Movatterモバイル変換


[0]ホーム

URL:


Internet Assigned Numbers Authority

Transport Layer Security (TLS) Extensions

Created
2005-11-15
Last Updated
2025-12-24
Related Registry Group(s)
[Transport Layer Security (TLS) Parameters]
Available Formats

XML

HTML

Plain text

Registries Included Below

TLS ExtensionType Values

Expert(s)
Yoav Nir, Rich Salz, Nick Sullivan
Reference
[RFC-ietf-tls-rfc8446bis-13][RFC8447][RFC9146][RFC-ietf-tls-tls12-frozen-08][RFC9847]
Note
If the "Specification Required" [RFC8126] procedure applies, registration requests can be sent to iana@iana.org or submitted via IANA's [application form], per [RFC9847]. IANA will forward the submission to the expert mailing list described in [RFC 8447, Section 17] and track its progress. See the registration procedure table below for more information.
Note
The role of the designated expert is described in [RFC8447].The designated expert [RFC8126] ensures that the specification ispublicly available.  It is sufficient to have an Internet-Draft(that is posted and never published as an RFC) or a document fromanother standards body, industry consortium, university site, etc.The expert may provide more in-depth reviews, but their approvalshould not be taken as an endorsement of the extension.
Note
As specified in [RFC8126], assignments made in the Private Usespace are not generally useful for broad interoperability.  It isthe responsibility of those making use of the Private Use range toensure that no conflicts occur (within the intended scope of use).For widespread experiments, temporary reservations are available.
Note
If the "Recommended" column is set to "N", it does not necessarily mean that it is flawed; rather, it indicates that the item either has not been through the IETF consensus process, has limited applicability, or is intended only for specific use cases. If the "Recommended" column is set to "D," the item is discouraged and SHOULD NOT or MUST NOT be used, depending upon the situation; consult the item's references for clarity.
Note
Abbreviations that may appear in the "TLS 1.3" field include "CH" (ClientHello), "SH" (ServerHello), "EE" (EncryptedExtensions), "CT" (Certificate), "CR" (CertificateRequest), "NST" (NewSessionTicket), and "HRR" (HelloRetryRequest).
Note
The addition of the "CR" to the "TLS 1.3" column for theserver_name(0) extension only marks the extension as valid in a ClientCertificateRequest created as part of client-generatedauthenticator requests.
Note
Any TLS entry added after the IESG approves publication of [RFC-ietf-tls-tls12-frozen-08] is intended for TLS 1.3 or later, and makes no similar requirementon DTLS. Such entries should have an informal indication like "For TLS 1.3 or later" in that entry, such as the "Comment" column.
Available Formats

