CARVIEW |
Select Language
HTTP/2 200
date: Mon, 14 Jul 2025 10:48:39 GMT
content-type: text/xml; charset=utf-8
content-length: 4805
cf-ray: 95f072ebf9c08087-BLR
last-modified: Fri, 11 Jul 2025 21:51:26 GMT
etag: "327d-639ae4fd8a2d8-gzip"
accept-ranges: bytes
vary: Accept-Encoding
content-encoding: gzip
strict-transport-security: max-age=31536000; includeSubDomains
x-frame-options: SAMEORIGIN
x-xss-protection: 1; mode=block
x-content-type-options: nosniff
cf-cache-status: DYNAMIC
server: cloudflare
alt-svc: h3=":443"; ma=86400
Recent RFCs
https://www.rfc-editor.org/
Recently published RFCs
en-us
Fri, 11 Jul 2025 14:51:26 -0700
-
RFC 9813: Operational Considerations for Using TLS Pre-Shared Keys (TLS-PSKs) with RADIUS
https://www.rfc-editor.org/info/rfc9813
This document provides implementation and operational considerations
for using TLS Pre-Shared Keys (TLS-PSKs) with RADIUS/TLS (RFC 6614)
and RADIUS/DTLS (RFC 7360). The purpose of the document is to help
smooth the operational transition from the use of RADIUS/UDP to
RADIUS/TLS.
-
RFC 9809: X.509 Certificate Extended Key Usage (EKU) for Configuration, Updates, and Safety-Critical Communication
https://www.rfc-editor.org/info/rfc9809
RFC 5280 defines the Extended Key Usage (EKU) extension and specifies
several extended key purpose identifiers (KeyPurposeIds) for use with
that extension in X.509 certificates. This document defines
KeyPurposeIds for general-purpose and trust anchor configuration
files, for software and firmware update packages, and for
safety-critical communication to be included in the EKU extension of
X.509 v3 public key certificates.
-
RFC 9795: Personal Assertion Token (PASSporT) Extension for Rich Call Data
https://www.rfc-editor.org/info/rfc9795
This document extends Personal Assertion Token (PASSporT), a token
for conveying cryptographically signed call information about
personal communications, to include rich metadata about a call and
caller that can be signed and integrity protected, transmitted, and
subsequently rendered to the called party. This framework is intended
to include and extend caller- and call-specific information beyond
human-readable display name, comparable to the "Caller ID" function
common on the telephone network. It is also enhanced with an
integrity mechanism that is designed to protect the authoring and
transport of this information for different authoritative use cases.
-
RFC 9791: Use Cases for MPLS Network Action Indicators and Ancillary Data
https://www.rfc-editor.org/info/rfc9791
This document presents use cases that have a common feature that may
be addressed by encoding network action indicators and associated
ancillary data within MPLS packets. There is community interest in
extending the MPLS data plane to carry such indicators and ancillary
data to address these use cases.
The use cases described in this document are not an exhaustive set
but rather the ones that have been actively discussed by members of
the IETF MPLS, PALS, and DetNet Working Groups from the beginning of
work on MPLS Network Action (MNA) until the publication of this
document.
-
RFC 9789: MPLS Network Actions (MNAs) Framework
https://www.rfc-editor.org/info/rfc9789
This document describes an architectural framework for MPLS Network
Action (MNA) technologies. MNA technologies are used to indicate
actions that impact the forwarding or other processing (such as
monitoring) of the packet along the Label Switched Path (LSP) of the
packet and to transfer any additional data needed for these actions.
This document provides the foundation for the development of a common
set of network actions and information elements supporting additional
operational models and capabilities of MPLS networks.
-
RFC 9790: IANA Registry and Processing Recommendations for the First Nibble Following a Label Stack
https://www.rfc-editor.org/info/rfc9790
This document creates a new IANA registry (called the "Post-Stack
First Nibble" registry) for the first nibble (4-bit field)
immediately following an MPLS label stack. Furthermore, this document
presents some requirements for registering new values and making the
processing of MPLS packets easier and more robust.
The relationship between the IANA "Post-Stack First Nibble" registry
and the "IP Version Numbers" registry (RFC 2780) is described in this
document.
This document updates RFC 4928 by deprecating the heuristic method
for identifying the type of packet encapsulated in MPLS.
-
RFC 9801: Private Line Emulation over Packet Switched Networks
https://www.rfc-editor.org/info/rfc9801
This document expands the applicability of Virtual Private Wire
Service (VPWS) bit-stream payloads beyond Time Division Multiplexing
(TDM) signals and provides pseudowire transport with complete signal
transparency over Packet Switched Networks (PSNs).
-
RFC 9796: SIP Call-Info Parameters for Rich Call Data
https://www.rfc-editor.org/info/rfc9796
This document specifies a usage of the SIP Call-Info header field
that incorporates Rich Call Data (RCD) associated with the identity
of the originating party in order to provide to the terminating party
a description of the caller (including details about the reason for
the session). RCD includes information about the caller beyond the
telephone number (such as a calling name, logo, photo, or jCard
object representing the caller), which can help the called party
decide how to handle the session request.
This document defines three new parameters 'call-reason', 'verified',
and 'integrity' for the SIP Call-Info header field and also a new
token ("jcard") for the 'purpose' parameter of the Call-Info header
field. It also provides guidance on the use of the Call-Info
'purpose' parameter token, "icon".
