cipher. This document is not an Internet Standards Track s | ||||
pecification; it is published for informational purposes.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="6367"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6367"/> | ||||
</reference> | ||||
<reference anchor="RFC6739" target="https://www.rfc-editor.org/info/rfc6 | ||||
739" quoteTitle="true" derivedAnchor="RFC6739"> | ||||
<front> | ||||
<title>Synchronizing Service Boundaries and <mapping> Elements | ||||
Based on the Location-to-Service Translation (LoST) Protocol</title> | ||||
<author initials="H." surname="Schulzrinne" fullname="H. Schulzrinne | ||||
"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="H." surname="Tschofenig" fullname="H. Tschofenig"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2012" month="October"/> | ||||
<abstract> | ||||
<t indent="0">The Location-to-Service Translation (LoST) protocol | ||||
is an XML-based protocol for mapping service identifiers and geodetic or civic l | ||||
ocation information to service URIs and service boundaries. In particular, it c | ||||
an be used to determine the location-appropriate Public Safety Answering Point ( | ||||
PSAP) for emergency services.</t> | ||||
<t indent="0">The <mapping> element in the LoST protocol spe | ||||
cification encapsulates information about service boundaries and circumscribes t | ||||
he region within which all locations map to the same service Uniform Resource Id | ||||
entifier (URI) or set of URIs for a given service.</t> | ||||
<t indent="0">This document defines an XML protocol to exchange th | ||||
ese mappings between two nodes. This mechanism is designed for the exchange of | ||||
authoritative <mapping> elements between two entities. Exchanging cached | ||||
<mapping> elements, i.e., non-authoritative elements, is possible but not | ||||
envisioned. Even though the <mapping> element format is reused from the L | ||||
oST specification, the mechanism in this document can be used without the LoST p | ||||
rotocol. This document defines an Experimental Protocol for the Internet commu | ||||
nity.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="6739"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6739"/> | ||||
</reference> | ||||
<reference anchor="RFC6749" target="https://www.rfc-editor.org/info/rfc6 | ||||
749" quoteTitle="true" derivedAnchor="RFC6749"> | ||||
<front> | ||||
<title>The OAuth 2.0 Authorization Framework</title> | ||||
<author initials="D." surname="Hardt" fullname="D. Hardt" role="edit | ||||
or"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2012" month="October"/> | ||||
<abstract> | ||||
<t indent="0">The OAuth 2.0 authorization framework enables a thir | ||||
d-party application to obtain limited access to an HTTP service, either on behal | ||||
f of a resource owner by orchestrating an approval interaction between the resou | ||||
rce owner and the HTTP service, or by allowing the third-party application to ob | ||||
tain access on its own behalf. This specification replaces and obsoletes the OA | ||||
uth 1.0 protocol described in RFC 5849. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="6749"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6749"/> | ||||
</reference> | ||||
<reference anchor="RFC6750" target="https://www.rfc-editor.org/info/rfc6 | ||||
750" quoteTitle="true" derivedAnchor="RFC6750"> | ||||
<front> | ||||
<title>The OAuth 2.0 Authorization Framework: Bearer Token Usage</ti | ||||
tle> | ||||
<author initials="M." surname="Jones" fullname="M. Jones"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="D." surname="Hardt" fullname="D. Hardt"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2012" month="October"/> | ||||
<abstract> | ||||
<t indent="0">This specification describes how to use bearer token | ||||
s in HTTP requests to access OAuth 2.0 protected resources. Any party in posses | ||||
sion of a bearer token (a "bearer") can use it to get access to the associated r | ||||
esources (without demonstrating possession of a cryptographic key). To prevent | ||||
misuse, bearer tokens need to be protected from disclosure in storage and in tra | ||||
nsport. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="6750"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6750"/> | ||||
</reference> | ||||
<reference anchor="RFC7030" target="https://www.rfc-editor.org/info/rfc7 | ||||
030" quoteTitle="true" derivedAnchor="RFC7030"> | ||||
<front> | ||||
<title>Enrollment over Secure Transport</title> | ||||
<author initials="M." surname="Pritikin" fullname="M. Pritikin" role | ||||
="editor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="P." surname="Yee" fullname="P. Yee" role="editor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="D." surname="Harkins" fullname="D. Harkins" role=" | ||||
editor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2013" month="October"/> | ||||
<abstract> | ||||
<t indent="0">This document profiles certificate enrollment for cl | ||||
ients using Certificate Management over CMS (CMC) messages over a secure transpo | ||||
rt. This profile, called Enrollment over Secure Transport (EST), describes a si | ||||
mple, yet functional, certificate management protocol targeting Public Key Infra | ||||
structure (PKI) clients that need to acquire client certificates and associated | ||||
Certification Authority (CA) certificates. It also supports client-generated pu | ||||
blic/private key pairs as well as key pairs generated by the CA.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="7030"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7030"/> | ||||
</reference> | ||||
<reference anchor="RFC7465" target="https://www.rfc-editor.org/info/rfc7 | ||||
465" quoteTitle="true" derivedAnchor="RFC7465"> | ||||
<front> | ||||
<title>Prohibiting RC4 Cipher Suites</title> | ||||
<author initials="A." surname="Popov" fullname="A. Popov"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2015" month="February"/> | ||||
<abstract> | ||||
<t indent="0">This document requires that Transport Layer Security | ||||
(TLS) clients and servers never negotiate the use of RC4 cipher suites when the | ||||
y establish connections. This applies to all TLS versions. This document updat | ||||
es RFCs 5246, 4346, and 2246.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="7465"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7465"/> | ||||
</reference> | ||||
<reference anchor="RFC7507" target="https://www.rfc-editor.org/info/rfc7 | ||||
507" quoteTitle="true" derivedAnchor="RFC7507"> | ||||
<front> | ||||
<title>TLS Fallback Signaling Cipher Suite Value (SCSV) for Preventi | ||||
ng Protocol Downgrade Attacks</title> | ||||
<author initials="B." surname="Moeller" fullname="B. Moeller"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="A." surname="Langley" fullname="A. Langley"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2015" month="April"/> | ||||
<abstract> | ||||
<t indent="0">This document defines a Signaling Cipher Suite Value | ||||
(SCSV) that prevents protocol downgrade attacks on the Transport Layer Security | ||||
(TLS) and Datagram Transport Layer Security (DTLS) protocols. It updates RFCs | ||||
2246, 4346, 4347, 5246, and 6347. Server update considerations are included.</t | ||||
> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="7507"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7507"/> | ||||
</reference> | ||||
<reference anchor="RFC7525" target="https://www.rfc-editor.org/info/rfc7 | ||||
525" quoteTitle="true" derivedAnchor="RFC7525"> | ||||
