<?xml version="1.0" encoding="UTF-8"?><?rfc linefile="1:draft-murchison-nntp-compress.xml"?>
<!-- automatically generated by xml2rfc v1.36 on 2016-06-23T20:26:50Z -->
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!--
--><!-- xml2rfc-processed-entity rfc1951 -->
<!--
--><!-- xml2rfc-processed-entity rfc1962 -->
<!--
--><!-- xml2rfc-processed-entity rfc2119 -->
<!--
--><!-- xml2rfc-processed-entity rfc3749 -->
<!--
--><!-- xml2rfc-processed-entity rfc3977 -->
<!--
--><!-- xml2rfc-processed-entity rfc4422 -->
<!--
--><!-- xml2rfc-processed-entity rfc4642 -->
<!--
--><!-- xml2rfc-processed-entity rfc4643 -->
<!--
--><!-- xml2rfc-processed-entity rfc4644 -->
<!--
--><!-- xml2rfc-processed-entity rfc4648 -->
<!--
--><!-- xml2rfc-processed-entity rfc4978 -->
<!--
--><!-- xml2rfc-processed-entity rfc5226 -->
<!--
--><!-- xml2rfc-processed-entity rfc5234 -->
<!--
--><!-- xml2rfc-processed-entity rfc5246 -->
<!--
--><!-- xml2rfc-processed-entity rfc7457 -->
<!--
--><!-- xml2rfc-processed-entity rfc7525 -->
<!--
--><!-- xml2rfc-processed-entity ieee1003 -->
]>
<?rfc toc="yes" ?>
<?rfc symrefs="yes" ?>
<?rfc sortrefs="yes"?>
<?rfc strict="yes" ?>
<?rfc rfcedstyle="yes" ?>
<rfc category="std" ipr="trust200902"
     docName="draft-murchison-nntp-compress-05">
<!--
ipr="full3978"
updates="4642"
-->

<front>
<title abbrev="NNTP Extension for Compression">
  Network News Transfer Protocol (NNTP) Extension for Compression
</title>

<author initials="K." surname="Murchison" fullname="Kenneth Murchison">
<organization>Carnegie Mellon University</organization>
<address>
<postal>
<street>5000 Forbes Avenue</street>
<!-- <street>Cyert Hall 285</street>-->
<city>Pittsburgh</city> <region>PA</region>
<code>15213</code> <country>US</country>
</postal>
<phone>+1 412 268 1982</phone>
<email>murch@andrew.cmu.edu</email>
</address>
</author>

<author initials="J." surname="&#201;lie" fullname="Julien &#201;lie">
<organization/>
<address>
<postal>
<street>10 all&#233;e Clovis</street>
<code>93160</code>
<city>Noisy-le-Grand</city>
<country>France</country>
</postal>
<email>julien@trigofacile.com</email>
<uri>http://www.trigofacile.com/</uri>
</address>
</author>

<date month="June" year="2016"/>

<area>Applications</area>
<workgroup>Independent Submission</workgroup>

<keyword>NNTP</keyword>
<keyword>Usenet</keyword>
<keyword>NetNews</keyword>
<keyword>COMPRESS</keyword>
<keyword>DEFLATE</keyword>
<keyword>compression</keyword>

<abstract>

<t>This document defines an extension to the Network News Transport
  Protocol (NNTP) that allows a connection to be effectively and
  efficiently compressed between an NNTP client and server.</t>

</abstract>
</front>


<middle>
<section title="Introduction" anchor="intro">

<t>The goal of COMPRESS is to reduce the bandwidth usage of NNTP.</t>

<t>Compared to PPP compression <xref target="RFC1962"/> and
  modem-based compression (<xref target="MNP"/> and
  <xref target="V42bis"/>), COMPRESS offers greater compression
  efficiency.  COMPRESS can be used together with Transport Layer
  Security (TLS) <xref target="RFC5246"/>, Simple Authentication and
  Security Layer (SASL) encryption <xref target="RFC4422"/>, Virtual
  Private Networks (VPNs), etc.</t>

<t>The point of COMPRESS as an NNTP extension is to act as a compression
  layer, similarly to a security layer like the one negotiated by
  STARTTLS <xref target="RFC4642"/>.  Compression can therefore benefit
  to all NNTP commands sent or received after the use of COMPRESS.
  This facility responds to a long-standing need for NNTP to compress
  data, that has partially been addressed by unstandardized commands like
  XZVER, XZHDR, XFEATURE COMPRESS, or MODE COMPRESS.  These commands
  are not wholly satisfactory because they enable compression only for
  the responses sent by the news server.  On the contrary, the COMPRESS
  command permits to compress data sent by both the client and the
  server, and removes the constraint of having to implement compression
  separately in each NNTP command.  Besides, the compression level can be
  dynamically adjusted and optimized at any time during the connection,
  which even allows to disable compression for certain commands, if
  need be.  If the news client wants to stop compression on a particular
  connection, it can simply use QUIT (<xref target="RFC3977"/> Section
  5.4), and establish a new connection.  For these reasons, using other
  NNTP commands than COMPRESS to enable compression is discouraged once
  COMPRESS is supported.</t>

<t>In order to increase interoperability, it is desirable to have as
  few different compression algorithms as possible, so this document
  specifies only one.  The DEFLATE algorithm (defined in <xref
  target="RFC1951"/>) MUST be implemented as part of this extension.
  This compression algorithm is standard, widely available, and fairly
  efficient.</t>

<t>This specification should be read in conjunction with the NNTP
  base specification <xref target="RFC3977"/>.  In the case of a
  conflict between these two documents, <xref target="RFC3977"/>
  takes precedence.</t>

<section title="About TLS-level Compression" anchor="tlslevel">

<t>Though data compression is made possible via the use of TLS with
  NNTP <xref target="RFC4642"/>, the best current practice is to
  disable TLS-level compression as explained in Section 3.3 of <xref
  target="RFC7525"/>.  The COMPRESS command will permit to keep the
  compression facility in NNTP and control when it is available during
  a connection.</t>

<t>Compared to TLS-level compression
  <xref target="RFC3749"/>, NNTP COMPRESS has the following
  advantages:

<list style="symbols">
<t>COMPRESS can be implemented easily both by NNTP servers and
  clients.</t>

<t>COMPRESS benefits from an intimate knowledge of the NNTP
  protocol's state machine, allowing for dynamic and aggressive
  optimization of the underlying compression algorithm's
  parameters.</t>

<t>COMPRESS can be activated after authentication has completed thus
  reducing the chances that authentication credentials can be leaked via
  for instance a CRIME attack (<xref target="RFC7457"/> Section 2.6).</t>
</list></t>

