<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-deprecate-obsolete-kex-08" category="std" consensus="true" submissionType="IETF" updates="9325, 4346, 5246, 4162, 6347, 5932, 5288, 6209, 6367, 8422, 5289, 5469, 4785, 4279, 5487, 6655, 7905" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="Deprecating RSA and FFDH(E)">Deprecating Obsolete Key Exchange Methods in (D)TLS 1.2</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-deprecate-obsolete-kex-08"/>
    <author initials="N." surname="Aviram" fullname="Nimrod Aviram">
      <organization/>
      <address>
        <email>nimrod.aviram@gmail.com</email>
      </address>
    </author>
    <date year="2026" month="January" day="12"/>
    <area>security</area>
    <workgroup>TLS Working Group</workgroup>
    <abstract>
      <?line 158?>

<t>For (D)TLS 1.2, this document deprecates the use of two key exchanges, namely Diffie-Hellman over
a finite field and RSA, and it discourages the use of static elliptic curve Diffie-Hellman
cipher suites.</t>
      <t>These prescriptions apply only to (D)TLS 1.2 since (D)TLS 1.0 and TLS 1.1 are
deprecated by RFC 8996 and (D)TLS 1.3 either does not use the affected
algorithms or does not share the relevant configuration options.
(There is no DTLS version 1.1.)</t>
      <t>This document updates RFCs 9325, 4346, 5246, 4162, 6347, 5932, 5288, 6209, 6367, 8422, 5289, 5469, 4785, 4279, 5487, 6655, and 7905,
to deprecate or discourage - i.e., change to MUST NOT or SHOULD NOT, as listed in <xref target="dhecs"/>, <xref target="ecdhcs"/>, <xref target="dhecs"/>, <xref target="rsacs"/>, and <xref target="cert"/> - the use of cipher suites using the above key exchange methods in (D)TLS 1.2 connections.</t>
    </abstract>
  </front>
  <middle>
    <?line 172?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>(D)TLS 1.2 supports a variety of key exchange algorithms, including RSA, Diffie-Hellman
over a finite field, and elliptic curve Diffie-Hellman (ECDH).</t>
      <t>Diffie-Hellman key exchange, over any group, comes in ephemeral and
non-ephemeral varieties. Non-ephemeral DH algorithms use static DH public keys
included in the authenticating peer's certificate; see <xref target="RFC4492"/> for discussion.
In contrast, ephemeral DH algorithms use ephemeral DH public keys sent in the
handshake and authenticated by the peer's certificate. Ephemeral and
non-ephemeral finite field DH algorithms are called DHE and DH (or FFDHE and FFDH),
respectively, and ephemeral and non-ephemeral elliptic curve DH algorithms are called
ECDHE and ECDH, respectively <xref target="RFC4492"/>.</t>
      <t>In general, non-ephemeral cipher suites are not recommended due to their lack of
forward secrecy. Moreover, as demonstrated by the <xref target="Raccoon"/> attack on finite-field
DH, public key reuse, either via non-ephemeral cipher suites or reused keys with
ephemeral cipher suites, can lead to timing side channels that may leak connection
secrets. For elliptic curve DH, invalid curve attacks similarly exploit secret
reuse in order to break security <xref target="ICA"/>, further demonstrating the risk of reusing
public keys. While both side channels can be avoided in implementations, experience
shows that in practice, implementations may fail to thwart such attacks due to the
complexity and number of the required mitigations.</t>
      <t>Additionally, RSA key exchange suffers from security problems that are independent
of implementation choices as well as problems that stem purely from the difficulty
of implementing security countermeasures correctly.</t>
      <t>At a rough glance, the problems affecting FFDHE in (D)TLS 1.2 are as follows:</t>
      <ol spacing="normal" type="1"><li>
          <t>FFDHE suffers from interoperability problems because there is no mechanism for
negotiating the group, and some implementations only support small group sizes
(see <xref target="RFC7919"/>, Section 1).</t>
        </li>
        <li>
          <t>FFDHE groups may have small subgroups, which enables several attacks
<xref target="subgroups"/>. When presented with a custom, non-standardized FFDHE group, a handshaking client cannot practically verify that the group chosen by the server does not suffer from this problem. There is also no mechanism for such handshakes to fall back to other key exchange parameters that are acceptable to the client.
Custom FFDHE groups are widespread (as a result of advice based on <xref target="weak-dh"/>).
Therefore, clients cannot simply reject handshakes that present custom, and thus potentially dangerous, groups.</t>
        </li>
        <li>
          <t>In practice, some operators use 1024-bit FFDHE groups since this is the
maximum size that ensures wide support (see <xref target="RFC7919"/>, Section 1).
This size leaves only a small security margin vs. the current discrete log record,
which stands at 795 bits <xref target="DLOG795"/>.</t>
        </li>
        <li>
          <t>Expanding on the previous point, just a handful of very large computations allow
an attacker to cheaply decrypt a relatively large fraction of FFDHE traffic
(namely, traffic encrypted using particular standardized groups) <xref target="weak-dh"/>.</t>
        </li>
        <li>
          <t>When secrets are not fully ephemeral, FFDHE suffers from the <xref target="Raccoon"/> side
channel attack. (Note that FFDH is inherently vulnerable to the Raccoon attack
unless constant-time mitigations are employed.)</t>
        </li>
      </ol>
      <t>The problems affecting RSA key exchange in (D)TLS 1.2 are as follows:</t>
      <ol spacing="normal" type="1"><li>
          <t>RSA key exchange offers no forward secrecy, by construction.</t>
        </li>
        <li>
          <t>RSA key exchange may be vulnerable to Bleichenbacher's attack <xref target="BLEI"/>.
