Internet Documents

RFCs 8900 - 8999s

RFCs All DocumentsSTDs Internet Standards DocumentsBCPs Best Current Practice DocumentsFYIs Informational Documents
 

PROPOSEDDRAFTSTANDARDEXPMTLBCPINFOHISTORICUPDATEDOBSOLETEDUNKNOWN

 
RFC 8900 IP Fragmentation Considered Fragile
 
Authors:R. Bonica, F. Baker, G. Huston, R. Hinden, O. Troan, F. Gont.
Date:September 2020
Formats:txt html pdf json xml
Also:BCP 0230
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 8900
This document describes IP fragmentation and explains how it introduces fragility to Internet communication.

This document also proposes alternatives to IP fragmentation and provides recommendations for developers and network operators.

 
RFC 8901 Multi-Signer DNSSEC Models
 
Authors:S. Huque, P. Aras, J. Dickinson, J. Vcelak, D. Blacka.
Date:September 2020
Formats:txt html pdf json xml
Status:INFORMATIONAL
DOI:10.17487/RFC 8901
Many enterprises today employ the service of multiple DNS providers to distribute their authoritative DNS service. Deploying DNSSEC in such an environment may present some challenges, depending on the configuration and feature set in use. In particular, when each DNS provider independently signs zone data with their own keys, additional key-management mechanisms are necessary. This document presents deployment models that accommodate this scenario and describes these key-management requirements. These models do not require any changes to the behavior of validating resolvers, nor do they impose the new key-management requirements on authoritative servers not involved in multi-signer configurations.
 
RFC 8902 TLS Authentication Using Intelligent Transport System (ITS) Certificates
 
Authors:M. Msahli, Ed., N. Cam-Winget, Ed., W. Whyte, Ed., A. Serhrouchni, H. Labiod.
Date:September 2020
Formats:txt json xml pdf html
Status:EXPERIMENTAL
DOI:10.17487/RFC 8902
The IEEE and ETSI have specified a type of end-entity certificate.This document defines an experimental change to TLS to support IEEE/ETSI certificate types to authenticate TLS entities.
 
RFC 8903 Use Cases for DDoS Open Threat Signaling
 
Authors:R. Dobbins, D. Migault, R. Moskowitz, N. Teague, L. Xia, K. Nishizuka.
Date:May 2021
Formats:txt xml pdf json html
Status:INFORMATIONAL
DOI:10.17487/RFC 8903
The DDoS Open Threat Signaling (DOTS) effort is intended to provide protocols to facilitate interoperability across disparate DDoSMitigation solutions. This document presents sample use cases that describe the interactions expected between the DOTS components as well as DOTS messaging exchanges. These use cases are meant to identify the interacting DOTS components, how they collaborate, and what the typical information to be exchanged is.
 
RFC 8904 DNS Whitelist (DNSWL) Email Authentication Method Extension
 
Authors:A. Vesely.
Date:September 2020
Formats:txt xml html pdf json
Status:INFORMATIONAL
DOI:10.17487/RFC 8904
This document describes an email authentication method compliant withRFC 8601. The method consists of looking up the sender's IP address in a DNS whitelist. This document provides information in case the method is seen in the field, suggests a useful practice, and registers the relevant keywords.

This document does not consider blacklists.

 
RFC 8905 The 'payto' URI Scheme for Payments
 
Authors:F. Dold, C. Grothoff.
Date:October 2020
Formats:txt html xml pdf json
Status:INFORMATIONAL
DOI:10.17487/RFC 8905
This document defines the 'payto' Uniform Resource Identifier (URI) scheme for designating targets for payments.

A unified URI scheme for all payment target types allows applications to offer user interactions with URIs that represent payment targets, simplifying the introduction of new payment systems and applications.

 
RFC 8906 A Common Operational Problem in DNS Servers: Failure to Communicate
 
Authors:M. Andrews, R. Bellis.
Date:September 2020
Formats:txt json pdf xml html
Also:BCP 0231
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 8906
The DNS is a query/response protocol. Failing to respond to queries, or responding incorrectly, causes both immediate operational problems and long-term problems with protocol development.

This document identifies a number of common kinds of queries to which some servers either fail to respond or respond incorrectly. This document also suggests procedures for zone operators to apply to identify and remediate the problem.

The document does not look at the DNS data itself, just the structure of the responses.

 
RFC 8907 The Terminal Access Controller Access-Control System Plus (TACACS+) Protocol
 
Authors:T. Dahm, A. Ota, D.C. Medway Gash, D. Carrel, L. Grant.
Date:September 2020
Formats:txt json html pdf xml
Status:INFORMATIONAL
DOI:10.17487/RFC 8907
This document describes the Terminal Access Controller Access-ControlSystem Plus (TACACS+) protocol, which is widely deployed today to provide Device Administration for routers, network access servers, and other networked computing devices via one or more centralized servers.
 
RFC 8908 Captive Portal API
 
Authors:T. Pauly, Ed., D. Thakore, Ed..
Date:September 2020
Formats:txt html pdf xml json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8908
This document describes an HTTP API that allows clients to interact with a Captive Portal system. With this API, clients can discover how to get out of captivity and fetch state about their CaptivePortal sessions.
 
RFC 8909 Registry Data Escrow Specification
 
Authors:G. Lozano.
Date:November 2020
Formats:txt html json pdf xml
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8909
This document specifies the format and contents of data escrow deposits targeted primarily for domain name registries. The specification is designed to be independent of the underlying objects that are being escrowed, and therefore it could also be used for purposes other than domain name registries.
 
RFC 8910 Captive-Portal Identification in DHCP and Router Advertisements (RAs)
 
Authors:W. Kumari, E. Kline.
Date:September 2020
Formats:txt html xml pdf json
Obsoletes:RFC 7710
Updates:RFC 3679
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8910
In many environments offering short-term or temporary Internet access(such as coffee shops), it is common to start new connections in a captive portal mode. This highly restricts what the user can do until the user has satisfied the captive portal conditions.

This document describes a DHCPv4 and DHCPv6 option and a RouterAdvertisement (RA) option to inform clients that they are behind some sort of captive portal enforcement device, and that they will need to satisfy the Captive Portal conditions to get Internet access. It is not a full solution to address all of the issues that clients may have with captive portals; it is designed to be one component of a standardized approach for hosts to interact with such portals. While this document defines how the network operator may convey the captive portal API endpoint to hosts, the specific methods of satisfying and interacting with the captive portal are out of scope of this document.

This document replaces RFC 7710, which used DHCP code point 160. Due to a conflict, this document specifies 114. Consequently, this document also updates RFC 3679.

 
RFC 8911 Registry for Performance Metrics
 
Authors:M. Bagnulo, B. Claise, P. Eardley, A. Morton, A. Akhter.
Date:November 2021
Formats:txt html json xml pdf
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8911
This document defines the format for the IANA Registry of PerformanceMetrics. This document also gives a set of guidelines for RegisteredPerformance Metric requesters and reviewers.
 
RFC 8912 Initial Performance Metrics Registry Entries
 
Authors:A. Morton, M. Bagnulo, P. Eardley, K. D'Souza.
Date:November 2021
Formats:txt json pdf xml html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8912
This memo defines the set of initial entries for the IANA Registry ofPerformance Metrics. The set includes UDP Round-Trip Latency andLoss, Packet Delay Variation, DNS Response Latency and Loss, UDPPoisson One-Way Delay and Loss, UDP Periodic One-Way Delay and Loss,ICMP Round-Trip Latency and Loss, and TCP Round-Trip Delay and Loss.
 
RFC 8913 Two-Way Active Measurement Protocol (TWAMP) YANG Data Model
 
Authors:R. Civil, A. Morton, R. Rahman, M. Jethanandani, K. Pentikousis, Ed..
Date:November 2021
Formats:txt pdf json xml html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8913
This document specifies a data model for client and server implementations of the Two-Way Active Measurement Protocol (TWAMP).This document defines the TWAMP data model through Unified ModelingLanguage (UML) class diagrams and formally specifies it using theYANG data modeling language (RFC 7950). The data model is compliant with the Network Management Datastore Architecture (NMDA).
 
