<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.6.1 (Ruby 2.7.0) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-aviram-tls-deprecate-obsolete-kex-01" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.3 -->
  <front>
    <title abbrev="Deprecating RSA and FFDH(E)">Deprecating Obsolete Key Exchange Methods in TLS</title>
    <seriesInfo name="Internet-Draft" value="draft-aviram-tls-deprecate-obsolete-kex-01"/>
    <author initials="C." surname="Bartle" fullname="Carrick Bartle">
      <organization>Apple, Inc.</organization>
      <address>
        <email>cbartle@apple.com</email>
      </address>
    </author>
    <author initials="N." surname="Aviram" fullname="Nimrod Aviram">
      <organization/>
      <address>
        <email>nimrod.aviram@gmail.com</email>
      </address>
    </author>
    <date year="2022" month="February" day="25"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document makes several prescriptions regarding the following key exchange
methods in TLS, most of which have been superseded by better options:</t>
      <ol spacing="normal" type="1"><li>This document deprecates the use of RSA key exchange in TLS.</li>
        <li>It limits the use of Diffie Hellman key exchange over a finite field to avoid
known vulnerabilities and improper security properties.</li>
        <li>It discourages the use of static elliptic curve Diffie Hellman cipher suites.</li>
      </ol>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>TLS supports a variety of key exchange algorithms, including RSA, Diffie Hellman
over a finite field, and elliptic curve Diffie Hellman (ECDH).</t>
      <t>Diffie Hellman key exchange, over any group, comes in ephemeral and
non-ephemeral varieties. Non-ephemeral DH algorithms use static DH public keys
included in the authenticating peer's certificate; see <xref target="RFC4492"/> for discussion.
In contrast, ephemeral DH algorithms use ephemeral DH public keys sent in the
handshake and authenticated by the peer's certificate. Ephemeral and
non-ephemeral finite field DH algorithms are called DHE and DH  (or FFDHE and FFDH),
respectively, and ephemeral and non-ephemeral elliptic curve DH algorithms are called
ECDHE and ECDH, respectively <xref target="RFC4492"/>.</t>
      <t>In general, non-ephemeral cipher suites are not recommended due to their lack of
forward secrecy. However, as demonstrated by the <xref target="Raccoon"/> attack on finite-field
DH, public key reuse, either via non-ephemeral cipher suites or reused keys with
ephemeral cipher suites, can lead to timing side channels that may leak connection
secrets. For elliptic curve DH, invalid curve attacks similarly exploit secret
reuse in order to break security <xref target="ICA"/>, further demonstrating the risk of reusing
public keys. While both side channels can be avoided in implementations, experience
shows that in practice, implementations may fail to thwart such attacks due to the
complexity and number of the required mitigations.</t>
      <t>Additionally, RSA key exchange suffers from security problems that are independent
of implementation choices as well as problems that stem purely from the difficulty
of implementing security countermeasures correctly.</t>
      <t>At a rough glance, the problems affecting FFDHE are as follows:</t>
      <ol spacing="normal" type="1"><li>FFDHE suffers from interoperability problems because there is no mechanism for
negotiating the group size, and some implementations only support small group sizes
(see <xref target="RFC7919"/>, Section 1).</li>
        <li>In practice, some operators use 1024-bit FFDHE groups since this is the
maximum size that ensures wide support (see <xref target="RFC7919"/>, Section 1).
This size leaves only a small security margin vs. the current discrete log record,
which stands at 795 bits <xref target="DLOG795"/>.</li>
        <li>Expanding on the previous point, just a handful of very large computations allow
an attacker to cheaply decrypt a relatively large fraction of FFDHE traffic
(namely, traffic encrypted using particular standardized groups) <xref target="weak-dh"/>.</li>
        <li>When secrets are not fully ephemeral, FFDHE suffers from the <xref target="Raccoon"/> side
channel attack. (Note that FFDH is inherently vulnerable to the Raccoon attack
unless constant-time mitigations are employed.)</li>
        <li>FFDHE groups may have small subgroups, which enables several attacks
<xref target="subgroups"/>.</li>
      </ol>
      <t>The problems affecting RSA key exchange are as follows:</t>
      <ol spacing="normal" type="1"><li>RSA key exchange offers no forward secrecy, by construction.</li>
        <li>RSA key exchange may be vulnerable to Bleichenbacher's attack <xref target="BLEI"/>.