Experience shows that variants of this attack arise every few years because
implementing the relevant countermeasure correctly is difficult (see
<xref target="ROBOT"/>, <xref target="NEW-BLEI"/>, <xref target="DROWN"/>).</t>
        </li>
        <li>
          <t>In addition to the above point, there is no convenient mechanism in (D)TLS 1.2 for
the domain separation of keys. Therefore, a single endpoint that is vulnerable to
Bleichenbacher's attack would affect all endpoints sharing the same RSA key (see
<xref target="XPROT"/>, <xref target="DROWN"/>).</t>
        </li>
      </ol>
      <t>This document updates <xref target="RFC9325"/>, <xref target="RFC4346"/>, <xref target="RFC5246"/>,
<xref target="RFC4162"/>, <xref target="RFC6347"/>, <xref target="RFC5932"/>, <xref target="RFC5288"/>, <xref target="RFC6209"/>, <xref target="RFC6367"/>,
<xref target="RFC8422"/>, <xref target="RFC5289"/>, <xref target="RFC4785"/>, <xref target="RFC4279"/>, <xref target="RFC5487"/>, <xref target="RFC6655"/>, <xref target="RFC7905"/> and <xref target="RFC5469"/> to remediate the above problems, by deprecating and discouraging the use of affected cipher suites, as listed in <xref target="dhecs"/> <xref target="ecdhcs"/> <xref target="dhecs"/> <xref target="rsacs"/> <xref target="cert"/>.</t>
      <t>BCP 195 <xref target="RFC8996"/><xref target="RFC9325"/> contains the latest IETF recommendations for users of the (D)TLS protocol (and specifically, (D)TLS 1.2) and this
document supersedes it in several points. <xref target="update-9325"/> details the exact differences.
All other recommendations of the BCP document remain valid.</t>
      <section anchor="requirements">
        <name>Requirements</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
    </section>
    <section anchor="non-ephemeral">
      <name>Non-Ephemeral Diffie-Hellman</name>
      <t>Clients MUST NOT offer and servers MUST NOT select non-ephemeral FFDH cipher suites in (D)TLS 1.2 connections.
(Note that (D)TLS 1.0 and TLS 1.1 are deprecated by <xref target="RFC8996"/> and (D)TLS 1.3 does not
support FFDH <xref target="I-D.ietf-tls-rfc8446bis"/><xref target="RFC9147"/>.) This includes all cipher suites listed in the table in
<xref target="dhcs"/>.</t>
      <t>Clients SHOULD NOT offer and servers SHOULD NOT select non-ephemeral ECDH cipher suites in (D)TLS 1.2 connections. (This requirement is already present in <xref target="RFC9325"/>.
Note that (D)TLS 1.0 and TLS 1.1 are deprecated by <xref target="RFC8996"/> and
(D)TLS 1.3 does not support ECDH <xref target="I-D.ietf-tls-rfc8446bis"/><xref target="RFC9147"/>.) This includes all cipher suites listed
in the table in <xref target="ecdhcs"/>.</t>
      <t>In addition, to avoid the use of non-ephemeral Diffie-Hellman, clients SHOULD NOT use and servers SHOULD NOT accept certificates with fixed DH parameters. These certificate types are rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh and ecdsa_fixed_ecdh as listed in <xref target="cert"/>. These values only apply to (D)TLS versions of 1.2 and below.</t>
    </section>
    <section anchor="dhe">
      <name>Ephemeral Finite Field Diffie-Hellman</name>
      <t>Clients MUST NOT offer and servers MUST NOT select FFDHE cipher suites in (D)TLS 1.2 connections.
This includes all cipher suites listed in the table in <xref target="dhecs"/>.
