<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.11 (Ruby 2.7.0) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-deprecate-obsolete-kex-00" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.12.10 -->
  <front>
    <title abbrev="Deprecating RSA and FFDH(E)">Deprecating Obsolete Key Exchange Methods in TLS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-deprecate-obsolete-kex-00"/>
    <author initials="C." surname="Bartle" fullname="Carrick Bartle">
      <organization>Apple, Inc.</organization>
      <address>
        <email>cbartle@apple.com</email>
      </address>
    </author>
    <author initials="N." surname="Aviram" fullname="Nimrod Aviram">
      <organization/>
      <address>
        <email>nimrod.aviram@gmail.com</email>
      </address>
    </author>
    <date year="2022" month="June" day="14"/>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document makes several prescriptions regarding the following key exchange
methods in TLS, most of which have been superseded by better options:</t>
      <ol spacing="normal" type="1"><li>This document deprecates the use of RSA key exchange in TLS.</li>
        <li>It limits the use of Diffie Hellman key exchange over a finite field to avoid
known vulnerabilities and improper security properties.</li>
        <li>It discourages the use of static elliptic curve Diffie Hellman cipher suites.</li>
      </ol>
    </abstract>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>TLS supports a variety of key exchange algorithms, including RSA, Diffie Hellman
over a finite field, and elliptic curve Diffie Hellman (ECDH).</t>
      <t>Diffie Hellman key exchange, over any group, comes in ephemeral and
non-ephemeral varieties. Non-ephemeral DH algorithms use static DH public keys
included in the authenticating peer's certificate; see <xref target="RFC4492"/> for discussion.
In contrast, ephemeral DH algorithms use ephemeral DH public keys sent in the
handshake and authenticated by the peer's certificate. Ephemeral and
non-ephemeral finite field DH algorithms are called DHE and DH  (or FFDHE and FFDH),
respectively, and ephemeral and non-ephemeral elliptic curve DH algorithms are called
ECDHE and ECDH, respectively <xref target="RFC4492"/>.</t>
      <t>In general, non-ephemeral cipher suites are not recommended due to their lack of
forward secrecy. However, as demonstrated by the <xref target="Raccoon"/> attack on finite-field
DH, public key reuse, either via non-ephemeral cipher suites or reused keys with
ephemeral cipher suites, can lead to timing side channels that may leak connection
secrets. For elliptic curve DH, invalid curve attacks similarly exploit secret
reuse in order to break security <xref target="ICA"/>, further demonstrating the risk of reusing
public keys. While both side channels can be avoided in implementations, experience
shows that in practice, implementations may fail to thwart such attacks due to the
complexity and number of the required mitigations.</t>
      <t>Additionally, RSA key exchange suffers from security problems that are independent
of implementation choices as well as problems that stem purely from the difficulty
of implementing security countermeasures correctly.</t>
      <t>At a rough glance, the problems affecting FFDHE are as follows:</t>
      <ol spacing="normal" type="1"><li>FFDHE suffers from interoperability problems because there is no mechanism for
negotiating the group size, and some implementations only support small group sizes
(see <xref target="RFC7919"/>, Section 1).</li>
        <li>In practice, some operators use 1024-bit FFDHE groups since this is the
maximum size that ensures wide support (see <xref target="RFC7919"/>, Section 1).
This size leaves only a small security margin vs. the current discrete log record,
which stands at 795 bits <xref target="DLOG795"/>.</li>
        <li>Expanding on the previous point, just a handful of very large computations allow
an attacker to cheaply decrypt a relatively large fraction of FFDHE traffic
(namely, traffic encrypted using particular standardized groups) <xref target="weak-dh"/>.</li>
        <li>When secrets are not fully ephemeral, FFDHE suffers from the <xref target="Raccoon"/> side
channel attack. (Note that FFDH is inherently vulnerable to the Raccoon attack
unless constant-time mitigations are employed.)</li>
        <li>FFDHE groups may have small subgroups, which enables several attacks
<xref target="subgroups"/>.</li>
      </ol>
      <t>The problems affecting RSA key exchange are as follows:</t>
      <ol spacing="normal" type="1"><li>RSA key exchange offers no forward secrecy, by construction.</li>
        <li>RSA key exchange may be vulnerable to Bleichenbacher's attack <xref target="BLEI"/>.