<front> | ||||
<title>Recommendations for Secure Use of Transport Layer Security (T | ||||
LS) and Datagram Transport Layer Security (DTLS)</title> | ||||
<author initials="Y." surname="Sheffer" fullname="Y. Sheffer"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="R." surname="Holz" fullname="R. Holz"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="P." surname="Saint-Andre" fullname="P. Saint-Andre | ||||
"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2015" month="May"/> | ||||
<abstract> | ||||
<t indent="0">Transport Layer Security (TLS) and Datagram Transpor | ||||
t Layer Security (DTLS) are widely used to protect data exchanged over applicati | ||||
on protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP. Over the last few ye | ||||
ars, several serious attacks on TLS have emerged, including attacks on its most | ||||
commonly used cipher suites and their modes of operation. This document provide | ||||
s recommendations for improving the security of deployed services that use TLS a | ||||
nd DTLS. The recommendations are applicable to the majority of use cases.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="BCP" value="195"/> | ||||
<seriesInfo name="RFC" value="7525"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7525"/> | ||||
</reference> | ||||
<reference anchor="RFC7562" target="https://www.rfc-editor.org/info/rfc7 | ||||
562" quoteTitle="true" derivedAnchor="RFC7562"> | ||||
<front> | ||||
<title>Transport Layer Security (TLS) Authorization Using Digital Tr | ||||
ansmission Content Protection (DTCP) Certificates</title> | ||||
<author initials="D." surname="Thakore" fullname="D. Thakore"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2015" month="July"/> | ||||
<abstract> | ||||
<t indent="0">This document specifies the use of Digital Transmiss | ||||
ion Content Protection (DTCP) certificates as an authorization data type in the | ||||
authorization extension for the Transport Layer Security (TLS) protocol. This i | ||||
s in accordance with the guidelines for authorization extensions as specified in | ||||
RFC 5878. As with other TLS extensions, this authorization data can be include | ||||
d in the client and server hello messages to confirm that both parties support t | ||||
he desired authorization data types. If supported by both the client and the se | ||||
rver, DTCP certificates are exchanged in the supplemental data TLS handshake mes | ||||
sage as specified in RFC 4680. This authorization data type extension is in sup | ||||
port of devices containing DTCP certificates issued by the Digital Transmission | ||||
Licensing Administrator (DTLA).</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="7562"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7562"/> | ||||
</reference> | ||||
<reference anchor="RFC7568" target="https://www.rfc-editor.org/info/rfc7 | ||||
568" quoteTitle="true" derivedAnchor="RFC7568"> | ||||
<front> | ||||
<title>Deprecating Secure Sockets Layer Version 3.0</title> | ||||
<author initials="R." surname="Barnes" fullname="R. Barnes"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="M." surname="Thomson" fullname="M. Thomson"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="A." surname="Pironti" fullname="A. Pironti"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="A." surname="Langley" fullname="A. Langley"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2015" month="June"/> | ||||
<abstract> | ||||
<t indent="0">The Secure Sockets Layer version 3.0 (SSLv3), as spe | ||||
cified in RFC 6101, is not sufficiently secure. This document requires that SSL | ||||
v3 not be used. The replacement versions, in particular, Transport Layer Securi | ||||
ty (TLS) 1.2 (RFC 5246), are considerably more secure and capable protocols.</t> | ||||
<t indent="0">This document updates the backward compatibility sec | ||||
tion of RFC 5246 and its predecessors to prohibit fallback to SSLv3.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="7568"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7568"/> | ||||
</reference> | ||||
<reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8 | ||||
174" quoteTitle="true" derivedAnchor="RFC8174"> | ||||
<front> | ||||
<title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</ti | ||||
tle> | ||||
<author initials="B." surname="Leiba" fullname="B. Leiba"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2017" month="May"/> | ||||
<abstract> | ||||
<t indent="0">RFC 2119 specifies common key words that may be used | ||||
in protocol specifications. This document aims to reduce the ambiguity by cla | ||||
rifying that only UPPERCASE usage of the key words have the defined special mea | ||||
nings.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="BCP" value="14"/> | ||||
<seriesInfo name="RFC" value="8174"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8174"/> | ||||
</reference> | ||||
<reference anchor="RFC8422" target="https://www.rfc-editor.org/info/rfc8 | ||||
422" quoteTitle="true" derivedAnchor="RFC8422"> | ||||
<front> | ||||
<title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport | ||||
Layer Security (TLS) Versions 1.2 and Earlier</title> | ||||
<author initials="Y." surname="Nir" fullname="Y. Nir"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="S." surname="Josefsson" fullname="S. Josefsson"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="M." surname="Pegourie-Gonnard" fullname="M. Pegour | ||||
ie-Gonnard"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2018" month="August"/> | ||||
<abstract> | ||||
<t indent="0">This document describes key exchange algorithms base | ||||
d on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) pr | ||||
otocol. In particular, it specifies the use of Ephemeral Elliptic Curve Diffie- | ||||
Hellman (ECDHE) key agreement in a TLS handshake and the use of the Elliptic Cur | ||||
ve Digital Signature Algorithm (ECDSA) and Edwards-curve Digital Signature Algor | ||||
ithm (EdDSA) as authentication mechanisms.</t> | ||||
<t indent="0">This document obsoletes RFC 4492.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8422"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8422"/> | ||||
</reference> | ||||
</references> | ||||
<references pn="section-10.2"> | ||||
<name slugifiedName="name-informative-references">Informative References | ||||
</name> | ||||
<reference anchor="Bhargavan2016" target="https://www.mitls.org/download | ||||
s/transcript-collisions.pdf" quoteTitle="true" derivedAnchor="Bhargavan2016"> | ||||
<front> | ||||
<title>Transcript Collision Attacks: Breaking Authentication in TLS, | ||||
IKE, and SSH</title> | ||||
<author fullname="Karthikeyan Bhargavan" initials="K." surname="Bhar | ||||
gavan"> | ||||
<organization showOnFrontPage="true">INRIA</organization> | ||||
</author> | ||||
<author fullname="Gaetan Leuren" initials="G." surname="Leuren"> | ||||
<organization showOnFrontPage="true">INRIA</organization> | ||||
</author> | ||||
<date month="February" year="2016"/> | ||||
</front> | ||||
<seriesInfo name="DOI" value="10.14722/ndss.2016.23418"/> | ||||
</reference> | ||||
<reference anchor="NIST800-52r2" target="https://nvlpubs.nist.gov/nistpu | ||||
bs/SpecialPublications/NIST.SP.800-52r2.pdf" quoteTitle="true" derivedAnchor="NI | ||||
ST800-52r2"> | ||||
<front> | ||||
<title>Guidelines for the Selection, Configuration, and Use of Trans | ||||
port Layer Security (TLS) Implementations NIST SP800-52r2</title> | ||||
<author> | ||||
<organization showOnFrontPage="true">National Institute of Standar | ||||
