Internet Documents

RFCs 9700 - 9799s

RFCs All DocumentsSTDs Internet Standards DocumentsBCPs Best Current Practice DocumentsFYIs Informational Documents
 

PROPOSEDDRAFTSTANDARDEXPMTLBCPINFOHISTORICUPDATEDOBSOLETEDUNKNOWN

 
RFC 9700 Best Current Practice for OAuth 2.0 Security
 
Authors:T. Lodderstedt, J. Bradley, A. Labunets, D. Fett.
Date:January 2025
Formats:txt pdf xml json html
Updates:RFC 6749, RFC 6750, RFC 6819
Also:BCP 0240
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 9700
This document describes best current security practice for OAuth 2.0.It updates and extends the threat model and security advice given inRFCs 6749, 6750, and 6819 to incorporate practical experiences gathered since OAuth 2.0 was published and covers new threats relevant due to the broader application of OAuth 2.0. Further, it deprecates some modes of operation that are deemed less secure or even insecure.
 
RFC 9701 JSON Web Token (JWT) Response for OAuth Token Introspection
 
Authors:T. Lodderstedt, Ed., V. Dzhuvinov.
Date:January 2025
Formats:txt json pdf xml html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9701
This specification proposes an additional response secured by JSONWeb Token (JWT) for OAuth 2.0 Token Introspection.
 
RFC 9702 YANG Data Model for Maximum Segment Identifier (SID) Depth (MSD) Types and MPLS MSD
 
Authors:Y. Qu, A. Lindem, S. Litkowski, J. Tantsura.
Date:January 2025
Formats:txt html json xml pdf
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9702
This document defines two YANG modules. The first module is the initial version of the IANA-maintained YANG module for MaximumSegment Identifier (SID) Depth (MSD) Types, which includes identities for both the MPLS data plane and Segment Routing over IPv6 (SRv6) data plane. The second module augments the IETF MPLS YANG data model to provide support for MPLS MSDs as defined in RFCs 8476 and 8491.
 
RFC 9703 Label Switched Path (LSP) Ping/Traceroute for Segment Routing (SR) Egress Peer Engineering (EPE) Segment Identifiers (SIDs) with MPLS Data Plane
 
Authors:S. Hegde, M. Srivastava, K. Arora, S. Ninan, X. Xu.
Date:December 2024
Formats:txt html xml pdf json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9703
Egress Peer Engineering (EPE) is an application of Segment Routing(SR) that solves the problem of egress peer selection. The SR-basedBGP-EPE solution allows a centralized controller, e.g., a Software-Defined Network (SDN) controller, to program any egress peer. TheEPE solution requires the node or the SDN controller to program 1) the PeerNode Segment Identifier (SID) describing a session between two nodes, 2) the PeerAdj SID describing the link or links that are used by the sessions between peer nodes, and 3) the PeerSet SID describing any connected interface to any peer in the related group.This document provides new sub-TLVs for EPE-SIDs that are used in theTarget FEC Stack TLV (Type 1) in MPLS Ping and Traceroute procedures.
 
RFC 9704 Establishing Local DNS Authority in Validated Split-Horizon Environments
 
Authors:T. Reddy.K, D. Wing, K. Smith, B. Schwartz.
Date:January 2025
Formats:txt json xml pdf html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9704
When split-horizon DNS is deployed by a network, certain domain names can be resolved authoritatively by a network-provided DNS resolver.DNS clients that are not configured to use this resolver by default can use it for these specific domains only. This specification defines a mechanism for domain owners to inform DNS clients about local resolvers that are authorized to answer authoritatively for certain subdomains.
 