</section> <!-- tlslevel -->

<section title="Conventions Used in This Document" anchor="conventions">

<t>The notational conventions used in this document are the same as
  those in <xref target="RFC3977"/>, and any term not defined in this
  document has the same meaning as it does in that one.</t>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
  "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
  document are to be interpreted as described in
  <xref target="RFC2119"/>.</t>

<t>In the examples, commands from the client are indicated with [C], and
  responses from the server are indicated with [S].  The client is the
  initiator of the NNTP connection; the server is the other endpoint.</t>

</section> <!-- conventions -->
<section title="Authors' Note" anchor="authorsnote">

<t>Please write the first letter of "Elie" and the penultimate letter
  of "allee" with an acute accent wherever possible -- they are
  respectively U+00C9 ("&amp;#201;" in XML) and U+00E9 ("&amp;#233;"
  in XML).  Also, the letters "ae" in "Baeuerle" should be written as
  an a-umlaut (U+00E4, "&amp;#228;" in XML), and the first letter of
  "Angel" as well as the fifth letter of "Gonzalez" should be written
  with an acute accent (respectively U+00C1 and U+00E1, that is to say
  "&amp;#193;" and "&amp;#225;" in XML).</t>

</section> <!-- authorsnote -->
</section> <!-- intro -->

<section title="The COMPRESS Extension" anchor="compressext">

<t>The COMPRESS extension is used to enable data compression on an
  NNTP connection.</t>

<t>This extension provides a new COMPRESS command and has capability
  label COMPRESS.</t>

<section title="Advertising the COMPRESS Extension" anchor="advertising">

<t>A server supporting the COMPRESS command as defined in this document
  will advertise the "COMPRESS" capability label in response to the
  CAPABILITIES command (<xref target="RFC3977"/> Section 5.2).  However,
  this capability MUST NOT be advertised once a compression layer
  is active (see Section 2.2.2).  This capability MAY be advertised
  both before and after any use of the MODE READER command (<xref
  target="RFC3977"/> Section 5.3), with the same semantics.</t>

<t>The COMPRESS capability label contains a whitespace-separated list
  of available compression algorithms.  This document defines one
  compression algorithm: DEFLATE.  This algorithm is mandatory to
  implement and MUST be supported in order to advertise the COMPRESS
  extension.</t>

<t>Future extensions may add additional compression algorithms to this
  capability.  Unrecognized algorithms MUST be ignored by the
  client.</t>

<t>As the COMPRESS command is related to security because it can
  weaken encryption, cached results of CAPABILITIES from a previous
  session MUST NOT be relied on, as per Section 12.6 of <xref
  target="RFC3977"/>.</t>

<t>Example:</t>

<figure>
<artwork>
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] READER
   [S] IHAVE
   [S] COMPRESS DEFLATE X-SHRINK
   [S] LIST ACTIVE NEWSGROUPS
   [S] .
</artwork>
</figure>

</section> <!-- advertising -->


<section title="COMPRESS Command" anchor="compresscmd">

<section title="Usage" anchor="usage">

<t>This command MUST NOT be pipelined.</t>

<figure>
<artwork>
Syntax
  COMPRESS algorithm

Responses
  206 Compression active
  403 Unable to activate compression
  502 Command unavailable [1]

[1] If a compression layer is already active, COMPRESS is not a valid
    command (see Section 2.2.2).

Parameters
  algorithm = Name of compression algorithm (e.g. "DEFLATE")
</artwork>
</figure>
</section> <!-- usage -->
<section title="Description" anchor="description">

<t>The COMPRESS command instructs the server to use the named
  compression algorithm ("DEFLATE" is the only one defined in this
  document) for all commands and/or responses after COMPRESS.</t>

<t>The client MUST NOT send any further commands until it has seen the
  result of COMPRESS.</t>

<t>If the requested compression algorithm is syntactically incorrect,
  the server MUST reject the COMPRESS command with a 501 response code
  (<xref target="RFC3977"/> Section 3.2.1).  If the requested compression
  algorithm is invalid (e.g., is not supported), the server MUST reject
  the COMPRESS command with a 503 response code (<xref target="RFC3977"/>
  Section 3.2.1).  If the server is unable to activate compression for
  any reason (e.g., a server configuration or resource problem), the
  server MUST reject the COMPRESS command with a 403 response code (<xref
  target="RFC3977"/> Section 3.2.1).  Otherwise, the server issues a 206
  response code and the compression layer takes effect for both client
  and server immediately following the CRLF of the success reply.</t>

<t>Additionally, the client MUST NOT issue a MODE READER command after
  activating a compression layer, and a server MUST NOT advertise the
  MODE-READER capability.</t>

<t>Both the client and the server MUST know if there is a compression
  layer active (for instance via the previous use of the COMPRESS
  command or the negotiation of a TLS-level compression <xref
  target="RFC3749"/>).  A client MUST NOT attempt to activate compression
  or negotiate a TLS layer (for instance via the use of the COMPRESS or
  STARTTLS <xref target="RFC4642"/> commands) if a compression layer is
  already active.  A server MUST NOT return the COMPRESS or STARTTLS
  capability labels in response to a CAPABILITIES command received
  after a compression layer is active, and a server MUST reply with
  a 502 response code if a syntactically valid COMPRESS or STARTTLS
  command is received while a compression layer is already active.</t>

<t>In order to help mitigate leaking authentication credentials via for
  instance a CRIME attack <xref target="CRIME"/>, authentication SHOULD
  NOT be attempted when a compression layer is active.  Consequently,
  a server SHOULD NOT return any arguments with the AUTHINFO capability
  label (or SHOULD NOT advertise it at all) in response to a CAPABILITIES
  command received from an unauthenticated client after a compression
  layer is active, and such a client SHOULD NOT attempt to utilize any
  AUTHINFO <xref target="RFC4643"/> commands.  It implies that a server
  SHOULD reply with a 502 response code if a syntactically valid AUTHINFO
  command is received while a compression layer is already active.</t>

<t>For DEFLATE <xref target="RFC1951"/> (as for many other compression
  algorithms), the compressor can trade speed against quality.  The
  decompressor MUST automatically adjust to the parameters selected by
  the sender.  Consequently, the client and server are both free to pick
  the best reasonable rate of compression for the data they send.</t>

