Skip to main content

Extensible Provisioning Protocol (EPP) Transport over HTTPS
draft-ietf-regext-epp-https-03

Document Type Active Internet-Draft (regext WG)
Authors Mario Loffredo , Lorenzo Luconi Trombacchi , Maurizio Martinelli , Dan Keathley , James Gould
Last updated 2026-05-10
Replaces draft-loffredo-regext-epp-over-http
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status Proposed Standard
Formats
Reviews
Additional resources Mailing list discussion
Stream WG state WG Document
Associated WG milestone
Sep 2025
Submit for publication "Extensible Provisioning Protocol (EPP) Transport over HTTPS"
Document shepherd Gavin Brown
IESG IESG state I-D Exists
Consensus boilerplate Yes
Telechat date (None)
Responsible AD (None)
Send notices to gavin.brown@icann.org
draft-ietf-regext-epp-https-03
Internet Engineering Task Force                              M. Loffredo
Internet-Draft                                      L. Luconi Trombacchi
Intended status: Standards Track                           M. Martinelli
Expires: 11 November 2026                            IIT-CNR/Registro.it
                                                             D. Keathley
                                                                J. Gould
                                                          VeriSign, Inc.
                                                             10 May 2026

      Extensible Provisioning Protocol (EPP) Transport over HTTPS
                     draft-ietf-regext-epp-https-03

Abstract

   This document describes how an Extensible Provisioning Protocol (EPP)
   connection is mapped onto a Hypertext Transfer Protocol (HTTP)
   session.  EPP over HTTP (EoH) requires the use of Transport Layer
   Security (TLS) to secure EPP information (i.e. HTTPS).

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 11 November 2026.

Copyright Notice

   Copyright (c) 2026 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

Loffredo, et al.        Expires 11 November 2026                [Page 1]
Internet-Draft               EPP over HTTPS                     May 2026

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   3
   2.  Conventions Used in This Document . . . . . . . . . . . . . .   3
   3.  Session Management  . . . . . . . . . . . . . . . . . . . . .   3
   4.  Message Exchange  . . . . . . . . . . . . . . . . . . . . . .   4
   5.  Transport Considerations  . . . . . . . . . . . . . . . . . .   6
   6.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   7
     6.1.  EPP Extension Registry  . . . . . . . . . . . . . . . . .   7
   7.  Implementation Status . . . . . . . . . . . . . . . . . . . .   7
     7.1.  Verisign EPP SDK  . . . . . . . . . . . . . . . . . . . .   8
     7.2.  IIT-CNR/Registro.it . . . . . . . . . . . . . . . . . . .   8
   8.  Operational Considerations  . . . . . . . . . . . . . . . . .   9
     8.1.  Operational Impact  . . . . . . . . . . . . . . . . . . .   9
     8.2.  Configuration and Deployment  . . . . . . . . . . . . . .  10
     8.3.  Performance and Scalability . . . . . . . . . . . . . . .  10
     8.4.  Monitoring and Logging  . . . . . . . . . . . . . . . . .  10
     8.5.  Security and Fault Management . . . . . . . . . . . . . .  11
   9.  Security Considerations . . . . . . . . . . . . . . . . . . .  11
   10. Acknowledgements  . . . . . . . . . . . . . . . . . . . . . .  12
   11. References  . . . . . . . . . . . . . . . . . . . . . . . . .  12
     11.1.  Normative References . . . . . . . . . . . . . . . . . .  12
     11.2.  Informative References . . . . . . . . . . . . . . . . .  14
   Appendix A.  Change History . . . . . . . . . . . . . . . . . . .  14
     A.1.  Change from 02 to 03  . . . . . . . . . . . . . . . . . .  14
     A.2.  Change from 03 to 04  . . . . . . . . . . . . . . . . . .  14
     A.3.  Change from 04 to 05  . . . . . . . . . . . . . . . . . .  14
     A.4.  Change from regext 00 to regext 01  . . . . . . . . . . .  14
     A.5.  Change from regext 01 to regext 02  . . . . . . . . . . .  15
     A.6.  Change from regext 02 to regext 03  . . . . . . . . . . .  15
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .  15

Loffredo, et al.        Expires 11 November 2026                [Page 2]
Internet-Draft               EPP over HTTPS                     May 2026

1.  Introduction

   This document describes how EPP [RFC5730] is mapped onto HTTP
   [RFC9110].  Note that there are several versions of HTTP currently in
   use, including: HTTP/1.1 [RFC9112], HTTP/2 [RFC9113], and HTTP/3
   [RFC9114].  As the differences among such versions do not affect the
   EPP mapping described in this document, hereinafter the version
   number is omitted except for presenting the special features in the
   underlying layers of the HTTP stack.