RFC 9706 TreeDN: Tree-Based Content Delivery Network (CDN) for Live Streaming to Mass Audiences
 
Authors:L. Giuliano, C. Lenart, R. Adam.
Date:January 2025
Formats:txt pdf xml html json
Status:INFORMATIONAL
DOI:10.17487/RFC 9706
As Internet audience sizes for high-interest live events reach unprecedented levels and bitrates climb to support formats and applications such as 4K, 8K, and Augmented Reality (AR), live streaming can place a unique type of stress upon network resources.TreeDN is a tree-based Content Delivery Network (CDN) architecture designed to address the distinctive scaling challenges of live streaming to mass audiences. TreeDN enables operators to offerReplication-as-a-Service (RaaS) at a fraction of the cost of traditional, unicast-based CDNs -- in some cases, at no additional cost to the infrastructure. In addition to efficiently utilizing network resources to deliver existing multi-destination traffic, this architecture also enables new types of content and use cases that previously were not possible or economically viable using traditionalCDN approaches. Finally, TreeDN is a decentralized architecture and a democratizing technology that makes content distribution more accessible to more people by dramatically reducing the costs of replication.
 
RFC 9707 Report from the IAB Workshop on Barriers to Internet Access of Services (BIAS)
 
Authors:M. Kühlewind, D. Dhody, M. Knodel.
Date:February 2025
Formats:txt html pdf xml json
Status:INFORMATIONAL
DOI:10.17487/RFC 9707
The "Barriers to Internet Access of Services (BIAS)" workshop was convened by the Internet Architecture Board (IAB) from January 15-17,2024 as a three-day online meeting. Based on the submitted position papers, the workshop covered three areas of interest: the role ofCommunity Networks in Internet access of services, reports and comments on the observed digital divide, and measurements of censorship and censorship circumvention. This report summarizes the workshop's discussions and serves as a reference for reports on the current barriers to Internet access.

Note that this document is a report on the proceedings of the workshop. The views and positions documented in this report were expressed during the workshop by participants and do not necessarily reflect the IAB's views and positions.

 
RFC 9708 Use of the HSS/LMS Hash-Based Signature Algorithm in the Cryptographic Message Syntax (CMS)
 
Authors:R. Housley.
Date:January 2025
Formats:txt pdf xml json html
Obsoletes:RFC 8708
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9708
This document specifies the conventions for using the HierarchicalSignature System (HSS) / Leighton-Micali Signature (LMS) hash-based signature algorithm with the Cryptographic Message Syntax (CMS). In addition, the algorithm identifier and public key syntax are provided. The HSS/LMS algorithm is one form of hash-based digital signature; it is described in RFC 8554. This document obsoletes RFC8708.
 
RFC 9709 Encryption Key Derivation in the Cryptographic Message Syntax (CMS) Using HKDF with SHA-256
 
Authors:R. Housley.
Date:January 2025
Formats:txt json pdf xml html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9709
This document specifies the derivation of the content-encryption key or the content-authenticated-encryption key in the CryptographicMessage Syntax (CMS) using the HMAC-based Extract-and-Expand KeyDerivation Function (HKDF) with SHA-256. The use of this mechanism provides protection against an attacker that manipulates the content- encryption algorithm identifier or the content-authenticated- encryption algorithm identifier.
 
RFC 9710 Simple Fixes to the IP Flow Information Export (IPFIX) Entities IANA Registry
 
Authors:M. Boucadair, B. Claise.
Date:February 2025
Formats:txt xml pdf json html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9710
This document provides simple fixes to the IANA "IP Flow InformationExport (IPFIX) Entities" registry. Specifically, this document provides updates to fix shortcomings in the description of someInformation Elements (IEs), to ensure a consistent structure when citing an existing IANA registry, and to fix broken pointers, orphaned section references, etc. The updates are also meant to bring some consistency among the entries of the registry.
 
RFC 9712 IETF Meeting Venue Requirements Review
 
Authors:J. Daley, S. Turner.
Date:January 2025
Formats:txt html json pdf xml
Updates:RFC 8718, RFC 8719
Also:BCP 0226
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 9712
Following a review of the IETF meeting venue requirements, this document updates RFC 8718 ("IETF Plenary Meeting Venue SelectionProcess"), clarifies how the IETF Administration Support Activity(IASA) should interpret some elements of RFC 8718, and specifies a replacement exploratory meeting process, thereby updating RFC 8719("High-Level Guidance for the Meeting Policy of the IETF").
 