(Note that (D)TLS 1.0 and TLS 1.1 are deprecated by <xref target="RFC8996"/>.) FFDHE cipher suites in (D)TLS 1.3 do not suffer from the problems presented in <xref target="introduction"/>; see <xref target="I-D.ietf-tls-rfc8446bis"/> and <xref target="RFC9147"/>. Therefore, clients and servers MAY offer FFDHE cipher suites in (D)TLS 1.3 connections.</t>
    </section>
    <section anchor="rsa">
      <name>RSA</name>
      <t>Clients MUST NOT offer and servers MUST NOT select RSA cipher suites in (D)TLS 1.2
connections. (Note that (D)TLS 1.0 and TLS 1.1 are deprecated by <xref target="RFC8996"/>, and (D)TLS
1.3 does not support static RSA <xref target="I-D.ietf-tls-rfc8446bis"/><xref target="RFC9147"/>.) This includes all cipher suites
listed in the table in <xref target="rsacs"/>. Note that these cipher suites are
already marked as not recommended in the "TLS Cipher Suites" registry <xref target="tls-registry"/>.</t>
    </section>
    <section anchor="updates-to-cipher-suites-and-tls-clientcertificatetype-identifiers">
      <name>Updates to Cipher Suites and TLS ClientCertificateType Identifiers</name>
      <section anchor="dhcs">
        <name>DH Cipher Suites Deprecated by This Document</name>
        <t>This document requests IANA to set the “recommended” column to “D” for the following entries:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Ciphersuite</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
              <td align="left">
                <xref target="RFC4346"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_DSS_WITH_DES_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5469"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
              <td align="left">
                <xref target="RFC4346"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_RSA_WITH_DES_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5469"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_EXPORT_WITH_RC4_40_MD5</td>
              <td align="left">
                <xref target="RFC4346"/><xref target="RFC6347"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_WITH_RC4_128_MD5</td>
              <td align="left">
                <xref target="RFC5246"/><xref target="RFC6347"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA</td>
              <td align="left">
                <xref target="RFC4346"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_WITH_DES_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5469"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_WITH_3DES_EDE_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_DSS_WITH_AES_128_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_RSA_WITH_AES_128_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_WITH_AES_128_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_DSS_WITH_AES_256_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_RSA_WITH_AES_256_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_WITH_AES_256_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_DSS_WITH_AES_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_RSA_WITH_AES_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_DSS_WITH_AES_256_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_RSA_WITH_AES_256_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_WITH_AES_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_WITH_AES_256_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_DSS_WITH_SEED_CBC_SHA</td>
              <td align="left">
                <xref target="RFC4162"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_RSA_WITH_SEED_CBC_SHA</td>
              <td align="left">
                <xref target="RFC4162"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_WITH_SEED_CBC_SHA</td>
              <td align="left">
                <xref target="RFC4162"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_RSA_WITH_AES_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC5288"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_RSA_WITH_AES_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC5288"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_DSS_WITH_AES_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC5288"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_DSS_WITH_AES_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC5288"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_WITH_AES_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC5288"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_WITH_AES_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC5288"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_WITH_ARIA_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_WITH_ARIA_256_CBC_SHA384</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_WITH_ARIA_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_WITH_ARIA_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="ecdhcs">
        <name>ECDH Cipher Suites Whose Use Is Discouraged by This Document</name>
        <t><xref target="RFC9325"/> already specifies that implementations SHOULD NOT negotiate the following cipher suites; accordingly, they appear with "Recommended: N" in the IANA TLS Cipher Suites registry <xref target="tls-registry"/>. This document updates them to "Recommended: D" to align with <xref target="I-D.ietf-tls-rfc8447bis"/>. It also records the rationale for discouraging use of these cipher suites, and cites prior analyses and attacks that demonstrate the associated risks.</t>
        <table>
          <thead>
            <tr>
              <th align="left">Ciphersuite</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TLS_ECDH_ECDSA_WITH_NULL_SHA</td>
              <td align="left">
                <xref target="RFC8422"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_ECDSA_WITH_RC4_128_SHA</td>
              <td align="left">
                <xref target="RFC8422"/><xref target="RFC6347"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA</td>
              <td align="left">
                <xref target="RFC8422"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA</td>
              <td align="left">
                <xref target="RFC8422"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA</td>
              <td align="left">
                <xref target="RFC8422"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_RSA_WITH_NULL_SHA</td>
              <td align="left">
                <xref target="RFC8422"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_RSA_WITH_RC4_128_SHA</td>
              <td align="left">
                <xref target="RFC8422"/><xref target="RFC6347"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA</td>
              <td align="left">
                <xref target="RFC8422"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_RSA_WITH_AES_128_CBC_SHA</td>
              <td align="left">
                <xref target="RFC8422"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_RSA_WITH_AES_256_CBC_SHA</td>
              <td align="left">
                <xref target="RFC8422"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_anon_WITH_NULL_SHA</td>
              <td align="left">
                <xref target="RFC8422"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_anon_WITH_RC4_128_SHA</td>
              <td align="left">
                <xref target="RFC8422"/><xref target="RFC6347"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA</td>
              <td align="left">
                <xref target="RFC8422"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_anon_WITH_AES_128_CBC_SHA</td>
              <td align="left">
                <xref target="RFC8422"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_anon_WITH_AES_256_CBC_SHA</td>
              <td align="left">
                <xref target="RFC8422"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5289"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384</td>
              <td align="left">
                <xref target="RFC5289"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5289"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384</td>
              <td align="left">
                <xref target="RFC5289"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC5289"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC5289"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC5289"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC5289"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="dhecs">
