Internet Documents

RFCs 9100 - 9199s

RFCs All DocumentsSTDs Internet Standards DocumentsBCPs Best Current Practice DocumentsFYIs Informational Documents
 

PROPOSEDDRAFTSTANDARDEXPMTLBCPINFOHISTORICUPDATEDOBSOLETEDUNKNOWN

 
RFC 9100 Sensor Measurement Lists (SenML) Features and Versions
 
Authors:C. Bormann.
Date:August 2021
Formats:txt json pdf xml html
Updates:RFC 8428
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9100
This short document updates RFC 8428, "Sensor Measurement Lists(SenML)", by specifying the use of independently selectable "SenMLFeatures" and mapping them to SenML version numbers.
 
RFC 9101 The OAuth 2.0 Authorization Framework: JWT-Secured Authorization Request (JAR)
 
Authors:N. Sakimura, J. Bradley, M. Jones.
Date:August 2021
Formats:txt json html pdf xml
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9101
The authorization request in OAuth 2.0 described in RFC 6749 utilizes query parameter serialization, which means that authorization request parameters are encoded in the URI of the request and sent through user agents such as web browsers. While it is easy to implement, it means that a) the communication through the user agents is not integrity protected and thus, the parameters can be tainted, b) the source of the communication is not authenticated, and c) the communication through the user agents can be monitored. Because of these weaknesses, several attacks to the protocol have now been put forward.

This document introduces the ability to send request parameters in aJSON Web Token (JWT) instead, which allows the request to be signed with JSON Web Signature (JWS) and encrypted with JSON Web Encryption(JWE) so that the integrity, source authentication, and confidentiality properties of the authorization request are attained.The request can be sent by value or by reference.

 
RFC 9102 TLS DNSSEC Chain Extension
 
Authors:V. Dukhovni, S. Huque, W. Toorop, P. Wouters, M. Shore.
Date:August 2021
Formats:txt html xml pdf json
Status:EXPERIMENTAL
DOI:10.17487/RFC 9102
This document describes an experimental TLS extension for the in-band transport of the complete set of records that can be validated byDNSSEC and that are needed to perform DNS-Based Authentication ofNamed Entities (DANE) of a TLS server. This extension obviates the need to perform separate, out-of-band DNS lookups. When the requisite DNS records do not exist, the extension conveys a denial- of-existence proof that can be validated.

This experimental extension is developed outside the IETF and is published here to guide implementation of the extension and to ensure interoperability among implementations.

 
RFC 9103 DNS Zone Transfer over TLS
 
Authors:W. Toorop, S. Dickinson, S. Sahib, P. Aras, A. Mankin.
Date:August 2021
Formats:txt xml html pdf json
Updates:RFC 1995, RFC 5936, RFC 7766
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9103
DNS zone transfers are transmitted in cleartext, which gives attackers the opportunity to collect the content of a zone by eavesdropping on network connections. The DNS Transaction Signature(TSIG) mechanism is specified to restrict direct zone transfer to authorized clients only, but it does not add confidentiality. This document specifies the use of TLS, rather than cleartext, to prevent zone content collection via passive monitoring of zone transfers: XFR over TLS (XoT). Additionally, this specification updates RFC 1995 and RFC 5936 with respect to efficient use of TCP connections and RFC7766 with respect to the recommended number of connections between a client and server for each transport.
 
RFC 9104 Distribution of Traffic Engineering Extended Administrative Groups Using the Border Gateway Protocol - Link State (BGP-LS)
 
Authors:J. Tantsura, Z. Wang, Q. Wu, K. Talaulikar.
Date:August 2021
Formats:txt json xml pdf html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9104
Administrative groups are link attributes used for traffic engineering. This document defines an extension to the BorderGateway Protocol - Link State (BGP-LS) for advertisement of extended administrative groups (EAGs).
 
RFC 9105 A YANG Data Model for Terminal Access Controller Access-Control System Plus (TACACS+)
 
Authors:B. Wu, Ed., G. Zheng, M. Wang, Ed..
Date:August 2021
Formats:txt xml pdf json html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9105
This document defines a Terminal Access Controller Access-ControlSystem Plus (TACACS+) client YANG module that augments the SystemManagement data model, defined in RFC 7317, to allow devices to make use of TACACS+ servers for centralized Authentication, Authorization, and Accounting (AAA). Though being a standard module, this module does not endorse the security mechanisms of the TACACS+ protocol (RFC8907), and TACACS+ MUST be used within a secure deployment.

The YANG module in this document conforms to the Network ManagementDatastore Architecture (NMDA) defined in RFC 8342.

 
RFC 9106 Argon2 Memory-Hard Function for Password Hashing and Proof-of-Work Applications
 
Authors:A. Biryukov, D. Dinu, D. Khovratovich, S. Josefsson.
Date:September 2021
Formats:txt html json pdf xml
Status:INFORMATIONAL
DOI:10.17487/RFC 9106
This document describes the Argon2 memory-hard function for password hashing and proof-of-work applications. We provide an implementer- oriented description with test vectors. The purpose is to simplify adoption of Argon2 for Internet protocols. This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.
 
RFC 9107 BGP Optimal Route Reflection (BGP ORR)
 
Authors:R. Raszuk, Ed., B. Decraene, Ed., C. Cassar, E. Åman, K. Wang.
Date:August 2021
Formats:txt html pdf xml json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9107
This document defines an extension to BGP route reflectors. On route reflectors, BGP route selection is modified in order to choose the best route from the standpoint of their clients, rather than from the standpoint of the route reflectors themselves. Depending on the scaling and precision requirements, route selection can be specific for one client, common for a set of clients, or common for all clients of a route reflector. This solution is particularly applicable in deployments using centralized route reflectors, where choosing the best route based on the route reflector's IGP location is suboptimal. This facilitates, for example, a "best exit point" policy ("hot potato routing").

The solution relies upon all route reflectors learning all paths that are eligible for consideration. BGP route selection is performed in the route reflectors based on the IGP cost from configured locations in the link-state IGP.

 
RFC 9108 YANG Types for DNS Classes and Resource Record Types
 
Authors:L. Lhotka, P. Špaček.
Date:September 2021
Formats:txt json pdf html xml
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9108
This document introduces the YANG module "iana-dns-class-rr-type", which contains derived types reflecting two IANA registries: DNSCLASSes and Resource Record (RR) TYPEs. These YANG types are intended as the minimum basis for future data modeling work.
 
RFC 9109 Network Time Protocol Version 4: Port Randomization
 
Authors:F. Gont, G. Gont, M. Lichvar.
Date:August 2021
Formats:txt json pdf html xml
Updates:RFC 5905
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9109
The Network Time Protocol (NTP) can operate in several modes. Some of these modes are based on the receipt of unsolicited packets and therefore require the use of a well-known port as the local port.However, in the case of NTP modes where the use of a well-known port is not required, employing such a well-known port unnecessarily facilitates the ability of attackers to perform blind/off-path attacks. This document formally updates RFC 5905, recommending the use of transport-protocol ephemeral port randomization for those modes where use of the NTP well-known port is not required.
 
RFC 9110 HTTP Semantics
 
Authors:R. Fielding, Ed., M. Nottingham, Ed., J. Reschke, Ed..
Date:June 2022
Formats:txt json xml html pdf
Obsoletes:RFC 2818, RFC 7230, RFC 7231, RFC 7232, RFC 7233, RFC 7235, RFC 7538, RFC 7615, RFC 7694
Updates:RFC 3864
Also:STD 0097
Status:INTERNET STANDARD
DOI:10.17487/RFC 9110
The Hypertext Transfer Protocol (HTTP) is a stateless application- level protocol for distributed, collaborative, hypertext information systems. This document describes the overall architecture of HTTP, establishes common terminology, and defines aspects of the protocol that are shared by all versions. In this definition are core protocol elements, extensibility mechanisms, and the "http" and"https" Uniform Resource Identifier (URI) schemes.

This document updates RFC 3864 and obsoletes RFCs 2818, 7231, 7232,7233, 7235, 7538, 7615, 7694, and portions of 7230.