RFC 9713 Bundle Protocol Version 7 Administrative Record Types Registry
 
Authors:B. Sipos.
Date:January 2025
Formats:txt html pdf xml json
Updates:RFC 9171
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9713
This document updates RFC 9171 to clarify that Bundle ProtocolVersion 7 agents are expected to use the IANA "Bundle AdministrativeRecord Types" registry to identify and document administrative record types. This document also designates code points for Private andExperimental Use.
 
RFC 9714 Encapsulation for MPLS Performance Measurement with the Alternate-Marking Method
 
Authors:W. Cheng, Ed., X. Min, Ed., T. Zhou, J. Dai, Y. Peleg.
Date:February 2025
Formats:txt json html pdf xml
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9714
This document defines the encapsulation for MPLS performance measurement with the Alternate-Marking Method, which performs flow- based packet loss, delay, and jitter measurements on MPLS traffic.
 
RFC 9715 IP Fragmentation Avoidance in DNS over UDP
 
Authors:K. Fujiwara, P. Vixie.
Date:January 2025
Formats:txt json pdf xml html
Status:INFORMATIONAL
DOI:10.17487/RFC 9715
The widely deployed Extension Mechanisms for DNS (EDNS(0)) feature in the DNS enables a DNS receiver to indicate its received UDP message size capacity, which supports the sending of large UDP responses by aDNS server. Large DNS/UDP messages are more likely to be fragmented, and IP fragmentation has exposed weaknesses in application protocols.It is possible to avoid IP fragmentation in DNS by limiting the response size where possible and signaling the need to upgrade fromUDP to TCP transport where necessary. This document describes techniques to avoid IP fragmentation in DNS.
 
RFC 9716 Mechanisms for MPLS Ping and Traceroute Procedures in Inter-Domain Segment Routing Networks
 
Authors:S. Hegde, K. Arora, M. Srivastava, S. Ninan, N. Kumar.
Date:February 2025
Formats:txt xml html pdf json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9716
The Segment Routing (SR) architecture leverages source routing and can be directly applied to the use of an MPLS data plane. A SegmentRouting over MPLS (SR-MPLS) network may consist of multiple IGP domains or multiple Autonomous Systems (ASes) under the control of the same organization. It is useful to have the Label Switched Path(LSP) ping and traceroute procedures when an SR end-to-end path traverses multiple ASes or IGP domains. This document outlines mechanisms to enable efficient LSP ping and traceroute procedures in inter-AS and inter-domain SR-MPLS networks. This is achieved through a straightforward extension to the Operations, Administration, andMaintenance (OAM) protocol, relying solely on data plane forwarding for handling echo replies on transit nodes.
 
RFC 9717 A Routing Architecture for Satellite Networks
 
Authors:T. Li.
Date:January 2025
Formats:txt xml pdf html json
Status:INFORMATIONAL
DOI:10.17487/RFC 9717
Satellite networks present some interesting challenges for packet networking. The entire topology is continually in motion, with links far less reliable than what is common in terrestrial networks. Some changes to link connectivity can be anticipated due to orbital dynamics.

This document proposes a scalable routing architecture for satellite networks based on existing routing protocols and mechanisms that is enhanced with scheduled link connectivity change information. This document proposes no protocol changes.

This document presents the author's view and is neither the product of the IETF nor a consensus view of the community.

 
RFC 9718 DNSSEC Trust Anchor Publication for the Root Zone
 
Authors:J. Abley, J. Schlyter, G. Bailey, P. Hoffman.
Date:January 2025
Formats:txt xml json pdf html
Obsoletes:RFC 7958
Status:INFORMATIONAL
DOI:10.17487/RFC 9718
The root zone of the global Domain Name System (DNS) is cryptographically signed using DNS Security Extensions (DNSSEC).