Experience shows that variants of this attack arise every few years because
implementing the relevant countermeasure correctly is difficult (see
<xref target="ROBOT"/>, <xref target="NEW-BLEI"/>, <xref target="DROWN"/>).</li>
        <li>In addition to the above point, there is no convenient mechanism in TLS for
the domain separation of keys. Therefore, a single endpoint that is vulnerable to
Bleichenbacher's attack would affect all endpoints sharing the same RSA key (see
<xref target="XPROT"/>, <xref target="DROWN"/>).</li>
      </ol>
      <t>Given these problems, this document updates <xref target="RFC4346"/>, <xref target="RFC5246"/>,
<xref target="RFC4162"/>, <xref target="RFC6347"/>, <xref target="RFC5932"/>, <xref target="RFC5288"/>, <xref target="RFC6209"/>, <xref target="RFC6367"/>,
<xref target="RFC8422"/>, <xref target="RFC5289"/>, and <xref target="RFC5469"/> to deprecate cipher suites with key
reuse.</t>
      <section anchor="requirements">
        <name>Requirements</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="non-ephemeral">
      <name>Non-Ephemeral Diffie Hellman</name>
      <t>Clients MUST NOT offer non-ephemeral FFDH cipher suites in TLS 1.2 connections.
(Note that TLS 1.0 and 1.1 are deprecated by <xref target="RFC8996"/> and TLS 1.3 does not
support FFDH <xref target="RFC8446"/>.) This includes all cipher suites listed in the table in
<xref target="appendix-dh"/>.</t>
      <t>Clients SHOULD NOT offer non-ephemeral ECDH cipher suites in TLS 1.2
connections. (Note that TLS 1.0 and 1.1 are deprecated by <xref target="RFC8996"/> and
TLS 1.3 does not support ECDH <xref target="RFC8446"/>.) This includes all cipher suites listed
in the table in <xref target="appendix-ecdh"/>.</t>
    </section>
    <section anchor="dhe">
      <name>Ephemeral Finite Field Diffie Hellman</name>
      <t>Clients and servers MAY offer fully ephemeral FFDHE cipher suites in TLS 1.2
connections under the following conditions:</t>
      <ol spacing="normal" type="1"><li>Clients and servers MUST NOT reuse ephemeral DHE public keys across TLS
connections for all existing (and future) TLS versions. Doing so invalidates
forward secrecy properties of these connections. For DHE, such reuse may also
lead to vulnerabilities such as those used in the <xref target="Raccoon"/> attack. See
<xref target="sec-considerations"/> for related discussion.</li>
        <li>The group is one of the following well-known groups described in <xref target="RFC7919"/>:
ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192.</li>
      </ol>
      <t>(Note that TLS 1.0 and 1.1 are deprecated by <xref target="RFC8996"/>. TLS 1.3 satisfies the
second point above <xref target="RFC8446"/> and is not vulnerable to the <xref target="Raccoon"/> Attack.)</t>
      <t>We note that, previously, supporting the broadest range of clients would have
required supporting either RSA key exchange or 1024-bit FFDHE. This is no longer
the case, and it is possible to support most clients released since circa 2015
using 2048-bit FFDHE or more modern key exchange methods, and without RSA key
exchange <xref target="server_side_tls"/>.</t>
      <t>All the cipher suites that do not meet the above requirements are listed in the
table in <xref target="appendix-dhe"/>.</t>
    </section>
    <section anchor="rsa">
      <name>RSA</name>
      <t>Clients and servers MUST NOT offer RSA cipher suites in TLS 1.2 connections. (Note
that TLS 1.0 and 1.1 are deprecated by <xref target="RFC8996"/>, and TLS 1.3 does not support
static RSA <xref target="RFC8446"/>.) This includes all cipher suites listed in the table in
<xref target="appendix-rsa"/>. Note that these cipher suites are already marked as not
recommended in the "TLS Cipher Suites" registry.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests to IANA. Note that all cipher suites listed in
<xref target="rsa"/> and in <xref target="non-ephemeral"/> are already marked as not recommended in the
"TLS Cipher Suites" registry.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>Non-ephemeral finite field DH cipher suites (TLS_DH_*), as well as ephemeral key reuse
for finite field DH cipher suites, are prohibited due to the <xref target="Raccoon"/> attack. Both are
already considered bad practice since they do not provide forward secrecy. However,
Raccoon revealed that timing side channels in processing TLS premaster secrets may be
exploited to reveal the encrypted premaster secret.</t>
      <t>As for non-ephemeral elliptic curve DH cipher suites, forgoing forward secrecy
not only allows retroactive decryption in the event of key compromise but may
also enable a broad category of attacks where the attacker exploits key reuse
to repeatedly query a cryptographic secret.</t>
      <t>This category includes, but is not necessarily limited to, the following
examples:</t>
