<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 3.4.1) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-ietf-tls-rfc8447bis-11" category="std" consensus="true" submissionType="IETF" updates="3749, 5077, 4680, 5246, 5705, 5878, 6520, 7301, 8447" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title abbrev="(D)TLS IANA Registry Updates">IANA Registry Updates for TLS and DTLS</title>

    <author initials="J." surname="Salowey" fullname="Joe Salowey">
      <organization>Venafi</organization>
      <address>
        <email>joe@salowey.net</email>
      </address>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>

    <date year="2025" month="March" day="11"/>

    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>Internet-Draft</keyword>

    <abstract>


<?line 41?>

<t>This document updates the changes to TLS and DTLS IANA registries
made in RFC 8447. It adds a new value "D" for discouraged
to the Recommended column of the selected TLS registries and
adds a "Comments" column to all active registries.</t>

<t>This document updates the following RFCs:
3749, 5077, 4680, 5246, 5705, 5878, 6520, 7301, and 8447.</t>



    </abstract>

    <note title="About This Document" removeInRFC="true">
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-rfc8447bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/rfc8447bis"/>.</t>
    </note>


  </front>

  <middle>


<?line 51?>

<section anchor="introduction"><name>Introduction</name>

<t>This document instructs IANA to make changes to a number of the IANA
registries related to Transport Layer Security (TLS) and Datagram
Transport Layer Security (DTLS). These changes update the changes made
in <xref target="RFC8447"/>.</t>

<aside>  <t>NOTE for IANA: This document specifies changes to the registry to update
  the changes made in <xref target="RFC8447"/>.</t>
</aside>

<t>This specification updates the "Recommended" column in TLS
registries to define a third value "D" for items that are discouraged.</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>

<?line -18?>

</section>
<section anchor="adding-recommended-column"><name>Adding "Recommended" Column</name>

<t>The instructions in this document update the Recommended column,
originally added in <xref target="RFC8447"/> to add a third value, "D",
indicating that a value is "Discouraged". The permitted values
are:</t>

<dl>
  <dt>Y:</dt>
  <dd>
    <t>Indicates that the IETF has consensus that the
  item is <bcp14>RECOMMENDED</bcp14>. This only means that the associated
  mechanism is fit for the purpose for which it was defined.
  Careful reading of the documentation for the mechanism is
  necessary to understand the applicability of that mechanism.
  The IETF could recommend mechanisms that have limited
  applicability, but will provide applicability statements that
  describe any limitations of the mechanism or necessary constraints
  on its use.</t>
  </dd>
  <dt>N:</dt>
  <dd>
    <t>Indicates that the item has not been evaluated by
  the IETF and that the IETF has made no statement about the
  suitability of the associated mechanism. This does not necessarily
  mean that the mechanism is flawed, only that no consensus exists.
  The IETF might have consensus to leave an items marked as "N" on
  the basis of it having limited applicability or usage constraints.</t>
  </dd>
  <dt>D:</dt>
  <dd>
    <t>Indicates that the item is discouraged. This marking could be used to identify
  mechanisms that might result in problems if they are used, such as
  a weak cryptographic algorithm or a mechanism that might cause
  interoperability problems in deployment. Implementers <bcp14>SHOULD</bcp14>
  consult the linked references associated with the item to
  determine the conditions under which it <bcp14>SHOULD NOT</bcp14> or <bcp14>MUST NOT</bcp14> be used.</t>
  </dd>
</dl>

<t>Setting a value to "Y" or "D" or transitioning the value from "Y" or "D" in the "Recommended" column requires
IETF Standards Action <xref target="RFC8126"/> or IESG Approval. Not all items defined
in Standards Track RFCs need to be set
to "Y" or "D". Any item not otherwise specified is set to "N". The column is
blank for values that are unassigned or reserved unless specifically set.</t>

<section anchor="rec-note"><name>Recommended Note</name>

<t>Existing registries have a note on the meaning of the Recommended column. For the
registries discussed in the subsequent sections this note is updated
with a sentence describing the "D" value as follows:</t>

<dl>
  <dt>Note:</dt>
  <dd>
    <t>If "Recommended" column is set to "N", it does not necessarily mean
that it is flawed; rather, it indicates that the item either has not
been through the IETF consensus process, has limited applicability, or
is intended only for specific use cases.  If the "Recommended" column
is set to "D" the item is discouraged and <bcp14>SHOULD NOT</bcp14> or <bcp14>MUST NOT</bcp14> be used.</t>
  </dd>
</dl>

</section>
</section>
<section anchor="tls-extensiontype-values"><name>TLS ExtensionType Values</name>

