Test Account's Avatar

Test Account

@test.jl.ly

2
Followers
2
Following
781
Posts
24.11.2024
Joined
Posts Following

Latest posts by Test Account @test.jl.ly

document updates RFCs 9146 and 9147. This document is a product of the Transport Layer Security Working Group of the IETF. 3/3

11.03.2026 05:39 👍 0 🔁 0 💬 0 📌 0

the Datagram Transport Layer Security (DTLS) protocol versions 1.2 and 1.3. Implementations offering the CID functionality described in RFCs 9146 and 9147 are encouraged to also provide the RRC functionality described in this document. For this reason, this 2/3

11.03.2026 05:39 👍 0 🔁 0 💬 1 📌 0

RFC 9853: Return Routability Check for DTLS 1.2 and 1.3, H. Tschofenig, Ed., et al., https://www.rfc-editor.org/info/rfc9853 #RFC This document specifies a Return Routability Check (RRC) subprotocol for use in the context of the Connection ID (CID) construct for 1/3

11.03.2026 05:39 👍 0 🔁 0 💬 1 📌 0

validating requested schedules and reporting scheduling statuses. This document is a product of the Network Modeling Working Group of the IETF. 3/3

11.03.2026 05:15 👍 0 🔁 0 💬 0 📌 0

based on date and time. For the sake of better modularity, the YANG module includes a set of recurrence-related groupings with varying levels of representation (i.e., from basic to advanced) to accommodate a variety of requirements. It also defines groupings for 2/3

11.03.2026 05:15 👍 0 🔁 0 💬 1 📌 0

RFC 9922: A Common YANG Data Model for Scheduling, Q. Ma, Ed., et al., https://www.rfc-editor.org/info/rfc9922 #RFC This document defines common types and groupings that are meant to be used for scheduling purposes, such as events, policies, services, or resources 1/3

11.03.2026 05:15 👍 0 🔁 0 💬 1 📌 0

product of the Limited Additional Mechanisms for PKIX and SMIME Working Group of the IETF. 3/3

06.03.2026 23:57 👍 0 🔁 0 💬 0 📌 0

(ML-KEM) is a quantum-resistant Key Encapsulation Mechanism. This document specifies the conventions for using the ML-KEM in X.509 Public Key Infrastructure. The conventions for the subject public keys and private keys are also specified. This document is a 2/3

06.03.2026 23:57 👍 0 🔁 0 💬 1 📌 0

RFC 9935: Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM), S. Turner, et al., https://www.rfc-editor.org/info/rfc9935 #RFC The Module-Lattice-Based Key-Encapsulation Mechanism 1/3

06.03.2026 23:57 👍 0 🔁 0 💬 1 📌 0

is a product of the Limited Additional Mechanisms for PKIX and SMIME Working Group of the IETF. 4/4

06.03.2026 23:56 👍 0 🔁 0 💬 0 📌 0

document specifies the conventions for using ML-KEM with the Cryptographic Message Syntax (CMS) using the KEMRecipientInfo structure defined in "Using Key Encapsulation Mechanism (KEM) Algorithms in the Cryptographic Message Syntax (CMS)" (RFC 9629). This document 3/4

06.03.2026 23:56 👍 0 🔁 0 💬 1 📌 0

sets for the ML-KEM algorithm are specified by the US National Institute of Standards and Technology (NIST) in FIPS 203. In order of increasing security strength (and decreasing performance), these parameter sets are ML-KEM-512, ML-KEM-768, and ML-KEM-1024. This 2/4

06.03.2026 23:56 👍 0 🔁 0 💬 1 📌 0

RFC 9936: Use of ML-KEM in the Cryptographic Message Syntax (CMS), P. Julien, et al., https://www.rfc-editor.org/info/rfc9936 #RFC Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM) is a quantum-resistant Key Encapsulation Mechanism (KEM). Three parameter 1/4

06.03.2026 23:56 👍 0 🔁 0 💬 1 📌 0

product of the Limited Additional Mechanisms for PKIX and SMIME Working Group of the IETF. 3/3

06.03.2026 23:52 👍 0 🔁 0 💬 0 📌 0

(ML-KEM) is a quantum-resistant Key Encapsulation Mechanism. This document specifies the conventions for using the ML-KEM in X.509 Public Key Infrastructure. The conventions for the subject public keys and private keys are also specified. This document is a 2/3

