<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.0.2) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-deprecate-obsolete-kex-05" category="std" consensus="true" submissionType="IETF" updates="9325, 4346, 5246, 4162, 6347, 5932, 5288, 6209, 6367, 8422, 5289, 5469, 4785, 4279, 5487, 6655, 7905" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.0 -->
  <front>
    <title abbrev="Deprecating RSA and FFDH(E)">Deprecating Obsolete Key Exchange Methods in TLS 1.2</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-deprecate-obsolete-kex-05"/>
    <author initials="C." surname="Bartle" fullname="Carrick Bartle">
      <organization>Roblox</organization>
      <address>
        <email>cbartle@roblox.com</email>
      </address>
    </author>
    <author initials="N." surname="Aviram" fullname="Nimrod Aviram">
      <organization/>
      <address>
        <email>nimrod.aviram@gmail.com</email>
      </address>
    </author>
    <date year="2024" month="September" day="03"/>
    <area>security</area>
    <workgroup>TLS Working Group</workgroup>
    <abstract>
      <?line 160?>

<t>This document deprecates the use of RSA key exchange and Diffie Hellman over a finite field in TLS 1.2, and discourages the use of static elliptic curve Diffie Hellman cipher suites.</t>
      <t>Note that these prescriptions apply only to TLS 1.2 since TLS 1.0 and 1.1 are
deprecated by RFC 8996 and TLS 1.3 either does not use the affected
algorithm or does not share the relevant configuration options.</t>
      <t>This document updates RFCs 9325, 4346, 5246, 4162, 6347, 5932, 5288, 6209, 6367, 8422, 5289, 5469, 4785, 4279, 5487, 6655, and 7905.</t>
    </abstract>
  </front>
  <middle>
    <?line 170?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>TLS 1.2 supports a variety of key exchange algorithms, including RSA, Diffie Hellman
over a finite field, and elliptic curve Diffie Hellman (ECDH).</t>
      <t>Diffie Hellman key exchange, over any group, comes in ephemeral and
non-ephemeral varieties. Non-ephemeral DH algorithms use static DH public keys
included in the authenticating peer's certificate; see <xref target="RFC4492"/> for discussion.
In contrast, ephemeral DH algorithms use ephemeral DH public keys sent in the
handshake and authenticated by the peer's certificate. Ephemeral and
non-ephemeral finite field DH algorithms are called DHE and DH  (or FFDHE and FFDH),
respectively, and ephemeral and non-ephemeral elliptic curve DH algorithms are called
ECDHE and ECDH, respectively <xref target="RFC4492"/>.</t>
      <t>In general, non-ephemeral cipher suites are not recommended due to their lack of
forward secrecy. Moreover, as demonstrated by the <xref target="Raccoon"/> attack on finite-field
DH, public key reuse, either via non-ephemeral cipher suites or reused keys with
ephemeral cipher suites, can lead to timing side channels that may leak connection
secrets. For elliptic curve DH, invalid curve attacks similarly exploit secret
reuse in order to break security <xref target="ICA"/>, further demonstrating the risk of reusing
public keys. While both side channels can be avoided in implementations, experience
shows that in practice, implementations may fail to thwart such attacks due to the
complexity and number of the required mitigations.</t>
      <t>Additionally, RSA key exchange suffers from security problems that are independent
of implementation choices as well as problems that stem purely from the difficulty
of implementing security countermeasures correctly.</t>
      <t>At a rough glance, the problems affecting FFDHE in TLS 1.2 are as follows:</t>
      <ol spacing="normal" type="1"><li>
          <t>FFDHE suffers from interoperability problems because there is no mechanism for
negotiating the group, and some implementations only support small group sizes
(see <xref target="RFC7919"/>, Section 1).</t>
        </li>
        <li>
          <t>FFDHE groups may have small subgroups, which enables several attacks
<xref target="subgroups"/>. When presented with a custom, non-standardized FFDHE group, a handshaking client cannot practically verify that the group chosen by the server does not suffer from this problem. There is also no mechanism for such handshakes to fall back to other key exchange parameters that are acceptable to the client.