 
RFC 9111 HTTP Caching
 
Authors:R. Fielding, Ed., M. Nottingham, Ed., J. Reschke, Ed..
Date:June 2022
Formats:txt json html xml pdf
Obsoletes:RFC 7234
Also:STD 0098
Status:INTERNET STANDARD
DOI:10.17487/RFC 9111
The Hypertext Transfer Protocol (HTTP) is a stateless application- level protocol for distributed, collaborative, hypertext information systems. This document defines HTTP caches and the associated header fields that control cache behavior or indicate cacheable response messages.

This document obsoletes RFC 7234.

 
RFC 9112 HTTP/1.1
 
Authors:R. Fielding, Ed., M. Nottingham, Ed., J. Reschke, Ed..
Date:June 2022
Formats:txt html pdf xml json
Obsoletes:RFC 7230
Also:STD 0099
Status:INTERNET STANDARD
DOI:10.17487/RFC 9112
The Hypertext Transfer Protocol (HTTP) is a stateless application- level protocol for distributed, collaborative, hypertext information systems. This document specifies the HTTP/1.1 message syntax, message parsing, connection management, and related security concerns.

This document obsoletes portions of RFC 7230.

 
RFC 9113 HTTP/2
 
Authors:M. Thomson, Ed., C. Benfield, Ed..
Date:June 2022
Formats:txt pdf xml html json
Obsoletes:RFC 7540, RFC 8740
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9113
This specification describes an optimized expression of the semantics of the Hypertext Transfer Protocol (HTTP), referred to as HTTP version 2 (HTTP/2). HTTP/2 enables a more efficient use of network resources and a reduced latency by introducing field compression and allowing multiple concurrent exchanges on the same connection.

This document obsoletes RFCs 7540 and 8740.

 
RFC 9114 HTTP/3
 
Authors:M. Bishop, Ed..
Date:June 2022
Formats:txt pdf xml json html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9114
The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.
 
RFC 9115 An Automatic Certificate Management Environment (ACME) Profile for Generating Delegated Certificates
 
Authors:Y. Sheffer, D. López, A. Pastor Perales, T. Fossati.
Date:September 2021
Formats:txt json pdf xml html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9115
This document defines a profile of the Automatic CertificateManagement Environment (ACME) protocol by which the holder of an identifier (e.g., a domain name) can allow a third party to obtain anX.509 certificate such that the certificate subject is the delegated identifier while the certified public key corresponds to a private key controlled by the third party. A primary use case is that of aContent Delivery Network (CDN), the third party, terminating TLS sessions on behalf of a content provider (the holder of a domain name). The presented mechanism allows the holder of the identifier to retain control over the delegation and revoke it at any time.Importantly, this mechanism does not require any modification to the deployed TLS clients and servers.
 
RFC 9116 A File Format to Aid in Security Vulnerability Disclosure
 
Authors:E. Foudil, Y. Shafranovich.
Date:April 2022
Formats:txt html xml pdf json
Status:INFORMATIONAL
DOI:10.17487/RFC 9116
When security vulnerabilities are discovered by researchers, proper reporting channels are often lacking. As a result, vulnerabilities may be left unreported. This document defines a machine-parsable format ("security.txt") to help organizations describe their vulnerability disclosure practices to make it easier for researchers to report vulnerabilities.
 
RFC 9117 Revised Validation Procedure for BGP Flow Specifications
 
Authors:J. Uttaro, J. Alcaide, C. Filsfils, D. Smith, P. Mohapatra.
Date:August 2021
Formats:txt html json xml pdf
Updates:RFC 8955
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9117
This document describes a modification to the validation procedure defined for the dissemination of BGP Flow Specifications. The dissemination of BGP Flow Specifications as specified in RFC 8955 requires that the originator of the Flow Specification match the originator of the best-match unicast route for the destination prefix embedded in the Flow Specification. For an Internal Border GatewayProtocol (iBGP) received route, the originator is typically a border router within the same autonomous system (AS). The objective is to allow only BGP speakers within the data forwarding path to originateBGP Flow Specifications. Sometimes it is desirable to originate theBGP Flow Specification from any place within the autonomous system itself, for example, from a centralized BGP route controller.However, the validation procedure described in RFC 8955 will fail in this scenario. The modification proposed herein relaxes the validation rule to enable Flow Specifications to be originated within the same autonomous system as the BGP speaker performing the validation. Additionally, this document revises the AS_PATH validation rules so Flow Specifications received from an ExternalBorder Gateway Protocol (eBGP) peer can be validated when such a peer is a BGP route server.

This document updates the validation procedure in RFC 8955.

 
RFC 9118 Enhanced JSON Web Token (JWT) Claim Constraints for Secure Telephone Identity Revisited (STIR) Certificates
 
Authors:R. Housley.
Date:August 2021
Formats:txt json xml pdf html
Updates:RFC 8226
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9118
RFC 8226 specifies the use of certificates for Secure TelephoneIdentity Credentials; these certificates are often called "SecureTelephone Identity Revisited (STIR) Certificates". RFC 8226 provides a certificate extension to constrain the JSON Web Token (JWT) claims that can be included in the Personal Assertion Token (PASSporT), as defined in RFC 8225. If the PASSporT signer includes a JWT claim outside the constraint boundaries, then the PASSporT recipient will reject the entire PASSporT. This document updates RFC 8226; it provides all of the capabilities available in the original certificate extension as well as an additional way to constrain the allowable JWT claims. The enhanced extension can also provide a list of claims that are not allowed to be included in the PASSporT.
 
RFC 9119 Multicast Considerations over IEEE 802 Wireless Media
 
Authors:C. Perkins, M. McBride, D. Stanley, W. Kumari, JC. Zúñiga.
Date:October 2021
Formats:txt json html xml pdf
Status:INFORMATIONAL
DOI:10.17487/RFC 9119
Well-known issues with multicast have prevented the deployment of multicast in 802.11 (Wi-Fi) and other local-area wireless environments. This document describes the known limitations of wireless (primarily 802.11) Layer 2 multicast. Also described are certain multicast enhancement features that have been specified by the IETF and by IEEE 802 for wireless media, as well as some operational choices that can be made to improve the performance of the network. Finally, some recommendations are provided about the usage and combination of these features and operational choices.
 
RFC 9120 Nameservers for the Address and Routing Parameter Area ("arpa") Domain
 
Authors:K. Davies, J. Arkko.
Date:October 2021
Formats:txt pdf json xml html
Updates:RFC 3172
Status:INFORMATIONAL
DOI:10.17487/RFC 9120
This document describes revisions to operational practices to separate the function of the "arpa" top-level domain in the DNS from its historical operation alongside the DNS root zone.
 
RFC 9121 Deprecating Infrastructure "int" Domains
 
Authors:K. Davies, A. Baber.
Date:April 2023
Formats:txt pdf json xml html
Obsoletes:RFC 1528
Updates:RFC 1706
Status:INFORMATIONAL
DOI:10.17487/RFC 9121
This document deprecates the use of any "int" domain names that were designated for infrastructure purposes by the IETF, and it identifies them for removal from the "int" top-level domain. Any implementations that involve these domains are now deprecated. This document also changes the status of RFC 1528 and RFC 1706 toHistoric.
 
RFC 9122 IANA Registry for Sieve Actions
 
Authors:A. Melnikov, K. Murchison.
Date:June 2023
Formats:txt html json xml pdf
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9122
The Sieve Email Filtering Language (RFC 5228) is a popular email filtering language used upon final mail delivery. This document creates a registry for Sieve actions to help developers and Sieve extension writers track interactions between different extensions.
 
RFC 9124 A Manifest Information Model for Firmware Updates in Internet of Things (IoT) Devices
 
Authors:B. Moran, H. Tschofenig, H. Birkholz.
Date:January 2022
Formats:txt json xml html pdf
Status:INFORMATIONAL
DOI:10.17487/RFC 9124
Vulnerabilities with Internet of Things (IoT) devices have raised the need for a reliable and secure firmware update mechanism that is also suitable for constrained devices. Ensuring that devices function and remain secure over their service lifetime requires such an update mechanism to fix vulnerabilities, update configuration settings, and add new functionality.

One component of such a firmware update is a concise and machine- processable metadata document, or manifest, that describes the firmware image(s) and offers appropriate protection. This document describes the information that must be present in the manifest.

