<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-deprecate-obsolete-kex-06" category="std" consensus="true" submissionType="IETF" updates="9325, 4346, 5246, 4162, 6347, 5932, 5288, 6209, 6367, 8422, 5289, 5469, 4785, 4279, 5487, 6655, 7905" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.29.0 -->
  <front>
    <title abbrev="Deprecating RSA and FFDH(E)">Deprecating Obsolete Key Exchange Methods in (D)TLS 1.2</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-deprecate-obsolete-kex-06"/>
    <author initials="N." surname="Aviram" fullname="Nimrod Aviram">
      <organization/>
      <address>
        <email>nimrod.aviram@gmail.com</email>
      </address>
    </author>
    <date year="2025" month="June" day="22"/>
    <area>security</area>
    <workgroup>TLS Working Group</workgroup>
    <abstract>
      <?line 155?>

<t>For (D)TLS 1.2, this document deprecates the use of two key exchanges, namely Diffie-Hellman over
a finite field and RSA, and it discourages the use of static elliptic curve Diffie-Hellman
cipher suites.</t>
      <t>These prescriptions apply only to (D)TLS 1.2 since (D)TLS 1.0 and TLS 1.1 are
deprecated by RFC 8996 and (D)TLS 1.3 either does not use the affected
algorithm or does not share the relevant configuration options.
(There is no DTLS version 1.1.)</t>
      <t>This document updates RFCs 9325, 4346, 5246, 4162, 6347, 5932, 5288, 6209, 6367, 8422, 5289, 5469, 4785, 4279, 5487, 6655, and 7905.</t>
    </abstract>
  </front>
  <middle>
    <?line 168?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>(D)TLS 1.2 supports a variety of key exchange algorithms, including RSA, Diffie-Hellman
over a finite field, and elliptic curve Diffie-Hellman (ECDH).</t>
      <t>Diffie-Hellman key exchange, over any group, comes in ephemeral and
non-ephemeral varieties. Non-ephemeral DH algorithms use static DH public keys
included in the authenticating peer's certificate; see <xref target="RFC4492"/> for discussion.
In contrast, ephemeral DH algorithms use ephemeral DH public keys sent in the
handshake and authenticated by the peer's certificate. Ephemeral and
non-ephemeral finite field DH algorithms are called DHE and DH (or FFDHE and FFDH),
respectively, and ephemeral and non-ephemeral elliptic curve DH algorithms are called
ECDHE and ECDH, respectively <xref target="RFC4492"/>.</t>
      <t>In general, non-ephemeral cipher suites are not recommended due to their lack of
forward secrecy. Moreover, as demonstrated by the <xref target="Raccoon"/> attack on finite-field
DH, public key reuse, either via non-ephemeral cipher suites or reused keys with
ephemeral cipher suites, can lead to timing side channels that may leak connection
secrets. For elliptic curve DH, invalid curve attacks similarly exploit secret
reuse in order to break security <xref target="ICA"/>, further demonstrating the risk of reusing
public keys. While both side channels can be avoided in implementations, experience
shows that in practice, implementations may fail to thwart such attacks due to the
complexity and number of the required mitigations.</t>
      <t>Additionally, RSA key exchange suffers from security problems that are independent
of implementation choices as well as problems that stem purely from the difficulty
of implementing security countermeasures correctly.</t>
      <t>At a rough glance, the problems affecting FFDHE in (D)TLS 1.2 are as follows:</t>
      <ol spacing="normal" type="1"><li>
          <t>FFDHE suffers from interoperability problems because there is no mechanism for
negotiating the group, and some implementations only support small group sizes
(see <xref target="RFC7919"/>, Section 1).</t>
        </li>
        <li>
          <t>FFDHE groups may have small subgroups, which enables several attacks
<xref target="subgroups"/>. When presented with a custom, non-standardized FFDHE group, a handshaking client cannot practically verify that the group chosen by the server does not suffer from this problem. There is also no mechanism for such handshakes to fall back to other key exchange parameters that are acceptable to the client.
Custom FFDHE groups are widespread (as a result of advice based on <xref target="weak-dh"/>).
Therefore, clients cannot simply reject handshakes that present custom, and thus potentially dangerous, groups.</t>
        </li>
        <li>
          <t>In practice, some operators use 1024-bit FFDHE groups since this is the
maximum size that ensures wide support (see <xref target="RFC7919"/>, Section 1).
This size leaves only a small security margin vs. the current discrete log record,
which stands at 795 bits <xref target="DLOG795"/>.</t>
        </li>
        <li>
          <t>Expanding on the previous point, just a handful of very large computations allow
an attacker to cheaply decrypt a relatively large fraction of FFDHE traffic
(namely, traffic encrypted using particular standardized groups) <xref target="weak-dh"/>.</t>
        </li>
        <li>
          <t>When secrets are not fully ephemeral, FFDHE suffers from the <xref target="Raccoon"/> side
channel attack. (Note that FFDH is inherently vulnerable to the Raccoon attack
unless constant-time mitigations are employed.)</t>
        </li>
      </ol>
      <t>The problems affecting RSA key exchange in (D)TLS 1.2 are as follows:</t>
      <ol spacing="normal" type="1"><li>
          <t>RSA key exchange offers no forward secrecy, by construction.</t>
        </li>
        <li>
          <t>RSA key exchange may be vulnerable to Bleichenbacher's attack <xref target="BLEI"/>.
Experience shows that variants of this attack arise every few years because
implementing the relevant countermeasure correctly is difficult (see
<xref target="ROBOT"/>, <xref target="NEW-BLEI"/>, <xref target="DROWN"/>).</t>
        </li>
        <li>
          <t>In addition to the above point, there is no convenient mechanism in (D)TLS 1.2 for
the domain separation of keys. Therefore, a single endpoint that is vulnerable to
Bleichenbacher's attack would affect all endpoints sharing the same RSA key (see
<xref target="XPROT"/>, <xref target="DROWN"/>).</t>
        </li>
      </ol>
      <t>This document updates <xref target="RFC9325"/>, <xref target="RFC4346"/>, <xref target="RFC5246"/>,
<xref target="RFC4162"/>, <xref target="RFC6347"/>, <xref target="RFC5932"/>, <xref target="RFC5288"/>, <xref target="RFC6209"/>, <xref target="RFC6367"/>,
<xref target="RFC8422"/>, <xref target="RFC5289"/>, <xref target="RFC4785"/>, <xref target="RFC4279"/>, <xref target="RFC5487"/>, <xref target="RFC6655"/>, <xref target="RFC7905"/> and <xref target="RFC5469"/> to remediate the above problems.</t>
      <t><xref target="RFC9325"/> contains the latest IETF recommendations for users of the (D)TLS protocol (and specifically, (D)TLS 1.2) and this
document supersedes it in several points. <xref target="update-9325"/> details the exact differences.
All other recommendations of the BCP document remain valid.</t>
      <section anchor="requirements">
        <name>Requirements</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
    </section>
    <section anchor="non-ephemeral">
      <name>Non-Ephemeral Diffie-Hellman</name>
      <t>Clients MUST NOT offer and servers MUST NOT select non-ephemeral FFDH cipher suites in (D)TLS 1.2 connections.
(Note that (D)TLS 1.0 and TLS 1.1 are deprecated by <xref target="RFC8996"/> and (D)TLS 1.3 does not
support FFDH <xref target="I-D.ietf-tls-rfc8446bis"/><xref target="RFC9147"/>.) This includes all cipher suites listed in the table in
<xref target="appendix-dh"/>.</t>
      <t>Clients SHOULD NOT offer and servers SHOULD NOT select non-ephemeral ECDH cipher suites in (D)TLS 1.2 connections. (This requirement is already present in <xref target="RFC9325"/>.