Custom FFDHE groups are widespread (as a result of advice based on <xref target="weak-dh"/>).
Therefore, clients cannot simply reject handshakes that present custom, and thus potentially dangerous, groups.</t>
        </li>
        <li>
          <t>In practice, some operators use 1024-bit FFDHE groups since this is the
maximum size that ensures wide support (see <xref target="RFC7919"/>, Section 1).
This size leaves only a small security margin vs. the current discrete log record,
which stands at 795 bits <xref target="DLOG795"/>.</t>
        </li>
        <li>
          <t>Expanding on the previous point, just a handful of very large computations allow
an attacker to cheaply decrypt a relatively large fraction of FFDHE traffic
(namely, traffic encrypted using particular standardized groups) <xref target="weak-dh"/>.</t>
        </li>
        <li>
          <t>When secrets are not fully ephemeral, FFDHE suffers from the <xref target="Raccoon"/> side
channel attack. (Note that FFDH is inherently vulnerable to the Raccoon attack
unless constant-time mitigations are employed.)</t>
        </li>
      </ol>
      <t>The problems affecting RSA key exchange in TLS 1.2 are as follows:</t>
      <ol spacing="normal" type="1"><li>
          <t>RSA key exchange offers no forward secrecy, by construction.</t>
        </li>
        <li>
          <t>RSA key exchange may be vulnerable to Bleichenbacher's attack <xref target="BLEI"/>.
Experience shows that variants of this attack arise every few years because
implementing the relevant countermeasure correctly is difficult (see
<xref target="ROBOT"/>, <xref target="NEW-BLEI"/>, <xref target="DROWN"/>).</t>
        </li>
        <li>
          <t>In addition to the above point, there is no convenient mechanism in TLS 1.2 for
the domain separation of keys. Therefore, a single endpoint that is vulnerable to
Bleichenbacher's attack would affect all endpoints sharing the same RSA key (see
<xref target="XPROT"/>, <xref target="DROWN"/>).</t>
        </li>
      </ol>
      <t>This document updates <xref target="RFC9325"/>, <xref target="RFC4346"/>, <xref target="RFC5246"/>,
<xref target="RFC4162"/>, <xref target="RFC6347"/>, <xref target="RFC5932"/>, <xref target="RFC5288"/>, <xref target="RFC6209"/>, <xref target="RFC6367"/>,
<xref target="RFC8422"/>, <xref target="RFC5289"/>, <xref target="RFC4785"/>, <xref target="RFC4279"/>, <xref target="RFC5487"/>, <xref target="RFC6655"/>, <xref target="RFC7905"/> and <xref target="RFC5469"/> to remediate the above problems.</t>
      <section anchor="requirements">
        <name>Requirements</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
    </section>
    <section anchor="non-ephemeral">
      <name>Non-Ephemeral Diffie Hellman</name>
      <t>Clients MUST NOT offer and servers MUST NOT select non-ephemeral FFDH cipher suites in TLS 1.2 connections.
(Note that TLS 1.0 and 1.1 are deprecated by <xref target="RFC8996"/> and TLS 1.3 does not
support FFDH <xref target="I-D.ietf-tls-rfc8446bis"/>.) This includes all cipher suites listed in the table in
<xref target="appendix-dh"/>.</t>
      <t>Clients SHOULD NOT offer and servers SHOULD NOT select non-ephemeral ECDH cipher suites in TLS 1.2 connections. (This requirement is already present in <xref target="RFC9325"/>.