   HTTP represents a higher-level abstraction of a network connection,
   removing the need to directly deal with all of the lower-level
   details of transport protocols.  This makes HTTP much more compatible
   with cloud-native infrastructures, and facilitates faster development
   times and reduced maintenance costs in such environments.

   Security services beyond those defined in EPP are provided by TLS via
   HTTPS Section 4.2.2 of [RFC9110].

2.  Conventions Used in This Document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   [BCP14] when, and only when, they appear in all capitals, as shown
   here.

3.  Session Management

   Mapping EPP session management facilities onto HTTP is accomplished
   using existing HTTP methods, namely GET and POST.  An EPP session
   exists on top of an EPP connection between two peers, one that
   initiates the connection request and one that responds to the
   connection request.  The initiating peer is called the "client", and
   the responding peer is called the "server".  An EPP server
   implementing this specification MUST listen for HTTP session requests
   on a standard HTTP port assigned by IANA.

   Even though HTTP itself is stateless, a stateful EPP session can be
   achieved using the mechanism described in [RFC6265].  This mechanism
   uses "Set-Cookie" and "Cookie" HTTP headers to facilitate a stateful
   HTTP session.  Such a session is initiated by the client by sending a
   GET request to the server.  The GET request MUST include
   "application/epp+xml" (Appendix B of [RFC5730]) in the "Accept" HTTP
   header.  The server MUST include the EPP Greeting in the response.
   The EPP Greeting must include "application/epp+xml" in the "Content-
   Type" header with the character encoding of the EPP XML (e.g.,
   "application/epp+xml;charset=UTF-8") and MUST include "no-cache" in

Loffredo, et al.        Expires 11 November 2026                [Page 3]
Internet-Draft               EPP over HTTPS                     May 2026

   the "Cache-Control" header and include "0" in the "Expires" header to
   disable caching.  The server MUST use the "Set-Cookie" header to
   include a token that represents the identifier of the HTTP session.
   All subsequent HTTP requests that include the HTTP session identifier
   in the "Cookie" header will be treated as part of the session.  The
   HTTP session represents an EPP connection, referred to as an EPP over
   HTTP (EoH) connection, which is initiated by the initial GET request.

   The EPP session begins with a successful EPP <login> command on the
   EoH connection and can be referred to as an EPP over HTTP (EoH)
   session.

   An EPP session is normally ended by the client issuing an EPP
   <logout> command.  A server receiving an EPP <logout> command MUST
   end the EPP session.  A server MAY also end an EPP session that has
   been either active or inactive for longer than a server-defined
   period.  A server MAY end the HTTP session after ending the EPP
   session.

4.  Message Exchange

   EPP describes client-server interaction as a command-response
   exchange where the client sends one command to the server and the
   server returns one response to the client.  With the exception of the
   EPP Greeting, EPP messages are initiated by the EPP client in the
   form of EPP commands.  An EPP client MUST send all commands as HTTP
   POST requests (Section 6.4 of [RFC9110]).  Each POST request MUST
   include the HTTP session identifier in the "Cookie" header and
   "application/epp+xml" in the "Accept" header.  An EPP server MUST
   return an EPP response to an EPP command in the HTTP response to the
   respective HTTP request.  The EPP command and the EPP response MUST
   include "application/epp+xml" in the "Content-Type" header with the
   character encoding of the EPP XML (e.g., "application/
   epp+xml;charset=UTF-8").  The EPP response MUST include "no-cache" in
   the "Cache-Control" header and include "0" in the "Expires" header to
   disable caching.

   HTTP does not guarantee that POST requests are idempotent.  However,
   the semantics of EPP do require EPP commands to be idempotent, so
   processing a command more than once will produce the same net effect
   on the repository as successfully processing the command once.