CSV
RangeRegistration Procedures
"Recommended" set to/transitioning from "Y" or "D"Either Standards Action With Expert Review or IESG Approval
"Recommended" set to "N," not transitioning from another valueSpecification Required
ValueExtension NameTLS 1.3DTLS-OnlyRecommendedReferenceComment
0server_nameCH, EE, CRNY[RFC6066][RFC9261]
1max_fragment_lengthCH, EENN[RFC6066][RFC8449]
2client_certificate_url-NY[RFC6066]
3trusted_ca_keys-NY[RFC6066]
4truncated_hmac-ND[RFC6066][IESG Action 2018-08-16][RFC9847][Tag Size Does Matter: Attacks and Proofs for the TLS Record Protocol]
5status_requestCH, CR, CTNY[RFC6066]
6user_mapping-NY[RFC4681]
7client_authz-NN[RFC5878]
8server_authz-NN[RFC5878]
9cert_type-NN[RFC6091]
10supported_groups (renamed from "elliptic_curves")CH, EENY[RFC8422][RFC7919]
11ec_point_formats-NY[RFC8422]
12srp-NN[RFC5054]
13signature_algorithmsCH, CRNY[RFC-ietf-tls-rfc8446bis-13]
14use_srtpCH, EENY[RFC5764]
15heartbeatCH, EENY[RFC6520]
16application_layer_protocol_negotiationCH, EENY[RFC7301]
17status_request_v2-NY[RFC6961]
18signed_certificate_timestampCH, CR, CTNN[RFC6962]
19client_certificate_typeCH, EENY[RFC7250]
20server_certificate_typeCH, EENY[RFC7250]
21paddingCHNY[RFC7685]
22encrypt_then_mac-NY[RFC7366]
23extended_main_secret-NY[RFC7627][RFC-ietf-tls-rfc8446bis-13]
24token_binding-NY[RFC8472]
25cached_info-NY[RFC7924]
26tls_lts-NN[draft-gutmann-tls-lts-11]
27compress_certificateCH, CRNY[RFC8879]
28record_size_limitCH, EENY[RFC8449]
29pwd_protectCHNN[RFC8492]
30pwd_clearCHNN[RFC8492]
31password_saltCH, SH, HRRNN[RFC8492]
32ticket_pinningCH, EENN[RFC8672]
33tls_cert_with_extern_pskCH, SHNN[RFC-ietf-tls-8773bis-12]
34delegated_credentialCH, CR, CTNY[RFC9345]
35session_ticket (renamed from "SessionTicket TLS")-NY[RFC5077][RFC8447]
36TLMSP-NN[ETSI TS 103 523-2]
37TLMSP_proxying-NN[ETSI TS 103 523-2]
38TLMSP_delegate-NN[ETSI TS 103 523-2]
39supported_ekt_ciphersCH, EENY[RFC8870]
40ReservedD[RFC9847][tls-reg-review mailing list]
41pre_shared_keyCH, SHNY[RFC-ietf-tls-rfc8446bis-13]
42early_dataCH, EE, NSTNY[RFC-ietf-tls-rfc8446bis-13]
43supported_versionsCH, SH, HRRNY[RFC-ietf-tls-rfc8446bis-13]
44cookieCH, HRRNY[RFC-ietf-tls-rfc8446bis-13]
45psk_key_exchange_modesCHNY[RFC-ietf-tls-rfc8446bis-13]
46ReservedD[RFC9847][tls-reg-review mailing list]
47certificate_authoritiesCH, CRNY[RFC-ietf-tls-rfc8446bis-13]
48oid_filtersCRNY[RFC-ietf-tls-rfc8446bis-13]
49post_handshake_authCHNY[RFC-ietf-tls-rfc8446bis-13]
50signature_algorithms_certCH, CRNY[RFC-ietf-tls-rfc8446bis-13]
51key_shareCH, SH, HRRNY[RFC-ietf-tls-rfc8446bis-13][RFC Errata 5483]
52transparency_infoCH, CR, CTNY[RFC9162]
53connection_id (deprecated)-YD[RFC9146][RFC9847]
54connection_idCH, SHYN[RFC9146]
55external_id_hashCH, EENY[RFC8844]
56external_session_idCH, EENY[RFC8844]
57quic_transport_parametersCH, EENY[RFC9001]
58ticket_requestCH, EENY[RFC9149]
59dnssec_chainCH, CTNN[RFC9102][RFC Errata 6860]
60sequence_number_encryption_algorithmsCH, HRR, SHYN[draft-pismenny-tls-dtls-plaintext-sequence-number-01]
61rrcCH, SHYN[RFC-ietf-tls-dtls-rrc-20]
62tls_flagsCH,SH,HRR,EE,CR,CT,NSTNN[draft-ietf-tls-tlsflags-14]
63-2569Unassigned
2570ReservedCH, CR, NSTNN[RFC8701]
2571-6681Unassigned
6682ReservedCH, CR, NSTNN[RFC8701]
6683-10793Unassigned
10794ReservedCH, CR, NSTNN[RFC8701]
10795-14905Unassigned
14906ReservedCH, CR, NSTNN[RFC8701]
14907-19017Unassigned
19018ReservedCH, CR, NSTNN[RFC8701]
19019-23129Unassigned
23130ReservedCH, CR, NSTNN[RFC8701]
23131-27241Unassigned
27242ReservedCH, CR, NSTNN[RFC8701]
27243-31353Unassigned
31354ReservedCH, CR, NSTNN[RFC8701]
31355-35465Unassigned
35466ReservedCH, CR, NSTNN[RFC8701]
35467-39577Unassigned
39578ReservedCH, CR, NSTNN[RFC8701]
39579-43689Unassigned
43690ReservedCH, CR, NSTNN[RFC8701]
43691-47801Unassigned
47802ReservedCH, CR, NSTNN[RFC8701]
47803-51913Unassigned
51914ReservedCH, CR, NSTNN[RFC8701]
51915-56025Unassigned
56026ReservedCH, CR, NSTNN[RFC8701]
56027-60137Unassigned
60138ReservedCH, CR, NSTNN[RFC8701]
60139-64249Unassigned
64250ReservedCH, CR, NSTNN[RFC8701]
64251-64767Unassigned
64768ech_outer_extensionsCHNY[RFC-ietf-tls-esni-25]Only appears in inner CH.
64769-65036Unassigned
65037encrypted_client_helloCH, HRR, EENY[RFC-ietf-tls-esni-25]
65038-65279Unassigned
65280Reserved for Private Use[RFC-ietf-tls-rfc8446bis-13]
65281renegotiation_info-NY[RFC5746]
65282-65535Reserved for Private Use[RFC-ietf-tls-rfc8446bis-13]

