Skip to main content

The Transport Layer Security (TLS) Protocol Version 1.3
draft-ietf-tls-rfc8446bis-14

Revision differences

Document history

Date Rev. By Action
2025-12-16
14 (System) RFC Editor state changed to AUTH48
2025-10-17
14 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2025-09-16
14 (System) RFC Editor state changed to EDIT from IESG
2025-09-13
14 Eric Rescorla New version available: draft-ietf-tls-rfc8446bis-14.txt
2025-09-13
14 (System) New version approved
2025-09-13
14 (System) Request for posting confirmation emailed to previous authors: Eric Rescorla
2025-09-13
14 Eric Rescorla Uploaded new revision
2025-09-03
13 (System) RFC Editor state changed to IESG from AUTH
2025-08-13
13 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2025-08-12
13 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2025-08-12
13 (System) IANA Action state changed to In Progress from Waiting on Authors
2025-08-12
13 (System) IANA Action state changed to Waiting on Authors from In Progress
2025-08-11
13 (System) RFC Editor state changed to AUTH from EDIT
2025-08-11
13 (System) RFC Editor state changed to EDIT
2025-08-11
13 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2025-08-11
13 (System) Announcement was received by RFC Editor
2025-08-11
13 (System) IANA Action state changed to In Progress
2025-08-11
13 Liz Flynn Downref to RFC 6962 approved by Last Call for draft-ietf-tls-rfc8446bis-13
2025-08-11
13 Liz Flynn Downref to RFC 8439 approved by Last Call for draft-ietf-tls-rfc8446bis-13
2025-08-11
13 (System) Removed all action holders (IESG state changed)
2025-08-11
13 Liz Flynn IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2025-08-11
13 Liz Flynn IESG has approved the document
2025-08-11
13 Liz Flynn Closed "Approve" ballot
2025-08-11
13 Liz Flynn Ballot approval text was generated
2025-08-11
13 Paul Wouters The document is ready to proceed. Thanks for processing the IESG comments
2025-08-11
13 Paul Wouters IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::AD Followup
2025-07-21
13 (System) Changed action holders to Paul Wouters (IESG state changed)
2025-07-21
13 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2025-07-21
13 Eric Rescorla New version available: draft-ietf-tls-rfc8446bis-13.txt
2025-07-21
13 (System) New version approved
2025-07-21
13 (System) Request for posting confirmation emailed to previous authors: Eric Rescorla
2025-07-21
13 Eric Rescorla Uploaded new revision
2025-05-22
12 (System) Changed action holders to Eric Rescorla (IESG state changed)
2025-05-22
12 Cindy Morgan IESG state changed to Approved-announcement to be sent::Revised I-D Needed from IESG Evaluation
2025-05-22
12 Éric Vyncke [Ballot comment]
After reviewing only the diffs from RFC 8446 (and there is nearly no intersection with the INT area).
2025-05-22
12 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2025-05-20
12 (System) IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2025-05-19
12 Roman Danyliw [Ballot comment]
Thank you to Susan Hares for the GENART review.
2025-05-19
12 Roman Danyliw [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw
2025-05-19
12 Orie Steele [Ballot Position Update] New position, No Objection, has been recorded for Orie Steele
2025-05-19
12 Mike Bishop
[Ballot comment]
Thanks for this clean and well-written revision. I have only a few minor observations which can be incorporated at the discretion of the …
[Ballot comment]
Thanks for this clean and well-written revision. I have only a few minor observations which can be incorporated at the discretion of the author and the responsible AD:
===

In the list of diffs, one of the bullets appears to be two changes. Should these be separate bullets, or should a sentence be added before these two explaining how they're connected?

>Restore text defining the level of "close_notify" to "warning".
>Clarify behavior around "user_canceled", requiring that
>"close_notify" be sent and that "user_canceled" should be ignored.

===

The language around the SCSV for pre-1.2 values feels odd. You MUST NOT negotiate older versions, but if you do anyway, you MUST do it this way? I would shift this to a description of how clients and servers were required to behave prior to this revision of 1.3 at most.

===

CURRENT: select a group based "supported_groups"

CONSIDER: select a group based on "supported_groups"

===

OLD: For X25519 and X448, the contents of the public value are the byte string inputs and outputs of the corresponding functions....

CURRENT: For X25519 and X448, the contents of the public value is the K_A or K_B value....

CONSIDER: For X25519 and X448, the content of the public value is the K_A or K_B value....
2025-05-19
12 Mike Bishop Ballot comment text updated for Mike Bishop
2025-05-19
12 Mike Bishop
[Ballot comment]
Thanks for this clean and well-written revision. I have only a few minor observations which can be incorporated at the discretion of the …
[Ballot comment]
Thanks for this clean and well-written revision. I have only a few minor observations which can be incorporated at the discretion of the author and the responsible AD:

In the list of diffs, one of the bullets appears to be two changes. Should these be separate bullets, or should a sentence be added before these two explaining how they're connected?

>Restore text defining the level of "close_notify" to "warning".
>Clarify behavior around "user_canceled", requiring that
>"close_notify" be sent and that "user_canceled" should be ignored.