Note that TLS 1.0 and 1.1 are deprecated by <xref target="RFC8996"/> and
TLS 1.3 does not support ECDH <xref target="I-D.ietf-tls-rfc8446bis"/>.) This includes all cipher suites listed
in the table in <xref target="appendix-ecdh"/>.</t>
      <t>In addition, to avoid the use of non-ephemeral Diffie Hellman, clients SHOULD NOT use use and server SHOULD NOT accept certificates with fixed DH parameters. These certificate types are rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh and ecdsa_fixed_ecdh as listed in <xref target="appendix-cert"/>. These values only apply to TLS versions of 1.2 and below.</t>
    </section>
    <section anchor="dhe">
      <name>Ephemeral Finite Field Diffie Hellman</name>
      <t>Clients MUST NOT offer and servers MUST NOT select FFDHE cipher suites in TLS 1.2 connections.
This includes all cipher suites listed in the table in <xref target="appendix-dhe"/>.
(Note that TLS 1.0 and 1.1 are deprecated by <xref target="RFC8996"/>.) FFDHE cipher suites in TLS 1.3 do not suffer from the problems presented in <xref target="introduction"/>; see <xref target="I-D.ietf-tls-rfc8446bis"/>. Therefore, clients and servers MAY offer FFDHE cipher suites in TLS 1.3 connections.</t>
    </section>
    <section anchor="rsa">
      <name>RSA</name>
      <t>Clients MUST NOT offer and servers MUST NOT select RSA cipher suites in TLS 1.2
connections. (Note that TLS 1.0 and 1.1 are deprecated by <xref target="RFC8996"/>, and TLS
1.3 does not support static RSA <xref target="I-D.ietf-tls-rfc8446bis"/>.) This includes all cipher suites
listed in the table in <xref target="appendix-rsa"/>. Note that these cipher suites are
already marked as not recommended in the "TLS Cipher Suites" registry.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests IANA to mark the cipher suites from the "TLS Cipher Suites" registry listed in <xref target="appendix-dh"/>, <xref target="appendix-ecdh"/>, <xref target="appendix-dhe"/>, <xref target="appendix-rsa"/>, and the certificate types from the "TLS ClientCertificateType Identifiers" registed listed in <xref target="appendix-cert"/> as "D" in the "Recommended" column, see <xref target="I-D.ietf-tls-rfc8447bis"/>.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>Non-ephemeral finite field DH cipher suites (TLS_DH_*), as well as ephemeral key reuse
for finite field DH cipher suites, are prohibited due to the <xref target="Raccoon"/> attack. Both are
already considered bad practice since they do not provide forward secrecy. However,
Raccoon revealed that timing side channels in processing TLS premaster secrets may be
exploited to reveal the encrypted premaster secret.</t>
      <t>As for non-ephemeral elliptic curve DH cipher suites, forgoing forward secrecy
not only allows retroactive decryption in the event of key compromise but may
also enable a broad category of attacks where the attacker exploits key reuse
to repeatedly query a cryptographic secret.</t>
      <t>This category includes, but is not necessarily limited to, the following
examples:</t>
      <ol spacing="normal" type="1"><li>
          <t>Invalid curve attacks, where the attacker exploits key reuse to repeatedly
query and eventually learn the key itself. These attacks have been shown to be
practical against real-world TLS implementations <xref target="ICA"/>.</t>
        </li>
        <li>
          <t>Side channel attacks, where the attacker exploits key reuse and an additional
side channel to learn a cryptographic secret. As one example of such attacks,
refer to <xref target="MAY4"/>.</t>
        </li>
        <li>
          <t>Fault attacks, where the attacker exploits key reuse and incorrect
calculations to learn a cryptographic secret. As one example of such attacks,
see <xref target="PARIS256"/>.</t>
        </li>
      </ol>
      <t>Such attacks are often implementation-dependent, including the above examples.