ds and Technology</organization> | ||||
</author> | ||||
<date month="August" year="2019"/> | ||||
</front> | ||||
<seriesInfo name="DOI" value="10.6028/NIST.SP.800-52r2"/> | ||||
</reference> | ||||
<reference anchor="RFC3316" target="https://www.rfc-editor.org/info/rfc3 | ||||
316" quoteTitle="true" derivedAnchor="RFC3316"> | ||||
<front> | ||||
<title>Internet Protocol Version 6 (IPv6) for Some Second and Third | ||||
Generation Cellular Hosts</title> | ||||
<author initials="J." surname="Arkko" fullname="J. Arkko"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="G." surname="Kuijpers" fullname="G. Kuijpers"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="H." surname="Soliman" fullname="H. Soliman"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="J." surname="Loughney" fullname="J. Loughney"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="J." surname="Wiljakka" fullname="J. Wiljakka"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2003" month="April"/> | ||||
</front> | ||||
<seriesInfo name="RFC" value="3316"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC3316"/> | ||||
</reference> | ||||
<reference anchor="RFC3489" target="https://www.rfc-editor.org/info/rfc3 | ||||
489" quoteTitle="true" derivedAnchor="RFC3489"> | ||||
<front> | ||||
<title>STUN - Simple Traversal of User Datagram Protocol (UDP) Throu | ||||
gh Network Address Translators (NATs)</title> | ||||
<author initials="J." surname="Rosenberg" fullname="J. Rosenberg"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="J." surname="Weinberger" fullname="J. Weinberger"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="C." surname="Huitema" fullname="C. Huitema"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="R." surname="Mahy" fullname="R. Mahy"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2003" month="March"/> | ||||
<abstract> | ||||
<t indent="0">Simple Traversal of User Datagram Protocol (UDP) Thr | ||||
ough Network Address Translators (NATs) (STUN) is a lightweight protocol that al | ||||
lows applications to discover the presence and types of NATs and firewalls betwe | ||||
en them and the public Internet. It also provides the ability for applications | ||||
to determine the public Internet Protocol (IP) addresses allocated to them by th | ||||
e NAT. STUN works with many existing NATs, and does not require any special beh | ||||
avior from them. As a result, it allows a wide variety of applications to work | ||||
through existing NAT infrastructure. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="3489"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC3489"/> | ||||
</reference> | ||||
<reference anchor="RFC3546" target="https://www.rfc-editor.org/info/rfc3 | ||||
546" quoteTitle="true" derivedAnchor="RFC3546"> | ||||
<front> | ||||
<title>Transport Layer Security (TLS) Extensions</title> | ||||
<author initials="S." surname="Blake-Wilson" fullname="S. Blake-Wils | ||||
on"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="M." surname="Nystrom" fullname="M. Nystrom"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="D." surname="Hopwood" fullname="D. Hopwood"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="J." surname="Mikkelsen" fullname="J. Mikkelsen"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="T." surname="Wright" fullname="T. Wright"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2003" month="June"/> | ||||
<abstract> | ||||
<t indent="0">This document describes extensions that may be used | ||||
to add functionality to Transport Layer Security (TLS). It provides both generi | ||||
c extension mechanisms for the TLS handshake client and server hellos, and speci | ||||
fic extensions using these generic mechanisms. The extensions may be used by TLS | ||||
clients and servers. The extensions are backwards compatible - communication i | ||||
s possible between TLS 1.0 clients that support the extensions and TLS 1.0 serve | ||||
rs that do not support the extensions, and vice versa. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="3546"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC3546"/> | ||||
</reference> | ||||
<reference anchor="RFC3588" target="https://www.rfc-editor.org/info/rfc3 | ||||
588" quoteTitle="true" derivedAnchor="RFC3588"> | ||||
<front> | ||||
<title>Diameter Base Protocol</title> | ||||
<author initials="P." surname="Calhoun" fullname="P. Calhoun"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="J." surname="Loughney" fullname="J. Loughney"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="E." surname="Guttman" fullname="E. Guttman"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="G." surname="Zorn" fullname="G. Zorn"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="J." surname="Arkko" fullname="J. Arkko"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2003" month="September"/> | ||||
<abstract> | ||||
<t indent="0">The Diameter base protocol is intended to provide an | ||||
Authentication, Authorization and Accounting (AAA) framework for applications s | ||||
uch as network access or IP mobility. Diameter is also intended to work in both | ||||
local Authentication, Authorization & Accounting and roaming situations. T | ||||
his document specifies the message format, transport, error reporting, accountin | ||||
g and security services to be used by all Diameter applications. The Diameter b | ||||
ase application needs to be supported by all Diameter implementations. [STANDAR | ||||
DS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="3588"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC3588"/> | ||||
</reference> | ||||
<reference anchor="RFC3734" target="https://www.rfc-editor.org/info/rfc3 | ||||
734" quoteTitle="true" derivedAnchor="RFC3734"> | ||||
<front> | ||||
<title>Extensible Provisioning Protocol (EPP) Transport Over TCP</ti | ||||
tle> | ||||
<author initials="S." surname="Hollenbeck" fullname="S. Hollenbeck"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2004" month="March"/> | ||||
<abstract> | ||||
<t indent="0">This document describes how an Extensible Provisioni | ||||
ng Protocol (EPP) session is mapped onto a single Transmission Control Protocol | ||||
(TCP) connection. This mapping requires use of the Transport Layer Security (TL | ||||
S) protocol to protect information exchanged between an EPP client and an EPP se | ||||
rver. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="3734"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC3734"/> | ||||
</reference> | ||||
<reference anchor="RFC3920" target="https://www.rfc-editor.org/info/rfc3 | ||||
920" quoteTitle="true" derivedAnchor="RFC3920"> | ||||
<front> | ||||
<title>Extensible Messaging and Presence Protocol (XMPP): Core</titl | ||||
e> | ||||
<author initials="P." surname="Saint-Andre" fullname="P. Saint-Andre | ||||
" role="editor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2004" month="October"/> | ||||
<abstract> | ||||
<t indent="0">This memo defines the core features of the Extensibl | ||||
e Messaging and Presence Protocol (XMPP), a protocol for streaming Extensible Ma | ||||
rkup Language (XML) elements in order to exchange structured information in clos | ||||
e to real time between any two network endpoints. While XMPP provides a general | ||||
ized, extensible framework for exchanging XML data, it is used mainly for the pu | ||||
rpose of building instant messaging and presence applications that meet the requ | ||||
irements of RFC 2779. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="3920"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC3920"/> | ||||
