<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.26 (Ruby 3.1.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-rfc8447bis-04" category="std" consensus="true" updates="3749, 5077, 4680, 5246, 5705, 5878, 6520, 7301, 8447" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.17.0 -->
  <front>
    <title abbrev="(D)TLS IANA Registry Updates">IANA Registry Updates for TLS and DTLS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-04"/>
    <author initials="J." surname="Salowey" fullname="Joe Salowey">
      <organization>Venafi</organization>
      <address>
        <email>joe@salowey.net</email>
      </address>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <date year="2023" month="March" day="27"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document updates the changes to TLS and DTLS IANA registries
made in RFC 8447. It adds a new value "D" for discouraged
to the recommended column of the selected TLS registries.</t>
      <t>This document updates the following RFCs:
3749, 5077, 4680, 5246, 5705, 5878, 6520, 7301, and 8447.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-rfc8447bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/rfc8447bis"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>This document instructs IANA to make changes to a number of the IANA
registries related to Transport Layer Security (TLS) and Datagram
Transport Layer Security (DTLS). These changes update the changes made
in <xref target="RFC8447"/>.</t>
      <aside>
        <t>NOTE for IANA: This document specifies changes to the registry to update
  the changes made in <xref target="RFC8447"/>.</t>
      </aside>
      <t>This specification updates the "Recommended" column in TLS
registries to define a third value "D" for items that are discouraged.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
    </section>
    <section anchor="adding-recommended-column">
      <name>Adding "Recommended" Column</name>
      <t>The instructions in this document update the Recommended column,
originally added in <xref target="RFC8447"/> to add a third value, "D",
indicating that a value is "Discouraged". The permitted values
are:</t>
      <ul spacing="normal">
        <li>Y: Indicates that the IETF has consensus that the
  item is <bcp14>RECOMMENDED</bcp14>. This only means that the associated
  mechanism is fit for the purpose for which it was defined.
  Careful reading of the documentation for the mechanism is
  necessary to understand the applicability of that mechanism.
  The IETF could recommend mechanisms that have limited
  applicability, but will provide applicability statements that
  describe any limitations of the mechanism or necessary constraints
  on its use.</li>
        <li>N: Indicates that the item has not been evaluated by
  the IETF and that the IETF has made no statement about the
  suitability of the associated mechanism. This does not necessarily
  mean that the mechanism is flawed, only that no consensus exists.
  The IETF might have consensus to leave an items marked as "N" on
  the basis of it having limited applicability or usage constraints.</li>
        <li>D: Indicates that the item is discouraged. This marking could be used to identify
  mechanisms that might result in problems if they are used, such as
  a weak cryptographic algorithm or a mechanism that might cause
  interoperability problems in deployment. Implementers <bcp14>SHOULD</bcp14>
  consult the linked references associated with the item to
  determine the conditions under which it <bcp14>SHOULD NOT</bcp14> or <bcp14>MUST NOT</bcp14> be used.</li>
      </ul>
      <t>Setting a value to "Y" or "D" in the "Recommended" column requires IETF Standards
Action <xref target="RFC8126"/>.  Any state transition to or from a "Y" or "D" value requires
IESG Approval. Not all items defined in Standards Track RFCs need to be set
to "Y" or "D". Any item not otherwise specified is set to "N". The column is
blank for values that are unassigned or reserved unless specifically set.</t>
      <section anchor="rec-note">
        <name>Recommended Note</name>
        <t>Existing registries have a note on the meaning of the recommended column. For the
registries discussed in the subsequent sections this note is updated
with a sentence describing the 'D' vaue as follows:</t>
        <dl>
          <dt>Note:</dt>
          <dd>
            <t>If "Recommended" column is set to "N", it does not necessarily mean
that it is flawed; rather, it indicates that the item either has not
been through the IETF consensus process, has limited applicability, or
is intended only for specific use cases.  If the "Recommended" column
is set to "D" the item is discouraged and <bcp14>SHOULD NOT</bcp14> or <bcp14>MUST NOT</bcp14> be used.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="tls-extensiontype-values">
      <name>TLS ExtensionType Values</name>
      <t>In order to refect the changes in the Recommended column allocation,
IANA <bcp14>SHALL</bcp14> update the TLS ExtensionType Values registry as follows:</t>
      <ul spacing="normal">
        <li>Change the registration procedure to:</li>
      </ul>
      <artwork><![CDATA[
    Values with the first byte in the range 0-254 (decimal) are assigned
    via Specification Required [RFC8126].  Values with the first byte
    255 (decimal) are reserved for Private Use [RFC8126].  Setting a
    "Recommended" column value to Y or D requires Standards Action {{RFC8126}}.
    Any state transition to or from a "Y" or "D" value requires
    IESG Approval.