   The EPP command XML is framed by the content of the HTTP POST
   request, and the EPP response XML is framed by the content of the
   HTTP response.  Each HTTP request MUST contain a single EPP message,
   and each HTTP response MUST contain a single EPP response.  Commands
   MUST be processed independently and in the same order as received
   from the client.

Loffredo, et al.        Expires 11 November 2026                [Page 4]
Internet-Draft               EPP over HTTPS                     May 2026

   Servers MUST NOT use HTTP return codes to signal clients about the
   failure of the EPP commands.  The HTTP code 200 MUST be used for both
   successful and unsuccessful EPP requests.  Servers MUST use HTTP
   codes to signal clients about the failure of the HTTP requests.

   Servers MUST return an EPP 2002 response (i.e. Command use error) if
   the client issues an EPP command with either an empty or an invalid
   HTTP session identifier.

   A server SHOULD impose a limit on the amount of time required for a
   client to issue a well-formed EPP command.  A server SHOULD end an
   EPP session if a well-formed command is not received within the time
   limit.

   HTTP/2 and HTTP/3 support a multiplexing feature that was introduced
   to address head-of-line blocking issues in previous HTTP versions.
   In the context of multiple requests being sent on a single HTTP
   connection, multiplexing allows the delivery of responses in a
   different order from how the requests were made.  Due to this
   behavior, pipelining MUST NOT be used by EoH clients.  EoH clients
   MUST wait for a server response to a command before sending a
   subsequent command.

   A general state machine for an EPP server is described in Section 2
   of [RFC5730].  A general client-server message exchange using HTTP is
   illustrated in Figure 1.

Loffredo, et al.        Expires 11 November 2026                [Page 5]
Internet-Draft               EPP over HTTPS                     May 2026

                          Client                  Server
                     |                                     |
                     |             GET Server URL          |
                     | >>------------------------------->> |
                     |                                     |
                     |             Send Greeting           |
                     | <<-------------------------------<< |
                     |                                     |
                     |             POST <login>            |
                     | >>------------------------------->> |
                     |                                     |
                     |             Send Response           |
                     | <<-------------------------------<< |
                     |                                     |
                     |            POST Command X           |
                     | >>------------------------------->> |
                     |                                     |
                     |            Send Response X          |
                     | <<-------------------------------<< |
                     |                                     |
                     |            POST Command Y           |
                     | >>------------------------------->> |
                     |                                     |
                     |            Send Response Y          |
                     | <<-------------------------------<< |
                     |                  .                  |
                                        .
                                        .
                     |            POST <logout>            |
                     | >>------------------------------->> |
                     |                                     |
                     |            Send Response            |
                     | <<-------------------------------<< |

                  Figure 1: HTTP Client-Server Message Exchange

   The EPP server MUST follow the "EPP Server State Machine" procedure
   described in [RFC5730].

5.  Transport Considerations

   Section 2.1 of [RFC5730] describes considerations to be addressed by
   protocol transport mappings.  This document addresses each of those
   considerations using a combination of features of the HTTP protocol
   itself and features of this document.

   *  Command Order: Section 4 includes a requirement for ordered
      message delivery.

Loffredo, et al.        Expires 11 November 2026                [Page 6]
Internet-Draft               EPP over HTTPS                     May 2026

   *  Session Mapping: EPP session management is described in Section 3
      of this document.

   *  Stateful Nature: Achieving the stateful nature of EPP is described
      in Section 3.

   *  Frame Data Units: Section 4 of this document describes how each
      EPP command is framed within the content of HTTP requests and
      responses.

   *  Congestion Avoidance: Section 3.9.3 of [RFC8095] confirms
      congestion avoidance as a feature of HTTP.

   *  Reliability: Section 3.9.3 of [RFC8095] confirms reliable message
      delivery as a feature of HTTP.

   *  Pipelining: Section 4 of this document stipulates that command
      pipelining must not be used in EoH.

6.  IANA Considerations

6.1.  EPP Extension Registry

   The EPP transport described in this document should be registered by
   IANA in the "Extensions for the Extensible Provisioning Protocol
   (EPP)" registry described in RFC 7451 [RFC7451].  The details of the
   registration are as follows:

   Name of Extension:  "Extensible Provisioning Protocol (EPP) Transport
      over HTTPS"
   Document status:  Standards Track
   Reference:  (This specification)
   Registrant Name and Email Address:  IESG, <iesg@ietf.org>
   Top-Level Domains(TLDs):  Any
   IPR Disclosure:  None
   Status:  Active
   Notes:  None

7.  Implementation Status

   Note to RFC Editor: Please remove this section and the reference to
   [RFC7942] before publication.