        <name>DHE Cipher Suites deprecated by This Document</name>
        <t>This document requests IANA to set the “recommended” column to “D” for the following entries:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Ciphersuite</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
              <td align="left">
                <xref target="RFC4346"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_DSS_WITH_DES_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5469"/> <xref target="RFC8996"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
              <td align="left">
                <xref target="RFC4346"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_DES_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5469"/> <xref target="RFC8996"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_NULL_SHA</td>
              <td align="left">
                <xref target="RFC4785"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_DSS_WITH_AES_128_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_AES_128_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_DSS_WITH_AES_256_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_AES_256_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_DSS_WITH_AES_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_AES_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_DSS_WITH_AES_256_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_AES_256_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_RC4_128_SHA</td>
              <td align="left">
                <xref target="RFC4279"/><xref target="RFC6347"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA</td>
              <td align="left">
                <xref target="RFC4279"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_AES_128_CBC_SHA</td>
              <td align="left">
                <xref target="RFC4279"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_AES_256_CBC_SHA</td>
              <td align="left">
                <xref target="RFC4279"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_DSS_WITH_SEED_CBC_SHA</td>
              <td align="left">
                <xref target="RFC4162"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_SEED_CBC_SHA</td>
              <td align="left">
                <xref target="RFC4162"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_AES_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC5288"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_AES_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC5288"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_DSS_WITH_AES_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC5288"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_DSS_WITH_AES_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC5288"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_AES_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC5487"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_AES_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC5487"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_AES_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5487"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_AES_256_CBC_SHA384</td>
              <td align="left">
                <xref target="RFC5487"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_NULL_SHA256</td>
              <td align="left">
                <xref target="RFC5487"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_NULL_SHA384</td>
              <td align="left">
                <xref target="RFC5487"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_AES_128_CCM</td>
              <td align="left">
                <xref target="RFC6655"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_AES_256_CCM</td>
              <td align="left">
                <xref target="RFC6655"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_AES_128_CCM_8</td>
              <td align="left">
                <xref target="RFC6655"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_AES_256_CCM_8</td>
              <td align="left">
                <xref target="RFC6655"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_AES_128_CCM</td>
              <td align="left">
                <xref target="RFC6655"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_AES_256_CCM</td>
              <td align="left">
                <xref target="RFC6655"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256</td>
              <td align="left">
                <xref target="RFC7905"/></td>
            </tr>
            <tr>
              <td align="left">TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256</td>
              <td align="left">
                <xref target="RFC7905"/></td>
            </tr>
            <tr>
              <td align="left">TLS_PSK_DHE_WITH_AES_128_CCM_8</td>
              <td align="left">
                <xref target="RFC6655"/></td>
            </tr>
            <tr>
              <td align="left">TLS_PSK_DHE_WITH_AES_256_CCM_8</td>
              <td align="left">
                <xref target="RFC6655"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="rsacs">
        <name>RSA Cipher Suites Deprecated by This Document</name>
        <t>This document requests IANA to set the “recommended” column to “D” for the following entries:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Ciphersuite</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">TLS_RSA_WITH_NULL_MD5</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_NULL_SHA</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_EXPORT_WITH_RC4_40_MD5</td>
              <td align="left">
                <xref target="RFC4346"/><xref target="RFC6347"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_RC4_128_MD5</td>
              <td align="left">
                <xref target="RFC5246"/><xref target="RFC6347"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_RC4_128_SHA</td>
              <td align="left">
                <xref target="RFC5246"/><xref target="RFC6347"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5</td>
              <td align="left">
                <xref target="RFC4346"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_IDEA_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5469"/> <xref target="RFC8996"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
              <td align="left">
                <xref target="RFC4346"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_DES_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5469"/> <xref target="RFC8996"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_3DES_EDE_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_PSK_WITH_NULL_SHA</td>
              <td align="left">
                <xref target="RFC4785"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_AES_128_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_AES_256_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_NULL_SHA256</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_AES_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_AES_256_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_PSK_WITH_RC4_128_SHA</td>
              <td align="left">
                <xref target="RFC4279"/><xref target="RFC6347"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA</td>
              <td align="left">
                <xref target="RFC4279"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_PSK_WITH_AES_128_CBC_SHA</td>
              <td align="left">
                <xref target="RFC4279"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_PSK_WITH_AES_256_CBC_SHA</td>
              <td align="left">
                <xref target="RFC4279"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_SEED_CBC_SHA</td>
              <td align="left">
                <xref target="RFC4162"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_AES_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC5288"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_AES_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC5288"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_PSK_WITH_AES_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC5487"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_PSK_WITH_AES_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC5487"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_PSK_WITH_AES_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5487"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_PSK_WITH_AES_256_CBC_SHA384</td>