Note that (D)TLS 1.0 and TLS 1.1 are deprecated by <xref target="RFC8996"/> and
(D)TLS 1.3 does not support ECDH <xref target="I-D.ietf-tls-rfc8446bis"/><xref target="RFC9147"/>.) This includes all cipher suites listed
in the table in <xref target="appendix-ecdh"/>.</t>
      <t>In addition, to avoid the use of non-ephemeral Diffie-Hellman, clients SHOULD NOT use and servers SHOULD NOT accept certificates with fixed DH parameters. These certificate types are rsa_fixed_dh, dss_fixed_dh, rsa_fixed_ecdh and ecdsa_fixed_ecdh as listed in <xref target="appendix-cert"/>. These values only apply to (D)TLS versions of 1.2 and below.</t>
    </section>
    <section anchor="dhe">
      <name>Ephemeral Finite Field Diffie-Hellman</name>
      <t>Clients MUST NOT offer and servers MUST NOT select FFDHE cipher suites in (D)TLS 1.2 connections.
This includes all cipher suites listed in the table in <xref target="appendix-dhe"/>.
(Note that (D)TLS 1.0 and TLS 1.1 are deprecated by <xref target="RFC8996"/>.) FFDHE cipher suites in (D)TLS 1.3 do not suffer from the problems presented in <xref target="introduction"/>; see <xref target="I-D.ietf-tls-rfc8446bis"/> and <xref target="RFC9147"/>. Therefore, clients and servers MAY offer FFDHE cipher suites in (D)TLS 1.3 connections.</t>
    </section>
    <section anchor="rsa">
      <name>RSA</name>
      <t>Clients MUST NOT offer and servers MUST NOT select RSA cipher suites in (D)TLS 1.2
connections. (Note that (D)TLS 1.0 and TLS 1.1 are deprecated by <xref target="RFC8996"/>, and (D)TLS
1.3 does not support static RSA <xref target="I-D.ietf-tls-rfc8446bis"/><xref target="RFC9147"/>.) This includes all cipher suites
listed in the table in <xref target="appendix-rsa"/>. Note that these cipher suites are
already marked as not recommended in the "TLS Cipher Suites" registry.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document requests IANA to mark the cipher suites from the "TLS Cipher Suites" registry listed in <xref target="appendix-dh"/>, <xref target="appendix-ecdh"/>, <xref target="appendix-dhe"/>, <xref target="appendix-rsa"/>, and the certificate types from the "TLS ClientCertificateType Identifiers" registry listed in <xref target="appendix-cert"/> as "D" in the "Recommended" column, see <xref target="I-D.ietf-tls-rfc8447bis"/>.</t>
      <t>For each regsitry entry in <xref target="appendix-dh"/>, <xref target="appendix-ecdh"/>, <xref target="appendix-dhe"/>, <xref target="appendix-rsa"/>, and <xref target="appendix-cert"/>,
IANA is also requested to update the registry entry's Reference column to refer to the this document.</t>
    </section>
    <section anchor="sec-considerations">
      <name>Security Considerations</name>
      <t>Non-ephemeral finite field DH cipher suites (TLS_DH_*), as well as ephemeral key reuse
for finite field DH cipher suites, are prohibited due to the <xref target="Raccoon"/> attack. Both are
already considered bad practice since they do not provide forward secrecy. However,
Raccoon revealed that timing side channels in processing TLS premaster secrets may be
exploited to reveal the encrypted premaster secret.</t>
      <t>As for non-ephemeral elliptic curve DH cipher suites (TLS_ECDH_*), forgoing forward secrecy
not only allows retroactive decryption in the event of key compromise but may
also enable a broad category of attacks where the attacker exploits key reuse
to repeatedly query a cryptographic secret.</t>
      <t>This category includes, but is not necessarily limited to, the following
examples:</t>
      <ol spacing="normal" type="1"><li>
          <t>Invalid curve attacks, where the attacker exploits key reuse to repeatedly
query and eventually learn the key itself. These attacks have been shown to be
practical against real-world TLS implementations <xref target="ICA"/>.</t>
        </li>
        <li>
          <t>Side channel attacks, where the attacker exploits key reuse and an additional
side channel to learn a cryptographic secret. As one example of such attacks,
refer to <xref target="MAY4"/>.</t>
        </li>
        <li>
          <t>Fault attacks, where the attacker exploits key reuse and incorrect
calculations to learn a cryptographic secret. As one example of such attacks,
see <xref target="PARIS256"/>.</t>
        </li>
      </ol>
      <t>Such attacks are often implementation-dependent, including the above examples.
However, these examples demonstrate that building a system that reuses keys and
avoids this category of attacks is difficult in practice. In contrast, avoiding
key reuse not only prevents decryption in the event of key compromise, but also
precludes this category of attacks altogether. Therefore, this document
discourages the reuse of elliptic curve DH public keys.</t>
      <t>As for ephemeral finite field Diffie-Hellman in (D)TLS 1.2 (TLS_DHE_* and TLS_PSK_DHE_*), as explained above, clients have no practical way to support these cipher suites while ensuring they only negotiate security parameters that are acceptable to them. In (D)TLS 1.2, the server chooses the Diffie-Hellman group, and custom groups are prevalent. Therefore, once the client includes these cipher suites in its handshake and the server presents a custom group, the client cannot complete the handshake while ensuring security. Verifying the group structure is prohibitively expensive for the client. Using a safelist of known-good groups is also impractical, since server operators were encouraged to generate their own custom group. Further, there is no mechanism for the handshake to fall back to other parameters, that are acceptable to both the client and server.</t>
    </section>
    <section anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>This document includes many important contributions from Carrie Bartle, who wrote much of the prose, and presented it several times at the IETF TLS WG.</t>
      <t>The document was inspired by discussions on the TLS WG mailing list and
a suggestion by Filippo Valsorda following the release of the <xref target="Raccoon"/> attack.
Thanks to Christopher A. Wood for writing up the initial draft of this document.
Thanks also to Thomas Fossati, Sean Turner, Joe Salowey, Yaron Sheffer, Christian Buchgraber, <contact fullname="John Preuß Mattsson"/> and <contact fullname="Manuel Pégourié-Gonnard"/> for
comments and suggestions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC7919">
          <front>
            <title>Negotiated Finite Field Diffie-Hellman Ephemeral Parameters for Transport Layer Security (TLS)</title>
            <author fullname="D. Gillmor" initials="D." surname="Gillmor"/>
            <date month="August" year="2016"/>
            <abstract>
              <t>Traditional finite-field-based Diffie-Hellman (DH) key exchange during the Transport Layer Security (TLS) handshake suffers from a number of security, interoperability, and efficiency shortcomings. These shortcomings arise from lack of clarity about which DH group parameters TLS servers should offer and clients should accept. This document offers a solution to these shortcomings for compatible peers by using a section of the TLS "Supported Groups Registry" (renamed from "EC Named Curve Registry" by this document) to establish common finite field DH parameters with known structure and a mechanism for peers to negotiate support for these groups.</t>
