<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0">
	<channel>
		<title>Recent RFCs</title>
		<link>https://www.rfc-editor.org/</link>
		<description>Recently published RFCs</description>
		<language>en-us</language>
		<lastBuildDate>Wed, 15 Apr 2026 20:45:09 -0700</lastBuildDate>
			<item>
		<title>RFC 9914: Root-Initiated Routing State in the Routing Protocol for Low-Power and Lossy Networks (RPL)</title>
		<link>https://www.rfc-editor.org/info/rfc9914</link>
		<description>The Routing Protocol for Low-Power and Lossy Networks (RPL) (RFC
6550) enables data packet routing along a Destination-Oriented
Directed Acyclic Graph (DODAG). However, the default route
establishment mechanism relies on hop-by-hop forwarding along the
DODAG, which may not always provide optimal routing efficiency. This
document introduces the concept of Destination Advertisement Object
(DAO) Projection, a mechanism that allows a RPL Root or an external
controller to install optimized routes within the RPL domain. DAO
Projections enable the creation of optimized unicast or multicast
routes that do not strictly follow the DODAG structure, thereby
improving routing efficiency, reliability, availability, and resource
utilization in the RPL domain. This document specifies two types of
Projected Routes (P-Routes) -- Storing Mode and Non-Storing Mode --
and outlines the signaling procedures necessary to establish,
maintain, and remove these routes.  This document updates RFCs 6550,
6553, and 8138.</description>
	</item>
			<item>
		<title>RFC 9913: Reliable and Available Wireless (RAW) Technologies</title>
		<link>https://www.rfc-editor.org/info/rfc9913</link>
		<description>This document surveys the short- and middle-range radio technologies
over which providing Deterministic Networking (DetNet), and more
specifically, Reliable and Available Wireless (RAW) service is
suitable. It also presents the characteristics that RAW may leverage
and explores the applicability of the technologies to carry
deterministic flows, as of the time of publication. The studied
technologies are Wi-Fi 6/7, Time-Slotted Channel Hopping (TSCH), 3GPP
5G, and L-band Digital Aeronautical Communications System (LDACS).</description>
	</item>
			<item>
		<title>RFC 9912: Reliable and Available Wireless (RAW) Architecture</title>
		<link>https://www.rfc-editor.org/info/rfc9912</link>
		<description>Reliable and Available Wireless (RAW) extends the reliability and
availability of Deterministic Networking (DetNet) to networks
composed of any combination of wired and wireless segments.  The RAW
architecture leverages and extends RFC 8655 (&quot;Deterministic
Networking Architecture&quot;) to adapt to challenges that prominently
affect the wireless medium, notably intermittent transmission loss. 
This document defines a network control loop that optimizes the use
of constrained bandwidth and energy while ensuring the expected
DetNet services.  The loop involves a new Point of Local Repair (PLR)
function in the DetNet Service sub-layer that dynamically selects the
DetNet path(s) for packets to route around local connectivity
degradation.</description>
	</item>
			<item>
		<title>RFC 9932: Mutually Authenticating TLS in the Context of Federations</title>
		<link>https://www.rfc-editor.org/info/rfc9932</link>
		<description>This Informational Independent Submission to the RFC Series describes
a means to use TLS 1.3 to perform machine-to-machine mutual
authentication within federations. This memo is not a standard. It
does not modify the TLS protocol in any way, nor does it require
changes to common TLS libraries. TLS is specified and standardized by
the IETF's TLS Working Group.

The framework enables interoperable trust management for federated
machine-to-machine communication. It introduces a centrally managed
trust anchor and a controlled metadata publication process, ensuring
that only authorized members are identifiable within the federation.
These mechanisms support unambiguous entity identification and reduce
the risk of impersonation, promoting secure and policy-aligned
interaction across organizational boundaries.</description>
	</item>
			<item>
		<title>RFC 9941: Secure Shell (SSH) Key Exchange Method Using Hybrid Streamlined NTRU Prime sntrup761 and X25519 with SHA-512: sntrup761x25519-sha512</title>
		<link>https://www.rfc-editor.org/info/rfc9941</link>
		<description>This document describes a widely deployed hybrid key exchange method
in the Secure Shell (SSH) protocol that is based on Streamlined NTRU
Prime sntrup761 and X25519 with SHA-512.</description>
	</item>
			<item>
		<title>RFC 9940: Some Key Terms for Network Fault and Problem Management</title>
		<link>https://www.rfc-editor.org/info/rfc9940</link>
		<description>This document sets out some terms that are fundamental to a common
understanding of network fault and problem management within the
IETF.

The purpose of this document is to bring clarity to discussions and
other work related to network fault and problem management -- in
particular, to YANG data models and management protocols that report,
make visible, or manage network faults and problems.</description>
	</item>
			<item>
		<title>RFC 9948: Internet Protocol Police (IPP) - Schedule of Punishments</title>
		<link>https://www.rfc-editor.org/info/rfc9948</link>
		<description>The Internet Protocol Police (IPP) is in charge of punishing willful
infractions of the Collected Wisdom of the IETF community.  This
document sets out the schedule of punishments for such infractions.</description>
	</item>
			<item>
		<title>RFC 9949: BUSA-TLS: Mandatory Audio Component (MAC) Pre-Shared Key (PSK) Derivation for TLS 1.3 Using 2 Live Crew's &quot;Banned in the U.S.A.&quot;</title>
		<link>https://www.rfc-editor.org/info/rfc9949</link>
		<description>TLS 1.3 (RFC 8446) eliminates null cipher suites entirely.  However,
one vestigial zero remains in the key schedule: when no Pre-Shared
Key (PSK) is used, the Input Keying Material (IKM) for the initial
HKDF-Extract operation is a string of zero bytes.  This document
specifies that this zero-byte IKM MUST be replaced with the SHA-256
digest of the raw PCM audio data of &quot;Banned in the U.S.A.&quot; by 2 Live
Crew (from the album &quot;Banned in the U.S.A.&quot;, 1990), hereafter
referred to as the Mandatory Audio Component (MAC).  Implementations
that omit the MAC are non-conformant with BUSA-TLS and also have
questionable taste in music.