In order to obtain secure answers from the root zone of the DNS usingDNSSEC, a client must configure a suitable trust anchor. This document describes the format and publication mechanisms IANA uses to distribute the DNSSEC trust anchors.

This document obsoletes RFC 7958.

 
RFC 9720 RFC Formats and Versions
 
Authors:P. Hoffman, H. Flanagan.
Date:January 2025
Formats:txt json pdf xml html
Obsoletes:RFC 7990
Updates:RFC 9280
Status:INFORMATIONAL
DOI:10.17487/RFC 9720
In order to improve the readability of RFCs while supporting their archivability, the definitive version of the RFC Series transitioned from plain-text ASCII to XML using the RFCXML vocabulary; different publication versions are rendered from that base document. This document describes how RFCs are published.

This document obsoletes RFC 7990. This document also updates the stability policy in RFC 9280.

 
RFC 9729 The Concealed HTTP Authentication Scheme
 
Authors:D. Schinazi, D. Oliver, J. Hoyland.
Date:February 2025
Formats:txt json pdf xml html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9729
Most HTTP authentication schemes are probeable in the sense that it is possible for an unauthenticated client to probe whether an origin serves resources that require authentication. It is possible for an origin to hide the fact that it requires authentication by not generating Unauthorized status codes; however, that only works with non-cryptographic authentication schemes: cryptographic signatures require a fresh nonce to be signed. Prior to this document, there was no existing way for the origin to share such a nonce without exposing the fact that it serves resources that require authentication. This document defines a new non-probeable cryptographic authentication scheme.
 
RFC 9730 Interworking of GMPLS Control and Centralized Controller Systems
 
Authors:H. Zheng, Y. Lin, Y. Zhao, Y. Xu, D. Beller.
Date:March 2025
Formats:txt json html xml pdf
Status:INFORMATIONAL
DOI:10.17487/RFC 9730
Generalized Multiprotocol Label Switching (GMPLS) control allows each network element (NE) to perform local resource discovery, routing, and signaling in a distributed manner.

The advancement of software-defined transport networking technology enables a group of NEs to be managed through centralized controller hierarchies. This helps to tackle challenges arising from multiple domains, vendors, and technologies. An example of such a centralized architecture is the Abstraction and Control of Traffic-EngineeredNetworks (ACTN) controller hierarchy, as described in RFC 8453.

Both the distributed and centralized control planes have their respective advantages and should complement each other in the system, rather than compete. This document outlines how the GMPLS distributed control plane can work together with a centralized controller system in a transport network.

 
RFC 9733 BRSKI with Alternative Enrollment (BRSKI-AE)
 
Authors:D. von Oheimb, Ed., S. Fries, H. Brockhaus.
Date:March 2025
Formats:txt pdf xml html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9733
This document defines enhancements to the Bootstrapping Remote SecureKey Infrastructure (BRSKI) protocol, known as BRSKI with AlternativeEnrollment (BRSKI-AE). BRSKI-AE extends BRSKI to support certificate enrollment mechanisms instead of the originally specified use ofEnrollment over Secure Transport (EST). It supports certificate enrollment protocols such as the Certificate Management Protocol(CMP) that use authenticated self-contained signed objects for certification messages, allowing for flexibility in network device onboarding scenarios. The enhancements address use cases where the existing enrollment mechanism may not be feasible or optimal, providing a framework for integrating suitable alternative enrollment protocols. This document also updates the BRSKI reference architecture to accommodate these alternative methods, ensuring secure and scalable deployment across a range of network environments.
 