              <td align="left">
                <xref target="RFC5487"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_PSK_WITH_NULL_SHA256</td>
              <td align="left">
                <xref target="RFC5487"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_PSK_WITH_NULL_SHA384</td>
              <td align="left">
                <xref target="RFC5487"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC5932"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_ARIA_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_ARIA_256_CBC_SHA384</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_ARIA_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_ARIA_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC6209"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384</td>
              <td align="left">
                <xref target="RFC6367"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_AES_128_CCM</td>
              <td align="left">
                <xref target="RFC6655"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_AES_256_CCM</td>
              <td align="left">
                <xref target="RFC6655"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_AES_128_CCM_8</td>
              <td align="left">
                <xref target="RFC6655"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_WITH_AES_256_CCM_8</td>
              <td align="left">
                <xref target="RFC6655"/></td>
            </tr>
            <tr>
              <td align="left">TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256</td>
              <td align="left">
                <xref target="RFC7905"/></td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="cert">
        <name>TLS ClientCertificateType Identifiers Deprecated by This Document</name>
        <t>This document requests IANA to set the “recommended” column to “D” for the following entries:</t>
        <table>
          <thead>
            <tr>
              <th align="left">Certificate Type</th>
              <th align="left">Reference</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">rsa_fixed_dh (3)</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">dss_fixed_dh (4)</td>
              <td align="left">
                <xref target="RFC5246"/></td>
            </tr>
            <tr>
              <td align="left">rsa_fixed_ecdh (65)</td>
              <td align="left">
                <xref target="RFC8422"/></td>
            </tr>
            <tr>
              <td align="left">ecdsa_fixed_ecdh (66)</td>
              <td align="left">
                <xref target="RFC8422"/></td>
            </tr>
          </tbody>
        </table>
      </section>
    </section>
    <section anchor="update-9325">
      <name>Updating RFC 9325</name>
      <t>This document updates <xref target="RFC9325"/> with respect to the use of (D)TLS 1.2, and
the table below lists the exact changes. All changes should be made in Section 4.1 of <xref target="RFC9325"/>.</t>
      <t><cref>Note to RFC Editor: please replace XXX below by the current RFC number.</cref></t>
      <table>
        <thead>
          <tr>
            <th align="left"> </th>
            <th align="left">RFC 9325</th>
            <th align="right">RFC XXX</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Non-ephemeral FFDH</td>
            <td align="left">SHOULD NOT</td>
            <td align="right">MUST NOT</td>
          </tr>
          <tr>
            <td align="left">Non-ephemeral ECDH</td>
            <td align="left">SHOULD NOT</td>
            <td align="right">No change</td>
          </tr>
          <tr>
            <td align="left">Fixed DH certificate types</td>
            <td align="left">Unspecified</td>
            <td align="right">SHOULD NOT</td>
          </tr>
          <tr>
            <td align="left">Ephemeral FFDH</td>
            <td align="left">SHOULD NOT</td>
            <td align="right">MUST NOT</td>
          </tr>
          <tr>
            <td align="left">Static RSA</td>
            <td align="left">SHOULD NOT</td>
            <td align="right">MUST NOT</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests IANA to mark the cipher suites from the "TLS Cipher Suites" registry <xref target="tls-registry"/>, under “Transport Layer Security (TLS) Parameters” registry group, listed in <xref target="dhcs"/>, <xref target="ecdhcs"/>, <xref target="dhecs"/>, <xref target="rsacs"/>, and the certificate types from the "TLS ClientCertificateType Identifiers" registry listed in <xref target="cert"/> as "D" in the "Recommended" column, see <xref target="I-D.ietf-tls-rfc8447bis"/>.</t>
      <t>For each registry entry in <xref target="dhcs"/>, <xref target="ecdhcs"/>, <xref target="dhecs"/>, <xref target="rsacs"/>, and <xref target="cert"/>,
IANA is also requested to update the registry entry's Reference column to refer to this document.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>Non-ephemeral finite field DH cipher suites (TLS_DH_*), as well as ephemeral key reuse
for finite field DH cipher suites, are prohibited due to the <xref target="Raccoon"/> attack. Both are
already considered bad practice since they do not provide forward secrecy. However,
Raccoon revealed that timing side channels in processing TLS premaster secrets may be
exploited to reveal the encrypted premaster secret.</t>
      <t>As for non-ephemeral elliptic curve DH cipher suites (TLS_ECDH_*), forgoing forward secrecy
not only allows retroactive decryption in the event of key compromise but may
also enable a broad category of attacks where the attacker exploits key reuse
to repeatedly query a cryptographic secret.</t>
      <t>This category includes, but is not necessarily limited to, the following
examples:</t>
      <ol spacing="normal" type="1"><li>
          <t>Invalid curve attacks, where the attacker exploits key reuse to repeatedly
query and eventually learn the key itself. These attacks have been shown to be
practical against real-world TLS implementations <xref target="ICA"/>.</t>
        </li>
        <li>
          <t>Side channel attacks, where the attacker exploits key reuse and an additional
side channel to learn a cryptographic secret. As one example of such attacks,
refer to <xref target="MAY4"/>.</t>
        </li>
        <li>
          <t>Fault attacks, where the attacker exploits key reuse and incorrect
calculations to learn a cryptographic secret. As one example of such attacks,
see <xref target="PARIS256"/>.</t>
        </li>
      </ol>
      <t>Such attacks are often implementation-dependent, including the above examples.
However, these examples demonstrate that building a system that reuses keys and
avoids this category of attacks is difficult in practice. In contrast, avoiding
key reuse not only prevents decryption in the event of key compromise, but also
precludes this category of attacks altogether. Therefore, this document
discourages the reuse of elliptic curve DH public keys.</t>
      <t>As for ephemeral finite field Diffie-Hellman in (D)TLS 1.2 (TLS_DHE_* and TLS_PSK_DHE_*), as explained above, clients have no practical way to support these cipher suites while ensuring they only negotiate security parameters that are acceptable to them. In (D)TLS 1.2, the server chooses the Diffie-Hellman group, and custom groups are prevalent. Therefore, once the client includes these cipher suites in its handshake and the server presents a custom group, the client cannot complete the handshake while ensuring security. Verifying the group structure is prohibitively expensive for the client. Using a safelist of known-good groups is also impractical, since server operators were encouraged to generate their own custom group. Further, there is no mechanism for the handshake to fall back to other parameters, that are acceptable to both the client and server.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document includes many important contributions from Carrie Bartle, who wrote much of the prose, and presented it several times at the IETF TLS WG.</t>
      <t>The document was inspired by discussions on the TLS WG mailing list and
a suggestion by Filippo Valsorda following the release of the <xref target="Raccoon"/> attack.
Thanks to Christopher A. Wood for writing up the initial draft of this document.