RFC 8914 Extended DNS Errors
 
Authors:W. Kumari, E. Hunt, R. Arends, W. Hardaker, D. Lawrence.
Date:October 2020
Formats:txt html pdf xml json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8914
This document defines an extensible method to return additional information about the cause of DNS errors. Though created primarily to extend SERVFAIL to provide additional information about the cause of DNS and DNSSEC failures, the Extended DNS Errors option defined in this document allows all response types to contain extended error information. Extended DNS Error information does not change the processing of RCODEs.
 
RFC 8915 Network Time Security for the Network Time Protocol
 
Authors:D. Franke, D. Sibold, K. Teichel, M. Dansarie, R. Sundblad.
Date:September 2020
Formats:txt pdf xml html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8915
This memo specifies Network Time Security (NTS), a mechanism for using Transport Layer Security (TLS) and Authenticated Encryption with Associated Data (AEAD) to provide cryptographic security for the client-server mode of the Network Time Protocol (NTP).

NTS is structured as a suite of two loosely coupled sub-protocols.The first (NTS Key Establishment (NTS-KE)) handles initial authentication and key establishment over TLS. The second (NTSExtension Fields for NTPv4) handles encryption and authentication during NTP time synchronization via extension fields in the NTP packets, and holds all required state only on the client via opaque cookies.

 
RFC 8916 A YANG Data Model for the Multicast Source Discovery Protocol (MSDP)
 
Authors:X. Liu, Z. Zhang, Ed., A. Peter, M. Sivakumar, F. Guo, P. McAllister.
Date:October 2020
Formats:txt json xml html pdf
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8916
This document defines a YANG data model for the configuration and management of Multicast Source Discovery Protocol (MSDP) protocol operations.
 
RFC 8917 The LoST-Validation Straightforward-Naming Authority PoinTeR (S-NAPTR) Application Service Tag
 
Authors:R. Gellens, B. Rosen.
Date:October 2020
Formats:txt json xml html pdf
Updates:RFC 5222
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8917
This document adds the 'LoST-Validation' service tag to theStraightforward-Naming Authority PoinTeR (S-NAPTR) ApplicationService Tag IANA registry. This tag can appear in a Naming AuthorityPointer (NAPTR) Domain Name System (DNS) record to assist clients of the Location-to-Service Translation (LoST) Protocol in identifyingLoST servers designated for location validation. This tag and the information about its use update RFC 5222, which enables the explicit discovery of a server that supports location validation.
 
RFC 8918 Invalid TLV Handling in IS-IS
 
Authors:L. Ginsberg, P. Wells, T. Li, T. Przygienda, S. Hegde.
Date:September 2020
Formats:txt html xml json pdf
Updates:RFC 5305, RFC 6232
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8918
The key to the extensibility of the Intermediate System toIntermediate System (IS-IS) protocol has been the handling of unsupported and/or invalid Type-Length-Value (TLV) tuples. Although there are explicit statements in existing specifications, deployment experience has shown that there are inconsistencies in the behavior when a TLV that is disallowed in a particular Protocol Data Unit(PDU) is received.

This document discusses such cases and makes the correct behavior explicit in order to ensure that interoperability is maximized.

This document updates RFCs 5305 and 6232.

 
RFC 8919 IS-IS Application-Specific Link Attributes
 
Authors:L. Ginsberg, P. Psenak, S. Previdi, W. Henderickx, J. Drake.
Date:October 2020
Formats:txt html json xml pdf
Obsoleted by:RFC 9479
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8919
Existing traffic-engineering-related link attribute advertisements have been defined and are used in RSVP-TE deployments. Since the original RSVP-TE use case was defined, additional applications (e.g.,Segment Routing Policy and Loop-Free Alternates) that also make use of the link attribute advertisements have been defined. In cases where multiple applications wish to make use of these link attributes, the current advertisements do not support application- specific values for a given attribute, nor do they support indication of which applications are using the advertised value for a given link. This document introduces new link attribute advertisements that address both of these shortcomings.
 
RFC 8920 OSPF Application-Specific Link Attributes
 
Authors:P. Psenak, Ed., L. Ginsberg, W. Henderickx, J. Tantsura, J. Drake.
Date:October 2020
Formats:txt pdf xml html json
Obsoleted by:RFC 9492
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8920
Existing traffic-engineering-related link attribute advertisements have been defined and are used in RSVP-TE deployments. Since the original RSVP-TE use case was defined, additional applications (e.g.,Segment Routing Policy and Loop-Free Alternates) that also make use of the link attribute advertisements have been defined. In cases where multiple applications wish to make use of these link attributes, the current advertisements do not support application- specific values for a given attribute, nor do they support indication of which applications are using the advertised value for a given link. This document introduces new link attribute advertisements inOSPFv2 and OSPFv3 that address both of these shortcomings.
 
RFC 8921 Dynamic Service Negotiation: The Connectivity Provisioning Negotiation Protocol (CPNP)
 
Authors:M. Boucadair, Ed., C. Jacquenet, D. Zhang, P. Georgatsos.
Date:October 2020
Formats:txt html pdf xml json
Status:INFORMATIONAL
DOI:10.17487/RFC 8921
This document defines the Connectivity Provisioning NegotiationProtocol (CPNP), which is designed to facilitate the dynamic negotiation of service parameters.

CPNP is a generic protocol that can be used for various negotiation purposes that include (but are not necessarily limited to) connectivity provisioning services, storage facilities, ContentDelivery Networks, etc.

 
RFC 8922 A Survey of the Interaction between Security Protocols and Transport Services
 
Authors:T. Enghardt, T. Pauly, C. Perkins, K. Rose, C. Wood.
Date:October 2020
Formats:txt json xml pdf html
Status:INFORMATIONAL
DOI:10.17487/RFC 8922
This document provides a survey of commonly used or notable network security protocols, with a focus on how they interact and integrate with applications and transport protocols. Its goal is to supplement efforts to define and catalog Transport Services by describing the interfaces required to add security protocols. This survey is not limited to protocols developed within the scope or context of theIETF, and those included represent a superset of features a TransportServices system may need to support.
 
RFC 8923 A Minimal Set of Transport Services for End Systems
 
Authors:M. Welzl, S. Gjessing.
Date:October 2020
Formats:txt json html xml pdf
Status:INFORMATIONAL
DOI:10.17487/RFC 8923
This document recommends a minimal set of Transport Services offered by end systems and gives guidance on choosing among the available mechanisms and protocols. It is based on the set of transport features in RFC 8303.
 
RFC 8924 Service Function Chaining (SFC) Operations, Administration, and Maintenance (OAM) Framework
 
Authors:S. Aldrin, C. Pignataro, Ed., N. Kumar, Ed., R. Krishnan, A. Ghanwani.
Date:October 2020
Formats:txt html json xml pdf
Status:INFORMATIONAL
DOI:10.17487/RFC 8924
This document provides a reference framework for Operations,Administration, and Maintenance (OAM) for Service Function Chaining(SFC).
 
RFC 8925 IPv6-Only Preferred Option for DHCPv4
 
Authors:L. Colitti, J. Linkova, M. Richardson, T. Mrugalski.
Date:October 2020
Formats:txt html xml pdf json
Updates:RFC 2563
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8925
This document specifies a DHCPv4 option to indicate that a host supports an IPv6-only mode and is willing to forgo obtaining an IPv4 address if the network provides IPv6 connectivity. It also updatesRFC 2563 to specify DHCPv4 server behavior when the server receives aDHCPDISCOVER not containing the Auto-Configure option but containing the new option defined in this document.
 