TLS Certificate Types

Expert(s)
Yoav Nir, Rich Salz, Nick Sullivan
Reference
[RFC6091][RFC-ietf-tls-rfc8446bis-13][RFC8447][RFC-ietf-tls-tls12-frozen-08][RFC9847]
Note
If the "Specification Required" [RFC8126] procedure applies, registration requests can be sent to iana@iana.org or submitted via IANA's [application form], per [RFC9847]. IANA will forward the submission to the expert mailing list described in [RFC 8447, Section 17] and track its progress. See the registration procedure table below for more information.
Note
The role of the designated expert is described in [RFC8447].The designated expert [RFC8126] ensures that the specification ispublicly available.  It is sufficient to have an Internet-Draft(that is posted and never published as an RFC) or a document fromanother standards body, industry consortium, university site, etc.The expert may provide more in-depth reviews, but their approvalshould not be taken as an endorsement of the certificate type.
Note
If the "Recommended" column is set to "N", it does not necessarily mean that it is flawed; rather, it indicates that the item either has not been through the IETF consensus process, has limited applicability, or is intended only for specific use cases. If the "Recommended" column is set to "D," the item is discouraged and SHOULD NOT or MUST NOT be used, depending upon the situation; consult the item's references for clarity.
Note
Any TLS entry added after the IESG approves publication of [RFC-ietf-tls-tls12-frozen-08] is intended for TLS 1.3 or later, and makes no similar requirementon DTLS. Such entries should have an informal indication like "For TLS 1.3 or later" in that entry, such as the "Comment" column.
Available Formats

CSV
RangeRegistration Procedures
"Recommended" set to/transitioning from "Y" or "D"Either Standards Action With Expert Review or IESG Approval
"Recommended" set to "N," not transitioning from another valueSpecification Required
ValueNameRecommendedReferenceComment
0X509Y[RFC6091][RFC Errata 5976]Was X.509 before TLS 1.3.
1OpenPGP_RESERVEDN[RFC6091][RFC-ietf-tls-rfc8446bis-13]Used in TLS versions prior to 1.3.
2Raw Public KeyY[RFC7250]
31609Dot2N[RFC8902]
4-223Unassigned
224-255Reserved for Private Use[RFC6091]

TLS Certificate Status Types

Registration Procedure(s)
IETF Review
Reference
[RFC6961][RFC-ietf-tls-rfc8446bis-13][RFC-ietf-tls-tls12-frozen-08][RFC9847]
Note
Any TLS entry added after the IESG approves publication of [RFC-ietf-tls-tls12-frozen-08] is intended for TLS 1.3 or later, and makes no similar requirementon DTLS. Such entries should have an informal indication like "For TLS 1.3 or later" in that entry, such as the "Comment" column.
Available Formats

CSV
ValueDescriptionReferenceComment
0Reserved[RFC6961]
1ocsp[RFC6066][RFC6961]
2ocsp_multi_RESERVED[RFC6961][RFC-ietf-tls-rfc8446bis-13]Used in TLS versions prior to 1.3.
3-255Unassigned

TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs

Registration Procedure(s)
Expert Review
Expert(s)
Yoav Nir, Rich Salz, Nick Sullivan
Reference
[RFC7301][RFC8447][RFC9847]
Note
Registration requests should be sent to iana@iana.org or submitted via IANA's [application form], per [RFC9847]. IANA will forward the request to the expert mailing list described in [RFC 8447, Section 17] and track its progress.
Note
When this registry has an HTTP-specific version added or modified,the YANG module [iana-http-versions] must be updated as definedin [RFC-ietf-netconf-http-client-server-31].
Available Formats