However, these examples demonstrate that building a system that reuses keys and
avoids this category of attacks is difficult in practice. In contrast, avoiding
key reuse not only prevents decryption in the event of key compromise, but also
precludes this category of attacks altogether. Therefore, this document
discourages the reuse of elliptic curve DH public keys.</t>
      <t>As for ephemeral finite field Diffie-Hellman in TLS 1.2, as explained above, clients have no practical way to support these cipher suites while ensuring they only negotiate security parameters that are acceptable to them. In TLS 1.2, the server chooses the Diffie-Hellman group, and custom groups are prevalent. Therefore, once the client includes these cipher suites in its handshake and the server presents a custom group, the client cannot complete the handshake while ensuring security. Verifying the group structure is prohibitively expensive for the client. Using a safelist of known-good groups is also impractical, since server operators were encouraged to generate their own custom group. Further, there is no mechanism for the handshake to fall back to other parameters, that are acceptable to both the client and server.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document was inspired by discussions on the TLS WG mailing list and
a suggestion by Filippo Valsorda following the release of the <xref target="Raccoon"/> attack.
Thanks to Christopher A. Wood for writing up the initial draft of this document.
Thanks also to Thomas Fossati, <contact fullname="John Preuß Mattsson"/> and <contact fullname="Manuel Pégourié-Gonnard"/> for
comments and suggestions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7919">
          <front>
            <title>Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for Transport Layer Security (TLS)</title>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>Traditional finite-field-based Diffie-Hellman (DH) key exchange during the Transport Layer Security (TLS) handshake suffers from a number of security, interoperability, and efficiency shortcomings. These shortcomings arise from lack of clarity about which DH group parameters TLS servers should offer and clients should accept. This document offers a solution to these shortcomings for compatible peers by using a section of the TLS "Supported Groups Registry" (renamed from "EC Named Curve Registry" by this document) to establish common finite field DH parameters with known structure and a mechanism for peers to negotiate support for these groups.</t>
              <t>This document updates TLS versions 1.0 (RFC 2246), 1.1 (RFC 4346), and 1.2 (RFC 5246), as well as the TLS Elliptic Curve Cryptography (ECC) extensions (RFC 4492).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7919"/>
          <seriesInfo name="DOI" value="10.17487/RFC7919"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC4346">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.1</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document specifies Version 1.1 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4346"/>
          <seriesInfo name="DOI" value="10.17487/RFC4346"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC4162">
          <front>
            <title>Addition of SEED Cipher Suites to Transport Layer Security (TLS)</title>
            <author fullname="H.J. Lee" initials="H.J." surname="Lee"/>
            <author fullname="J.H. Yoon" initials="J.H." surname="Yoon"/>
            <author fullname="J.I. Lee" initials="J.I." surname="Lee"/>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document proposes the addition of new cipher suites to the Transport Layer Security (TLS) protocol to support the SEED encryption algorithm as a bulk cipher algorithm. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4162"/>
          <seriesInfo name="DOI" value="10.17487/RFC4162"/>
        </reference>
        <reference anchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC5932">
          <front>
            <title>Camellia Cipher Suites for TLS</title>
            <author fullname="A. Kato" initials="A." surname="Kato"/>
            <author fullname="M. Kanda" initials="M." surname="Kanda"/>
            <author fullname="S. Kanno" initials="S." surname="Kanno"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document specifies a set of cipher suites for the Transport Security Layer (TLS) protocol to support the Camellia encryption algorithm as a block cipher. It amends the cipher suites originally specified in RFC 4132 by introducing counterparts using the newer cryptographic hash algorithms from the SHA-2 family. This document obsoletes RFC 4132. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5932"/>
          <seriesInfo name="DOI" value="10.17487/RFC5932"/>
        </reference>
        <reference anchor="RFC5288">
          <front>