   This section records the status of known implementations of the
   protocol defined by this specification at the time of posting of this
   Internet-Draft, and is based on a proposal described in [RFC7942].
   The description of implementations in this section is intended to
   assist the IETF in its decision processes in progressing drafts to

Loffredo, et al.        Expires 11 November 2026                [Page 7]
Internet-Draft               EPP over HTTPS                     May 2026

   RFCs.  Please note that the listing of any individual implementation
   here does not imply endorsement by the IETF.  Furthermore, no effort
   has been spent to verify the information presented here that was
   supplied by IETF contributors.  This is not intended as, and must not
   be construed to be, a catalog of available implementations or their
   features.  Readers are advised to note that other implementations may
   exist.

   According to [RFC7942], "this will allow reviewers and working groups
   to assign due consideration to documents that have the benefit of
   running code, which may serve as evidence of valuable experimentation
   and feedback that have made the implemented protocols more mature.
   It is up to the individual working groups to use this information as
   they see fit".

7.1.  Verisign EPP SDK

   Organization: Verisign Inc.

   Name: Verisign EPP SDK

   Description: The Verisign EPP SDK includes both a full client
   implementation and a full server stub implementation of this
   specification.  Both HTTP/1.1 and HTTP/2 were implemented, but HTTP/3
   was not due to the lack of support of the underlying library.

   Level of maturity: Development

   Coverage: All aspects of the protocol are implemented with HTTP/1.1
   and HTTP/2.

   Licensing: GNU Lesser General Public License

   Contact: jgould@verisign.com

   URL: https://www.verisign.com/en_US/channel-resources/domain-
   registry-products/epp-sdks

7.2.  IIT-CNR/Registro.it

   Organization: Institute of Informatics and Telematics of National
   Research Council (IIT-CNR)/Registro.it

   Name: .it EPP client and server

   Description: This specification has been partially implemented on
   both the client and server sides.  A slightly different
   implementation, which initiates the HTTP session upon completion of

Loffredo, et al.        Expires 11 November 2026                [Page 8]
Internet-Draft               EPP over HTTPS                     May 2026

   an EPP Login request, has been running on the live platform since
   2009.  Registro .it is currently working to release a fully compliant
   implementation to the public test environment.

   Level of Maturity: This is an implementation running in the live
   platform.

   Coverage: This implementation includes all the functionality
   described in this specification, except that the HTTP session begins
   after an EPP Login request has been successfully processed.

   Contact Information: Mario Loffredo, mario.loffredo@iit.cnr.it

8.  Operational Considerations

   This section addresses the operational aspects of transporting EPP
   over HTTPS, as outlined in [I-D.ietf-opsawg-rfc5706bis].

8.1.  Operational Impact

   Infrastructure Reuse:  Moving from EPP over TCP to EPP over HTTPS
      simply involves replacing the transport management layer on top of
      the existing implementation.  Therefore, operators who already
      provide EPP over TCP can reuse much of their infrastructure.
      Additionally, they can leverage standard web infrastructure such
      as HTTP load balancers, firewalls, and Web Application Firewalls
      (WAF) to enable HTTPS connections of EPP sessions.

   EPP Connection Management:  The implementation of EPP over HTTPS
      allows for more flexible architectural patterns.  However, since
      EPP is a stateful protocol, the management of EPP connection as
      defined in [RFC5730] is essential.  In EPP over HTTPS, an EPP
      connection is mapped to an HTTP session.  Operators MAY implement
      HTTP sessions through "sticky sessions" or in an external session
      store (e.g., a Redis Cluster) to ensure high availability and
      horizontal scalability.  By offloading EPP session data to a
      shared memory layer, any backend server in the cluster can process
      any incoming HTTPS request.  This approach eliminates the need for
      "sticky sessions" at the load balancer level and allows for
      seamless server maintenance and autoscaling without dropping
      active EPP sessions.  In the event of a backend server failure,
      the EPP session remains intact in the external store, allowing the
      client to continue its work through a different node.  When using
      an external store, operators MUST ensure strict synchronization
      between the HTTPS session and the EPP session time-to-live (TTL)
      to prevent "ghost sessions" or premature disconnects.

