<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.27 (Ruby 3.3.6) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-tls-rfc8447bis-12" category="std" consensus="true" submissionType="IETF" updates="3749, 5077, 4680, 5246, 5705, 5878, 6520, 7301, 8447" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.28.1 -->
  <front>
    <title abbrev="(D)TLS IANA Registry Updates">IANA Registry Updates for TLS and DTLS</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-12"/>
    <author initials="J." surname="Salowey" fullname="Joe Salowey">
      <organization>Venafi</organization>
      <address>
        <email>joe@salowey.net</email>
      </address>
    </author>
    <author initials="S." surname="Turner" fullname="Sean Turner">
      <organization>sn3rd</organization>
      <address>
        <email>sean@sn3rd.com</email>
      </address>
    </author>
    <date year="2025" month="April" day="11"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 41?>

<t>This document updates the changes to TLS and DTLS IANA registries
made in RFC 8447. It adds a new value "D" for discouraged
to the Recommended column of the selected TLS registries and
adds a "Comments" column to all active registries that do not
already have a "Comments" column.</t>
      <t>This document updates the following RFCs:
3749, 5077, 4680, 5246, 5705, 5878, 6520, 7301, and 8447.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-tls-rfc8447bis/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/tlswg/rfc8447bis"/>.</t>
    </note>
  </front>
  <middle>
    <?line 52?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document instructs IANA to make changes to a number of the IANA
registries related to Transport Layer Security (TLS) and Datagram
Transport Layer Security (DTLS). These changes update the changes made
in <xref target="RFC8447"/>.</t>
      <aside>
        <t>NOTE for IANA: This document specifies changes to the registry to update
  the changes made in <xref target="RFC8447"/>.</t>
      </aside>
      <t>This specification updates the "Recommended" column in TLS
registries to define a third value "D" for items that are discouraged.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="adding-recommended-column">
      <name>Adding "Recommended" Column</name>
      <t>The instructions in this document update the Recommended column,
originally added in <xref target="RFC8447"/> to add a third value, "D",
indicating that a value is "Discouraged". The permitted values
of the "Recommended" column are:</t>
      <dl>
        <dt>Y:</dt>
        <dd>
          <t>Indicates that the IETF has consensus that the
  item is <bcp14>RECOMMENDED</bcp14>. This only means that the associated
  mechanism is fit for the purpose for which it was defined.
  Careful reading of the documentation for the mechanism is
  necessary to understand the applicability of that mechanism.
  The IETF could recommend mechanisms that have limited
  applicability, but will provide applicability statements that
  describe any limitations of the mechanism or necessary constraints
  on its use.</t>
        </dd>
        <dt>N:</dt>
        <dd>
          <t>Indicates that the item has not been evaluated by
  the IETF and that the IETF has made no statement about the
  suitability of the associated mechanism. This does not necessarily
  mean that the mechanism is flawed, only that no consensus exists.
  The IETF might have consensus to leave an items marked as "N" on
  the basis of its having limited applicability or usage constraints.</t>
        </dd>
        <dt>D:</dt>
        <dd>
          <t>Indicates that the item is discouraged. This marking could be used to identify
  mechanisms that might result in problems if they are used, such as
  a weak cryptographic algorithm or a mechanism that might cause
  interoperability problems in deployment. When marking a registry entry as
  “D”, either the References or the Comments Column <bcp14>MUST</bcp14> include sufficient
  information to determine why the marking has been applied. Implementers
  <bcp14>SHOULD</bcp14> consult the linked references associated with the item to
  determine the conditions under which it <bcp14>SHOULD NOT</bcp14> or <bcp14>MUST NOT</bcp14> be used.</t>
        </dd>
      </dl>
      <t>Setting a value to "Y" or "D" or transitioning the value from "Y" or "D" in the "Recommended" column requires
IETF Standards Action <xref target="RFC8126"/> or IESG Approval. Not all items defined
in Standards Track RFCs need to be set
to "Y" or "D". Any item not otherwise specified is set to "N". The column is
blank for values that are unassigned or reserved unless specifically set.</t>
      <section anchor="rec-note">
        <name>Recommended Note</name>
        <t>Existing registries have a note on the meaning of the Recommended column. For the
registries discussed in the subsequent sections this note is updated
with a sentence describing the "D" value as follows:</t>
        <dl>
          <dt>Note:</dt>
          <dd>
            <t>If "Recommended" column is set to "N", it does not necessarily mean
that it is flawed; rather, it indicates that the item either has not
been through the IETF consensus process, has limited applicability, or
is intended only for specific use cases.  If the "Recommended" column
is set to "D" the item is discouraged and <bcp14>SHOULD NOT</bcp14> or <bcp14>MUST NOT</bcp14> be used,
depending upon the situation; consult the item’s references for clarity.</t>
          </dd>
        </dl>
      </section>
    </section>
    <section anchor="tls-extensiontype-values">
      <name>TLS ExtensionType Values</name>
      <t>In order to reflect the changes in the Recommended column allocation,
IANA <bcp14>SHALL</bcp14> update the TLS ExtensionType Values registry as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Adjust the registration procedure related to setting the “Recommended” column as follows:</t>
        </li>
      </ul>
      <artwork><![CDATA[
    Setting a value to "Y" or "D" or transitioning the value from
    "Y" or "D" in the "Recommended" column requires
    IETF Standards Action [RFC8126] or IESG Approval.
]]></artwork>
      <ul spacing="normal">
        <li>
          <t>Add a reference to this document under the reference heading.</t>
        </li>
        <li>
          <t>Update the "Recommended" column with the changes as listed below.  Entries
keep their existing "Y" and "N" entries except for the entries in following table.
