<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.18 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-tls12-frozen-01" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.22.0 -->
  <front>
    <title abbrev="tls1.2-frozen">TLS 1.2 is in Feature Freeze</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-tls12-frozen-01"/>
    <author fullname="Rich Salz">
      <organization>Akamai Technologies</organization>
      <address>
        <email>rsalz@akamai.com</email>
      </address>
    </author>
    <author fullname="Nimrod Aviram">
      <organization/>
      <address>
        <email>nimrod.aviram@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="July" day="24"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>TLS</keyword>
    <keyword>features</keyword>
    <abstract>
      <?line 55?>

<t>TLS 1.2 is in widespread use and can be configured such that it provides good
security properties. TLS 1.3 is also in
widespread use and fixes some known deficiencies with TLS 1.2, such as
removing error-prone cryptographic primitives and encrypting more of the traffic
so that it is not readable by outsiders.</t>
      <t>Both versions have several extension points, so items like new cryptographic
algorithms, new supported groups (formerly "named curves"),  etc., can be
added without defining a new protocol. This document specifies that outside of
urgent security fixes, no new features will be approved for TLS 1.2.
This prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-tls12-frozen/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/tls12-frozen"/>.</t>
    </note>
  </front>
  <middle>
    <?line 70?>

<section anchor="sec-reasons">
      <name>Introduction</name>
      <t>TLS 1.2 <xref target="TLS12"/> is in widespread use and can be configured such that it provides good
security properties.</t>
      <t>TLS 1.3 <xref target="TLS13"/> is also in
widespread use and fixes most known deficiencies with TLS 1.2, such as
encrypting more of the traffic so that it is not readable by outsiders and
removing most cryptographic primitives now considered weak. Importantly, TLS
1.3 enjoys robust security proofs and provides excellent security as-is.</t>
      <t>Both versions have several extension points, so items like new cryptographic
algorithms, new supported groups (formerly "named curves"),  etc., can be
added without defining a new protocol. This document specifies that outside of
urgent security fixes, no new features will be approved for TLS 1.2.
This prescription does not pertain to DTLS (in any DTLS version); it pertains to
TLS only.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCPÃÂ 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="implications-for-post-quantum-cryptography">
      <name>Implications for post-quantum cryptography</name>
      <t>Cryptographically relevant quantum computers, once available, will have a
huge impact on RSA, FFDH, and ECC which are currently used in TLS.
In 2016, the US National Institute of Standards and Technology started a
multi-year effort to standardize algorithms that will be "safe"
once quantum computers are feasible <xref target="PQC"/>. First IETF discussions happened
around the same time <xref target="CFRGSLIDES"/>.</t>
      <t>While the industry is waiting for NIST to finish standardization, the
IETF has several efforts underway.
A working group was formed in early 2023 to work on use of PQC in IETF protocols,
<xref target="PQUIPWG"/>.
Several other working groups, including TLS <xref target="TLSWG"/>,
are working on
drafts to support hybrid algorithms and identifiers, for use during a
transition from classic to a post-quantum world.</t>
      <t>For TLS it is important to note that the focus of these efforts is TLS 1.3
or later.
Put bluntly, post-quantum cryptography for
TLS 1.2 WILL NOT be supported (see <xref target="iana"/>).</t>
    </section>
    <section anchor="iana">
      <name>IANA Considerations</name>
      <t>IANA will stop accepting registrations for any TLS parameters <xref target="TLS13REG"/>
except for the following:</t>
      <ul spacing="normal">
        <li>
          <t>TLS Exporter Labels</t>
        </li>
        <li>
          <t>TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs</t>
        </li>
      </ul>
      <t>Entries in any other TLS protocol registry should have an indication like