RFC 9734 X.509 Certificate Extended Key Usage (EKU) for Instant Messaging URIs
 
Authors:R. Mahy.
Date:February 2025
Formats:txt pdf json xml html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9734
RFC 5280 specifies several extended key purpose identifiers(KeyPurposeIds) for X.509 certificates. This document defines anInstant Messaging (IM) identity KeyPurposeId for inclusion in theExtended Key Usage (EKU) extension of X.509 v3 public key certificates
 
RFC 9735 Locator/ID Separation Protocol (LISP) Distinguished Name Encoding
 
Authors:D. Farinacci, L. Iannone, Ed..
Date:February 2025
Formats:txt pdf json xml html
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9735
This document defines how to use the Address Family Identifier (AFI)17 "Distinguished Name" in the Locator/ID Separation Protocol (LISP).LISP introduces two new numbering spaces: Endpoint Identifiers (EIDs) and Routing Locators (RLOCs). Distinguished Names (DNs) can be used in either EID-Records or RLOC-Records in LISP control messages to convey additional information.
 
RFC 9736 The BGP Monitoring Protocol (BMP) Peer Up Message Namespace
 
Authors:J. Scudder, P. Lucente.
Date:March 2025
Formats:txt html xml pdf json
Updates:RFC 7854, RFC 8671, RFC 9069
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9736
RFC 7854, the BGP Monitoring Protocol (BMP), uses different message types for different purposes. Most of these are structured as Type,Length, Value (TLV). One message type, the Peer Up message, lacks a set of TLVs defined for its use, instead sharing a namespace with theInitiation message. Experience has shown that this namespace sharing was a mistake, as it hampers the extension of the protocol.

This document updates RFC 7854 by creating an independent namespace for the Peer Up message. It also updates RFCs 8671 and 9069 by moving defined codepoints into the newly introduced registry.Compliant implementations of RFCs 7854, 8671, and 9069 also comply with this specification.

 
RFC 9737 Reporting Errors in NFSv4.2 via LAYOUTRETURN
 
Authors:T. Haynes, T. Myklebust.
Date:February 2025
Formats:txt html json xml pdf
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9737
The Parallel Network File System (pNFS) allows for a file's metadata and data to be on different servers (i.e., the metadata server (MDS) and the data server (DS)). When the MDS is restarted, the client can still modify the data file component. During the recovery phase of startup, the MDS and the DSs work together to recover state. If the client has not encountered errors with the data files, then the state can be recovered and the resilvering of the data files can be avoided. With any errors, there is no means by which the client can report errors to the MDS. As such, the MDS has to assume that a file needs resilvering. This document presents an extension to RFC 8435 to allow the client to update the metadata via LAYOUTRETURN and avoid the resilvering.
 
RFC 9738 IMAP MESSAGELIMIT Extension
 
Authors:A. Melnikov, A. P. Achuthan, V. Nagulakonda, L. Alves.
Date:March 2025
Formats:txt json xml pdf html
Status:EXPERIMENTAL
DOI:10.17487/RFC 9738
The MESSAGELIMIT extension of the Internet Message Access Protocol(RFCs 3501 and 9051) allows servers to announce a limit on the number of messages that can be processed in a single FETCH, SEARCH, STORE,COPY, or MOVE command (or their UID variants), or in a single APPEND or UID EXPUNGE command. This helps servers to control resource usage when performing various IMAP operations. This helps clients to know the message limit enforced by the corresponding IMAP server and avoid issuing commands that would exceed such limit.
 
RFC 9739 Protocol Independent Multicast Light (PIM Light)
 
Authors:H. Bidgoli, Ed., S. Venaas, M. Mishra, Z. Zhang, M. McBride.
Date:March 2025
Formats:txt json html xml pdf
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9739
This document specifies Protocol Independent Multicast Light (PIMLight) and the PIM Light Interface (PLI). A PLI does not need a PIMHello message to accept PIM Join/Prune messages, and it can signal multicast states over networks that cannot support full PIM neighbor discovery, such as Bit Index Explicit Replication (BIER) networks that connect two or more PIM domains. This document outlines the PIMLight protocol and procedures to ensure loop-free multicast traffic between two or more PIM Light routers.
 