RFC 8926 Geneve: Generic Network Virtualization Encapsulation
 
Authors:J. Gross, Ed., I. Ganga, Ed., T. Sridhar, Ed..
Date:November 2020
Formats:txt pdf xml json html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8926
Network virtualization involves the cooperation of devices with a wide variety of capabilities such as software and hardware tunnel endpoints, transit fabrics, and centralized control clusters. As a result of their role in tying together different elements of the system, the requirements on tunnels are influenced by all of these components. Therefore, flexibility is the most important aspect of a tunneling protocol if it is to keep pace with the evolution of technology. This document describes Geneve, an encapsulation protocol designed to recognize and accommodate these changing capabilities and needs.
 
RFC 8927 JSON Type Definition
 
Authors:U. Carion.
Date:November 2020
Formats:txt pdf json xml html
Status:EXPERIMENTAL
DOI:10.17487/RFC 8927
This document proposes a format, called JSON Type Definition (JTD), for describing the shape of JavaScript Object Notation (JSON) messages. Its main goals are to enable code generation from schemas as well as portable validation with standardized error indicators.To this end, JTD is intentionally limited to be no more expressive than the type systems of mainstream programming languages. This intentional limitation, as well as the decision to make JTD schemas be JSON documents, makes tooling atop of JTD easier to build.

This document does not have IETF consensus and is presented here to facilitate experimentation with the concept of JTD.

 
RFC 8928 Address-Protected Neighbor Discovery for Low-Power and Lossy Networks
 
Authors:P. Thubert, Ed., B. Sarikaya, M. Sethi, R. Struik.
Date:November 2020
Formats:txt pdf html xml json
Updates:RFC 8505
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8928
This document updates the IPv6 over Low-Power Wireless Personal AreaNetwork (6LoWPAN) Neighbor Discovery (ND) protocol defined in RFCs6775 and 8505. The new extension is called Address-ProtectedNeighbor Discovery (AP-ND), and it protects the owner of an address against address theft and impersonation attacks in a Low-Power andLossy Network (LLN). Nodes supporting this extension compute a cryptographic identifier (Crypto-ID), and use it with one or more of their Registered Addresses. The Crypto-ID identifies the owner of the Registered Address and can be used to provide proof of ownership of the Registered Addresses. Once an address is registered with theCrypto-ID and a proof of ownership is provided, only the owner of that address can modify the registration information, thereby enforcing Source Address Validation.
 
RFC 8929 IPv6 Backbone Router
 
Authors:P. Thubert, Ed., C.E. Perkins, E. Levy-Abegnoli.
Date:November 2020
Formats:txt pdf xml html json
Updates:RFC 6775, RFC 8505
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8929
This document updates RFCs 6775 and 8505 in order to enable proxy services for IPv6 Neighbor Discovery by Routing Registrars called"Backbone Routers". Backbone Routers are placed along the wireless edge of a backbone and federate multiple wireless links to form a single Multi-Link Subnet (MLSN).
 
RFC 8930 On Forwarding 6LoWPAN Fragments over a Multi-Hop IPv6 Network
 
Authors:T. Watteyne, Ed., P. Thubert, Ed., C. Bormann.
Date:November 2020
Formats:txt html xml pdf json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8930
This document provides generic rules to enable the forwarding of anIPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) fragment over a route-over network. Forwarding fragments can improve both end-to-end latency and reliability as well as reduce the buffer requirements in intermediate nodes; it may be implemented using RFC4944 and Virtual Reassembly Buffers (VRBs).
 
RFC 8931 IPv6 over Low-Power Wireless Personal Area Network (6LoWPAN) Selective Fragment Recovery
 
Authors:P. Thubert, Ed..
Date:November 2020
Formats:txt xml pdf html json
Updates:RFC 4944
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8931
This document updates RFC 4944 with a protocol that forwards individual fragments across a route-over mesh and recovers them end to end, with congestion control capabilities to protect the network.
 
RFC 8932 Recommendations for DNS Privacy Service Operators
 
Authors:S. Dickinson, B. Overeinder, R. van Rijswijk-Deij, A. Mankin.
Date:October 2020
Formats:txt json html pdf xml
Also:BCP 0232
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 8932
This document presents operational, policy, and security considerations for DNS recursive resolver operators who choose to offer DNS privacy services. With these recommendations, the operator can make deliberate decisions regarding which services to provide, as well as understanding how those decisions and the alternatives impact the privacy of users.

This document also presents a non-normative framework to assist writers of a Recursive operator Privacy Statement, analogous to DNSSecurity Extensions (DNSSEC) Policies and DNSSEC Practice Statements described in RFC 6841.

 
RFC 8933 Update to the Cryptographic Message Syntax (CMS) for Algorithm Identifier Protection
 
Authors:R. Housley.
Date:October 2020
Formats:txt json pdf xml html
Updates:RFC 5652
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8933
This document updates the Cryptographic Message Syntax (CMS) specified in RFC 5652 to ensure that algorithm identifiers in signed- data and authenticated-data content types are adequately protected.
 
RFC 8934 PCE Communication Protocol (PCEP) Extensions for Label Switched Path (LSP) Scheduling with Stateful PCE
 
Authors:H. Chen, Ed., Y. Zhuang, Ed., Q. Wu, D. Ceccarelli.
Date:October 2020
Formats:txt html pdf json xml
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8934
This document defines a set of extensions to the stateful PCECommunication Protocol (PCEP) to enable Label Switched Path (LSP) path computation, activation, setup, and deletion based on scheduled time intervals for the LSP and the actual network resource usage in a centralized network environment, as stated in RFC 8413.
 
RFC 8935 Push-Based Security Event Token (SET) Delivery Using HTTP
 
Authors:A. Backman, Ed., M. Jones, Ed., M. Scurtescu, M. Ansari, A. Nadalin.
Date:November 2020
Formats:txt html pdf xml json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8935
This specification defines how a Security Event Token (SET) can be delivered to an intended recipient using HTTP POST over TLS. The SET is transmitted in the body of an HTTP POST request to an endpoint operated by the recipient, and the recipient indicates successful or failed transmission via the HTTP response.
 
RFC 8936 Poll-Based Security Event Token (SET) Delivery Using HTTP
 
Authors:A. Backman, Ed., M. Jones, Ed., M. Scurtescu, M. Ansari, A. Nadalin.
Date:November 2020
Formats:txt xml pdf json html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8936
This specification defines how a series of Security Event Tokens(SETs) can be delivered to an intended recipient using HTTP POST overTLS initiated as a poll by the recipient. The specification also defines how delivery can be assured, subject to the SET Recipient's need for assurance.
 
RFC 8937 Randomness Improvements for Security Protocols
 
Authors:C. Cremers, L. Garratt, S. Smyshlyaev, N. Sullivan, C. Wood.
Date:October 2020
Formats:txt json xml pdf html
Status:INFORMATIONAL
DOI:10.17487/RFC 8937
Randomness is a crucial ingredient for Transport Layer Security (TLS) and related security protocols. Weak or predictable"cryptographically secure" pseudorandom number generators (CSPRNGs) can be abused or exploited for malicious purposes. An initial entropy source that seeds a CSPRNG might be weak or broken as well, which can also lead to critical and systemic security problems. This document describes a way for security protocol implementations to augment their CSPRNGs using long-term private keys. This improves randomness from broken or otherwise subverted CSPRNGs.

This document is a product of the Crypto Forum Research Group (CFRG) in the IRTF.

 
RFC 8938 Deterministic Networking (DetNet) Data Plane Framework
 
Authors:B. Varga, Ed., J. Farkas, L. Berger, A. Malis, S. Bryant.
Date:November 2020
Formats:txt xml pdf html json
Status:INFORMATIONAL
DOI:10.17487/RFC 8938
This document provides an overall framework for the DeterministicNetworking (DetNet) data plane. It covers concepts and considerations that are generally common to any DetNet data plane specification. It describes related Controller Plane considerations as well.
 
