Recent RFCs
https://www.rfc-editor.org/
Recently published RFCsen-usFri, 23 May 2025 15:25:01 -0700RFC 9758: Updates to the 'ipn' URI Scheme
https://www.rfc-editor.org/info/rfc9758
This document updates the specification of the 'ipn' URI scheme
previously defined in RFC 6260 and the IANA registries established in
RFC 7116. It also updates the rules for the encoding and decoding of
these URIs when used as an Endpoint Identifier (EID) in the Bundle
Protocol version 7 (BPv7) as defined in RFC 9171. These updates
clarify the structure and behavior of the 'ipn' URI scheme, define
new encodings of 'ipn' scheme URIs, and establish the registries
necessary to manage this scheme.RFC 9760: Enterprise Profile for the Precision Time Protocol with Mixed Multicast and Unicast Messages
https://www.rfc-editor.org/info/rfc9760
This document describes a Precision Time Protocol (PTP) Profile (IEEE
Standard 1588-2019) for use in an IPv4 or IPv6 enterprise information
system environment. The PTP Profile uses the End-to-End delay
measurement mechanism, allowing both multicast and unicast Delay
Request and Delay Response messages.RFC 9769: NTP Interleaved Modes
https://www.rfc-editor.org/info/rfc9769
This document specifies interleaved modes for the Network Time
Protocol (NTP). These new modes improve the accuracy of time
synchronization by enabling the use of more accurate transmit
timestamps that are available only after the transmission of NTP
messages. These enhancements are intended to improve timekeeping in
environments where high accuracy is critical. This document updates
RFC 5905 by defining these new operational modes.RFC 9774: Deprecation of AS_SET and AS_CONFED_SET in BGP
https://www.rfc-editor.org/info/rfc9774
BCP 172 (i.e., RFC 6472) recommends not using AS_SET and
AS_CONFED_SET AS_PATH segment types in the Border Gateway Protocol
(BGP). This document advances that recommendation to a standards
requirement in BGP; it prohibits the use of the AS_SET and
AS_CONFED_SET path segment types in the AS_PATH. This is done to
simplify the design and implementation of BGP and to make the
semantics of the originator of a BGP route clearer. This will also
simplify the design, implementation, and deployment of various BGP
security mechanisms. This document updates RFC 4271 by deprecating
the origination of BGP routes with AS_SET (Type 1 AS_PATH segment)
and updates RFC 5065 by deprecating the origination of BGP routes
with AS_CONFED_SET (Type 4 AS_PATH segment). Finally, it obsoletes
RFC 6472.RFC 9676: LEX: A Uniform Resource Name (URN) Namespace for Sources of Law
https://www.rfc-editor.org/info/rfc9676
This document describes LEX, a Uniform Resource Name (URN) namespace
identifier that identifies, names, assigns, and manages persistent
resources in the legal domain. This specification allows adoption of
a common convention by multiple jurisdictions to facilitate ease of
reference and access to resources in the legal domain.
This specification is an Independent Submission to the RFC Series. It
is not a standard and does not have the consensus of the IETF.RFC 9779: Performance Measurement for Segment Routing Networks with the MPLS Data Plane
https://www.rfc-editor.org/info/rfc9779
This document specifies the application of the MPLS loss and delay
measurement techniques (originally defined in RFCs 6374, 7876, and
9341) within Segment Routing (SR) networks that utilize the MPLS data
plane, also referred to as Segment Routing over MPLS (SR-MPLS). SR
enables the forwarding of packets through an ordered list of
instructions, known as segments, which are imposed at the ingress
node. This document defines the procedures and extensions necessary
to perform accurate measurement of packet loss and delay in SR-MPLS
environments, ensuring that network operators can effectively measure
and maintain the quality of service across their SR-based MPLS
networks. This includes coverage of links and end-to-end SR-MPLS
paths, as well as SR Policies.RFC 9771: Properties of Authenticated Encryption with Associated Data (AEAD) Algorithms
https://www.rfc-editor.org/info/rfc9771
Authenticated Encryption with Associated Data (AEAD) algorithms
provide both confidentiality and integrity of data. The widespread
use of AEAD algorithms in various applications has led to an
increased demand for AEAD algorithms with additional properties,
driving research in the field. This document provides definitions for
the most common of those properties and aims to improve consistency
in the terminology used in documentation. This document is a product
of the Crypto Forum Research Group.RFC 9711: The Entity Attestation Token (EAT)
https://www.rfc-editor.org/info/rfc9711
An Entity Attestation Token (EAT) provides an attested claims set
that describes the state and characteristics of an entity, a device
such as a smartphone, an Internet of Things (IoT) device, network
equipment, or such. This claims set is used by a relying party,
server, or service to determine the type and degree of trust placed
in the entity.