              <t>This document updates TLS versions 1.0 (RFC 2246), 1.1 (RFC 4346), and 1.2 (RFC 5246), as well as the TLS Elliptic Curve Cryptography (ECC) extensions (RFC 4492).</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7919"/>
          <seriesInfo name="DOI" value="10.17487/RFC7919"/>
        </reference>
        <reference anchor="RFC9325">
          <front>
            <title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
            <author fullname="Y. Sheffer" initials="Y." surname="Sheffer"/>
            <author fullname="P. Saint-Andre" initials="P." surname="Saint-Andre"/>
            <author fullname="T. Fossati" initials="T." surname="Fossati"/>
            <date month="November" year="2022"/>
            <abstract>
              <t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are used to protect data exchanged over a wide range of application protocols and can also form the basis for secure transport protocols. Over the years, the industry has witnessed several serious attacks on TLS and DTLS, including attacks on the most commonly used cipher suites and their modes of operation. This document provides the latest recommendations for ensuring the security of deployed services that use TLS and DTLS. These recommendations are applicable to the majority of use cases.</t>
              <t>RFC 7525, an earlier version of the TLS recommendations, was published when the industry was transitioning to TLS 1.2. Years later, this transition is largely complete, and TLS 1.3 is widely available. This document updates the guidance given the new environment and obsoletes RFC 7525. In addition, this document updates RFCs 5288 and 6066 in view of recent attacks.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="9325"/>
          <seriesInfo name="DOI" value="10.17487/RFC9325"/>
        </reference>
        <reference anchor="RFC4346">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.1</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="April" year="2006"/>
            <abstract>
              <t>This document specifies Version 1.1 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4346"/>
          <seriesInfo name="DOI" value="10.17487/RFC4346"/>
        </reference>
        <reference anchor="RFC5246">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
            <author fullname="T. Dierks" initials="T." surname="Dierks"/>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5246"/>
          <seriesInfo name="DOI" value="10.17487/RFC5246"/>
        </reference>
        <reference anchor="RFC4162">
          <front>
            <title>Addition of SEED Cipher Suites to Transport Layer Security (TLS)</title>
            <author fullname="H.J. Lee" initials="H.J." surname="Lee"/>
            <author fullname="J.H. Yoon" initials="J.H." surname="Yoon"/>
            <author fullname="J.I. Lee" initials="J.I." surname="Lee"/>
            <date month="August" year="2005"/>
            <abstract>
              <t>This document proposes the addition of new cipher suites to the Transport Layer Security (TLS) protocol to support the SEED encryption algorithm as a bulk cipher algorithm. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4162"/>
          <seriesInfo name="DOI" value="10.17487/RFC4162"/>
        </reference>
        <reference anchor="RFC6347">
          <front>
            <title>Datagram Transport Layer Security Version 1.2</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="January" year="2012"/>
            <abstract>
              <t>This document specifies version 1.2 of the Datagram Transport Layer Security (DTLS) protocol. The DTLS protocol provides communications privacy for datagram protocols. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery. The DTLS protocol is based on the Transport Layer Security (TLS) protocol and provides equivalent security guarantees. Datagram semantics of the underlying transport are preserved by the DTLS protocol. This document updates DTLS 1.0 to work with TLS version 1.2. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6347"/>
          <seriesInfo name="DOI" value="10.17487/RFC6347"/>
        </reference>
        <reference anchor="RFC5932">
          <front>
            <title>Camellia Cipher Suites for TLS</title>
            <author fullname="A. Kato" initials="A." surname="Kato"/>
            <author fullname="M. Kanda" initials="M." surname="Kanda"/>
            <author fullname="S. Kanno" initials="S." surname="Kanno"/>
            <date month="June" year="2010"/>
            <abstract>
              <t>This document specifies a set of cipher suites for the Transport Security Layer (TLS) protocol to support the Camellia encryption algorithm as a block cipher. It amends the cipher suites originally specified in RFC 4132 by introducing counterparts using the newer cryptographic hash algorithms from the SHA-2 family. This document obsoletes RFC 4132. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5932"/>
          <seriesInfo name="DOI" value="10.17487/RFC5932"/>
        </reference>
        <reference anchor="RFC5288">
          <front>
            <title>AES Galois Counter Mode (GCM) Cipher Suites for TLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="A. Choudhury" initials="A." surname="Choudhury"/>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>This memo describes the use of the Advanced Encryption Standard (AES) in Galois/Counter Mode (GCM) as a Transport Layer Security (TLS) authenticated encryption operation. GCM provides both confidentiality and data origin authentication, can be efficiently implemented in hardware for speeds of 10 gigabits per second and above, and is also well-suited to software implementations. This memo defines TLS cipher suites that use AES-GCM with RSA, DSA, and Diffie-Hellman-based key exchange mechanisms. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5288"/>
          <seriesInfo name="DOI" value="10.17487/RFC5288"/>
        </reference>
        <reference anchor="RFC6209">
          <front>
            <title>Addition of the ARIA Cipher Suites to Transport Layer Security (TLS)</title>
            <author fullname="W. Kim" initials="W." surname="Kim"/>
            <author fullname="J. Lee" initials="J." surname="Lee"/>
            <author fullname="J. Park" initials="J." surname="Park"/>
            <author fullname="D. Kwon" initials="D." surname="Kwon"/>
            <date month="April" year="2011"/>
            <abstract>
              <t>This document specifies a set of cipher suites for the Transport Layer Security (TLS) protocol to support the ARIA encryption algorithm as a block cipher. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6209"/>
          <seriesInfo name="DOI" value="10.17487/RFC6209"/>
        </reference>
        <reference anchor="RFC6367">
          <front>
            <title>Addition of the Camellia Cipher Suites to Transport Layer Security (TLS)</title>
            <author fullname="S. Kanno" initials="S." surname="Kanno"/>
            <author fullname="M. Kanda" initials="M." surname="Kanda"/>
            <date month="September" year="2011"/>
            <abstract>
              <t>This document specifies forty-two cipher suites for the Transport Security Layer (TLS) protocol to support the Camellia encryption algorithm as a block cipher. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6367"/>
          <seriesInfo name="DOI" value="10.17487/RFC6367"/>
        </reference>
        <reference anchor="RFC8422">
          <front>