</reference> | ||||
<reference anchor="RFC4132" target="https://www.rfc-editor.org/info/rfc4 | ||||
132" quoteTitle="true" derivedAnchor="RFC4132"> | ||||
<front> | ||||
<title>Addition of Camellia Cipher Suites to Transport Layer Securit | ||||
y (TLS)</title> | ||||
<author initials="S." surname="Moriai" fullname="S. Moriai"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="A." surname="Kato" fullname="A. Kato"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="M." surname="Kanda" fullname="M. Kanda"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2005" month="July"/> | ||||
<abstract> | ||||
<t indent="0">This document proposes the addition of new cipher su | ||||
ites to the Transport Layer Security (TLS) protocol to support the Camellia encr | ||||
yption algorithm as a bulk cipher algorithm. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4132"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4132"/> | ||||
</reference> | ||||
<reference anchor="RFC4244" target="https://www.rfc-editor.org/info/rfc4 | ||||
244" quoteTitle="true" derivedAnchor="RFC4244"> | ||||
<front> | ||||
<title>An Extension to the Session Initiation Protocol (SIP) for Req | ||||
uest History Information</title> | ||||
<author initials="M." surname="Barnes" fullname="M. Barnes" role="ed | ||||
itor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2005" month="November"/> | ||||
<abstract> | ||||
<t indent="0">This document defines a standard mechanism for captu | ||||
ring the history information associated with a Session Initiation Protocol (SIP) | ||||
request. This capability enables many enhanced services by providing the infor | ||||
mation as to how and why a call arrives at a specific application or user. This | ||||
document defines a new optional SIP header, History-Info, for capturing the his | ||||
tory information in requests. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4244"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4244"/> | ||||
</reference> | ||||
<reference anchor="RFC4347" target="https://www.rfc-editor.org/info/rfc4 | ||||
347" quoteTitle="true" derivedAnchor="RFC4347"> | ||||
<front> | ||||
<title>Datagram Transport Layer Security</title> | ||||
<author initials="E." surname="Rescorla" fullname="E. Rescorla"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="N." surname="Modadugu" fullname="N. Modadugu"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2006" month="April"/> | ||||
<abstract> | ||||
<t indent="0">This document specifies Version 1.0 of the Datagram | ||||
Transport Layer Security (DTLS) protocol. The DTLS protocol provides communicat | ||||
ions privacy for datagram protocols. The protocol allows client/server applicat | ||||
ions to communicate in a way that is designed to prevent eavesdropping, tamperin | ||||
g, or message forgery. The DTLS protocol is based on the Transport Layer Securi | ||||
ty (TLS) protocol and provides equivalent security guarantees. Datagram semanti | ||||
cs of the underlying transport are preserved by the DTLS protocol.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4347"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4347"/> | ||||
</reference> | ||||
<reference anchor="RFC4366" target="https://www.rfc-editor.org/info/rfc4 | ||||
366" quoteTitle="true" derivedAnchor="RFC4366"> | ||||
<front> | ||||
<title>Transport Layer Security (TLS) Extensions</title> | ||||
<author initials="S." surname="Blake-Wilson" fullname="S. Blake-Wils | ||||
on"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="M." surname="Nystrom" fullname="M. Nystrom"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="D." surname="Hopwood" fullname="D. Hopwood"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="J." surname="Mikkelsen" fullname="J. Mikkelsen"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="T." surname="Wright" fullname="T. Wright"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2006" month="April"/> | ||||
<abstract> | ||||
<t indent="0">This document describes extensions that may be used | ||||
to add functionality to Transport Layer Security (TLS). It provides both generi | ||||
c extension mechanisms for the TLS handshake client and server hellos, and speci | ||||
fic extensions using these generic mechanisms.</t> | ||||
<t indent="0">The extensions may be used by TLS clients and server | ||||
s. The extensions are backwards compatible: communication is possible between T | ||||
LS clients that support the extensions and TLS servers that do not support the e | ||||
xtensions, and vice versa. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4366"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4366"/> | ||||
</reference> | ||||
<reference anchor="RFC4492" target="https://www.rfc-editor.org/info/rfc4 | ||||
492" quoteTitle="true" derivedAnchor="RFC4492"> | ||||
<front> | ||||
<title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport | ||||
Layer Security (TLS)</title> | ||||
<author initials="S." surname="Blake-Wilson" fullname="S. Blake-Wils | ||||
on"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="N." surname="Bolyard" fullname="N. Bolyard"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="V." surname="Gupta" fullname="V. Gupta"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="C." surname="Hawk" fullname="C. Hawk"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="B." surname="Moeller" fullname="B. Moeller"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2006" month="May"/> | ||||
<abstract> | ||||
<t indent="0">This document describes new key exchange algorithms | ||||
based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS | ||||
) protocol. In particular, it specifies the use of Elliptic Curve Diffie-Hellma | ||||
n (ECDH) key agreement in a TLS handshake and the use of Elliptic Curve Digital | ||||
Signature Algorithm (ECDSA) as a new authentication mechanism. This memo provid | ||||
es information for the Internet community.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4492"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4492"/> | ||||
</reference> | ||||
<reference anchor="RFC4507" target="https://www.rfc-editor.org/info/rfc4 | ||||
507" quoteTitle="true" derivedAnchor="RFC4507"> | ||||
<front> | ||||
<title>Transport Layer Security (TLS) Session Resumption without Ser | ||||
ver-Side State</title> | ||||
<author initials="J." surname="Salowey" fullname="J. Salowey"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="H." surname="Zhou" fullname="H. Zhou"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="P." surname="Eronen" fullname="P. Eronen"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="H." surname="Tschofenig" fullname="H. Tschofenig"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2006" month="May"/> | ||||
<abstract> | ||||
<t indent="0">This document describes a mechanism that enables the | ||||
Transport Layer Security (TLS) server to resume sessions and avoid keeping \%pe | ||||
r-client session state. The TLS server encapsulates the session state into a ti | ||||
cket and forwards it to the client. The client can subsequently resume a sessio | ||||
n using the obtained ticket. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4507"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4507"/> | ||||
</reference> | ||||
<reference anchor="RFC4572" target="https://www.rfc-editor.org/info/rfc4 | ||||
572" quoteTitle="true" derivedAnchor="RFC4572"> | ||||
<front> | ||||
<title>Connection-Oriented Media Transport over the Transport Layer | ||||