<t>When COMPRESS is combined with TLS <xref target="RFC5246"/>
  or SASL <xref target="RFC4422"/> security layers, the processing
  order of the three layers MUST be first COMPRESS, then SASL, and
  finally TLS.  That is, before data is transmitted, it is first
  compressed.  Second, if a SASL security layer has been negotiated,
  the compressed data is then signed and/or encrypted accordingly.
  Third, if a TLS security layer has been negotiated, the data from
  the previous step is signed and/or encrypted accordingly.  When
  receiving data, the processing order MUST be reversed.  This ensures
  that before sending, data is compressed before it is encrypted,
  independent of the order in which the client issues the COMPRESS,
  AUTHINFO SASL <xref target="RFC4643"/>, and STARTTLS
  <xref target="RFC4642"/> commands.</t>

<t>When compression is active and either the client or the server
  receives invalid or corrupted compressed data, the receiving end
  SHOULD immediately close the connection.  (Then the sending end will
  in turn do the same.)</t>

</section> <!-- description -->


<section title="Examples" anchor="examples">

<t>Example of layering TLS and NNTP compression:</t>

<figure><artwork>
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] READER
   [S] STARTTLS
   [S] AUTHINFO
   [S] COMPRESS DEFLATE
   [S] LIST ACTIVE NEWSGROUPS
   [S] .
   [C] STARTTLS
   [S] 382 Continue with TLS negotiation
   [TLS negotiation without compression occurs here]
   [Following successful negotiation, all traffic is encrypted]
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] READER
   [S] AUTHINFO USER
   [S] COMPRESS DEFLATE
   [S] LIST ACTIVE NEWSGROUPS
   [S] .
   [C] AUTHINFO USER fred
   [S] 381 Enter passphrase
   [C] AUTHINFO PASS flintstone
   [S] 281 Authentication accepted
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] READER
   [S] POST
   [S] COMPRESS DEFLATE
   [S] LIST ACTIVE NEWSGROUPS
   [S] .
   [C] COMPRESS DEFLATE
   [S] 206 Compression active
   [Henceforth, all traffic is compressed before being encrypted]
</artwork></figure>

<t>Example of a server failing to activate compression:</t>

<figure><artwork>
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] IHAVE
   [S] COMPRESS DEFLATE
   [S] .
   [C] COMPRESS DEFLATE
   [S] 403 Unable to activate compression
</artwork></figure>

<t>Example of attempting to use an unsupported compression algorithm:</t>

<figure><artwork>
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] IHAVE
   [S] COMPRESS DEFLATE
   [S] .
   [C] COMPRESS X-SHRINK
   [S] 503 Compression algorithm not supported
</artwork></figure>

<t>Example of a server refusing to compress twice:</t>

<figure><artwork>
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] IHAVE
   [S] STARTTLS
   [S] COMPRESS DEFLATE
   [S] .
   [C] STARTTLS
   [S] 382 Continue with TLS negotiation
   [TLS negotiation with compression occurs here]
   [Following successful negotiation, all traffic is encrypted]
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] IHAVE
   [S] .
   [C] COMPRESS DEFLATE
   [S] 502 Compression already active via TLS
</artwork></figure>

<t>Example of a server refusing to negotiate a TLS layer after
  compression has been activated:</t>

<figure><artwork>
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] IHAVE
   [S] STARTTLS
   [S] COMPRESS DEFLATE
   [S] .
   [C] COMPRESS DEFLATE
   [S] 206 Compression active
   [Henceforth, all traffic is compressed]
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] IHAVE
   [S] .
   [C] STARTTLS
   [S] 502 DEFLATE compression already active
</artwork></figure>

<t>Example of a server not advertising AUTHINFO arguments after
  compression has been activated:</t>

<figure><artwork>
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] READER
   [S] AUTHINFO USER
   [S] COMPRESS DEFLATE
   [S] LIST ACTIVE NEWSGROUPS
   [S] .
   [C] COMPRESS DEFLATE
   [S] 206 Compression active
   [Henceforth, all traffic is compressed]
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] READER
   [S] AUTHINFO
   [S] LIST ACTIVE NEWSGROUPS
   [S] .
   [C] AUTHINFO USER fred
   [S] 502 DEFLATE compression already active
</artwork></figure>

</section> <!-- examples -->

</section> <!-- compresscmd -->

</section> <!-- compressext -->

<section title="Compression Efficiency" anchor="efficiency">

<t>This section is informative, not normative.</t>

<t>NNTP poses some unusual problems for a compression layer.</t>

<t>Upstream traffic is fairly simple.  Most NNTP clients send the same
  few commands again and again, so any compression algorithm that can
  exploit repetition works efficiently.  The article posting and transfer
  commands (e.g., POST, IHAVE, and TAKETHIS <xref target="RFC4644"/>) are
  exceptions; clients that send many article posting or transfer commands
  may want to surround large multi-line data blocks with a dictionary
  flush and/or, depending on the compression algorithm, a change of
  compression level in the same way as is recommended for servers later
  in this document (<xref target="deflatespecificities"/>).</t>

<t>Downstream traffic has the unusual property that several kinds of
  data are sent, possibly confusing a dictionary-based compression
  algorithm.</t>

<t>One type is NNTP simple responses and NNTP multi-line responses not
  related to article header/body retrieval (e.g, CAPABILITIES, GROUP,
  LISTGROUP, LAST, NEXT, STAT, DATE, NEWNEWS, NEWGROUPS, LIST, CHECK
  <xref target="RFC4644"/>, etc).  These are highly compressible;
  zlib using its least CPU-intensive setting compresses typical
  responses to 25-40% of their original size.</t>

<t>Another type is article headers (as retrieved via the HEAD, HDR,
  OVER, or ARTICLE commands).  These are equally compressible, and
  benefit from using the same dictionary as the NNTP responses.</t>

<t>A third type is article body text (as retrieved via the BODY or
  ARTICLE commands).  Text is usually fairly short and includes much
  ASCII, so the same compression dictionary will do a good job here, too.
  When multiple messages in the same thread are read at the same time,
  quoted lines, etc. can often be compressed almost to zero.</t>

<t>Finally, non-text article bodies or attachments (as retrieved
  via the BODY and ARTICLE commands) are transmitted in encoded
  form, usually Base64 <xref target="RFC4648"/>, UUencode <xref
  target="IEEE.1003-2.1992"/>, or yEnc <xref target="yEnc"/>.</t>

<t>When already compressed articles or attachments are retrieved, a
  compression algorithm may be able to compress them, but the format
  of their encoding is usually not NNTP-like, so the dictionary built
  while compressing NNTP does not help much.  The compressor has to
  adapt its dictionary from NNTP to the attachment's encoding format,
  and then back.</t>