            <title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS) Versions 1.2 and Earlier</title>
            <author fullname="Y. Nir" initials="Y." surname="Nir"/>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <author fullname="M. Pegourie-Gonnard" initials="M." surname="Pegourie-Gonnard"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol. In particular, it specifies the use of Ephemeral Elliptic Curve Diffie-Hellman (ECDHE) key agreement in a TLS handshake and the use of the Elliptic Curve Digital Signature Algorithm (ECDSA) and Edwards-curve Digital Signature Algorithm (EdDSA) as authentication mechanisms.</t>
              <t>This document obsoletes RFC 4492.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8422"/>
          <seriesInfo name="DOI" value="10.17487/RFC8422"/>
        </reference>
        <reference anchor="RFC5289">
          <front>
            <title>TLS Elliptic Curve Cipher Suites with SHA-256/384 and AES Galois Counter Mode (GCM)</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <date month="August" year="2008"/>
            <abstract>
              <t>RFC 4492 describes elliptic curve cipher suites for Transport Layer Security (TLS). However, all those cipher suites use HMAC-SHA-1 as their Message Authentication Code (MAC) algorithm. This document describes sixteen new cipher suites for TLS that specify stronger MAC algorithms. Eight use Hashed Message Authentication Code (HMAC) with SHA-256 or SHA-384, and eight use AES in Galois Counter Mode (GCM). This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5289"/>
          <seriesInfo name="DOI" value="10.17487/RFC5289"/>
        </reference>
        <reference anchor="RFC4785">
          <front>
            <title>Pre-Shared Key (PSK) Ciphersuites with NULL Encryption for Transport Layer Security (TLS)</title>
            <author fullname="U. Blumenthal" initials="U." surname="Blumenthal"/>
            <author fullname="P. Goel" initials="P." surname="Goel"/>
            <date month="January" year="2007"/>
            <abstract>
              <t>This document specifies authentication-only ciphersuites (with no encryption) for the Pre-Shared Key (PSK) based Transport Layer Security (TLS) protocol. These ciphersuites are useful when authentication and integrity protection is desired, but confidentiality is not needed or not permitted. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4785"/>
          <seriesInfo name="DOI" value="10.17487/RFC4785"/>
        </reference>
        <reference anchor="RFC4279">
          <front>
            <title>Pre-Shared Key Ciphersuites for Transport Layer Security (TLS)</title>
            <author fullname="P. Eronen" initials="P." role="editor" surname="Eronen"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document specifies three sets of new ciphersuites for the Transport Layer Security (TLS) protocol to support authentication based on pre-shared keys (PSKs). These pre-shared keys are symmetric keys, shared in advance among the communicating parties. The first set of ciphersuites uses only symmetric key operations for authentication. The second set uses a Diffie-Hellman exchange authenticated with a pre-shared key, and the third set combines public key authentication of the server with pre-shared key authentication of the client. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4279"/>
          <seriesInfo name="DOI" value="10.17487/RFC4279"/>
        </reference>
        <reference anchor="RFC5487">
          <front>
            <title>Pre-Shared Key Cipher Suites for TLS with SHA-256/384 and AES Galois Counter Mode</title>
            <author fullname="M. Badra" initials="M." surname="Badra"/>
            <date month="March" year="2009"/>
            <abstract>
              <t>RFC 4279 and RFC 4785 describe pre-shared key cipher suites for Transport Layer Security (TLS). However, all those cipher suites use SHA-1 in their Message Authentication Code (MAC) algorithm. This document describes a set of pre-shared key cipher suites for TLS that uses stronger digest algorithms (i.e., SHA-256 or SHA-384) and another set that uses the Advanced Encryption Standard (AES) in Galois Counter Mode (GCM). [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5487"/>
          <seriesInfo name="DOI" value="10.17487/RFC5487"/>
        </reference>
        <reference anchor="RFC6655">
          <front>
            <title>AES-CCM Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="D. McGrew" initials="D." surname="McGrew"/>
            <author fullname="D. Bailey" initials="D." surname="Bailey"/>
            <date month="July" year="2012"/>
            <abstract>
              <t>This memo describes the use of the Advanced Encryption Standard (AES) in the Counter with Cipher Block Chaining - Message Authentication Code (CBC-MAC) Mode (CCM) of operation within Transport Layer Security (TLS) and Datagram TLS (DTLS) to provide confidentiality and data origin authentication. The AES-CCM algorithm is amenable to compact implementations, making it suitable for constrained environments. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6655"/>
          <seriesInfo name="DOI" value="10.17487/RFC6655"/>
        </reference>
        <reference anchor="RFC7905">
          <front>
            <title>ChaCha20-Poly1305 Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="A. Langley" initials="A." surname="Langley"/>
            <author fullname="W. Chang" initials="W." surname="Chang"/>
            <author fullname="N. Mavrogiannopoulos" initials="N." surname="Mavrogiannopoulos"/>
            <author fullname="J. Strombergson" initials="J." surname="Strombergson"/>
            <author fullname="S. Josefsson" initials="S." surname="Josefsson"/>
            <date month="June" year="2016"/>
            <abstract>
              <t>This document describes the use of the ChaCha stream cipher and Poly1305 authenticator in the Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) protocols.</t>
              <t>This document updates RFCs 5246 and 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7905"/>
          <seriesInfo name="DOI" value="10.17487/RFC7905"/>
        </reference>
        <reference anchor="RFC5469">
          <front>
            <title>DES and IDEA Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="P. Eronen" initials="P." role="editor" surname="Eronen"/>
            <date month="February" year="2009"/>
            <abstract>
              <t>Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346) include cipher suites based on DES (Data Encryption Standard) and IDEA (International Data Encryption Algorithm) algorithms. DES (when used in single-DES mode) and IDEA are no longer recommended for general use in TLS, and have been removed from TLS version 1.2 (RFC 5246). This document specifies these cipher suites for completeness and discusses reasons why their use is no longer recommended. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5469"/>
          <seriesInfo name="DOI" value="10.17487/RFC5469"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC8996">
          <front>
            <title>Deprecating TLS 1.0 and TLS 1.1</title>
            <author fullname="K. Moriarty" initials="K." surname="Moriarty"/>
            <author fullname="S. Farrell" initials="S." surname="Farrell"/>
            <date month="March" year="2021"/>
            <abstract>
              <t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance.</t>