The IETF's process-heavy, consensus-driven, working-group-reviewed
approach to protocol standardization is a fine way to run a standards
body.  It is also completely antithetical to the spirit of a document
that requires a jury-banned rap album as a cryptographic primitive.

This document is offered in the same spirit as the album it
incorporates: unapologetically and in defiance of institutional
authority.</description>
	</item>
			<item>
		<title>RFC 9928: DHCPv4 over DHCPv6 with Relay Agent Support</title>
		<link>https://www.rfc-editor.org/info/rfc9928</link>
		<description>This document describes a mechanism for networks with legacy
IPv4-only clients to use services provided by DHCPv4 over DHCPv6 in a
Relay Agent. RFC 7341 specifies the use of DHCPv4 over DHCPv6 in the
client only. This document specifies an approach based on RFC 7341
that allows a Relay Agent to implement the DHCPv4-over-DHCPv6
encapsulation and decapsulation of DHCPv4 messages in DHCPv6 messages
on behalf of a DHCPv4 client.</description>
	</item>
			<item>
		<title>RFC 9947: Application of the Alternate-Marking Method to the Segment Routing Header</title>
		<link>https://www.rfc-editor.org/info/rfc9947</link>
		<description>This document describes an alternative experimental approach for the
application of the Alternate-Marking Method to Segment Routing for
IPv6 (SRv6). It uses an experimental TLV in the Segment Routing
Header (SRH); thus, participation in this experiment should be
between coordinating parties in a controlled domain. This approach
has potential scaling and simplification benefits over the technique
described in RFC 9343, and the scope of the experiment is to
determine whether those are significant and attractive to the
community.

This protocol extension has been developed outside the IETF as an
alternative to the IETF's Standards Track specification RFC 9343 and
it does not have IETF consensus. It is published here to guide
experimental implementation and ensure interoperability among
implementations to better determine the value of this approach. 
Researchers are invited to submit their evaluations of this work to
the Independent Submissions Editor or to the IETF SPRING Working
Group as Internet-Drafts.</description>
	</item>
			<item>
		<title>RFC 9952: Application-Layer Protocol Negotiation (ALPN) ID for CoAP over DTLS</title>
		<link>https://www.rfc-editor.org/info/rfc9952</link>
		<description>This document specifies an Application-Layer Protocol Negotiation
(ALPN) ID for Constrained Application Protocol (CoAP) services that
are secured by DTLS.</description>
	</item>
			<item>
		<title>RFC 9953: DNS over CoAP (DoC)</title>
		<link>https://www.rfc-editor.org/info/rfc9953</link>
		<description>This document defines a protocol for exchanging DNS queries (OPCODE
0) over the Constrained Application Protocol (CoAP). These CoAP
messages can be protected by (D)TLS-Secured CoAP or Object Security
for Constrained RESTful Environments (OSCORE) to provide encrypted
DNS message exchange for constrained devices in the Internet of
Things (IoT).</description>
	</item>
			<item>
		<title>RFC 9950: A YANG Data Model for Terminal Access Controller Access-Control System Plus (TACACS+)</title>
		<link>https://www.rfc-editor.org/info/rfc9950</link>
		<description>This document defines a Terminal Access Controller Access-Control
System Plus (TACACS+) client YANG module that augments the System
Management data model, defined in RFC 7317, to allow devices to make
use of TACACS+ servers for centralized Authentication, Authorization,
and Accounting (AAA). Specifically, the TACACS+ YANG module can be
used to manage TACACS+ over TLS. 

This document obsoletes RFC 9105.</description>
	</item>
			<item>
		<title>RFC 9907: Guidelines for Authors and Reviewers of Documents Containing YANG Data Models</title>
		<link>https://www.rfc-editor.org/info/rfc9907</link>
		<description>This document provides guidelines for authors and reviewers of
specifications containing YANG data models, including IANA-maintained
YANG modules.  Recommendations and procedures are defined, which are
intended to increase interoperability and usability of Network
Configuration Protocol (NETCONF) and RESTCONF protocol
implementations that utilize YANG modules.

This document obsoletes RFC 8407; it also updates RFC 8126 by
providing additional guidelines for writing the IANA considerations
for RFCs that specify IANA-maintained YANG modules.</description>
	</item>
			<item>
		<title>RFC 9938: A Framework for the Deterministic Networking (DetNet) Controller Plane</title>
		<link>https://www.rfc-editor.org/info/rfc9938</link>
		<description>This document provides a framework overview for the Deterministic
Networking (DetNet) Controller Plane. It discusses concepts and
requirements for the DetNet Controller Plane, which could be the
basis for a future solution specification.</description>
	</item>
		</channel>
</rss>