The language around the SCSV for pre-1.2 values feels odd. You MUST NOT negotiate older versions, but if you do anyway, you MUST do it this way? I would shift this to a description of how clients and servers were required to behave prior to this revision of 1.3 at most.

CURRENT: select a group based "supported_groups"
CONSIDER: select a group based on "supported_groups"

OLD: For X25519 and X448, the contents of the public value are the byte string inputs and outputs of the corresponding functions....
CURRENT: For X25519 and X448, the contents of the public value is the K_A or K_B value....
CONSIDER: For X25519 and X448, the content of the public value is the K_A or K_B value....
2025-05-19
12 Mike Bishop [Ballot Position Update] New position, No Objection, has been recorded for Mike Bishop
2025-05-19
12 Ketan Talaulikar
[Ballot comment]
Thanks to the authors, contributors, and the WG for the work on this important document.

I have the following comments/suggestions to offer on …
[Ballot comment]
Thanks to the authors, contributors, and the WG for the work on this important document.

I have the following comments/suggestions to offer on this document.

1) In the abstract ... and this is assuming that this document is not actually obsoleting 8422 ...

CURRENT
This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes RFCs 5077, 5246, 6961, 8422, and 8446. This document also specifies new requirements for TLS 1.2 implementations.

SUGGEST
This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes RFC 8446. This document also specifies new requirements for TLS 1.2 implementations.

2) Please state in the introduction section on what part of 8422 is being updated by this document.

3) RFCs 5077, 5246 and 6961 were actually obsoleted by RFC 8446 and not this document. Please rephrase some of the references to those documents saying that they were obsoleted by RFC 8446 and not "this document".

4) Ref section 1.4 - does this document also not update RFC7627 with its terminology change?

5) I found the IANA consideration section hard to follow in terms of clarity on what exactly is the action for IANA team from this document. Section 11.1 has clear actions but the parent section 11 is perhaps having some remnant actions from RFC8446 that might be confusing. If all that the section 11 talks about is something that IANA has already done, perhaps simply a description of the IANA registries pertaining to this document (previously pertaining to RFC8446) without talking about any action that was done or to be done would be more clear? And then there is 11.1 for the actual IANA work/actions to be done?

6) I believe there is an error with the reference to RFC8444. That one is a OSPF routing protocol extension and don't see how that comes into TLS land.
2025-05-19
12 Ketan Talaulikar [Ballot Position Update] New position, No Objection, has been recorded for Ketan Talaulikar
2025-05-19
12 Jim Guichard [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard
2025-05-19
12 Gorry Fairhurst
[Ballot comment]
I have reviewed the changes with respect to RFC 8446. Thank you for this update!

I'd suggest looking at the whole I-D …
[Ballot comment]
I have reviewed the changes with respect to RFC 8446. Thank you for this update!

I'd suggest looking at the whole I-D for the phrase "in order" to ensure that no ambiguity could be intoduced by reading this as an sequence ordering requirement, rather than a logical condition in the writing style. In at least one place I was unsure: e.g., I wonder if /though endpoints are able to pad TLS records in order to obscure lengths/ is better as /though endpoints are able to pad TLS records to obscure lengths/ or /though endpoints are able to obscure lengths by padding TLS records/.
2025-05-19
12 Gorry Fairhurst [Ballot Position Update] New position, No Objection, has been recorded for Gorry Fairhurst
2025-05-16
12 Erik Kline
[Ballot comment]
# Internet AD comments for draft-ietf-tls-rfc8446bis-12
CC @ekline

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Nits …
[Ballot comment]
# Internet AD comments for draft-ietf-tls-rfc8446bis-12
CC @ekline

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Nits

### S4.2.11.2

* "which may or may match" -> "which may or may not match"?
2025-05-16
12 Erik Kline [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline
2025-05-14
12 Andy Newton [Ballot Position Update] New position, No Objection, has been recorded for Andy Newton
2025-05-14
12 Deb Cooley
[Ballot comment]
Thanks to Yoav Nir for their secdir review.

This is a nice refresh of RFC 8446 (how the heck was RFC8446 published almost …
[Ballot comment]
Thanks to Yoav Nir for their secdir review.

This is a nice refresh of RFC 8446 (how the heck was RFC8446 published almost 7 years ago?).
2025-05-14
12 Deb Cooley [Ballot Position Update] New position, Yes, has been recorded for Deb Cooley
2025-05-12
12 Mohamed Boucadair
[Ballot comment]
Hi Eric,

Thanks for the effort put into the maintenance of this key specification.

I reviewed only the diff vs. RFC8446. Please …
[Ballot comment]
Hi Eric,

Thanks for the effort put into the maintenance of this key specification.

I reviewed only the diff vs. RFC8446. Please find below some few comments, most are nits:

# No need to obsolete already obsoleted RFCs (RFCs 5077, 5246, 6961, 8422). Likewise, I didn’t find new updates of 5705 and 6066 beyond what was already updated by RFC8446.

CURRENT:
  This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
  RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
  new requirements for TLS 1.2 implementations.