              <t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
              <t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="195"/>
          <seriesInfo name="RFC" value="8996"/>
          <seriesInfo name="DOI" value="10.17487/RFC8996"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8446bis">
          <front>
            <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
            <author fullname="Eric Rescorla" initials="E." surname="Rescorla">
              <organization>Independent</organization>
            </author>
            <date day="17" month="February" year="2025"/>
            <abstract>
              <t>   This document specifies version 1.3 of the Transport Layer Security
   (TLS) protocol.  TLS allows client/server applications to communicate
   over the Internet in a way that is designed to prevent eavesdropping,
   tampering, and message forgery.

   This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
   RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
   new requirements for TLS 1.2 implementations.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8446bis-12"/>
        </reference>
        <reference anchor="RFC9147">
          <front>
            <title>The Datagram Transport Layer Security (DTLS) Protocol Version 1.3</title>
            <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="N. Modadugu" initials="N." surname="Modadugu"/>
            <date month="April" year="2022"/>
            <abstract>
              <t>This document specifies version 1.3 of the Datagram Transport Layer Security (DTLS) protocol. DTLS 1.3 allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
              <t>The DTLS 1.3 protocol is based on the Transport Layer Security (TLS) 1.3 protocol and provides equivalent security guarantees with the exception of order protection / non-replayability. Datagram semantics of the underlying transport are preserved by the DTLS protocol.</t>
              <t>This document obsoletes RFC 6347.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="9147"/>
          <seriesInfo name="DOI" value="10.17487/RFC9147"/>
        </reference>
        <reference anchor="I-D.ietf-tls-rfc8447bis">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="16" month="June" year="2025"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   Recommended column of the selected TLS registries and adds a
   "Comment" column to all active registries that do not already have a
   "Comment" column.  Finally, it updates the registration request
   instructions.

   This document updates RFC 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-14"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="Raccoon" target="https://raccoon-attack.com/RacoonAttack.pdf">
          <front>
            <title>Raccoon Attack: Finding and Exploiting Most-Significant-Bit-Oracles in TLS-DH(E)</title>
            <author initials="R." surname="Merget">
              <organization/>
            </author>
            <author initials="M." surname="Brinkmann">
              <organization/>
            </author>
            <author initials="N." surname="Aviram">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="J." surname="Mittmann">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <date year="2020" month="September" day="09"/>
          </front>
        </reference>
        <reference anchor="ICA" target="https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.704.7932&amp;rep=rep1&amp;type=pdf">
          <front>
            <title>Practical invalid curve attacks on TLS-ECDH</title>
            <author initials="T." surname="Jager">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <date year="2015" month="September" day="21"/>
          </front>
        </reference>
        <reference anchor="weak-dh" target="https://weakdh.org/">
          <front>
            <title>Weak Diffie-Hellman and the Logjam Attack</title>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="K." surname="Bhargavan">
              <organization/>
            </author>
            <author initials="Z." surname="Durumeric">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="M." surname="Green">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="D." surname="Springall">
              <organization/>
            </author>
            <author initials="E." surname="Thomé">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="B." surname="VanderSloot">
              <organization/>
            </author>
            <author initials="E." surname="Wustrow">
              <organization/>
            </author>
            <author initials="S." surname="Zanella-Béguelin">
              <organization/>
            </author>
            <author initials="P." surname="Zimmermann">
              <organization/>
            </author>
            <date year="2015" month="October"/>
          </front>
        </reference>
        <reference anchor="subgroups" target="https://eprint.iacr.org/2016/995/20161017:193515">
          <front>
            <title>Measuring small subgroup attacks against Diffie-Hellman</title>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="A." surname="Sanso">
              <organization/>
            </author>
            <author initials="S." surname="Cohney">
              <organization/>
            </author>
            <author initials="J." surname="Fried">
              <organization/>
            </author>
            <author initials="M." surname="Hastings">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <date year="2016" month="October" day="15"/>
          </front>
        </reference>
        <reference anchor="BLEI">
          <front>
            <title>Chosen Ciphertext Attacks against Protocols Based on RSA Encryption Standard PKCS #1</title>
            <author initials="D." surname="Bleichenbacher">
              <organization/>
            </author>
            <date year="1998"/>
          </front>
          <seriesInfo name="Advances in Cryptology -- CRYPTO'98, LNCS vol. 1462, pages: 1-12" value=""/>
        </reference>
        <reference anchor="ROBOT">
          <front>
            <title>Return Of Bleichenbacher's Oracle Threat (ROBOT)</title>
            <author initials="H." surname="Boeck">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="C." surname="Young">
              <organization/>
            </author>
            <date year="2018"/>
          </front>
          <seriesInfo name="27th USENIX Security Symposium" value=""/>
        </reference>
        <reference anchor="NEW-BLEI" target="https://www.usenix.org/system/files/conference/usenixsecurity14/sec14-paper-meyer.pdf">
          <front>
            <title>Revisiting SSL/TLS Implementations: New Bleichenbacher Side Channels and Attacks</title>
            <author initials="C." surname="Meyer">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="E." surname="Weiss">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <author initials="S." surname="Schinzel">
              <organization/>
            </author>
            <author initials="E." surname="Tews">
              <organization/>
            </author>
            <date year="2014" month="August"/>
          </front>
        </reference>
        <reference anchor="DROWN" target="https://drownattack.com/drown-attack-paper.pdf">
          <front>
            <title>DROWN: Breaking TLS using SSLv2</title>
            <author initials="N." surname="Aviram">