Experience shows that variants of this attack arise every few years because
implementing the relevant countermeasure correctly is difficult (see
<xref target="ROBOT"/>, <xref target="NEW-BLEI"/>, <xref target="DROWN"/>).</li>
        <li>In addition to the above point, there is no convenient mechanism in TLS for
the domain separation of keys. Therefore, a single endpoint that is vulnerable to
Bleichenbacher's attack would affect all endpoints sharing the same RSA key (see
<xref target="XPROT"/>, <xref target="DROWN"/>).</li>
      </ol>
      <t>Given these problems, this document updates <xref target="RFC4346"/>, <xref target="RFC5246"/>,
<xref target="RFC4162"/>, <xref target="RFC6347"/>, <xref target="RFC5932"/>, <xref target="RFC5288"/>, <xref target="RFC6209"/>, <xref target="RFC6367"/>,
<xref target="RFC8422"/>, <xref target="RFC5289"/>, and <xref target="RFC5469"/> to remediate the above problems.</t>
      <section anchor="requirements">
        <name>Requirements</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      </section>
    </section>
    <section anchor="non-ephemeral">
      <name>Non-Ephemeral Diffie Hellman</name>
      <t>Clients MUST NOT offer non-ephemeral FFDH cipher suites in TLS 1.2 connections.
(Note that TLS 1.0 and 1.1 are deprecated by <xref target="RFC8996"/> and TLS 1.3 does not
support FFDH <xref target="RFC8446"/>.) This includes all cipher suites listed in the table in
<xref target="appendix-dh"/>.</t>
      <t>Clients SHOULD NOT offer non-ephemeral ECDH cipher suites in TLS 1.2
connections. (Note that TLS 1.0 and 1.1 are deprecated by <xref target="RFC8996"/> and
TLS 1.3 does not support ECDH <xref target="RFC8446"/>.) This includes all cipher suites listed
in the table in <xref target="appendix-ecdh"/>.</t>
    </section>
    <section anchor="dhe">
      <name>Ephemeral Finite Field Diffie Hellman</name>
      <t>Clients and servers MAY offer fully ephemeral FFDHE cipher suites in TLS 1.2
connections under the following conditions:</t>
      <ol spacing="normal" type="1"><li>Clients and servers MUST NOT reuse ephemeral DHE public keys across TLS
connections for all existing (and future) TLS versions. Doing so invalidates
forward secrecy properties of these connections. For DHE, such reuse may also
lead to vulnerabilities such as those used in the <xref target="Raccoon"/> attack. See
<xref target="sec-considerations"/> for related discussion.</li>
        <li>The group is one of the following well-known groups described in <xref target="RFC7919"/>:
ffdhe2048, ffdhe3072, ffdhe4096, ffdhe6144, ffdhe8192.</li>
      </ol>
      <t>(Note that TLS 1.0 and 1.1 are deprecated by <xref target="RFC8996"/>. TLS 1.3 satisfies the
second point above <xref target="RFC8446"/> and is not vulnerable to the <xref target="Raccoon"/> Attack.)</t>
      <t>We note that, previously, supporting the broadest range of clients would have
required supporting either RSA key exchange or 1024-bit FFDHE. This is no longer
the case, and it is possible to support most clients released since circa 2015
using 2048-bit FFDHE or more modern key exchange methods, and without RSA key
exchange <xref target="server_side_tls"/>.</t>
      <t>All the cipher suites that do not meet the above requirements are listed in the
table in <xref target="appendix-dhe"/>.</t>
    </section>
    <section anchor="rsa">
      <name>RSA</name>
      <t>Clients and servers MUST NOT offer RSA cipher suites in TLS 1.2 connections. (Note
that TLS 1.0 and 1.1 are deprecated by <xref target="RFC8996"/>, and TLS 1.3 does not support
static RSA <xref target="RFC8446"/>.) This includes all cipher suites listed in the table in
<xref target="appendix-rsa"/>. Note that these cipher suites are already marked as not
recommended in the "TLS Cipher Suites" registry.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document makes no requests to IANA. Note that all cipher suites listed in
<xref target="rsa"/> and in <xref target="non-ephemeral"/> are already marked as not recommended in the
"TLS Cipher Suites" registry.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>Non-ephemeral finite field DH cipher suites (TLS_DH_*), as well as ephemeral key reuse
for finite field DH cipher suites, are prohibited due to the <xref target="Raccoon"/> attack. Both are
already considered bad practice since they do not provide forward secrecy. However,
Raccoon revealed that timing side channels in processing TLS premaster secrets may be
exploited to reveal the encrypted premaster secret.</t>
      <t>As for non-ephemeral elliptic curve DH cipher suites, forgoing forward secrecy
not only allows retroactive decryption in the event of key compromise but may
also enable a broad category of attacks where the attacker exploits key reuse
to repeatedly query a cryptographic secret.</t>
      <t>This category includes, but is not necessarily limited to, the following
examples:</t>
      <ol spacing="normal" type="1"><li>Invalid curve attacks, where the attacker exploits key reuse to repeatedly
query and eventually learn the key itself. These attacks have been shown to be