 
RFC 9125 Gateway Auto-Discovery and Route Advertisement for Site Interconnection Using Segment Routing
 
Authors:A. Farrel, J. Drake, E. Rosen, K. Patel, L. Jalil.
Date:August 2021
Formats:txt json xml pdf html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9125
Data centers are attached to the Internet or a backbone network by gateway routers. One data center typically has more than one gateway for commercial, load-balancing, and resiliency reasons. Other sites, such as access networks, also need to be connected across backbone networks through gateways.

This document defines a mechanism using the BGP Tunnel Encapsulation attribute to allow data center gateway routers to advertise routes to the prefixes reachable in the site, including advertising them on behalf of other gateways at the same site. This allows segment routing to be used to identify multiple paths across the Internet or backbone network between different gateways. The paths can be selected for load-balancing, resilience, and quality purposes.

 
RFC 9126 OAuth 2.0 Pushed Authorization Requests
 
Authors:T. Lodderstedt, B. Campbell, N. Sakimura, D. Tonge, F. Skokan.
Date:September 2021
Formats:txt pdf xml html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9126
This document defines the pushed authorization request (PAR) endpoint, which allows clients to push the payload of an OAuth 2.0 authorization request to the authorization server via a direct request and provides them with a request URI that is used as reference to the data in a subsequent call to the authorization endpoint.
 
RFC 9127 YANG Data Model for Bidirectional Forwarding Detection (BFD)
 
Authors:R. Rahman, Ed., L. Zheng, Ed., M. Jethanandani, Ed., S. Pallagatti, G. Mirsky.
Date:October 2021
Formats:txt html pdf xml json
Updated by:RFC 9314
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9127
This document defines a YANG data model that can be used to configure and manage Bidirectional Forwarding Detection (BFD).

The YANG modules in this document conform to the Network ManagementDatastore Architecture (NMDA) (RFC 8342).

 
RFC 9128 YANG Data Model for Protocol Independent Multicast (PIM)
 
Authors:X. Liu, P. McAllister, A. Peter, M. Sivakumar, Y. Liu, F. Hu.
Date:October 2022
Formats:txt pdf xml json html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9128
This document defines a YANG data model that can be used to configure and manage devices supporting Protocol Independent Multicast (PIM).The model covers the PIM protocol configuration, operational state, and event notifications data.
 
RFC 9129 YANG Data Model for the OSPF Protocol
 
Authors:D. Yeung, Y. Qu, Z. Zhang, I. Chen, A. Lindem.
Date:October 2022
Formats:txt json pdf xml html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9129
This document defines a YANG data model that can be used to configure and manage OSPF. The model is based on YANG 1.1 as defined in RFC7950 and conforms to the Network Management Datastore Architecture(NMDA) as described in RFC 8342.
 
RFC 9130 YANG Data Model for the IS-IS Protocol
 
Authors:S. Litkowski, Ed., D. Yeung, A. Lindem, J. Zhang, L. Lhotka.
Date:October 2022
Formats:txt xml pdf json html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9130
This document defines a YANG data model that can be used to configure and manage the IS-IS protocol on network elements.
 
RFC 9131 Gratuitous Neighbor Discovery: Creating Neighbor Cache Entries on First-Hop Routers
 
Authors:J. Linkova.
Date:October 2021
Formats:txt json xml pdf html
Updates:RFC 4861
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9131
Neighbor Discovery (RFC 4861) is used by IPv6 nodes to determine the link-layer addresses of neighboring nodes as well as to discover and maintain reachability information. This document updates RFC 4861 to allow routers to proactively create a Neighbor Cache entry when a newIPv6 address is assigned to a node. It also updates RFC 4861 and recommends that nodes send unsolicited Neighbor Advertisements upon assigning a new IPv6 address. These changes will minimize the delay and packet loss when a node initiates connections to an off-link destination from a new IPv6 address.
 
RFC 9132 Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel Specification
 
Authors:M. Boucadair, Ed., J. Shallow, T. Reddy.K.
Date:September 2021
Formats:txt html pdf json xml
Obsoletes:RFC 8782
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9132
This document specifies the Distributed Denial-of-Service Open ThreatSignaling (DOTS) signal channel, a protocol for signaling the need for protection against Distributed Denial-of-Service (DDoS) attacks to a server capable of enabling network traffic mitigation on behalf of the requesting client.

A companion document defines the DOTS data channel, a separate reliable communication layer for DOTS management and configuration purposes.

This document obsoletes RFC 8782.

 
RFC 9133 Controlling Filtering Rules Using Distributed Denial-of-Service Open Threat Signaling (DOTS) Signal Channel
 
Authors:K. Nishizuka, M. Boucadair, T. Reddy.K, T. Nagata.
Date:September 2021
Formats:txt html pdf json xml
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9133
This document specifies an extension to the Distributed Denial-of-Service Open Threat Signaling (DOTS) signal channel protocol so thatDOTS clients can control their filtering rules when an attack mitigation is active.

Particularly, this extension allows a DOTS client to activate or deactivate existing filtering rules during a Distributed Denial-of-Service (DDoS) attack. The characterization of these filtering rules is conveyed by a DOTS client during an 'idle' time (i.e., no mitigation is active) by means of the DOTS data channel protocol.

 
RFC 9134 RTP Payload Format for ISO/IEC 21122 (JPEG XS)
 
Authors:T. Bruylants, A. Descampe, C. Damman, T. Richter.
Date:October 2021
Formats:txt json html pdf xml
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9134
This document specifies a Real-Time Transport Protocol (RTP) payload format to be used for transporting video encoded with JPEG XS (ISO/IEC 21122). JPEG XS is a low-latency, lightweight image coding system. Compared to an uncompressed video use case, it allows higher resolutions and video frame rates while offering visually lossless quality, reduced power consumption, and encoding-decoding latency confined to a fraction of a video frame.
 
RFC 9135 Integrated Routing and Bridging in Ethernet VPN (EVPN)
 
Authors:A. Sajassi, S. Salam, S. Thoria, J. Drake, J. Rabadan.
Date:October 2021
Formats:txt json pdf xml html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9135
Ethernet VPN (EVPN) provides an extensible and flexible multihomingVPN solution over an MPLS/IP network for intra-subnet connectivity among Tenant Systems and end devices that can be physical or virtual.However, there are scenarios for which there is a need for a dynamic and efficient inter-subnet connectivity among these Tenant Systems and end devices while maintaining the multihoming capabilities ofEVPN. This document describes an Integrated Routing and Bridging(IRB) solution based on EVPN to address such requirements.
 
RFC 9136 IP Prefix Advertisement in Ethernet VPN (EVPN)
 
Authors:J. Rabadan, Ed., W. Henderickx, J. Drake, W. Lin, A. Sajassi.
Date:October 2021
Formats:txt xml pdf html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9136
The BGP MPLS-based Ethernet VPN (EVPN) (RFC 7432) mechanism provides a flexible control plane that allows intra-subnet connectivity in anMPLS and/or Network Virtualization Overlay (NVO) (RFC 7365) network.In some networks, there is also a need for dynamic and efficient inter-subnet connectivity across Tenant Systems and end devices that can be physical or virtual and do not necessarily participate in dynamic routing protocols. This document defines a new EVPN route type for the advertisement of IP prefixes and explains some use-case examples where this new route type is used.
 
RFC 9137 Considerations for Cancellation of IETF Meetings
 
Authors:M. Duke.
Date:October 2021
Formats:txt xml html pdf json
Also:BCP 0226
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 9137
The IETF ordinarily holds three in-person meetings per year to discuss issues and advance the Internet. However, various events can make a planned in-person meeting infeasible. This document provides criteria to aid the IETF Administration LLC (IETF LLC), the InternetEngineering Steering Group (IESG), and the Chair of the InternetResearch Task Force (IRTF) in deciding to relocate, virtualize, postpone, or cancel an in-person IETF meeting.
 
RFC 9138 Design Considerations for Name Resolution Service in Information-Centric Networking (ICN)
 
Authors:J. Hong, T. You, L. Dong, C. Westphal, B. Ohlman.
Date:December 2021
Formats:txt xml json pdf html
Status:INFORMATIONAL
DOI:10.17487/RFC 9138
This document provides the functionalities and design considerations for a Name Resolution Service (NRS) in Information-Centric Networking(ICN). The purpose of an NRS in ICN is to translate an object name into some other information such as a locator, another name, etc. in order to forward the object request. This document is a product of the Information-Centric Networking Research Group (ICNRG).
 