# (nit) Introduction: “application protocols ..with their application protocol”

OLD:
Application protocols using TLS
  MUST specify how TLS works with their application protocol, including
  how and when handshaking occurs, and how to do identity verification.

Maybe

NEW:
  Applications using TLS
  MUST specify how TLS works with their application protocol, including
  how and when handshaking occurs, and how to do identity verification.

# (nit) 4.2.8: omission and inclusion

OLD:
  For this reason, the omission of a share for group A and inclusion of
  one for group B does not mean that the client prefers B to A.

NEW:
  For this reason, the omission of a share for group A and inclusion of
  one for group B do not mean that the client prefers B to A.

# (nit) 4.2.8.1

OLD: the contents of the public value is
NEW: the contents of the public value are

# (nit) Section 11: please double check this sentence:

CURRENT:
The changes
  between [RFC8446] and [RFC8447] this document are described in
  Section 11.1.  IANA has updated these to reference this document.

Cheers,
Med
2025-05-12
12 Mohamed Boucadair [Ballot Position Update] New position, No Objection, has been recorded for Mohamed Boucadair
2025-05-09
12 Gunter Van de Velde
[Ballot comment]
When looking at the idnits tool there are quiet a number of messages to look at, and not fully explained in doc shepherds …
[Ballot comment]
When looking at the idnits tool there are quiet a number of messages to look at, and not fully explained in doc shepherds writeup
2025-05-09
12 Gunter Van de Velde [Ballot Position Update] New position, No Objection, has been recorded for Gunter Van de Velde
2025-04-09
12 Cindy Morgan Placed on agenda for telechat - 2025-05-22
2025-04-09
12 Paul Wouters Ballot has been issued
2025-04-09
12 Paul Wouters [Ballot Position Update] New position, Yes, has been recorded for Paul Wouters
2025-04-09
12 Paul Wouters Created "Approve" ballot
2025-04-09
12 Paul Wouters IESG state changed to IESG Evaluation from Waiting for Writeup
2025-04-09
12 Paul Wouters Ballot writeup was changed
2025-04-09
12 Paul Wouters IESG state changed to Waiting for Writeup from AD Evaluation
2025-04-09
12 (System) Changed action holders to Paul Wouters (IESG state changed)
2025-04-09
12 Paul Wouters IESG state changed to AD Evaluation from AD Evaluation::Revised I-D Needed
2025-03-17
12 Sean Turner Added to session: IETF-122: tls  Thu-0230
2025-03-11
12 (System) Changed action holders to Eric Rescorla, Paul Wouters (IESG state changed)
2025-03-11
12 Paul Wouters IESG state changed to AD Evaluation::Revised I-D Needed from Waiting for AD Go-Ahead
2025-02-17
12 (System) IANA Review state changed to Version Changed - Review Needed from IANA - Not OK
2025-02-17
12 Eric Rescorla New version available: draft-ietf-tls-rfc8446bis-12.txt
2025-02-17
12 (System) New version approved
2025-02-17
12 (System) Request for posting confirmation emailed to previous authors: Eric Rescorla
2025-02-17
12 Eric Rescorla Uploaded new revision
2025-02-05
11 Barry Leiba Request closed, assignment withdrawn: Bernard Aboba Last Call ARTART review
2025-02-05
11 Barry Leiba Closed request for Last Call review by ARTART with state 'Overtaken by Events'
2024-12-27
11 Carlos Pignataro Closed request for Last Call review by OPSDIR with state 'Overtaken by Events'
2024-12-27
11 Carlos Pignataro Assignment of request for Last Call review by OPSDIR to Marisol Palmero was marked no-response
2024-11-15
11 Sue Hares
Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Susan Hares. Sent review to list. Submission of review completed at an earlier …
Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Susan Hares. Sent review to list. Submission of review completed at an earlier date.
2024-11-15
11 Sue Hares Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Susan Hares.
2024-11-01
11 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2024-10-31
11 Yoav Nir Request for Last Call review by SECDIR Completed: Ready. Reviewer: Yoav Nir. Sent review to list.
2024-10-31
11 David Dong
IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-tls-rfc8446bis-11. If any part of this review is inaccurate, please let us know.

IANA has a question …
IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-tls-rfc8446bis-11. If any part of this review is inaccurate, please let us know.

IANA has a question about the third action requested in the IANA Considerations section of this document.

IANA understands that, upon approval of this document, there are three actions which we must complete.

First, IANA will update all references to RFC8446 and change them to [ RFC-to-be ] in the following registries:

https://www.iana.org/assignments/acl-tls/
https://www.iana.org/assignments/channel-binding-types/
https://www.iana.org/assignments/http-proxy-status/
https://www.iana.org/assignments/media-types/message/
https://www.iana.org/assignments/tls-extensiontype-values/
https://www.iana.org/assignments/tls-parameters/

as well as on the IANA Matrix at:

https://www.iana.org/assignments/

Second, in the TLS ExtensionType Values registry in the Transport Layer Security (TLS) Extensions registry group, the registration for Value: 23; Extension Name: extended_master_secret will be changed to:

Value: 23
Extension Name: extended_main_secret
TLS 1.3: -
DTLS-Only: N
Recommended: Y
Reference: [ RFC-to-be ]

Third, in the TLS Alerts registry in the Transport Layer Security (TLS) Parameters registry group located at:

https://www.iana.org/assignments/tls-parameters/

a single new registration will be made as follows:

Value: 117
Description: general_error
DTLS-OK:
Reference: [ RFC-to-be ]
Comment:

IANA Question --> What should the entry for "DTLS-OK" be for this new registration?