<t>When attachments are retrieved in Base64 or UUencode form, the
  Huffman coding usually compresses those to approximatively only 75%
  of their encoding size.  8-bit compression algorithms such as DEFLATE
  work well on 8-bit file formats; however, both Base64 and UUencode
  transform a file into something resembling 6-bit bytes, hiding most
  of the 8-bit file format from the compressor.</t>

<t>On the other end, attachments encoded using a compression algorithm
  that retains the full 8-bit spectrum, like yEnc, are much more likely
  to be incompressible.</t>

<section title="DEFLATE Specificities" anchor="deflatespecificities">

<t>When using the zlib library (see <xref target="RFC1951"/>), the
  functions deflateInit2(), deflate(), inflateInit2(), and inflate()
  suffice to implement this extension.  The windowBits value MUST be
  in the range -8 to -15 for deflateInit2(), or else it will use the
  wrong format.  The windowBits value SHOULD be -15 for inflateInit2(),
  or else it will not be able to decompress a stream with a larger
  window size.  deflateParams() can be used to improve compression
  rate and resource use.  In order to improve compression efficiency,
  the Z_PARTIAL_FLUSH argument to deflate() should always be used to
  flush data.  As far as DEFLATE is concerned, clearing the dictionary
  never improves compression over the other flushes.  On the contrary,
  having the 32kB dictionary from previous data, no matter how unrelated,
  can only help.  If there are no matching strings in there, then it
  is simply not referenced.  Using Z_FULL_FLUSH clears the dictionary,
  and consequently always results in compression that is less effective
  than a Z_PARTIAL_FLUSH.</t>

<t>A server can improve downstream compression and the CPU efficiency
  both of the server and the client if it adjusts the compression
  level (e.g., using the deflateParams() function in zlib) at the
  start and end of large non-text multi-line data blocks (before and
  after 'content-lines' in the definition of 'multi-line-data-block'
  in <xref target="RFC3977"/> Section 9.8).  It permits to avoid trying
  to compress incompressible attachments.  Small multi-line data blocks
  are best left alone.  A possible boundary is 5kB.</t>

<t>A very simple strategy is to change the compression level to 0 at
  the start of a multi-line data block provided the first two bytes
  are either 0x1F 0x8B (as in deflate-compressed files) or 0xFF 0xD8
  (JPEG), and to keep it at 1-5 the rest of the time.  More complex
  strategies are of course possible, and encouraged.</t>

</section> <!-- deflatespecificities -->
</section> <!-- efficiency -->


<section title="Augmented BNF Syntax for the COMPRESS Extension"
anchor="ABNF">

<t>This section describes the formal syntax of the COMPRESS extension using
  ABNF <xref target="RFC5234"/>.  It extends the syntax in Section 9
  of <xref target="RFC3977"/>, and non-terminals not defined in this
  document are defined there.  The <xref target="RFC3977"/> ABNF should
  be imported first, before attempting to validate these rules.</t>

<section title="Commands" anchor="commands">

<t>This syntax extends the non-terminal &lt;command&gt;, which represents an
  NNTP command.</t>

<figure>
<artwork type="abnf">
  command =/ compress-command

  compress-command = "COMPRESS" WS algorithm
</artwork>
</figure>
</section> <!-- commands -->

<section title="Capability Entries" anchor="capabilities">

<t>This syntax extends the non-terminal &lt;capability&nbhy;entry&gt;, which
  represents a capability that may be advertised by the server.</t>

<figure>
<artwork type="abnf">
  capability-entry =/ compress-capability

  compress-capability = "COMPRESS" 1*(WS algorithm)
</artwork>
</figure>
</section> <!-- capabilities -->

<section title="General Non-terminals" anchor="non-terminals">

<figure>
<artwork type="abnf">
  algorithm = "DEFLATE" / 1*20alg-char
  alg-char = UPPER / DIGIT / "-" / "_"
</artwork>
</figure>

</section> <!-- non-terminals -->

</section> <!-- ABNF -->


<section title="Summary of Response Codes" anchor="respcodes">

<t>This section contains a list of each new response code defined in
  this document and indicates whether it is multi-line, which commands
  can generate it, what arguments it has, and what its meaning
  is.</t>

<figure>
<artwork>
Response code 206
   Generated by: COMPRESS
   Meaning: compression layer activated
</artwork>
</figure>
</section> <!-- respcodes -->


<section title="Security Considerations" anchor="security">

<t>Security issues are discussed throughout this document.</t>

<t>In general, the security considerations of the NNTP core specification
  (<xref target="RFC3977"/> Section 12) and the DEFLATE compressed
  data format specification (<xref target="RFC1951"/> Section 6) are
  applicable here.</t>

<t>Implementers should be aware that combining compression with
  encryption like TLS can sometimes reveal information that would not
  have been revealed without compression, as explained in Section 6
  of <xref target="RFC3749"/>.  As a matter of fact, adversaries that
  observe the length of the compressed data might be able to derive
  information about the corresponding uncompressed data.  The CRIME
  and the BREACH attacks (<xref target="RFC7457"/> Section 2.6) are
  examples of such case.</t>

<t>In order to help mitigate leaking authentication credentials, this
  document states in <xref target="description"/> that authentication
  SHOULD NOT be attempted when a compression layer is active.  Therefore,
  when a client wants to authenticate, compress data, and negotiate a TLS
  layer (without TLS-level compression) in the same NNTP connection, it
  SHOULD use the STARTTLS, AUTHINFO, and COMPRESS commands in that order.
  Of course instead of using the STARTTLS command, a client can also use
  implicit TLS, that is to say it begins the TLS negotiation immediately
  upon connection on a separate port dedicated to NNTP over TLS.</t>

<t>NNTP commands other than AUTHINFO are not believed to divulgate
  confidential information as long as only public Netnews newsgroups
  and articles are accessed.  That is why this specification only
  adds a restriction to the use of AUTHINFO when a compression layer
  is active.  In case confidential articles are accessed in private
  newsgroups, special care is needed: implementations SHOULD NOT compress
  confidential data together with public data when a security layer is
  active, for the same reasons as mentioned above in this Section.</t>

<t>Additionally, implementations MAY ensure that the contents of two
  distinct confidential articles are not compressed together.  This can
  be achieved for instance with DEFLATE by clearing the compression
  dictionary each time a confidential article is sent.  More complex
  implementations are of course possible, and encouraged.</t>

<t>Implementations SHOULD use a default configuration with disabled
  compression when a security layer is active, and MUST support an option
  to allow compression to be enabled when a security layer is active.
  Such an option can be either with global scope or server/connection
  based.  Implementations MAY unconditionally allow compression to be
  enabled when no security layer is active.</t>