]]></artwork>
      <ul spacing="normal">
        <li>Add a reference to this document under the reference heading.</li>
        <li>Update the "Recommended" column with the changes as listed below.  Entries
keep their existing "Y" and "N" entries except for the entries in following table.
A reference to this document <bcp14>SHALL</bcp14> be added to these entries.</li>
      </ul>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Extension</th>
            <th align="right">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">4</td>
            <td align="left">truncated_hmac</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">53</td>
            <td align="left">connection_id (deprecated)</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">40</td>
            <td align="left">Reserved</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">46</td>
            <td align="left">Reserved</td>
            <td align="right">D</td>
          </tr>
        </tbody>
      </table>
      <ul spacing="normal">
        <li>Update note on the recommended column with text in <xref target="rec-note"/>.</li>
      </ul>
    </section>
    <section anchor="tls-cipher-suites-registry">
      <name>TLS Cipher Suites Registry</name>
      <aside>
        <t>Note: Review in light of <xref target="I-D.ietf-tls-deprecate-obsolete-kex"/>.</t>
      </aside>
      <t>In order to refect the changes in the Recommended column allocation,
IANA <bcp14>SHALL</bcp14> update the TLS ExtensionType Values registry as follows:</t>
      <ul spacing="normal">
        <li>Change the registration procedure to:</li>
      </ul>
      <artwork><![CDATA[
    Values with the first byte in the range 0-254 (decimal) are
    assigned via Specification Required [RFC8126].  Values with the
    first byte 255 (decimal) are reserved for Private Use [RFC8126].
    Setting a "Recommended" column value to Y or D requires Standards
    Action {{RFC8126}}. Any state transition to or from a "Y" or "D"
    value requires IESG Approval.
]]></artwork>
      <ul spacing="normal">
        <li>Add a reference to this document under the reference heading.</li>
        <li>Update the "Recommended" column with the changes as listed below.  Entries
keep their existing "Y" and "N" entries except for the entries in following table.
A reference to this document <bcp14>SHALL</bcp14> be added to these entries.</li>
      </ul>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Cipher Suite Name</th>
            <th align="right">Recommeded</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x00,0x01</td>
            <td align="left">TLS_RSA_WITH_NULL_MD5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x02</td>
            <td align="left">TLS_RSA_WITH_NULL_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x03</td>
            <td align="left">TLS_RSA_EXPORT_WITH_RC4_40_MD5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x04</td>
            <td align="left">TLS_RSA_WITH_RC4_128_MD5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x05</td>
            <td align="left">TLS_RSA_WITH_RC4_128_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x06</td>
            <td align="left">TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x07</td>
            <td align="left">TLS_RSA_WITH_IDEA_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x08</td>
            <td align="left">TLS_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x09</td>
            <td align="left">TLS_RSA_WITH_DES_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x0B</td>
            <td align="left">TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x0C</td>
            <td align="left">TLS_DH_DSS_WITH_DES_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x0D</td>
            <td align="left">TLS_DH_DSS_WITH_3DES_EDE_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x0E</td>
            <td align="left">TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x0F</td>
            <td align="left">TLS_DH_RSA_WITH_DES_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x11</td>
            <td align="left">TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x12</td>
            <td align="left">TLS_DHE_DSS_WITH_DES_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x13</td>
            <td align="left">TLS_DHE_DSS_WITH_3DES_EDE_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x14</td>
            <td align="left">TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x15</td>
            <td align="left">TLS_DHE_RSA_WITH_DES_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x17</td>
            <td align="left">TLS_DH_anon_EXPORT_WITH_RC4_40_MD5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x18</td>
            <td align="left">TLS_DH_anon_WITH_RC4_128_MD5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x19</td>
            <td align="left">TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x1A</td>
            <td align="left">TLS_DH_anon_WITH_DES_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x1B</td>
            <td align="left">TLS_DH_anon_WITH_3DES_EDE_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x19</td>
            <td align="left">TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x1E</td>
            <td align="left">TLS_KRB5_WITH_DES_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x20</td>
            <td align="left">TLS_KRB5_WITH_RC4_128_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x21</td>
            <td align="left">TLS_KRB5_WITH_IDEA_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x22</td>
            <td align="left">TLS_KRB5_WITH_DES_CBC_MD5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x23</td>
            <td align="left">TLS_KRB5_WITH_3DES_EDE_CBC_MD5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x24</td>