-
RFC 9800: Compressed SRv6 Segment List Encoding
https://www.rfc-editor.org/info/rfc9800
Segment Routing over IPv6 (SRv6) is the instantiation of Segment
Routing (SR) on the IPv6 data plane. This document specifies new
flavors for the SRv6 endpoint behaviors defined in RFC 8986, which
enable the compression of an SRv6 segment list. Such compression
significantly reduces the size of the SRv6 encapsulation needed to
steer packets over long segment lists.
This document updates RFC 8754 by allowing a Segment List entry in
the Segment Routing Header (SRH) to be either an IPv6 address, as
specified in RFC 8754, or a REPLACE-CSID container in packed format,
as specified in this document.
-
RFC 9785: Preference-Based EVPN Designated Forwarder (DF) Election
https://www.rfc-editor.org/info/rfc9785
The Designated Forwarder (DF) in Ethernet Virtual Private Networks
(EVPNs) is defined as the Provider Edge (PE) router responsible for
sending Broadcast, Unknown Unicast, and Multicast (BUM) traffic to a
multihomed device/network in the case of an All-Active multihoming
Ethernet Segment (ES) or BUM and unicast in the case of Single-Active
multihoming. The Designated Forwarder is selected out of a candidate
list of PEs that advertise the same Ethernet Segment Identifier (ESI)
to the EVPN network, according to the default DF election algorithm.
While the default algorithm provides an efficient and automated way
of selecting the Designated Forwarder across different Ethernet Tags
in the Ethernet Segment, there are some use cases where a more
"deterministic" and user-controlled method is required. At the same
time, Network Operators require an easy way to force an on-demand
Designated Forwarder switchover in order to carry out some
maintenance tasks on the existing Designated Forwarder or control
whether a new active PE can preempt the existing Designated Forwarder
PE.
This document proposes use of a DF election algorithm that meets the
requirements of determinism and operation control. This document
updates RFC 8584 by modifying the definition of the DF Election
Extended Community.
-
RFC 9786: EVPN Port-Active Redundancy Mode
https://www.rfc-editor.org/info/rfc9786
The Multi-Chassis Link Aggregation (MC-LAG) group technology enables
establishing a logical link-aggregation connection with a redundant
group of independent nodes. The objective of MC-LAG is to enhance
both network availability and bandwidth utilization through various
modes of traffic load balancing. RFC 7432 defines an EVPN-based
MC-LAG with Single-Active and All-Active multihoming redundancy
modes. This document builds on the existing redundancy mechanisms
supported by EVPN and introduces a new active/standby redundancy
mode, called 'Port-Active'.
-
RFC 9784: Virtual Ethernet Segments for EVPN and Provider Backbone Bridge EVPN
https://www.rfc-editor.org/info/rfc9784
Ethernet VPN (EVPN) and Provider Backbone Bridge EVPN (PBB-EVPN)
introduce a comprehensive suite of solutions for delivering Ethernet
services over MPLS/IP networks. These solutions offer advanced
multihoming capabilities. Specifically, they support Single-Active
and All-Active redundancy modes for an Ethernet Segment (ES), which
is defined as a collection of physical links connecting a multihomed
device or network to a set of Provider Edge (PE) devices. This
document extends the concept of an ES by allowing an ES to be
associated with a set of Ethernet Virtual Circuits (EVCs), such as
VLANs, or other entities, including MPLS Label Switched Paths (LSPs)
or pseudowires (PWs). This extended concept is referred to as virtual
Ethernet Segments (vESes). This document lists the requirements and
specifies the necessary extensions to support vES in both EVPN and
PBB-EVPN.
-
RFC 9797: Randomized and Changing Media Access Control (MAC) Addresses: Context, Network Impacts, and Use Cases
https://www.rfc-editor.org/info/rfc9797
To limit the privacy issues created by the association between a
device, its traffic, its location, and its user in IEEE 802 networks,
client vendors and client OS vendors have started implementing Media
Access Control (MAC) address randomization. This technology is
particularly important in Wi-Fi networks (defined in IEEE 802.11) due
to the over-the-air medium and device mobility. When such
randomization happens, some in-network states may break, which may
affect network connectivity and user experience. At the same time,
devices may continue using other stable identifiers, defeating the
purpose of MAC address randomization.
This document lists various network environments and a range of
network services that may be affected by such randomization. This
document then examines settings where the user experience may be
affected by in-network state disruption. Last, this document examines
some existing frameworks that maintain user privacy while preserving
user quality of experience and network operation efficiency.
-
RFC 9806: Updates to SIP-Based Media Recording (SIPREC) to Correct Metadata Media Type
https://www.rfc-editor.org/info/rfc9806
The SIP-based Media Recording (SIPREC) protocol is defined by both
"Session Initiation Protocol (SIP) Recording Metadata" (RFC 7865) and
"Session Recording Protocol" (RFC 7866). Unfortunately, both RFCs
contradict each other regarding how recording metadata is to be
labeled. In addition, neither RFC registered the new media type. This
document updates RFC 7866 to align with RFC 7865 when labeling
recording metadata and also registers the media type.
-
RFC 9802: Use of the HSS and XMSS Hash-Based Signature Algorithms in Internet X.509 Public Key Infrastructure
https://www.rfc-editor.org/info/rfc9802
This document specifies algorithm identifiers and ASN.1 encoding
formats for the following stateful Hash-Based Signature (HBS)
schemes: Hierarchical Signature System (HSS), eXtended Merkle
Signature Scheme (XMSS), and XMSS^MT (a multi-tree variant of XMSS).
This specification applies to the Internet X.509 Public Key
Infrastructure (PKI) when digital signatures are used to sign
certificates and certificate revocation lists (CRLs).