      <ol spacing="normal" type="1"><li>Invalid curve attacks, where the attacker exploits key reuse to repeatedly
query and eventually learn the key itself. These attacks have been shown to be
practical against real-world TLS implementations <xref target="ICA"/>.</li>
        <li>Side channel attacks, where the attacker exploits key reuse and an additional
side channel to learn a cryptographic secret. As one example of such attacks,
refer to <xref target="MAY4"/>.</li>
        <li>Fault attacks, where the attacker exploits key reuse and incorrect
calculations to learn a cryptographic secret. As one example of such attacks,
see <xref target="PARIS256"/>.</li>
      </ol>
      <t>Such attacks are often implementation-dependent, including the above examples.
However, these examples demonstrate that building a system that reuses keys and
avoids this category of attacks is difficult in practice. In contrast, avoiding
key reuse not only prevents decryption in the event of key compromise, but also
precludes this category of attacks altogether. Therefore, this document
discourages the reuse of elliptic curve DH public keys.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document was inspired by discussions on the TLS WG mailing list and
a suggestion by Filippo Valsorda following the release of the <xref target="Raccoon"/> attack.
Thanks to Christopher A. Wood for writing up the initial draft of this document.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC7919" target="https://www.rfc-editor.org/info/rfc7919">
          <front>
            <title>Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for Transport Layer Security (TLS)</title>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor">
              <organization/>
            </author>
            <date month="August" year="2016"/>
            <abstract>
              <t>Traditional finite-field-based Diffie-Hellman (DH) key exchange during the Transport Layer Security (TLS) handshake suffers from a number of security, interoperability, and efficiency shortcomings. These shortcomings arise from lack of clarity about which DH group parameters TLS servers should offer and clients should accept.  This document offers a solution to these shortcomings for compatible peers by using a section of the TLS "Supported Groups Registry" (renamed from "EC Named Curve Registry" by this document) to establish common finite field DH parameters with known structure and a mechanism for peers to negotiate support for these groups.</t>
              <t>This document updates TLS versions 1.0 (RFC 2246), 1.1 (RFC 4346), and 1.2 (RFC 5246), as well as the TLS Elliptic Curve Cryptography (ECC) extensions (RFC 4492).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7919"/>
          <seriesInfo name="DOI" value="10.17487/RFC7919"/>
        </reference>
        <reference anchor="RFC4346" target="https://www.rfc-editor.org/info/rfc4346">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.1</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document specifies Version 1.1 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4346"/>
          <seriesInfo name="DOI" value="10.17487/RFC4346"/>
        </reference>
        <reference anchor="RFC5246" target="https://www.rfc-editor.org/info/rfc5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC4162" target="https://www.rfc-editor.org/info/rfc4162">
          <front>
            <title>Addition of SEED Cipher Suites to Transport Layer Security (TLS)</title>
            <author fullname="H.J. Lee" initials="H.J." surname="Lee">
              <organization/>
            </author>
            <author fullname="J.H. Yoon" initials="J.H." surname="Yoon">
              <organization/>
            </author>
            <author fullname="J.I. Lee" initials="J.I." surname="Lee">
              <organization/>
            </author>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document proposes the addition of new cipher suites to the Transport Layer Security (TLS) protocol to support the SEED encryption algorithm as a bulk cipher algorithm.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4162"/>
          <seriesInfo name="DOI" value="10.17487/RFC4162"/>
        </reference>
        <reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu">
              <organization/>
            </author>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.  This document updates DTLS 1.0 to work with TLS version 1.2.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC5932" target="https://www.rfc-editor.org/info/rfc5932">
          <front>
            <title>Camellia Cipher Suites for TLS</title>
            <author fullname="A. Kato" initials="A." surname="Kato">
              <organization/>
            </author>
            <author fullname="M. Kanda" initials="M." surname="Kanda">
              <organization/>
            </author>