            <title>AES Galois Counter Mode (GCM) Cipher Suites for TLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="A. Choudhury" initials="A." surname="Choudhury"/>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This memo describes the use of the Advanced Encryption Standard (AES) in Galois/Counter Mode (GCM) as a Transport Layer Security (TLS) authenticated encryption operation. GCM provides both confidentiality and data origin authentication, can be efficiently implemented in hardware for speeds of 10 gigabits per second and above, and is also well-suited to software implementations. This memo defines TLS cipher suites that use AES-GCM with RSA, DSA, and Diffie-Hellman-based key exchange mechanisms. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5288"/>
          <seriesInfo name="DOI" value="10.17487/RFC5288"/>
        </reference>
        <reference anchor="RFC6209">
          <front>
            <title>Addition of the ARIA Cipher Suites to Transport Layer Security (TLS)</title>
            <author fullname="W. Kim" initials="W." surname="Kim"/>
            <author fullname="J. Lee" initials="J." surname="Lee"/>
            <author fullname="J. Park" initials="J." surname="Park"/>
            <author fullname="D. Kwon" initials="D." surname="Kwon"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document specifies a set of cipher suites for the Transport Layer Security (TLS) protocol to support the ARIA encryption algorithm as a block cipher. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6209"/>
          <seriesInfo name="DOI" value="10.17487/RFC6209"/>
        </reference>
        <reference anchor="RFC6367">
          <front>
            <title>Addition of the Camellia Cipher Suites to Transport Layer Security (TLS)</title>
            <author fullname="S. Kanno" initials="S." surname="Kanno"/>
            <author fullname="M. Kanda" initials="M." surname="Kanda"/>
            <date month="September" year="2011"/>
            <abstract>
              <t>This document specifies forty-two cipher suites for the Transport Security Layer (TLS) protocol to support the Camellia encryption algorithm as a block cipher. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6367"/>
          <seriesInfo name="DOI" value="10.17487/RFC6367"/>
        </reference>
        <reference anchor="RFC8422">
          <front>
            <title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="M. Pegourie-Gonnard" initials="M." surname="Pegourie-Gonnard"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol. In particular, it specifies the use of Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement in a TLS handshake and the use of the Elliptic Curve Digital Signature Algorithm (ECDSA) and Edwards-curve Digital Signature Algorithm (EdDSA) as authentication mechanisms.</t>
              <t>This document obsoletes RFC 4492.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8422"/>
          <seriesInfo name="DOI" value="10.17487/RFC8422"/>
        </reference>
        <reference anchor="RFC5289">
          <front>
            <title>TLS Elliptic Curve Cipher Suites with SHA-256/384 and AES Galois Counter Mode (GCM)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>RFC 4492 describes elliptic curve cipher suites for Transport Layer Security (TLS). However, all those cipher suites use HMAC-SHA-1 as their Message Authentication Code (MAC) algorithm. This document describes sixteen new cipher suites for TLS that specify stronger MAC algorithms. Eight use Hashed Message Authentication Code (HMAC) with SHA-256 or SHA-384, and eight use AES in Galois Counter Mode (GCM). This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5289"/>
          <seriesInfo name="DOI" value="10.17487/RFC5289"/>
        </reference>
        <reference anchor="RFC4785">
          <front>
            <title>Pre-Shared Key (PSK) Ciphersuites with NULL Encryption for Transport Layer Security (TLS)</title>
            <author fullname="U. Blumenthal" initials="U." surname="Blumenthal"/>
            <author fullname="P. Goel" initials="P." surname="Goel"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document specifies authentication-only ciphersuites (with no encryption) for the Pre-Shared Key (PSK) based Transport Layer Security (TLS) protocol. These ciphersuites are useful when authentication and integrity protection is desired, but confidentiality is not needed or not permitted. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4785"/>
          <seriesInfo name="DOI" value="10.17487/RFC4785"/>
        </reference>
        <reference anchor="RFC4279">
          <front>
            <title>Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)</title>