Thanks also to Thomas Fossati, Sean Turner, Joe Salowey, Yaron Sheffer, Christian Buchgraber, <contact fullname="John Preuß Mattsson"/> and <contact fullname="Manuel Pégourié-Gonnard"/> for
comments and suggestions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7919">
          <front>
            <title>Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for Transport Layer Security (TLS)</title>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>Traditional finite-field-based Diffie-Hellman (DH) key exchange during the Transport Layer Security (TLS) handshake suffers from a number of security, interoperability, and efficiency shortcomings. These shortcomings arise from lack of clarity about which DH group parameters TLS servers should offer and clients should accept. This document offers a solution to these shortcomings for compatible peers by using a section of the TLS "Supported Groups Registry" (renamed from "EC Named Curve Registry" by this document) to establish common finite field DH parameters with known structure and a mechanism for peers to negotiate support for these groups.</t>
              <t>This document updates TLS versions 1.0 (RFC 2246), 1.1 (RFC 4346), and 1.2 (RFC 5246), as well as the TLS Elliptic Curve Cryptography (ECC) extensions (RFC 4492).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7919"/>
          <seriesInfo name="DOI" value="10.17487/RFC7919"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC4346">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.1</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document specifies Version 1.1 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4346"/>
          <seriesInfo name="DOI" value="10.17487/RFC4346"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC4162">
          <front>
            <title>Addition of SEED Cipher Suites to Transport Layer Security (TLS)</title>
            <author fullname="H.J. Lee" initials="H.J." surname="Lee"/>
            <author fullname="J.H. Yoon" initials="J.H." surname="Yoon"/>
            <author fullname="J.I. Lee" initials="J.I." surname="Lee"/>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document proposes the addition of new cipher suites to the Transport Layer Security (TLS) protocol to support the SEED encryption algorithm as a bulk cipher algorithm. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4162"/>
          <seriesInfo name="DOI" value="10.17487/RFC4162"/>
        </reference>
        <reference anchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC5932">
          <front>
            <title>Camellia Cipher Suites for TLS</title>
            <author fullname="A. Kato" initials="A." surname="Kato"/>
            <author fullname="M. Kanda" initials="M." surname="Kanda"/>
            <author fullname="S. Kanno" initials="S." surname="Kanno"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document specifies a set of cipher suites for the Transport Security Layer (TLS) protocol to support the Camellia encryption algorithm as a block cipher. It amends the cipher suites originally specified in RFC 4132 by introducing counterparts using the newer cryptographic hash algorithms from the SHA-2 family. This document obsoletes RFC 4132. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5932"/>
          <seriesInfo name="DOI" value="10.17487/RFC5932"/>
        </reference>
        <reference anchor="RFC5288">
          <front>
            <title>AES Galois Counter Mode (GCM) Cipher Suites for TLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="A. Choudhury" initials="A." surname="Choudhury"/>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This memo describes the use of the Advanced Encryption Standard (AES) in Galois/Counter Mode (GCM) as a Transport Layer Security (TLS) authenticated encryption operation. GCM provides both confidentiality and data origin authentication, can be efficiently implemented in hardware for speeds of 10 gigabits per second and above, and is also well-suited to software implementations. This memo defines TLS cipher suites that use AES-GCM with RSA, DSA, and Diffie-Hellman-based key exchange mechanisms. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5288"/>
          <seriesInfo name="DOI" value="10.17487/RFC5288"/>
        </reference>
        <reference anchor="RFC6209">
          <front>
            <title>Addition of the ARIA Cipher Suites to Transport Layer Security (TLS)</title>
            <author fullname="W. Kim" initials="W." surname="Kim"/>
            <author fullname="J. Lee" initials="J." surname="Lee"/>
            <author fullname="J. Park" initials="J." surname="Park"/>
            <author fullname="D. Kwon" initials="D." surname="Kwon"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document specifies a set of cipher suites for the Transport Layer Security (TLS) protocol to support the ARIA encryption algorithm as a block cipher. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6209"/>
          <seriesInfo name="DOI" value="10.17487/RFC6209"/>
        </reference>
        <reference anchor="RFC6367">
          <front>
            <title>Addition of the Camellia Cipher Suites to Transport Layer Security (TLS)</title>
            <author fullname="S. Kanno" initials="S." surname="Kanno"/>
            <author fullname="M. Kanda" initials="M." surname="Kanda"/>
            <date month="September" year="2011"/>
            <abstract>
              <t>This document specifies forty-two cipher suites for the Transport Security Layer (TLS) protocol to support the Camellia encryption algorithm as a block cipher. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6367"/>
          <seriesInfo name="DOI" value="10.17487/RFC6367"/>
        </reference>
        <reference anchor="RFC8422">
          <front>
            <title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="M. Pegourie-Gonnard" initials="M." surname="Pegourie-Gonnard"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol. In particular, it specifies the use of Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement in a TLS handshake and the use of the Elliptic Curve Digital Signature Algorithm (ECDSA) and Edwards-curve Digital Signature Algorithm (EdDSA) as authentication mechanisms.</t>
              <t>This document obsoletes RFC 4492.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8422"/>
          <seriesInfo name="DOI" value="10.17487/RFC8422"/>
        </reference>
        <reference anchor="RFC5289">
          <front>