            <author fullname="S. Kanno" initials="S." surname="Kanno">
              <organization/>
            </author>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document specifies a set of cipher suites for the Transport Security Layer (TLS) protocol to support the Camellia encryption algorithm as a block cipher.  It amends the cipher suites originally specified in RFC 4132 by introducing counterparts using the newer cryptographic hash algorithms from the SHA-2 family.  This document obsoletes RFC 4132. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5932"/>
          <seriesInfo name="DOI" value="10.17487/RFC5932"/>
        </reference>
        <reference anchor="RFC5288" target="https://www.rfc-editor.org/info/rfc5288">
          <front>
            <title>AES Galois Counter Mode (GCM) Cipher Suites for TLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="A. Choudhury" initials="A." surname="Choudhury">
              <organization/>
            </author>
            <author fullname="D. McGrew" initials="D." surname="McGrew">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This memo describes the use of the Advanced Encryption Standard (AES) in Galois/Counter Mode (GCM) as a Transport Layer Security (TLS) authenticated encryption operation.  GCM provides both confidentiality and data origin authentication, can be efficiently implemented in hardware for speeds of 10 gigabits per second and above, and is also well-suited to software implementations.  This memo defines TLS cipher suites that use AES-GCM with RSA, DSA, and Diffie-Hellman-based key exchange mechanisms.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5288"/>
          <seriesInfo name="DOI" value="10.17487/RFC5288"/>
        </reference>
        <reference anchor="RFC6209" target="https://www.rfc-editor.org/info/rfc6209">
          <front>
            <title>Addition of the ARIA Cipher Suites to Transport Layer Security (TLS)</title>
            <author fullname="W. Kim" initials="W." surname="Kim">
              <organization/>
            </author>
            <author fullname="J. Lee" initials="J." surname="Lee">
              <organization/>
            </author>
            <author fullname="J. Park" initials="J." surname="Park">
              <organization/>
            </author>
            <author fullname="D. Kwon" initials="D." surname="Kwon">
              <organization/>
            </author>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document specifies a set of cipher suites for the Transport Layer Security (TLS) protocol to support the ARIA encryption algorithm as a block cipher.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6209"/>
          <seriesInfo name="DOI" value="10.17487/RFC6209"/>
        </reference>
        <reference anchor="RFC6367" target="https://www.rfc-editor.org/info/rfc6367">
          <front>
            <title>Addition of the Camellia Cipher Suites to Transport Layer Security (TLS)</title>
            <author fullname="S. Kanno" initials="S." surname="Kanno">
              <organization/>
            </author>
            <author fullname="M. Kanda" initials="M." surname="Kanda">
              <organization/>
            </author>
            <date month="September" year="2011"/>
            <abstract>
              <t>This document specifies forty-two cipher suites for the Transport Security Layer (TLS) protocol to support the Camellia encryption algorithm as a block cipher.  This document is not an Internet  Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6367"/>
          <seriesInfo name="DOI" value="10.17487/RFC6367"/>
        </reference>
        <reference anchor="RFC8422" target="https://www.rfc-editor.org/info/rfc8422">
          <front>
            <title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir">
              <organization/>
            </author>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <author fullname="M. Pegourie-Gonnard" initials="M." surname="Pegourie-Gonnard">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol.  In particular, it specifies the use of Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement in a TLS handshake and the use of the Elliptic Curve Digital Signature Algorithm (ECDSA) and Edwards-curve Digital Signature Algorithm (EdDSA) as authentication mechanisms.</t>
              <t>This document obsoletes RFC 4492.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8422"/>
          <seriesInfo name="DOI" value="10.17487/RFC8422"/>
        </reference>
        <reference anchor="RFC5289" target="https://www.rfc-editor.org/info/rfc5289">
          <front>