Loffredo, et al.        Expires 11 November 2026                [Page 9]
Internet-Draft               EPP over HTTPS                     May 2026

8.2.  Configuration and Deployment

   Port Management:  While EPP over TCP uses port 700, EPP over HTTPS
      uses port 443.  This facilitates easier traversal of corporate
      firewalls but requires careful separation of EPP traffic from
      regular web traffic on the same infrastructure (e.g., via specific
      subdomains or URL paths).

   TLS Configuration:  Consistently with [RFC9325], operators MUST
      maintain up-to-date TLS configurations.  Operational procedures
      SHOULD include regular audits of supported cipher suites and
      certificate renewal processes to prevent service outages.

8.3.  Performance and Scalability

   Overhead:  HTTPS introduces additional overhead compared to raw TCP
      due to HTTP headers and the TLS handshake.  However, the use of
      HTTP/2 or HTTP/3 can mitigate some of this overhead through header
      compression and more efficient connection management.  While
      HTTP/2 and HTTP/3 support request multiplexing, EPP over HTTP
      requires commands to be processed sequentially, as described in
      Section 4.  Therefore, multiplexing does not enable concurrent
      execution of EPP commands.  Nevertheless, it can still provide
      performance benefits at the transport layer, such as reducing
      head-of-line blocking and improving overall connection efficiency.

   Latency:  The initial connection setup may incur additional latency
      due to TLS and HTTP negotiation phases.  Operators MAY encourage
      the use of persistent connections (e.g., HTTP Keep-Alive) to
      reduce the frequency of connection establishment.  However,
      persistent connections decrease the flexibility of a distributed
      architecture as outlined in Section 8.1.  On client-side, EPP
      sessions can be kept alive using the EPP <hello> command defined
      in [RFC5730], which can help reduce the need for repeated session
      establishment.

8.4.  Monitoring and Logging

   L7 Monitoring:  Operators can now monitor EPP traffic at the
      Application Layer (Layer 7).  Monitoring tools SHOULD track HTTP
      status codes (e.g., 200 OK, 4xx, 5xx) in addition to EPP response
      codes to distinguish between transport-level issues and
      application-level errors.

   Logging:  In addition to EPP logs, HTTP access logs provide valuable

Loffredo, et al.        Expires 11 November 2026               [Page 10]
Internet-Draft               EPP over HTTPS                     May 2026

      metadata (e.g., source IP, request latency).  Operators MUST
      ensure that sensitive data (like EPP credentials in the login
      command or domain authinfo) is not leaked into HTTP logs as well
      as EPP logs.

8.5.  Security and Fault Management

   DDoS Mitigation:  The move to HTTPS allows for the use of modern DDoS
      protection services that are highly optimized for HTTP traffic.

   Fault Isolation:  When an error occurs, operators MUST be able to
      identify if the fault lies at the TLS layer (e.g., expired
      certificate), HTTP layer (e.g., 413 Payload Too Large), or EPP
      layer (e.g., 2200 Authentication error).

   Authentication:  HTTPS supports Client Certificate Authentication
      (mTLS).  As described in Section 9, the use of client certificates
      is RECOMMENDED to strengthen client authentication.  When mTLS is
      used, operational processes for credential rotation and revocation
      MUST be clearly defined and synchronized between the HTTP and EPP
      layers.

9.  Security Considerations

   Since client credentials are included in the EPP <login> command,
   HTTPS (Section 4.2.2 of [RFC9110]) MUST be used to protect them from
   disclosure while in transit.  HTTPS indicates that TLS is being used
   to secure the HTTP connection between the client and server.
   Transferring over TLS also prevents sniffing the HTTP session
   identifier and, consequently, impersonating a client to perform
   actions on registrars' objects.  Servers are REQUIRED to support TLS
   1.2 [RFC8446][RFC9155] or higher.

   As a further measure to enforce the security, servers SHOULD require
   clients to present a digital certificate.  Clients who possess and
   present a valid X.509 digital certificate, issued by a recognized
   Certification Authority (CA), could be identified and authenticated
   by a server who trusts the corresponding CA.  This certificate-based
   mechanism is supported by HTTPS and can be used with EPP over HTTP.