CSV
ProtocolIdentification SequenceReferenceComment
Reserved0x0A 0x0A[RFC8701]
Reserved0x1A 0x1A[RFC8701]
Reserved0x2A 0x2A[RFC8701]
Reserved0x3A 0x3A[RFC8701]
Reserved0x4A 0x4A[RFC8701]
Reserved0x5A 0x5A[RFC8701]
Reserved0x6A 0x6A[RFC8701]
Reserved0x7A 0x7A[RFC8701]
Reserved0x8A 0x8A[RFC8701]
Reserved0x9A 0x9A[RFC8701]
Reserved0xAA 0xAA[RFC8701]
Reserved0xBA 0xBA[RFC8701]
Reserved0xCA 0xCA[RFC8701]
Reserved0xDA 0xDA[RFC8701]
Reserved0xEA 0xEA[RFC8701]
Reserved0xFA 0xFA[RFC8701]
HTTP/0.90x68 0x74 0x74 0x70 0x2f 0x30 0x2e 0x39 ("http/0.9")[RFC1945]
HTTP/1.00x68 0x74 0x74 0x70 0x2f 0x31 0x2e 0x30 ("http/1.0")[RFC1945]
HTTP/1.10x68 0x74 0x74 0x70 0x2f 0x31 0x2e 0x31 ("http/1.1")[RFC9112]
SPDY/10x73 0x70 0x64 0x79 0x2f 0x31 ("spdy/1")[http://dev.chromium.org/spdy/spdy-protocol/spdy-protocol-draft1]
SPDY/20x73 0x70 0x64 0x79 0x2f 0x32 ("spdy/2")[http://dev.chromium.org/spdy/spdy-protocol/spdy-protocol-draft2]
SPDY/30x73 0x70 0x64 0x79 0x2f 0x33 ("spdy/3")[http://dev.chromium.org/spdy/spdy-protocol/spdy-protocol-draft3]
Traversal Using Relays around NAT (TURN)0x73 0x74 0x75 0x6E 0x2E 0x74 0x75 0x72 0x6E ("stun.turn")[RFC7443]
NAT discovery using Session Traversal Utilities for NAT (STUN)0x73 0x74 0x75 0x6E 0x2E 0x6e 0x61 0x74 0x2d 0x64 0x69 0x73 0x63 0x6f 0x76 0x65 0x72 0x79 ("stun.nat-discovery")[RFC7443]
HTTP/2 over TLS0x68 0x32 ("h2")[RFC9113]
HTTP/2 over TCP0x68 0x32 0x63 ("h2c")[RFC9113]This entry reserves an identifier for use within a cleartext version of a protocol and is not allowed to appear in a TLS ALPN negotiation.
WebRTC Media and Data0x77 0x65 0x62 0x72 0x74 0x63 ("webrtc")[RFC8833]
Confidential WebRTC Media and Data0x63 0x2d 0x77 0x65 0x62 0x72 0x74 0x63 ("c-webrtc")[RFC8833]
FTP0x66 0x74 0x70 ("ftp")[RFC959][RFC4217]
IMAP0x69 0x6d 0x61 0x70 ("imap")[RFC2595]
POP30x70 0x6f 0x70 0x33 ("pop3")[RFC2595]
ManageSieve0x6d 0x61 0x6e 0x61 0x67 0x65 0x73 0x69 0x65 0x76 0x65 ("managesieve")[RFC5804]
CoAP (over TLS)0x63 0x6f 0x61 0x70 ("coap")[RFC8323]
CoAP (over DTLS)0x63 0x6f ("co")[RFC7252][RFC-ietf-core-coap-dtls-alpn-05]
XMPP jabber:client namespace0x78 0x6d 0x70 0x70 0x2d 0x63 0x6c 0x69 0x65 0x6e 0x74 ("xmpp-client")[https://xmpp.org/extensions/xep-0368.html]
XMPP jabber:server namespace0x78 0x6d 0x70 0x70 0x2d 0x73 0x65 0x72 0x76 0x65 0x72 ("xmpp-server")[https://xmpp.org/extensions/xep-0368.html]
acme-tls/10x61 0x63 0x6d 0x65 0x2d 0x74 0x6c 0x73 0x2f 0x31 ("acme-tls/1")[RFC8737]
OASIS Message Queuing Telemetry Transport (MQTT)0x6d 0x71 0x74 0x74 ("mqtt")[http://docs.oasis-open.org/mqtt/mqtt/v5.0/mqtt-v5.0.html]
DNS-over-TLS0x64 0x6F 0x74 ("dot")[RFC7858]
Network Time Security Key Establishment, version 10x6E 0x74 0x73 0x6B 0x65 0x2F 0x31 ("ntske/1")[RFC8915, Section 4]
SunRPC0x73 0x75 0x6e 0x72 0x70 0x63 ("sunrpc")[RFC9289]
HTTP/30x68 0x33 ("h3")[RFC9114]
SMB20x73 0x6D 0x62 ("smb")[https://docs.microsoft.com/en-us/openspecs/windows_protocols/ms-smb2/5606ad47-5ee0-437a-817e-70c366052962]
IRC0x69 0x72 0x63 ("irc")[RFC1459]
NNTP (reading)0x6E 0x6E 0x74 0x70 ("nntp")[RFC3977]
NNTP (transit)0x6E 0x6E 0x73 0x70 ("nnsp")[RFC3977]
DoQ0x64 0x6F 0x71 ("doq")[RFC9250]
SIP0x73 0x69 0x70 0x2f 0x32 ("sip/2")[RFC3261]
TDS/8.00x74 0x64 0x73 0x2f 0x38 0x2e 0x30 ("tds/8.0")[[MS-TDS]: Tabular Data Stream Protocol]
DICOM0x64 0x69 0x63 0x6f 0x6d ("dicom")[https://www.dicomstandard.org/current]
PostgreSQL0x70 0x6F 0x73 0x74 0x67 0x72 0x65 0x73 0x71 0x6C ("postgresql")[https://www.postgresql.org/docs/current/protocol.html]
RADIUS/1.00x72 0x61 0x64 0x69 0x75 0x73 0x2f 0x31 0x2e 0x30 ("radius/1.0")[RFC9765]
RADIUS/1.10x72 0x61 0x64 0x69 0x75 0x73 0x2f 0x31 0x2e 0x31 ("radius/1.1")[RFC9765]
NetPerfMeter Protocol Control Channel (NPMP-CONTROL)0x6e 0x65 0x74 0x70 0x65 0x72 0x66 0x6d 0x65 0x74 0x65 0x72 0x2f 0x63 0x6f 0x6e 0x74 0x72 0x6f 0x6c 0x0a ("netperfmeter/control")[https://www.nntb.no/~dreibh/netperfmeter/]
NetPerfMeter Protocol Data Channel (NPMP-DATA)0x6e 0x65 0x74 0x70 0x65 0x72 0x66 0x6d 0x65 0x74 0x65 0x72 0x2f 0x64 0x61 0x74 0x61 0x0a ("netperfmeter/data")[https://www.nntb.no/~dreibh/netperfmeter/]