We understand that these are the only actions required to be completed upon approval of this document.

NOTE: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed.

For definitions of IANA review states, please see:

https://datatracker.ietf.org/help/state/draft/iana-review

Thank you,

David Dong
IANA Services Sr. Specialist
2024-10-31
11 (System) IANA Review state changed to IANA - Not OK from IANA - Review Needed
2024-10-23
11 Jean Mahoney Request for Last Call review by GENART is assigned to Susan Hares
2024-10-22
11 Barry Leiba Request for Last Call review by ARTART is assigned to Bernard Aboba
2024-10-21
11 Carlos Pignataro Request for Last Call review by OPSDIR is assigned to Marisol Palmero
2024-10-19
11 Tero Kivinen Request for Last Call review by SECDIR is assigned to Yoav Nir
2024-10-18
11 Jenny Bui IANA Review state changed to IANA - Review Needed
2024-10-18
11 Jenny Bui
The following Last Call announcement was sent out (ends 2024-11-01):

From: The IESG
To: IETF-Announce
CC: draft-ietf-tls-rfc8446bis@ietf.org, paul.wouters@aiven.io, sean@sn3rd.com, tls-chairs@ietf.org, tls@ietf.org …
The following Last Call announcement was sent out (ends 2024-11-01):

From: The IESG
To: IETF-Announce
CC: draft-ietf-tls-rfc8446bis@ietf.org, paul.wouters@aiven.io, sean@sn3rd.com, tls-chairs@ietf.org, tls@ietf.org
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (The Transport Layer Security (TLS) Protocol Version 1.3) to Proposed Standard


The IESG has received a request from the Transport Layer Security WG (tls) to
consider the following document: - 'The Transport Layer Security (TLS)
Protocol Version 1.3'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2024-11-01. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  This document specifies version 1.3 of the Transport Layer Security
  (TLS) protocol.  TLS allows client/server applications to communicate
  over the Internet in a way that is designed to prevent eavesdropping,
  tampering, and message forgery.

  This document updates RFCs 5705, 6066, 7627, and 8422 and obsoletes
  RFCs 5077, 5246, 6961, 8422, and 8446.  This document also specifies
  new requirements for TLS 1.2 implementations.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-tls-rfc8446bis/



No IPR declarations have been submitted directly on this I-D.


The document contains these normative downward references.
See RFC 3967 for additional information:
    rfc8439: ChaCha20 and Poly1305 for IETF Protocols (Informational - Internet Research Task Force (IRTF) stream)
    rfc6962: Certificate Transparency (Experimental - Internet Engineering Task Force (IETF) stream)



2024-10-18
11 Jenny Bui IESG state changed to In Last Call from Last Call Requested
2024-10-18
11 Jenny Bui Last call announcement was generated
2024-10-17
11 Paul Wouters Last call was requested
2024-10-17
11 Paul Wouters Ballot approval text was generated
2024-10-17
11 Paul Wouters Ballot writeup was generated
2024-10-17
11 Paul Wouters IESG state changed to Last Call Requested from Publication Requested
2024-10-17
11 Paul Wouters Last call announcement was changed
2024-10-16
11 Sean Turner
# Document Shepherd Write-Up for Group Documents

*This version is dated 4 July 2022.*

Thank you for your service as a document shepherd. Among the …
# Document Shepherd Write-Up for Group Documents

*This version is dated 4 July 2022.*

Thank you for your service as a document shepherd. Among the responsibilities is
answering the questions in this write-up to give helpful context to Last Call
and Internet Engineering Steering Group ([IESG][1]) reviewers, and your
diligence in completing it is appreciated. The full role of the shepherd is
further described in [RFC 4858][2]. You will need the cooperation of the authors
and editors to complete these checks.

Note that some numbered items contain multiple related questions; please be sure
to answer all of them.

## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did it reach broad agreement?

This I-D represents the consensus on the WG; note that this is a “bis” and targeted clarifications and not major changes. We did a WG call in March ‘23. For issues & pull requests with substantive changes that were filed since, we ran consensus calls for each.

2. Was there controversy about particular points, or were there decisions where
  the consensus was particularly rough?

I would not say that there was much controversy.

3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If
  so, please summarize the areas of conflict in separate email messages to the
  responsible Area Director. (It should be in a separate email because this
  questionnaire is publicly available.)

There have been no threats of appeal.

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated
  plans to implement? Are any existing implementations reported somewhere,
  either in the document itself (as [RFC 7942][3] recommends) or elsewhere
  (where)?

There are numerous implementations of TLS 1.3; this I-D is to make clarifications for those implementations. No existing implementations are not listed in the I-D.