            <title>TLS Elliptic Curve Cipher Suites with SHA-256/384 and AES Galois Counter Mode (GCM)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>RFC 4492 describes elliptic curve cipher suites for Transport Layer Security (TLS). However, all those cipher suites use HMAC-SHA-1 as their Message Authentication Code (MAC) algorithm. This document describes sixteen new cipher suites for TLS that specify stronger MAC algorithms. Eight use Hashed Message Authentication Code (HMAC) with SHA-256 or SHA-384, and eight use AES in Galois Counter Mode (GCM). This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5289"/>
          <seriesInfo name="DOI" value="10.17487/RFC5289"/>
        </reference>
        <reference anchor="RFC4785">
          <front>
            <title>Pre-Shared Key (PSK) Ciphersuites with NULL Encryption for Transport Layer Security (TLS)</title>
            <author fullname="U. Blumenthal" initials="U." surname="Blumenthal"/>
            <author fullname="P. Goel" initials="P." surname="Goel"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document specifies authentication-only ciphersuites (with no encryption) for the Pre-Shared Key (PSK) based Transport Layer Security (TLS) protocol. These ciphersuites are useful when authentication and integrity protection is desired, but confidentiality is not needed or not permitted. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4785"/>
          <seriesInfo name="DOI" value="10.17487/RFC4785"/>
        </reference>
        <reference anchor="RFC4279">
          <front>
            <title>Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)</title>
            <author fullname="P. Eronen" initials="P." role="editor" surname="Eronen"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document specifies three sets of new ciphersuites for the Transport Layer Security (TLS) protocol to support authentication based on pre-shared keys (PSKs). These pre-shared keys are symmetric keys, shared in advance among the communicating parties. The first set of ciphersuites uses only symmetric key operations for authentication. The second set uses a Diffie-Hellman exchange authenticated with a pre-shared key, and the third set combines public key authentication of the server with pre-shared key authentication of the client. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4279"/>
          <seriesInfo name="DOI" value="10.17487/RFC4279"/>
        </reference>
        <reference anchor="RFC5487">
          <front>
            <title>Pre-Shared Key Cipher Suites for TLS with SHA-256/384 and AES Galois Counter Mode</title>
            <author fullname="M. Badra" initials="M." surname="Badra"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>RFC 4279 and RFC 4785 describe pre-shared key cipher suites for Transport Layer Security (TLS). However, all those cipher suites use SHA-1 in their Message Authentication Code (MAC) algorithm. This document describes a set of pre-shared key cipher suites for TLS that uses stronger digest algorithms (i.e., SHA-256 or SHA-384) and another set that uses the Advanced Encryption Standard (AES) in Galois Counter Mode (GCM). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5487"/>
          <seriesInfo name="DOI" value="10.17487/RFC5487"/>
        </reference>
        <reference anchor="RFC6655">
          <front>
            <title>AES-CCM Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="D. Bailey" initials="D." surname="Bailey"/>
            <date month="July" year="2012"/>
            <abstract>
              <t>This memo describes the use of the Advanced Encryption Standard (AES) in the Counter with Cipher Block Chaining - Message Authentication Code (CBC-MAC) Mode (CCM) of operation within Transport Layer Security (TLS) and Datagram TLS (DTLS) to provide confidentiality and data origin authentication. The AES-CCM algorithm is amenable to compact implementations, making it suitable for constrained environments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6655"/>
          <seriesInfo name="DOI" value="10.17487/RFC6655"/>
        </reference>
        <reference anchor="RFC7905">
          <front>
            <title>ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="W. Chang" initials="W." surname="Chang"/>
            <author fullname="N. Mavrogiannopoulos" initials="N." surname="Mavrogiannopoulos"/>
            <author fullname="J. Strombergson" initials="J." surname="Strombergson"/>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document describes the use of the ChaCha stream cipher and Poly1305 authenticator in the Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) protocols.</t>
              <t>This document updates RFCs 5246 and 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7905"/>
          <seriesInfo name="DOI" value="10.17487/RFC7905"/>
        </reference>
        <reference anchor="RFC5469">
          <front>
            <title>DES and IDEA Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="P. Eronen" initials="P." role="editor" surname="Eronen"/>
            <date month="February" year="2009"/>
            <abstract>
              <t>Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346) include cipher suites based on DES (Data Encryption Standard) and IDEA (International Data Encryption Algorithm) algorithms. DES (when used in single-DES mode) and IDEA are no longer recommended for general use in TLS, and have been removed from TLS version 1.2 (RFC 5246). This document specifies these cipher suites for completeness and discusses reasons why their use is no longer recommended. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5469"/>
          <seriesInfo name="DOI" value="10.17487/RFC5469"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8996">
          <front>
            <title>Deprecating TLS 1.0 and TLS 1.1</title>
            <author fullname="K. Moriarty" initials="K." surname="Moriarty"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <date month="March" year="2021"/>
            <abstract>
              <t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance.</t>
              <t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
              <t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="8996"/>
          <seriesInfo name="DOI" value="10.17487/RFC8996"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="13" month="September" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-14"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8447bis">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="21" month="July" year="2025"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   Recommended column of the selected TLS registries and adds a
   "Comment" column to all active registries that do not already have a
   "Comment" column.  Finally, it updates the registration request
   instructions.