TLS CachedInformationType Values

Expert(s)
Yoav Nir, Rich Salz, Nick Sullivan
Reference
[RFC7924][RFC-ietf-tls-tls12-frozen-08][RFC9847]
Note
Requests for registration in the "Specification Required" [RFC8126] range should be sent to iana@iana.org or submitted via IANA's [application form], per [RFC9847]. IANA will forward the request to the expert mailing list described in [RFC 8447, Section 17] and track its progress. See the registration procedure table below for more information.
Note
Any TLS entry added after the IESG approves publication of [RFC-ietf-tls-tls12-frozen-08] is intended for TLS 1.3 or later, and makes no similar requirementon DTLS. Such entries should have an informal indication like "For TLS 1.3 or later" in that entry, such as the "Comment" column.
Available Formats

CSV
RangeRegistration Procedures
0-63Standards Action
64-223Specification Required
ValueDescriptionReferenceComment
0Reserved[RFC7924]
1cert[RFC7924]
2cert_req[RFC7924]
3-223Unassigned
224-255Reserved for Private Use[RFC7924]

TLS Certificate Compression Algorithm IDs

Expert(s)
Yoav Nir, Rich Salz, Nick Sullivan
Reference
[RFC8879][RFC-ietf-tls-tls12-frozen-08][RFC9847]
Note
Requests for registration in the "Specification Required" [RFC8126] range should be sent to iana@iana.org or submitted via IANA's [application form], per [RFC9847]. IANA will forward the request to the expert mailing list described in [RFC 8447, Section 17] and track its progress. See the registration procedure table below for more information.
Note
Any TLS entry added after the IESG approves publication of [RFC-ietf-tls-tls12-frozen-08] is intended for TLS 1.3 or later, and makes no similar requirementon DTLS. Such entries should have an informal indication like "For TLS 1.3 or later" in that entry, such as the "Comment" column.
Available Formats

CSV
RangeRegistration Procedures
1-255IETF Review
256-16383Specification Required
16384-65535Experimental Use
Algorithm NumberDescriptionReferenceComment
0Reserved[RFC8879]
1zlib[RFC8879]
2brotli[RFC8879]
3zstd[RFC8879]
4-16383Unassigned
16384-65535Reserved for Experimental Use[RFC8879]

[8]ページ先頭

©2009-2026 Movatter.jp