            <author fullname="P. Eronen" initials="P." role="editor" surname="Eronen"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document specifies three sets of new ciphersuites for the Transport Layer Security (TLS) protocol to support authentication based on pre-shared keys (PSKs). These pre-shared keys are symmetric keys, shared in advance among the communicating parties. The first set of ciphersuites uses only symmetric key operations for authentication. The second set uses a Diffie-Hellman exchange authenticated with a pre-shared key, and the third set combines public key authentication of the server with pre-shared key authentication of the client. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4279"/>
          <seriesInfo name="DOI" value="10.17487/RFC4279"/>
        </reference>
        <reference anchor="RFC5487">
          <front>
            <title>Pre-Shared Key Cipher Suites for TLS with SHA-256/384 and AES Galois Counter Mode</title>
            <author fullname="M. Badra" initials="M." surname="Badra"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>RFC 4279 and RFC 4785 describe pre-shared key cipher suites for Transport Layer Security (TLS). However, all those cipher suites use SHA-1 in their Message Authentication Code (MAC) algorithm. This document describes a set of pre-shared key cipher suites for TLS that uses stronger digest algorithms (i.e., SHA-256 or SHA-384) and another set that uses the Advanced Encryption Standard (AES) in Galois Counter Mode (GCM). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5487"/>
          <seriesInfo name="DOI" value="10.17487/RFC5487"/>
        </reference>
        <reference anchor="RFC6655">
          <front>
            <title>AES-CCM Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="D. Bailey" initials="D." surname="Bailey"/>
            <date month="July" year="2012"/>
            <abstract>
              <t>This memo describes the use of the Advanced Encryption Standard (AES) in the Counter with Cipher Block Chaining - Message Authentication Code (CBC-MAC) Mode (CCM) of operation within Transport Layer Security (TLS) and Datagram TLS (DTLS) to provide confidentiality and data origin authentication. The AES-CCM algorithm is amenable to compact implementations, making it suitable for constrained environments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6655"/>
          <seriesInfo name="DOI" value="10.17487/RFC6655"/>
        </reference>
        <reference anchor="RFC7905">
          <front>
            <title>ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="W. Chang" initials="W." surname="Chang"/>
            <author fullname="N. Mavrogiannopoulos" initials="N." surname="Mavrogiannopoulos"/>
            <author fullname="J. Strombergson" initials="J." surname="Strombergson"/>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document describes the use of the ChaCha stream cipher and Poly1305 authenticator in the Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) protocols.</t>
              <t>This document updates RFCs 5246 and 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7905"/>
          <seriesInfo name="DOI" value="10.17487/RFC7905"/>
        </reference>
        <reference anchor="RFC5469">
          <front>
            <title>DES and IDEA Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="P. Eronen" initials="P." role="editor" surname="Eronen"/>
            <date month="February" year="2009"/>
            <abstract>
              <t>Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346) include cipher suites based on DES (Data Encryption Standard) and IDEA (International Data Encryption Algorithm) algorithms. DES (when used in single-DES mode) and IDEA are no longer recommended for general use in TLS, and have been removed from TLS version 1.2 (RFC 5246). This document specifies these cipher suites for completeness and discusses reasons why their use is no longer recommended. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5469"/>
          <seriesInfo name="DOI" value="10.17487/RFC5469"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8996">
          <front>
            <title>Deprecating TLS 1.0 and TLS 1.1</title>
            <author fullname="K. Moriarty" initials="K." surname="Moriarty"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <date month="March" year="2021"/>
            <abstract>
              <t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance.</t>
              <t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
              <t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="8996"/>
          <seriesInfo name="DOI" value="10.17487/RFC8996"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Windy Hill Systems, LLC</organization>
            </author>
            <date day="3" month="March" year="2024"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, and 8446.  This document also specifies new
   requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-10"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8447bis">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="30" month="April" year="2024"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   recommended column of the selected TLS registries.