practical against real-world TLS implementations <xref target="ICA"/>.</li>
        <li>Side channel attacks, where the attacker exploits key reuse and an additional
side channel to learn a cryptographic secret. As one example of such attacks,
refer to <xref target="MAY4"/>.</li>
        <li>Fault attacks, where the attacker exploits key reuse and incorrect
calculations to learn a cryptographic secret. As one example of such attacks,
see <xref target="PARIS256"/>.</li>
      </ol>
      <t>Such attacks are often implementation-dependent, including the above examples.
However, these examples demonstrate that building a system that reuses keys and
avoids this category of attacks is difficult in practice. In contrast, avoiding
key reuse not only prevents decryption in the event of key compromise, but also
precludes this category of attacks altogether. Therefore, this document
discourages the reuse of elliptic curve DH public keys.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document was inspired by discussions on the TLS WG mailing list and
a suggestion by Filippo Valsorda following the release of the <xref target="Raccoon"/> attack.
Thanks to Christopher A. Wood for writing up the initial draft of this document.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC7919" target="https://www.rfc-editor.org/info/rfc7919">
          <front>
            <title>Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for Transport Layer Security (TLS)</title>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor">
              <organization/>
            </author>
            <date month="August" year="2016"/>
            <abstract>
              <t>Traditional finite-field-based Diffie-Hellman (DH) key exchange during the Transport Layer Security (TLS) handshake suffers from a number of security, interoperability, and efficiency shortcomings. These shortcomings arise from lack of clarity about which DH group parameters TLS servers should offer and clients should accept.  This document offers a solution to these shortcomings for compatible peers by using a section of the TLS "Supported Groups Registry" (renamed from "EC Named Curve Registry" by this document) to establish common finite field DH parameters with known structure and a mechanism for peers to negotiate support for these groups.</t>
              <t>This document updates TLS versions 1.0 (RFC 2246), 1.1 (RFC 4346), and 1.2 (RFC 5246), as well as the TLS Elliptic Curve Cryptography (ECC) extensions (RFC 4492).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7919"/>
          <seriesInfo name="DOI" value="10.17487/RFC7919"/>
        </reference>
        <reference anchor="RFC4346" target="https://www.rfc-editor.org/info/rfc4346">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.1</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document specifies Version 1.1 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4346"/>
          <seriesInfo name="DOI" value="10.17487/RFC4346"/>
        </reference>
        <reference anchor="RFC5246" target="https://www.rfc-editor.org/info/rfc5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks">
              <organization/>
            </author>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC4162" target="https://www.rfc-editor.org/info/rfc4162">
          <front>
            <title>Addition of SEED Cipher Suites to Transport Layer Security (TLS)</title>
            <author fullname="H.J. Lee" initials="H.J." surname="Lee">
              <organization/>
            </author>
            <author fullname="J.H. Yoon" initials="J.H." surname="Yoon">
              <organization/>
            </author>
            <author fullname="J.I. Lee" initials="J.I." surname="Lee">
              <organization/>
            </author>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document proposes the addition of new cipher suites to the Transport Layer Security (TLS) protocol to support the SEED encryption algorithm as a bulk cipher algorithm.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4162"/>
          <seriesInfo name="DOI" value="10.17487/RFC4162"/>
        </reference>
        <reference anchor="RFC6347" target="https://www.rfc-editor.org/info/rfc6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu">
              <organization/>
            </author>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol.  The DTLS protocol provides communications privacy for datagram protocols.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees.  Datagram semantics of the underlying transport are preserved by the DTLS protocol.  This document updates DTLS 1.0 to work with TLS version 1.2.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC5932" target="https://www.rfc-editor.org/info/rfc5932">
          <front>
            <title>Camellia Cipher Suites for TLS</title>
            <author fullname="A. Kato" initials="A." surname="Kato">
              <organization/>
            </author>
            <author fullname="M. Kanda" initials="M." surname="Kanda">
              <organization/>
            </author>