<t>In order to reflect the changes in the Recommended column allocation,
IANA <bcp14>SHALL</bcp14> update the TLS ExtensionType Values registry as follows:</t>

<t><list style="symbols">
  <t>Adjust the registration procedure related to setting the “Recommended” column as follows:</t>
</list></t>

<figure><artwork><![CDATA[
    Setting a value to "Y" or "D" or transitioning the value from
    "Y" or "D" in the "Recommended" column requires
    IETF Standards Action [RFC8126] or IESG Approval.
]]></artwork></figure>

<t><list style="symbols">
  <t>Add a reference to this document under the reference heading.</t>
  <t>Update the "Recommended" column with the changes as listed below.  Entries
keep their existing "Y" and "N" entries except for the entries in following table.
A reference to this document <bcp14>SHALL</bcp14> be added to these entries.</t>
</list></t>

<texttable>
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Extension</ttcol>
      <ttcol align='right'>Recommended</ttcol>
      <c>4</c>
      <c>truncated_hmac</c>
      <c>D</c>
      <c>53</c>
      <c>connection_id (deprecated)</c>
      <c>D</c>
      <c>40</c>
      <c>Reserved</c>
      <c>D</c>
      <c>46</c>
      <c>Reserved</c>
      <c>D</c>
</texttable>

<t><list style="symbols">
  <t>Update note on the Recommended column with text in <xref target="rec-note"/>.</t>
</list></t>

</section>
<section anchor="tls-cipher-suites-registry"><name>TLS Cipher Suites Registry</name>

<t>Several categories of ciphersuites are discouraged for general use and
are marked as "D".</t>

<t>Ciphersuites that use NULL encryption do not provide the confidentiality
normally expected of TLS. Protocols and applications are often designed
to require confidentiality as a security property. These
ciphersuites <bcp14>MUST NOT</bcp14> be used in those cases.</t>

<t>Ciphersuites marked as EXPORT use weak ciphers and were deprecated in
TLS 1.1 <xref target="RFC4346"/>.</t>

<t>Cipher suites marked as anon do not provide any authentication and are
vulnerable to man-in-the-middle attacks and are deprecated in TLS 1.1
<xref target="RFC4346"/>.</t>

<t>RC4 is a weak cipher and is deprecated in <xref target="RFC7465"/>.</t>

<t>DES and IDEA are not considered secure for general use and are deprecated
in <xref target="RFC5469"/>.</t>

<t>In order to reflect the changes in the Recommended column allocation,
IANA <bcp14>SHALL</bcp14> update the TLS ExtensionType Values registry as follows:</t>

<t><list style="symbols">
  <t>Adjust the registration procedure related to setting the “Recommended” column as follows:</t>
</list></t>

<figure><artwork><![CDATA[
    Setting a value to "Y" or "D" or transitioning the value from
    "Y" or "D" in the "Recommended" column requires
    IETF Standards Action [RFC8126] or IESG Approval.
]]></artwork></figure>

<t><list style="symbols">
  <t>Add a reference to this document under the reference heading.</t>
  <t>Update the "Recommended" column with the changes as listed below.  Entries
keep their existing "Y" and "N" entries except for the entries in following table.
A reference to this document <bcp14>SHALL</bcp14> be added to these entries. This document does not
make any changes to the DTLS-OK column.</t>
</list></t>