            <title>TLS Elliptic Curve Cipher Suites with SHA-256/384 and AES Galois Counter Mode (GCM)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>RFC 4492 describes elliptic curve cipher suites for Transport Layer Security (TLS).  However, all those cipher suites use HMAC-SHA-1 as their Message Authentication Code (MAC) algorithm.  This document describes sixteen new cipher suites for TLS that specify stronger MAC algorithms.  Eight use Hashed Message Authentication Code (HMAC) with SHA-256 or SHA-384, and eight use AES in Galois Counter Mode (GCM).   This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5289"/>
          <seriesInfo name="DOI" value="10.17487/RFC5289"/>
        </reference>
        <reference anchor="RFC5469" target="https://www.rfc-editor.org/info/rfc5469">
          <front>
            <title>DES and IDEA Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="P. Eronen" initials="P." role="editor" surname="Eronen">
              <organization/>
            </author>
            <date month="February" year="2009"/>
            <abstract>
              <t>Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346) include cipher suites based on DES (Data Encryption Standard) and IDEA (International Data Encryption Algorithm) algorithms.  DES (when used in single-DES mode) and IDEA are no longer recommended for general use in TLS, and have been removed from TLS version 1.2 (RFC 5246).  This document specifies these cipher suites for completeness and discusses reasons why their use is no longer recommended.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5469"/>
          <seriesInfo name="DOI" value="10.17487/RFC5469"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8996" target="https://www.rfc-editor.org/info/rfc8996">
          <front>
            <title>Deprecating TLS 1.0 and TLS 1.1</title>
            <author fullname="K. Moriarty" initials="K." surname="Moriarty">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <date month="March" year="2021"/>
            <abstract>
              <t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance. </t>
              <t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
              <t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="8996"/>
          <seriesInfo name="DOI" value="10.17487/RFC8996"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC4785" target="https://www.rfc-editor.org/info/rfc4785">
          <front>
            <title>Pre-Shared Key (PSK) Ciphersuites with NULL Encryption for Transport Layer Security (TLS)</title>
            <author fullname="U. Blumenthal" initials="U." surname="Blumenthal">
              <organization/>
            </author>
            <author fullname="P. Goel" initials="P." surname="Goel">
              <organization/>
            </author>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document specifies authentication-only ciphersuites (with no encryption) for the Pre-Shared Key (PSK) based Transport Layer Security (TLS) protocol.  These ciphersuites are useful when authentication and integrity protection is desired, but confidentiality is not needed or not permitted.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4785"/>
          <seriesInfo name="DOI" value="10.17487/RFC4785"/>
        </reference>
        <reference anchor="RFC4279" target="https://www.rfc-editor.org/info/rfc4279">
          <front>
            <title>Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)</title>
            <author fullname="P. Eronen" initials="P." role="editor" surname="Eronen">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig">
              <organization/>
            </author>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document specifies three sets of new ciphersuites for the Transport Layer Security (TLS) protocol to support authentication based on pre-shared keys (PSKs).  These pre-shared keys are symmetric keys, shared in advance among the communicating parties.  The first set of ciphersuites uses only symmetric key operations for authentication. The second set uses a Diffie-Hellman exchange authenticated with a pre-shared key, and the third set combines public key authentication of the server with pre-shared key authentication of the client.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4279"/>
          <seriesInfo name="DOI" value="10.17487/RFC4279"/>
        </reference>
        <reference anchor="RFC5487" target="https://www.rfc-editor.org/info/rfc5487">
          <front>
            <title>Pre-Shared Key Cipher Suites for TLS with SHA-256/384 and AES Galois Counter Mode</title>
            <author fullname="M. Badra" initials="M." surname="Badra">
              <organization/>
            </author>
            <date month="March" year="2009"/>
            <abstract>
              <t>RFC 4279 and RFC 4785 describe pre-shared key cipher suites for Transport Layer Security (TLS).  However, all those cipher suites use SHA-1 in their Message Authentication Code (MAC) algorithm.  This document describes a set of pre-shared key cipher suites for TLS that uses stronger digest algorithms (i.e., SHA-256 or SHA-384) and another set that uses the Advanced Encryption Standard (AES) in Galois Counter Mode (GCM).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5487"/>