            <td align="left">TLS_KRB5_WITH_RC4_128_MD5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x25</td>
            <td align="left">TLS_KRB5_WITH_IDEA_CBC_MD5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x26</td>
            <td align="left">TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x27</td>
            <td align="left">TLS_KRB5_EXPORT_WITH_RC2_CBC_40_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x28</td>
            <td align="left">TLS_KRB5_EXPORT_WITH_RC4_40_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x29</td>
            <td align="left">TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x2A</td>
            <td align="left">TLS_KRB5_EXPORT_WITH_RC2_CBC_40_MD5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x2B</td>
            <td align="left">TLS_KRB5_EXPORT_WITH_RC4_40_MD5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x8A</td>
            <td align="left">TLS_PSK_WITH_RC4_128_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x8E</td>
            <td align="left">TLS_DHE_PSK_WITH_RC4_128_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x92</td>
            <td align="left">TLS_RSA_PSK_WITH_RC4_128_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x02</td>
            <td align="left">TLS_ECDH_ECDSA_WITH_RC4_128_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x07</td>
            <td align="left">TLS_ECDHE_ECDSA_WITH_RC4_128_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x0C</td>
            <td align="left">TLS_ECDH_RSA_WITH_RC4_128_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x11</td>
            <td align="left">TLS_ECDHE_RSA_WITH_RC4_128_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x16</td>
            <td align="left">TLS_ECDH_anon_WITH_RC4_128_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x33</td>
            <td align="left">TLS_ECDHE_PSK_WITH_RC4_128_SHA</td>
            <td align="right">D</td>
          </tr>
        </tbody>
      </table>
      <ul spacing="normal">
        <li>Update note on the recommended column with text in <xref target="rec-note"/>.</li>
      </ul>
    </section>
    <section anchor="tls-supported-groups">
      <name>TLS Supported Groups</name>
      <t>In order to refect the changes in the Recommended column allocation,
IANA <bcp14>SHALL</bcp14> update the TLS Supported Groups registry as follows:</t>
      <ul spacing="normal">
        <li>Update the registration policy to include:</li>
      </ul>
      <artwork><![CDATA[
    Setting a "Recommended" column value to Y or D requires Standards
    Action {{RFC8126}}. Any state transition to or from a "Y" or "D"
    value requires IESG Approval.
]]></artwork>
      <ul spacing="normal">
        <li>Add a reference to this document under the reference heading.</li>
        <li>Entries keep their existing Recommended column "Y" and "N" entries.</li>
      </ul>
      <aside>
        <t>Note: Review in light of <xref target="I-D.ietf-tls-deprecate-obsolete-kex"/>
  also there are some weaker elliptic curves in this list.</t>
      </aside>
      <ul spacing="normal">
        <li>Update note on the recommended column with text in <xref target="rec-note"/>.</li>
      </ul>
    </section>
    <section anchor="tls-exporter-labels-registry">
      <name>TLS Exporter Labels Registry</name>
      <t>This document updates the registration procedure for the TLS Exporter
registry and updates the Recommended column allocation.
IANA <bcp14>SHALL</bcp14> update the TLS Exporter Labels Registry as follows:</t>
      <ul spacing="normal">
        <li>Change the registration procedure from Specification Required to
Expert Review and update it to include:</li>
      </ul>
      <artwork><![CDATA[
    Setting a "Recommended" column value to Y or D requires Standards
    Action {{RFC8126}}. Any state transition to or from a "Y" or "D"
    value requires IESG Approval.
]]></artwork>
      <ul spacing="normal">
        <li>Add a reference to this document under the reference heading.</li>
        <li>Entries keep their existing Recommended column "Y" and "N" entries</li>
        <li>Update note on the recommended column with text in <xref target="rec-note"/>.</li>
        <li>update the note on the role of the expert reviewer as follows.</li>
      </ul>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in <xref target="RFC8447"/>.
Even though this registry does not require a specification, the
designated expert <xref target="RFC8126"/> will highly encourage registrants
to provide a link to a publicly available specification. An
Internet-Draft (that is posted and never published as an RFC)
or a document from another standards body, industry consortium,
university site, etc. are suitable for these purposes.
The expert may provide more in-depth reviews, but their approval
should not be taken as an endorsement of the exporter label.  The
expert also verifies that the label is a string consisting of
printable ASCII characters beginning with "EXPORTER".  IANA <bcp14>MUST</bcp14>
also verify that one label is not a prefix of any other label.
For example, labels "key" or "master secretary" are forbidden.</t>
        </dd>
      </dl>
    </section>
    <section anchor="tls-certificate-types">
      <name>TLS Certificate Types</name>
      <t>In order to refect the changes in the Recommended column allocation,
IANA <bcp14>SHALL</bcp14> update the the TLS Certificate Types registry as follows:</t>
      <ul spacing="normal">
        <li>Change the registration procedure to:</li>
      </ul>
      <artwork><![CDATA[
    Values in the range 0-223 (decimal) are assigned via Specification
    Required [RFC8126]. Values in the range 224-255 (decimal) are
    reserved for Private Use [RFC8126]. Setting a "Recommended" column
    value to Y or D requires Standards
    Action {{RFC8126}}. Any state transition to or from a "Y" or "D"
    value requires IESG Approval.