RFC 9139 Information-Centric Networking (ICN) Adaptation to Low-Power Wireless Personal Area Networks (LoWPANs)
 
Authors:C. Gündoğan, T. Schmidt, M. Wählisch, C. Scherb, C. Marxer, C. Tschudin.
Date:November 2021
Formats:txt xml pdf json html
Status:EXPERIMENTAL
DOI:10.17487/RFC 9139
This document defines a convergence layer for Content-CentricNetworking (CCNx) and Named Data Networking (NDN) over IEEE 802.15.4Low-Power Wireless Personal Area Networks (LoWPANs). A new frame format is specified to adapt CCNx and NDN packets to the small MTU size of IEEE 802.15.4. For that, syntactic and semantic changes to the TLV-based header formats are described. To support compatibility with other LoWPAN technologies that may coexist on a wireless medium, the dispatching scheme provided by IPv6 over LoWPAN (6LoWPAN) is extended to include new dispatch types for CCNx and NDN.Additionally, the fragmentation component of the 6LoWPAN dispatching framework is applied to Information-Centric Network (ICN) chunks. In its second part, the document defines stateless and stateful compression schemes to improve efficiency on constrained links.Stateless compression reduces TLV expressions to static header fields for common use cases. Stateful compression schemes elide states local to the LoWPAN and replace names in Data packets by short local identifiers.

This document is a product of the IRTF Information-Centric NetworkingResearch Group (ICNRG).

 
RFC 9140 Nimble Out-of-Band Authentication for EAP (EAP-NOOB)
 
Authors:T. Aura, M. Sethi, A. Peltonen.
Date:December 2021
Formats:txt html json pdf xml
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9140
The Extensible Authentication Protocol (EAP) provides support for multiple authentication methods. This document defines the EAP-NOOB authentication method for nimble out-of-band (OOB) authentication and key derivation. The EAP method is intended for bootstrapping all kinds of Internet-of-Things (IoT) devices that have no preconfigured authentication credentials. The method makes use of a user-assisted, one-directional, out-of-band (OOB) message between the peer device and authentication server to authenticate the in-band key exchange.The device must have a nonnetwork input or output interface, such as a display, microphone, speaker, or blinking light, that can send or receive dynamically generated messages of tens of bytes in length.
 
RFC 9141 Updating References to the IETF FTP Service
 
Authors:R. Danyliw.
Date:November 2021
Formats:txt html pdf xml json
Updates:RFC 2077, RFC 2418, RFC 2648, RFC 2954, RFC 2955, RFC 3020, RFC 3083, RFC 3201, RFC 3202, RFC 3295, RFC 3684, RFC 3962, RFC 3970, RFC 4036, RFC 4131, RFC 4251, RFC 4323, RFC 4546, RFC 4547, RFC 4639, RFC 4682, RFC 5098, RFC 5428, RFC 6756, RFC 7241
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9141
The IETF FTP service running at ftp.ietf.org, ops.ietf.org, and ietf.org will be retired. A number of published RFCs in the IETF andIAB streams include URIs that reference this FTP service. To ensure that the materials referenced using the IETF FTP service can still be found, this document updates the FTP-based references in these affected documents with HTTPS URIs.
 
RFC 9142 Key Exchange (KEX) Method Updates and Recommendations for Secure Shell (SSH)
 
Authors:M. Baushke.
Date:January 2022
Formats:txt xml pdf json html
Updates:RFC 4250, RFC 4253, RFC 4432, RFC 4462
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9142
This document updates the recommended set of key exchange methods for use in the Secure Shell (SSH) protocol to meet evolving needs for stronger security. It updates RFCs 4250, 4253, 4432, and 4462.
 
RFC 9143 Negotiating Media Multiplexing Using the Session Description Protocol (SDP)
 
Authors:C. Holmberg, H. Alvestrand, C. Jennings.
Date:February 2022
Formats:txt json xml pdf html
Obsoletes:RFC 8843
Updates:RFC 3264, RFC 5888, RFC 7941
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9143
This specification defines a new Session Description Protocol (SDP)Grouping Framework extension called 'BUNDLE'. The extension can be used with the SDP offer/answer mechanism to negotiate the usage of a single transport (5-tuple) for sending and receiving media described by multiple SDP media descriptions ("m=" sections). Such transport is referred to as a "BUNDLE transport", and the media is referred to as "bundled media". The "m=" sections that use the BUNDLE transport form a BUNDLE group.

This specification defines a new RTP Control Protocol (RTCP) SourceDescription (SDES) item and a new RTP header extension.

This specification updates RFCs 3264, 5888, and 7941.

This specification obsoletes RFC 8843.

 
RFC 9144 Comparison of Network Management Datastore Architecture (NMDA) Datastores
 
Authors:A. Clemm, Y. Qu, J. Tantsura, A. Bierman.
Date:December 2021
Formats:txt xml html pdf json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9144
This document defines a Remote Procedure Call (RPC) operation to compare management datastores that comply with the Network ManagementDatastore Architecture (NMDA).
 
RFC 9145 Integrity Protection for the Network Service Header (NSH) and Encryption of Sensitive Context Headers
 
Authors:M. Boucadair, T. Reddy.K, D. Wing.
Date:December 2021
Formats:txt xml pdf html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9145
This specification presents an optional method to add integrity protection directly to the Network Service Header (NSH) used forService Function Chaining (SFC). Also, this specification allows for the encryption of sensitive metadata (MD) that is carried in the NSH.
 
RFC 9146 Connection Identifier for DTLS 1.2
 
Authors:E. Rescorla, Ed., H. Tschofenig, Ed., T. Fossati, A. Kraus.
Date:March 2022
Formats:txt json html pdf xml
Updates:RFC 6347
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9146
This document specifies the Connection ID (CID) construct for theDatagram Transport Layer Security (DTLS) protocol version 1.2.

A CID is an identifier carried in the record layer header that gives the recipient additional information for selecting the appropriate security association. In "classical" DTLS, selecting a security association of an incoming DTLS record is accomplished with the help of the 5-tuple. If the source IP address and/or source port changes during the lifetime of an ongoing DTLS session, then the receiver will be unable to locate the correct security context.

The new ciphertext record format with the CID also provides content type encryption and record layer padding.

This document updates RFC 6347.

 
RFC 9147 The Datagram Transport Layer Security (DTLS) Protocol Version 1.3
 
Authors:E. Rescorla, H. Tschofenig, N. Modadugu.
Date:April 2022
Formats:txt json pdf xml html
Obsoletes:RFC 6347
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9147
This document specifies version 1.3 of the Datagram Transport LayerSecurity (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.

The DTLS 1.3 protocol is based on the Transport Layer Security (TLS)1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.

This document obsoletes RFC 6347.

 
RFC 9148 EST-coaps: Enrollment over Secure Transport with the Secure Constrained Application Protocol
 
Authors:P. van der Stok, P. Kampanakis, M. Richardson, S. Raza.
Date:April 2022
Formats:txt html json pdf xml
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9148
Enrollment over Secure Transport (EST) is used as a certificate provisioning protocol over HTTPS. Low-resource devices often use the lightweight Constrained Application Protocol (CoAP) for message exchanges. This document defines how to transport EST payloads over secure CoAP (EST-coaps), which allows constrained devices to use existing EST functionality for provisioning certificates.
 
RFC 9149 TLS Ticket Requests
 
Authors:T. Pauly, D. Schinazi, C.A. Wood.
Date:April 2022
Formats:txt html pdf xml json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9149
TLS session tickets enable stateless connection resumption for clients without server-side, per-client state. Servers vend an arbitrary number of session tickets to clients, at their discretion, upon connection establishment. Clients store and use tickets when resuming future connections. This document describes a mechanism by which clients can specify the desired number of tickets needed for future connections. This extension aims to provide a means for servers to determine the number of tickets to generate in order to reduce ticket waste while simultaneously priming clients for future connection attempts.
 