Security (TLS) Protocol in the Session Description Protocol (SDP)</title> | ||||
<author initials="J." surname="Lennox" fullname="J. Lennox"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2006" month="July"/> | ||||
<abstract> | ||||
<t indent="0">This document specifies how to establish secure conn | ||||
ection-oriented media transport sessions over the Transport Layer Security (TLS) | ||||
protocol using the Session Description Protocol (SDP). It defines a new SDP pr | ||||
otocol identifier, 'TCP/TLS'. It also defines the syntax and semantics for an S | ||||
DP 'fingerprint' attribute that identifies the certificate that will be presente | ||||
d for the TLS session. This mechanism allows media transport over TLS connectio | ||||
ns to be established securely, so long as the integrity of session descriptions | ||||
is assured.</t> | ||||
<t indent="0">This document extends and updates RFC 4145. [STANDA | ||||
RDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4572"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4572"/> | ||||
</reference> | ||||
<reference anchor="RFC4934" target="https://www.rfc-editor.org/info/rfc4 | ||||
934" quoteTitle="true" derivedAnchor="RFC4934"> | ||||
<front> | ||||
<title>Extensible Provisioning Protocol (EPP) Transport Over TCP</ti | ||||
tle> | ||||
<author initials="S." surname="Hollenbeck" fullname="S. Hollenbeck"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2007" month="May"/> | ||||
<abstract> | ||||
<t indent="0">This document describes how an Extensible Provisioni | ||||
ng Protocol (EPP) session is mapped onto a single Transmission Control Protocol | ||||
(TCP) connection. This mapping requires use of the Transport Layer Security (TL | ||||
S) protocol to protect information exchanged between an EPP client and an EPP se | ||||
rver. This document obsoletes RFC 3734. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="4934"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC4934"/> | ||||
</reference> | ||||
<reference anchor="RFC5077" target="https://www.rfc-editor.org/info/rfc5 | ||||
077" quoteTitle="true" derivedAnchor="RFC5077"> | ||||
<front> | ||||
<title>Transport Layer Security (TLS) Session Resumption without Ser | ||||
ver-Side State</title> | ||||
<author initials="J." surname="Salowey" fullname="J. Salowey"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="H." surname="Zhou" fullname="H. Zhou"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="P." surname="Eronen" fullname="P. Eronen"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="H." surname="Tschofenig" fullname="H. Tschofenig"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2008" month="January"/> | ||||
<abstract> | ||||
<t indent="0">This document describes a mechanism that enables the | ||||
Transport Layer Security (TLS) server to resume sessions and avoid keeping per- | ||||
client session state. The TLS server encapsulates the session state into a tick | ||||
et and forwards it to the client. The client can subsequently resume a session | ||||
using the obtained ticket. This document obsoletes RFC 4507. [STANDARDS-TRACK] | ||||
</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5077"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5077"/> | ||||
</reference> | ||||
<reference anchor="RFC5081" target="https://www.rfc-editor.org/info/rfc5 | ||||
081" quoteTitle="true" derivedAnchor="RFC5081"> | ||||
<front> | ||||
<title>Using OpenPGP Keys for Transport Layer Security (TLS) Authent | ||||
ication</title> | ||||
<author initials="N." surname="Mavrogiannopoulos" fullname="N. Mavro | ||||
giannopoulos"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2007" month="November"/> | ||||
<abstract> | ||||
<t indent="0">This memo proposes extensions to the Transport Layer | ||||
Security (TLS) protocol to support the OpenPGP key format. The extensions disc | ||||
ussed here include a certificate type negotiation mechanism, and the required mo | ||||
difications to the TLS Handshake Protocol. This memo defines an Experimental Pr | ||||
otocol for the Internet community.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5081"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5081"/> | ||||
</reference> | ||||
<reference anchor="RFC5101" target="https://www.rfc-editor.org/info/rfc5 | ||||
101" quoteTitle="true" derivedAnchor="RFC5101"> | ||||
<front> | ||||
<title>Specification of the IP Flow Information Export (IPFIX) Proto | ||||
col for the Exchange of IP Traffic Flow Information</title> | ||||
<author initials="B." surname="Claise" fullname="B. Claise" role="ed | ||||
itor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2008" month="January"/> | ||||
<abstract> | ||||
<t indent="0">This document specifies the IP Flow Information Expo | ||||
rt (IPFIX) protocol that serves for transmitting IP Traffic Flow information ove | ||||
r the network. In order to transmit IP Traffic Flow information from an Exporti | ||||
ng Process to an information Collecting Process, a common representation of flow | ||||
data and a standard means of communicating them is required. This document des | ||||
cribes how the IPFIX Data and Template Records are carried over a number of tran | ||||
sport protocols from an IPFIX Exporting Process to an IPFIX Collecting Process. | ||||
[STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5101"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5101"/> | ||||
</reference> | ||||
<reference anchor="RFC5246" target="https://www.rfc-editor.org/info/rfc5 | ||||
246" quoteTitle="true" derivedAnchor="RFC5246"> | ||||
<front> | ||||
<title>The Transport Layer Security (TLS) Protocol Version 1.2</titl | ||||
e> | ||||
<author initials="T." surname="Dierks" fullname="T. Dierks"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="E." surname="Rescorla" fullname="E. Rescorla"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2008" month="August"/> | ||||
<abstract> | ||||
<t indent="0">This document specifies Version 1.2 of the Transport | ||||
Layer Security (TLS) protocol. The TLS protocol provides communications securi | ||||
ty over the Internet. The protocol allows client/server applications to communi | ||||
cate in a way that is designed to prevent eavesdropping, tampering, or message f | ||||
orgery. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5246"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5246"/> | ||||
</reference> | ||||
<reference anchor="RFC5415" target="https://www.rfc-editor.org/info/rfc5 | ||||
415" quoteTitle="true" derivedAnchor="RFC5415"> | ||||
<front> | ||||
<title>Control And Provisioning of Wireless Access Points (CAPWAP) P | ||||
rotocol Specification</title> | ||||
<author initials="P." surname="Calhoun" fullname="P. Calhoun" role=" | ||||
editor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="M." surname="Montemurro" fullname="M. Montemurro" | ||||
role="editor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="D." surname="Stanley" fullname="D. Stanley" role=" | ||||
editor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2009" month="March"/> | ||||
<abstract> | ||||
<t indent="0">This specification defines the Control And Provision | ||||
ing of Wireless Access Points (CAPWAP) Protocol, meeting the objectives defined | ||||
by the CAPWAP Working Group in RFC 4564. The CAPWAP protocol is designed to be | ||||
flexible, allowing it to be used for a variety of wireless technologies. This d | ||||
ocument describes the base CAPWAP protocol, while separate binding extensions wi | ||||