          <seriesInfo name="DOI" value="10.17487/RFC5487"/>
        </reference>
        <reference anchor="RFC6655" target="https://www.rfc-editor.org/info/rfc6655">
          <front>
            <title>AES-CCM Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew">
              <organization/>
            </author>
            <author fullname="D. Bailey" initials="D." surname="Bailey">
              <organization/>
            </author>
            <date month="July" year="2012"/>
            <abstract>
              <t>This memo describes the use of the Advanced Encryption Standard (AES) in the Counter with Cipher Block Chaining - Message Authentication Code (CBC-MAC) Mode (CCM) of operation within Transport Layer Security (TLS) and Datagram TLS (DTLS) to provide confidentiality and data origin authentication.  The AES-CCM algorithm is amenable to compact implementations, making it suitable for constrained environments.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6655"/>
          <seriesInfo name="DOI" value="10.17487/RFC6655"/>
        </reference>
        <reference anchor="RFC7905" target="https://www.rfc-editor.org/info/rfc7905">
          <front>
            <title>ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <author fullname="W. Chang" initials="W." surname="Chang">
              <organization/>
            </author>
            <author fullname="N. Mavrogiannopoulos" initials="N." surname="Mavrogiannopoulos">
              <organization/>
            </author>
            <author fullname="J. Strombergson" initials="J." surname="Strombergson">
              <organization/>
            </author>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document describes the use of the ChaCha stream cipher and Poly1305 authenticator in the Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) protocols.</t>
              <t>This document updates RFCs 5246 and 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7905"/>
          <seriesInfo name="DOI" value="10.17487/RFC7905"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="Raccoon" target="https://raccoon-attack.com/RacoonAttack.pdf">
          <front>
            <title>Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)</title>
            <author initials="R." surname="Merget">
              <organization/>
            </author>
            <author initials="M." surname="Brinkmann">
              <organization/>
            </author>
            <author initials="N." surname="Aviram">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="J." surname="Mittmann">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <date year="2020" month="September" day="09"/>
          </front>
        </reference>
        <reference anchor="ICA" target="https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.704.7932&amp;rep=rep1&amp;type=pdf">
          <front>
            <title>Practical invalid curve attacks on TLS-ECDH</title>
            <author initials="T." surname="Jager">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <date year="2015" month="September" day="21"/>
          </front>
        </reference>
        <reference anchor="weak-dh" target="https://weakdh.org/">
          <front>
            <title>Weak Diffie-Hellman and the Logjam Attack</title>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan">
              <organization/>
            </author>
            <author initials="Z." surname="Durumeric">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="M." surname="Green">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="D." surname="Springall">
              <organization/>
            </author>
            <author initials="E." surname="Thomé">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="B." surname="VanderSloot">
              <organization/>
            </author>
            <author initials="E." surname="Wustrow">
              <organization/>
            </author>
            <author initials="S." surname="Zanella-Béguelin">
              <organization/>
            </author>
            <author initials="P." surname="Zimmermann">
              <organization/>
            </author>
            <date year="2015" month="October"/>
          </front>
        </reference>
        <reference anchor="subgroups" target="https://eprint.iacr.org/2016/995/20161017:193515">
          <front>
            <title>Measuring small subgroup attacks against Diffie-Hellman</title>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="A." surname="Sanso">
              <organization/>
            </author>
            <author initials="S." surname="Cohney">
              <organization/>
            </author>
            <author initials="J." surname="Fried">