            <author fullname="S. Kanno" initials="S." surname="Kanno">
              <organization/>
            </author>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document specifies a set of cipher suites for the Transport Security Layer (TLS) protocol to support the Camellia encryption algorithm as a block cipher.  It amends the cipher suites originally specified in RFC 4132 by introducing counterparts using the newer cryptographic hash algorithms from the SHA-2 family.  This document obsoletes RFC 4132. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5932"/>
          <seriesInfo name="DOI" value="10.17487/RFC5932"/>
        </reference>
        <reference anchor="RFC5288" target="https://www.rfc-editor.org/info/rfc5288">
          <front>
            <title>AES Galois Counter Mode (GCM) Cipher Suites for TLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey">
              <organization/>
            </author>
            <author fullname="A. Choudhury" initials="A." surname="Choudhury">
              <organization/>
            </author>
            <author fullname="D. McGrew" initials="D." surname="McGrew">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>This memo describes the use of the Advanced Encryption Standard (AES) in Galois/Counter Mode (GCM) as a Transport Layer Security (TLS) authenticated encryption operation.  GCM provides both confidentiality and data origin authentication, can be efficiently implemented in hardware for speeds of 10 gigabits per second and above, and is also well-suited to software implementations.  This memo defines TLS cipher suites that use AES-GCM with RSA, DSA, and Diffie-Hellman-based key exchange mechanisms.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5288"/>
          <seriesInfo name="DOI" value="10.17487/RFC5288"/>
        </reference>
        <reference anchor="RFC6209" target="https://www.rfc-editor.org/info/rfc6209">
          <front>
            <title>Addition of the ARIA Cipher Suites to Transport Layer Security (TLS)</title>
            <author fullname="W. Kim" initials="W." surname="Kim">
              <organization/>
            </author>
            <author fullname="J. Lee" initials="J." surname="Lee">
              <organization/>
            </author>
            <author fullname="J. Park" initials="J." surname="Park">
              <organization/>
            </author>
            <author fullname="D. Kwon" initials="D." surname="Kwon">
              <organization/>
            </author>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document specifies a set of cipher suites for the Transport Layer Security (TLS) protocol to support the ARIA encryption algorithm as a block cipher.  This document is not an Internet  Standards Track specification; it is published for informational  purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6209"/>
          <seriesInfo name="DOI" value="10.17487/RFC6209"/>
        </reference>
        <reference anchor="RFC6367" target="https://www.rfc-editor.org/info/rfc6367">
          <front>
            <title>Addition of the Camellia Cipher Suites to Transport Layer Security (TLS)</title>
            <author fullname="S. Kanno" initials="S." surname="Kanno">
              <organization/>
            </author>
            <author fullname="M. Kanda" initials="M." surname="Kanda">
              <organization/>
            </author>
            <date month="September" year="2011"/>
            <abstract>
              <t>This document specifies forty-two cipher suites for the Transport Security Layer (TLS) protocol to support the Camellia encryption algorithm as a block cipher.  This document is not an Internet  Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6367"/>
          <seriesInfo name="DOI" value="10.17487/RFC6367"/>
        </reference>
        <reference anchor="RFC8422" target="https://www.rfc-editor.org/info/rfc8422">
          <front>
            <title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir">
              <organization/>
            </author>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <author fullname="M. Pegourie-Gonnard" initials="M." surname="Pegourie-Gonnard">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol.  In particular, it specifies the use of Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement in a TLS handshake and the use of the Elliptic Curve Digital Signature Algorithm (ECDSA) and Edwards-curve Digital Signature Algorithm (EdDSA) as authentication mechanisms.</t>
              <t>This document obsoletes RFC 4492.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8422"/>
          <seriesInfo name="DOI" value="10.17487/RFC8422"/>
        </reference>
        <reference anchor="RFC5289" target="https://www.rfc-editor.org/info/rfc5289">
          <front>
            <title>TLS Elliptic Curve Cipher Suites with SHA-256/384 and AES Galois Counter Mode (GCM)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2008"/>
            <abstract>