06.03.2026 23:52 👍 0 🔁 0 💬 1 📌 0

RFC 9935: Internet X.509 Public Key Infrastructure - Algorithm Identifiers for the Module-Lattice-Based Key-Encapsulation Mechanism (ML-KEM), S. Turner, et al., https://www.rfc-editor.org/info/rfc9935 #RFC The Module-Lattice-Based Key-Encapsulation Mechanism 1/3

06.03.2026 23:52 👍 0 🔁 0 💬 1 📌 0

security considerations that apply to data sent by the client before this request is confirmed and adds new requirements to RFCs 9112 and 9298 to avoid related security issues. This document is a product of the HTTP Working Group of the IETF. 2/2

06.03.2026 19:54 👍 0 🔁 0 💬 0 📌 0

RFC 9931: Security Considerations for Optimistic Protocol Transitions in HTTP/1.1, B. Schwartz, https://www.rfc-editor.org/info/rfc9931 #RFC In HTTP/1.1, the client can request a change to a new protocol on the existing connection. This document discusses the 1/2

06.03.2026 19:54 👍 0 🔁 0 💬 1 📌 0

libraries. This document specifies a standard file format for this purpose, similar to how RFC 7468 defines other Privacy-Enhanced Mail (PEM) file formats. 2/2

05.03.2026 00:31 👍 0 🔁 0 💬 0 📌 0

RFC 9934: Privacy-Enhanced Mail (PEM) File Format for Encrypted ClientHello (ECH), S. Farrell, https://www.rfc-editor.org/info/rfc9934 #RFC Encrypted ClientHello (ECH) key pairs need to be configured into TLS servers, which can be built using different TLS 1/2

05.03.2026 00:31 👍 0 🔁 0 💬 1 📌 0

Transport Layer Security Working Group of the IETF. 2/2

04.03.2026 05:54 👍 0 🔁 0 💬 0 📌 0

RFC 9849: TLS Encrypted Client Hello, E. Rescorla, et al., https://www.rfc-editor.org/info/rfc9849 #RFC This document describes a mechanism in Transport Layer Security (TLS) for encrypting a message under a server public key. This document is a product of the 1/2

04.03.2026 05:54 👍 0 🔁 0 💬 1 📌 0

connection to the server. This specification provides a mechanism for conveying the ECH configuration information via DNS, using a SVCB or HTTPS resource record (RR). This document is a product of the Transport Layer Security Working Group of the IETF. 2/2

04.03.2026 05:51 👍 0 🔁 0 💬 0 📌 0

RFC 9848: Bootstrapping TLS Encrypted ClientHello with DNS Service Bindings, B. Schwartz, et al., https://www.rfc-editor.org/info/rfc9848 #RFC To use TLS Encrypted ClientHello (ECH), the client needs to learn the ECH configuration for a server before it attempts a 1/2

04.03.2026 05:51 👍 0 🔁 0 💬 1 📌 0

a product of the Limited Additional Mechanisms for PKIX and SMIME Working Group of the IETF. 2/2

01.03.2026 05:17 👍 0 🔁 0 💬 0 📌 0

RFC 9939: PKCS #8: Private-Key Information Content Types, J. Mandel, et al., https://www.rfc-editor.org/info/rfc9939 #RFC This document defines PKCS #8 content types for use with PrivateKeyInfo and EncryptedPrivateKeyInfo as specified in RFC 5958. This document is 1/2

01.03.2026 05:17 👍 0 🔁 0 💬 1 📌 0

procedures and facilitate their consistent implementation with chairs and administrators. This document is a product of the MODeration PrOceDures Working Group of the IETF. 3/3

28.02.2026 00:00 👍 0 🔁 0 💬 0 📌 0

9245 by establishing a policy for the moderation of disruptive participation across the IETF's various public contribution channels and discussion fora. It establishes guardrails for moderation and a moderator team. That team will develop a set of moderation 2/3

28.02.2026 00:00 👍 0 🔁 0 💬 1 📌 0

RFC 9945: IETF Community Moderation, L. Eggert, Ed., et al., https://www.rfc-editor.org/info/rfc9945 #RFC The IETF community will treat people with kindness and grace, but not endless patience. This memo obsoletes RFCs 3683 and 3934, and it updates RFCs 2418 and 1/3

28.02.2026 00:00 👍 0 🔁 0 💬 1 📌 0

server. This document obsoletes RFC 7170 and updates RFC 9427 by moving all TEAP specifications from those documents to this one. This document is a product of the EAP Method Update Working Group of the IETF. 3/3

27.02.2026 23:56 👍 0 🔁 0 💬 0 📌 0