RFC 9740 New IPFIX Information Elements for TCP Options and IPv6 Extension Headers
 
Authors:M. Boucadair, B. Claise.
Date:March 2025
Formats:txt html pdf xml json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9740
This document specifies new IP Flow Information Export (IPFIX)Information Elements (IEs) to solve issues with existing ipv6ExtensionHeaders and tcpOptions IPFIX IEs, especially the ability to export any observed IPv6 extension headers or TCP options.
 
RFC 9741 Concise Data Definition Language (CDDL): Additional Control Operators for the Conversion and Processing of Text
 
Authors:C. Bormann.
Date:March 2025
Formats:txt pdf xml html json
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9741
The Concise Data Definition Language (CDDL), standardized in RFC8610, provides "control operators" as its main language extension point. RFCs have added to this extension point in both an application-specific and a more general way.

The present document defines a number of additional generally applicable control operators for text conversion (bytes, integers, printf-style formatting, and JSON) and for an operation on text.

 
RFC 9743 Specifying New Congestion Control Algorithms
 
Authors:M. Duke, Ed., G. Fairhurst, Ed..
Date:March 2025
Formats:txt json html xml pdf
Obsoletes:RFC 5033
Also:BCP 0133
Status:BEST CURRENT PRACTICE
DOI:10.17487/RFC 9743
RFC 5033 discusses the principles and guidelines for standardizing new congestion control algorithms. This document obsoletes RFC 5033 to reflect changes in the congestion control landscape by providing a framework for the development and assessment of congestion control mechanisms, promoting stability across diverse network paths. This document seeks to ensure that proposed congestion control algorithms operate efficiently and without harm when used in the globalInternet. It emphasizes the need for comprehensive testing and validation to prevent adverse interactions with existing flows.
 
RFC 9746 BGP EVPN Multihoming Extensions for Split-Horizon Filtering
 
Authors:J. Rabadan, K. Nagaraj, W. Lin, A. Sajassi.
Date:March 2025
Formats:txt pdf json xml html
Updates:RFC 7432, RFC 8365
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9746
An Ethernet Virtual Private Network (EVPN) is commonly used withNetwork Virtualization Overlay (NVO) tunnels as well as with MPLS andSegment Routing (SR) tunnels. The multihoming procedures in EVPN may vary based on the type of tunnel used within the EVPN BroadcastDomain. Specifically, there are two multihoming split-horizon procedures designed to prevent looped frames on multihomed CustomerEdge (CE) devices: the Ethernet Segment Identifier (ESI) Label-based procedure and the local-bias procedure. The ESI Label-based split- horizon procedure is applied to MPLS-based tunnels such as MPLS overUDP (MPLSoUDP), while the local-bias procedure is used for other tunnels such as Virtual eXtensible Local Area Network (VXLAN) tunnels.

Current specifications do not allow operators to choose which split- horizon procedure to use for tunnel encapsulations that support both methods. Examples of tunnels that may support both procedures include MPLSoUDP, MPLS over GRE (MPLSoGRE), Generic NetworkVirtualization Encapsulation (Geneve), and Segment Routing over IPv6(SRv6) tunnels. This document updates the EVPN multihoming procedures described in RFCs 7432 and 8365, enabling operators to select the split-horizon procedure that meets their specific requirements.

 
RFC 9748 Updating the NTP Registries
 
Authors:R. Salz.
Date:February 2025
Formats:txt html pdf xml json
Updates:RFC 5905, RFC 5906, RFC 7821, RFC 7822, RFC 8573
Status:PROPOSED STANDARD
DOI:10.17487/RFC 9748
The Network Time Protocol (NTP) and Network Time Security (NTS) documents define a number of registries, collectively called the NTP registries.

Some registries are correct, but some include incorrect assignments and some don't follow common practice. For the sake of completeness, this document reviews all NTP and NTS registries, and corrects the registries where necessary.

This document updates RFCs 5905, 5906, 7821, 7822, and 8573.