RFC 8939 Deterministic Networking (DetNet) Data Plane: IP
 
Authors:B. Varga, Ed., J. Farkas, L. Berger, D. Fedyk, S. Bryant.
Date:November 2020
Formats:txt html xml pdf json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8939
This document specifies the Deterministic Networking (DetNet) data plane operation for IP hosts and routers that provide DetNet service to IP-encapsulated data. No DetNet-specific encapsulation is defined to support IP flows; instead, the existing IP-layer and higher-layer protocol header information is used to support flow identification and DetNet service delivery. This document builds on the DetNet architecture (RFC 8655) and data plane framework (RFC 8938).
 
RFC 8940 Extensible Authentication Protocol (EAP) Session-Id Derivation for EAP Subscriber Identity Module (EAP-SIM), EAP Authentication and Key Agreement (EAP-AKA), and Protected EAP (PEAP)
 
Authors:A. DeKok.
Date:October 2020
Formats:txt json html pdf xml
Updates:RFC 5247
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8940
RFC 5247 is updated to define and clarify EAP Session-Id derivation for multiple Extensible Authentication Protocol (EAP) methods. The derivation of Session-Id was not given for EAP Subscriber IdentityModule (EAP-SIM) or EAP Authentication and Key Agreement (EAP-AKA) when using the fast reconnect exchange instead of full authentication. The derivation of Session-Id for full authentication is clarified for both EAP-SIM and EAP-AKA. The derivation ofSession-Id for Protected EAP (PEAP) is also given. The definition for PEAP follows the definition for other TLS-based EAP methods.
 
RFC 8941 Structured Field Values for HTTP
 
Authors:M. Nottingham, P-H. Kamp.
Date:February 2021
Formats:txt json pdf xml html
Obsoleted by:RFC 9651
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8941
This document describes a set of data types and associated algorithms that are intended to make it easier and safer to define and handleHTTP header and trailer fields, known as "Structured Fields","Structured Headers", or "Structured Trailers". It is intended for use by specifications of new HTTP fields that wish to use a common syntax that is more restrictive than traditional HTTP field values.
 
RFC 8942 HTTP Client Hints
 
Authors:I. Grigorik, Y. Weiss.
Date:February 2021
Formats:txt xml html pdf json
Status:EXPERIMENTAL
DOI:10.17487/RFC 8942
HTTP defines proactive content negotiation to allow servers to select the appropriate response for a given request, based upon the user agent's characteristics, as expressed in request headers. In practice, user agents are often unwilling to send those request headers, because it is not clear whether they will be used, and sending them impacts both performance and privacy.

This document defines an Accept-CH response header that servers can use to advertise their use of request headers for proactive content negotiation, along with a set of guidelines for the creation of such headers, colloquially known as "Client Hints."

 
RFC 8943 Concise Binary Object Representation (CBOR) Tags for Date
 
Authors:M. Jones, A. Nadalin, J. Richter.
Date:November 2020
Formats:txt xml html pdf json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8943
The Concise Binary Object Representation (CBOR), as specified in RFC7049, is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation.

In CBOR, one point of extensibility is the definition of CBOR tags.RFC 7049 defines two tags for time: CBOR tag 0 (date/time string as per RFC 3339) and tag 1 (POSIX "seconds since the epoch"). Since then, additional requirements have become known. This specification defines a CBOR tag for a date text string (as per RFC 3339) for applications needing a textual date representation within theGregorian calendar without a time. It also defines a CBOR tag for days since the date 1970-01-01 in the Gregorian calendar for applications needing a numeric date representation without a time.This specification is the reference document for IANA registration of the CBOR tags defined.

 
RFC 8944 A YANG Data Model for Layer 2 Network Topologies
 
Authors:J. Dong, X. Wei, Q. Wu, M. Boucadair, A. Liu.
Date:November 2020
Formats:txt xml pdf json html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8944
This document defines a YANG data model for Layer 2 network topologies. In particular, this data model augments the generic network and network topology data models with topology attributes that are specific to Layer 2.
 
RFC 8945 Secret Key Transaction Authentication for DNS (TSIG)
 
Authors:F. Dupont, S. Morris, P. Vixie, D. Eastlake 3rd, O. Gudmundsson, B. Wellington.
Date:November 2020
Formats:txt json xml pdf html
Obsoletes:RFC 2845, RFC 4635
Also:STD 0093
Status:INTERNET STANDARD
DOI:10.17487/RFC 8945
This document describes a protocol for transaction-level authentication using shared secrets and one-way hashing. It can be used to authenticate dynamic updates to a DNS zone as coming from an approved client or to authenticate responses as coming from an approved name server.

No recommendation is made here for distributing the shared secrets; it is expected that a network administrator will statically configure name servers and clients using some out-of-band mechanism.

This document obsoletes RFCs 2845 and 4635.

 
RFC 8946 Personal Assertion Token (PASSporT) Extension for Diverted Calls
 
Authors:J. Peterson.
Date:February 2021
Formats:txt html pdf xml json
Updates:RFC 8224
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8946
The Personal Assertion Token (PASSporT) is specified in RFC 8225 to convey cryptographically signed information about the people involved in personal communications. This document extends PASSporT to include an indication that a call has been diverted from its original destination to a new one. This information can greatly improve the decisions made by verification services in call forwarding scenarios.Also specified here is an encapsulation mechanism for nesting aPASSporT within another PASSporT that assists relying parties in some diversion scenarios.

This document updates RFC 8224.

 
RFC 8947 Link-Layer Address Assignment Mechanism for DHCPv6
 
Authors:B. Volz, T. Mrugalski, C. Bernardos.
Date:December 2020
Formats:txt html pdf json xml
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8947
In certain environments, e.g., large-scale virtualization deployments, new devices are created in an automated manner. Such devices may have their link-layer addresses assigned in an automated fashion. With sufficient scale, the likelihood of a collision using random assignment without duplication detection is not acceptable.Therefore, an allocation mechanism is required. This document proposes an extension to DHCPv6 that allows a scalable approach to link-layer address assignments where preassigned link-layer address assignments (such as by a manufacturer) are not possible or are unnecessary.
 
RFC 8948 Structured Local Address Plan (SLAP) Quadrant Selection Option for DHCPv6
 
Authors:CJ. Bernardos, A. Mourad.
Date:December 2020
Formats:txt json html pdf xml
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8948
The IEEE originally structured the 48-bit Media Access Control (MAC) address space in such a way that half of it was reserved for local use. In 2017, the IEEE published a new standard (IEEE Std 802c) with a new optional Structured Local Address Plan (SLAP). It specifies different assignment approaches in four specified regions of the local MAC address space.

The IEEE is developing protocols to assign addresses (IEEE P802.1CQ).There is also work in the IETF on specifying a new mechanism that extends DHCPv6 operation to handle the local MAC address assignments.

This document proposes extensions to DHCPv6 protocols to enable aDHCPv6 client or a DHCPv6 relay to indicate a preferred SLAP quadrant to the server so that the server may allocate MAC addresses in the quadrant requested by the relay or client. A new DHCPv6 option(QUAD) is defined for this purpose.

 
RFC 8949 Concise Binary Object Representation (CBOR)
 
Authors:C. Bormann, P. Hoffman.
Date:December 2020
Formats:txt json pdf xml html
Obsoletes:RFC 7049
Also:STD 0094
Status:INTERNET STANDARD
DOI:10.17487/RFC 8949
The Concise Binary Object Representation (CBOR) is a data format whose design goals include the possibility of extremely small code size, fairly small message size, and extensibility without the need for version negotiation. These design goals make it different from earlier binary serializations such as ASN.1 and MessagePack.

This document obsoletes RFC 7049, providing editorial improvements, new details, and errata fixes while keeping full compatibility with the interchange format of RFC 7049. It does not create a new version of the format.

 
RFC 8950 Advertising IPv4 Network Layer Reachability Information (NLRI) with an IPv6 Next Hop
 
Authors:S. Litkowski, S. Agrawal, K. Ananthamurthy, K. Patel.
Date:November 2020
Formats:txt json xml html pdf
Obsoletes:RFC 5549
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8950
Multiprotocol BGP (MP-BGP) specifies that the set of usable next-hop address families is determined by the Address Family Identifier (AFI) and the Subsequent Address Family Identifier (SAFI). The AFI/SAFI definitions for the IPv4 address family only have provisions for advertising a next-hop address that belongs to the IPv4 protocol when advertising IPv4 Network Layer Reachability Information (NLRI) orVPN-IPv4 NLRI.