   Servers are RECOMMENDED to implement additional measures to verify
   the client.  These measures include IP allow-listing and locking the
   HTTP session identifier to the client's IP address.

Loffredo, et al.        Expires 11 November 2026               [Page 11]
Internet-Draft               EPP over HTTPS                     May 2026

   HTTP session identifiers SHOULD be randomly generated to mitigate the
   risk of obtaining a valid one through a brute-force search.  A HTTP
   session identifier SHOULD be at least 128 bits or 16 bytes long.  An
   example of a reliable HTTP session identifier is the Universally
   Unique Identifier (UUID).  Servers MAY limit the lifetime of active
   sessions to avoid them being exchanged for a long time.

   The following measures MAY also be taken to control cookies usage:

   *  Restricting their scope through the "Domain" and "Path" attributes

   *  Limiting their lifetime through the "Max-Age" and "Expire"
      attributes

   Other attributes that are normally used to secure the cookies and
   prevent them to be accessed by unintended parties or scripts, such as
   "HttpOnly" and "Secure", are meaningless in this context.  Finally,
   servers are RECOMMENDED to perform additional checks to limit the
   rate of open EPP sessions and HTTP connections to mitigate the risk
   of congestion of requests.  Here again, IP allow-listing could also
   be implemented to prevent DDoS attacks.

   If the EPP server is configured as a load balancer routing the
   requests to a pool of backend servers, some of the aforementioned
   checks SHOULD be implemented on the load balancer side.

10.  Acknowledgements

   The authors wish to acknowledge the input from the .IT technical
   team.

11.  References

11.1.  Normative References

   [BCP14]    Best Current Practice 14,
              <https://www.rfc-editor.org/info/bcp14>.
              At the time of writing, this BCP comprises the following:

              Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/info/rfc2119>.

              Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/info/rfc8174>.

Loffredo, et al.        Expires 11 November 2026               [Page 12]
Internet-Draft               EPP over HTTPS                     May 2026

   [RFC5730]  Hollenbeck, S., "Extensible Provisioning Protocol (EPP)",
              STD 69, RFC 5730, DOI 10.17487/RFC5730, August 2009,
              <https://www.rfc-editor.org/info/rfc5730>.

   [RFC6265]  Barth, A., "HTTP State Management Mechanism", RFC 6265,
              DOI 10.17487/RFC6265, April 2011,
              <https://www.rfc-editor.org/info/rfc6265>.

   [RFC7942]  Sheffer, Y. and A. Farrel, "Improving Awareness of Running
              Code: The Implementation Status Section", BCP 205,
              RFC 7942, DOI 10.17487/RFC7942, July 2016,
              <https://www.rfc-editor.org/info/rfc7942>.

   [RFC8095]  Fairhurst, G., Ed., Trammell, B., Ed., and M. Kuehlewind,
              Ed., "Services Provided by IETF Transport Protocols and
              Congestion Control Mechanisms", RFC 8095,
              DOI 10.17487/RFC8095, March 2017,
              <https://www.rfc-editor.org/info/rfc8095>.

   [RFC8446]  Rescorla, E., "The Transport Layer Security (TLS) Protocol
              Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018,
              <https://www.rfc-editor.org/info/rfc8446>.

   [RFC9110]  Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke,
              Ed., "HTTP Semantics", STD 97, RFC 9110,
              DOI 10.17487/RFC9110, June 2022,
              <https://www.rfc-editor.org/info/rfc9110>.

   [RFC9112]  Fielding, R., Ed., Nottingham, M., Ed., and J. Reschke,
              Ed., "HTTP/1.1", STD 99, RFC 9112, DOI 10.17487/RFC9112,
              June 2022, <https://www.rfc-editor.org/info/rfc9112>.

   [RFC9113]  Thomson, M., Ed. and C. Benfield, Ed., "HTTP/2", RFC 9113,
              DOI 10.17487/RFC9113, June 2022,
              <https://www.rfc-editor.org/info/rfc9113>.

   [RFC9114]  Bishop, M., Ed., "HTTP/3", RFC 9114, DOI 10.17487/RFC9114,
              June 2022, <https://www.rfc-editor.org/info/rfc9114>.