<t>Future extensions to NNTP that define commands conveying confidential
  data SHOULD ensure to state that these confidential data SHOULD
  NOT be compressed together with public data when a security layer
  is active.</t>
</section> <!-- security -->


<section title="IANA Considerations" anchor="iana">

<section title="NNTP Compression Algorithm Registry" anchor="compreg">

<t>The NNTP Compression Algorithm registry will be maintained by
  IANA.  The registry will be available at
  &lt;http://www.iana.org/assignments/nntp-compression-algorithms&gt;.</t>

<t>The purpose of this registry is not only to ensure uniqueness of
  values used to name NNTP compression algorithms, but also to
  provide a definitive reference to technical specifications
  detailing each NNTP compression algorithm available for use on the
  Internet.</t>

<t>An NNTP compression algorithm is either a private algorithm, or
  its name is included in the IANA NNTP Compression Algorithm registry
  (in which case it is a "registered NNTP compression algorithm").
  Different entries in the registry MUST use different names.</t>

<t>Any name that conforms to the syntax of an NNTP compression algorithm
  name (<xref target="non-terminals"/>) can be used.  However, the name
  of a registered NNTP compression algorithm MUST NOT begin with "X".</t>

<t>To avoid the risk of a clash with a future registered NNTP compression
  algorithm, the names of private compression algorithms SHOULD begin
  with "X-".</t>

<t>If the server advertises a registered NNTP compression algorithm, it
  MUST implement the compression algorithm so as to fully conform with
  its related specification.  If it does not implement the compression
  algorithm as specified, it MUST NOT list its registered name in the
  arguments list of the COMPRESS capability label.  In that case,
  it MAY, but SHOULD NOT, provide a private algorithm (not listed,
  or listed with a different name) that implements the compression
  algorithm differently.</t>

<t>A server MUST NOT send different response codes to COMPRESS
  in response to the availability or use of a private compression
  algorithm.</t>

<t>The procedure detailed in <xref target="regproc"/> is to be used
  for registration of a value naming a specific individual compression
  algorithm.</t>

<t>Comments may be included in the registry as discussed in
  <xref target="regcomments"/> and may be changed as discussed in
  <xref target="changecontrol"/>.</t>

<section title="Algorithm Name Registration Procedure"
  anchor="regproc">

<t>IANA will register new NNTP compression algorithm names on a First
  Come First Served basis, as defined in BCP 26
  <xref target="RFC5226"/>.  IANA has the right to reject obviously
  bogus registration requests, but will perform no review of claims
  made in the registration form.</t>

<t>Registration of an NNTP compression algorithm is requested by
  filling in the following template and sending it via electronic mail
  to IANA at &lt;iana@iana.org&gt;:</t>

<figure>
<artwork>
   Subject: Registration of NNTP compression algorithm X

   NNTP compression algorithm name:

   Security considerations:

   Published specification (recommended):

   Contact for further information:

   Intended usage: (One of COMMON, LIMITED USE, or OBSOLETE)

   Owner/Change controller:

   Note: (Any other information that the author deems relevant may be
          added here.)
</artwork>
</figure>

<t>While this registration procedure does not require expert review,
  authors of NNTP compression algorithms are encouraged to seek
  community review and comment whenever that is feasible.  Authors
  may seek community review by posting a specification of their
  proposed algorithm as an Internet-Draft.  NNTP compression
  algorithms intended for widespread use should be standardized
  through the normal IETF process, when appropriate.</t>

</section> <!-- compreg -->

<section title="Comments on Algorithm Registrations"
  anchor="regcomments">

<t>Comments on a registered NNTP compression algorithm should
  first be sent to the "owner" of the algorithm and/or to the
  mailing list for the now concluded IETF NNTPEXT working group
  (&lt;ietf-nntp@lists.eyrie.org&gt;).</t>

<t>Submitters of comments may, after a reasonable attempt to contact
  the owner and/or the above mailing list, request IANA to attach their
  comment to the NNTP compression algorithm registration itself by
  sending mail to &lt;iana@iana.org&gt;.  At IANA's sole discretion,
  IANA may attach the comment to the NNTP compression algorithm's
  registration.</t>

</section> <!-- regcomments -->

<section title="Change Control" anchor="changecontrol">

<t>Once an NNTP compression algorithm registration has been published
  by IANA, the owner may request a change to its definition.  The
  change request follows the same procedure as the initial registration
  request.</t>

<t>The owner of an NNTP compression algorithm may pass responsibility
  for the algorithm to another person or agency by informing IANA;
  this can be done without discussion or review.</t>

<t>The IESG may reassign responsibility for an NNTP compression
  algorithm.  The most common case of this will be to enable changes
  to be made to algorithms where the owner of the registration has
  died, has moved out of contact, or is otherwise unable to make
  changes that are important to the community.</t>

<t>NNTP compression algorithm registrations MUST NOT be deleted;
  algorithms that are no longer believed appropriate for use can be
  declared OBSOLETE by a change to their "intended usage" field; such
  algorithms will be clearly marked in the registry published by
  IANA.</t>

<t>The IESG is considered to be the owner of all NNTP compression
  algorithms that are on the IETF standards track.</t>

</section> <!-- changecontrol -->

</section> <!-- iana -->

<section title="Registration of the DEFLATE Compression Algorithm"
anchor="registrationalg">
<t>This section gives a formal definition of the DEFLATE compression
  algorithm as required by <xref target="regproc"/> for the IANA
  registry.</t>

<figure>
<artwork>
   NNTP compression algorithm name: DEFLATE

   Security considerations: See Section 6 of this document

   Published specification: This document

   Contact for further information: Authors of this document

   Intended usage: COMMON

   Owner/Change controller: IESG &lt;iesg@ietf.org&gt;

   Note: This algorithm is mandatory to implement
</artwork>
</figure>
</section> <!-- registrationalg -->

<section title="Registration of the NNTP COMPRESS Extension"
anchor="registrationext">
<t>This section gives a formal definition of the COMPRESS extension as
  required by Section 3.3.3 of <xref target="RFC3977"/> for the IANA
  registry.