## Additional Reviews

5. Do the contents of this document closely interact with technologies in other
  IETF working groups or external organizations, and would it therefore benefit
  from their review? Have those reviews occurred? If yes, describe which
  reviews took place.

TLS 1.3 is used a lot, but is most likely most related to QUIC; QUIC uses the TLS 1.3 handshake mechanism. While the I-D has not been sent to the WG for review specifically, I do know that those who implemented QUIC have reviewed this I-D, e.g., Google, Mozilla, Safari, Cloudflare, Akamai, Microsoft, etc.

6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

N/A

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the [recommended validation tools][4] for syntax and
  formatting validation? If there are any resulting errors or warnings, what is
  the justification for not fixing them at this time? Does the YANG module
  comply with the Network Management Datastore Architecture (NMDA) as specified
  in [RFC 8342][5]?

N/A

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.

N/A

## Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

The Shepherd believes that this document is ready to go.

10. Several IETF Areas have assembled [lists of common issues that their
reviewers encounter][6]. For which areas have such issues been identified
and addressed? For which does this still need to happen in subsequent
reviews?

As this a bis, these checks performed for draft-ietf-tls-tls13 still hold. I do not believe that any changes made change anything WRT to those previous reviews for common issues.

11. What type of RFC publication is being requested on the IETF stream ([Best
Current Practice][12], [Proposed Standard, Internet Standard][13],
[Informational, Experimental or Historic][14])? Why is this the proper type
of RFC? Do all Datatracker state attributes correctly reflect this intent?

Standards Track is requested. This I-D is obsoleting RFC 8446, which was also Standards Track, so the request makes sense.

12. Have reasonable efforts been made to remind all authors of the intellectual
property rights (IPR) disclosure obligations described in [BCP 79][7]? To
the best of your knowledge, have all required disclosures been filed? If
not, explain why. If yes, summarize any relevant discussion, including links
to publicly-available messages when applicable.

The Shepherd has confirmed with the author that all required disclosures have been filed.

13. Has each author, editor, and contributor shown their willingness to be
listed as such? If the total number of authors and editors on the front page
is greater than five, please provide a justification.

The Shepherd has confirmed with the author that they are willing to be an author.

14. Document any remaining I-D nits in this document. Simply running the [idnits
tool][8] is not enough; please review the ["Content Guidelines" on
authors.ietf.org][15]. (Also note that the current idnits tool generates
some incorrect warnings; a rewrite is underway.)

-11 has the following nits, but none should stop the I-D from progressing:

* Long lines: We will leave these to AUTH48
* RFCs 5077, 5246, 6961, 8422, and 8446 not being mentioned in abstract
  as obsoleted: they are there there
* DOWNREFs: All are fine and were present in RFC 8446
* Obsolete REFs: All are fine and are they are there on purpose

15. Should any informative references be normative or vice-versa? See the [IESG
Statement on Normative and Informative References][16].

I believe the references are properly categorized.

NOTE: There does appear to be an issue with the RFC 8996 reference.

16. List any normative references that are not freely available to anyone. Did
the community have sufficient access to review any such normative
references?

N/A

17. Are there any normative downward references (see [RFC 3967][9] and [BCP
97][10]) that are not already listed in the [DOWNREF registry][17]? If so,
list them.

N/A; no new DOWNREFs were introduced by this I-D.

18. Are there normative references to documents that are not ready to be
submitted to the IESG for publication or are otherwise in an unclear state?
If so, what is the plan for their completion?

See q17.

19. Will publication of this document change the status of any existing RFCs? If
so, does the Datatracker metadata correctly reflect this and are those RFCs
listed on the title page, in the abstract, and discussed in the
introduction? If not, explain why and point to the part of the document
where the relationship of this document to these other RFCs is discussed.

Obviously, this I-D obsoletes RFC 8446 and the metadata, title page, abstract, and introduction all explain this.

This I-D also adds that it updates 7627 & 8422. The metadata, title page, and abstract explain this. 7627 is mentioned in the introduction; 8422 is not. 4492, which 8422, updates should have been in the RFC 8446 metadata because it removed point compression (this is noted in the intro), but we missed including 4492 in the metadata. Now 4492 has been obsoleted by 8422. See the following for the discussion: https://github.com/tlswg/tls13-spec/pull/1229/files.

I will let others bikeshed on whether the Obsoletes header should stay as is:
Obsoletes: 8446
or include the previous Obsoletes info as follows:
Obsoletes: 5077, 5246, 6961, 8446
Note we did have a PR for this:
https://github.com/tlswg/tls13-spec/issues/1309
and a PR:
https://github.com/tlswg/tls13-spec/pull/1322

20. Describe the document shepherd's review of the IANA considerations section,
especially with regard to its consistency with the body of the document.
Confirm that all aspects of the document requiring IANA assignments are
associated with the appropriate reservations in IANA registries. Confirm
that any referenced IANA registries have been clearly identified. Confirm
that each newly created IANA registry specifies its initial contents,
allocations procedures, and a reasonable name (see [RFC 8126][11]).

S11: The diff between RFC 8446 and this I-D shows that we addressed an errata; see https://www.rfc-editor.org/errata_search.php?eid=5976.