RFC 9150 TLS 1.3 Authentication and Integrity-Only Cipher Suites
 
Authors:N. Cam-Winget, J. Visoky.
Date:April 2022
Formats:txt html json xml pdf
Status:INFORMATIONAL
DOI:10.17487/RFC 9150
This document defines the use of cipher suites for TLS 1.3 based onHashed Message Authentication Code (HMAC). Using these cipher suites provides server and, optionally, mutual authentication and data authenticity, but not data confidentiality. Cipher suites with these properties are not of general applicability, but there are use cases, specifically in Internet of Things (IoT) and constrained environments, that do not require confidentiality of exchanged messages while still requiring integrity protection, server authentication, and optional client authentication. This document gives examples of such use cases, with the caveat that prior to using these integrity-only cipher suites, a threat model for the situation at hand is needed, and a threat analysis must be performed within that model to determine whether the use of integrity-only cipher suites is appropriate. The approach described in this document is not endorsed by the IETF and does not have IETF consensus, but it is presented here to enable interoperable implementation of a reduced- security mechanism that provides authentication and message integrity without supporting confidentiality.
 
RFC 9151 Commercial National Security Algorithm (CNSA) Suite Profile for TLS and DTLS 1.2 and 1.3
 
Authors:D. Cooley.
Date:April 2022
Formats:txt html xml pdf json
Status:INFORMATIONAL
DOI:10.17487/RFC 9151
This document defines a base profile for TLS protocol versions 1.2 and 1.3 as well as DTLS protocol versions 1.2 and 1.3 for use with the US Commercial National Security Algorithm (CNSA) Suite.

The profile applies to the capabilities, configuration, and operation of all components of US National Security Systems that use TLS orDTLS. It is also appropriate for all other US Government systems that process high-value information.

The profile is made publicly available here for use by developers and operators of these and any other system deployments.

 
RFC 9152 Secure Object Delivery Protocol (SODP) Server Interfaces: NSA's Profile for Delivery of Certificates, Certificate Revocation Lists (CRLs), and Symmetric Keys to Clients
 
Authors:M. Jenkins, S. Turner.
Date:April 2022
Formats:txt pdf xml json html
Status:INFORMATIONAL
DOI:10.17487/RFC 9152
This document specifies protocol interfaces profiled by the UnitedStates National Security Agency (NSA) for National Security System(NSS) servers that provide public key certificates, CertificateRevocation Lists (CRLs), and symmetric keys to NSS clients. Servers that support these interfaces are referred to as Secure ObjectDelivery Protocol (SODP) servers. The intended audience for this profile comprises developers of client devices that will obtain key management services from NSA-operated SODP servers. Interfaces supported by SODP servers include Enrollment over Secure Transport(EST) and its extensions as well as Certificate Management over CMS(CMC).

This profile applies to the capabilities, configuration, and operation of all components of US National Security Systems (SP800-59). It is also appropriate for other US Government systems that process high-value information. It is made publicly available for use by developers and operators of these and any other system deployments.

 
RFC 9153 Drone Remote Identification Protocol (DRIP) Requirements and Terminology
 
Authors:S. Card, Ed., A. Wiethuechter, R. Moskowitz, A. Gurtov.
Date:February 2022
Formats:txt json pdf xml html
Status:INFORMATIONAL
DOI:10.17487/RFC 9153
This document defines terminology and requirements for solutions produced by the Drone Remote Identification Protocol (DRIP) WorkingGroup. These solutions will support Unmanned Aircraft System RemoteIdentification and tracking (UAS RID) for security, safety, and other purposes (e.g., initiation of identity-based network sessions supporting UAS applications). DRIP will facilitate use of existingInternet resources to support RID and to enable enhanced related services, and it will enable online and offline verification that RID information is trustworthy.
 
RFC 9154 Extensible Provisioning Protocol (EPP) Secure Authorization Information for Transfer
 
Authors:J. Gould, R. Wilhelm.
Date:December 2021
Formats:txt pdf xml html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9154
The Extensible Provisioning Protocol (EPP) (RFC 5730) defines the use of authorization information to authorize a transfer of an EPP object, such as a domain name, between clients that are referred to as "registrars". Object-specific, password-based authorization information (see RFCs 5731 and 5733) is commonly used but raises issues related to the security, complexity, storage, and lifetime of authentication information. This document defines an operational practice, using the EPP RFCs, that leverages the use of strong random authorization information values that are short lived, not stored by the client, and stored by the server using a cryptographic hash that provides for secure authorization information that can safely be used for object transfers.
 
RFC 9155 Deprecating MD5 and SHA-1 Signature Hashes in TLS 1.2 and DTLS 1.2
 
Authors:L. Velvindron, K. Moriarty, A. Ghedini.
Date:December 2021
Formats:txt html pdf xml json
Updates:RFC 5246
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9155
The MD5 and SHA-1 hashing algorithms are increasingly vulnerable to attack, and this document deprecates their use in TLS 1.2 and DTLS1.2 digital signatures. However, this document does not deprecateSHA-1 with Hashed Message Authentication Code (HMAC), as used in record protection. This document updates RFC 5246.
 
RFC 9156 DNS Query Name Minimisation to Improve Privacy
 
Authors:S. Bortzmeyer, R. Dolmans, P. Hoffman.
Date:November 2021
Formats:txt json xml pdf html
Obsoletes:RFC 7816
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9156
This document describes a technique called "QNAME minimisation" to improve DNS privacy, where the DNS resolver no longer always sends the full original QNAME and original QTYPE to the upstream name server. This document obsoletes RFC 7816.
 
RFC 9157 Revised IANA Considerations for DNSSEC
 
Authors:P. Hoffman.
Date:December 2021
Formats:txt json xml html pdf
Updates:RFC 5155, RFC 6014, RFC 8624
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9157
This document changes the review requirements needed to get DNSSEC algorithms and resource records added to IANA registries. It updatesRFC 6014 to include hash algorithms for Delegation Signer (DS) records and NextSECure version 3 (NSEC3) parameters (for HashedAuthenticated Denial of Existence). It also updates RFCs 5155 and6014, which have requirements for DNSSEC algorithms, and updates RFC8624 to clarify the implementation recommendation related to the algorithms described in RFCs that are not on the standards track.The rationale for these changes is to bring the requirements for DS records and hash algorithms used in NSEC3 in line with the requirements for all other DNSSEC algorithms.
 
RFC 9158 Update to the Object Identifier Registry for the PKIX Working Group
 
Authors:R. Housley.
Date:November 2021
Formats:txt html xml json pdf
Updates:RFC 7299
Status:INFORMATIONAL
DOI:10.17487/RFC 9158
RFC 7299 describes the object identifiers that were assigned by thePublic Key Infrastructure using X.509 (PKIX) Working Group in an arc that was allocated by IANA (1.3.6.1.5.5.7). A small number of object identifiers that were assigned in RFC 4212 are omitted from RFC 7299, and this document updates RFC 7299 to correct that oversight.
 
RFC 9159 IPv6 Mesh over BLUETOOTH(R) Low Energy Using the Internet Protocol Support Profile (IPSP)
 
Authors:C. Gomez, S.M. Darroudi, T. Savolainen, M. Spoerk.
Date:December 2021
Formats:txt html xml json pdf
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9159
RFC 7668 describes the adaptation of IPv6 over Low-Power WirelessPersonal Area Network (6LoWPAN) techniques to enable IPv6 overBluetooth Low Energy (Bluetooth LE) networks that follow the star topology. However, recent Bluetooth specifications allow the formation of extended topologies as well. This document specifies mechanisms that are needed to enable IPv6 mesh over Bluetooth LE links established by using the Bluetooth Internet Protocol SupportProfile (IPSP). This document does not specify the routing protocol to be used in an IPv6 mesh over Bluetooth LE links.
 
RFC 9160 Export of MPLS Segment Routing Label Type Information in IP Flow Information Export (IPFIX)
 
Authors:T. Graf.
Date:December 2021
Formats:txt html pdf xml json
Status:INFORMATIONAL
DOI:10.17487/RFC 9160
This document introduces new IP Flow Information Export (IPFIX) code points to identify which traffic is being forwarded based on whichMPLS control plane protocol is used within a Segment Routing domain.In particular, this document defines five code points for the IPFIX mplsTopLabelType Information Element for Path Computation Element(PCE), IS-IS, OSPFv2, OSPFv3, and BGP MPLS Segment Routing extensions.
 