<list style="symbols">
<t>The COMPRESS extension allows an NNTP connection to be effectively
  and efficiently compressed.</t>
<t>The capability label for this extension is "COMPRESS", whose
  arguments list the available compression algorithms.</t>
<t>This extension defines one new command, COMPRESS, whose behavior,
  arguments, and responses are defined in
  <xref target="compresscmd"/>.</t>
<t>This extension does not associate any new responses with
  pre-existing NNTP commands.</t>
<t>This extension does affect the overall behavior of both server and
  client, in that after successful use of the COMPRESS command, all
  communication is transmitted in a compressed format.</t>
<t>This extension does not affect the maximum length of commands or
  initial response lines.</t>
<t>This extension does not alter pipelining, but the COMPRESS command
  cannot be pipelined.</t>
<t>Use of this extension does alter the capabilities list; once the
  COMPRESS command has been used successfully, the COMPRESS capability
  can no longer be advertised by CAPABILITIES.  Additionally, the
  STARTTLS and MODE-READER capabilities MUST NOT be advertised, and the
  AUTHINFO capability label SHOULD either return no arguments or no longer
  be advertised after successful execution of the COMPRESS command.</t>
<t>This extension does not cause any pre-existing command to produce a
  401, 480, or 483 response code.</t>
<t>This extension is unaffected by any use of the MODE READER command;
  however, the MODE READER command MUST NOT be used in the same session
  following a successful execution of the COMPRESS command.</t>
<t>The STARTTLS command MUST NOT be used, and the AUTHINFO command SHOULD
  NOT be used, in the same session following a successful execution of
  the COMPRESS command.</t>
<t>Published Specification: This document.</t>
<t>Contact for Further Information: Authors of this document.</t>
<t>Change Controller: IESG &lt;iesg@ietf.org&gt;.</t>
</list></t>
</section> <!-- registrationext -->

</section> <!-- iana -->

</middle>


<back>
<references title="Normative References">
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"?>

<reference  anchor='RFC2119' target='http://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>
<?rfc linefile="945:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3977.xml"?>

<reference  anchor='RFC3977' target='http://www.rfc-editor.org/info/rfc3977'>
<front>
<title>Network News Transfer Protocol (NNTP)</title>
<author initials='C.' surname='Feather' fullname='C. Feather'><organization /></author>
<date year='2006' month='October' />
<abstract><t>The Network News Transfer Protocol (NNTP) has been in use in the Internet for a decade, and remains one of the most popular protocols (by volume) in use today.  This document is a replacement for RFC 977, and officially updates the protocol specification.  It clarifies some vagueness in RFC 977, includes some new base functionality, and provides a specific mechanism to add standardized extensions to NNTP.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3977'/>
<seriesInfo name='DOI' value='10.17487/RFC3977'/>
</reference>
<?rfc linefile="946:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4642.xml"?>

<reference  anchor='RFC4642' target='http://www.rfc-editor.org/info/rfc4642'>
<front>
<title>Using Transport Layer Security (TLS) with Network News Transfer Protocol (NNTP)</title>
<author initials='K.' surname='Murchison' fullname='K. Murchison'><organization /></author>
<author initials='J.' surname='Vinocur' fullname='J. Vinocur'><organization /></author>
<author initials='C.' surname='Newman' fullname='C. Newman'><organization /></author>
<date year='2006' month='October' />
<abstract><t>This memo defines an extension to the Network News Transfer Protocol (NNTP) that allows an NNTP client and server to use Transport Layer Security (TLS).  The primary goal is to provide encryption for single-link confidentiality purposes, but data integrity, (optional) certificate-based peer entity authentication, and (optional) data compression are also possible.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4642'/>
<seriesInfo name='DOI' value='10.17487/RFC4642'/>
</reference>
<?rfc linefile="947:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5226.xml"?>

<reference  anchor='RFC5226' target='http://www.rfc-editor.org/info/rfc5226'>
<front>
<title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
<author initials='T.' surname='Narten' fullname='T. Narten'><organization /></author>
<author initials='H.' surname='Alvestrand' fullname='H. Alvestrand'><organization /></author>
<date year='2008' month='May' />
<abstract><t>Many protocols make use of identifiers consisting of constants and other well-known values.  Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication transform for IPsec).  To ensure that such quantities have consistent values and interpretations across all implementations, their assignment must be administered by a central authority.  For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA).</t><t>In order for IANA to manage a given namespace prudently, it needs guidelines describing the conditions under which new values can be assigned or when modifications to existing values can be made.  If IANA is expected to play a role in the management of a namespace, IANA must be given clear and concise instructions describing that role.  This document discusses issues that should be considered in formulating a policy for assigning values to a namespace and provides guidelines for authors on the specific text that must be included in documents that place demands on IANA.</t><t>This document obsoletes RFC 2434.  This document specifies an Internet Best  Current Practices for the Internet Community, and requests discussion and  suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='26'/>
<seriesInfo name='RFC' value='5226'/>
<seriesInfo name='DOI' value='10.17487/RFC5226'/>
</reference>
<?rfc linefile="948:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5234.xml"?>

<reference  anchor='RFC5234' target='http://www.rfc-editor.org/info/rfc5234'>
<front>
<title>Augmented BNF for Syntax Specifications: ABNF</title>
<author initials='D.' surname='Crocker' fullname='D. Crocker' role='editor'><organization /></author>
<author initials='P.' surname='Overell' fullname='P. Overell'><organization /></author>
<date year='2008' month='January' />
<abstract><t>Internet technical specifications often need to define a formal syntax.  Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications.  The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power.  The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges.  This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='68'/>
<seriesInfo name='RFC' value='5234'/>
<seriesInfo name='DOI' value='10.17487/RFC5234'/>
</reference>
<?rfc linefile="949:draft-murchison-nntp-compress.xml"?>
</references> <!-- normative -->

<references title="Informative References">
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.1951.xml"?>

<reference  anchor='RFC1951' target='http://www.rfc-editor.org/info/rfc1951'>
<front>
<title>DEFLATE Compressed Data Format Specification version 1.3</title>
<author initials='P.' surname='Deutsch' fullname='P. Deutsch'><organization /></author>
<date year='1996' month='May' />
<abstract><t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='RFC' value='1951'/>
<seriesInfo name='DOI' value='10.17487/RFC1951'/>
</reference>
<?rfc linefile="953:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.1962.xml"?>

<reference  anchor='RFC1962' target='http://www.rfc-editor.org/info/rfc1962'>
<front>
<title>The PPP Compression Control Protocol (CCP)</title>
<author initials='D.' surname='Rand' fullname='D. Rand'><organization /></author>
<date year='1996' month='June' />
<abstract><t>This document defines a method for negotiating data compression over PPP links.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='1962'/>
<seriesInfo name='DOI' value='10.17487/RFC1962'/>
</reference>
<?rfc linefile="954:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.3749.xml"?>