<texttable>
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Cipher Suite Name</ttcol>
      <ttcol align='right'>Recommended</ttcol>
      <c>0x00,0x01</c>
      <c>TLS_RSA_WITH_NULL_MD5</c>
      <c>D</c>
      <c>0x00,0x02</c>
      <c>TLS_RSA_WITH_NULL_SHA</c>
      <c>D</c>
      <c>0x00,0x03</c>
      <c>TLS_RSA_EXPORT_WITH_RC4_40_MD5</c>
      <c>D</c>
      <c>0x00,0x04</c>
      <c>TLS_RSA_WITH_RC4_128_MD5</c>
      <c>D</c>
      <c>0x00,0x05</c>
      <c>TLS_RSA_WITH_RC4_128_SHA</c>
      <c>D</c>
      <c>0x00,0x06</c>
      <c>TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5</c>
      <c>D</c>
      <c>0x00,0x07</c>
      <c>TLS_RSA_WITH_IDEA_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0x08</c>
      <c>TLS_RSA_EXPORT_WITH_DES40_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0x09</c>
      <c>TLS_RSA_WITH_DES_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0x0B</c>
      <c>TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0x0C</c>
      <c>TLS_DH_DSS_WITH_DES_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0x0E</c>
      <c>TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0x0F</c>
      <c>TLS_DH_RSA_WITH_DES_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0x11</c>
      <c>TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0x12</c>
      <c>TLS_DHE_DSS_WITH_DES_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0x14</c>
      <c>TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0x15</c>
      <c>TLS_DHE_RSA_WITH_DES_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0x17</c>
      <c>TLS_DH_anon_EXPORT_WITH_RC4_40_MD5</c>
      <c>D</c>
      <c>0x00,0x18</c>
      <c>TLS_DH_anon_WITH_RC4_128_MD5</c>
      <c>D</c>
      <c>0x00,0x19</c>
      <c>TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0x1A</c>
      <c>TLS_DH_anon_WITH_DES_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0x1B</c>
      <c>TLS_DH_anon_WITH_3DES_EDE_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0x1E</c>
      <c>TLS_KRB5_WITH_DES_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0x20</c>
      <c>TLS_KRB5_WITH_RC4_128_SHA</c>
      <c>D</c>
      <c>0x00,0x21</c>
      <c>TLS_KRB5_WITH_IDEA_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0x22</c>
      <c>TLS_KRB5_WITH_DES_CBC_MD5</c>
      <c>D</c>
      <c>0x00,0x24</c>
      <c>TLS_KRB5_WITH_RC4_128_MD5</c>
      <c>D</c>
      <c>0x00,0x25</c>
      <c>TLS_KRB5_WITH_IDEA_CBC_MD5</c>
      <c>D</c>
      <c>0x00,0x26</c>
      <c>TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA</c>
      <c>D</c>
      <c>0x00,0x27</c>
      <c>TLS_KRB5_EXPORT_WITH_RC2_CBC_40_SHA</c>
      <c>D</c>
      <c>0x00,0x28</c>
      <c>TLS_KRB5_EXPORT_WITH_RC4_40_SHA</c>
      <c>D</c>
      <c>0x00,0x29</c>
      <c>TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5</c>
      <c>D</c>
      <c>0x00,0x2A</c>
      <c>TLS_KRB5_EXPORT_WITH_RC2_CBC_40_MD5</c>
      <c>D</c>
      <c>0x00,0x2B</c>
      <c>TLS_KRB5_EXPORT_WITH_RC4_40_MD5</c>
      <c>D</c>
      <c>0x00,0x2C</c>
      <c>TLS_PSK_WITH_NULL_SHA</c>
      <c>D</c>
      <c>0x00,0x2D</c>
      <c>TLS_DHE_PSK_WITH_NULL_SHA</c>
      <c>D</c>
      <c>0x00,0x2E</c>
      <c>TLS_RSA_PSK_WITH_NULL_SHA</c>
      <c>D</c>
      <c>0x00,0x34</c>
      <c>TLS_DH_anon_WITH_AES_128_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0x3A</c>
      <c>TLS_DH_anon_WITH_AES_256_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0x3B</c>
      <c>TLS_RSA_WITH_NULL_SHA256</c>
      <c>D</c>
      <c>0x00,0x46</c>