RFC 9161 Operational Aspects of Proxy ARP/ND in Ethernet Virtual Private Networks
 
Authors:J. Rabadan, Ed., S. Sathappan, K. Nagaraj, G. Hankins, T. King.
Date:January 2022
Formats:txt pdf xml html json
Updates:RFC 7432
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9161
This document describes the Ethernet Virtual Private Network (EVPN)Proxy ARP/ND function augmented by the capability of the ARP/NDExtended Community. From that perspective, this document updates theEVPN specification to provide more comprehensive documentation of the operation of the Proxy ARP/ND function. The EVPN Proxy ARP/ND function and the ARP/ND Extended Community help operators of InternetExchange Points, Data Centers, and other networks deal with IPv4 andIPv6 address resolution issues associated with large BroadcastDomains by reducing and even suppressing the flooding produced by address resolution in the EVPN network.
 
RFC 9162 Certificate Transparency Version 2.0
 
Authors:B. Laurie, E. Messeri, R. Stradling.
Date:December 2021
Formats:txt json html xml pdf
Obsoletes:RFC 6962
Status:EXPERIMENTAL
DOI:10.17487/RFC 9162
This document describes version 2.0 of the Certificate Transparency(CT) protocol for publicly logging the existence of Transport LayerSecurity (TLS) server certificates as they are issued or observed, in a manner that allows anyone to audit certification authority (CA) activity and notice the issuance of suspect certificates as well as to audit the certificate logs themselves. The intent is that eventually clients would refuse to honor certificates that do not appear in a log, effectively forcing CAs to add all issued certificates to the logs.

This document obsoletes RFC 6962. It also specifies a new TLS extension that is used to send various CT log artifacts.

Logs are network services that implement the protocol operations for submissions and queries that are defined in this document.

 
RFC 9163 Expect-CT Extension for HTTP
 
Authors:E. Stark.
Date:June 2022
Formats:txt json xml html pdf
Status:EXPERIMENTAL
DOI:10.17487/RFC 9163
This document defines a new HTTP header field named "Expect-CT", which allows web host operators to instruct user agents (UAs) to expect valid Signed Certificate Timestamps (SCTs) to be served on connections to these hosts. Expect-CT allows web host operators to discover misconfigurations in their Certificate Transparency (CT) deployments. Further, web host operators can use Expect-CT to ensure that if a UA that supports Expect-CT accepts a misissued certificate, that certificate will be discoverable in Certificate Transparency logs.
 
RFC 9164 Concise Binary Object Representation (CBOR) Tags for IPv4 and IPv6 Addresses and Prefixes
 
Authors:M. Richardson, C. Bormann.
Date:December 2021
Formats:txt html xml pdf json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9164
This specification defines two Concise Binary Object Representation(CBOR) tags for use with IPv6 and IPv4 addresses and prefixes.
 
RFC 9165 Additional Control Operators for the Concise Data Definition Language (CDDL)
 
Authors:C. Bormann.
Date:December 2021
Formats:txt html json xml pdf
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9165
The Concise Data Definition Language (CDDL), standardized in RFC8610, provides "control operators" as its main language extension point.

The present document defines a number of control operators that were not yet ready at the time RFC 8610 was completed: .plus, .cat, and.det for the construction of constants; .abnf/.abnfb for includingABNF (RFC 5234 and RFC 7405) in CDDL specifications; and .feature for indicating the use of a non-basic feature in an instance.

 
RFC 9166 A YANG Data Model for Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Snooping
 
Authors:H. Zhao, X. Liu, Y. Liu, A. Peter, M. Sivakumar.
Date:February 2022
Formats:txt pdf json xml html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9166
This document defines a YANG data model that can be used to configure and manage Internet Group Management Protocol (IGMP) and MulticastListener Discovery (MLD) snooping devices. The YANG module in this document conforms to the Network Management Datastore Architecture(NMDA).
 
RFC 9167 Registry Maintenance Notification for the Extensible Provisioning Protocol (EPP)
 
Authors:T. Sattler, R. Carney, J. Kolker.
Date:December 2021
Formats:txt pdf json xml html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9167
This document describes an Extensible Provisioning Protocol (EPP) extension called "Registry Maintenance Notification", which is used by EPP servers to notify EPP clients and allow EPP clients to queryEPP servers regarding maintenance events.
 
RFC 9168 Path Computation Element Communication Protocol (PCEP) Extension for Flow Specification
 
Authors:D. Dhody, A. Farrel, Z. Li.
Date:January 2022
Formats:txt pdf xml html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9168
The Path Computation Element (PCE) is a functional component capable of selecting paths through a traffic engineering (TE) network. These paths may be supplied in response to requests for computation or may be unsolicited requests issued by the PCE to network elements. Both approaches use the PCE Communication Protocol (PCEP) to convey the details of the computed path.

Traffic flows may be categorized and described using "FlowSpecifications". RFC 8955 defines the Flow Specification and describes how Flow Specification components are used to describe traffic flows. RFC 8955 also defines how Flow Specifications may be distributed in BGP to allow specific traffic flows to be associated with routes.

This document specifies a set of extensions to PCEP to support dissemination of Flow Specifications. This allows a PCE to indicate what traffic should be placed on each path that it is aware of.

The extensions defined in this document include the creation, update, and withdrawal of Flow Specifications via PCEP and can be applied to tunnels initiated by the PCE or to tunnels where control is delegated to the PCE by the Path Computation Client (PCC). Furthermore, a PCC requesting a new path can include Flow Specifications in the request to indicate the purpose of the tunnel allowing the PCE to factor this into the path computation.

 
RFC 9169 New ASN.1 Modules for the Evidence Record Syntax (ERS)
 
Authors:R. Housley, C. Wallace.
Date:December 2021
Formats:txt html pdf xml json
Status:INFORMATIONAL
DOI:10.17487/RFC 9169
The Evidence Record Syntax (ERS) and the conventions for including these evidence records in the Server-based Certificate ValidationProtocol (SCVP) are expressed using ASN.1. This document offers alternative ASN.1 modules that conform to the 2002 version of ASN.1 and employ the conventions adopted in RFCs 5911, 5912, and 6268.There are no bits-on-the-wire changes to any of the formats; this is simply a change to the ASN.1 syntax.
 
RFC 9170 Long-Term Viability of Protocol Extension Mechanisms
 
Authors:M. Thomson, T. Pauly.
Date:December 2021
Formats:txt xml html pdf json
Status:INFORMATIONAL
DOI:10.17487/RFC 9170
The ability to change protocols depends on exercising the extension and version-negotiation mechanisms that support change. This document explores how regular use of new protocol features can ensure that it remains possible to deploy changes to a protocol. Examples are given where lack of use caused changes to be more difficult or costly.
 
RFC 9171 Bundle Protocol Version 7
 
Authors:S. Burleigh, K. Fall, E. Birrane, III.
Date:January 2022
Formats:txt html xml pdf json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9171
This document presents a specification for the Bundle Protocol, adapted from the experimental Bundle Protocol specification developed by the Delay-Tolerant Networking Research Group of the InternetResearch Task Force and documented in RFC 5050.
 
RFC 9172 Bundle Protocol Security (BPSec)
 
Authors:E. Birrane, III, K. McKeever.
Date:January 2022
Formats:txt json pdf xml html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9172
This document defines a security protocol providing data integrity and confidentiality services for the Bundle Protocol (BP).
 
RFC 9173 Default Security Contexts for Bundle Protocol Security (BPSec)
 
Authors:E. Birrane, III, A. White, S. Heiner.
Date:January 2022
Formats:txt json html pdf xml
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9173
This document defines default integrity and confidentiality security contexts that can be used with Bundle Protocol Security (BPSec) implementations. These security contexts are intended to be used both for testing the interoperability of BPSec implementations and for providing basic security operations when no other security contexts are defined or otherwise required for a network.
 
RFC 9174 Delay-Tolerant Networking TCP Convergence-Layer Protocol Version 4
 
Authors:B. Sipos, M. Demmer, J. Ott, S. Perreault.
Date:January 2022
Formats:txt html pdf json xml
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9174
This document describes a TCP convergence layer (TCPCL) for Delay-Tolerant Networking (DTN). This version of the TCPCL protocol resolves implementation issues in the earlier TCPCL version 3 as defined in RFC 7242 and provides updates to the Bundle Protocol (BP) contents, encodings, and convergence-layer requirements in BP version7 (BPv7). Specifically, TCPCLv4 uses BPv7 bundles encoded by theConcise Binary Object Representation (CBOR) as its service data unit being transported and provides a reliable transport of such bundles.This TCPCL version also includes security and extensibility mechanisms.
 