   This document updates the following RFCs: 3749, 5077, 4680, 5246,
   5705, 5878, 6520, 7301, and 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-09"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="Raccoon" target="https://raccoon-attack.com/RacoonAttack.pdf">
          <front>
            <title>Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)</title>
            <author initials="R." surname="Merget">
              <organization/>
            </author>
            <author initials="M." surname="Brinkmann">
              <organization/>
            </author>
            <author initials="N." surname="Aviram">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="J." surname="Mittmann">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <date year="2020" month="September" day="09"/>
          </front>
        </reference>
        <reference anchor="ICA" target="https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.704.7932&amp;rep=rep1&amp;type=pdf">
          <front>
            <title>Practical invalid curve attacks on TLS-ECDH</title>
            <author initials="T." surname="Jager">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <date year="2015" month="September" day="21"/>
          </front>
        </reference>
        <reference anchor="weak-dh" target="https://weakdh.org/">
          <front>
            <title>Weak Diffie-Hellman and the Logjam Attack</title>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan">
              <organization/>
            </author>
            <author initials="Z." surname="Durumeric">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="M." surname="Green">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="D." surname="Springall">
              <organization/>
            </author>
            <author initials="E." surname="Thomé">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="B." surname="VanderSloot">
              <organization/>
            </author>
            <author initials="E." surname="Wustrow">
              <organization/>
            </author>
            <author initials="S." surname="Zanella-Béguelin">
              <organization/>
            </author>
            <author initials="P." surname="Zimmermann">
              <organization/>
            </author>
            <date year="2015" month="October"/>
          </front>
        </reference>
        <reference anchor="subgroups" target="https://eprint.iacr.org/2016/995/20161017:193515">
          <front>
            <title>Measuring small subgroup attacks against Diffie-Hellman</title>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="A." surname="Sanso">
              <organization/>
            </author>
            <author initials="S." surname="Cohney">
              <organization/>
            </author>
            <author initials="J." surname="Fried">
              <organization/>
            </author>
            <author initials="M." surname="Hastings">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <date year="2016" month="October" day="15"/>
          </front>
        </reference>
        <reference anchor="BLEI">
          <front>
            <title>Chosen Ciphertext Attacks against Protocols Based on RSA Encryption Standard PKCS #1</title>
            <author initials="D." surname="Bleichenbacher">
              <organization/>
            </author>
            <date year="1998"/>
          </front>
          <seriesInfo name="Advances in Cryptology -- CRYPTO'98, LNCS vol. 1462, pages: 1-12" value=""/>
        </reference>
        <reference anchor="ROBOT">
          <front>
            <title>Return Of Bleichenbacher's Oracle Threat (ROBOT)</title>
            <author initials="H." surname="Boeck">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="C." surname="Young">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
          <seriesInfo name="27th USENIX Security Symposium" value=""/>
        </reference>
        <reference anchor="NEW-BLEI" target="https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-meyer.pdf">
          <front>
            <title>Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks</title>
            <author initials="C." surname="Meyer">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="E." surname="Weiss">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <author initials="S." surname="Schinzel">
              <organization/>
            </author>
            <author initials="E." surname="Tews">
              <organization/>
            </author>
            <date year="2014" month="August"/>
          </front>
        </reference>
        <reference anchor="DROWN" target="https://drownattack.com/drown-attack-paper.pdf">
          <front>
            <title>DROWN: Breaking TLS using SSLv2</title>
            <author initials="N." surname="Aviram">
              <organization/>
            </author>
            <author initials="S." surname="Schinzel">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="M." surname="Dankel">
              <organization/>
            </author>
            <author initials="J." surname="Steube">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="V." surname="Dukhovni">
              <organization/>
            </author>
            <author initials="E." surname="Käsper">
              <organization/>
            </author>
            <author initials="S." surname="Cohney">
              <organization/>
            </author>
            <author initials="S." surname="Engels">
              <organization/>
            </author>
            <author initials="C." surname="Paar">
              <organization/>
            </author>
            <author initials="Y." surname="Shavitt">
              <organization/>
            </author>
            <date year="2016" month="August"/>
          </front>
        </reference>
        <reference anchor="XPROT">
          <front>
            <title>On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption</title>
            <author initials="T." surname="Jager">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <seriesInfo name="Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security" value=""/>