S11.1 clearly identifies new IANA considerations. There are three and they are correct.

21. List any new IANA registries that require Designated Expert Review for
future allocations. Are the instructions to the Designated Expert clear?
Please include suggestions of designated experts, if appropriate.

N/A

[1]: https://www.ietf.org/about/groups/iesg/
[2]: https://www.rfc-editor.org/rfc/rfc4858.html
[3]: https://www.rfc-editor.org/rfc/rfc7942.html
[4]: https://wiki.ietf.org/group/ops/yang-review-tools
[5]: https://www.rfc-editor.org/rfc/rfc8342.html
[6]: https://wiki.ietf.org/group/iesg/ExpertTopics
[7]: https://www.rfc-editor.org/info/bcp79
[8]: https://www.ietf.org/tools/idnits/
[9]: https://www.rfc-editor.org/rfc/rfc3967.html
[10]: https://www.rfc-editor.org/info/bcp97
[11]: https://www.rfc-editor.org/rfc/rfc8126.html
[12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5
[13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1
[14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2
[15]: https://authors.ietf.org/en/content-guidelines-overview
[16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/
[17]: https://datatracker.ietf.org/doc/downref/
2024-10-16
11 Sean Turner IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2024-10-16
11 Sean Turner IESG state changed to Publication Requested from I-D Exists
2024-10-16
11 (System) Changed action holders to Paul Wouters (IESG state changed)
2024-10-16
11 Sean Turner Responsible AD changed to Paul Wouters
2024-10-16
11 Sean Turner Document is now in IESG state Publication Requested
2024-10-16
11 Sean Turner
# Document Shepherd Write-Up for Group Documents

*This version is dated 4 July 2022.*

Thank you for your service as a document shepherd. Among the …
# Document Shepherd Write-Up for Group Documents

*This version is dated 4 July 2022.*

Thank you for your service as a document shepherd. Among the responsibilities is
answering the questions in this write-up to give helpful context to Last Call
and Internet Engineering Steering Group ([IESG][1]) reviewers, and your
diligence in completing it is appreciated. The full role of the shepherd is
further described in [RFC 4858][2]. You will need the cooperation of the authors
and editors to complete these checks.

Note that some numbered items contain multiple related questions; please be sure
to answer all of them.

## Document History

1. Does the working group (WG) consensus represent the strong concurrence of a
  few individuals, with others being silent, or did it reach broad agreement?

This I-D represents the consensus on the WG; note that this is a “bis” and targeted clarifications and not major changes. We did a WG call in March ‘23. For issues & pull requests with substantive changes that were filed since, we ran consensus calls for each.

2. Was there controversy about particular points, or were there decisions where
  the consensus was particularly rough?

I would not say that there was much controversy.

3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If
  so, please summarize the areas of conflict in separate email messages to the
  responsible Area Director. (It should be in a separate email because this
  questionnaire is publicly available.)

There have been no threats of appeal.

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated
  plans to implement? Are any existing implementations reported somewhere,
  either in the document itself (as [RFC 7942][3] recommends) or elsewhere
  (where)?

There are numerous implementations of TLS 1.3; this I-D is to make clarifications for those implementations. No existing implementations are not listed in the I-D.


## Additional Reviews

5. Do the contents of this document closely interact with technologies in other
  IETF working groups or external organizations, and would it therefore benefit
  from their review? Have those reviews occurred? If yes, describe which
  reviews took place.

TLS 1.3 is used a lot, but is most likely most related to QUIC; QUIC uses the TLS 1.3 handshake mechanism. While the I-D has not been sent to the WG for review specifically, I do know that those who implemented QUIC have reviewed this I-D, e.g., Google, Mozilla, Safari, Cloudflare, Akamai, Microsoft, etc.

6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

N/A

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the [recommended validation tools][4] for syntax and
  formatting validation? If there are any resulting errors or warnings, what is
  the justification for not fixing them at this time? Does the YANG module
  comply with the Network Management Datastore Architecture (NMDA) as specified
  in [RFC 8342][5]?

N/A

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.

N/A

## Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

The Shepherd believes that this document is ready to go.

10. Several IETF Areas have assembled [lists of common issues that their
reviewers encounter][6]. For which areas have such issues been identified
and addressed? For which does this still need to happen in subsequent
reviews?

As this a bis, these checks performed for draft-ietf-tls-tls13 still hold. I do not believe that any changes made change anything WRT to those previous reviews for common issues.

11. What type of RFC publication is being requested on the IETF stream ([Best
Current Practice][12], [Proposed Standard, Internet Standard][13],
[Informational, Experimental or Historic][14])? Why is this the proper type
of RFC? Do all Datatracker state attributes correctly reflect this intent?

Standards Track is requested. This I-D is obsoleting RFC 8446, which was also Standards Track, so the request makes sense.

12. Have reasonable efforts been made to remind all authors of the intellectual
property rights (IPR) disclosure obligations described in [BCP 79][7]? To
the best of your knowledge, have all required disclosures been filed? If
not, explain why. If yes, summarize any relevant discussion, including links
to publicly-available messages when applicable.