              <organization/>
            </author>
            <author initials="S." surname="Schinzel">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="M." surname="Dankel">
              <organization/>
            </author>
            <author initials="J." surname="Steube">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="D." surname="Adrian">
              <organization/>
            </author>
            <author initials="J. A." surname="Halderman">
              <organization/>
            </author>
            <author initials="V." surname="Dukhovni">
              <organization/>
            </author>
            <author initials="E." surname="Käsper">
              <organization/>
            </author>
            <author initials="S." surname="Cohney">
              <organization/>
            </author>
            <author initials="S." surname="Engels">
              <organization/>
            </author>
            <author initials="C." surname="Paar">
              <organization/>
            </author>
            <author initials="Y." surname="Shavitt">
              <organization/>
            </author>
            <date year="2016" month="August"/>
          </front>
        </reference>
        <reference anchor="XPROT">
          <front>
            <title>On the Security of TLS 1.3 and QUIC Against Weaknesses in PKCS#1 v1.5 Encryption</title>
            <author initials="T." surname="Jager">
              <organization/>
            </author>
            <author initials="J." surname="Schwenk">
              <organization/>
            </author>
            <author initials="J." surname="Somorovsky">
              <organization/>
            </author>
            <date year="2015"/>
          </front>
          <seriesInfo name="Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security" value=""/>
        </reference>
        <reference anchor="DLOG795" target="https://eprint.iacr.org/2020/697">
          <front>
            <title>Comparing the difficulty of factorization and discrete logarithm: a 240-digit experiment</title>
            <author initials="F." surname="Boudot">
              <organization/>
            </author>
            <author initials="P." surname="Gaudry">
              <organization/>
            </author>
            <author initials="A." surname="Guillevic">
              <organization/>
            </author>
            <author initials="N." surname="Heninger">
              <organization/>
            </author>
            <author initials="E." surname="Thomé">
              <organization/>
            </author>
            <author initials="P." surname="Zimmermann">
              <organization/>
            </author>
            <date year="2020" month="August" day="17"/>
          </front>
        </reference>
        <reference anchor="MAY4" target="https://dl.acm.org/doi/pdf/10.1145/3133956.3134029">
          <front>
            <title>May the fourth be with you: A microarchitectural side channel attack on several real-world applications of curve25519</title>
            <author initials="D." surname="Genkin">
              <organization/>
            </author>
            <author initials="L." surname="Valenta">
              <organization/>
            </author>
            <author initials="Y." surname="Yarom">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PARIS256" target="https://i.blackhat.com/us-18/Wed-August-8/us-18-Valsorda-Squeezing-A-Key-Through-A-Carry-Bit-wp.pdf">
          <front>
            <title>The PARIS256 Attack</title>
            <author initials="S." surname="Devlin">
              <organization/>
            </author>
            <author initials="F." surname="Valsorda">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC4492">
          <front>
            <title>Elliptic Curve Cryptography (ECC) Cipher Suites for Transport Layer Security (TLS)</title>
            <author fullname="S. Blake-Wilson" initials="S." surname="Blake-Wilson"/>
            <author fullname="N. Bolyard" initials="N." surname="Bolyard"/>
            <author fullname="V. Gupta" initials="V." surname="Gupta"/>
            <author fullname="C. Hawk" initials="C." surname="Hawk"/>
            <author fullname="B. Moeller" initials="B." surname="Moeller"/>
            <date month="May" year="2006"/>
            <abstract>
              <t>This document describes new key exchange algorithms based on Elliptic Curve Cryptography (ECC) for the Transport Layer Security (TLS) protocol. In particular, it specifies the use of Elliptic Curve Diffie-Hellman (ECDH) key agreement in a TLS handshake and the use of Elliptic Curve Digital Signature Algorithm (ECDSA) as a new authentication mechanism. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4492"/>
          <seriesInfo name="DOI" value="10.17487/RFC4492"/>
        </reference>
      </references>
    </references>
    <?line 336?>

<section anchor="appendix-dh">
      <name>DH Cipher Suites Deprecated by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_EXPORT_WITH_RC4_40_MD5</td>
            <td align="left">
              <xref target="RFC4346"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_RC4_128_MD5</td>
            <td align="left">
              <xref target="RFC5246"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_DSS_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="appendix-ecdh">
      <name>ECDH Cipher Suites Whose Use Is Discouraged by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC8422"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC8422"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC8422"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_anon_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5289"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_ECDSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_ECDH_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="appendix-dhe">
      <name>DHE Cipher Suites deprecated by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/> <xref target="RFC8996"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/> <xref target="RFC8996"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC4785"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC4279"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_NULL_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_NULL_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_DSS_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CAMELLIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_128_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_AES_256_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_128_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_AES_256_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256</td>
            <td align="left">
              <xref target="RFC7905"/></td>
          </tr>
          <tr>
            <td align="left">TLS_DHE_PSK_WITH_CHACHA20_POLY1305_SHA256</td>
            <td align="left">
              <xref target="RFC7905"/></td>
          </tr>
          <tr>
            <td align="left">TLS_PSK_DHE_WITH_AES_128_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_PSK_DHE_WITH_AES_256_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="appendix-rsa">
      <name>RSA Cipher Suites Deprecated by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Ciphersuite</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">TLS_RSA_WITH_NULL_MD5</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_EXPORT_WITH_RC4_40_MD5</td>