              <t>RFC 4492 describes elliptic curve cipher suites for Transport Layer Security (TLS).  However, all those cipher suites use HMAC-SHA-1 as their Message Authentication Code (MAC) algorithm.  This document describes sixteen new cipher suites for TLS that specify stronger MAC algorithms.  Eight use Hashed Message Authentication Code (HMAC) with SHA-256 or SHA-384, and eight use AES in Galois Counter Mode (GCM).   This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5289"/>
          <seriesInfo name="DOI" value="10.17487/RFC5289"/>
        </reference>
        <reference anchor="RFC5469" target="https://www.rfc-editor.org/info/rfc5469">
          <front>
            <title>DES and IDEA Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="P. Eronen" initials="P." role="editor" surname="Eronen">
              <organization/>
            </author>
            <date month="February" year="2009"/>
            <abstract>
              <t>Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346) include cipher suites based on DES (Data Encryption Standard) and IDEA (International Data Encryption Algorithm) algorithms.  DES (when used in single-DES mode) and IDEA are no longer recommended for general use in TLS, and have been removed from TLS version 1.2 (RFC 5246).  This document specifies these cipher suites for completeness and discusses reasons why their use is no longer recommended.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5469"/>
          <seriesInfo name="DOI" value="10.17487/RFC5469"/>
        </reference>
        <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8996" target="https://www.rfc-editor.org/info/rfc8996">
          <front>
            <title>Deprecating TLS 1.0 and TLS 1.1</title>
            <author fullname="K. Moriarty" initials="K." surname="Moriarty">
              <organization/>
            </author>
            <author fullname="S. Farrell" initials="S." surname="Farrell">
              <organization/>
            </author>
            <date month="March" year="2021"/>
            <abstract>
              <t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance. </t>
              <t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
              <t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="8996"/>
          <seriesInfo name="DOI" value="10.17487/RFC8996"/>
        </reference>
        <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla">
              <organization/>
            </author>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol.  TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961.  This document also specifies new requirements for TLS 1.2 implementations.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8446"/>
          <seriesInfo name="DOI" value="10.17487/RFC8446"/>
        </reference>
        <reference anchor="RFC4785" target="https://www.rfc-editor.org/info/rfc4785">
          <front>
            <title>Pre-Shared Key (PSK) Ciphersuites with NULL Encryption for Transport Layer Security (TLS)</title>
            <author fullname="U. Blumenthal" initials="U." surname="Blumenthal">
              <organization/>
            </author>
            <author fullname="P. Goel" initials="P." surname="Goel">
              <organization/>
            </author>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document specifies authentication-only ciphersuites (with no encryption) for the Pre-Shared Key (PSK) based Transport Layer Security (TLS) protocol.  These ciphersuites are useful when authentication and integrity protection is desired, but confidentiality is not needed or not permitted.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4785"/>
          <seriesInfo name="DOI" value="10.17487/RFC4785"/>
        </reference>
        <reference anchor="RFC4279" target="https://www.rfc-editor.org/info/rfc4279">
          <front>
            <title>Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)</title>
            <author fullname="P. Eronen" initials="P." role="editor" surname="Eronen">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig">
              <organization/>
            </author>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document specifies three sets of new ciphersuites for the Transport Layer Security (TLS) protocol to support authentication based on pre-shared keys (PSKs).  These pre-shared keys are symmetric keys, shared in advance among the communicating parties.  The first set of ciphersuites uses only symmetric key operations for authentication. The second set uses a Diffie-Hellman exchange authenticated with a pre-shared key, and the third set combines public key authentication of the server with pre-shared key authentication of the client.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4279"/>
          <seriesInfo name="DOI" value="10.17487/RFC4279"/>
        </reference>
        <reference anchor="RFC5487" target="https://www.rfc-editor.org/info/rfc5487">
          <front>
            <title>Pre-Shared Key Cipher Suites for TLS with SHA-256/384 and AES Galois Counter Mode</title>
            <author fullname="M. Badra" initials="M." surname="Badra">
              <organization/>
            </author>