ll enable its use with additional wireless technologies. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5415"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5415"/> | ||||
</reference> | ||||
<reference anchor="RFC5456" target="https://www.rfc-editor.org/info/rfc5 | ||||
456" quoteTitle="true" derivedAnchor="RFC5456"> | ||||
<front> | ||||
<title>IAX: Inter-Asterisk eXchange Version 2</title> | ||||
<author initials="M." surname="Spencer" fullname="M. Spencer"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="B." surname="Capouch" fullname="B. Capouch"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="E." surname="Guy" fullname="E. Guy" role="editor"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="F." surname="Miller" fullname="F. Miller"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="K." surname="Shumard" fullname="K. Shumard"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2010" month="February"/> | ||||
<abstract> | ||||
<t indent="0">This document describes IAX, the Inter-Asterisk eXch | ||||
ange protocol, an application-layer control and media protocol for creating, mod | ||||
ifying, and terminating multimedia sessions over Internet Protocol (IP) networks | ||||
. IAX was developed by the open source community for the Asterisk Private Branc | ||||
h Exchange (PBX) and is targeted primarily at Voice over Internet Protocol (VoIP | ||||
) call control, but it can be used with streaming video or any other type of mul | ||||
timedia.</t> | ||||
<t indent="0">IAX is an "all in one" protocol for handling multime | ||||
dia in IP networks. It combines both control and media services in the same pro | ||||
tocol. In addition, IAX uses a single UDP data stream on a static port greatly | ||||
simplifying Network Address Translation (NAT) gateway traversal, eliminating the | ||||
need for other protocols to work around NAT, and simplifying network and firewa | ||||
ll management. IAX employs a compact encoding that decreases bandwidth usage an | ||||
d is well suited for Internet telephony service. In addition, its open nature p | ||||
ermits new payload type additions needed to support additional services. This | ||||
document is not an Internet Standards Track specification; it is published for i | ||||
nformational purposes.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="5456"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC5456"/> | ||||
</reference> | ||||
<reference anchor="RFC6012" target="https://www.rfc-editor.org/info/rfc6 | ||||
012" quoteTitle="true" derivedAnchor="RFC6012"> | ||||
<front> | ||||
<title>Datagram Transport Layer Security (DTLS) Transport Mapping fo | ||||
r Syslog</title> | ||||
<author initials="J." surname="Salowey" fullname="J. Salowey"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="T." surname="Petch" fullname="T. Petch"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="R." surname="Gerhards" fullname="R. Gerhards"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="H." surname="Feng" fullname="H. Feng"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2010" month="October"/> | ||||
<abstract> | ||||
<t indent="0">This document describes the transport of syslog mess | ||||
ages over the Datagram Transport Layer Security (DTLS) protocol. It provides a | ||||
secure transport for syslog messages in cases where a connectionless transport i | ||||
s desired. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="6012"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6012"/> | ||||
</reference> | ||||
<reference anchor="RFC6083" target="https://www.rfc-editor.org/info/rfc6 | ||||
083" quoteTitle="true" derivedAnchor="RFC6083"> | ||||
<front> | ||||
<title>Datagram Transport Layer Security (DTLS) for Stream Control T | ||||
ransmission Protocol (SCTP)</title> | ||||
<author initials="M." surname="Tuexen" fullname="M. Tuexen"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="R." surname="Seggelmann" fullname="R. Seggelmann"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="E." surname="Rescorla" fullname="E. Rescorla"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2011" month="January"/> | ||||
<abstract> | ||||
<t indent="0">This document describes the usage of the Datagram Tr | ||||
ansport Layer Security (DTLS) protocol over the Stream Control Transmission Prot | ||||
ocol (SCTP).</t> | ||||
<t indent="0">DTLS over SCTP provides communications privacy for a | ||||
pplications that use SCTP as their transport protocol and allows client/server a | ||||
pplications to communicate in a way that is designed to prevent eavesdropping an | ||||
d detect tampering or message forgery.</t> | ||||
<t indent="0">Applications using DTLS over SCTP can use almost all | ||||
transport features provided by SCTP and its extensions. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="6083"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6083"/> | ||||
</reference> | ||||
<reference anchor="RFC6084" target="https://www.rfc-editor.org/info/rfc6 | ||||
084" quoteTitle="true" derivedAnchor="RFC6084"> | ||||
<front> | ||||
<title>General Internet Signaling Transport (GIST) over Stream Contr | ||||
ol Transmission Protocol (SCTP) and Datagram Transport Layer Security (DTLS)</ti | ||||
tle> | ||||
<author initials="X." surname="Fu" fullname="X. Fu"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="C." surname="Dickmann" fullname="C. Dickmann"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="J." surname="Crowcroft" fullname="J. Crowcroft"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2011" month="January"/> | ||||
<abstract> | ||||
<t indent="0">The General Internet Signaling Transport (GIST) prot | ||||
ocol currently uses TCP or Transport Layer Security (TLS) over TCP for Connectio | ||||
n mode operation. This document describes the usage of GIST over the Stream Con | ||||
trol Transmission Protocol (SCTP) and Datagram Transport Layer Security (DTLS). | ||||
This document defines an Experimental Protocol for the Internet community.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="6084"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6084"/> | ||||
</reference> | ||||
<reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6 | ||||
347" quoteTitle="true" derivedAnchor="RFC6347"> | ||||
<front> | ||||
<title>Datagram Transport Layer Security Version 1.2</title> | ||||
<author initials="E." surname="Rescorla" fullname="E. Rescorla"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="N." surname="Modadugu" fullname="N. Modadugu"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2012" month="January"/> | ||||
<abstract> | ||||
<t indent="0">This document specifies version 1.2 of the Datagram | ||||
Transport Layer Security (DTLS) protocol. The DTLS protocol provides communicat | ||||
ions privacy for datagram protocols. The protocol allows client/server applicat | ||||
ions to communicate in a way that is designed to prevent eavesdropping, tamperin | ||||
g, or message forgery. The DTLS protocol is based on the Transport Layer Securi | ||||
ty (TLS) protocol and provides equivalent security guarantees. Datagram semanti | ||||
cs of the underlying transport are preserved by the DTLS protocol. This documen | ||||
t updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="6347"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6347"/> | ||||
</reference> | ||||
<reference anchor="RFC6460" target="https://www.rfc-editor.org/info/rfc6 | ||||
460" quoteTitle="true" derivedAnchor="RFC6460"> | ||||
<front> | ||||
<title>Suite B Profile for Transport Layer Security (TLS)</title> | ||||