]]></artwork>
      <ul spacing="normal">
        <li>Add a reference to this document under the reference heading.</li>
        <li>Entries keep their existing Recommended column "Y" and "N" entries.</li>
        <li>Update note on the recommended column with text in <xref target="rec-note"/>.</li>
      </ul>
    </section>
    <section anchor="tls-hashalgorithm-registry">
      <name>TLS HashAlgorithm Registry</name>
      <t>Though TLS 1.0 and TLS 1.1 were deprecated <xref target="RFC8996"/>, TLS 1.2 will
be in use for some time. In order to refect the changes in the Recommended
column allocation, IANA <bcp14>SHALL</bcp14> update the TLS HashAlgorithm Registry
registry as follows:</t>
      <ul spacing="normal">
        <li>Update the registration procedure to include:</li>
      </ul>
      <artwork><![CDATA[
    Setting a "Recommended" column value to Y or D requires Standards
    Action {{RFC8126}}. Any state transition to or from a "Y" or "D"
    value requires IESG Approval.
]]></artwork>
      <ul spacing="normal">
        <li>Add a reference to this document under the reference heading.</li>
        <li>Update the TLS HashAlgorithm registry to add a "Recommended" column
as follows:</li>
      </ul>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Descsription</th>
            <th align="right">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0</td>
            <td align="left">none</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">md5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">sha1</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">sha224</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">sha256</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">5</td>
            <td align="left">sha384</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">6</td>
            <td align="left">sha512</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">8</td>
            <td align="left">Intrinsic</td>
            <td align="right">Y</td>
          </tr>
        </tbody>
      </table>
      <ul spacing="normal">
        <li>Add note on the recommended column with text in <xref target="rec-note"/>.</li>
      </ul>
    </section>
    <section anchor="tls-signaturealgorithm-registry">
      <name>TLS SignatureAlgorithm registry</name>
      <t>Though TLS 1.0 and TLS 1.1 were deprecated <xref target="RFC8996"/>, TLS 1.2 will
be in use for some time. In order to refect the changes in the Recommended
column allocation, IANA <bcp14>SHALL</bcp14> update the TLS SignatureAlgorithm registry
registry as follows:</t>
      <ul spacing="normal">
        <li>Update the registration procedure to include:</li>
      </ul>
      <artwork><![CDATA[
    Setting a "Recommended" column value to Y or D requires Standards
    Action {{RFC8126}}. Any state transition to or from a "Y" or "D"
    value requires IESG Approval.
]]></artwork>
      <ul spacing="normal">
        <li>Add a reference to this document under the reference heading.</li>
        <li>Update the TLS SignatureAlgorithm registry to add a "Recommended"
column as follows:</li>
      </ul>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Descsription</th>
            <th align="right">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0</td>
            <td align="left">anonymous</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">rsa</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">dsa</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">ecdsa</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">7</td>
            <td align="left">ed25519</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">8</td>
            <td align="left">ed448</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">64</td>
            <td align="left">gostr34102012_256</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">65</td>
            <td align="left">gostr34102012_512</td>
            <td align="right">N</td>
          </tr>
        </tbody>
      </table>
      <ul spacing="normal">
        <li>Add note on the recommended column with text in <xref target="rec-note"/>.</li>
      </ul>
    </section>
    <section anchor="tls-clientcertificatetypes-registry">
      <name>TLS ClientCertificateTypes registry</name>
      <t>Though TLS 1.0 and TLS 1.1 were deprecated <xref target="RFC8996"/>, TLS 1.2 will
be in use for some time. In order to refect the changes in the Recommended
column allocation, IANA <bcp14>SHALL</bcp14> update the  TLS ClientCertificateTypes
registry as follows:</t>
      <ul spacing="normal">
        <li>Update the registration procedure to include:</li>
      </ul>
      <artwork><![CDATA[
    Setting a "Recommended" column value to Y or D requires Standards
    Action {{RFC8126}}. Any state transition to or from a "Y" or "D"
    value requires IESG Approval.
]]></artwork>
      <ul spacing="normal">
        <li>Add a reference to this document under the reference heading.</li>
        <li>Update the TLS ClientCertificateTypes registry to add a "Recommended"
column as follows:</li>
      </ul>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Descsription</th>
            <th align="right">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">1</td>
            <td align="left">rsa_sign</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">dss_sign</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">rsa_fixed_dh</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">dss_fixed_dh</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">5</td>
            <td align="left">rsa_ephemeral_dh_RESERVED</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">6</td>
            <td align="left">dss_ephemeral_dh_RESERVED</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">20</td>
            <td align="left">fortezza_dms_RESERVED</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">64</td>
            <td align="left">ecdsa_sign</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">65</td>
            <td align="left">rsa_fixed_ecdh</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">66</td>
            <td align="left">ecdsa_fixed_ecdh</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">67</td>
            <td align="left">gost_sign256</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">68</td>
            <td align="left">gost_sign512</td>
            <td align="right">N</td>
          </tr>
        </tbody>
      </table>
      <ul spacing="normal">
        <li>Add note on the recommended column with text in <xref target="rec-note"/>.</li>
      </ul>
    </section>
    <section anchor="tls-pskkeyexchangemode-registry">
      <name>TLS PskKeyExchangeMode registry</name>
      <t>In order to refect the changes in the Recommended column allocation,
IANA <bcp14>SHALL</bcp14> update the TLS PskKeyExchangeMode registry as follows:</t>
      <ul spacing="normal">
        <li>Update the registration procedure to include:</li>
      </ul>
      <artwork><![CDATA[
    Setting a "Recommended" column value to Y or D requires Standards
    Action {{RFC8126}}. Any state transition to or from a "Y" or "D"
    value requires IESG Approval.