   This document updates RFC 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-15"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="Raccoon" target="https://raccoon-attack.com/RacoonAttack.pdf">
          <front>
            <title>Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)</title>
            <author initials="R." surname="Merget">
              <organization/>
            </author>
            <author initials="M." surname="Brinkmann">
              <organization/>
            </author>
            <author initials="N." surname="Aviram">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="J." surname="Mittmann">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <date year="2020" month="September" day="09"/>
          </front>
        </reference>
        <reference anchor="ICA" target="https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.704.7932&amp;rep=rep1&amp;type=pdf">
          <front>
            <title>Practical invalid curve attacks on TLS-ECDH</title>
            <author initials="T." surname="Jager">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <date year="2015" month="September" day="21"/>
          </front>
        </reference>
        <reference anchor="tls-registry" target="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml">
          <front>
            <title>Transport Layer Security (TLS) Parameters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="weak-dh" target="https://weakdh.org/">
          <front>
            <title>Weak Diffie-Hellman and the Logjam Attack</title>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan">
              <organization/>
            </author>
            <author initials="Z." surname="Durumeric">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="M." surname="Green">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="D." surname="Springall">
              <organization/>
            </author>
            <author initials="E." surname="Thomé">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="B." surname="VanderSloot">
              <organization/>
            </author>
            <author initials="E." surname="Wustrow">
              <organization/>
            </author>
            <author initials="S." surname="Zanella-Béguelin">
              <organization/>
            </author>
            <author initials="P." surname="Zimmermann">
              <organization/>
            </author>
            <date year="2015" month="October"/>
          </front>
        </reference>
        <reference anchor="subgroups" target="https://eprint.iacr.org/2016/995/20161017:193515">
          <front>
            <title>Measuring small subgroup attacks against Diffie-Hellman</title>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="A." surname="Sanso">
              <organization/>
            </author>
            <author initials="S." surname="Cohney">
              <organization/>
            </author>
            <author initials="J." surname="Fried">
              <organization/>
            </author>
            <author initials="M." surname="Hastings">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <date year="2016" month="October" day="15"/>
          </front>
        </reference>
        <reference anchor="BLEI">
          <front>
            <title>Chosen Ciphertext Attacks against Protocols Based on RSA Encryption Standard PKCS #1</title>
            <author initials="D." surname="Bleichenbacher">
              <organization/>
            </author>
            <date year="1998"/>
          </front>
          <seriesInfo name="Advances in Cryptology -- CRYPTO'98, LNCS vol. 1462, pages: 1-12" value=""/>
        </reference>
        <reference anchor="ROBOT">
          <front>
            <title>Return Of Bleichenbacher's Oracle Threat (ROBOT)</title>
            <author initials="H." surname="Boeck">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="C." surname="Young">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
          <seriesInfo name="27th USENIX Security Symposium" value=""/>
        </reference>
        <reference anchor="NEW-BLEI" target="https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-meyer.pdf">
          <front>
            <title>Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks</title>
            <author initials="C." surname="Meyer">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="E." surname="Weiss">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <author initials="S." surname="Schinzel">
              <organization/>
            </author>
            <author initials="E." surname="Tews">
              <organization/>
            </author>
            <date year="2014" month="August"/>
          </front>
        </reference>
        <reference anchor="DROWN" target="https://drownattack.com/drown-attack-paper.pdf">
          <front>
            <title>DROWN: Breaking TLS using SSLv2</title>
            <author initials="N." surname="Aviram">
              <organization/>
            </author>
            <author initials="S." surname="Schinzel">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="M." surname="Dankel">
              <organization/>
            </author>
            <author initials="J." surname="Steube">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="V." surname="Dukhovni">
              <organization/>
            </author>
            <author initials="E." surname="Käsper">
              <organization/>
            </author>
            <author initials="S." surname="Cohney">
              <organization/>
            </author>
            <author initials="S." surname="Engels">
              <organization/>
            </author>
            <author initials="C." surname="Paar">
              <organization/>
            </author>
            <author initials="Y." surname="Shavitt">
              <organization/>
            </author>
            <date year="2016" month="August"/>
          </front>
        </reference>
        <reference anchor="XPROT">
          <front>
            <title>On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption</title>
            <author initials="T." surname="Jager">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <seriesInfo name="Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security" value=""/>
        </reference>
        <reference anchor="DLOG795" target="https://eprint.iacr.org/2020/697">
          <front>
            <title>Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment</title>
            <author initials="F." surname="Boudot">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="A." surname="Guillevic">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="E." surname="Thomé">
              <organization/>
            </author>
            <author initials="P." surname="Zimmermann">
              <organization/>
            </author>
            <date year="2020" month="August" day="17"/>
          </front>
        </reference>
        <reference anchor="MAY4" target="https://dl.acm.org/doi/pdf/10.1145/3133956.3134029">
          <front>
            <title>May the fourth be with you: A microarchitectural side channel attack on several real-world applications of curve25519</title>
            <author initials="D." surname="Genkin">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="Y." surname="Yarom">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PARIS256" target="https://i.blackhat.com/us-18/Wed-August-8/us-18-Valsorda-Squeezing-A-Key-Through-A-Carry-Bit-wp.pdf">
          <front>
            <title>The PARIS256 Attack</title>
            <author initials="S." surname="Devlin">
              <organization/>
            </author>
            <author initials="F." surname="Valsorda">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC4492">
          <front>
            <title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="S. Blake-Wilson" initials="S." surname="Blake-Wilson"/>
            <author fullname="N. Bolyard" initials="N." surname="Bolyard"/>
            <author fullname="V. Gupta" initials="V." surname="Gupta"/>
            <author fullname="C. Hawk" initials="C." surname="Hawk"/>
            <author fullname="B. Moeller" initials="B." surname="Moeller"/>
            <date month="May" year="2006"/>
            <abstract>
              <t>This document describes new key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol. In particular, it specifies the use of Elliptic Curve Diffie-Hellman (ECDH) key agreement in a TLS handshake and the use of Elliptic Curve Digital Signature Algorithm (ECDSA) as a new authentication mechanism. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4492"/>
          <seriesInfo name="DOI" value="10.17487/RFC4492"/>
        </reference>
      </references>
    </references>
    <?line 621?>



  </back>
  <!-- ##markdown-source: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-->

</rfc>