              <organization/>
            </author>
            <author initials="M." surname="Hastings">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <date year="2016" month="October" day="15"/>
          </front>
        </reference>
        <reference anchor="BLEI">
          <front>
            <title>Chosen Ciphertext Attacks against Protocols Based on RSA Encryption Standard PKCS #1</title>
            <author initials="D." surname="Bleichenbacher">
              <organization/>
            </author>
            <date year="1998"/>
          </front>
          <seriesInfo name="Advances in Cryptology -- CRYPTO'98, LNCS vol. 1462, pages: 1-12" value=""/>
        </reference>
        <reference anchor="ROBOT">
          <front>
            <title>Return Of Bleichenbacher's Oracle Threat (ROBOT)</title>
            <author initials="H." surname="Boeck">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="C." surname="Young">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
          <seriesInfo name="27th USENIX Security Symposium" value=""/>
        </reference>
        <reference anchor="NEW-BLEI" target="https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-meyer.pdf">
          <front>
            <title>Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks</title>
            <author initials="C." surname="Meyer">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="E." surname="Weiss">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <author initials="S." surname="Schinzel">
              <organization/>
            </author>
            <author initials="E." surname="Tews">
              <organization/>
            </author>
            <date year="2014" month="August"/>
          </front>
        </reference>
        <reference anchor="DROWN" target="https://drownattack.com/drown-attack-paper.pdf">
          <front>
            <title>DROWN: Breaking TLS using SSLv2</title>
            <author initials="N." surname="Aviram">
              <organization/>
            </author>
            <author initials="S." surname="Schinzel">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="M." surname="Dankel">
              <organization/>
            </author>
            <author initials="J." surname="Steube">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="V." surname="Dukhovni">
              <organization/>
            </author>
            <author initials="E." surname="Käsper">
              <organization/>
            </author>
            <author initials="S." surname="Cohney">
              <organization/>
            </author>
            <author initials="S." surname="Engels">
              <organization/>
            </author>
            <author initials="C." surname="Paar">
              <organization/>
            </author>
            <author initials="Y." surname="Shavitt">
              <organization/>
            </author>
            <date year="2016" month="August"/>
          </front>
        </reference>
        <reference anchor="XPROT">
          <front>
            <title>On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption</title>
            <author initials="T." surname="Jager">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <seriesInfo name="Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security" value=""/>
        </reference>
        <reference anchor="SC-tls-des-idea-ciphers-to-historic" target="https://datatracker.ietf.org/doc/status-change-tls-des-idea-ciphers-to-historic/">
          <front>
            <title>Moving single-DES and IDEA TLS ciphersuites to Historic</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January" day="25"/>
          </front>
        </reference>
        <reference anchor="DLOG795" target="https://eprint.iacr.org/2020/697">
          <front>
            <title>Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment</title>
            <author initials="F." surname="Boudot">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="A." surname="Guillevic">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="E." surname="Thomé">
              <organization/>
            </author>
            <author initials="P." surname="Zimmermann">
              <organization/>
            </author>
            <date year="2020" month="August" day="17"/>
          </front>
        </reference>
        <reference anchor="server_side_tls" target="https://wiki.mozilla.org/Security/Server_Side_TLS">
          <front>
            <title>Server Side TLS</title>
            <author initials="A." surname="King">
              <organization/>
            </author>
            <date year="2020" month="July"/>
          </front>
        </reference>
        <reference anchor="MAY4" target="https://dl.acm.org/doi/pdf/10.1145/3133956.3134029">
          <front>