]]></artwork>
      <ul spacing="normal">
        <li>Add a reference to this document under the reference heading.</li>
        <li>Entries keep their existing recommended column "Y" and "N" entries.</li>
        <li>Update note on the recommended column with text in <xref target="rec-note"/>.</li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The change to Specification Required from IETF Review lowers the amount
of review provided by the WG for cipher suites and supported groups.
This change reflects reality in that the WG essentially provided no
cryptographic review of the cipher suites or supported groups.  This
was especially true of national cipher suites.</t>
      <t>Recommended algorithms are regarded as secure for general use at the
time of registration; however, cryptographic algorithms and parameters
will be broken or weakened over time.  It is possible that the
"Recommended" status in the registry lags behind the most recent advances
in cryptanalysis.  Implementers and users need to check that the
cryptographic algorithms listed continue to provide the expected level
of security.</t>
      <t>Designated experts ensure the specification is publicly available.  They may
provide more in-depth reviews.  Their review should not be taken as an
endorsement of the cipher suite, extension, supported group, etc.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document is entirely about changes to TLS-related IANA registries.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>Normative References</name>
      <reference anchor="RFC8447">
        <front>
          <title>IANA Registry Updates for TLS and DTLS</title>
          <author fullname="J. Salowey" initials="J." surname="Salowey">
            <organization/>
          </author>
          <author fullname="S. Turner" initials="S." surname="Turner">
            <organization/>
          </author>
          <date month="August" year="2018"/>
          <abstract>
            <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy.  These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
            <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8447"/>
        <seriesInfo name="DOI" value="10.17487/RFC8447"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner">
            <organization/>
          </author>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba">
            <organization/>
          </author>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC8126">
        <front>
          <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
          <author fullname="M. Cotton" initials="M." surname="Cotton">
            <organization/>
          </author>
          <author fullname="B. Leiba" initials="B." surname="Leiba">
            <organization/>
          </author>
          <author fullname="T. Narten" initials="T." surname="Narten">
            <organization/>
          </author>
          <date month="June" year="2017"/>
          <abstract>
            <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters.  To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper.  For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
            <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed.  This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
            <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="26"/>
        <seriesInfo name="RFC" value="8126"/>
        <seriesInfo name="DOI" value="10.17487/RFC8126"/>
      </reference>
      <reference anchor="I-D.ietf-tls-deprecate-obsolete-kex">
        <front>
          <title>Deprecating Obsolete Key Exchange Methods in TLS 1.2</title>
          <author fullname="Carrick Bartle" initials="C." surname="Bartle">
            <organization>Roblox</organization>
          </author>
          <author fullname="Nimrod Aviram" initials="N." surname="Aviram">
         </author>
          <date day="25" month="March" year="2023"/>
          <abstract>
            <t>   This document deprecates the use of RSA key exchange and Diffie
   Hellman over a finite field in TLS 1.2, and discourages the use of
   static elliptic curve Diffie Hellman cipher suites.