        </reference>
        <reference anchor="DLOG795" target="https://eprint.iacr.org/2020/697">
          <front>
            <title>Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment</title>
            <author initials="F." surname="Boudot">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="A." surname="Guillevic">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="E." surname="Thomé">
              <organization/>
            </author>
            <author initials="P." surname="Zimmermann">
              <organization/>
            </author>
            <date year="2020" month="August" day="17"/>
          </front>
        </reference>
        <reference anchor="MAY4" target="https://dl.acm.org/doi/pdf/10.1145/3133956.3134029">
          <front>
            <title>May the fourth be with you: A microarchitectural side channel attack on several real-world applications of curve25519</title>
            <author initials="D." surname="Genkin">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="Y." surname="Yarom">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PARIS256" target="https://i.blackhat.com/us-18/Wed-August-8/us-18-Valsorda-Squeezing-A-Key-Through-A-Carry-Bit-wp.pdf">
          <front>
            <title>The PARIS256 Attack</title>
            <author initials="S." surname="Devlin">
              <organization/>
            </author>
            <author initials="F." surname="Valsorda">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC4492">
          <front>
            <title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="S. Blake-Wilson" initials="S." surname="Blake-Wilson"/>
            <author fullname="N. Bolyard" initials="N." surname="Bolyard"/>
            <author fullname="V. Gupta" initials="V." surname="Gupta"/>
            <author fullname="C. Hawk" initials="C." surname="Hawk"/>
            <author fullname="B. Moeller" initials="B." surname="Moeller"/>
            <date month="May" year="2006"/>
            <abstract>
              <t>This document describes new key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol. In particular, it specifies the use of Elliptic Curve Diffie-Hellman (ECDH) key agreement in a TLS handshake and the use of Elliptic Curve Digital Signature Algorithm (ECDSA) as a new authentication mechanism. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4492"/>
          <seriesInfo name="DOI" value="10.17487/RFC4492"/>
        </reference>
      </references>
    </references>
    <?line 329?>

<section anchor="appendix-dh">
      <name>DH Cipher Suites Deprecated by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_EXPORT_WITH_RC4_40_MD5</td>
            <td align="left">
              <xref target="RFC4346"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_RC4_128_MD5</td>
            <td align="left">
              <xref target="RFC5246"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="appendix-ecdh">
      <name>ECDH Cipher Suites Whose Use Is Discouraged by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC8422"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC8422"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC8422"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="appendix-dhe">
      <name>DHE Cipher Suites deprecated by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/> <xref target="RFC8996"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/> <xref target="RFC8996"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC4785"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC4279"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_NULL_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_NULL_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_128_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_256_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256</td>
            <td align="left">
              <xref target="RFC7905"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256</td>
            <td align="left">
              <xref target="RFC7905"/></td>
          </tr>
          <tr>
            <td align="left">TLS_PSK_DHE_WITH_AES_128_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_PSK_DHE_WITH_AES_256_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="appendix-rsa">
      <name>RSA Cipher Suites Deprecated by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLS_RSA_WITH_NULL_MD5</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_EXPORT_WITH_RC4_40_MD5</td>
            <td align="left">
              <xref target="RFC4346"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_RC4_128_MD5</td>
            <td align="left">
              <xref target="RFC5246"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC5246"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_IDEA_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/> <xref target="RFC8996"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/> <xref target="RFC8996"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC4785"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_NULL_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC4279"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_NULL_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_NULL_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256</td>
            <td align="left">
              <xref target="RFC7905"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="appendix-cert">
      <name>TLS ClientCertificateType Identifiers Deprecated by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Certificate Type</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">rsa_fixed_dh (3)</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">dss_fixed_dh (4)</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">rsa_fixed_ecdh (65)</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">ecdsa_fixed_ecdh (66)</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
        </tbody>
      </table>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