            <title>May the fourth be with you: A microarchitectural side channel attack on several real-world applications of curve25519</title>
            <author initials="D." surname="Genkin">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="Y." surname="Yarom">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PARIS256" target="https://i.blackhat.com/us-18/Wed-August-8/us-18-Valsorda-Squeezing-A-Key-Through-A-Carry-Bit-wp.pdf">
          <front>
            <title>The PARIS256 Attack</title>
            <author initials="S." surname="Devlin">
              <organization/>
            </author>
            <author initials="F." surname="Valsorda">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC4492" target="https://www.rfc-editor.org/info/rfc4492">
          <front>
            <title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="S. Blake-Wilson" initials="S." surname="Blake-Wilson">
              <organization/>
            </author>
            <author fullname="N. Bolyard" initials="N." surname="Bolyard">
              <organization/>
            </author>
            <author fullname="V. Gupta" initials="V." surname="Gupta">
              <organization/>
            </author>
            <author fullname="C. Hawk" initials="C." surname="Hawk">
              <organization/>
            </author>
            <author fullname="B. Moeller" initials="B." surname="Moeller">
              <organization/>
            </author>
            <date month="May" year="2006"/>
            <abstract>
              <t>This document describes new key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol.  In particular, it specifies the use of Elliptic Curve Diffie-Hellman (ECDH) key agreement in a TLS handshake and the use of Elliptic Curve Digital Signature Algorithm (ECDSA) as a new authentication mechanism.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4492"/>
          <seriesInfo name="DOI" value="10.17487/RFC4492"/>
        </reference>
      </references>
    </references>
    <section anchor="appendix-dh">
      <name>DH Cipher Suites Deprecated by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_EXPORT_WITH_RC4_40_MD5</td>
            <td align="left">
              <xref target="RFC4346"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_RC4_128_MD5</td>
            <td align="left">
              <xref target="RFC5246"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="appendix-ecdh">
      <name>ECDH Cipher Suites Whose Use Is Discouraged by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC8422"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC8422"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC8422"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="appendix-dhe">
      <name>DHE Cipher Suites Refered to by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/><xref target="SC-tls-des-idea-ciphers-to-historic"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/><xref target="SC-tls-des-idea-ciphers-to-historic"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC4785"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC4279"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_NULL_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_NULL_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_128_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_256_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256</td>
            <td align="left">
              <xref target="RFC7905"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256</td>
            <td align="left">
              <xref target="RFC7905"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="appendix-rsa">
      <name>RSA Cipher Suites Deprecated by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLS_RSA_WITH_NULL_MD5</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_EXPORT_WITH_RC4_40_MD5</td>
            <td align="left">
              <xref target="RFC4346"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_RC4_128_MD5</td>
            <td align="left">
              <xref target="RFC5246"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC5246"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_IDEA_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/><xref target="SC-tls-des-idea-ciphers-to-historic"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/><xref target="SC-tls-des-idea-ciphers-to-historic"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC4785"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_NULL_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC4279"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_NULL_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_NULL_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256</td>
            <td align="left">
              <xref target="RFC7905"/></td>
          </tr>
        </tbody>
      </table>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