An EAT is either a CBOR Web Token (CWT) or a JSON Web Token (JWT)
with attestation-oriented claims.RFC 9742: A YANG Data Model for Syslog Management
https://www.rfc-editor.org/info/rfc9742
This document defines a YANG data model for the management of a
syslog process. It is intended that this data model be used by
vendors who implement syslog collectors in their systems.RFC 9721: Extended Mobility Procedures for Ethernet VPN Integrated Routing and Bridging (EVPN-IRB)
https://www.rfc-editor.org/info/rfc9721
This document specifies extensions to the Ethernet VPN Integrated
Routing and Bridging (EVPN-IRB) procedures specified in RFCs 7432 and
9135 to enhance the mobility mechanisms for networks based on
EVPN-IRB. The proposed extensions improve the handling of host
mobility and duplicate address detection in EVPN-IRB networks to
cover a broader set of scenarios where a host's unicast IP address to
Media Access Control (MAC) address bindings may change across moves.
These enhancements address limitations in the existing EVPN-IRB
mobility procedures by providing more efficient and scalable
solutions. The extensions are backward compatible with existing
EVPN-IRB implementations and aim to optimize network performance in
scenarios involving frequent IP address mobility.RFC 9728: OAuth 2.0 Protected Resource Metadata
https://www.rfc-editor.org/info/rfc9728
This specification defines a metadata format that an OAuth 2.0 client
or authorization server can use to obtain the information needed to
interact with an OAuth 2.0 protected resource.RFC 9766: Extensions for Weak Cache Consistency in NFSv4.2's Flexible File Layout
https://www.rfc-editor.org/info/rfc9766
This document specifies extensions to NFSv4.2 for improving Weak
Cache Consistency (WCC). These extensions introduce mechanisms that
ensure partial writes performed under a Parallel NFS (pNFS) layout
remain coherent and correctly tracked. The solution addresses
concurrency and data integrity concerns that may arise when multiple
clients write to the same file through separate data servers. By
defining additional interactions among clients, metadata servers, and
data servers, this specification enhances the reliability of NFSv4 in
parallel-access environments and ensures consistency across diverse
deployment scenarios.RFC 9750: The Messaging Layer Security (MLS) Architecture
https://www.rfc-editor.org/info/rfc9750
The Messaging Layer Security (MLS) protocol (RFC 9420) provides a
group key agreement protocol for messaging applications. MLS is
designed to protect against eavesdropping, tampering, and message
forgery, and to provide forward secrecy (FS) and post-compromise
security (PCS).
This document describes the architecture for using MLS in a general
secure group messaging infrastructure and defines the security goals
for MLS. It provides guidance on building a group messaging system
and discusses security and privacy trade-offs offered by multiple
security mechanisms that are part of the MLS protocol (e.g.,
frequency of public encryption key rotation). The document also
provides guidance for parts of the infrastructure that are not
standardized by MLS and are instead left to the application.
While the recommendations of this document are not mandatory to
follow in order to interoperate at the protocol level, they affect
the overall security guarantees that are achieved by a messaging
application. This is especially true in the case of active
adversaries that are able to compromise clients, the Delivery Service
(DS), or the Authentication Service (AS).RFC 9765: RADIUS/1.1: Leveraging Application-Layer Protocol Negotiation (ALPN) to Remove MD5
https://www.rfc-editor.org/info/rfc9765
This document defines Application-Layer Protocol Negotiation (ALPN)
extensions for use with RADIUS/TLS and RADIUS/DTLS. These extensions
permit the negotiation of an application protocol variant of RADIUS
called "RADIUS/1.1". No changes are made to RADIUS/UDP or
RADIUS/TCP. The extensions allow the negotiation of a transport
profile where the RADIUS shared secret is no longer used, and all
MD5-based packet authentication and attribute obfuscation methods are
removed.
This document updates RFCs 2865, 2866, 5176, 6613, 6614, and 7360.RFC 9767: Grant Negotiation and Authorization Protocol Resource Server Connections
https://www.rfc-editor.org/info/rfc9767
The Grant Negotiation and Authorization Protocol (GNAP) defines a
mechanism for delegating authorization to a piece of software (the
client) and conveying the results and artifacts of that delegation to
the software. This extension defines methods for resource servers
(RSs) to connect with authorization servers (ASs) in an interoperable
fashion.