The Shepherd has confirmed with the author that all required disclosures have been filed.

13. Has each author, editor, and contributor shown their willingness to be
listed as such? If the total number of authors and editors on the front page
is greater than five, please provide a justification.

The Shepherd has confirmed with the author that they are willing to be an author.

14. Document any remaining I-D nits in this document. Simply running the [idnits
tool][8] is not enough; please review the ["Content Guidelines" on
authors.ietf.org][15]. (Also note that the current idnits tool generates
some incorrect warnings; a rewrite is underway.)

-11 has the following nits, but none should stop the I-D from progressing:

* Long lines: We will leave these to AUTH48
* RFCs 5077, 5246, 6961, 8422, and 8446 not being mentioned in abstract
  as obsoleted: they are there there
* DOWNREFs: All are fine and were present in RFC 8446
* Obsolete REFs: All are fine and are they are there on purpose

15. Should any informative references be normative or vice-versa? See the [IESG
Statement on Normative and Informative References][16].

I believe the references are properly categorized.

NOTE: There does appear to be an issue with the RFC 8996 reference.

16. List any normative references that are not freely available to anyone. Did
the community have sufficient access to review any such normative
references?

N/A

17. Are there any normative downward references (see [RFC 3967][9] and [BCP
97][10]) that are not already listed in the [DOWNREF registry][17]? If so,
list them.

N/A; no new DOWNREFs were introduced by this I-D.

18. Are there normative references to documents that are not ready to be
submitted to the IESG for publication or are otherwise in an unclear state?
If so, what is the plan for their completion?

See q17.

19. Will publication of this document change the status of any existing RFCs? If
so, does the Datatracker metadata correctly reflect this and are those RFCs
listed on the title page, in the abstract, and discussed in the
introduction? If not, explain why and point to the part of the document
where the relationship of this document to these other RFCs is discussed.

Obviously, this I-D obsoletes RFC 8446 and the metadata, title page, abstract, and introduction all explain this.

This I-D also adds that it updates 7627 & 8422. The metadata, title page, and abstract explain this. 7627 is mentioned in the introduction; 8422 is not. 4492, which 8422, updates should have been in the RFC 8446 metadata because it removed point compression (this is noted in the intro), but we missed including 4492 in the metadata. Now 4492 has been obsoleted by 8422. See the following for the discussion: https://github.com/tlswg/tls13-spec/pull/1229/files.

I will let others bikeshed on whether the Obsoletes header should stay as is:
Obsoletes: 8446
or include the previous Obsoletes info as follows:
Obsoletes: 5077, 5246, 6961, 8446
Note we did have a PR for this:
https://github.com/tlswg/tls13-spec/issues/1309
and a PR:
https://github.com/tlswg/tls13-spec/pull/1322

20. Describe the document shepherd's review of the IANA considerations section,
especially with regard to its consistency with the body of the document.
Confirm that all aspects of the document requiring IANA assignments are
associated with the appropriate reservations in IANA registries. Confirm
that any referenced IANA registries have been clearly identified. Confirm
that each newly created IANA registry specifies its initial contents,
allocations procedures, and a reasonable name (see [RFC 8126][11]).

S11: The diff between RFC 8446 and this I-D shows that we addressed an errata; see https://www.rfc-editor.org/errata_search.php?eid=5976.

S11.1 clearly identifies new IANA considerations. There are three and they are correct.

21. List any new IANA registries that require Designated Expert Review for
future allocations. Are the instructions to the Designated Expert clear?
Please include suggestions of designated experts, if appropriate.

N/A

[1]: https://www.ietf.org/about/groups/iesg/
[2]: https://www.rfc-editor.org/rfc/rfc4858.html
[3]: https://www.rfc-editor.org/rfc/rfc7942.html
[4]: https://wiki.ietf.org/group/ops/yang-review-tools
[5]: https://www.rfc-editor.org/rfc/rfc8342.html
[6]: https://wiki.ietf.org/group/iesg/ExpertTopics
[7]: https://www.rfc-editor.org/info/bcp79
[8]: https://www.ietf.org/tools/idnits/
[9]: https://www.rfc-editor.org/rfc/rfc3967.html
[10]: https://www.rfc-editor.org/info/bcp97
[11]: https://www.rfc-editor.org/rfc/rfc8126.html
[12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5
[13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1
[14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2
[15]: https://authors.ietf.org/en/content-guidelines-overview
[16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/
[17]: https://datatracker.ietf.org/doc/downref/
2024-09-16
11 Sean Turner Tag Revised I-D Needed - Issue raised by WG cleared.
2024-09-16
11 Sean Turner IETF WG state changed to WG Consensus: Waiting for Write-Up from Waiting for WG Chair Go-Ahead
2024-09-16
11 Sean Turner Changed consensus to Yes from Unknown
2024-09-16
11 Sean Turner Intended Status changed to Proposed Standard from None
2024-09-16
11 Sean Turner Notification list changed to sean@sn3rd.com from caw@heapingbits.net, sean@sn3rd.com
2024-09-16
11 Sean Turner Notification list changed to caw@heapingbits.net, sean@sn3rd.com from caw@heapingbits.net because the document shepherd was set
2024-09-16
11 Sean Turner Document shepherd changed to Sean Turner
2024-09-14
11 Eric Rescorla New version available: draft-ietf-tls-rfc8446bis-11.txt
2024-09-14
11 (System) New version approved
2024-09-14
11 (System) Request for posting confirmation emailed to previous authors: Eric Rescorla
2024-09-14
11 Eric Rescorla Uploaded new revision
2024-09-04
10 (System) Document has expired
2024-03-03
10 Eric Rescorla New version available: draft-ietf-tls-rfc8446bis-10.txt
2024-03-03
10 Eric Rescorla New version accepted (logged-in submitter: Eric Rescorla)
2024-03-03
10 Eric Rescorla Uploaded new revision
2024-01-08
09 (System) Document has expired
2023-12-06
09 Sean Turner
Forgot to change the state after the WGLC closed.