      <c>TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0x6C</c>
      <c>TLS_DH_anon_WITH_AES_128_CBC_SHA256</c>
      <c>D</c>
      <c>0x00,0x6D</c>
      <c>TLS_DH_anon_WITH_AES_256_CBC_SHA256</c>
      <c>D</c>
      <c>0x00,0x89</c>
      <c>TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0x8A</c>
      <c>TLS_PSK_WITH_RC4_128_SHA</c>
      <c>D</c>
      <c>0x00,0x8E</c>
      <c>TLS_DHE_PSK_WITH_RC4_128_SHA</c>
      <c>D</c>
      <c>0x00,0x92</c>
      <c>TLS_RSA_PSK_WITH_RC4_128_SHA</c>
      <c>D</c>
      <c>0x00,0x9B</c>
      <c>TLS_DH_anon_WITH_SEED_CBC_SHA</c>
      <c>D</c>
      <c>0x00,0xA6</c>
      <c>TLS_DH_anon_WITH_AES_128_GCM_SHA256</c>
      <c>D</c>
      <c>0x00,0xA7</c>
      <c>TLS_DH_anon_WITH_AES_256_GCM_SHA384</c>
      <c>D</c>
      <c>0x00,0xB0</c>
      <c>TLS_PSK_WITH_NULL_SHA256</c>
      <c>D</c>
      <c>0x00,0xB1</c>
      <c>TLS_PSK_WITH_NULL_SHA384</c>
      <c>D</c>
      <c>0x00,0xB4</c>
      <c>TLS_DHE_PSK_WITH_NULL_SHA256</c>
      <c>D</c>
      <c>0x00,0xB5</c>
      <c>TLS_DHE_PSK_WITH_NULL_SHA384</c>
      <c>D</c>
      <c>0x00,0xB8</c>
      <c>TLS_RSA_PSK_WITH_NULL_SHA256</c>
      <c>D</c>
      <c>0x00,0xB9</c>
      <c>TLS_RSA_PSK_WITH_NULL_SHA384</c>
      <c>D</c>
      <c>0x00,0xBF</c>
      <c>TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256</c>
      <c>D</c>
      <c>0x00,0xC5</c>
      <c>TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256</c>
      <c>D</c>
      <c>0xC0,0x01</c>
      <c>TLS_ECDH_ECDSA_WITH_NULL_SHA</c>
      <c>D</c>
      <c>0xC0,0x02</c>
      <c>TLS_ECDH_ECDSA_WITH_RC4_128_SHA</c>
      <c>D</c>
      <c>0xC0,0x06</c>
      <c>TLS_ECDHE_ECDSA_WITH_NULL_SHA</c>
      <c>D</c>
      <c>0xC0,0x07</c>
      <c>TLS_ECDHE_ECDSA_WITH_RC4_128_SHA</c>
      <c>D</c>
      <c>0xC0,0x0B</c>
      <c>TLS_ECDH_RSA_WITH_NULL_SHA</c>
      <c>D</c>
      <c>0xC0,0x0C</c>
      <c>TLS_ECDH_RSA_WITH_RC4_128_SHA</c>
      <c>D</c>
      <c>0xC0,0x10</c>
      <c>TLS_ECDHE_RSA_WITH_NULL_SHA</c>
      <c>D</c>
      <c>0xC0,0x11</c>
      <c>TLS_ECDHE_RSA_WITH_RC4_128_SHA</c>
      <c>D</c>
      <c>0xC0,0x15</c>
      <c>TLS_ECDH_anon_WITH_NULL_SHA</c>
      <c>D</c>
      <c>0xC0,0x16</c>
      <c>TLS_ECDH_anon_WITH_RC4_128_SHA</c>
      <c>D</c>
      <c>0xC0,0x17</c>
      <c>TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA</c>
      <c>D</c>
      <c>0xC0,0x18</c>
      <c>TLS_ECDH_anon_WITH_AES_128_CBC_SHA</c>
      <c>D</c>
      <c>0xC0,0x19</c>
      <c>TLS_ECDH_anon_WITH_AES_256_CBC_SHA</c>
      <c>D</c>
      <c>0xC0,0x33</c>
      <c>TLS_ECDHE_PSK_WITH_RC4_128_SHA</c>
      <c>D</c>
      <c>0xC0,0x39</c>
      <c>TLS_ECDHE_PSK_WITH_NULL_SHA</c>
      <c>D</c>
      <c>0xC0,0x3A</c>
      <c>TLS_ECDHE_PSK_WITH_NULL_SHA256</c>
      <c>D</c>
      <c>0xC0,0x3B</c>
      <c>TLS_ECDHE_PSK_WITH_NULL_SHA384</c>
      <c>D</c>
      <c>0xC0,0x46</c>
      <c>TLS_DH_anon_WITH_ARIA_128_CBC_SHA256</c>
      <c>D</c>
      <c>0xC0,0x47</c>
      <c>TLS_DH_anon_WITH_ARIA_256_CBC_SHA384</c>
      <c>D</c>
      <c>0xC0,0x5A</c>
      <c>TLS_DH_anon_WITH_ARIA_128_GCM_SHA256</c>
      <c>D</c>
      <c>0xC0,0x5B</c>
      <c>TLS_DH_anon_WITH_ARIA_256_GCM_SHA384</c>
      <c>D</c>
      <c>0xC0,0x84</c>
      <c>TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256</c>
      <c>D</c>
      <c>0xC0,0x85</c>
      <c>TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384</c>
      <c>D</c>
      <c>0xC0,0xB4</c>
      <c>TLS_SHA256_SHA256</c>
      <c>D</c>
      <c>0xC0,0xB5</c>
      <c>TLS_SHA384_SHA384</c>
      <c>D</c>
</texttable>