RFC 9175 Constrained Application Protocol (CoAP): Echo, Request-Tag, and Token Processing
 
Authors:C. Amsüss, J. Preuß Mattsson, G. Selander.
Date:February 2022
Formats:txt html pdf json xml
Updates:RFC 7252
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9175
This document specifies enhancements to the Constrained ApplicationProtocol (CoAP) that mitigate security issues in particular use cases. The Echo option enables a CoAP server to verify the freshness of a request or to force a client to demonstrate reachability at its claimed network address. The Request-Tag option allows the CoAP server to match block-wise message fragments belonging to the same request. This document updates RFC 7252 with respect to the following: processing requirements for client Tokens, forbidding non- secure reuse of Tokens to ensure response-to-request binding whenCoAP is used with a security protocol, and amplification mitigation(where the use of the Echo option is now recommended).
 
RFC 9176 Constrained RESTful Environments (CoRE) Resource Directory
 
Authors:C. Amsüss, Ed., Z. Shelby, M. Koster, C. Bormann, P. van der Stok.
Date:April 2022
Formats:txt json xml pdf html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9176
In many Internet of Things (IoT) applications, direct discovery of resources is not practical due to sleeping nodes or networks where multicast traffic is inefficient. These problems can be solved by employing an entity called a Resource Directory (RD), which contains information about resources held on other servers, allowing lookups to be performed for those resources. The input to an RD is composed of links, and the output is composed of links constructed from the information stored in the RD. This document specifies the web interfaces that an RD supports for web servers to discover the RD and to register, maintain, look up, and remove information on resources.Furthermore, new target attributes useful in conjunction with an RD are defined.
 
RFC 9177 Constrained Application Protocol (CoAP) Block-Wise Transfer Options Supporting Robust Transmission
 
Authors:M. Boucadair, J. Shallow.
Date:March 2022
Formats:txt xml pdf json html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9177
This document specifies alternative Constrained Application Protocol(CoAP) block-wise transfer options: Q-Block1 and Q-Block2.

These options are similar to, but distinct from, the CoAP Block1 andBlock2 options defined in RFC 7959. The Q-Block1 and Q-Block2 options are not intended to replace the Block1 and Block2 options but rather have the goal of supporting Non-confirmable (NON) messages for large amounts of data with fewer packet interchanges. Also, theQ-Block1 and Q-Block2 options support faster recovery should any of the blocks get lost in transmission.

 
RFC 9178 Building Power-Efficient Constrained Application Protocol (CoAP) Devices for Cellular Networks
 
Authors:J. Arkko, A. Eriksson, A. Keränen.
Date:May 2022
Formats:txt html xml pdf json
Status:INFORMATIONAL
DOI:10.17487/RFC 9178
This memo discusses the use of the Constrained Application Protocol(CoAP) in building sensors and other devices that employ cellular networks as a communications medium. Building communicating devices that employ these networks is obviously well known, but this memo focuses specifically on techniques necessary to minimize power consumption.
 
RFC 9179 A YANG Grouping for Geographic Locations
 
Authors:C. Hopps.
Date:February 2022
Formats:txt xml pdf html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9179
This document defines a generic geographical location YANG grouping.The geographical location grouping is intended to be used in YANG data models for specifying a location on or in reference to Earth or any other astronomical object.
 
RFC 9180 Hybrid Public Key Encryption
 
Authors:R. Barnes, K. Bhargavan, B. Lipp, C. Wood.
Date:February 2022
Formats:txt html xml json pdf
Status:INFORMATIONAL
DOI:10.17487/RFC 9180
This document describes a scheme for hybrid public key encryption(HPKE). This scheme provides a variant of public key encryption of arbitrary-sized plaintexts for a recipient public key. It also includes three authenticated variants, including one that authenticates possession of a pre-shared key and two optional ones that authenticate possession of a key encapsulation mechanism (KEM) private key. HPKE works for any combination of an asymmetric KEM, key derivation function (KDF), and authenticated encryption with additional data (AEAD) encryption function. Some authenticated variants may not be supported by all KEMs. We provide instantiations of the scheme using widely used and efficient primitives, such asElliptic Curve Diffie-Hellman (ECDH) key agreement, HMAC-based key derivation function (HKDF), and SHA2.

This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.

 
RFC 9181 A Common YANG Data Model for Layer 2 and Layer 3 VPNs
 
Authors:S. Barguil, O. Gonzalez de Dios, Ed., M. Boucadair, Ed., Q. Wu.
Date:February 2022
Formats:txt html xml json pdf
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9181
This document defines a common YANG module that is meant to be reused by various VPN-related modules such as Layer 3 VPN and Layer 2 VPN network models.
 
RFC 9182 A YANG Network Data Model for Layer 3 VPNs
 
Authors:S. Barguil, O. Gonzalez de Dios, Ed., M. Boucadair, Ed., L. Munoz, A. Aguado.
Date:February 2022
Formats:txt pdf xml json html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9182
As a complement to the Layer 3 Virtual Private Network Service Model(L3SM), which is used for communication between customers and service providers, this document defines an L3VPN Network Model (L3NM) that can be used for the provisioning of Layer 3 Virtual Private Network(L3VPN) services within a service provider network. The model provides a network-centric view of L3VPN services.

The L3NM is meant to be used by a network controller to derive the configuration information that will be sent to relevant network devices. The model can also facilitate communication between a service orchestrator and a network controller/orchestrator.

 
RFC 9183 Single Nickname for an Area Border RBridge in Multilevel Transparent Interconnection of Lots of Links (TRILL)
 
Authors:M. Zhang, D. Eastlake 3rd, R. Perlman, M. Cullen, H. Zhai.
Date:February 2022
Formats:txt json pdf xml html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9183
A major issue in multilevel TRILL is how to manage RBridge nicknames.In this document, area border RBridges use a single nickname in bothLevel 1 and Level 2. RBridges in Level 2 must obtain unique nicknames but RBridges in different Level 1 areas may have the same nicknames.
 
RFC 9184 BGP Extended Community Registries Update
 
Authors:C. Loibl.
Date:January 2022
Formats:txt pdf html xml json
Updates:RFC 7153, RFC 8955
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9184
This document updates several BGP Extended Community registries in order to replace the "Experimental Use" registration procedure in some entries, since their use is clearly not experimental and is thus misleading.

This document updates RFCs 7153 and 8955.

 
RFC 9185 DTLS Tunnel between a Media Distributor and Key Distributor to Facilitate Key Exchange
 
Authors:P. Jones, P. Ellenbogen, N. Ohlmeier.
Date:April 2022
Formats:txt pdf xml html json
Status:INFORMATIONAL
DOI:10.17487/RFC 9185
This document defines a protocol for tunneling DTLS traffic in multimedia conferences that enables a Media Distributor to facilitate key exchange between an endpoint in a conference and the KeyDistributor. The protocol is designed to ensure that the keying material used for hop-by-hop encryption and authentication is accessible to the Media Distributor, while the keying material used for end-to-end encryption and authentication is inaccessible to theMedia Distributor.
 
RFC 9186 Fast Failover in Protocol Independent Multicast - Sparse Mode (PIM-SM) Using Bidirectional Forwarding Detection (BFD) for Multipoint Networks
 
Authors:G. Mirsky, X. Ji.
Date:January 2022
Formats:txt json html xml pdf
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9186
This document specifies how Bidirectional Forwarding Detection (BFD) for multipoint networks can provide sub-second failover for routers that participate in Protocol Independent Multicast - Sparse Mode(PIM-SM). An extension to the PIM Hello message used to bootstrap a point-to-multipoint BFD session is also defined in this document.
 
RFC 9187 Sequence Number Extension for Windowed Protocols
 
Authors:J. Touch.
Date:January 2022
Formats:txt json xml pdf html
Status:INFORMATIONAL
DOI:10.17487/RFC 9187
Sliding window protocols use finite sequence numbers to determine segment placement and order. These sequence number spaces wrap around and are reused during the operation of such protocols. This document describes a way to extend the size of these sequence numbers at the endpoints to avoid the impact of that wrap and reuse without transmitting additional information in the packet header. The resulting extended sequence numbers can be used at the endpoints in encryption and authentication algorithms to ensure input bit patterns do not repeat over the lifetime of a connection.
 