            <date month="March" year="2009"/>
            <abstract>
              <t>RFC 4279 and RFC 4785 describe pre-shared key cipher suites for Transport Layer Security (TLS).  However, all those cipher suites use SHA-1 in their Message Authentication Code (MAC) algorithm.  This document describes a set of pre-shared key cipher suites for TLS that uses stronger digest algorithms (i.e., SHA-256 or SHA-384) and another set that uses the Advanced Encryption Standard (AES) in Galois Counter Mode (GCM).  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5487"/>
          <seriesInfo name="DOI" value="10.17487/RFC5487"/>
        </reference>
        <reference anchor="RFC6655" target="https://www.rfc-editor.org/info/rfc6655">
          <front>
            <title>AES-CCM Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew">
              <organization/>
            </author>
            <author fullname="D. Bailey" initials="D." surname="Bailey">
              <organization/>
            </author>
            <date month="July" year="2012"/>
            <abstract>
              <t>This memo describes the use of the Advanced Encryption Standard (AES) in the Counter with Cipher Block Chaining - Message Authentication Code (CBC-MAC) Mode (CCM) of operation within Transport Layer Security (TLS) and Datagram TLS (DTLS) to provide confidentiality and data origin authentication.  The AES-CCM algorithm is amenable to compact implementations, making it suitable for constrained environments.  [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6655"/>
          <seriesInfo name="DOI" value="10.17487/RFC6655"/>
        </reference>
        <reference anchor="RFC7905" target="https://www.rfc-editor.org/info/rfc7905">
          <front>
            <title>ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="A. Langley" initials="A." surname="Langley">
              <organization/>
            </author>
            <author fullname="W. Chang" initials="W." surname="Chang">
              <organization/>
            </author>
            <author fullname="N. Mavrogiannopoulos" initials="N." surname="Mavrogiannopoulos">
              <organization/>
            </author>
            <author fullname="J. Strombergson" initials="J." surname="Strombergson">
              <organization/>
            </author>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson">
              <organization/>
            </author>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document describes the use of the ChaCha stream cipher and Poly1305 authenticator in the Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) protocols.</t>
              <t>This document updates RFCs 5246 and 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7905"/>
          <seriesInfo name="DOI" value="10.17487/RFC7905"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="Raccoon" target="https://raccoon-attack.com/RacoonAttack.pdf">
          <front>
            <title>Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)</title>
            <author initials="R." surname="Merget">
              <organization/>
            </author>
            <author initials="M." surname="Brinkmann">
              <organization/>
            </author>
            <author initials="N." surname="Aviram">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="J." surname="Mittmann">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <date year="2020" month="September" day="09"/>
          </front>
        </reference>
        <reference anchor="ICA" target="https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.704.7932&amp;rep=rep1&amp;type=pdf">
          <front>
            <title>Practical invalid curve attacks on TLS-ECDH</title>
            <author initials="T." surname="Jager">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <date year="2015" month="September" day="21"/>
          </front>
        </reference>
        <reference anchor="weak-dh" target="https://weakdh.org/">
          <front>
            <title>Weak Diffie-Hellman and the Logjam Attack</title>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan">
              <organization/>
            </author>
            <author initials="Z." surname="Durumeric">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="M." surname="Green">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="D." surname="Springall">
              <organization/>
            </author>
            <author initials="E." surname="Thomé">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="B." surname="VanderSloot">
              <organization/>
            </author>
            <author initials="E." surname="Wustrow">
              <organization/>
            </author>
            <author initials="S." surname="Zanella-Béguelin">
              <organization/>
            </author>
            <author initials="P." surname="Zimmermann">
              <organization/>
            </author>
            <date year="2015" month="October"/>
          </front>
        </reference>
        <reference anchor="subgroups" target="https://eprint.iacr.org/2016/995/20161017:193515">