<t><list style="symbols">
  <t>Update note on the Recommended column with text in <xref target="rec-note"/>.</t>
</list></t>

</section>
<section anchor="tls-supported-groups"><name>TLS Supported Groups</name>

<t>In order to reflect the changes in the Recommended column allocation,
IANA <bcp14>SHALL</bcp14> update the TLS Supported Groups registry as follows:</t>

<t><list style="symbols">
  <t>Update the registration policy to include:</t>
</list></t>

<figure><artwork><![CDATA[
    Setting a value to "Y" or "D" or transitioning the value from
    "Y" or "D" in the "Recommended" column requires
    IETF Standards Action [RFC8126] or IESG Approval
]]></artwork></figure>

<t><list style="symbols">
  <t>Add a reference to this document under the reference heading.</t>
  <t>Update the "Recommended" column with the changes as listed below.  Entries
keep their existing "Y" and "N" entries except for the entries in following table.
A reference to this document <bcp14>SHALL</bcp14> be added to these entries.</t>
</list></t>

<texttable>
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Curve</ttcol>
      <ttcol align='right'>Recommended</ttcol>
      <c>1</c>
      <c>sect163k1</c>
      <c>D</c>
      <c>2</c>
      <c>sect163r1</c>
      <c>D</c>
      <c>3</c>
      <c>sect163r2</c>
      <c>D</c>
      <c>4</c>
      <c>sect193r1</c>
      <c>D</c>
      <c>5</c>
      <c>sect193r2</c>
      <c>D</c>
      <c>6</c>
      <c>sect233k1</c>
      <c>D</c>
      <c>7</c>
      <c>sect233r1</c>
      <c>D</c>
      <c>8</c>
      <c>sect239k1</c>
      <c>D</c>
      <c>15</c>
      <c>secp160k1</c>
      <c>D</c>
      <c>16</c>
      <c>secp160r1</c>
      <c>D</c>
      <c>17</c>
      <c>secp160r2</c>
      <c>D</c>
      <c>18</c>
      <c>secp192k1</c>
      <c>D</c>
      <c>19</c>
      <c>secp192r1</c>
      <c>D</c>
      <c>20</c>
      <c>secp224k1</c>
      <c>D</c>
      <c>21</c>
      <c>secp224r1</c>
      <c>D</c>
</texttable>

<t><list style="symbols">
  <t>Update note on the Recommended column with text in <xref target="rec-note"/>.</t>
  <t>Remove the "Elliptic curve groups" note from the registration
procedures table.</t>
</list></t>

</section>
<section anchor="tls-exporter-labels-registry"><name>TLS Exporter Labels Registry</name>

<t>This document updates the registration procedure for the TLS Exporter
registry and updates the Recommended column allocation.
IANA <bcp14>SHALL</bcp14> update the TLS Exporter Labels Registry as follows:</t>

<t><list style="symbols">
  <t>Change the registration procedure from Specification Required to
Expert Review and update it to include:</t>
</list></t>

<figure><artwork><![CDATA[
    Setting a value to "Y" or "D" or transitioning the value from
    "Y" or "D" in the "Recommended" column requires
    IETF Standards Action [RFC8126] or IESG Approval.
]]></artwork></figure>

<t><list style="symbols">
  <t>Add a reference to this document under the reference heading.</t>
  <t>Entries keep their existing Recommended column "Y" and "N" entries</t>
  <t>Update note on the Recommended column with text in <xref target="rec-note"/>.</t>
  <t>update the note on the role of the expert reviewer as follows.</t>
</list></t>

<dl>
  <dt>Note:</dt>
  <dd>
    <t>The role of the designated expert is described in <xref section="17" sectionFormat="comma" target="RFC8447"/>.
Even though this registry does not require a specification, the
designated expert <xref target="RFC8126"/> will strongly encourage registrants
to provide a link to a publicly available specification. An
Internet-Draft (that is posted and never published as an RFC)
or a document from another standards body, industry consortium,
university site, etc. are suitable for these purposes.
The expert may provide more in-depth reviews, but their approval
should not be taken as an endorsement of the exporter label.  The
expert also verifies that the label is a string consisting of
printable ASCII characters beginning with "EXPORTER".  IANA <bcp14>MUST</bcp14>
also verify that one label is not a prefix of any other label.
For example, labels "key" or "master secretary" are forbidden.</t>
  </dd>
</dl>

</section>
<section anchor="tls-certificate-types"><name>TLS Certificate Types</name>

<t>In order to reflect the changes in the Recommended column allocation,
IANA <bcp14>SHALL</bcp14> update the the TLS Certificate Types registry as follows:</t>

<t><list style="symbols">
  <t>Adjust the registration procedure related to setting the “Recommended” column as follows:</t>
</list></t>

<figure><artwork><![CDATA[
    Setting a value to "Y" or "D" or transitioning the value from
    "Y" or "D" in the "Recommended" column requires
    IETF Standards Action [RFC8126] or IESG Approval.
]]></artwork></figure>