   Note that these prescriptions apply only to TLS 1.2 since TLS 1.0 and
   1.1 are deprecated by [RFC8996] and TLS 1.3 either does not use the
   affected algorithm or does not share the relevant configuration
   options.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-deprecate-obsolete-kex-02"/>
      </reference>
      <reference anchor="RFC8996">
        <front>
          <title>Deprecating TLS 1.0 and TLS 1.1</title>
          <author fullname="K. Moriarty" initials="K." surname="Moriarty">
            <organization/>
          </author>
          <author fullname="S. Farrell" initials="S." surname="Farrell">
            <organization/>
          </author>
          <date month="March" year="2021"/>
          <abstract>
            <t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance. </t>
            <t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
            <t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="195"/>
        <seriesInfo name="RFC" value="8996"/>
        <seriesInfo name="DOI" value="10.17487/RFC8996"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+1c63IbtxX+v0+B0j8ad0iapEhd2DQNTTKJGll2RTmpJ5PR
gLsgiWq5uwV2KTOR8yx9lj5ZzznA3sglRTnyj06tGctLEDg41+8cXFaNRsOJ
ZeyLPjsfXA7YlZhLHas1ext5PBaazULFri8mjAceG8GDw6dTJVZ99sXoObZX
jnK80A34Eoh6is/ihhTxrBH7uqFm7mm3ezKVutHqOi70nYdq3Wc69pzEjO2z
o5PuWZ31WicnddY9Pm3Bc6d7DL9PWj34fXpyWmfHvQ60nxy12nWGFB3g6Mhx
ZKT6LFaJjjut1lmr43AleJ/VJsJNlIzXNecuVLdzFSYRtF4rHugoVDG74Guh
WN7rVqyhowdKCWKhAhE3RiiIsxJBIvoOYw+TYCxeR6CB2o8wowzm7Fscgu1L
Ln1oB318jYpphmqOzVy5C2hexHGk+y9eYC9skivRTLu9wIYXUxXeafECxr/A
cXMZL5KpIXg3f5GruOY4Oga73XA/DICTNRhGL7mKb/6VhKTpIHQi2Wc/xaFb
ZxqkUGKm4Wm9xIefHYcn8SJUIHADJmJMBjDob002AYp3Yk1txs5/C0WpFZjl
gfyFxzIM+uwHEfCZpC+Ekf6fofham/5NUG9pgkmTXSegdFWgPxE8KLaW6evg
SHlF8hq6f02tTTdcOk4QqiX0XYHtHBnMCp8ajQbjU3Be7saOc72QmoHzJksR
xMx6JIsXgrkLHszxOSyFg/F/ZfxfgoKX3BMgBrv6ZkiO2WTnMeOepxlngbhj
K+4ngtVGNYosT2o3TBSfC88ByjiREsAxTO8Jj7mhnywDFs7oGy184cbQjPPm
Uzb3sT0LfVAyuh8wpPvOY2ML5SQxjKaW0vN84TjPMDBU6CUuGmCTAbAixKAb
a6MdEGzJb0sqBF0kyynEixUN+zm5SCCdz1FS1PaOCGNfgBqeG0PwmM8VXzq7
+6KtnoNfLYTOGTGKKpkXzQcewn799a+gMJT8wweQ/UuuJdgVgufWC++Cv9Sm
fuje1r4Cn7t8fT0mW6IMfVbWhI6EK2coUUF4Y2WLmPDZsIGAscEI22LkyxfE
yFdW45a8S2FQsnvtKnejWupHQA4RvKBnmN0TMxkIsEi8kMrb8E8ZiyUS5ODD
ShTdtYlOcC3UUgahH87XyJFggJsMgVOz2qu3k+ta3fyPSsLnq/Hf355fjUf4
PPlucHGRPTi2x+S7128vRvlTPnL4+tWr8eXIDIZWVmpyaq8G72rGX2uv31yf
v74cXNRQ4rhkEJQChJ6ibgHZIyXQzThkLKFdJafwAca8HL75z7/bXVD+H0D5