<reference  anchor='RFC3749' target='http://www.rfc-editor.org/info/rfc3749'>
<front>
<title>Transport Layer Security Protocol Compression Methods</title>
<author initials='S.' surname='Hollenbeck' fullname='S. Hollenbeck'><organization /></author>
<date year='2004' month='May' />
<abstract><t>The Transport Layer Security (TLS) protocol (RFC 2246) includes features to negotiate selection of a lossless data compression method as part of the TLS Handshake Protocol and to then apply the algorithm associated with the selected method as part of the TLS Record Protocol.  TLS defines one standard compression method which specifies that data exchanged via the record protocol will not be compressed.  This document describes an additional compression method associated with a lossless data compression algorithm for use with TLS, and it describes a method for the specification of additional TLS compression methods.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3749'/>
<seriesInfo name='DOI' value='10.17487/RFC3749'/>
</reference>
<?rfc linefile="955:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4422.xml"?>

<reference  anchor='RFC4422' target='http://www.rfc-editor.org/info/rfc4422'>
<front>
<title>Simple Authentication and Security Layer (SASL)</title>
<author initials='A.' surname='Melnikov' fullname='A. Melnikov' role='editor'><organization /></author>
<author initials='K.' surname='Zeilenga' fullname='K. Zeilenga' role='editor'><organization /></author>
<date year='2006' month='June' />
<abstract><t>The Simple Authentication and Security Layer (SASL) is a framework for providing authentication and data security services in connection-oriented protocols via replaceable mechanisms.  It provides a structured interface between protocols and mechanisms.  The resulting framework allows new protocols to reuse existing mechanisms and allows old protocols to make use of new mechanisms.  The framework also provides a protocol for securing subsequent protocol exchanges within a data security layer.</t><t>This document describes how a SASL mechanism is structured, describes how protocols include support for SASL, and defines the protocol for carrying a data security layer over a connection.  In addition, this document defines one SASL mechanism, the EXTERNAL mechanism.</t><t>This document obsoletes RFC 2222.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4422'/>
<seriesInfo name='DOI' value='10.17487/RFC4422'/>
</reference>
<?rfc linefile="956:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4643.xml"?>

<reference  anchor='RFC4643' target='http://www.rfc-editor.org/info/rfc4643'>
<front>
<title>Network News Transfer Protocol (NNTP) Extension for Authentication</title>
<author initials='J.' surname='Vinocur' fullname='J. Vinocur'><organization /></author>
<author initials='K.' surname='Murchison' fullname='K. Murchison'><organization /></author>
<date year='2006' month='October' />
<abstract><t>This document defines an extension to the Network News Transfer Protocol (NNTP) that allows a client to indicate an authentication mechanism to the server, to perform an authentication protocol exchange, and optionally to negotiate a security layer for subsequent protocol interactions during the remainder of an NNTP session.</t><t>This document updates and formalizes the AUTHINFO USER/PASS authentication method specified in RFC 2980 and deprecates the AUTHINFO SIMPLE and AUTHINFO GENERIC authentication methods. Additionally, this document defines a profile of the Simple Authentication and Security Layer (SASL) for NNTP.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4643'/>
<seriesInfo name='DOI' value='10.17487/RFC4643'/>
</reference>
<?rfc linefile="957:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4644.xml"?>

<reference  anchor='RFC4644' target='http://www.rfc-editor.org/info/rfc4644'>
<front>
<title>Network News Transfer Protocol (NNTP) Extension for Streaming Feeds</title>
<author initials='J.' surname='Vinocur' fullname='J. Vinocur'><organization /></author>
<author initials='K.' surname='Murchison' fullname='K. Murchison'><organization /></author>
<date year='2006' month='October' />
<abstract><t>This memo defines an extension to the Network News Transfer Protocol (NNTP) to provide asynchronous (otherwise known as &quot;streaming&quot;) transfer of articles.  This allows servers to transfer articles to other servers with much greater efficiency.</t><t>This document updates and formalizes the CHECK and TAKETHIS commands specified in RFC 2980 and deprecates the MODE STREAM command.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4644'/>
<seriesInfo name='DOI' value='10.17487/RFC4644'/>
</reference>
<?rfc linefile="958:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4648.xml"?>

<reference  anchor='RFC4648' target='http://www.rfc-editor.org/info/rfc4648'>
<front>
<title>The Base16, Base32, and Base64 Data Encodings</title>
<author initials='S.' surname='Josefsson' fullname='S. Josefsson'><organization /></author>
<date year='2006' month='October' />
<abstract><t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes.  It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4648'/>
<seriesInfo name='DOI' value='10.17487/RFC4648'/>
</reference>
<?rfc linefile="959:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.4978.xml"?>

<reference  anchor='RFC4978' target='http://www.rfc-editor.org/info/rfc4978'>
<front>
<title>The IMAP COMPRESS Extension</title>
<author initials='A.' surname='Gulbrandsen' fullname='A. Gulbrandsen'><organization /></author>
<date year='2007' month='August' />
<abstract><t>The COMPRESS extension allows an IMAP connection to be effectively and efficiently compressed.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4978'/>
<seriesInfo name='DOI' value='10.17487/RFC4978'/>
</reference>
<?rfc linefile="960:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.5246.xml"?>

<reference  anchor='RFC5246' target='http://www.rfc-editor.org/info/rfc5246'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
<author initials='T.' surname='Dierks' fullname='T. Dierks'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2008' month='August' />
<abstract><t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5246'/>
<seriesInfo name='DOI' value='10.17487/RFC5246'/>
</reference>
<?rfc linefile="961:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7457.xml"?>

<reference  anchor='RFC7457' target='http://www.rfc-editor.org/info/rfc7457'>
<front>
<title>Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)</title>
<author initials='Y.' surname='Sheffer' fullname='Y. Sheffer'><organization /></author>
<author initials='R.' surname='Holz' fullname='R. Holz'><organization /></author>
<author initials='P.' surname='Saint-Andre' fullname='P. Saint-Andre'><organization /></author>
<date year='2015' month='February' />
<abstract><t>Over the last few years, there have been several serious attacks on Transport Layer Security (TLS), including attacks on its most commonly used ciphers and modes of operation.  This document summarizes these attacks, with the goal of motivating generic and protocol-specific recommendations on the usage of TLS and Datagram TLS (DTLS).</t></abstract>
</front>
<seriesInfo name='RFC' value='7457'/>
<seriesInfo name='DOI' value='10.17487/RFC7457'/>
</reference>
<?rfc linefile="962:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.7525.xml"?>

<reference  anchor='RFC7525' target='http://www.rfc-editor.org/info/rfc7525'>
<front>
<title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
<author initials='Y.' surname='Sheffer' fullname='Y. Sheffer'><organization /></author>
<author initials='R.' surname='Holz' fullname='R. Holz'><organization /></author>
<author initials='P.' surname='Saint-Andre' fullname='P. Saint-Andre'><organization /></author>
<date year='2015' month='May' />
<abstract><t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation.  This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t></abstract>
</front>
<seriesInfo name='BCP' value='195'/>
<seriesInfo name='RFC' value='7525'/>
<seriesInfo name='DOI' value='10.17487/RFC7525'/>
</reference>
<?rfc linefile="963:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.ietf.org/public/rfc/bibxml2/reference.IEEE.1003-2.1992.xml"?>