<author initials="M." surname="Salter" fullname="M. Salter"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="R." surname="Housley" fullname="R. Housley"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2012" month="January"/> | ||||
<abstract> | ||||
<t indent="0">The United States government has published guideline | ||||
s for "NSA Suite B Cryptography" that define cryptographic algorithm policy for | ||||
national security applications. This document defines a profile of Transport La | ||||
yer Security (TLS) version 1.2 that is fully compliant with Suite B. This docum | ||||
ent is not an Internet Standards Track specification; it is published for infor | ||||
mational purposes.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="6460"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6460"/> | ||||
</reference> | ||||
<reference anchor="RFC6614" target="https://www.rfc-editor.org/info/rfc6 | ||||
614" quoteTitle="true" derivedAnchor="RFC6614"> | ||||
<front> | ||||
<title>Transport Layer Security (TLS) Encryption for RADIUS</title> | ||||
<author initials="S." surname="Winter" fullname="S. Winter"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="M." surname="McCauley" fullname="M. McCauley"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="S." surname="Venaas" fullname="S. Venaas"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="K." surname="Wierenga" fullname="K. Wierenga"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2012" month="May"/> | ||||
<abstract> | ||||
<t indent="0">This document specifies a transport profile for RADI | ||||
US using Transport Layer Security (TLS) over TCP as the transport protocol. This | ||||
enables dynamic trust relationships between RADIUS servers. [STANDARDS-TRACK] | ||||
</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="6614"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC6614"/> | ||||
</reference> | ||||
<reference anchor="RFC7457" target="https://www.rfc-editor.org/info/rfc7 | ||||
457" quoteTitle="true" derivedAnchor="RFC7457"> | ||||
<front> | ||||
<title>Summarizing Known Attacks on Transport Layer Security (TLS) a | ||||
nd Datagram TLS (DTLS)</title> | ||||
<author initials="Y." surname="Sheffer" fullname="Y. Sheffer"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="R." surname="Holz" fullname="R. Holz"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="P." surname="Saint-Andre" fullname="P. Saint-Andre | ||||
"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2015" month="February"/> | ||||
<abstract> | ||||
<t indent="0">Over the last few years, there have been several ser | ||||
ious attacks on Transport Layer Security (TLS), including attacks on its most co | ||||
mmonly used ciphers and modes of operation. This document summarizes these atta | ||||
cks, with the goal of motivating generic and protocol-specific recommendations o | ||||
n the usage of TLS and Datagram TLS (DTLS).</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="7457"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC7457"/> | ||||
</reference> | ||||
<reference anchor="RFC8143" target="https://www.rfc-editor.org/info/rfc8 | ||||
143" quoteTitle="true" derivedAnchor="RFC8143"> | ||||
<front> | ||||
<title>Using Transport Layer Security (TLS) with Network News Transf | ||||
er Protocol (NNTP)</title> | ||||
<author initials="J." surname="Elie" fullname="J. Elie"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2017" month="April"/> | ||||
<abstract> | ||||
<t indent="0">This document provides recommendations for improving | ||||
the security of the Network News Transfer Protocol (NNTP) when using Transport | ||||
Layer Security (TLS). It modernizes the NNTP usage of TLS to be consistent with | ||||
TLS best current practices. This document updates RFC 4642.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8143"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8143"/> | ||||
</reference> | ||||
<reference anchor="RFC8261" target="https://www.rfc-editor.org/info/rfc8 | ||||
261" quoteTitle="true" derivedAnchor="RFC8261"> | ||||
<front> | ||||
<title>Datagram Transport Layer Security (DTLS) Encapsulation of SCT | ||||
P Packets</title> | ||||
<author initials="M." surname="Tuexen" fullname="M. Tuexen"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="R." surname="Stewart" fullname="R. Stewart"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="R." surname="Jesup" fullname="R. Jesup"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="S." surname="Loreto" fullname="S. Loreto"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2017" month="November"/> | ||||
<abstract> | ||||
<t indent="0">The Stream Control Transmission Protocol (SCTP) is a | ||||
transport protocol originally defined to run on top of the network protocols IP | ||||
v4 or IPv6. This document specifies how SCTP can be used on top of the Datagram | ||||
Transport Layer Security (DTLS) protocol. Using the encapsulation method descr | ||||
ibed in this document, SCTP is unaware of the protocols being used below DTLS; h | ||||
ence, explicit IP addresses cannot be used in the SCTP control chunks. As a con | ||||
sequence, the SCTP associations carried over DTLS can only be single-homed.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8261"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8261"/> | ||||
</reference> | ||||
<reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8 | ||||
446" quoteTitle="true" derivedAnchor="RFC8446"> | ||||
<front> | ||||
<title>The Transport Layer Security (TLS) Protocol Version 1.3</titl | ||||
e> | ||||
<author initials="E." surname="Rescorla" fullname="E. Rescorla"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2018" month="August"/> | ||||
<abstract> | ||||
<t indent="0">This document specifies version 1.3 of the Transport | ||||
Layer Security (TLS) protocol. TLS allows client/server applications to commun | ||||
icate over the Internet in a way that is designed to prevent eavesdropping, tamp | ||||
ering, and message forgery.</t> | ||||
<t indent="0">This document updates RFCs 5705 and 6066, and obsole | ||||
tes RFCs 5077, 5246, and 6961. This document also specifies new requirements fo | ||||
r TLS 1.2 implementations.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8446"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8446"/> | ||||
</reference> | ||||
<reference anchor="RFC8447" target="https://www.rfc-editor.org/info/rfc8 | ||||
447" quoteTitle="true" derivedAnchor="RFC8447"> | ||||
<front> | ||||
<title>IANA Registry Updates for TLS and DTLS</title> | ||||
<author initials="J." surname="Salowey" fullname="J. Salowey"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<author initials="S." surname="Turner" fullname="S. Turner"> | ||||
<organization showOnFrontPage="true"/> | ||||
</author> | ||||
<date year="2018" month="August"/> | ||||
<abstract> | ||||
<t indent="0">This document describes a number of changes to TLS a | ||||
nd DTLS IANA registries that range from adding notes to the registry all the way | ||||
to changing the registration policy. These changes were mostly motivated by WG | ||||
review of the TLS- and DTLS-related registries undertaken as part of the TLS 1. | ||||
3 development process.</t> | ||||
<t indent="0">This document updates the following RFCs: 3749, 5077 | ||||
, 4680, 5246, 5705, 5878, 6520, and 7301.</t> | ||||
</abstract> | ||||
</front> | ||||
<seriesInfo name="RFC" value="8447"/> | ||||
<seriesInfo name="DOI" value="10.17487/RFC8447"/> | ||||
</reference> | ||||
</references> | ||||
</references> | </references> | |||