This document specifies the extensions necessary to allow the advertising of IPv4 NLRI or VPN-IPv4 NLRI with a next-hop address that belongs to the IPv6 protocol. This comprises an extension of the AFI/SAFI definitions to allow the address of the next hop forIPv4 NLRI or VPN-IPv4 NLRI to also belong to the IPv6 protocol, the encoding of the next hop to determine which of the protocols the address actually belongs to, and a BGP Capability allowing MP-BGP peers to dynamically discover whether they can exchange IPv4 NLRI andVPN-IPv4 NLRI with an IPv6 next hop. This document obsoletes RFC5549.

 
RFC 8951 Clarification of Enrollment over Secure Transport (EST): Transfer Encodings and ASN.1
 
Authors:M. Richardson, T. Werner, W. Pan.
Date:November 2020
Formats:txt json xml html pdf
Updates:RFC 7030
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8951
This document updates RFC 7030: Enrollment over Secure Transport to resolve some errata that were reported and that have proven to cause interoperability issues when RFC 7030 was extended.

This document deprecates the specification of "Content-Transfer-Encoding" headers for Enrollment over Secure Transport (EST) endpoints. This document fixes some syntactical errors in ASN.1 that were present.

 
RFC 8952 Captive Portal Architecture
 
Authors:K. Larose, D. Dolson, H. Liu.
Date:November 2020
Formats:txt pdf xml html json
Status:INFORMATIONAL
DOI:10.17487/RFC 8952
This document describes a captive portal architecture. Network provisioning protocols such as DHCP or Router Advertisements (RAs), an optional signaling protocol, and an HTTP API are used to provide the solution.
 
RFC 8953 Coordinating Attack Response at Internet Scale 2 (CARIS2) Workshop Report
 
Authors:K. Moriarty.
Date:December 2020
Formats:txt html pdf xml json
Status:INFORMATIONAL
DOI:10.17487/RFC 8953
The Coordinating Attack Response at Internet Scale (CARIS) 2 workshop, sponsored by the Internet Society, took place on 28February and 1 March 2019 in Cambridge, Massachusetts, USA.Participants spanned regional, national, international, and enterprise Computer Security Incident Response Teams (CSIRTs), operators, service providers, network and security operators, transport operators and researchers, incident response researchers, vendors, and participants from standards communities. This workshop continued the work started at the first CARIS workshop, with a focus on scaling incident prevention and detection as the Internet industry moves to a stronger and a more ubiquitous deployment of session encryption.
 
RFC 8954 Online Certificate Status Protocol (OCSP) Nonce Extension
 
Authors:M. Sahni, Ed..
Date:November 2020
Formats:txt pdf json xml html
Obsoleted by:RFC 9654
Updates:RFC 6960
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8954
This document specifies the updated format of the Nonce extension in the Online Certificate Status Protocol (OCSP) request and response messages. OCSP is used to check the status of a certificate, and theNonce extension is used to cryptographically bind an OCSP response message to a particular OCSP request message. This document updatesRFC 6960.
 
RFC 8955 Dissemination of Flow Specification Rules
 
Authors:C. Loibl, S. Hares, R. Raszuk, D. McPherson, M. Bacher.
Date:December 2020
Formats:txt pdf xml json html
Obsoletes:RFC 5575, RFC 7674
Updated by:RFC 8956, RFC 9117, RFC 9184
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8955
This document defines a Border Gateway Protocol Network LayerReachability Information (BGP NLRI) encoding format that can be used to distribute (intra-domain and inter-domain) traffic FlowSpecifications for IPv4 unicast and IPv4 BGP/MPLS VPN services. This allows the routing system to propagate information regarding more specific components of the traffic aggregate defined by an IP destination prefix.

It also specifies BGP Extended Community encoding formats, which can be used to propagate Traffic Filtering Actions along with the FlowSpecification NLRI. Those Traffic Filtering Actions encode actions a routing system can take if the packet matches the Flow Specification.

This document obsoletes both RFC 5575 and RFC 7674.

 
RFC 8956 Dissemination of Flow Specification Rules for IPv6
 
Authors:C. Loibl, Ed., R. Raszuk, Ed., S. Hares, Ed..
Date:December 2020
Formats:txt html json xml pdf
Updates:RFC 8955
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8956
"Dissemination of Flow Specification Rules" (RFC 8955) provides aBorder Gateway Protocol (BGP) extension for the propagation of traffic flow information for the purpose of rate limiting or filtering IPv4 protocol data packets.

This document extends RFC 8955 with IPv6 functionality. It also updates RFC 8955 by changing the IANA Flow Spec Component Types registry.

 
RFC 8957 Synonymous Flow Label Framework
 
Authors:S. Bryant, M. Chen, G. Swallow, S. Sivabalan, G. Mirsky.
Date:January 2021
Formats:txt html xml pdf json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8957
RFC 8372 ("MPLS Flow Identification Considerations") describes the requirement for introducing flow identities within the MPLS architecture. This document describes a method of accomplishing this by using a technique called "Synonymous Flow Labels" in which labels that mimic the behavior of other labels provide the identification service. These identifiers can be used to trigger per-flow operations on the packet at the receiving label switching router.
 
RFC 8958 Updated Registration Rules for URI.ARPA
 
Authors:T. Hardie.
Date:December 2020
Formats:txt json html xml pdf
Updates:RFC 3405
Also:BCP 0065
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 8958
This document updates RFC 3405 by removing references to the IETF tree from the procedures for requesting that a URI scheme be inserted into the URI.ARPA zone.
 
RFC 8959 The "secret-token" URI Scheme
 
Authors:M. Nottingham.
Date:January 2021
Formats:txt json xml pdf html
Status:INFORMATIONAL
DOI:10.17487/RFC 8959
This document registers the "secret-token" URI scheme to aid in the identification of authentication tokens.
 
RFC 8960 A YANG Data Model for MPLS Base
 
Authors:T. Saad, K. Raza, R. Gandhi, X. Liu, V. Beeram.
Date:December 2020
Formats:txt pdf json xml html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8960
This document contains a specification of the MPLS base YANG data model. The MPLS base YANG data model serves as a base framework for configuring and managing an MPLS switching subsystem on an MPLS- enabled router. It is expected that other MPLS YANG data models(e.g., MPLS Label Switched Path (LSP) static, LDP, or RSVP-TE YANG data models) will augment the MPLS base YANG data model.
 
RFC 8961 Requirements for Time-Based Loss Detection
 
Authors:M. Allman.
Date:November 2020
Formats:txt json pdf xml html
Also:BCP 0233
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 8961
Many protocols must detect packet loss for various reasons (e.g., to ensure reliability using retransmissions or to understand the level of congestion along a network path). While many mechanisms have been designed to detect loss, ultimately, protocols can only count on the passage of time without delivery confirmation to declare a packet"lost". Each implementation of a time-based loss detection mechanism represents a balance between correctness and timeliness; therefore, no implementation suits all situations. This document provides high- level requirements for time-based loss detectors appropriate for general use in unicast communication across the Internet. Within the requirements, implementations have latitude to define particulars that best address each situation.
 
RFC 8962 Establishing the Protocol Police
 
Authors:G. Grover, N. ten Oever, C. Cath, S. Sahib.
Date:1 April 2021
Formats:txt html xml pdf json
Status:INFORMATIONAL
DOI:10.17487/RFC 8962
One mantra of the IETF is, "We are not the Protocol Police."However, to ensure that protocols are implemented and deployed in full compliance with the IETF's standards, it is important to set up a body that is responsible for assessing and enforcing correct protocol behavior.

This document formally establishes the Protocol Police. It defines the body and sets out what aspects of IETF protocols they will police. This document acts as a point of reference for networking engineers, law enforcement officials, government representatives, and others. It also provides advice on how to report issues to theProtocol Police.

 
RFC 8963 Evaluation of a Sample of RFCs Produced in 2018
 
Authors:C. Huitema.
Date:January 2021
Formats:txt html json xml pdf
Status:INFORMATIONAL
DOI:10.17487/RFC 8963
This document presents the author's effort to understand the delays involved in publishing an idea in the IETF or through the IndependentStream, from the first individual draft to the publication of theRFC. We analyze a set of randomly chosen RFCs approved in 2018, looking for history and delays. We also use two randomly chosen sets of RFCs published in 2008 and 1998 for comparing delays seen in 2018 to those observed 10 or 20 years ago. The average RFC in the 2018 sample was produced in 3 years and 4 months, of which 2 years and 10 months were spent in the working group, 3 to 4 months for IETF consensus and IESG review, and 3 to 4 months in RFC production. The main variation in RFC production delays comes from the AUTH48 phase.

We also measure the number of citations of the chosen RFC usingSemantic Scholar, and compare citation counts with what we know about deployment. We show that citation counts indicate academic interest, but correlate only loosely with deployment or usage of the specifications. Counting web references could complement that.

 
RFC 8964 Deterministic Networking (DetNet) Data Plane: MPLS
 
Authors:B. Varga, Ed., J. Farkas, L. Berger, A. Malis, S. Bryant, J. Korhonen.
Date:January 2021
Formats:txt json xml pdf html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8964
This document specifies the Deterministic Networking (DetNet) data plane when operating over an MPLS Packet Switched Network. It leverages existing pseudowire (PW) encapsulations and MPLS TrafficEngineering (MPLS-TE) encapsulations and mechanisms. This document builds on the DetNet architecture and data plane framework.
 
RFC 8965 Applicability of the Babel Routing Protocol
 
Authors:J. Chroboczek.
Date:January 2021
Formats:txt json html xml pdf
Status:INFORMATIONAL
DOI:10.17487/RFC 8965
Babel is a routing protocol based on the distance-vector algorithm augmented with mechanisms for loop avoidance and starvation avoidance. This document describes a number of niches where Babel has been found to be useful and that are arguably not adequately served by more mature protocols.
 
RFC 8966 The Babel Routing Protocol
 
Authors:J. Chroboczek, D. Schinazi.
Date:January 2021
Formats:txt html pdf xml json
Obsoletes:RFC 6126, RFC 7557
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8966
Babel is a loop-avoiding, distance-vector routing protocol that is robust and efficient both in ordinary wired networks and in wireless mesh networks. This document describes the Babel routing protocol and obsoletes RFC 6126 and RFC 7557.
 
RFC 8967 MAC Authentication for the Babel Routing Protocol
 
Authors:C. Dô, W. Kolodziejak, J. Chroboczek.
Date:January 2021
Formats:txt pdf xml html json
Obsoletes:RFC 7298
Updated by:RFC 9467
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8967
This document describes a cryptographic authentication mechanism for the Babel routing protocol that has provisions for replay avoidance.This document obsoletes RFC 7298.
 
RFC 8968 Babel Routing Protocol over Datagram Transport Layer Security
 
Authors:A. Décimo, D. Schinazi, J. Chroboczek.
Date:January 2021
Formats:txt json pdf xml html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8968
The Babel Routing Protocol does not contain any means to authenticate neighbours or provide integrity or confidentiality for messages sent between them. This document specifies a mechanism to ensure these properties using Datagram Transport Layer Security (DTLS).
 
RFC 8969 A Framework for Automating Service and Network Management with YANG
 
Authors:Q. Wu, Ed., M. Boucadair, Ed., D. Lopez, C. Xie, L. Geng.
Date:January 2021
Formats:txt pdf xml json html
Status:INFORMATIONAL
DOI:10.17487/RFC 8969
Data models provide a programmatic approach to represent services and networks. Concretely, they can be used to derive configuration information for network and service components, and state information that will be monitored and tracked. Data models can be used during the service and network management life cycle (e.g., service instantiation, service provisioning, service optimization, service monitoring, service diagnosing, and service assurance). Data models are also instrumental in the automation of network management, and they can provide closed-loop control for adaptive and deterministic service creation, delivery, and maintenance.

This document describes a framework for service and network management automation that takes advantage of YANG modeling technologies. This framework is drawn from a network operator perspective irrespective of the origin of a data model; thus, it can accommodate YANG modules that are developed outside the IETF.

 
RFC 8970 IMAP4 Extension: Message Preview Generation
 
Authors:M. Slusarz.
Date:December 2020
Formats:txt json xml pdf html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8970
This document specifies an Internet Message Access Protocol (IMAP) protocol extension that allows a client to request a server-generated abbreviated text representation of message data that is useful as a contextual preview of the entire message.
 
RFC 8971 Bidirectional Forwarding Detection (BFD) for Virtual eXtensible Local Area Network (VXLAN)
 
Authors:S. Pallagatti, Ed., G. Mirsky, Ed., S. Paragiri, V. Govindan, M. Mudigonda.
Date:December 2020
Formats:txt xml pdf json html
Status:INFORMATIONAL
DOI:10.17487/RFC 8971
This document describes the use of the Bidirectional ForwardingDetection (BFD) protocol in point-to-point Virtual eXtensible LocalArea Network (VXLAN) tunnels used to form an overlay network.
 
RFC 8972 Simple Two-Way Active Measurement Protocol Optional Extensions
 
Authors:G. Mirsky, X. Min, H. Nydell, R. Foote, A. Masputra, E. Ruffini.
Date:January 2021
Formats:txt html json pdf xml
Updates:RFC 8762
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8972
This document describes optional extensions to Simple Two-way ActiveMeasurement Protocol (STAMP) that enable measurement of performance metrics. The document also defines a STAMP Test Session Identifier and thus updates RFC 8762.
 
RFC 8973 DDoS Open Threat Signaling (DOTS) Agent Discovery
 
Authors:M. Boucadair, T. Reddy.K.
Date:January 2021
Formats:txt html pdf json xml
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8973
This document specifies mechanisms to configure DDoS Open ThreatSignaling (DOTS) clients with their DOTS servers. The discovery procedure also covers the DOTS signal channel Call Home. It can be useful to know the appropriate DOTS server for a given location in order to engage mitigation actions. This is true even in cases where the DOTS client cannot localize the attack: cases where it only knows that some resources are under attack and that help is needed.
 
RFC 8974 Extended Tokens and Stateless Clients in the Constrained Application Protocol (CoAP)
 
Authors:K. Hartke, M. Richardson.
Date:January 2021
Formats:txt json pdf xml html
Updates:RFC 7252, RFC 8323
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8974
This document provides considerations for alleviating ConstrainedApplication Protocol (CoAP) clients and intermediaries of keeping per-request state. To facilitate this, this document additionally introduces a new, optional CoAP protocol extension for extended token lengths.

This document updates RFCs 7252 and 8323 with an extended definition of the "TKL" field in the CoAP message header.

 
RFC 8975 Network Coding for Satellite Systems
 
Authors:N. Kuhn, Ed., E. Lochin, Ed..
Date:January 2021
Formats:txt json html pdf xml
Status:INFORMATIONAL
DOI:10.17487/RFC 8975
This document is a product of the Coding for Efficient NetworkCommunications Research Group (NWCRG). It conforms to the directions found in the NWCRG taxonomy (RFC 8406).

The objective is to contribute to a larger deployment of NetworkCoding techniques in and above the network layer in satellite communication systems. This document also identifies open research issues related to the deployment of Network Coding in satellite communication systems.

 
RFC 8976 Message Digest for DNS Zones
 
Authors:D. Wessels, P. Barber, M. Weinberg, W. Kumari, W. Hardaker.
Date:February 2021
Formats:txt html xml pdf json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8976
This document describes a protocol and new DNS Resource Record that provides a cryptographic message digest over DNS zone data at rest.The ZONEMD Resource Record conveys the digest data in the zone itself. When used in combination with DNSSEC, ZONEMD allows recipients to verify the zone contents for data integrity and origin authenticity. This provides assurance that received zone data matches published data, regardless of how the zone data has been transmitted and received. When used without DNSSEC, ZONEMD functions as a checksum, guarding only against unintentional changes.

ZONEMD does not replace DNSSEC: DNSSEC protects individual RRsets(DNS data with fine granularity), whereas ZONEMD protects a zone's data as a whole, whether consumed by authoritative name servers, recursive name servers, or any other applications.

As specified herein, ZONEMD is impractical for large, dynamic zones due to the time and resources required for digest calculation.However, the ZONEMD record is extensible so that new digest schemes may be added in the future to support large, dynamic zones.

 
RFC 8977 Registration Data Access Protocol (RDAP) Query Parameters for Result Sorting and Paging
 
Authors:M. Loffredo, M. Martinelli, S. Hollenbeck.
Date:January 2021
Formats:txt xml pdf html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8977
The Registration Data Access Protocol (RDAP) does not include core functionality for clients to provide sorting and paging parameters for control of large result sets. This omission can lead to unpredictable server processing of queries and client processing of responses. This unpredictability can be greatly reduced if clients can provide servers with their preferences for managing large responses. This document describes RDAP query extensions that allow clients to specify their preferences for sorting and paging result sets.
 
RFC 8978 Reaction of IPv6 Stateless Address Autoconfiguration (SLAAC) to Flash-Renumbering Events
 
Authors:F. Gont, J. Žorž, R. Patterson.
Date:March 2021
Formats:txt xml json pdf html
Status:INFORMATIONAL
DOI:10.17487/RFC 8978
In scenarios where network configuration information related to IPv6 prefixes becomes invalid without any explicit and reliable signaling of that condition (such as when a Customer Edge router crashes and reboots without knowledge of the previously employed prefixes), hosts on the local network may continue using stale prefixes for an unacceptably long time (on the order of several days), thus resulting in connectivity problems. This document describes this issue and discusses operational workarounds that may help to improve network robustness. Additionally, it highlights areas where further work may be needed.
 
RFC 8979 Subscriber and Performance Policy Identifier Context Headers in the Network Service Header (NSH)
 
Authors:B. Sarikaya, D. von Hugo, M. Boucadair.
Date:February 2021
Formats:txt xml json pdf html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8979
This document defines the Subscriber and Performance PolicyIdentifier Context Headers. These Variable-Length Context Headers can be carried in the Network Service Header (NSH) and are used to inform Service Functions (SFs) of subscriber- and performance-related information for the sake of policy enforcement and appropriateService Function Chaining (SFC) operations. The structure of eachContext Header and their use and processing by NSH-aware nodes are described.
 
RFC 8980 Report from the IAB Workshop on Design Expectations vs
 
Authors:Deployment Reality in Protocol Development. J. Arkko, T. Hardie.
Date:February 2021
Formats:txt json html xml pdf
Status:INFORMATIONAL
DOI:10.17487/RFC 8980
The Design Expectations vs. Deployment Reality in ProtocolDevelopment Workshop was convened by the Internet Architecture Board(IAB) in June 2019. This report summarizes the workshop's significant points of discussion and identifies topics that may warrant further consideration.

Note that this document is a report on the proceedings of the workshop. The views and positions documented in this report are those of the workshop participants and do not necessarily reflect IAB views and positions.

 
RFC 8981 Temporary Address Extensions for Stateless Address Autoconfiguration in IPv6
 
Authors:F. Gont, S. Krishnan, T. Narten, R. Draves.
Date:February 2021
Formats:txt json xml pdf html
Obsoletes:RFC 4941
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8981
This document describes an extension to IPv6 Stateless AddressAutoconfiguration that causes hosts to generate temporary addresses with randomized interface identifiers for each prefix advertised with autoconfiguration enabled. Changing addresses over time limits the window of time during which eavesdroppers and other information collectors may trivially perform address-based network-activity correlation when the same address is employed for multiple transactions by the same host. Additionally, it reduces the window of exposure of a host as being accessible via an address that becomes revealed as a result of active communication. This document obsoletes RFC 4941.
 
RFC 8982 Registration Data Access Protocol (RDAP) Partial Response
 
Authors:M. Loffredo, M. Martinelli.
Date:February 2021
Formats:txt pdf xml html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8982
The Registration Data Access Protocol (RDAP) does not include capabilities to request partial responses. Servers will only return full responses that include all of the information that a client is authorized to receive. A partial response capability that limits the amount of information returned, especially in the case of search queries, could bring benefits to both clients and servers. This document describes an RDAP query extension that allows clients to specify their preference for obtaining a partial response.
 
RFC 8983 Internet Key Exchange Protocol Version 2 (IKEv2) Notification Status Types for IPv4/IPv6 Coexistence
 
Authors:M. Boucadair.
Date:February 2021
Formats:txt html pdf xml json
Updates:RFC 7296
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8983
This document specifies new Internet Key Exchange Protocol Version 2(IKEv2) notification status types to better manage IPv4 and IPv6 coexistence by allowing the responder to signal to the initiator which address families are allowed.

This document updates RFC 7296.

 
RFC 8984 JSCalendar: A JSON Representation of Calendar Data
 
Authors:N. Jenkins, R. Stepanek.
Date:July 2021
Formats:txt pdf xml json html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8984
This specification defines a data model and JSON representation of calendar data that can be used for storage and data exchange in a calendaring and scheduling environment. It aims to be an alternative and, over time, successor to the widely deployed iCalendar data format. It also aims to be unambiguous, extendable, and simple to process. In contrast to the jCal format, which is also based onJSON, JSCalendar is not a direct mapping from iCalendar but defines the data model independently and expands semantics where appropriate.
 
RFC 8985 The RACK-TLP Loss Detection Algorithm for TCP
 
Authors:Y. Cheng, N. Cardwell, N. Dukkipati, P. Jha.
Date:February 2021
Formats:txt json pdf xml html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8985
This document presents the RACK-TLP loss detection algorithm for TCP.RACK-TLP uses per-segment transmit timestamps and selective acknowledgments (SACKs) and has two parts. Recent Acknowledgment(RACK) starts fast recovery quickly using time-based inferences derived from acknowledgment (ACK) feedback, and Tail Loss Probe (TLP) leverages RACK and sends a probe packet to trigger ACK feedback to avoid retransmission timeout (RTO) events. Compared to the widely used duplicate acknowledgment (DupAck) threshold approach, RACK-TLP detects losses more efficiently when there are application-limited flights of data, lost retransmissions, or data packet reordering events. It is intended to be an alternative to the DupAck threshold approach.
 
RFC 8986 Segment Routing over IPv6 (SRv6) Network Programming
 
Authors:C. Filsfils, Ed., P. Camarillo, Ed., J. Leddy, D. Voyer, S. Matsushima, Z. Li.
Date:February 2021
Formats:txt html xml pdf json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8986
The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.

Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.

This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.

 
RFC 8987 DHCPv6 Prefix Delegating Relay Requirements
 
Authors:I. Farrer, N. Kottapalli, M. Hunek, R. Patterson.
Date:February 2021
Formats:txt html xml json pdf
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8987
This document describes operational problems that are known to occur when using DHCPv6 relays with prefix delegation. These problems can prevent successful delegation and result in routing failures. To address these problems, this document provides necessary functional requirements for operating DHCPv6 relays with prefix delegation.

It is recommended that any network operator using DHCPv6 prefix delegation with relays ensure that these requirements are followed on their networks.

 
RFC 8989 Additional Criteria for Nominating Committee Eligibility
 
Authors:B. Carpenter, S. Farrell.
Date:February 2021
Formats:txt json xml pdf html
Obsoleted by:RFC 9389
Status:EXPERIMENTAL
DOI:10.17487/RFC 8989
This document defines a process experiment under RFC 3933 that temporarily updates the criteria for qualifying volunteers to participate in the IETF Nominating Committee. It therefore also updates the criteria for qualifying signatories to a community recall petition. The purpose is to make the criteria more flexible in view of increasing remote participation in the IETF and a reduction in face-to-face meetings. The experiment is of fixed duration and will apply to one, or at most two, consecutive Nominating Committee cycles, starting in 2021. This document temporarily varies the rules in RFC 8713.
 
RFC 8990 GeneRic Autonomic Signaling Protocol (GRASP)
 
Authors:C. Bormann, B. Carpenter, Ed., B. Liu, Ed..
Date:May 2021
Formats:txt json html pdf xml
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8990
This document specifies the GeneRic Autonomic Signaling Protocol(GRASP), which enables autonomic nodes and Autonomic Service Agents to dynamically discover peers, to synchronize state with each other, and to negotiate parameter settings with each other. GRASP depends on an external security environment that is described elsewhere. The technical objectives and parameters for specific application scenarios are to be described in separate documents. Appendices briefly discuss requirements for the protocol and existing protocols with comparable features.
 
RFC 8991 GeneRic Autonomic Signaling Protocol Application Program Interface (GRASP API)
 
Authors:B. Carpenter, B. Liu, Ed., W. Wang, X. Gong.
Date:May 2021
Formats:txt json pdf xml html
Status:INFORMATIONAL
DOI:10.17487/RFC 8991
This document is a conceptual outline of an Application ProgrammingInterface (API) for the GeneRic Autonomic Signaling Protocol (GRASP).Such an API is needed for Autonomic Service Agents (ASAs) calling theGRASP protocol module to exchange Autonomic Network messages with other ASAs. Since GRASP is designed to support asynchronous operations, the API will need to be adapted according to the support for asynchronicity in various programming languages and operating systems.
 
RFC 8992 Autonomic IPv6 Edge Prefix Management in Large-Scale Networks
 
Authors:S. Jiang, Ed., Z. Du, B. Carpenter, Q. Sun.
Date:May 2021
Formats:txt xml pdf html json
Status:INFORMATIONAL
DOI:10.17487/RFC 8992
This document defines two autonomic technical objectives for IPv6 prefix management at the edge of large-scale ISP networks, with an extension to support IPv4 prefixes. An important purpose of this document is to use it for validation of the design of various components of the Autonomic Networking Infrastructure.
 
RFC 8993 A Reference Model for Autonomic Networking
 
Authors:M. Behringer, Ed., B. Carpenter, T. Eckert, L. Ciavaglia, J. Nobre.
Date:May 2021
Formats:txt html xml pdf json
Status:INFORMATIONAL
DOI:10.17487/RFC 8993
This document describes a reference model for Autonomic Networking for managed networks. It defines the behavior of an autonomic node, how the various elements in an autonomic context work together, and how autonomic services can use the infrastructure.
 
RFC 8994 An Autonomic Control Plane (ACP)
 
Authors:T. Eckert, Ed., M. Behringer, Ed., S. Bjarnason.
Date:May 2021
Formats:txt xml json pdf html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8994
Autonomic functions need a control plane to communicate, which depends on some addressing and routing. This Autonomic Control Plane should ideally be self-managing and be as independent as possible of configuration. This document defines such a plane and calls it the"Autonomic Control Plane", with the primary use as a control plane for autonomic functions. It also serves as a "virtual out-of-band channel" for Operations, Administration, and Management (OAM) communications over a network that provides automatically configured, hop-by-hop authenticated and encrypted communications via automatically configured IPv6 even when the network is not configured or is misconfigured.
 
RFC 8995 Bootstrapping Remote Secure Key Infrastructure (BRSKI)
 
Authors:M. Pritikin, M. Richardson, T. Eckert, M. Behringer, K. Watsen.
Date:May 2021
Formats:txt xml pdf json html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8995
This document specifies automated bootstrapping of an AutonomicControl Plane. To do this, a Secure Key Infrastructure is bootstrapped. This is done using manufacturer-installed X.509 certificates, in combination with a manufacturer's authorizing service, both online and offline. We call this process theBootstrapping Remote Secure Key Infrastructure (BRSKI) protocol.Bootstrapping a new device can occur when using a routable address and a cloud service, only link-local connectivity, or limited/ disconnected networks. Support for deployment models with less stringent security requirements is included. Bootstrapping is complete when the cryptographic identity of the new key infrastructure is successfully deployed to the device. The established secure connection can be used to deploy a locally issued certificate to the device as well.
 
RFC 8996 Deprecating TLS 1.0 and TLS 1.1
 
Authors:K. Moriarty, S. Farrell.
Date:March 2021
Formats:txt html json pdf xml
Obsoletes:RFC 5469, RFC 7507
Updates:RFC 3261, RFC 3329, RFC 3436, RFC 3470, RFC 3501, RFC 3552, RFC 3568, RFC 3656, RFC 3749, RFC 3767, RFC 3856, RFC 3871, RFC 3887, RFC 3903, RFC 3943, RFC 3983, RFC 4097, RFC 4111, RFC 4162, RFC 4168, RFC 4217, RFC 4235, RFC 4261, RFC 4279, RFC 4497, RFC 4513, RFC 4531, RFC 4540, RFC 4582, RFC 4616, RFC 4642, RFC 4680, RFC 4681, RFC 4712, RFC 4732, RFC 4743, RFC 4744, RFC 4785, RFC 4791, RFC 4823, RFC 4851, RFC 4964, RFC 4975, RFC 4976, RFC 4992, RFC 5018, RFC 5019, RFC 5023, RFC 5024, RFC 5049, RFC 5054, RFC 5091, RFC 5158, RFC 5216, RFC 5238, RFC 5263, RFC 5281, RFC 5364, RFC 5415, RFC 5422, RFC 5456, RFC 5734, RFC 5878, RFC 5953, RFC 6012, RFC 6042, RFC 6083, RFC 6084, RFC 6176, RFC 6347, RFC 6353, RFC 6367, RFC 6460, RFC 6614, RFC 6739, RFC 6749, RFC 6750, RFC 7030, RFC 7465, RFC 7525, RFC 7562, RFC 7568, RFC 8261, RFC 8422
Also:BCP 0195
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 8996
This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions.TLS version 1.2 became the recommended version for IETF protocols in2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions.Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance.

This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC4347) but not DTLS version 1.2, and there is no DTLS version 1.1.

This document updates many RFCs that normatively refer to TLS version1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.

 
RFC 8997 Deprecation of TLS 1.1 for Email Submission and Access
 
Authors:L. Velvindron, S. Farrell.
Date:March 2021
Formats:txt html pdf xml json
Updates:RFC 8314
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8997
This specification updates the current recommendation for the use of the Transport Layer Security (TLS) protocol to provide confidentiality of email between a Mail User Agent (MUA) and a MailSubmission Server or Mail Access Server. This document updates RFC8314.
 
RFC 8998 ShangMi (SM) Cipher Suites for TLS 1.3
 
Authors:P. Yang.
Date:March 2021
Formats:txt json html pdf xml
Status:INFORMATIONAL
DOI:10.17487/RFC 8998
This document specifies how to use the ShangMi (SM) cryptographic algorithms with Transport Layer Security (TLS) protocol version 1.3.

The use of these algorithms with TLS 1.3 is not endorsed by the IETF.The SM algorithms are becoming mandatory in China, so this document provides a description of how to use the SM algorithms with TLS 1.3 and specifies a profile of TLS 1.3 so that implementers can produce interworking implementations.

 
RFC 8999 Version-Independent Properties of QUIC
 
Authors:M. Thomson.
Date:May 2021
Formats:txt json pdf xml html
Updated by:RFC 9368
Status:PROPOSED STANDARD
DOI:10.17487/RFC 8999
This document defines the properties of the QUIC transport protocol that are common to all versions of the protocol.