nXb77MMH++G0fdKFD3cLEZjZwsBf24+g+LXDo0hwhVS47zOXRzLmPoAqB3Mt
wHfYQigB2vvTT6iZn/vsy6kbtbtf2QYUuNSY6qzUSDrbbtkabJRY0VQxTabN
UvuGpsv8Dt6VPqd6LzSilww8DwGo7JJDcknjNSlegBPrbZMVovRqCxvrTqjk
XAag6zXCrLFfMWgIbjyv7OB19PA6BLpHwQPcGR+37g/T10a5r9cIOFiE3h6j
v1AvjcUFZhD2DusEoiRssBCmja+/YQswuwtiiUAn+Xcm10Fs4UwF7TYNfJBL
LSGFFahxrUNXIijS4KVAoJCaKMxkTNGK/aJERaEW9PluId0FzMPugAsT5xC3
OHwIrM8SH2CIk20sDKc6N3iSkizOZVKycIXW3KIXWENRnWH4jCIfNDGVPuIu
0QUJMhJm+utUPaBh38tTXt7PSr7gK8F8CWq3cpfI19k0AeEkxFmkwhUidHl6
YAuUDAIZckQhDXQI3rUhzY3jWR3k0oL4uaRoRCgSADWMDkA/EsgmGmK5wS4r
PYAsjB4QhDFAjgiYQM+hzDY1dVLmKEZ/m65DWSAIc0GgVgmT3Id0AuwXdV10
lILW07QkDC+pWNJfW2/iQT572bd8fie8uvFJ6gLs5B4t3kMq0RtWXcr5wtqu
4Psh8wU28cCmFcymBL6A5zWYIFPIFJIc2UMSFXRQ6wOb7qXAABChReugOUa7
zYFqKGQxoxjkBGcx7gi+AWal4gNcKojlbF2OOUvTiKmETnysedAHpz4KJskS
a0o2SAkq6gQCkRvP4exO8FvmqnUUh1C2RBClkCtgIQSFPHkdL5igMJPLgZgt
kyF3hYBHqSLyqQNw8MgP1+gsUHsuI5/8BkKUGeQnAqgv5BrV4ssAzQCAAIkp
AMcoutAd8JQrLw5tCMWU+G3pFIKqTQgRFuSwk6calCrNbql+IQdOREzgm+Iu
aLz2roadsQChTLCjlFHiX4kE1RuHmyD8cCg7nAFlkSxXd46hamJsEFgsgLUh
oCpxi5PBRDMVLmH+wrSGlXQC53w8+ZYNIgQY7jfZJYQPJnbjwhZUkdWMB6xY
3VuqtyHQjB9NsXqPnZJ8TWKL9IoxGYKs6k4CdKdFo4fOCsNILZc2CaWlnHam
Pg9uCaRNOsrLtCQAC8o5MgbfghBCreA5CXyI+rxoxJQJ5LGSe1ZKrSCjYL8+
A1huAGfig+OMMczRUoXakeKbI+8C0dAgBzhtnk62lzJN9o1JKsUiFOMx0dqo
kRY6yVSD+qmAFrYsoJqA5pJp4e455J0cOoGDg+em2G7yuWB/HP0RdJMgJtqF
EKyAHJQO/gOImO0ok4tar6MjVwEnCeuQzqFHhpR/ZoqjJWmc3AFCQmKXNDU4
lBrihQqT+SLH/xw6wfdw2joNqERCwGflSE3AQOomuEbfSK2NIQcIomG9yFDy
XZHlFKSHYNiBm5SuHgzvZ7RSHb8HnjQY8XodCfaDKZ2cc1jWKkQLmAihx41L
yx/rCdsFHwZfaBY8dYeWl6byLVSJuybNF10lf2iwIU1aXJeZAoj07iW0ZICO
v/32G8GfpZZB40xC/QMJPRYp24rotRqdXpd94YEBltx/TqGZBiYRWknOJqUl
3JVBHY/9ZOHr5+a++YhKp9fbmCSLeHSAN0quUDNvwf5Fqhn2EpHKQMhA+R0a
eJSDbo51VXhLBH8P5OL4MuyS7sFSAyrks1RlVtOlxQJlIGPJtNPCFLm4hWE3
KHfnlUzJqSNSxGmq2AQ4DChuHJidHgarXRFhZ6lMHUSrHJCKFqFQ0gjTE750
RZSX6GmzDArbM1DG+QJVN9gnnvF1LF5pqWM2E3RGEkS8J29h93kEsAd+7ktR
du/c9xv4Y/974Oe++KEPg7tAEBZzAcKed7NYcrdqxvRnhPP1jtg9gF1goP5G
eujOsDInEs8rh3Rb7P4q9fKdcpWHHD92SO4uxRxXsT9nnEa8j83aM8ubuHOU
ouBQRgj5EyjYwfTphvn+nSVMVNB1JcUdUvapCoTcCtF23hg1s131TFuNcKpD
H6qzxq14X94v+v/EW1Nwp8XQx+Et0SjM+VF4S0Tycvcj4dYga1WJ+xi4Nbmn
BLmf4fZj4ZaleFsMcHbJl2I34rIC6JYw90DQrURfBF/Wet9q1eFX204CoXlz
NRnc/Hh+/d3N5duLi5tXo94W5I0YKw7u7BwM+nhg7NHG2PE/3ry+ujYkrobd
m25rk4MKIt0qBnB0u3N6wPDevuEPi3C8V4TOzfDl8DAxTqr4OB+NB0TiYUZO
9zAyGk+Ah8PonFXxAQQOHP7SDh3BoMnko7kYFriwpB7JyGgHhSMkMR6NDyQz