I added revised I-D needed because we know there are some changes coming as a result …
Forgot to change the state after the WGLC closed.

I added revised I-D needed because we know there are some changes coming as a result of discussion at IETF 118.
2023-12-06
09 Sean Turner Tag Revised I-D Needed - Issue raised by WG set.
2023-12-06
09 Sean Turner IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call
2023-11-05
09 Sean Turner Added to session: IETF-118: tls  Mon-0830
2023-07-07
09 Eric Rescorla New version available: draft-ietf-tls-rfc8446bis-09.txt
2023-07-07
09 Eric Rescorla New version accepted (logged-in submitter: Eric Rescorla)
2023-07-07
09 Eric Rescorla Uploaded new revision
2023-07-07
08 Eric Rescorla New version available: draft-ietf-tls-rfc8446bis-08.txt
2023-07-07
08 Eric Rescorla New version accepted (logged-in submitter: Eric Rescorla)
2023-07-07
08 Eric Rescorla Uploaded new revision
2023-03-28
07 Sean Turner IETF WG state changed to In WG Last Call from WG Document
2023-03-26
07 Eric Rescorla New version available: draft-ietf-tls-rfc8446bis-07.txt
2023-03-26
07 Eric Rescorla New version accepted (logged-in submitter: Eric Rescorla)
2023-03-26
07 Eric Rescorla Uploaded new revision
2023-03-26
06 Sean Turner Added to session: IETF-116: tls  Tue-0400
2023-03-13
06 Eric Rescorla New version available: draft-ietf-tls-rfc8446bis-06.txt
2023-03-13
06 Eric Rescorla New version accepted (logged-in submitter: Eric Rescorla)
2023-03-13
06 Eric Rescorla Uploaded new revision
2022-10-24
05 Eric Rescorla New version available: draft-ietf-tls-rfc8446bis-05.txt
2022-10-24
05 Eric Rescorla New version accepted (logged-in submitter: Eric Rescorla)
2022-10-24
05 Eric Rescorla Uploaded new revision
2022-09-08
04 (System) Document has expired
2022-03-07
04 Eric Rescorla New version available: draft-ietf-tls-rfc8446bis-04.txt
2022-03-07
04 (System) New version approved
2022-03-07
04 (System) Request for posting confirmation emailed to previous authors: Eric Rescorla
2022-03-07
04 Eric Rescorla Uploaded new revision
2021-11-05
03 Christopher Wood Added to session: IETF-112: tls  Tue-1600
2021-10-25
03 Eric Rescorla New version available: draft-ietf-tls-rfc8446bis-03.txt
2021-10-25
03 (System) New version approved
2021-10-25
03 (System) Request for posting confirmation emailed to previous authors: Eric Rescorla
2021-10-25
03 Eric Rescorla Uploaded new revision
2021-08-23
02 Eric Rescorla New version available: draft-ietf-tls-rfc8446bis-02.txt
2021-08-23
02 (System) New version accepted (logged-in submitter: Eric Rescorla)
2021-08-23
02 Eric Rescorla Uploaded new revision
2021-08-23
01 (System) Document has expired
2021-07-08
01 Christopher Wood Notification list changed to caw@heapingbits.net because the document shepherd was set
2021-07-08
01 Christopher Wood Document shepherd changed to Christopher A. Wood
2021-03-08
01 Benjamin Kaduk This document now replaces draft-rescorla-tls-rfc8446-bis instead of None
2021-03-03
01 Joseph Salowey Added to session: IETF-110: tls  Mon-1700
2021-02-19
01 Eric Rescorla New version available: draft-ietf-tls-rfc8446bis-01.txt
2021-02-19
01 (System) New version approved
2021-02-19
01 (System) Request for posting confirmation emailed to previous authors: Eric Rescorla
2021-02-19
01 Eric Rescorla Uploaded new revision
2020-10-05
00 Eric Rescorla New version available: draft-ietf-tls-rfc8446bis-00.txt
2020-10-05
00 (System) WG -00 approved
2020-10-05
00 Eric Rescorla Set submitter to "Eric Rescorla ", replaces to (none) and sent approval email to group chairs: tls-chairs@ietf.org
2020-10-05
00 Eric Rescorla Uploaded new revision