<reference anchor="IEEE.1003-2.1992">
<front>
<title>Information Technology - Portable Operating System Interface (POSIX) - Part 2: Shell and Utilities (Vol. 1)</title>
<author>
<organization>Institute of Electrical and Electronics Engineers</organization>
</author>
<date month="" year="1992" />
</front>

<seriesInfo name="IEEE" value="Standard 1003.2" />

</reference>
<?rfc linefile="964:draft-murchison-nntp-compress.xml"?>

<reference anchor="V42bis">
<front>
<title>Data compression procedures for data circuit-terminating
  equipment (DCE) using error correction procedures</title>
<author><organization abbrev="ITU">International Telecommunications
  Union</organization></author>
<date month="January" year="1990"/>
</front>
<seriesInfo name="ITU-T" value="Recommendation V.42bis"/>
<format type="HTML" target="http://www.itu.int/rec/T-REC-V.42bis"/>
</reference>

<reference anchor="MNP">
<front>
<title>The Complete Modem Reference</title>
<author initials="G." surname="Held" fullname="Gilbert Held"/>
<date month="May" year="1994"/>
</front>
<seriesInfo name="Second Edition," value="Wiley Professional Computing"/>
</reference>

<reference anchor="CRIME">
<front>
<title>The CRIME Attack</title>
<author initials="J." surname="Rizzo" fullname="Juliano Rizzo"/>
<author initials="T." surname="Duong" fullname="Thai Duong"/>
<date month="Ekoparty Security Conference," year="2012"/>
</front>
</reference>

<reference anchor="yEnc" target="http://www.yenc.org/">
<front>
<title>yEnc - Efficient encoding for Usenet and eMail</title>
<author initials="J." surname="Helbing" fullname="J&#252;rgen Helbing"/>
<date month="March" year="2002"/>
</front>
<format type="TEXT" target="http://www.yenc.org/yenc-draft.1.3.txt"/>
</reference>

</references> <!-- informative -->


<section title="Acknowledgements" anchor="acknowledgements">

<t>This document draws heavily on ideas in <xref target="RFC4978"/>
  by Arnt Gulbrandsen and a large portion of this text was borrowed
  from that specification.</t>

<t>The authors would like to thank the following individuals for
  contributing their ideas and support for writing this specification:
  Mark Adler, Russ Allbery, Michael B&#228;uerle, &#193;ngel
  Gonz&#225;lez, and Brian Peterson.</t>

</section> <!-- acknowledgements -->


<section title="Document History (to be removed by RFC Editor before
		publication)" anchor="history">

<section title="Changes since -04">
<t><list style="symbols">
<t>Reworded a sentence wrongly using "MAY NOT" (not a key word defined in
  <xref target="RFC2119"/>).</t>
<t>Uppercased a "must" and a "should" in
  <xref target="deflatespecificities"/>.</t>
</list></t>
</section>

<section title="Changes since -03">
<t><list style="symbols">
<t>Added a naming convention for NNTP compression algorithms.  Improve the
  wording of registered vs private compression algorithms.</t>
<t>If a registered NNTP compression algorithm is advertised, it
  MUST fully conform with its related specification.</t>
<t>Fixed the wording of security considerations to reflect that the threat
  appears when public and confidential data are compressed together inside
  a security layer.  Thanks to &#193;ngel Gonz&#225;lez for pointing that.</t>
<t>The default configuration SHOULD be disabled compression when a security
  layer is active.</t>
<t>COMPRESS acts as a compression layer, not a transport layer.</t>
<t>Minor editorial changes.</t>
</list></t>
</section>

<section title="Changes since -02">
<t><list style="symbols">
<t>Added text stating that the receiving end SHOULD terminate the connection
  when receiving invalid or corrupted compressed data.</t>
<t>Explained why COMPRESS permits to do better than existing unstandardized
  commands like XZVER, XZHDR, MODE COMPRESS, and XFEATURE GZIP.</t>
<t>Added an example of AUTHINFO command when compression is active.</t>
<t>The LIST capability label was missing in the examples when READER
  was also advertised.</t>
<t>Improved an example to send CAPABILITIES after successful authentication.</t>
<t>Mentioned that COMPRESS is related to security.  CAPABILITIES is therefore
  sent again after COMPRESS.</t>
<t>Re-added discussion of attachments in binary form and incompressible
  file formats.  Improve the discussion about flushes, and add a specific
  section about DEFLATE.</t>
<t>Changed a MUST NOT to SHOULD NOT for the use of AUTHINFO after COMPRESS.</t>
<t>Algorithm names are case-insensitive.</t>
<t>Mentioned the use of the 501 response code.</t>
<t>Added the Security Considerations Section.</t>
<t>Added Julien &#201;lie as co-author of this document.</t>
<t>Minor editorial changes.</t>
</list></t>
</section>

<section title="Changes since -01">
<t><list style="symbols">
<t>Switched to using 206 response code when compression has been
  activated.</t>
<t>Added text stating that TLS-level compression is susceptible to
  CRIME attack and current BCP is to disable it.</t>
<t>Added text stating that AUTHINFO shouldn't be advertised or used
  after COMPRESS to prevent possible CRIME attack (with example).</t>
<t>Added text stating that a windowBits value of -15 should be used
  for inflateInit2().</t>
<t>Minor editorial changes.</t>
</list></t>
</section>

<section title="Changes since -00">
<t><list style="symbols">
<t>Made DEFLATE the mandatory to implement compression algorithm.</t>
<t>Removed the requirement that clients/servers implementing COMPRESS
  also implement TLS compression.</t>
<t>Added an example of a client trying to use an unsupported
  compression algorithm.</t>
<t>Rewrote <xref target="efficiency">Compression Efficiency</xref> as
  follows:
<list style="symbols">
<t>Included a sample listing of which NNTP commands produce which type
  of data to be compressed.</t>
<t>Removed discussion of attachments in binary form and incompressible
  file formats.</t>
<t>Mentioned UUencode and yEnc encoding of attachments.</t>
</list></t>
<t>Added IANA registry of NNTP compression algorithms.</t>
<t>Miscellaneous editorial changes submitted by Julien &#201;lie.</t>
</list></t>
</section>

</section> <!-- history -->

</back>
</rfc>