          <front>
            <title>Measuring small subgroup attacks against Diffie-Hellman</title>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="A." surname="Sanso">
              <organization/>
            </author>
            <author initials="S." surname="Cohney">
              <organization/>
            </author>
            <author initials="J." surname="Fried">
              <organization/>
            </author>
            <author initials="M." surname="Hastings">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <date year="2016" month="October" day="15"/>
          </front>
        </reference>
        <reference anchor="BLEI">
          <front>
            <title>Chosen Ciphertext Attacks against Protocols Based on RSA Encryption Standard PKCS #1</title>
            <author initials="D." surname="Bleichenbacher">
              <organization/>
            </author>
            <date year="1998"/>
          </front>
          <seriesInfo name="Advances in Cryptology -- CRYPTO'98, LNCS vol. 1462, pages: 1-12" value=""/>
        </reference>
        <reference anchor="ROBOT">
          <front>
            <title>Return Of Bleichenbacher's Oracle Threat (ROBOT)</title>
            <author initials="H." surname="Boeck">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="C." surname="Young">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
          <seriesInfo name="27th USENIX Security Symposium" value=""/>
        </reference>
        <reference anchor="NEW-BLEI" target="https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-meyer.pdf">
          <front>
            <title>Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks</title>
            <author initials="C." surname="Meyer">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="E." surname="Weiss">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <author initials="S." surname="Schinzel">
              <organization/>
            </author>
            <author initials="E." surname="Tews">
              <organization/>
            </author>
            <date year="2014" month="August"/>
          </front>
        </reference>
        <reference anchor="DROWN" target="https://drownattack.com/drown-attack-paper.pdf">
          <front>
            <title>DROWN: Breaking TLS using SSLv2</title>
            <author initials="N." surname="Aviram">
              <organization/>
            </author>
            <author initials="S." surname="Schinzel">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="M." surname="Dankel">
              <organization/>
            </author>
            <author initials="J." surname="Steube">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="V." surname="Dukhovni">
              <organization/>
            </author>
            <author initials="E." surname="Käsper">
              <organization/>
            </author>
            <author initials="S." surname="Cohney">
              <organization/>
            </author>
            <author initials="S." surname="Engels">
              <organization/>
            </author>
            <author initials="C." surname="Paar">
              <organization/>
            </author>
            <author initials="Y." surname="Shavitt">
              <organization/>
            </author>
            <date year="2016" month="August"/>
          </front>
        </reference>
        <reference anchor="XPROT">
          <front>
            <title>On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption</title>
            <author initials="T." surname="Jager">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <seriesInfo name="Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security" value=""/>
        </reference>
        <reference anchor="SC-tls-des-idea-ciphers-to-historic" target="https://datatracker.ietf.org/doc/status-change-tls-des-idea-ciphers-to-historic/">
          <front>
            <title>Moving single-DES and IDEA TLS ciphersuites to Historic</title>
            <author>
              <organization/>
            </author>
            <date year="2021" month="January" day="25"/>
          </front>
        </reference>
        <reference anchor="DLOG795" target="https://eprint.iacr.org/2020/697">
          <front>
            <title>Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment</title>
            <author initials="F." surname="Boudot">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="A." surname="Guillevic">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="E." surname="Thomé">
              <organization/>
            </author>
            <author initials="P." surname="Zimmermann">
              <organization/>
            </author>
            <date year="2020" month="August" day="17"/>
          </front>
        </reference>
        <reference anchor="server_side_tls" target="https://wiki.mozilla.org/Security/Server_Side_TLS">
          <front>
            <title>Server Side TLS</title>
            <author initials="A." surname="King">
              <organization/>
            </author>
            <date year="2020" month="July"/>
          </front>
        </reference>
        <reference anchor="MAY4" target="https://dl.acm.org/doi/pdf/10.1145/3133956.3134029">
          <front>
            <title>May the fourth be with you: A microarchitectural side channel attack on several real-world applications of curve25519</title>
            <author initials="D." surname="Genkin">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="Y." surname="Yarom">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PARIS256" target="https://i.blackhat.com/us-18/Wed-August-8/us-18-Valsorda-Squeezing-A-Key-Through-A-Carry-Bit-wp.pdf">
          <front>
            <title>The PARIS256 Attack</title>
            <author initials="S." surname="Devlin">
              <organization/>
            </author>
            <author initials="F." surname="Valsorda">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC4492" target="https://www.rfc-editor.org/info/rfc4492">
          <front>
            <title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="S. Blake-Wilson" initials="S." surname="Blake-Wilson">
              <organization/>
            </author>
            <author fullname="N. Bolyard" initials="N." surname="Bolyard">
              <organization/>
            </author>
            <author fullname="V. Gupta" initials="V." surname="Gupta">
              <organization/>
            </author>
            <author fullname="C. Hawk" initials="C." surname="Hawk">
              <organization/>
            </author>
            <author fullname="B. Moeller" initials="B." surname="Moeller">
              <organization/>
            </author>
            <date month="May" year="2006"/>
            <abstract>
              <t>This document describes new key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol.  In particular, it specifies the use of Elliptic Curve Diffie-Hellman (ECDH) key agreement in a TLS handshake and the use of Elliptic Curve Digital Signature Algorithm (ECDSA) as a new authentication mechanism.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4492"/>
          <seriesInfo name="DOI" value="10.17487/RFC4492"/>
        </reference>
      </references>
    </references>
    <section anchor="appendix-dh">
      <name>DH Cipher Suites Deprecated by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_EXPORT_WITH_RC4_40_MD5</td>
            <td align="left">
              <xref target="RFC4346"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_RC4_128_MD5</td>
            <td align="left">
              <xref target="RFC5246"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="appendix-ecdh">
      <name>ECDH Cipher Suites Whose Use Is Discouraged by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC8422"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC8422"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC8422"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="appendix-dhe">
      <name>DHE Cipher Suites Refered to by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/><xref target="SC-tls-des-idea-ciphers-to-historic"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/><xref target="SC-tls-des-idea-ciphers-to-historic"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC4785"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC4279"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_NULL_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_NULL_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_128_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_256_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256</td>
            <td align="left">
              <xref target="RFC7905"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256</td>
            <td align="left">
              <xref target="RFC7905"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="appendix-rsa">
      <name>RSA Cipher Suites Deprecated by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLS_RSA_WITH_NULL_MD5</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_EXPORT_WITH_RC4_40_MD5</td>
            <td align="left">
              <xref target="RFC4346"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_RC4_128_MD5</td>
            <td align="left">
              <xref target="RFC5246"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC5246"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_IDEA_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/><xref target="SC-tls-des-idea-ciphers-to-historic"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/><xref target="SC-tls-des-idea-ciphers-to-historic"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC4785"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_NULL_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC4279"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_NULL_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_NULL_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256</td>
            <td align="left">
              <xref target="RFC7905"/></td>
          </tr>
        </tbody>
      </table>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