   [RFC9155]  Velvindron, L., Moriarty, K., and A. Ghedini, "Deprecating
              MD5 and SHA-1 Signature Hashes in TLS 1.2 and DTLS 1.2",
              RFC 9155, DOI 10.17487/RFC9155, December 2021,
              <https://www.rfc-editor.org/info/rfc9155>.

Loffredo, et al.        Expires 11 November 2026               [Page 13]
Internet-Draft               EPP over HTTPS                     May 2026

   [RFC9325]  Sheffer, Y., Saint-Andre, P., and T. Fossati,
              "Recommendations for Secure Use of Transport Layer
              Security (TLS) and Datagram Transport Layer Security
              (DTLS)", BCP 195, RFC 9325, DOI 10.17487/RFC9325, November
              2022, <https://www.rfc-editor.org/info/rfc9325>.

11.2.  Informative References

   [RFC7451]  Hollenbeck, S., "Extension Registry for the Extensible
              Provisioning Protocol", RFC 7451, DOI 10.17487/RFC7451,
              February 2015, <https://www.rfc-editor.org/info/rfc7451>.

   [I-D.ietf-opsawg-rfc5706bis]
              Claise, B., Clarke, J., Farrel, A., Barguil, S.,
              Pignataro, C., and R. Chen, "Guidelines for Considering
              Operations and Management in IETF Specifications", Work in
              Progress, Internet-Draft, draft-ietf-opsawg-rfc5706bis-04,
              15 March 2026, <https://datatracker.ietf.org/doc/html/
              draft-ietf-opsawg-rfc5706bis-04>.

Appendix A.  Change History

A.1.  Change from 02 to 03

   1.  Added Dan Keathley and James Gould as co-authors.

A.2.  Change from 03 to 04

   1.  Clarified the difference between an EoH connection and an EPP
       session.
   2.  Added inclusion of the "Content-Type" header in every request and
       response except for the initial GET establishing the EoH
       connection.
   3.  Revised the Security Considerations section.

A.3.  Change from 04 to 05

   1.  Added the Implementation Status section with the Verisign EPP SDK
       implementation.
   2.  Removed the "Internationalization Considerations" section and
       added the EoH character encoding matching the EPP XML character
       encoding for the EPP Greeting, the EPP commands, and the EPP
       responses.
   3.  Added inclusion of the "Cache-Control" and "Expires" headers for
       the the EPP Greeting, the EPP commands, and the EPP responses.

A.4.  Change from regext 00 to regext 01

Loffredo, et al.        Expires 11 November 2026               [Page 14]
Internet-Draft               EPP over HTTPS                     May 2026

   1.  Added EPP Extension Registry registration for the EPP transport
       over HTTPS.

A.5.  Change from regext 01 to regext 02

   1.  Added IIT-CNR/Registro.it implementation.

A.6.  Change from regext 02 to regext 03

   1.  Added the "Operational Considerations" section.
   2.  Rearranged text of the "Security Considerations" section.
   3.  Minor edits.

Authors' Addresses

   Mario Loffredo
   IIT-CNR/Registro.it
   Via Moruzzi,1
   56124 Pisa
   Italy
   Email: mario.loffredo@iit.cnr.it
   URI:   https://www.iit.cnr.it

   Lorenzo Luconi Trombacchi
   IIT-CNR/Registro.it
   Via Moruzzi,1
   56124 Pisa
   Italy
   Email: lorenzo.luconi@iit.cnr.it
   URI:   https://www.iit.cnr.it

   Maurizio Martinelli
   IIT-CNR/Registro.it
   Via Moruzzi,1
   56124 Pisa
   Italy
   Email: maurizio.martinelli@iit.cnr.it
   URI:   https://www.iit.cnr.it

   Daniel Keathley
   VeriSign, Inc.
   12061 Bluemont Way
   Reston, VA 20190
   United States of America
   Email: dkeathley@verisign.com

Loffredo, et al.        Expires 11 November 2026               [Page 15]
Internet-Draft               EPP over HTTPS                     May 2026

   URI:   http://www.verisigninc.com

   James Gould
   VeriSign, Inc.
   12061 Bluemont Way
   Reston, VA 20190
   United States of America
   Email: jgould@verisign.com
   URI:   http://www.verisigninc.com

Loffredo, et al.        Expires 11 November 2026               [Page 16]