LpP5PZr9pkymSp77zUHtdmn+8e9RartTQetxWm0f7SLxOLW2uxt0fode270K
WnvEqqBwUqJwwwMoLB/CogoypxVkHodG7bMHOHmMXga72DlYLy93Udhj7U8s
VDEev7962XukA3daleMPxvtOu3L84Tjd6VQSSAV40EM6R5XjSwYpE6mg0a2k
cbCXdnqV4zMlPDj/8eb4DW9IsyZp896syLLBJ/sGF1IuDt4ce7p/bDeb1PYr
jz47kG0r/+bwwYGM7xj+8gDecejGuNPitG8m3287/OaAcsobHzTobLMMfGDQ
cKt2HA8BGuBXVQm2Oe5kY9z40IHDzQkrK76NUaUcbKY7aNjx5mTbCaFi2NHR
1mx7dPlE2w5m12GSRHgdBsbQ7bNPv++6OeHOPYDCyrC8BxD60qWDZRm4fuKJ
wkbA/9/62S5+K5e+FTaqWA03P+kOE15b9DUti3FzG/7pEFa+eMAJcgnfl1Es
XeYmaiXyqx24wi/uTT2Fw6dnDeR9il3wqfCL+2y7r8jt2IJKtw+KZJ3cm0HL
RSJ7A6a5d+OsmuPH75mRn+7Y3qKDW5hKqDg1dy4BnlR9jrcniren8eZG0U1K
dCD40uNVYeypyJ4gVu4xzfSUs09nxsVBnsDNUDrbt+NRP8XLb9ZQ9sbheEVn
k/ZoUhYAPTsUtUbBg9ii99F9OGd7vqIjmMs7C4Adfw0atMeLmYfjZRuwYXa5
h+4qmPujUTKFRIGXvlZ4UXrqi/Ls6GJO+fY2+8Kc1mpIMrTFiKYLxApUR9T0
wtxG4XR797lDNzEy1zFuGdAxPdPZAdg09NZ1POhNSCl4aAvxLJNl3UkCCbQ1
XUSSsagzEbtNA5J0bcfPQEZn97bAdNe5aZd8nQm/DBXudyMUg98Yo2tzA8o4
KrfR4OgFXWMxl45YDFAcWLHA/0KlzUWi3IkM/viIP026xePY6QnaQQRzgzU7
wqaeqEYwOPg83ZuBEDZREs6cCNqMeIPJ8Pwcawu8XY1XUKZg2ICuCJD310zB
O76q4aE0YiSeIjv5vPbKURgUZkW5wP4QwPI9SoH3uIxVjAgOXjEQ7zlefamb
Ns1qt2Jt8GTJNYqrhatEzBW0coP2U+l5IshrpyGowLgTIPU6+sSH1mk+2Jr1
iU9RNk9MYPVZfUK9fVpCZKpOTKpIdzrdxtZJCVE45HR6f+YpJITP2Wej2nvK
1cN3XC8G2cW0Yi1F6QC7tJst4sE8t6Hyw2vi2eltqvezM9B73fbqEOo7dAeb
rqXQPRWsG2O5FE326ChztqOM7a64dkj16IVKIcw+105lRW2rufi+g7mNvSOw
S9rPT9dGUKFohasJkLX6xgKssPs7T8fs8RgMDTCZ3IPesaENT0uvl2/NdOBJ
L3g7azgyDQBnWVPXNvWOMzo903R02s2ajk1Tr93Jmk7hCd+bkWA017ZazT/B
Up/KLPDHbaX/r0fsPtE+h+3Thu0eXe+IXYdlVU4pdh8Rupvn3tWRi5tt62WY
6Ht2mUWv0jyLL4w0jz5fZrErXK/Q4wRbPKhL2melqBRet3uahy5G8RzWCOqo
2251Wu3OjQl2Q/a4t/W1ifLLJ4lnW336EqxXqAbLxeD/ckjvke9zOD9xOD/g
RrtCujKgH5OMDwhpG703uNzYCGGdNuZxjD1hwSe8G2+RfdG1vbe+6NkRIlrA
aldxH768uRpPxlc/jEdZIj+2w/f36iD2zHCR/Msv/MZb6gpC3RRpytIc90qc
Q4+cxePjbEzVtycWY4hgCX1Oi988PfC80bffi/X4vYn0V6EnCqDziU8P9sz9
GRA+waKywkE+3aLyWf469hD3i4Bt8+adeQnUtdsZ4a49bFIivRlhd7Dxrwco
s/3OoSwIYiec2Y2xdNcM37OjDj9+SwnONZf0tLmFi3Lq7MCK/qQD7b/J9HVt
VCm+c4+AyelFK1l4Tw5oCo3vnkh6lSabMgid8stdlie741bmAbPuJguM3kpz
8K1NQZuaRD9WCe3iBqQX7pcJgYKLYZe9T6btDdU5OK/Z3tRoBZPv5yJA2KP8
b99MxezPSI95UP2ZLUDVK3ypZcdba0aXEVd8ie+GAe+4rwvFxVSFuP2IL6Pi
mRC9koQbrqbIwL+NYLZjtcT9wuz92HJwYlQl+f5Sigg+n+OO4kLaV0+XAIro
lPSapLfi+C4bvstPPHPQ2FpLevul+FIcHYNofErf1XIXwr3NWdkpsb2n6obg
AIFBjXSvNt2dp7/W4IPmfHRNbd0fTDXa3BUHSweaUGuxsZFNCtra7DYbtWvc
IXb27hCbjlKlTrhzc9ip2BwuelgdOLV3vOubLmu2tmkpSuC+Hd+lPw+BwsYQ
0ygQvc5a/uMajfSvP2z8bQ2cANf5U+7eOv8FeYy8V7lGAAA=

-->

</rfc>
