Transport Layer Security (TLS) Parameters - Internet Assigned Numbers . . . TLS EC Point Formats Registration Procedure(s) Specification Required Expert(s) Yoav Nir, Rich Salz, Nick Sullivan Reference [][RFC-ietf-tls-tls12-frozen-08Note Registration requests should be sent to the mailing list described in [RFC 8447, Section 17] If approved, designated experts should notify IANA within three weeks
Service Name and Transport Protocol Port Number Registry IEEE 1722 Transport Protocol for Time Sensitive Applications [Transport_Protocol_for_Time-Sensitive_Networking_TG] [Ashley_Butterworth] 2014-03-07: Contact Information ID Name Organization Contact URI Last Updated [Ashley_Butterworth] Ashley Butterworth: mailto:abutterworth apple com: 2014-03-07
Session Initiation Protocol (SIP) Parameters Resource-Priority Namespaces Registration Procedure(s) IETF Review Reference [][Note Namespace = the unique string identifying the namespace Namespace Numerical Value = the unique numerical value identifying the namespace Levels = the number of priority-values within the namespace Algorithm = Intended operational behavior of SIP elements implementing this namespace New Warn code = New Warning
Internet Assigned Numbers Authority While BPF does not include the ability within itself to encrypt the contents, end-to-end encryption (e g , HTTPS, TLS, SSL) should be used when transmitting files that include sensitive data or where access is restricted
Internet Assigned Numbers Authority [serial] - This is a serial number assigned by the trading party They will ensure that a serial number cannot be used more than once The acceptable characters for this are ALPHA, NUMERIC, "-", and "_" No other characters are allowed For URN-equivalence, the [serial] is not case sensitive
Internet Assigned Numbers Authority Therefore SARIF file contents can be extremely sensitive, requiring external privacy and integrity protection Even when the analysis results themselves are not sensitive, SARIF files can have other security issues: - SARIF files can embed the contents of the programming artifacts (such as source or binary files) that were analyzed
JSON Web Token (JWT) - Internet Assigned Numbers Authority JSON Web Token (JWT) Created 2015-01-23 Last Updated 2025-05-30 Available Formats XML HTML Plain text Registries Included Below JSON Web Token Claims; JWT Confirmation Methods
Service Name and Transport Protocol Port Number Registry Service Name and Transport Protocol Port Number Registry Last Updated 2025-05-30 Expert(s) TCP UDP: Joe Touch; Eliot Lear, Kumiko Ono, Wes Eddy, Brian Trammell, Jana Iyengar, and Michael Scharf SCTP: Michael Tuexen DCCP: Eddie Kohler and Yoshifumi Nishida
Internet Assigned Numbers Authority As an example, EXI is sensitive to the order of the values in an enumeration It is not known whether such an attack is possible on the actual structure of the document Also, EXI supports user-defined datatype representations, and such representations, if present in a document and purportedly understood by a processor, can be a security weakness