RFC 9188 Generic Multi-Access (GMA) Encapsulation Protocol
 
Authors:J. Zhu, S. Kanugovi.
Date:February 2022
Formats:txt html json xml pdf
Status:EXPERIMENTAL
DOI:10.17487/RFC 9188
A device can be simultaneously connected to multiple networks, e.g.,Wi-Fi, LTE, 5G, and DSL. It is desirable to seamlessly combine the connectivity over these networks below the transport layer (L4) to improve the quality of experience for applications that do not have built-in multi-path capabilities. Such optimization requires additional control information, e.g., a sequence number, in each packet. This document presents a new lightweight and flexible encapsulation protocol for this need. The solution has been developed by the authors based on their experiences in multiple standards bodies including the IETF and 3GPP. However, this document is not an Internet Standard and does not represent the consensus opinion of the IETF. This document will enable other developers to build interoperable implementations in order to experiment with the protocol.
 
RFC 9189 GOST Cipher Suites for Transport Layer Security (TLS) Protocol Version 1.2
 
Authors:S. Smyshlyaev, Ed., D. Belyavsky, E. Alekseev.
Date:March 2022
Formats:txt html xml pdf json
Status:INFORMATIONAL
DOI:10.17487/RFC 9189
This document specifies three new cipher suites, two new signature algorithms, seven new supported groups, and two new certificate types for the Transport Layer Security (TLS) protocol version 1.2 to support the Russian cryptographic standard algorithms (called "GOST" algorithms). This document specifies a profile of TLS 1.2 with GOST algorithms so that implementers can produce interoperable implementations.

This specification facilitates implementations that aim to support the GOST algorithms. This document does not imply IETF endorsement of the cipher suites, signature algorithms, supported groups, and certificate types.

 
RFC 9190 EAP-TLS 1.3: Using the Extensible Authentication Protocol with TLS 1.3
 
Authors:J. Preuß Mattsson, M. Sethi.
Date:February 2022
Formats:txt html json pdf xml
Updates:RFC 5216
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9190
The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. This document specifies the use of EAP-TLS with TLS 1.3 while remaining backwards compatible with existing implementations ofEAP-TLS. TLS 1.3 provides significantly improved security and privacy, and reduced latency when compared to earlier versions ofTLS. EAP-TLS with TLS 1.3 (EAP-TLS 1.3) further improves security and privacy by always providing forward secrecy, never disclosing the peer identity, and by mandating use of revocation checking when compared to EAP-TLS with earlier versions of TLS. This document also provides guidance on authentication, authorization, and resumption for EAP-TLS in general (regardless of the underlying TLS version used). This document updates RFC 5216.
 
RFC 9191 Handling Large Certificates and Long Certificate Chains in TLS-Based EAP Methods
 
Authors:M. Sethi, J. Preuß Mattsson, S. Turner.
Date:February 2022
Formats:txt html pdf xml json
Status:INFORMATIONAL
DOI:10.17487/RFC 9191
The Extensible Authentication Protocol (EAP), defined in RFC 3748, provides a standard mechanism for support of multiple authentication methods. EAP-TLS and other TLS-based EAP methods are widely deployed and used for network access authentication. Large certificates and long certificate chains combined with authenticators that drop an EAP session after only 40 - 50 round trips is a major deployment problem.This document looks at this problem in detail and describes the potential solutions available.
 
RFC 9192 Network Service Header (NSH) Fixed-Length Context Header Allocation
 
Authors:T. Mizrahi, I. Yerushalmi, D. Melman, R. Browne.
Date:February 2022
Formats:txt xml json pdf html
Status:INFORMATIONAL
DOI:10.17487/RFC 9192
The Network Service Header (NSH) specification defines two possible methods of including metadata (MD): MD Type 0x1 and MD Type 0x2. MDType 0x1 uses a fixed-length Context Header. The allocation of thisContext Header, i.e., its structure and semantics, has not been standardized. This memo defines the Timestamp Context Header, which is an NSH fixed-length Context Header that incorporates the packet's timestamp, a sequence number, and a source interface identifier.

Although the definition of the Context Header presented in this document has not been standardized by the IETF, it has been implemented in silicon by several manufacturers and is published here to facilitate interoperability.

 
RFC 9193 Sensor Measurement Lists (SenML) Fields for Indicating Data Value Content-Format
 
Authors:A. Keränen, C. Bormann.
Date:June 2022
Formats:txt xml json pdf html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9193
The Sensor Measurement Lists (SenML) media types support multiple types of values, from numbers to text strings and arbitrary binaryData Values. In order to facilitate processing of binary DataValues, this document specifies a pair of new SenML fields for indicating the content format of those binary Data Values, i.e., their Internet media type, including parameters as well as any content codings applied.
 
RFC 9194 A YANG Module for IS-IS Reverse Metric
 
Authors:C. Hopps.
Date:October 2022
Formats:txt xml pdf html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9194
This document defines a YANG module for managing the reverse metric extension to the Intermediate System to Intermediate System (IS-IS) intra-domain routing information exchange protocol.
 
RFC 9195 A File Format for YANG Instance Data
 
Authors:B. Lengyel, B. Claise.
Date:February 2022
Formats:txt html xml pdf json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9195
There is a need to document data defined in YANG models at design time, implementation time, or when a live server is unavailable.This document specifies a standard file format for YANG instance data, which follows the syntax and semantics of existing YANG models and annotates it with metadata.
 
RFC 9196 YANG Modules Describing Capabilities for Systems and Datastore Update Notifications
 
Authors:B. Lengyel, A. Clemm, B. Claise.
Date:February 2022
Formats:txt json pdf xml html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9196
This document defines two YANG modules, "ietf-system-capabilities" and "ietf-notification-capabilities".

The module "ietf-system-capabilities" provides a placeholder structure that can be used to discover YANG-related system capabilities for servers. The module can be used to report capability information from the server at runtime or at implementation time by making use of the YANG instance data file format.

The module "ietf-notification-capabilities" augments "ietf-system- capabilities" to specify capabilities related to "Subscription toYANG Notifications for Datastore Updates" (RFC 8641).

 
RFC 9197 Data Fields for In Situ Operations, Administration, and Maintenance (IOAM)
 
Authors:F. Brockners, Ed., S. Bhandari, Ed., T. Mizrahi, Ed..
Date:May 2022
Formats:txt json pdf html xml
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9197
In situ Operations, Administration, and Maintenance (IOAM) collects operational and telemetry information in the packet while the packet traverses a path between two points in the network. This document discusses the data fields and associated data types for IOAM. IOAM-Data-Fields can be encapsulated into a variety of protocols, such asNetwork Service Header (NSH), Segment Routing, Generic NetworkVirtualization Encapsulation (Geneve), or IPv6. IOAM can be used to complement OAM mechanisms based on, e.g., ICMP or other types of probe packets.
 
RFC 9198 Advanced Unidirectional Route Assessment (AURA)
 
Authors:J. Alvarez-Hamelin, A. Morton, J. Fabini, C. Pignataro, R. Geib.
Date:May 2022
Formats:txt html pdf json xml
Updates:RFC 2330
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9198
This memo introduces an advanced unidirectional route assessment(AURA) metric and associated measurement methodology based on the IPPerformance Metrics (IPPM) framework (RFC 2330). This memo updatesRFC 2330 in the areas of path-related terminology and path description, primarily to include the possibility of parallel subpaths between a given Source and Destination pair, owing to the presence of multipath technologies.
 
RFC 9199 Considerations for Large Authoritative DNS Server Operators
 
Authors:G. Moura, W. Hardaker, J. Heidemann, M. Davids.
Date:March 2022
Formats:txt html pdf xml json
Status:INFORMATIONAL
DOI:10.17487/RFC 9199
Recent research work has explored the deployment characteristics and configuration of the Domain Name System (DNS). This document summarizes the conclusions from these research efforts and offers specific, tangible considerations or advice to authoritative DNS server operators. Authoritative server operators may wish to follow these considerations to improve their DNS services.

It is possible that the results presented in this document could be applicable in a wider context than just the DNS protocol, as some of the results may generically apply to any stateless/short-duration anycasted service.

This document is not an IETF consensus document: it is published for informational purposes.