<t><list style="symbols">
  <t>Add a reference to this document under the reference heading.</t>
  <t>Entries keep their existing Recommended column "Y" and "N" entries.</t>
  <t>Update note on the Recommended column with text in <xref target="rec-note"/>.</t>
</list></t>

</section>
<section anchor="tls-hashalgorithm-registry"><name>TLS HashAlgorithm Registry</name>

<t>Though TLS 1.0 and TLS 1.1 were deprecated <xref target="RFC8996"/>, TLS 1.2 will
be in use for some time. In order to reflect the changes in the Recommended
column allocation, IANA <bcp14>SHALL</bcp14> update the TLS HashAlgorithm Registry
registry as follows:</t>

<t><list style="symbols">
  <t>Update the registration procedure to include:</t>
</list></t>

<figure><artwork><![CDATA[
    Setting a value to "Y" or "D" or transitioning the value from
    "Y" or "D"  in the "Recommended" column requires
    IETF Standards Action [RFC8126] or IESG Approval.
]]></artwork></figure>

<t><list style="symbols">
  <t>Add a reference to this document under the reference heading.</t>
  <t>Update the TLS HashAlgorithm registry to add a "Recommended" column
as follows:</t>
</list></t>

<texttable>
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='right'>Recommended</ttcol>
      <c>0</c>
      <c>none</c>
      <c>Y</c>
      <c>1</c>
      <c>md5</c>
      <c>D</c>
      <c>2</c>
      <c>sha1</c>
      <c>D</c>
      <c>3</c>
      <c>sha224</c>
      <c>D</c>
      <c>4</c>
      <c>sha256</c>
      <c>Y</c>
      <c>5</c>
      <c>sha384</c>
      <c>Y</c>
      <c>6</c>
      <c>sha512</c>
      <c>Y</c>
      <c>8</c>
      <c>Intrinsic</c>
      <c>Y</c>
</texttable>

<t><list style="symbols">
  <t>Add note on the Recommended column with text in <xref target="rec-note"/>.</t>
</list></t>

</section>
<section anchor="tls-signaturealgorithm-registry"><name>TLS SignatureAlgorithm registry</name>

<t>Though TLS 1.0 and TLS 1.1 were deprecated <xref target="RFC8996"/>, TLS 1.2 will
be in use for some time. In order to reflect the changes in the Recommended
column allocation, IANA <bcp14>SHALL</bcp14> update the TLS SignatureAlgorithm registry
registry as follows:</t>

<t><list style="symbols">
  <t>Update the registration procedure to include:</t>
</list></t>

<figure><artwork><![CDATA[
    Setting a value to "Y" or "D" or transitioning the value from
    "Y" or "D"  in the "Recommended" column requires
    IETF Standards Action [RFC8126] or IESG Approval.
]]></artwork></figure>

<t><list style="symbols">
  <t>Add a reference to this document under the reference heading.</t>
  <t>Update the TLS SignatureAlgorithm registry to add a "Recommended"
column as follows:</t>
</list></t>

<texttable>
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='right'>Recommended</ttcol>
      <c>0</c>
      <c>anonymous</c>
      <c>N</c>
      <c>1</c>
      <c>rsa</c>
      <c>Y</c>
      <c>2</c>
      <c>dsa</c>
      <c>N</c>
      <c>3</c>
      <c>ecdsa</c>
      <c>Y</c>
      <c>7</c>
      <c>ed25519</c>
      <c>Y</c>
      <c>8</c>
      <c>ed448</c>
      <c>Y</c>
      <c>64</c>
      <c>gostr34102012_256</c>
      <c>N</c>
      <c>65</c>
      <c>gostr34102012_512</c>
      <c>N</c>
</texttable>

<t><list style="symbols">
  <t>Add note on the Recommended column with text in <xref target="rec-note"/>.</t>
</list></t>

</section>
<section anchor="tls-clientcertificatetype-identifiers-registry"><name>TLS ClientCertificateType Identifiers registry</name>

<t>Though TLS 1.0 and TLS 1.1 were deprecated <xref target="RFC8996"/>, TLS 1.2 will
be in use for some time. In order to refect the changes in the Recommended
column allocation, IANA <bcp14>SHALL</bcp14> update the  TLS ClientCertificateType Identifier
registry as follows:</t>

<t><list style="symbols">
  <t>Update the registration procedure to include:</t>
</list></t>

<figure><artwork><![CDATA[
    Setting a value to "Y" or "D" or transitioning the value from
    "Y" or "D"  in the "Recommended" column requires
    IETF Standards Action [RFC8126] or IESG Approval.
]]></artwork></figure>

<t><list style="symbols">
  <t>Add a reference to this document under the reference heading.</t>
  <t>Update the TLS ClientCertificateType Identifier registry to add a "Recommended"
column as follows:</t>
</list></t>

<texttable>
      <ttcol align='left'>Value</ttcol>
      <ttcol align='left'>Description</ttcol>
      <ttcol align='right'>Recommended</ttcol>
      <c>1</c>
      <c>rsa_sign</c>
      <c>Y</c>
      <c>2</c>
      <c>dss_sign</c>
      <c>N</c>
      <c>3</c>
      <c>rsa_fixed_dh</c>
      <c>N</c>
      <c>4</c>
      <c>dss_fixed_dh</c>
      <c>N</c>
      <c>5</c>
      <c>rsa_ephemeral_dh_RESERVED</c>
      <c>D</c>
      <c>6</c>
      <c>dss_ephemeral_dh_RESERVED</c>
      <c>D</c>
      <c>20</c>
      <c>fortezza_dms_RESERVED</c>
      <c>D</c>
      <c>64</c>
      <c>ecdsa_sign</c>
      <c>Y</c>
      <c>65</c>
      <c>rsa_fixed_ecdh</c>
      <c>N</c>
      <c>66</c>
      <c>ecdsa_fixed_ecdh</c>
      <c>N</c>
      <c>67</c>
      <c>gost_sign256</c>
      <c>N</c>
      <c>68</c>
      <c>gost_sign512</c>
      <c>N</c>
</texttable>

<t><list style="symbols">
  <t>Add note on the Recommended column with text in <xref target="rec-note"/>.</t>
</list></t>

</section>
<section anchor="tls-pskkeyexchangemode-registry"><name>TLS PskKeyExchangeMode registry</name>

<t>In order to reflect the changes in the Recommended column allocation,
IANA <bcp14>SHALL</bcp14> update the TLS PskKeyExchangeMode registry as follows:</t>

<t><list style="symbols">
  <t>Update the registration procedure to include:</t>
</list></t>

<figure><artwork><![CDATA[
    Setting a value to "Y" or "D" or transitioning the value from
    "Y" or "D"  in the "Recommended" column requires
    IETF Standards Action [RFC8126] or IESG Approval.
]]></artwork></figure>

<t><list style="symbols">
  <t>Add a reference to this document under the reference heading.</t>
  <t>Entries keep their existing Recommended column "Y" and "N" entries.</t>
  <t>Update note on the Recommended column with text in <xref target="rec-note"/>.</t>
</list></t>

</section>
<section anchor="tls-signaturescheme-registry"><name>TLS SignatureScheme registry</name>

<t>IANA is requested to add a reference to this document under the reference heading.</t>

</section>
<section anchor="adding-comment-column"><name>Adding "Comment" Column</name>

<t>IANA is requested to add a "Comment" column to the following registries:</t>

<t><list style="symbols">
  <t>TLS ExtensionType Values</t>
  <t>TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs</t>
  <t>TLS CachedInformationType Values</t>
  <t>TLS Certificate Compression Algorithm IDs</t>
  <t>TLS Cipher Suites</t>
  <t>TLS ContentType</t>
  <t>TLS EC Point Formats</t>
  <t>TLS EC Curve Types</t>
  <t>TLS Supplemental Data Formats (SupplementalDataType)</t>
  <t>TLS UserMappingType Values</t>
  <t>TLS Authorization Data Formats</t>
  <t>TLS Heartbeat Message Types</t>
  <t>TLS Heartbeat Modes</t>
  <t>TLS SignatureScheme</t>
  <t>TLS PskKeyExchangeMode</t>
  <t>TLS KDF Identifiers</t>
</list></t>

<t>This list of registries is all registries that do not already have a
"Comment" or "Notes" column or that were not orphaned by TLS 1.3.</t>

</section>
<section anchor="expert-review-of-current-and-potential-ietf-and-irtf-documents"><name>Expert Review of Current and Potential IETF and IRTF Documents</name>

<t>The intent of the Specification Required standard for TLS code points
is to allow for easy registration for code points associated with
protocols and algorithms that are not being actively developed inside
IETF or IRTF. When TLS-based technologies are being developed inside
the IRTF/IETF they should be done in coordination with the TLS WG in
order to provide appropriate review. For this reason, unless the TLS WG
chairs indicate otherwise via email, designated
experts should decline code point registrations for documents which
have already been adopted or are being proposed for adoption by IETF
working groups or IRTF research groups.</t>

</section>
<section anchor="security-considerations"><name>Security Considerations</name>

<t>The change to Specification Required from IETF Review lowers the amount
of review provided by the WG for cipher suites and supported groups.
This change reflects reality in that the WG essentially provided no
cryptographic review of the cipher suites or supported groups.  This
was especially true of national cipher suites.</t>

<t>Recommended algorithms are regarded as secure for general use at the
time of registration; however, cryptographic algorithms and parameters
will be broken or weakened over time.  It is possible that the
"Recommended" status in the registry lags behind the most recent advances
in cryptanalysis.  Implementers and users need to check that the
cryptographic algorithms listed continue to provide the expected level
of security.</t>

<t>Designated experts ensure the specification is publicly available.  They may
provide more in-depth reviews.  Their review should not be taken as an
endorsement of the cipher suite, extension, supported group, etc.</t>

</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document is entirely about changes to TLS-related IANA registries.</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC8447">
  <front>
    <title>IANA Registry Updates for TLS and DTLS</title>
    <author fullname="J. Salowey" initials="J." surname="Salowey"/>
    <author fullname="S. Turner" initials="S." surname="Turner"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy. These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
      <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8447"/>
  <seriesInfo name="DOI" value="10.17487/RFC8447"/>
</reference>
<reference anchor="RFC2119">
  <front>
    <title>Key words for use in RFCs to Indicate Requirement Levels</title>
    <author fullname="S. Bradner" initials="S." surname="Bradner"/>
    <date month="March" year="1997"/>
    <abstract>
      <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="2119"/>
  <seriesInfo name="DOI" value="10.17487/RFC2119"/>
</reference>
<reference anchor="RFC8174">
  <front>
    <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <date month="May" year="2017"/>
    <abstract>
      <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="14"/>
  <seriesInfo name="RFC" value="8174"/>
  <seriesInfo name="DOI" value="10.17487/RFC8174"/>
</reference>
<reference anchor="RFC8126">
  <front>
    <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
    <author fullname="M. Cotton" initials="M." surname="Cotton"/>
    <author fullname="B. Leiba" initials="B." surname="Leiba"/>
    <author fullname="T. Narten" initials="T." surname="Narten"/>
    <date month="June" year="2017"/>
    <abstract>
      <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
      <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
      <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="26"/>
  <seriesInfo name="RFC" value="8126"/>
  <seriesInfo name="DOI" value="10.17487/RFC8126"/>
</reference>
<reference anchor="RFC4346">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.1</title>
    <author fullname="T. Dierks" initials="T." surname="Dierks"/>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="April" year="2006"/>
    <abstract>
      <t>This document specifies Version 1.1 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="4346"/>
  <seriesInfo name="DOI" value="10.17487/RFC4346"/>
</reference>
<reference anchor="RFC7465">
  <front>
    <title>Prohibiting RC4 Cipher Suites</title>
    <author fullname="A. Popov" initials="A." surname="Popov"/>
    <date month="February" year="2015"/>
    <abstract>
      <t>This document requires that Transport Layer Security (TLS) clients and servers never negotiate the use of RC4 cipher suites when they establish connections. This applies to all TLS versions. This document updates RFCs 5246, 4346, and 2246.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7465"/>
  <seriesInfo name="DOI" value="10.17487/RFC7465"/>
</reference>
<reference anchor="RFC5469">
  <front>
    <title>DES and IDEA Cipher Suites for Transport Layer Security (TLS)</title>
    <author fullname="P. Eronen" initials="P." role="editor" surname="Eronen"/>
    <date month="February" year="2009"/>
    <abstract>
      <t>Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346) include cipher suites based on DES (Data Encryption Standard) and IDEA (International Data Encryption Algorithm) algorithms. DES (when used in single-DES mode) and IDEA are no longer recommended for general use in TLS, and have been removed from TLS version 1.2 (RFC 5246). This document specifies these cipher suites for completeness and discusses reasons why their use is no longer recommended. This memo provides information for the Internet community.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="5469"/>
  <seriesInfo name="DOI" value="10.17487/RFC5469"/>
</reference>
<reference anchor="RFC8996">
  <front>
    <title>Deprecating TLS 1.0 and TLS 1.1</title>
    <author fullname="K. Moriarty" initials="K." surname="Moriarty"/>
    <author fullname="S. Farrell" initials="S." surname="Farrell"/>
    <date month="March" year="2021"/>
    <abstract>
      <t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance.</t>
      <t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
      <t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
    </abstract>
  </front>
  <seriesInfo name="BCP" value="195"/>
  <seriesInfo name="RFC" value="8996"/>
  <seriesInfo name="DOI" value="10.17487/RFC8996"/>
</reference>



    </references>





  </back>

<!-- ##markdown-source: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-->

</rfc>