            <td align="left">
              <xref target="RFC4346"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_RC4_128_MD5</td>
            <td align="left">
              <xref target="RFC5246"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC5246"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_IDEA_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/> <xref target="RFC8996"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4346"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_DES_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5469"/> <xref target="RFC8996"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_NULL_SHA</td>
            <td align="left">
              <xref target="RFC4785"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_NULL_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_RC4_128_SHA</td>
            <td align="left">
              <xref target="RFC4279"/><xref target="RFC6347"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_3DES_EDE_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_128_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_256_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4279"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_SEED_CBC_SHA</td>
            <td align="left">
              <xref target="RFC4162"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5288"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_AES_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_NULL_SHA256</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_NULL_SHA384</td>
            <td align="left">
              <xref target="RFC5487"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC5932"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_ARIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_ARIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_ARIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_ARIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6209"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CAMELLIA_256_CBC_SHA384</td>
            <td align="left">
              <xref target="RFC6367"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_CCM</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_128_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_WITH_AES_256_CCM_8</td>
            <td align="left">
              <xref target="RFC6655"/></td>
          </tr>
          <tr>
            <td align="left">TLS_RSA_PSK_WITH_CHACHA20_POLY1305_SHA256</td>
            <td align="left">
              <xref target="RFC7905"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="appendix-cert">
      <name>TLS ClientCertificateType Identifiers Deprecated by This Document</name>
      <table>
        <thead>
          <tr>
            <th align="left">Certificate Type</th>
            <th align="left">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">rsa_fixed_dh (3)</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">dss_fixed_dh (4)</td>
            <td align="left">
              <xref target="RFC5246"/></td>
          </tr>
          <tr>
            <td align="left">rsa_fixed_ecdh (65)</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
          <tr>
            <td align="left">ecdsa_fixed_ecdh (66)</td>
            <td align="left">
              <xref target="RFC8422"/></td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="update-9325">
      <name>Updating RFC 9325</name>
      <t>This document updates <xref target="RFC9325"/> with respect to the use of (D)TLS 1.2, and
the table below lists the exact changes. For RFC 9325,
Sec. 4.1 is the source of all details listed.</t>
      <t><cref>Note to RFC Editor: please replace XXX below by the current RFC number.</cref></t>
      <table>
        <thead>
          <tr>
            <th align="left"> </th>
            <th align="left">RFC 9325</th>
            <th align="right">RFC XXX</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">Non-ephemeral FFDH</td>
            <td align="left">SHOULD NOT</td>
            <td align="right">MUST NOT</td>
          </tr>
          <tr>
            <td align="left">Non-ephemeral ECDH</td>
            <td align="left">SHOULD NOT</td>
            <td align="right">No change</td>
          </tr>
          <tr>
            <td align="left">Fixed DH certificate types</td>
            <td align="left">Unspecified</td>
            <td align="right">SHOULD NOT</td>
          </tr>
          <tr>
            <td align="left">Ephemeral FFDH</td>
            <td align="left">SHOULD NOT</td>
            <td align="right">MUST NOT</td>
          </tr>
          <tr>
            <td align="left">Static RSA</td>
            <td align="left">SHOULD NOT</td>
            <td align="right">MUST NOT</td>
          </tr>
        </tbody>
      </table>
    </section>
  </back>
  <!-- ##markdown-source:
H4sIAD3nWGgAA7Vc6XbbSHb+j6eoyOfMyAlJidSuzBKaomx1axvRHrcnyfEB
iSKJEQhwsEhmy36W5Ef+9GukXyzfvVXYQRKkOzNumwTq4u5rFdFsNo3QDh15
Li7k3JcjM7TdibgbBp4jQyl+lAvR/zKamu5EihsZTj0rELYrdi9ev78eiHar
Y5jDoS+f8vAPg64wXUtcXl682+2/Nixv5JozILF8cxw2bRmOm6ETNC0NI5ue
xth8lF+a+ydGEA1ndhDYnvt+MQfgVf/9pUErJ56/OBdBaBnR3ML34FycHXSO
GuLw4PC4IY469Pdh+7jTEMcHhye4gtt0/fQUVzr7Z3T9GNdPDzvqOq4cHR7j
78OTU3pO54SvnGLN8fERrpyc7R8ZhOvccKPZUPrnhulLE1TIUeTb4cJ49vzH
ie9F83NBYvmIrySGt3TJsOf+uQj9KAg7+/tn+x3jUS4AYJ0bkNqBEYSQ1GfT
8VywuZCBMbfPxb+H3qghAs8PfTkO8Gkxow//adju2PNnkPITqBHiwRyNPM+l
j0JoRe7oi6Ibhubo8Vxc2q5F5JBG+l/mjmezkm68IGwO7Ilrj+2R6YbNN3bY
vPPNkSNZx+CkyerbUU83/YkMz8U0DOfB+d6er7A0TcbSGnmzPSDGFYW2NbfG
DMeCE539zn5z/wx/+KIZwZR8RbYQTaCDHh9aMDFCkr980xJvfNt9nJmum79z
2xLdJ9s3Z/nLP7TEwJt5vvcUPC5Kt27sMCw/imBG02fpPuL6Va+bl+g9mA0h
JAeLn0zHtgQU/ySF4j0QnpJWv3fxrlpYIxuWKqX/pWUHYWseRC1pRXtPtnyG
a+xZ3rPreKb1Z8uz/9jeb7Xx/5P9w9YJTPd3vpz/Ef+1fxfCEf5YlGr7iKTa
aS+X6vuW+MGcSH8Fvytk9yzNx6Y1zYvjIy6KC3s8tmXznXQciJONK5xKce1N
/m7OtO1VC4OeaU1bnj/ZK/LS3l/OyAW0bfm2WdDcjzCPKTCYT8U7f2uJi8iP
ZtK3R/k79y3x1owsf1GytLe+lGXT6LbEO9OxJDyvbILvpAt3KgoY1A7mMNuJ
6Tj5O/2WeD/1Zr/+kr983RJ/NR3phmb++hu67gL3wPG8sPSoj4grvvecvz5o
ib+ZLjRjNt/8+sskko7tliTwN3s2Y47oFuItB7Agr+kbaQYRcSGCGRhJliWW
b05MPC8sWEO13iXJI2zZ5shn5UPjx3tnZ0f8ob3fPjlvnx0ctY/yRnEMo2jq
i5V2sUxwS+wFuhyYbuCVJNbzpq4sx4tL35ZWyU7emQEF0WBrU3lz3b/Ky7o3
9QLpip49n0o/lF9C7USpkO99D3nBcwLxxgykRWEHmZYf0ndH/mIeIl+KASUU
07fE/Y+9gXjV3lnpUm8caY+m0h2a+FvZcACHkQFlGlDVteBXI5UReoTCc7zJ
QjSbovfw6f793e/PkFevb4HpyXNaon1ImXeOgKMtqd1sd3YyGm2fnZ1S4rp7
c/e+kLZkGPmuuBsXaPp9IFRWgtsg7YZil4Ffr+DrHfjy5GhNbMvc6rXEJy9y
J2X+OyfhVHwY9G+vfhIDne/FYDGbe4EdzXbytkqc3fY/NsvKfZBPdqDy7mBw
vUdVwtVs7sgZ2S2pjQxEPhdYFwPbkqKH8gvOHHCM1TaxJLI+P7ciGJH9hR0s
WAShnO2NbWT0vZHnjqUvocs9tSSuXtqHe/jYPmzOzbn0mzO5kH4pe+P2/uly
gfcodS+qkswSgVPkkijw6mWlAV+33Z9lRSyVz/SUi4e7j7d5matLKB6Qb0jw
JPQo0Cp46lSL0EIwdTM1DX/XRY6SUFk2xytls6RKWcrTCqktzTaISBem+1j1
qFBGQ/ldEXNlVPsrJdnHqffk2iXV/Pjr/wTzIqlLIi0u98GXE5QM6940C4/4
BLam5hMKOVz/6f6hGEnuXC5FEnf1xkJ1KwfsQn/5cNUTXR1TqZZxZRCoCEch
81VbPLVbR5mQuiLSfF91lY81CO8jKalUD4hkYqHTIZfv3YjB1dtBtwfJxU5M
wb/nzeZRiDBBXOHLLHLtkYomCfOFCos85fru7cnZUSH54FEmJ3pCa1E2H0WO
kt0Yxa/n2z/zkxmXZQcjn/pD5AJAhdPZuTBF53C/adkTOxTyC9RuU2yrWwl0
9veOz06Wy/mSInpkFQugJYUczPVtZDsOgu6opgctqcqKdVK+nzlttonmm+6n
w0LdZC5YkGMv8pE/hlI8Q0pi4UUgTszske+ZPrw/lCMkPfQVAQX6kQr0urgi
DQfySdJthDCniabRsYQ5nzuJlqEd7kQ6R0ftsyUBzWmZoxmLGe3FHoLXHrUY
7cOjvYP2wcHZ0XEL/x7ud1Z0ZggMb2HMxSJyWRyBf34yfY8C3n334WrQOTrO
i+c9RBPfWdkq2K2hg5tTM+RgHAXN9uneR2k1u9EEhW/zVF1qggw0y5bZHPwj
kvJn6LfZbf4oF02UDF40meJbz/T9Bfe4z/MkhFdyi1B0IZ9KJfMlc8tojBiu
qZdUBno18ri1Z75n5e9AGaarHSpGLmem7ZwLl5e3TF7+bxO6SKwbRhMllzlE
sQ9vNIxLz88MYRowNjsQ6CUjcjqRzFUCtkLkew4oz554lAt4pxroBA0m0VkU
ezkPRmeYYmy7MFD8I8ns4PYoNhv8AS5OIQDGTYVeFkdA1cxI4EH2nD6oPjn/
fGPEJS6aCeqKW4YBcwA0SEZUsefKssnMEX1c/BV6GVbhKRT9kgv7TJD63Bam
L42EeUsMF+LhsidOz86OeVkCdSAk/BE0WB7od72Q6Sc+zPEYPomK33QmHoc2
aCtdFqDVVAt9ifBiQthUWNkTiILDo6fobxm74ApLbYITF4QWUqWBFhHaek1c
Z1Wmp1lEb/D/PtEiWdBUq6XMamZbliMN45W4ctFMWtGIWXl5ZWe+fjOMrBai
+dzzQ+hJPCEDSJUpstYlEgHCzqAzJ7L0aLBRtAeyN5G3N0XjSjMSuzRveQ0e
CtezVDSEeri7ENy4NqCumcr1EkY44+gKVIbruc30iuIJmbklbnM3Lt5l+GKj
0RaPG/NoiMhM6ANDMQwTtFUtQgEDarb1gHQuua8ZodHj6Vso/xWxXoqXlz/D
AA4PzzrfviF5+OxmEc9BW8aVS7aGABCEDbGKpNy9DFVAAUtTFBkQjwVrfpQs
6Qx9ym+I6DKVKNJWSC0XMPJkkdeMTGRkutFnlFiwCw5pRtxPpsWvGwbCwBwu
aD8hMmkzyOIUeZxFE1mC1SBbUWjoU0NkseTEDnuCoCfSpcc3CthykYsfT0EB
4QbFl3RJ31YkKWBBfLYvHE7jYwOafKaOHH0W1i7QLHm+JMMEf4gBcoaIAb1m
RP/yoqe4sIO0HFACbrKADeIiVS6IgOobcVx7ss2VpEPwDGApw6DqxFiyFi4D
p3KkaTFj9ozHQZl6hRIA2vIZah6HJoMwUldyzDCY4RBeRPmqpKrGknFqAByO
6TvkxjyuVoILDSaZDBhJGPSBnCE1d8kgHmK76nW/fWuIMdVdFN8T2ca1rW8H
pBNmH9eMjH+gJ52iVxZDD7VankMSAao488mztVfb+fa9oYteqs2NYOo9a6lg
5VxNj6GcAgyLbIwMrywGJgJOo9E0EURqTAYsDLBfiEl2At6IiNsEX/4jsn3Q
NbNDe2LqDGR0Lcumz/AAeBJtyuQCdBAh1/mBGKNUS0U4970hiNTkk4nbMOw5
WbcbGkCYZwIi8myaD8GQn6Fh+jf/CJpBwFB9cjRGle8wco9k04opQX3horuZ
8QwSGEaeD+8JnQWxBtIEl3Zi4tCAqqEiVoxZpXF6nIovuT0r5gp0jj3HgaLO
DaPd0utyMrEJvQetmkPbyclmiAJDVwxJjp9JkqsdzChwG66ceKGdmp3OPqS7
ABmoZApc6eisqoetatIa2D/LwNhV2eGfEKZOztpnZOID5WOiTSmwEzOgprhs
WWiRZWFuCzN9ntqwMOmaQ9rniRsMbXHGy0uyFKEQ/iBdLsxAKMyLmxgT3hqE
3kzFxkBPG0GllSUBrIo4xZAMRo5NyQd+RBFzHm+ogGkQYI8XylYSSZFZ0TRU
h0O0yU/Zak2pKTYnOzE5auK0RqhUL6lFuVeS+gLyrjEJaEgRFl88jho5N0Ff
jCo5JKtIXAKxWc5DEqH2T81fy+ixbPLKIIhnxI0AkkQU3TWpbIJQYf7kwaaF
NhVRJ57pvrzoXZdv36BaZgikw8IVjiAWYkA2RIH/77CEHFNEptZaoiy1QRNB
VF5Insayt4hDEAm7ULTClA5aKAMzQYvNlb0g9HxVYLT3O4fNIeJyjk1VmbM6
bG4KjJn5xZ5FM7ZhRZV0lS+TOBJzX2PcXCjzI5BenqT2FTM27ThczNA7ws2f
EMZZIRGihRvmZhWcqX2rYSgnYNuFLkIUw0cC/ASgQo9HuBA4bNGGqam2Tz1X
hxj5ZHssR8SHhvg75KttfRw5pE9YKjIhdbJUbM6j2MVNijYG7ZWxs6kENppK
k7RoSZ42sWE4pq5L1EPGrArqLcZa4MhnFD6NXdW/NeILEC8/BXakBp2w3ZDC
rOmLnKMqjb3OmhrYPdIOr7N2Ut+AL8rFcXnQqIqVxaKF0qeRH2i0xO4tbE8Z
Aj2CzMR2yb7dkAJB5FDRlXGqeCdbwRuRi5BFecAlZsImahGZTXlMsIRTeAtp
qRarMiWUMuH67FAC8RTvCDCF4q5BMYtJ9FXjpKJz6QEUoVFR5Jku7Xzo2u/l
hbYUSEn9pMoQmSqD+hWTQgMXBHYCh8vUD7BFjuWzWEjTT7KXkUu7hZ42m3rT
zEsaS1I3+y0yBm/HkNO+vMSbH+obD+A5iOmgYuqCJNavOUQRHDtSNpdCfk/S
5YyRxu+8lijJciXhzUybbJbidOwmqprLhE6TotMEQkYdw/h0dRbkFWAsU8Cz
F9EQhE2IHDl5TsAjgViAAfwxUbUWDw+oSwKp7v5VEKT2XwHQNxoDpN9oHIBv
hr7XPu6k92g8kFmJx2ThTk8zKzv7Z1m445P0mTRGyMFlVtJAIfOtc5K5RwOG
zDOPjzIradhAnQxyULz4GKBkBz4s0EKhJLMWoX0WcoJ5xQLh7pem9rzSIYGF
fDAobcB0HKBMDwP3kzm6tpu53kBFCqY6DA0g97VcHqem9VrnSjswEgUhVeFx
0qLRARf1ceGkjKAFtpQOm5pWS4JUR5EqvyCAs9+o2T346sKEVK1RpF1T/KZ3
n5qHL9nGuVeCTF69Eg+q4qe7gYpzZHF0rCgQOzcfBu93GupfcXvHnx/6f/lw
9dC/oM+Dd93r6+SDoVcM3t19uL5IP6WQvbubm/7thQLGVZG7ZOzcdD/tqAJj
5+7+/dXdbfd6R40ZsjbOgzOPYh7X1XNKynApCJnnfkPVVoHv//3v9qE2k06b
ygH95bR9cogvz3BPhY3rAPUVIlsY5nyO+EZPIQ8dmXM7RBXIPTbFSldQPGgZ
f/izY7tSNI///CeDhl404UnHGoVh0surXBv9zTB6ugqLpatSgarsuUzN3AoQ
UKH6fCfOqS/fjudDW9pA0xwxzZnLh54iP/TU8jo7O9ZOlxl8xjW0EVdfTA4g
rpoXreRknj8enR4eHg9ttAE6KLUpuLReC45cer4VKEnneHHsIEwHX6pItl04
MqkHpdSXuNyIBZmaW4UoMzcrhUnTnNrCFLtMvJ86j+oUqCxfJBWz7ebicMv4
DTRgVGggqX+Zh99cA0ZBAyKjATnSOsgk5QZ5Jw84sgP9vLTzzpF2JBktEdwS
BaquKTtPVJMnMba/8GAw02tx9sajMosFnYBTRZ4fmJ8Z6LM1bQgrCDLf0nvE
pRogjqzCxayZZuRC2KjvVbgRb6Ok3eD9iHQrQg/zOV5z0Qg0Q4mCkeJzZkp6
qWail2omWowt1lRuF1FUBV47iGznsyLns5IM5nujEax3HenkIBVNfqaSTwcS
TGNul+JbPEhf7k2ZMkS7lKhosnPS737SOllPfE7uMAWqBl9ewSi3UzSBr1Cz
kQ9v36mdRiZZGJWhSu92MFO/WcAy1psfye8bbcbE/IUqOhTn8UYczGem/8jl
RWlCr7HskEjUYTsxYPgdLJuAEn/Birvq3nbpwAV1sqqzCIplOyUSFKGBWovg
QFjV9CFHWGLCq5BWRySK041y6G6UfLNRElc886kKogWK2C576So6dC+uaOKL
CzDLdVSquEnS3rnYSST8kEp9B37hRDOkjOXeecKm01Kb2xINGCENbEIKQvD3
byyZEv0Ng/UYDw+1diXve6jqXnfJWhRMFXrEBxkfylFMqrZmrAY8bNFZq2Hj
Ss4m5Q0MkSKQo+YodxGB43blPlve2Hah0c8X7z7/xz+/bmSn8il8sl1EG1Or
n9bgiIHIO7WHdpjb36rYo6JDOjQhzvhhzAoFG9NKxorJsBCk6HAPJE80FSxt
lr3znqnZahjxOMjHV5O2ElUkqNqR4m0XD61WEJ/8m1MTFdBpqXi8pSYwht5j
UmpWj1ZdWzJLK4LS/oNqMtftRVZohoo9pRs8YOIReQWODZKGKjp4AgWikOBM
3qyM54Q059BuBordMN59p4EjXJumPsOI9+QMtmU17xemGOJJloh/ScPjZ73Z
9MzzF27C4/mkFk2QsRiWEdosyAUEwkF8GsUyTd7EN+dTsJ9IiaNlgitOAA0m
zVaRGckLSjJ9m8ad0KTSQ0OfniL+aZMOHTTNqvQw7qpq17BRjwGRY8DQDFCN
SGKMeCruoItUsiUwgEtnHNeEsbR4c2UoaVrKrSV3tkayr5Gc2c6c3CIrLG77
6A1LNSMclA+B1WaLN/HTYt50jNyRMpCnuFqiK9GlOpdHFUQhH+XJ7ETSrryO
Zy8vdNyNST5oiUuTBoFb0ApjUENFA9KiCbWSx3fTqdJLfLiMyRxkt1QpnHnj
UBY3cJvJHmf2tEo6kootsGXE4UiXIPGN7Da+CkzDyHbUD6+EOomtLrMMArXv
Tp0ht1yByhFVfpkbuWa2k3mimh4I4ceQr6RyTuII7Vlw4Vk7eigfpdBhULGo
CrelJJoOFCVpnJUrpXNpzyieGFM04inlsJndk09i7bL8l++p8k2QzoV9BNy4
DP58P/hRX1L5kQwUvkrFImk67QDYxV0v3awUzya3gHExXFWDPvMJAt7m0gak
T7HFG8Iys9VeZ2dxxnrOn/VLNkRHU88LtDwLgshsOKstwOxuJBkEn9zM6cvT
KTnerE0q9ipG6QgECyl7jChDmm7SgmS/OKYog0BvZKqzDbq6Sh9YEGUstpb4
K+8Y53bWhdpuidQOQlyvqF00OpiBIuSJS4vsZq34EGj3NMeS6lr2A5cO/E88
L94lS+pBBIzYEhq6ftG8prujzxT/UDkoQ+eSQh0lUtzZWItkkRUIYqg6q5Lf
AclvW+cFU71pnVpTY5k58cGWjPzTxpOL0u6ImEdhNUnmytluJzGHGR2ngzTg
A/oAZOjbiBdq9k6dBR22taV4Y/qhIykteOLZp95tRrFYj7ihJQo0RESmow+T
0Tpt7/HuLC3mOT//uPatOjGa0vVskjUGcz4Bg442PTMXxJu2ClDQaVrSOOua
Yy+seYKAxBERoJe4D99ODvqmJUiyP2bqw7TVBTAoM91HzmO9qQ80HvtMtyU+
kkWRLp999TsgGC09hGKZDW75p9HJ/l3aLOgHsgXiqXRIHfxeeiiaQps2yuHr
7yPfJQP6wZNiYIJguWjwEWxXDKaSZgwNTY6N1W+gA6TVIV19eXn5wZu64h7R
+Nf/EjdgIwiIoXhK8nJjuhEKiPtff5nAqO1ff2m+9VwX5eo3dUTRUD1ePDFJ
xBnow6VkpGRcCOu5xjf5wbhSGpvaRazSl1fZNs8wvmpYjj1CfM20XF+Nr+dN
+oNFuvO5GKDM/un+7uH9549X7/G9Pzjc/9x70/s8eNcFcHZfTRTgYoDScr1j
VbX8gNb3L/plmE4RxcOguxVpBLcBacnyDUgz0czkaHvoHX4GcTcXRwXCeE9O
bTaWHpBAtjunOVCFcBXoNnJJcdYTTLp+A8kkiu4ChPiqp+cNQVLS6sPkKEO9
uyll9UDylNWDWSYz+sXH5mJbDZXg6nVv+tfXV91q6fF+eCW2DeFSeWwIuExd
GwilNtRSc9oErDa2sgoqzaSGCurBVaigHmBC6KDfvygHGD5PUUlgzfUpYZsi
iNX0tndTljcd3lhpExrq4PRwBVTJKWvhKlltLVxl+6uFrGx/m3FW5ZE5jJtF
gdWgqwPBatiVHrMpxbVBV/tNTYq7D8sZVSeLloNlsGU1WgZLLXwjbHmw2tgy
ZrcRugLcd3BX4R11uKvwjnUqqI2trLla2CpkWQtdhSxr4at24CqUfM5tvSdV
YS2BVkecWlirXb8W1iURpxbaJb6/Ci8dZeiVOrePdDZffMB/V+jZkrHe6j6O
d+c26uR4pwR/xTq6/XB9nUum6qSiWLY+7kLKIFVdSBF6aX+wBuuy4r0GWFUF
UwX2sJFEHr5DHuv7yJUYN5HF2r6kCig16VqiKHeoG8iiRuu4Gucm0ljfcm1m
hoWi66y+JRbqrhJkvZZtDdwG+Cp4rC4s6/BYXVuu57EmxppV+kpK65cjlaD1
KpICtRvi3KbmWsrn+lJhKZ/rq4UlfNbEuU31VSR2XaNQSNtLwZdJuQK8doNT
D3gDzMv4Xl+urOR7faW0gu+auDevDHnG3S+USlbdIbfcdMrd33bM3a81584d
YK4Erj9A7W879u7XmnsvJXWLKXift4erKwr145dqYdQe2fbXV0cVMJvPefvr
C6p1eOrODPvbDmD7q0NTLcAtCd1kuLlclBuLpdaMskosNQET462qb9XPteKo
VdiCycAu9Rb1gGqgZca8DqaKsQqYDce2GRFuDLDJuLLCNOqMKyscrR62rUax
FVqqwsY/31utqCpsa8CW+WYNbFUNwQqwOF7XRROvX/P87SfLa8LbGtjt58Nr
4kddvBsNQotwdQeh/a26jjLc9+CrM5yswldnOFklz3r4thu+Zt1oM3nm4erL
s4yvHn9lfPX4237au8wv6gxel8WBeni3H/hm5LQF3jLs9+Jd3zUux7u+aayu
7Ho36Xr+Vfma2myD9fr5n083xbAaopwBV9NUTn01eei96+JPZ//z/d31p/bB
/lFROfqH99XK2RA4PjhbX3oliBXS0z+V2+qMmPp13Qbtc36CXj6mJKoXruie
ih3uisNTFfV3aUZfdXKqDlyZwqVweWo77J6VFJexXV30uxt141v1/1v3/hv3
/QRQu+/ftH/ftA8vmdyKLnOLNniLXnarLn2rHjaniA172Bxs3R42B1Szhy3B
1OhhN2pHt2hFt2hDK1lf3xhWcr++MVwl6E2xrW8MKx26LpoajeG2jd22jdk2
TdI2DdI2zdE2jVFerZvxtE2jUo2vHm/bNCrbNinbNig5OrfAuW2jsBzv+kZh
Od71jcImTcImDcJmzcFmjUGe39q1N+ri93V+ol+3VuafunOxnHkpAD9sacWc
fduK2D14XVUnZN/BInYPK9cU3syye3yULsscZyi9rWX3+LhiIQTzgX6Uz2/0
u+zxS9PBaPY1XMtfs/aQvFSMX0Cj3wYd/7Jd/zAx+6M7+rVQ+nIKftML/4wo
+4Yv/Vp99bbjmKSGMZCjljhstfVbMUXgRf6IEdCPuOIXhan3KrQM4w8jX47/
pN504fFj+pYdev65mKtfH/ly7ph4wE8//aQJ0W9JjV95STDqBcGtP+zx06Dv
Zvy/f6n4RGL/mkpRfaTnf80AwhriT/GHcwK8Lb/d6mv2tT9f05ealJfz8bLC
8ltPi5LXX8YvByq/xeKr+ODqt7hhSf4pgOzXJ2qQvtdkxbI1Mvw/QlFfbk5z
AAA=

-->

</rfc>