<section numbered="false" toc="include" removeInRFC="false" pn="section-appe | ||||
<section title="Change Log "> | ndix.a"> | |||
<t>[[RFC editor: please remove this before publication.]]</t> | <name slugifiedName="name-acknowledgements">Acknowledgements</name> | |||
<t indent="0" pn="section-appendix.a-1">Thanks to those that provided usag | ||||
<t>From draft-ietf-tls-oldversions-deprecate-11 to | e data and reviewed and/or improved | |||
draft-ietf-tls-oldversions-deprecate-12 (IESG review): | this document, including: <contact fullname="Michael Ackermann"/>, <co | |||
<list style="symbols"> | ntact fullname="David Benjamin"/>, <contact fullname="David Black"/>, | |||
<t>Minor edits from IESG review comments.</t> | <contact fullname="Deborah Brungard"/>, <contact fullname="Alan DeKok"/> | |||
</list></t> | , <contact fullname="Viktor Dukhovni"/>, <contact fullname="Julien Élie"/>, | |||
<contact fullname="Adrian Farrelll"/>, <contact fullname="Gary Gapinski" | ||||
<t>From draft-ietf-tls-oldversions-deprecate-10 to | />, <contact fullname="Alessandro Ghedini"/>, <contact fullname="Peter G | |||
draft-ietf-tls-oldversions-deprecate-11: | utmann"/>, <contact fullname="Jeremy Harris"/>, <contact fullname="Nick Hilliard | |||
<list style="symbols"> | "/>, | |||
<t>RFC 5953 was mentioned in the wrong para of section 1.1 - it has been | <contact fullname="James Hodgkinson"/>, <contact fullname="Russ Housley"/ | |||
obsoleted already.</t> | >, <contact fullname="Hubert Kario"/>, <contact fullname="Benjamin Kaduk"/>, <co | |||
</list> | ntact fullname="John Klensin"/>, | |||
<contact fullname="Watson Ladd"/>, <contact fullname="Eliot Lear"/>, < | ||||
contact fullname="Ted Lemon"/>, | ||||
<contact fullname="John Mattsson"/>, <contact fullname="Keith Moore"/>, | ||||
<contact fullname="Tom Petch"/>, <contact fullname="Eric Mill"/>, <cont | ||||
act fullname="Yoav Nir"/>, <contact fullname="Andrei Popov"/>, <contact fullnam | ||||
e="Michael Richardson"/>, <contact fullname="Eric Rescorla"/>, <contact | ||||
fullname="Rich Salz"/>, <contact fullname="Mohit Sethi"/>, <contact fullname="Ya | ||||
ron Sheffer"/>, <contact fullname="Rob Sayre"/>, | ||||
<contact fullname="Robert Sparks"/>, <contact fullname="Barbara Stark"/> | ||||
, <contact fullname="Martin Thomson"/>, <contact fullname="Sean Turner"/>, | ||||
<contact fullname="Loganaden Velvindron"/>, <contact fullname="Jakub Wil | ||||
k"/>, and <contact fullname="Christopher Wood"/>. | ||||
</t> | </t> | |||
</section> | ||||
<t>From draft-ietf-tls-oldversions-deprecate-09 to | <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc | |||
draft-ietf-tls-oldversions-deprecate-10: | ="include" pn="section-appendix.b"> | |||
<list style="symbols"> | <name slugifiedName="name-authors-addresses">Authors' Addresses</name> | |||
<t>We missed adding change logs for a few versions, but | <author fullname="Kathleen Moriarty" initials="K" surname="Moriarty"> | |||
since -09 was the one that underwent IETF last call, | <organization abbrev="CIS" showOnFrontPage="true">Center for Internet Se | |||
and there was some discussion, we figured it'd be good | curity (CIS)</organization> | |||
to mention substantive changes here.</t> | <address> | |||
<t>Added Ben's suggested text for "operational | <postal> | |||
considerations" following extensive last call | <street/> | |||
discussion.</t> | <city>East Greenbush</city> | |||
<t>Re-checked the references to RFC 4347 after Tom Petch | <region>NY</region> | |||
noticed we missed a couple. Added RFCs 5953 and 6353 to | <country>United States of America</country> | |||
the list here. All others were in already.</t> | </postal> | |||
<t>Fixed various typos and ack'd those who engaged a bit | <email>Kathleen.Moriarty.ietf@gmail.com</email> | |||
in the IETF LC discussion. (If we missed you and you want to be | </address> | |||
added, | </author> | |||
or if you'd rather not be mentioned, just ping the authors.) </t | <author fullname="Stephen Farrell" initials="S." surname="Farrell"> | |||
> | <organization showOnFrontPage="true">Trinity College Dublin</organizatio | |||
</list></t> | n> | |||
<address> | ||||
<t>From draft-ietf-tls-oldversions-deprecate-05 to | <postal> | |||
draft-ietf-tls-oldversions-deprecate-06: <list style="symbols"> | <street/> | |||
<city>Dublin</city> | ||||
<t>Fixed "yaleman" ack.</t> | <region/> | |||
<t>Added RFC6614 to UPDATEs list.</t> | <code>2</code> | |||
<t>per preliminary AD review: | <country>Ireland</country> | |||
<list style="symbols"> | </postal> | |||
<t>Remove references from abstract</t> | <phone>+353-1-896-2354</phone> | |||
<t>s/primary technical reasons/technical reasons/</t> | <email>stephen.farrell@cs.tcd.ie</email> | |||
<t>Add rfc7030 to 1.1</t> | </address> | |||
<t>verified that all the RFCs in the (massive:-) Updates meta- | </author> | |||
data | ||||
are mentioned in section 1.1 (I think appropriately;-)</t> | ||||
</list> | ||||
</t> | ||||
</list></t> | ||||
<t>From draft-ietf-tls-oldversions-deprecate-04 to | ||||
draft-ietf-tls-oldversions-deprecate-05: <list style="symbols"> | ||||
<t>Removed references to goverment related deprecation statements: | ||||
US, Canada, and Germany. NIST documentation rationale remains as a | ||||
reference describing the relevent RFCs and justification.</t> | ||||
</list></t> | ||||
<t>From draft-ietf-tls-oldversions-deprecate-02 to | ||||
draft-ietf-tls-oldversions-deprecate-03: <list style="symbols"> | ||||
<t>Added 8261 to updates list based on IETF-104 meeting.</t> | ||||
</list></t> | ||||
<t>From draft-ietf-tls-oldversions-deprecate-01 to | ||||
draft-ietf-tls-oldversions-deprecate-02: <list style="symbols"> | ||||
<t>Correction: 2nd list of referenced RFCs in <xref | ||||
target="updates"/> aren't informatively refering to tls1.0/1.1</t> | ||||
<t>Remove RFC7255 from updates list - datatracker has bad data | ||||
(spotted by Robert Sparks)</t> | ||||
<t>Added point about RFCs 8143 and 4642</t> | ||||
<t>Added UPDATEs for RFCs that refer to 4347 and aren't | ||||
OBSOLETEd</t> | ||||
<t>Added note about RFC8261 to see what WG want.</t> | ||||
</list></t> | ||||
<t>From draft-ietf-tls-oldversions-deprecate-00 to | ||||
draft-ietf-tls-oldversions-deprecate-01: <list style="symbols"> | ||||
<t>PRs with typos and similar: so far just #1</t> | ||||
<t>PR#2 noting msft browser announced deprecation (but this was OBE | ||||
as per...)</t> | ||||
<t>Implemented actions as per IETF-103 meeting: <list | ||||
style="symbols"> | ||||
<t>Details about which RFC's, BCP's are affected were generated | ||||
using a script in the git repo: | ||||
https://github.com/tlswg/oldversions-deprecate/blob/master/nonobsn | ||||
orms.sh</t> | ||||
<t>Removed the 'measurements' part</t> | ||||
<t>Removed SHA-1 deprecation (section 8 of -00)</t> | ||||
</list></t> | ||||
</list></t> | ||||
<t>From draft-moriarty-tls-oldversions-diediedie-01 to | ||||
draft-ietf-tls-oldversions-deprecate-00: <list style="symbols"> | ||||
<t>I-Ds became RFCs 8446/8447 (old-repo PR#4, for TLSv1.3)</t> | ||||
<t>Accepted old-repo PR#5 fixing typos</t> | ||||
</list></t> | ||||
<t>From draft-moriarty-tls-oldversions-diediedie-00 to | ||||
draft-moriarty-tls-oldversions-diediedie-01: <list style="symbols"> | ||||
<t>Added stats sent to list so far</t> | ||||
<t>PR's #2,3</t> | ||||
<t>a few more references</t> | ||||
<t>added section on email</t> | ||||
</list></t> | ||||
</section> | </section> | |||
</back> | </back> | |||
</rfc> | </rfc> | |||
End of changes. 87 change blocks. | ||||
1611 lines changed or deleted | 3740 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |