<?xml version="1.0" encoding="UTF-8"?><?rfc linefile="1:draft-murchison-nntp-compress.xml"?>
<!-- automatically generated by xml2rfc v1.36 on 2016-10-26T19:56:03Z -->
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
<!--
--><!-- xml2rfc-processed-entity rfc1951 -->
<!--
--><!-- xml2rfc-processed-entity rfc1962 -->
<!--
--><!-- xml2rfc-processed-entity rfc2119 -->
<!--
--><!-- xml2rfc-processed-entity rfc3749 -->
<!--
--><!-- xml2rfc-processed-entity rfc3977 -->
<!--
--><!-- xml2rfc-processed-entity rfc4422 -->
<!--
--><!-- xml2rfc-processed-entity rfc4642 -->
<!--
--><!-- xml2rfc-processed-entity rfc4643 -->
<!--
--><!-- xml2rfc-processed-entity rfc4644 -->
<!--
--><!-- xml2rfc-processed-entity rfc4648 -->
<!--
--><!-- xml2rfc-processed-entity rfc4978 -->
<!--
--><!-- xml2rfc-processed-entity rfc5226 -->
<!--
--><!-- xml2rfc-processed-entity rfc5234 -->
<!--
--><!-- xml2rfc-processed-entity rfc5246 -->
<!--
--><!-- xml2rfc-processed-entity rfc7405 -->
<!--
--><!-- xml2rfc-processed-entity rfc7457 -->
<!--
--><!-- xml2rfc-processed-entity rfc7525 -->
<!--
--><!-- xml2rfc-processed-entity ieee1003 -->
]>
<?rfc toc="yes" ?>
<?rfc symrefs="yes" ?>
<?rfc sortrefs="yes" ?>
<?rfc strict="yes" ?>
<?rfc rfcedstyle="yes" ?>
<rfc category="std" ipr="trust200902"
     docName="draft-murchison-nntp-compress-06">

<front>
<title abbrev="NNTP Extension for Compression">
  Network News Transfer Protocol (NNTP) Extension for Compression
</title>

<author initials="K." surname="Murchison" fullname="Kenneth Murchison">
<organization>Carnegie Mellon University</organization>
<address>
<postal>
<street>5000 Forbes Avenue</street>
<city>Pittsburgh</city> <region>PA</region>
<code>15213</code> <country>USA</country>
</postal>
<phone>+1 412 268 1982</phone>
<email>murch@andrew.cmu.edu</email>
</address>
</author>

<author initials="J." surname="&#201;lie" fullname="Julien &#201;lie">
<organization/>
<address>
<postal>
<street>10 all&#233;e Clovis</street>
<code>93160</code>
<city>Noisy-le-Grand</city>
<country>France</country>
</postal>
<email>julien@trigofacile.com</email>
<uri>http://www.trigofacile.com/</uri>
</address>
</author>

<date month="October" year="2016"/>

<area>Applications</area>
<workgroup>Independent Submission</workgroup>

<keyword>NNTP</keyword>
<keyword>Usenet</keyword>
<keyword>NetNews</keyword>
<keyword>COMPRESS</keyword>
<keyword>DEFLATE</keyword>
<keyword>compression</keyword>

<abstract>

<t>This document defines an extension to the Network News Transport
  Protocol (NNTP) that allows a connection to be effectively and
  efficiently compressed between an NNTP client and server.</t>

</abstract>
</front>


<middle>
<section title="Introduction" anchor="intro">

<t>The goal of COMPRESS is to reduce the bandwidth usage of NNTP.</t>

<t>Compared to PPP compression <xref target="RFC1962"/> and
  modem-based compression (<xref target="MNP"/> and
  <xref target="V42bis"/>), COMPRESS offers greater compression
  efficiency.  COMPRESS can be used together with Transport Layer
  Security (TLS) <xref target="RFC5246"/>, Simple Authentication and
  Security Layer (SASL) encryption <xref target="RFC4422"/>, Virtual
  Private Networks (VPNs), etc.</t>

<t>The point of COMPRESS as an NNTP extension is to act as a compression
  layer, similarly to a security layer like the one negotiated by
  STARTTLS <xref target="RFC4642"/>.  Compression can therefore benefit
  to all NNTP commands sent or received after the use of COMPRESS.
  This facility responds to a long-standing need for NNTP to compress
  data, that has partially been addressed by unstandardized commands like
  XZVER, XZHDR, XFEATURE COMPRESS, or MODE COMPRESS.  These commands
  are not wholly satisfactory because they enable compression only for
  the responses sent by the news server.  On the contrary, the COMPRESS
  command permits to compress data sent by both the client and the
  server, and removes the constraint of having to implement compression
  separately in each NNTP command.  Besides, the compression level can be
  dynamically adjusted and optimized at any time during the connection,
  which even allows to disable compression for certain commands, if
  need be.  If the news client wants to stop compression on a particular
  connection, it can simply use QUIT (<xref target="RFC3977"/> Section
  5.4), and establish a new connection.  For these reasons, using other
  NNTP commands than COMPRESS to enable compression is discouraged once
  COMPRESS is supported.</t>

<t>In order to increase interoperability, it is desirable to have as
  few different compression algorithms as possible, so this document
  specifies only one.  The DEFLATE algorithm (defined in <xref
  target="RFC1951"/>) MUST be implemented as part of this extension.
  This compression algorithm is standard, widely available, and fairly
  efficient.</t>

<t>This specification should be read in conjunction with the NNTP
  base specification <xref target="RFC3977"/>.  In the case of a
  conflict between these two documents, <xref target="RFC3977"/>
  takes precedence.</t>

<section title="About TLS-level Compression" anchor="tlslevel">

<t>Though lossless data compression is already possible via the use of
  TLS with NNTP <xref target="RFC4642"/>, the best current practice
  is to disable TLS-level compression as explained in Section 3.3 of
  <xref target="RFC7525"/>.  The COMPRESS command will permit to keep
  the compression facility in NNTP, and control when it is available
  during a connection.</t>

<t>Compared to TLS-level compression
  <xref target="RFC3749"/>, NNTP COMPRESS has the following
  advantages:

<list style="symbols">
<t>COMPRESS can be implemented easily both by NNTP servers and
  clients.</t>

<t>COMPRESS benefits from an intimate knowledge of the NNTP
  protocol's state machine, allowing for dynamic and aggressive
  optimization of the underlying compression algorithm's
  parameters.</t>

<t>COMPRESS can be activated after authentication has completed, thus
  reducing the chances that authentication credentials can be leaked via
  for instance a CRIME attack (<xref target="RFC7457"/> Section 2.6).</t>
</list></t>

</section> <!-- tlslevel -->

<section title="Conventions Used in This Document" anchor="conventions">

<t>The notational conventions used in this document are the same as
  those in <xref target="RFC3977"/>, and any term not defined in this
  document has the same meaning as it does in that one.</t>

<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
  "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
  "OPTIONAL" in this document are to be interpreted as described in
  <xref target="RFC2119"/>.</t>

<t>In the examples, commands from the client are indicated with [C], and
  responses from the server are indicated with [S].  The client is the
  initiator of the NNTP connection; the server is the other endpoint.</t>

</section> <!-- conventions -->
<section title="Authors' Note" anchor="authorsnote">

<t>Please write the first letter of "Elie" with an acute accent wherever
  possible -- it is U+00C9 ("&amp;#201;" in XML).  The third letter of
  "Stephane" and the penultimate letter of "allee" similarly have an
  acute accent (U+00E9, "&amp;#233;" in XML).  Also, the letters "ae"
  in "Baeuerle" should be written as an a-umlaut (U+00E4, "&amp;#228;"
  in XML), and the first letter of "Angel" as well as the fifth letter of
  "Gonzalez" should be written with an acute accent (respectively U+00C1
  and U+00E1, that is to say "&amp;#193;" and "&amp;#225;" in XML).</t>

</section> <!-- authorsnote -->
</section> <!-- intro -->

<section title="The COMPRESS Extension" anchor="compressext">

<t>The COMPRESS extension is used to enable lossless data compression
  on an NNTP connection.</t>

<t>This extension provides a new COMPRESS command and has capability
  label COMPRESS.</t>

<section title="Advertising the COMPRESS Extension" anchor="advertising">

<t>A server supporting the COMPRESS command as defined in this document
  will advertise the "COMPRESS" capability label in response to the
  CAPABILITIES command (<xref target="RFC3977"/> Section 5.2).  However,
  this capability MUST NOT be advertised once a compression layer is
  active (see <xref target="description"/>).  This capability MAY be
  advertised both before and after any use of the MODE READER command
  (<xref target="RFC3977"/> Section 5.3), with the same semantics.</t>

<t>The COMPRESS capability label contains a whitespace-separated
  list of available compression algorithms.  This document defines
  one compression algorithm: DEFLATE.  This algorithm is mandatory to
  implement; it MUST be supported and listed in the advertisement of
  the COMPRESS extension.</t>

<t>Future extensions may add additional compression algorithms to this
  capability.  Unrecognized algorithms MUST be ignored by the
  client.</t>

<t>Example:</t>

<figure>
<artwork>
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] READER
   [S] IHAVE
   [S] COMPRESS DEFLATE SHRINK
   [S] LIST ACTIVE NEWSGROUPS
   [S] .
</artwork>
</figure>

<t>As the COMPRESS command is related to security because it can
  weaken encryption, cached results of CAPABILITIES from a previous
  session MUST NOT be relied on, as per Section 12.6 of <xref
  target="RFC3977"/>.</t>

</section> <!-- advertising -->


<section title="COMPRESS Command" anchor="compresscmd">

<section title="Usage" anchor="usage">

<t>This command MUST NOT be pipelined.</t>

<figure>
<artwork>
Syntax
  COMPRESS algorithm

Responses
  206 Compression active
  403 Unable to activate compression
  502 Command unavailable [1]

[1] If a compression layer is already active, COMPRESS is not a valid
    command (see Section 2.2.2).

Parameters
  algorithm = Name of compression algorithm (e.g., "DEFLATE")
</artwork>
</figure>
</section> <!-- usage -->
<section title="Description" anchor="description">

<t>The COMPRESS command instructs the server to use the named
  compression algorithm ("DEFLATE" is the only one defined in this
  document) for all commands and responses after COMPRESS.</t>

<t>The client MUST NOT send any further commands until it has seen the
  result of COMPRESS.</t>

<t>If the requested compression algorithm is syntactically incorrect,
  the server MUST reject the COMPRESS command with a 501 response code
  (<xref target="RFC3977"/> Section 3.2.1).  If the requested compression
  algorithm is invalid (e.g., is not supported), the server MUST reject
  the COMPRESS command with a 503 response code (<xref target="RFC3977"/>
  Section 3.2.1).  If the server is unable to activate compression for
  any reason (e.g., a server configuration or resource problem), the
  server MUST reject the COMPRESS command with a 403 response code (<xref
  target="RFC3977"/> Section 3.2.1).  Otherwise, the server issues a 206
  response code and the compression layer takes effect for both client
  and server immediately following the CRLF of the success reply.</t>

<t>Additionally, the client MUST NOT issue a MODE READER command after
  activating a compression layer, and a server MUST NOT advertise the
  MODE-READER capability.</t>

<t>Both the client and the server MUST know if there is a compression
  layer active (for instance via the previous use of the COMPRESS
  command or the negotiation of a TLS-level compression method <xref
  target="RFC3749"/>).  A client MUST NOT attempt to activate compression
  (for instance via the COMPRESS command) or negotiate a TLS security
  layer (because STARTTLS <xref target="RFC4642"/> may activate
  TLS-level compression) if a compression layer is already active.
  A server MUST NOT return the COMPRESS or STARTTLS capability labels
  in response to a CAPABILITIES command received after a compression
  layer is active, and a server MUST reply with a 502 response code if
  a syntactically valid COMPRESS or STARTTLS command is received while
  a compression layer is already active.</t>

<t>In order to help mitigate leaking authentication credentials via
  for instance a CRIME attack <xref target="CRIME"/>, authentication
  MUST NOT be attempted after a successful use of the COMPRESS command.
  Consequently, a server MUST either list the AUTHINFO capability with
  no arguments or not advertise it at all, in response to a CAPABILITIES
  command received from an unauthenticated client after a successful
  use of the COMPRESS command, and such a client MUST NOT attempt to
  utilize any AUTHINFO <xref target="RFC4643"/> commands.  It implies
  that a server MUST reply with a 502 response code if a syntactically
  valid AUTHINFO command is received after a successful use of the
  COMPRESS command.  (Note that this specification does not change
  the behaviour of AUTHINFO as described in <xref target="RFC4643"/>
  independently of TLS-level compression.  Authentication is therefore
  still allowed, even though TLS-level compression is active.)</t>

<t>For DEFLATE <xref target="RFC1951"/> (as for many other compression
  algorithms), the sending compressor can trade speed against compression
  ratio.  The receiving decompressor MUST automatically adjust to the
  parameters selected by the sender.  Consequently, the client and server
  are both free to pick the best reasonable rate of compression for the
  data they send.  Besides, all data that was submitted for compression
  MUST be included in the compressed output, and appropriately flushed
  so as to ensure that the receiving decompressor can completely
  decompress it.</t>

<t>When COMPRESS is combined with TLS <xref target="RFC5246"/> or SASL
  <xref target="RFC4422"/> security layers, the processing order of
  the three layers MUST be first COMPRESS, then SASL, and finally TLS.
  That is, before data is transmitted, it is first compressed.  Second,
  if a SASL security layer has been negotiated, the compressed data is
  then signed and/or encrypted accordingly.  Third, if a TLS security
  layer has been negotiated, the data from the previous step is signed
  and/or encrypted accordingly (with a possible additional TLS-level
  compression).  When receiving data, the processing order MUST
  be reversed.  This ensures that before sending, data is compressed
  before it is encrypted.</t>

<t>When compression is active and either the client or the server
  receives invalid or corrupted compressed data, the receiving end
  immediately closes the connection, in response to which the sending
  end will do the same.</t>

</section> <!-- description -->


<section title="Examples" anchor="examples">

<t>Example of layering a TLS security layer and NNTP compression:</t>

<figure><artwork>
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] READER
   [S] STARTTLS
   [S] AUTHINFO
   [S] COMPRESS DEFLATE
   [S] LIST ACTIVE NEWSGROUPS
   [S] .
   [C] STARTTLS
   [S] 382 Continue with TLS negotiation
   [TLS negotiation without compression occurs here]
   [Following successful negotiation, all traffic is encrypted]
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] READER
   [S] AUTHINFO USER
   [S] COMPRESS DEFLATE
   [S] LIST ACTIVE NEWSGROUPS
   [S] .
   [C] AUTHINFO USER fred
   [S] 381 Enter passphrase
   [C] AUTHINFO PASS flintstone
   [S] 281 Authentication accepted
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] READER
   [S] POST
   [S] COMPRESS DEFLATE
   [S] LIST ACTIVE NEWSGROUPS
   [S] .
   [C] COMPRESS DEFLATE
   [S] 206 Compression active
   [Henceforth, all traffic is compressed before being encrypted]
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] READER
   [S] POST
   [S] LIST ACTIVE NEWSGROUPS
   [S] .
</artwork></figure>

<t>Example of a server failing to activate compression:</t>

<figure><artwork>
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] IHAVE
   [S] COMPRESS DEFLATE
   [S] .
   [C] COMPRESS DEFLATE
   [S] 403 Unable to activate compression
</artwork></figure>

<t>Example of attempting to use an unsupported compression algorithm:</t>

<figure><artwork>
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] IHAVE
   [S] COMPRESS DEFLATE
   [S] .
   [C] COMPRESS SHRINK
   [S] 503 Compression algorithm not supported
</artwork></figure>

<t>Example of a server refusing to compress twice:</t>

<figure><artwork>
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] IHAVE
   [S] STARTTLS
   [S] COMPRESS DEFLATE
   [S] .
   [C] STARTTLS
   [S] 382 Continue with TLS negotiation
   [TLS negotiation with compression occurs here]
   [Following successful negotiation, all traffic is encrypted]
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] IHAVE
   [S] .
   [C] COMPRESS DEFLATE
   [S] 502 Compression already active via TLS
</artwork></figure>

<t>Example of a server refusing to negotiate a TLS security layer after
  compression has been activated:</t>

<figure><artwork>
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] IHAVE
   [S] STARTTLS
   [S] COMPRESS DEFLATE
   [S] .
   [C] COMPRESS DEFLATE
   [S] 206 Compression active
   [Henceforth, all traffic is compressed]
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] IHAVE
   [S] .
   [C] STARTTLS
   [S] 502 DEFLATE compression already active
</artwork></figure>

<t>Example of a server not advertising AUTHINFO arguments after
  compression has been activated:</t>

<figure><artwork>
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] READER
   [S] AUTHINFO USER
   [S] COMPRESS DEFLATE
   [S] LIST ACTIVE NEWSGROUPS
   [S] .
   [C] COMPRESS DEFLATE
   [S] 206 Compression active
   [Henceforth, all traffic is compressed]
   [C] CAPABILITIES
   [S] 101 Capability list:
   [S] VERSION 2
   [S] READER
   [S] AUTHINFO
   [S] LIST ACTIVE NEWSGROUPS
   [S] .
   [C] AUTHINFO USER fred
   [S] 502 DEFLATE compression already active
</artwork></figure>

</section> <!-- examples -->

</section> <!-- compresscmd -->

</section> <!-- compressext -->

<section title="Compression Efficiency" anchor="efficiency">

<t>This section is informative, not normative.</t>

<t>NNTP poses some unusual problems for a compression layer.</t>

<t>Upstream traffic is fairly simple.  Most NNTP clients send the same
  few commands again and again, so any compression algorithm that can
  exploit repetition works efficiently.  The article posting and transfer
  commands (e.g., POST, IHAVE, and TAKETHIS <xref target="RFC4644"/>) are
  exceptions; clients that send many article posting or transfer commands
  may want to surround large multi-line data blocks with a dictionary
  flush and/or, depending on the compression algorithm, a change of
  compression level in the same way as is recommended for servers later
  in this document (<xref target="deflatespecificities"/>).</t>

<t>Downstream traffic has the unusual property that several kinds of
  data are sent, possibly confusing a dictionary-based compression
  algorithm.</t>

<t>One type is NNTP responses not related to article header/body
  retrieval.  Compressing NNTP simple responses (e.g., in answer to
  CHECK <xref target="RFC4644"/>, DATE, GROUP, LAST, NEXT, STAT, etc.)
  generally does not save many bytes, unless repeated several times
  in the same NNTP session.  On the contrary, most of NNTP multi-line
  responses (e.g., in answer to LIST, LISTGROUP, NEWGROUPS, NEWNEWS,
  etc.) are highly compressible; zlib using its least CPU-intensive
  setting compresses typical responses to 25-40% of their original
  size.</t>

<t>Another type is article headers (as retrieved for instance via the
  HEAD, HDR, OVER, or ARTICLE commands).  These are equally compressible,
  and benefit from using the same dictionary as the NNTP responses.</t>

<t>A third type is article body text (as retrieved for instance via the
  BODY or ARTICLE commands).  Text is usually fairly short and includes
  much ASCII, so the same compression dictionary will do a good job here,
  too.  When multiple messages in the same thread are read at the same
  time, quoted lines, etc. can often be compressed almost to zero.</t>

<t>Finally, non-text article bodies or attachments (as retrieved
  for instance via the BODY or ARTICLE commands) are transmitted in
  encoded form, usually Base64 <xref target="RFC4648"/>, UUencode <xref
  target="IEEE.1003-2.1992"/>, or yEnc <xref target="yEnc"/>.</t>

<t>When already compressed articles or attachments are retrieved, a
  compression algorithm may be able to compress them, but the format
  of their encoding is usually not NNTP-like, so the dictionary built
  while compressing NNTP does not help much.  The compressor has to
  adapt its dictionary from NNTP to the attachment's encoding format,
  and then back.</t>

<t>When attachments are retrieved in Base64 or UUencode form, the
  Huffman coding usually compresses those to approximatively only 75%
  of their encoding size. &nbsp;8-bit compression algorithms such
  as DEFLATE work well on 8-bit file formats; however, both Base64
  and UUencode transform a file into something resembling 6-bit bytes,
  hiding most of the 8-bit file format from the compressor.</t>

<t>On the other end, attachments encoded using a compression algorithm
  that retains the full 8-bit spectrum, like yEnc, are much more likely
  to be incompressible.</t>

</section> <!-- efficiency -->

<section title="DEFLATE Specificities" anchor="deflatespecificities">

<t>When using the zlib library (see <xref target="RFC1951"/>), the
  functions deflateInit2(), deflate(), inflateInit2(), and inflate()
  suffice to implement this extension.</t>

<t>The windowBits value MUST be in the range -8 to -15 for
  deflateInit2(), or else it will use the wrong format.  The windowBits
  value SHOULD be -15 for inflateInit2(), or else it will not be able
  to decompress a stream with a larger window size, thus reducing
  interoperability. &nbsp;deflateParams() can be used to improve compression
  rate and resource use.  Regarding flush operations, the Z_FULL_FLUSH
  argument to deflate() permits to clear the dictionary, which generally
  results in compression that is less effective than performing a
  Z_PARTIAL_FLUSH.  As a matter of fact, keeping the 32kB dictionary from
  previous data, no matter how unrelated, can be of help (if there are
  no matching strings in there, then it is simply not referenced).</t>

<t>A server can improve downstream compression and the CPU efficiency
  both of the server and the client if it adjusts the compression
  level (e.g., using the deflateParams() function in zlib) at the
  start and end of large non-text multi-line data blocks (before and
  after 'content-lines' in the definition of 'multi-line-data-block'
  in <xref target="RFC3977"/> Section 9.8).  It permits to avoid trying
  to compress incompressible attachments.</t>

<t>A very simple strategy is to change the compression level to 0 at the
  start of an incompressible multi-line data block, for instance when
  encoded using yEnc <xref target="yEnc"/>, and to keep it at 1-5 the
  rest of the time.  More complex strategies are of course possible,
  and encouraged.</t>

</section> <!-- deflatespecificities -->


<section title="Augmented BNF Syntax for the COMPRESS Extension"
anchor="ABNF">

<t>This section describes the formal syntax of the COMPRESS extension
  using ABNF <xref target="RFC7405"/> <xref target="RFC5234"/>.
  It extends the syntax in Section 9 of <xref target="RFC3977"/>,
  and non-terminals not defined in this document are defined there.
  The <xref target="RFC3977"/> ABNF should be imported first, before
  attempting to validate these rules.</t>

<section title="Commands" anchor="commands">

<t>This syntax extends the non-terminal &lt;command&gt;, which represents an
  NNTP command.</t>

<figure>
<artwork type="abnf">
  command =/ compress-command

  compress-command = "COMPRESS" WS algorithm
</artwork>
</figure>
</section> <!-- commands -->

<section title="Capability Entries" anchor="capabilities">

<t>This syntax extends the non-terminal &lt;capability&#8209;entry&gt;, which
  represents a capability that may be advertised by the server.</t>

<figure>
<artwork type="abnf">
  capability-entry =/ compress-capability

  compress-capability = "COMPRESS" 1*(WS algorithm)
</artwork>
</figure>
</section> <!-- capabilities -->

<section title="General Non-terminals" anchor="non-terminals">

<figure>
<artwork>
  algorithm = %s"DEFLATE" / 1*20alg-char  ; case-sensitive
  alg-char = UPPER / DIGIT / "-" / "_"
</artwork>
</figure>

</section> <!-- non-terminals -->

</section> <!-- ABNF -->


<section title="Summary of Response Codes" anchor="respcodes">

<t>This section defines the following new response code.  It is not
  multi-line and has no arguments.</t>

<figure>
<artwork>
Response code 206
   Generated by: COMPRESS
   Meaning: compression layer activated
</artwork>
</figure>
</section> <!-- respcodes -->


<section title="Security Considerations" anchor="security">

<t>Security issues are discussed throughout this document.</t>

<t>In general, the security considerations of the NNTP core specification
  (<xref target="RFC3977"/> Section 12) and the DEFLATE compressed
  data format specification (<xref target="RFC1951"/> Section 6) are
  applicable here.</t>

<t>Implementers should be aware that combining compression with
  encryption like TLS can sometimes reveal information that would not
  have been revealed without compression, as explained in Section 6
  of <xref target="RFC3749"/>.  As a matter of fact, adversaries that
  observe the length of the compressed data might be able to derive
  information about the corresponding uncompressed data.  The CRIME
  and the BREACH attacks (<xref target="RFC7457"/> Section 2.6) are
  examples of such case.</t>

<t>In order to help mitigate leaking authentication credentials, this
  document states in <xref target="description"/> that authentication
  MUST NOT be attempted after a successful use of COMPRESS.  Therefore,
  when a client wants to authenticate, compress data, and negotiate a
  TLS security layer (without TLS-level compression) in the same NNTP
  connection, it MUST use the STARTTLS, AUTHINFO, and COMPRESS commands
  in that order.  Of course, instead of using the STARTTLS command,
  a client can also use implicit TLS, that is to say it begins the TLS
  negotiation immediately upon connection on a separate port dedicated
  to NNTP over TLS.</t>

<t>NNTP commands other than AUTHINFO are not believed to divulge
  confidential information as long as only public Netnews newsgroups and
  articles are accessed.  That is why this specification only prohibits
  the use of AUTHINFO after COMPRESS.  In case confidential articles are
  accessed in private newsgroups, special care is needed: implementations
  SHOULD NOT compress confidential data together with public data when
  a TLS <xref target="RFC5246"/> or SASL <xref target="RFC4422"/>
  security layer is active.  As a matter of fact, adversaries that
  observe the length of the compressed data might be able to derive
  information about it, when public data (that adversaries know is read)
  and confidential data are compressed in the same compress session.</t>

<t>Additionally, it is preferable not to compress the contents of
  two distinct confidential articles together if it can be avoided,
  as adversaries might be able to derive information about them (for
  instance if they have a few header fields or body lines in common).
  This can be achieved for instance with DEFLATE by clearing the
  compression dictionary each time a confidential article is sent.  More
  complex implementations are of course possible, and encouraged.</t>

<t>Implementations are encouraged to unconditionally allow compression
  when no security layer is active, and to support an option to enable or
  disable compression when a security layer is active.  Such an option
  could for instance be with global scope or server/connection based.
  Besides, as compression may in general weaken the confidentiality
  of a security layer, implementations SHOULD NOT automatically enable
  compression when a security layer is active unless the user explicitly
  enabled it with this knowledge.</t>

<t>Future extensions to NNTP that define commands conveying confidential
  data SHOULD ensure to state that these confidential data SHOULD
  NOT be compressed together with public data when a security layer
  is active.</t>

<t>Last but not least, careful consideration should be given to
  protections against implementation errors that introduce security risks
  with regards to compression algorithms.  See for instance the part
  of Section 6 of <xref target="RFC3749"/> about compression algorithms
  that can occasionally expand, rather than compress, input data.</t>
</section> <!-- security -->


<section title="IANA Considerations" anchor="iana">

<section title="NNTP Compression Algorithm Registry" anchor="compreg">

<t>The NNTP Compression Algorithm registry will be maintained by
  IANA.  The registry will be available at
  &lt;http://www.iana.org/assignments/nntp-compression-algorithms&gt;.</t>

<t>The purpose of this registry is not only to ensure uniqueness of
  values used to name NNTP compression algorithms, but also to
  provide a definitive reference to technical specifications
  detailing each NNTP compression algorithm available for use on the
  Internet.</t>

<t>An NNTP compression algorithm is either a private algorithm, or
  its name is included in the IANA NNTP Compression Algorithm registry
  (in which case it is a "registered NNTP compression algorithm").
  Different entries in the registry MUST use different names.</t>

<t>Private algorithms with unregistered names are allowed, but SHOULD
  NOT be used because it is difficult to achieve interoperability
  with them.</t>

<t>The 206, 403, and 502 response codes that a news server answers to
  the COMPRESS command using a private compression algorithm MUST have
  the same meaning as the one documented in <xref target="compresscmd"/>
  of this document.</t>

<t>The procedure detailed in <xref target="regproc"/> is to be used
  for registration of a value naming a specific individual compression
  algorithm.</t>

<t>Any name that conforms to the syntax of an NNTP compression algorithm
  name (<xref target="non-terminals"/>) can be used.  Especially, NNTP
  compression algorithms are named by strings, from 1 to 20 characters
  in length, consisting of upper-case letters, digits, hyphens, and/or
  underscores.</t>

<t>Comments may be included in the registry as discussed in
  <xref target="regcomments"/> and may be changed as discussed in
  <xref target="changecontrol"/>.</t>

<section title="Algorithm Name Registration Procedure"
  anchor="regproc">

<t>IANA will register new NNTP compression algorithm names on a First
  Come First Served basis, as defined in BCP 26
  <xref target="RFC5226"/>.  IANA has the right to reject obviously
  bogus registration requests, but will perform no review of claims
  made in the registration form.</t>

<t>Registration of an NNTP compression algorithm is requested by
  filling in the following template and sending it via electronic mail
  to IANA at &lt;iana@iana.org&gt;:</t>

<figure>
<artwork>
   Subject: Registration of NNTP compression algorithm Z

   NNTP compression algorithm name:

   Security considerations:

   Published specification (recommended):

   Contact for further information:

   Intended usage: (One of COMMON, LIMITED USE, or OBSOLETE)

   Owner/Change controller:

   Note: (Any other information that the author deems relevant may be
          added here.)
</artwork>
</figure>

<t>While this registration procedure does not require expert review,
  authors of NNTP compression algorithms are encouraged to seek
  community review and comment whenever that is feasible.  Authors
  may seek community review by posting a specification of their
  proposed algorithm as an Internet-Draft.  NNTP compression
  algorithms intended for widespread use should be standardized
  through the normal IETF process, when appropriate.</t>

</section> <!-- compreg -->

<section title="Comments on Algorithm Registrations"
  anchor="regcomments">

<t>Comments on a registered NNTP compression algorithm should
  first be sent to the "owner" of the algorithm and/or to the
  mailing list for the now concluded IETF NNTPEXT working group
  (&lt;ietf&#8209;nntp@lists.eyrie.org&gt;).</t>

<t>Submitters of comments may, after a reasonable attempt to contact
  the owner and/or the above mailing list, request IANA to attach their
  comment to the NNTP compression algorithm registration itself by
  sending mail to &lt;iana@iana.org&gt;.  At IANA's sole discretion,
  IANA may attach the comment to the NNTP compression algorithm's
  registration.</t>

</section> <!-- regcomments -->

<section title="Change Control" anchor="changecontrol">

<t>Once an NNTP compression algorithm registration has been published
  by IANA, the owner may request a change to its definition.  The
  change request follows the same procedure as the initial registration
  request.</t>

<t>The owner of an NNTP compression algorithm may pass responsibility
  for the algorithm to another person or agency by informing IANA;
  this can be done without discussion or review.</t>

<t>The IESG may reassign responsibility for an NNTP compression
  algorithm.  The most common case of this will be to enable changes
  to be made to algorithms where the owner of the registration has
  died, has moved out of contact, or is otherwise unable to make
  changes that are important to the community.</t>

<t>NNTP compression algorithm registrations MUST NOT be deleted;
  algorithms that are no longer believed appropriate for use can be
  declared OBSOLETE by a change to their "intended usage" field; such
  algorithms will be clearly marked in the registry published by
  IANA.</t>

<t>The IESG is considered to be the owner of all NNTP compression
  algorithms that are on the IETF standards track.</t>

</section> <!-- changecontrol -->

</section> <!-- iana -->

<section title="Registration of the DEFLATE Compression Algorithm"
anchor="registrationalg">

<t>This section gives a formal definition of the DEFLATE compression
  algorithm as required by <xref target="regproc"/> for the IANA
  registry.</t>

<figure>
<artwork>
   NNTP compression algorithm name: DEFLATE

   Security considerations: See Section 7 of this document

   Published specification: This document

   Contact for further information: Authors of this document

   Intended usage: COMMON

   Owner/Change controller: IESG &lt;iesg@ietf.org&gt;

   Note: This algorithm is mandatory to implement
</artwork>
</figure>

<t>This registration will appear as follows in the NNTP Compression
  Algorithm registry:</t>

<texttable>
  <ttcol>Algorithm Name</ttcol>
  <ttcol>Intended Usage</ttcol>
  <ttcol>Reference</ttcol>
  <c>DEFLATE</c>
  <c>COMMON</c>
  <c>[ RFC-to-be ]</c>
</texttable>

</section> <!-- registrationalg -->

<section title="Registration of the NNTP COMPRESS Extension"
anchor="registrationext">

<t>This section gives a formal definition of the COMPRESS extension as
  required by Section 3.3.3 of <xref target="RFC3977"/> for the IANA
  registry.

<list style="symbols">
<t>The COMPRESS extension allows an NNTP connection to be effectively
  and efficiently compressed.</t>
<t>The capability label for this extension is "COMPRESS", whose
  arguments list the available compression algorithms.</t>
<t>This extension defines one new command, COMPRESS, whose behavior,
  arguments, and responses are defined in
  <xref target="compresscmd"/>.</t>
<t>This extension does not associate any new responses with
  pre-existing NNTP commands.</t>
<t>This extension does affect the overall behavior of both server and
  client, in that after successful use of the COMPRESS command, all
  communication is transmitted in a compressed format.</t>
<t>This extension does not affect the maximum length of commands or
  initial response lines.</t>
<t>This extension does not alter pipelining, but the COMPRESS command
  cannot be pipelined.</t>
<t>Use of this extension does alter the capabilities list; once the
  COMPRESS command has been used successfully, the COMPRESS capability
  can no longer be advertised by CAPABILITIES.  Additionally, the
  STARTTLS and MODE-READER capabilities MUST NOT be advertised, and the
  AUTHINFO capability label MUST either be listed with no arguments or
  not advertised at all after a successful execution of the COMPRESS
  command.</t>
<t>This extension does not cause any pre-existing command to produce a
  401, 480, or 483 response code.</t>
<t>This extension is unaffected by any use of the MODE READER command;
  however, the MODE READER command MUST NOT be used in the same session
  following a successful execution of the COMPRESS command.</t>
<t>The STARTTLS and AUTHINFO commands MUST NOT be used in the same
  session following a successful execution of the COMPRESS command.</t>
<t>Published Specification: This document.</t>
<t>Contact for Further Information: Authors of this document.</t>
<t>Change Controller: IESG &lt;iesg@ietf.org&gt;.</t>
</list></t>

<t>This registration will appear as follows in the NNTP capability
  labels registry contained in the Network News Transfer Protocol (NNTP)
  Parameters registry:</t>

<texttable>
  <ttcol>Label</ttcol>
  <ttcol>Meaning</ttcol>
  <ttcol>Reference</ttcol>
  <c>COMPRESS</c>
  <c>Supported compression algorithms</c>
  <c>[ RFC-to-be ]</c>
</texttable>

</section> <!-- registrationext -->

</section> <!-- iana -->

</middle>


<back>
<references title="Normative References">
<?rfc linefile="1:http://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.1951.xml"?>

<reference  anchor='RFC1951' target='http://www.rfc-editor.org/info/rfc1951'>
<front>
<title>DEFLATE Compressed Data Format Specification version 1.3</title>
<author initials='P.' surname='Deutsch' fullname='P. Deutsch'><organization /></author>
<date year='1996' month='May' />
<abstract><t>This specification defines a lossless compressed data format that compresses data using a combination of the LZ77 algorithm and Huffman coding, with efficiency comparable to the best currently available general-purpose compression methods.  This memo provides information for the Internet community.  This memo does not specify an Internet standard of any kind.</t></abstract>
</front>
<seriesInfo name='RFC' value='1951'/>
<seriesInfo name='DOI' value='10.17487/RFC1951'/>
</reference>
<?rfc linefile="994:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"?>

<reference  anchor='RFC2119' target='http://www.rfc-editor.org/info/rfc2119'>
<front>
<title>Key words for use in RFCs to Indicate Requirement Levels</title>
<author initials='S.' surname='Bradner' fullname='S. Bradner'><organization /></author>
<date year='1997' month='March' />
<abstract><t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='14'/>
<seriesInfo name='RFC' value='2119'/>
<seriesInfo name='DOI' value='10.17487/RFC2119'/>
</reference>
<?rfc linefile="995:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.3977.xml"?>

<reference  anchor='RFC3977' target='http://www.rfc-editor.org/info/rfc3977'>
<front>
<title>Network News Transfer Protocol (NNTP)</title>
<author initials='C.' surname='Feather' fullname='C. Feather'><organization /></author>
<date year='2006' month='October' />
<abstract><t>The Network News Transfer Protocol (NNTP) has been in use in the Internet for a decade, and remains one of the most popular protocols (by volume) in use today.  This document is a replacement for RFC 977, and officially updates the protocol specification.  It clarifies some vagueness in RFC 977, includes some new base functionality, and provides a specific mechanism to add standardized extensions to NNTP.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3977'/>
<seriesInfo name='DOI' value='10.17487/RFC3977'/>
</reference>
<?rfc linefile="996:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5226.xml"?>

<reference  anchor='RFC5226' target='http://www.rfc-editor.org/info/rfc5226'>
<front>
<title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
<author initials='T.' surname='Narten' fullname='T. Narten'><organization /></author>
<author initials='H.' surname='Alvestrand' fullname='H. Alvestrand'><organization /></author>
<date year='2008' month='May' />
<abstract><t>Many protocols make use of identifiers consisting of constants and other well-known values.  Even after a protocol has been defined and deployment has begun, new values may need to be assigned (e.g., for a new option type in DHCP, or a new encryption or authentication transform for IPsec).  To ensure that such quantities have consistent values and interpretations across all implementations, their assignment must be administered by a central authority.  For IETF protocols, that role is provided by the Internet Assigned Numbers Authority (IANA).</t><t>In order for IANA to manage a given namespace prudently, it needs guidelines describing the conditions under which new values can be assigned or when modifications to existing values can be made.  If IANA is expected to play a role in the management of a namespace, IANA must be given clear and concise instructions describing that role.  This document discusses issues that should be considered in formulating a policy for assigning values to a namespace and provides guidelines for authors on the specific text that must be included in documents that place demands on IANA.</t><t>This document obsoletes RFC 2434.  This document specifies an Internet Best  Current Practices for the Internet Community, and requests discussion and  suggestions for improvements.</t></abstract>
</front>
<seriesInfo name='BCP' value='26'/>
<seriesInfo name='RFC' value='5226'/>
<seriesInfo name='DOI' value='10.17487/RFC5226'/>
</reference>
<?rfc linefile="997:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5234.xml"?>

<reference  anchor='RFC5234' target='http://www.rfc-editor.org/info/rfc5234'>
<front>
<title>Augmented BNF for Syntax Specifications: ABNF</title>
<author initials='D.' surname='Crocker' fullname='D. Crocker' role='editor'><organization /></author>
<author initials='P.' surname='Overell' fullname='P. Overell'><organization /></author>
<date year='2008' month='January' />
<abstract><t>Internet technical specifications often need to define a formal syntax.  Over the years, a modified version of Backus-Naur Form (BNF), called Augmented BNF (ABNF), has been popular among many Internet specifications.  The current specification documents ABNF. It balances compactness and simplicity with reasonable representational power.  The differences between standard BNF and ABNF involve naming rules, repetition, alternatives, order-independence, and value ranges.  This specification also supplies additional rule definitions and encoding for a core lexical analyzer of the type common to several Internet specifications.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='STD' value='68'/>
<seriesInfo name='RFC' value='5234'/>
<seriesInfo name='DOI' value='10.17487/RFC5234'/>
</reference>
<?rfc linefile="998:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7405.xml"?>

<reference  anchor='RFC7405' target='http://www.rfc-editor.org/info/rfc7405'>
<front>
<title>Case-Sensitive String Support in ABNF</title>
<author initials='P.' surname='Kyzivat' fullname='P. Kyzivat'><organization /></author>
<date year='2014' month='December' />
<abstract><t>This document extends the base definition of ABNF (Augmented Backus-Naur Form) to include a way to specify US-ASCII string literals that are matched in a case-sensitive manner.</t></abstract>
</front>
<seriesInfo name='RFC' value='7405'/>
<seriesInfo name='DOI' value='10.17487/RFC7405'/>
</reference>
<?rfc linefile="999:draft-murchison-nntp-compress.xml"?>
</references> <!-- normative -->

<references title="Informative References">
<?rfc linefile="1:http://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.1962.xml"?>

<reference  anchor='RFC1962' target='http://www.rfc-editor.org/info/rfc1962'>
<front>
<title>The PPP Compression Control Protocol (CCP)</title>
<author initials='D.' surname='Rand' fullname='D. Rand'><organization /></author>
<date year='1996' month='June' />
<abstract><t>This document defines a method for negotiating data compression over PPP links.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='1962'/>
<seriesInfo name='DOI' value='10.17487/RFC1962'/>
</reference>
<?rfc linefile="1003:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.3749.xml"?>

<reference  anchor='RFC3749' target='http://www.rfc-editor.org/info/rfc3749'>
<front>
<title>Transport Layer Security Protocol Compression Methods</title>
<author initials='S.' surname='Hollenbeck' fullname='S. Hollenbeck'><organization /></author>
<date year='2004' month='May' />
<abstract><t>The Transport Layer Security (TLS) protocol (RFC 2246) includes features to negotiate selection of a lossless data compression method as part of the TLS Handshake Protocol and to then apply the algorithm associated with the selected method as part of the TLS Record Protocol.  TLS defines one standard compression method which specifies that data exchanged via the record protocol will not be compressed.  This document describes an additional compression method associated with a lossless data compression algorithm for use with TLS, and it describes a method for the specification of additional TLS compression methods.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='3749'/>
<seriesInfo name='DOI' value='10.17487/RFC3749'/>
</reference>
<?rfc linefile="1004:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4422.xml"?>

<reference  anchor='RFC4422' target='http://www.rfc-editor.org/info/rfc4422'>
<front>
<title>Simple Authentication and Security Layer (SASL)</title>
<author initials='A.' surname='Melnikov' fullname='A. Melnikov' role='editor'><organization /></author>
<author initials='K.' surname='Zeilenga' fullname='K. Zeilenga' role='editor'><organization /></author>
<date year='2006' month='June' />
<abstract><t>The Simple Authentication and Security Layer (SASL) is a framework for providing authentication and data security services in connection-oriented protocols via replaceable mechanisms.  It provides a structured interface between protocols and mechanisms.  The resulting framework allows new protocols to reuse existing mechanisms and allows old protocols to make use of new mechanisms.  The framework also provides a protocol for securing subsequent protocol exchanges within a data security layer.</t><t>This document describes how a SASL mechanism is structured, describes how protocols include support for SASL, and defines the protocol for carrying a data security layer over a connection.  In addition, this document defines one SASL mechanism, the EXTERNAL mechanism.</t><t>This document obsoletes RFC 2222.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4422'/>
<seriesInfo name='DOI' value='10.17487/RFC4422'/>
</reference>
<?rfc linefile="1005:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4642.xml"?>

<reference  anchor='RFC4642' target='http://www.rfc-editor.org/info/rfc4642'>
<front>
<title>Using Transport Layer Security (TLS) with Network News Transfer Protocol (NNTP)</title>
<author initials='K.' surname='Murchison' fullname='K. Murchison'><organization /></author>
<author initials='J.' surname='Vinocur' fullname='J. Vinocur'><organization /></author>
<author initials='C.' surname='Newman' fullname='C. Newman'><organization /></author>
<date year='2006' month='October' />
<abstract><t>This memo defines an extension to the Network News Transfer Protocol (NNTP) that allows an NNTP client and server to use Transport Layer Security (TLS).  The primary goal is to provide encryption for single-link confidentiality purposes, but data integrity, (optional) certificate-based peer entity authentication, and (optional) data compression are also possible.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4642'/>
<seriesInfo name='DOI' value='10.17487/RFC4642'/>
</reference>
<?rfc linefile="1006:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4643.xml"?>

<reference  anchor='RFC4643' target='http://www.rfc-editor.org/info/rfc4643'>
<front>
<title>Network News Transfer Protocol (NNTP) Extension for Authentication</title>
<author initials='J.' surname='Vinocur' fullname='J. Vinocur'><organization /></author>
<author initials='K.' surname='Murchison' fullname='K. Murchison'><organization /></author>
<date year='2006' month='October' />
<abstract><t>This document defines an extension to the Network News Transfer Protocol (NNTP) that allows a client to indicate an authentication mechanism to the server, to perform an authentication protocol exchange, and optionally to negotiate a security layer for subsequent protocol interactions during the remainder of an NNTP session.</t><t>This document updates and formalizes the AUTHINFO USER/PASS authentication method specified in RFC 2980 and deprecates the AUTHINFO SIMPLE and AUTHINFO GENERIC authentication methods. Additionally, this document defines a profile of the Simple Authentication and Security Layer (SASL) for NNTP.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4643'/>
<seriesInfo name='DOI' value='10.17487/RFC4643'/>
</reference>
<?rfc linefile="1007:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4644.xml"?>

<reference  anchor='RFC4644' target='http://www.rfc-editor.org/info/rfc4644'>
<front>
<title>Network News Transfer Protocol (NNTP) Extension for Streaming Feeds</title>
<author initials='J.' surname='Vinocur' fullname='J. Vinocur'><organization /></author>
<author initials='K.' surname='Murchison' fullname='K. Murchison'><organization /></author>
<date year='2006' month='October' />
<abstract><t>This memo defines an extension to the Network News Transfer Protocol (NNTP) to provide asynchronous (otherwise known as &quot;streaming&quot;) transfer of articles.  This allows servers to transfer articles to other servers with much greater efficiency.</t><t>This document updates and formalizes the CHECK and TAKETHIS commands specified in RFC 2980 and deprecates the MODE STREAM command.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4644'/>
<seriesInfo name='DOI' value='10.17487/RFC4644'/>
</reference>
<?rfc linefile="1008:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4648.xml"?>

<reference  anchor='RFC4648' target='http://www.rfc-editor.org/info/rfc4648'>
<front>
<title>The Base16, Base32, and Base64 Data Encodings</title>
<author initials='S.' surname='Josefsson' fullname='S. Josefsson'><organization /></author>
<date year='2006' month='October' />
<abstract><t>This document describes the commonly used base 64, base 32, and base 16 encoding schemes.  It also discusses the use of line-feeds in encoded data, use of padding in encoded data, use of non-alphabet characters in encoded data, use of different encoding alphabets, and canonical encodings.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4648'/>
<seriesInfo name='DOI' value='10.17487/RFC4648'/>
</reference>
<?rfc linefile="1009:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.4978.xml"?>

<reference  anchor='RFC4978' target='http://www.rfc-editor.org/info/rfc4978'>
<front>
<title>The IMAP COMPRESS Extension</title>
<author initials='A.' surname='Gulbrandsen' fullname='A. Gulbrandsen'><organization /></author>
<date year='2007' month='August' />
<abstract><t>The COMPRESS extension allows an IMAP connection to be effectively and efficiently compressed.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='4978'/>
<seriesInfo name='DOI' value='10.17487/RFC4978'/>
</reference>
<?rfc linefile="1010:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.5246.xml"?>

<reference  anchor='RFC5246' target='http://www.rfc-editor.org/info/rfc5246'>
<front>
<title>The Transport Layer Security (TLS) Protocol Version 1.2</title>
<author initials='T.' surname='Dierks' fullname='T. Dierks'><organization /></author>
<author initials='E.' surname='Rescorla' fullname='E. Rescorla'><organization /></author>
<date year='2008' month='August' />
<abstract><t>This document specifies Version 1.2 of the Transport Layer Security (TLS) protocol.  The TLS protocol provides communications security over the Internet.  The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.  [STANDARDS-TRACK]</t></abstract>
</front>
<seriesInfo name='RFC' value='5246'/>
<seriesInfo name='DOI' value='10.17487/RFC5246'/>
</reference>
<?rfc linefile="1011:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7457.xml"?>

<reference  anchor='RFC7457' target='http://www.rfc-editor.org/info/rfc7457'>
<front>
<title>Summarizing Known Attacks on Transport Layer Security (TLS) and Datagram TLS (DTLS)</title>
<author initials='Y.' surname='Sheffer' fullname='Y. Sheffer'><organization /></author>
<author initials='R.' surname='Holz' fullname='R. Holz'><organization /></author>
<author initials='P.' surname='Saint-Andre' fullname='P. Saint-Andre'><organization /></author>
<date year='2015' month='February' />
<abstract><t>Over the last few years, there have been several serious attacks on Transport Layer Security (TLS), including attacks on its most commonly used ciphers and modes of operation.  This document summarizes these attacks, with the goal of motivating generic and protocol-specific recommendations on the usage of TLS and Datagram TLS (DTLS).</t></abstract>
</front>
<seriesInfo name='RFC' value='7457'/>
<seriesInfo name='DOI' value='10.17487/RFC7457'/>
</reference>
<?rfc linefile="1012:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.tools.ietf.org/public/rfc/bibxml/reference.RFC.7525.xml"?>

<reference  anchor='RFC7525' target='http://www.rfc-editor.org/info/rfc7525'>
<front>
<title>Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)</title>
<author initials='Y.' surname='Sheffer' fullname='Y. Sheffer'><organization /></author>
<author initials='R.' surname='Holz' fullname='R. Holz'><organization /></author>
<author initials='P.' surname='Saint-Andre' fullname='P. Saint-Andre'><organization /></author>
<date year='2015' month='May' />
<abstract><t>Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) are widely used to protect data exchanged over application protocols such as HTTP, SMTP, IMAP, POP, SIP, and XMPP.  Over the last few years, several serious attacks on TLS have emerged, including attacks on its most commonly used cipher suites and their modes of operation.  This document provides recommendations for improving the security of deployed services that use TLS and DTLS. The recommendations are applicable to the majority of use cases.</t></abstract>
</front>
<seriesInfo name='BCP' value='195'/>
<seriesInfo name='RFC' value='7525'/>
<seriesInfo name='DOI' value='10.17487/RFC7525'/>
</reference>
<?rfc linefile="1013:draft-murchison-nntp-compress.xml"?>
<?rfc linefile="1:http://xml2rfc.tools.ietf.org/public/rfc/bibxml2/reference.IEEE.1003-2.1992.xml"?>

<reference anchor="IEEE.1003-2.1992">
<front>
<title>Information Technology - Portable Operating System Interface (POSIX) - Part 2: Shell and Utilities (Vol. 1)</title>
<author>
<organization>Institute of Electrical and Electronics Engineers</organization>
</author>
<date month="" year="1992" />
</front>

<seriesInfo name="IEEE" value="Standard 1003.2" />

</reference>
<?rfc linefile="1014:draft-murchison-nntp-compress.xml"?>

<reference anchor="V42bis">
<front>
<title>Data compression procedures for data circuit-terminating
  equipment (DCE) using error correction procedures</title>
<author><organization abbrev="ITU">International Telecommunications
  Union</organization></author>
<date month="January" year="1990"/>
</front>
<seriesInfo name="ITU-T" value="Recommendation V.42bis"/>
<format type="HTML" target="http://www.itu.int/rec/T-REC-V.42bis"/>
</reference>

<reference anchor="MNP">
<front>
<title>The Complete Modem Reference</title>
<author initials="G." surname="Held" fullname="Gilbert Held"/>
<date month="May" year="1994"/>
</front>
<seriesInfo name="Second Edition," value="Wiley Professional Computing"/>
</reference>

<reference anchor="CRIME">
<front>
<title>The CRIME Attack</title>
<author initials="J." surname="Rizzo" fullname="Juliano Rizzo"/>
<author initials="T." surname="Duong" fullname="Thai Duong"/>
<date month="Ekoparty Security Conference," year="2012"/>
</front>
</reference>

<reference anchor="yEnc" target="http://www.yenc.org/">
<front>
<title>yEnc - Efficient encoding for Usenet and eMail</title>
<author initials="J." surname="Helbing" fullname="J&#252;rgen Helbing"/>
<date month="March" year="2002"/>
</front>
<format type="TEXT" target="http://www.yenc.org/yenc-draft.1.3.txt"/>
</reference>

</references> <!-- informative -->


<section title="Acknowledgments" anchor="acknowledgments">

<t>This document draws heavily on ideas in <xref target="RFC4978"/>
  by Arnt Gulbrandsen; a large portion of this text was borrowed
  from that specification.</t>

<t>The authors would like to thank the following individuals for
  contributing their ideas and reviewing this specification: Mark Adler,
  Russ Allbery, St&#233;phane Bortzmeyer, Francis Dupont, &#193;ngel
  Gonz&#225;lez, Barry Leiba, John Levine, and Brian Peterson.</t>

<t>Special thanks to our Document Shepherd, Michael B&#228;uerle, who
  significantly helped to increase the quality of this specification.</t>

<t>Many thanks to the Responsible Area Director, Alexey Melnikov,
  for reviewing and sponsoring this document.</t>

</section> <!-- acknowledgments -->


<section title="Document History (to be removed by RFC Editor before
		publication)" anchor="history">

<section title="Changes since -05">
<t><list style="symbols">
<t>Take into account all the remarks sent during IETF Last Call.</t>
<t>Do not prevent the registration of compression algorithm names beginning
  with "X" (in conformance with RFC6648).  Also, in the examples, use "SHRINK"
  instead of "X-SHRINK".</t>
<t>Separate <xref target="efficiency"/> and
  <xref target="deflatespecificities"/> because the latter uses normative
  keywords.  Also improve and simplify the wording of these two Sections,
  notably by distinguishing NNTP simple responses and NNTP multi-line
  responses, and by not being categorical that Z_PARTIAL_FLUSH is the best
  and only flush operation to use.</t>
<t>Do not declare non-compliant an implementation that only supports COMPRESS
  when there is no security layer.</t>
<t>Move <xref target="RFC1951"/> reference to normative, and <xref
  target="RFC4642"/> reference to informative.</t>
<t>Explain why STARTTLS is not allowed after COMPRESS.</t>
<t>Improve security by stating that authentication MUST NOT be attempted after
  COMPRESS has been successfully executed.  Do not change, though, the
  behaviour of AUTHINFO as described in <xref target="RFC4643"/>, allowing
  authentication even though TLS-level compression is active.</t>
<t>Require that all data that was submitted for compression MUST be included
  in the compressed output, and appropriately flushed.</t>
<t>Mention possible security risks with regards to compression algorithms.</t>
<t>Mention that using unregistered algorithms decrease interoperability.</t>
<t>Mention the exact contents of the IANA registrations asked by this
  document.</t>
<t>NNTP compression algorithm names really are case-sensitive.  Update ABNF
  syntax accordingly.</t>
<t>Minor other wording improvements.</t>
</list></t>
</section>

<section title="Changes since -04">
<t><list style="symbols">
<t>Reworded a sentence wrongly using "MAY NOT" (not a key word defined in
  <xref target="RFC2119"/>).</t>
<t>Uppercased a "must" and a "should" in
  <xref target="deflatespecificities"/>.</t>
</list></t>
</section>

<section title="Changes since -03">
<t><list style="symbols">
<t>Added a naming convention for NNTP compression algorithms.  Improve the
  wording of registered vs private compression algorithms.</t>
<t>If a registered NNTP compression algorithm is advertised, it
  MUST fully conform with its related specification.</t>
<t>Fixed the wording of security considerations to reflect that the threat
  appears when public and confidential data are compressed together inside
  a security layer.  Thanks to &#193;ngel Gonz&#225;lez for pointing that.</t>
<t>The default configuration SHOULD be disabled compression when a security
  layer is active.</t>
<t>COMPRESS acts as a compression layer, not a transport layer.</t>
<t>Minor editorial changes.</t>
</list></t>
</section>

<section title="Changes since -02">
<t><list style="symbols">
<t>Added text stating that the receiving end SHOULD terminate the connection
  when receiving invalid or corrupted compressed data.</t>
<t>Explained why COMPRESS permits to do better than existing unstandardized
  commands like XZVER, XZHDR, MODE COMPRESS, and XFEATURE GZIP.</t>
<t>Added an example of AUTHINFO command when compression is active.</t>
<t>The LIST capability label was missing in the examples when READER
  was also advertised.</t>
<t>Improved an example to send CAPABILITIES after successful authentication.</t>
<t>Mentioned that COMPRESS is related to security.  CAPABILITIES is therefore
  sent again after COMPRESS.</t>
<t>Re-added discussion of attachments in binary form and incompressible
  file formats.  Improve the discussion about flushes, and add a specific
  section about DEFLATE.</t>
<t>Changed a MUST NOT to SHOULD NOT for the use of AUTHINFO after COMPRESS.</t>
<t>Algorithm names are case-insensitive.</t>
<t>Mentioned the use of the 501 response code.</t>
<t>Added the Security Considerations Section.</t>
<t>Added Julien &#201;lie as co-author of this document.</t>
<t>Minor editorial changes.</t>
</list></t>
</section>

<section title="Changes since -01">
<t><list style="symbols">
<t>Switched to using 206 response code when compression has been
  activated.</t>
<t>Added text stating that TLS-level compression is susceptible to
  CRIME attack and current BCP is to disable it.</t>
<t>Added text stating that AUTHINFO shouldn't be advertised or used
  after COMPRESS to prevent possible CRIME attack (with example).</t>
<t>Added text stating that a windowBits value of -15 should be used
  for inflateInit2().</t>
<t>Minor editorial changes.</t>
</list></t>
</section>

<section title="Changes since -00">
<t><list style="symbols">
<t>Made DEFLATE the mandatory to implement compression algorithm.</t>
<t>Removed the requirement that clients/servers implementing COMPRESS
  also implement TLS compression.</t>
<t>Added an example of a client trying to use an unsupported
  compression algorithm.</t>
<t>Rewrote <xref target="efficiency">Compression Efficiency</xref> as
  follows:
<list style="symbols">
<t>Included a sample listing of which NNTP commands produce which type
  of data to be compressed.</t>
<t>Removed discussion of attachments in binary form and incompressible
  file formats.</t>
<t>Mentioned UUencode and yEnc encoding of attachments.</t>
</list></t>
<t>Added IANA registry of NNTP compression algorithms.</t>
<t>Miscellaneous editorial changes submitted by Julien &#201;lie.</t>
</list></t>
</section>

</section> <!-- history -->

</back>
</rfc>