"For TLS 1.3 or later" in their entry.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="TLS12">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="TLS13">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="TLS13REG">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy. These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="PQC" target="https://csrc.nist.gov/projects/post-quantum-cryptography">
          <front>
            <title>Post-Quantum Cryptography</title>
            <author>
              <organization/>
            </author>
            <date year="2017" month="January"/>
          </front>
        </reference>
        <reference anchor="CFRGSLIDES" target="https://www.ietf.org/proceedings/95/slides/slides-95-cfrg-4.pdf">
          <front>
            <title>Post Quantum Secure Cryptography Discussion</title>
            <author initials="D." surname="McGrew" fullname="David McGrew">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PQUIPWG" target="https://datatracker.ietf.org/wg/pquip/about/">
          <front>
            <title>Post-Quantum Use in Protocols</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TLSWG" target="https://datatracker.ietf.org/wg/tls/about/">
          <front>
            <title>Transport Layer Security</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
      </references>
    </references>
    <?line 146?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>None yet.</t>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAG2QoWYAA+1Y3XLbNha+x1OcVW6SjinXP2kSbbeNKtmOdvwXK55MZ2cv
IBKSUJMAC4BWaI/fZZ+lT9bvgKRkJc62e7Eze7GZyYgEcXD+vvOdAydJIoIO
uRpQ78PplPb6+6Q9aUPHSobKKTp2St2pnpCzmVO32BZyj13J3Nk7ZXoilUEt
rKsHEJpbITKbGlngvMzJeUi0CvMEIvx/r5NKcgj5IHw1K7T32ppQlxCZHH04
FqYqZsoNRIY9A5Fa45XxlR9QcJUSsOBASKckLJmqtHI61D2xsu5m4WxVshtO
Gl9aF+hU1srRZteNqrExGwhKCM7yz7zx0otbZSqoI/rjY4gaa3sfoVWbBZ2w
CK8XUudNhN6y333rFry80GFZzZoPq8Xu40j0hJBVWFr4m2DnvMrzJnpXOl3S
VOZ3WMUx0ug7GRCoAQ1vJPTQB5Uujc3tQsN6ItXodh4ib2Xc0k9t8dmp57pw
NqPhrXay2EiZuNyXcfntghejsDDWFVB7GyODkO3tw7Lj0cv9w+/ahYO48Ppw
s3B1dNKtvRKCQfHojMv3I/5BCKVbqDCgZQilH+zupt6lfaN96C/s7W7p7C8q
DX63tD4kv1bShKpIUleXwS6cLJd1PCRChP4uTSVdvUP73+69ag5vEH3Jwu8b
YRptC4+Or06mp5Px0fRpe1arVb/LIZuTKpUh1373zctdn+tM+fYnefMySedu
kRz2y2z+uXrq1Ef4qC0raKx9WkX4R7EOCBT/aQPIj/t0lp44tWoXmyyOkahs
8+Hy/fXk8uPJ034gRDI4md4ot/EHICx/rXS5K2e2Crtfjdm1V0wFl84Gm9rc
Nyn+T1UB708o+lp9CZEkCcmZ56OCENustOKQlyj/jCoYJ01GqTQ0UwSimOsF
YpyRr1A7YSkD6UDI3S0L0cLaTPhWCy+XygUUT58aFQesQubeQo94Qs9cf8Ip
3haKboxdGcrUXKdaGfz3MCws24P2dxoLpBdOFdAOilDOWZdAqYGlGwzoFIbo
QnN5+KgFx/FnliksAGPn8ESB++Qc2gSs6xyDtcYGYhvlLFc0qwkx9jDc+b4Q
P1kYdItnwMvTUt4q8grvMif1KYBSsU6l1SZ42Aungyo85fpGkVGrbSOFzEHx
8LDAXv7qq5JTh1hHuvT0nKtcubymHmMUWakcXOq92AHJhLS/06ZJyCzDV44W
jI0hNOyrjMeWLdCQkiXcQyupCmUC+VKles5hjs63biI2ogIEeUOX1pgk2Gjj
eR27Q1+eM0hkyXCAATC3y1ZfRGVItk+dLplkoVk10WWMSOAuWBrz/ud4lqZu
XtrovvhrxFmzEybaiFlr8rrfgLnQWZYrIZ7RxAQQbZVGJffPYHaC/Hlk6GGD
9Pv7yLQPD/9FzHfaDlptB422P4R/wZz2p+H/78FMfxLMrH5TSdGCr5YQLOOo
REHGmZI3fZoUDFZQWo4mwY2f/VbmF1t7cnZW+UcAQozsvCnFdRTVp1Tl+RbO
pE/0/6vsf6bKntHIGoxwIaaBkzeOPsd3YB2gw/BHPP156p1dTz/0dppfOr+I
z1dH6KJXR2N+nr4bnp6uH0S7Y/ru4vp0vHnaSI4uzs6OzseNMFZpa0n0zoY/
4wtb1bu4/DC5OB+e9riww1b4MdRyAGbccoNyiBRnHlWUxZDN8AKZn0aXv/1r
7xBl+xfMWPt7e29Quc3L671Xh3hZLZVptHFw2leUXS2QFyUdnyKRqFSWOqDg
sRdtbcklvUTRIJrf/IMj888BfT9Ly73DH9oFdnhrsYvZ1mKM2ZcrXwg3QXxi
6Qk162hurX8W6W17hz9vvXdxf7T4/Y+5RjdO9l7/+IOI5FyUuU5lgyGG7uPh
k7aGTzF6XLiIZg3qytUtttJawBZlhUQiwNakqIpbjNVMbjtNoUSykGJZLZDx
osSwg310NR3u0PHx+F2TwqPRCBnkuwDDA+XnFNMYs3KEA2qgLyaGR9/vYpbp
ekrn0QdQ0MR4TFswgpl3CgbMJBcAH7y+PtTkMchFqImiyoNOagaJms95NgMg
fSun72DumqEajugqvuflHHfE6OcX/kfTQRJeM7Pf3+MO8PDQp2PtQLx85aNs
PQgzhwKlRmW45NkKhrJPHmSHubFg6c3gjkOE+LjUOJQ3aZOByV3NvWQldew6
nMXzCaALP5gP/PKROzFKMWgiWrHkOujIO7rvCRYot5LgmCGzR7zuRTKGigiS
oskDQoas7H+7f8CqeCcnk3snIg+HeU9U0pGv3xEciTi5syPTVjH6CYbhLVUA
kDZpXvH9I9JpbNkstsM34fVmXCPindvHrDW9g5b1zOGy8ChxnH3wOrgSXM/o
5CCxpRnInZuECDyaR+4k3FKRyVwiOSkfK7eLAqrzDFk4bom+6eS667csAX5X
DVg4SXOwnW/nAKjswgyhdh4ROIn/OuD64hKta5ZXTdv+ai2y+evR6eOkYRrG
5KZ7PveKkaOlkQ8PL2K7mAzPh9wz4qDQlvz9s7hDiPgxQtsHW5JMU9UMMU4t
NN9LNhTBXYqVlxI3ZxXR3g5UuAY/PAgeHcoQtzbu57ld4agBJsMoePQpGulw
C5op3LCa1WG5pqKkuR51dzA6VwsbdPxEz4enl+cvNt8mYzS7I8yY3MTbHtoA
KtrYbWvdqJn1qzxrmchwBbVK44Qiesfr/n1AXV7azqU0OAKauhl3hnsfB3aY
8nSYq2zBTc2L+0Hz9xyV/a03R7dRPQT4nK9BtQp98TsI5oVtgBIAAA==

-->

</rfc>