A reference to this document <bcp14>SHALL</bcp14> be added to these entries.</t>
        </li>
      </ul>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Extension</th>
            <th align="right">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">4</td>
            <td align="left">truncated_hmac</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">53</td>
            <td align="left">connection_id (deprecated)</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">40</td>
            <td align="left">Reserved</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">46</td>
            <td align="left">Reserved</td>
            <td align="right">D</td>
          </tr>
        </tbody>
      </table>
      <ul spacing="normal">
        <li>
          <t>Update note on the Recommended column with text in <xref target="rec-note"/>.</t>
        </li>
        <li>
          <t>For the truncated_hmac, add the following link to Reference column:
https://www.iacr.org/archive/asiacrypt2011/70730368/70730368.pdf</t>
        </li>
        <li>
          <t>For the two Reserved values above, add the following link in the Reference column:
https://mailarchive.ietf.org/arch/msg/tls-reg-review/5BD62HBFjo_AsW-Y8ohVuWEe1gI/</t>
        </li>
      </ul>
    </section>
    <section anchor="tls-cipher-suites-registry">
      <name>TLS Cipher Suites Registry</name>
      <t>Several categories of ciphersuites are discouraged for general use and
are marked as "D".</t>
      <t>Ciphersuites that use NULL encryption do not provide the confidentiality
normally expected of TLS. Protocols and applications are often designed
to require confidentiality as a security property. These
ciphersuites <bcp14>MUST NOT</bcp14> be used in those cases.</t>
      <t>Ciphersuites marked as EXPORT use weak ciphers and were deprecated in
TLS 1.1 <xref target="RFC4346"/>.</t>
      <t>Cipher suites marked as anon do not provide any authentication and are
vulnerable to man-in-the-middle attacks and are deprecated in TLS 1.1
<xref target="RFC4346"/>.</t>
      <t>RC4 is a weak cipher and is deprecated in <xref target="RFC7465"/>.</t>
      <t>DES and IDEA are not considered secure for general use and are deprecated
in <xref target="RFC5469"/>. Nor is MD5 or SHA-1 and these are deprecated in <xref target="RFC9155"/>.</t>
      <t>In order to reflect the changes in the Recommended column allocation,
IANA <bcp14>SHALL</bcp14> update the TLS ExtensionType Values registry as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Adjust the registration procedure related to setting the “Recommended” column as follows:</t>
        </li>
      </ul>
      <artwork><![CDATA[
    Setting a value to "Y" or "D" or transitioning the value from
    "Y" or "D" in the "Recommended" column requires
    IETF Standards Action [RFC8126] or IESG Approval.
]]></artwork>
      <ul spacing="normal">
        <li>
          <t>Add a reference to this document under the reference heading.</t>
        </li>
        <li>
          <t>Update the "Recommended" column with the changes as listed below.  Entries
keep their existing "Y" and "N" entries except for the entries in following table.
A reference to this document <bcp14>SHALL</bcp14> be added to these entries. This document does not
make any changes to the DTLS-OK column.</t>
        </li>
      </ul>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Cipher Suite Name</th>
            <th align="right">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x00,0x1E</td>
            <td align="left">TLS_KRB5_WITH_DES_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x20</td>
            <td align="left">TLS_KRB5_WITH_RC4_128_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x21</td>
            <td align="left">TLS_KRB5_WITH_IDEA_CBC_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x22</td>
            <td align="left">TLS_KRB5_WITH_DES_CBC_MD5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x24</td>
            <td align="left">TLS_KRB5_WITH_RC4_128_MD5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x25</td>
            <td align="left">TLS_KRB5_WITH_IDEA_CBC_MD5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x26</td>
            <td align="left">TLS_KRB5_EXPORT_WITH_DES_CBC_40_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x27</td>
            <td align="left">TLS_KRB5_EXPORT_WITH_RC2_CBC_40_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x28</td>
            <td align="left">TLS_KRB5_EXPORT_WITH_RC4_40_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x29</td>
            <td align="left">TLS_KRB5_EXPORT_WITH_DES_CBC_40_MD5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x2A</td>
            <td align="left">TLS_KRB5_EXPORT_WITH_RC2_CBC_40_MD5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x2B</td>
            <td align="left">TLS_KRB5_EXPORT_WITH_RC4_40_MD5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x2C</td>
            <td align="left">TLS_PSK_WITH_NULL_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0x8A</td>
            <td align="left">TLS_PSK_WITH_RC4_128_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0xB0</td>
            <td align="left">TLS_PSK_WITH_NULL_SHA256</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0x00,0xB1</td>
            <td align="left">TLS_PSK_WITH_NULL_SHA384</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x06</td>
            <td align="left">TLS_ECDHE_ECDSA_WITH_NULL_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x07</td>
            <td align="left">TLS_ECDHE_ECDSA_WITH_RC4_128_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x10</td>
            <td align="left">TLS_ECDHE_RSA_WITH_NULL_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x11</td>
            <td align="left">TLS_ECDHE_RSA_WITH_RC4_128_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x33</td>
            <td align="left">TLS_ECDHE_PSK_WITH_RC4_128_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x39</td>
            <td align="left">TLS_ECDHE_PSK_WITH_NULL_SHA</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x3A</td>
            <td align="left">TLS_ECDHE_PSK_WITH_NULL_SHA256</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x3B</td>
            <td align="left">TLS_ECDHE_PSK_WITH_NULL_SHA384</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0xC0,0xB4</td>
            <td align="left">TLS_SHA256_SHA256</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">0xC0,0xB5</td>
            <td align="left">TLS_SHA384_SHA384</td>
            <td align="right">D</td>
          </tr>
        </tbody>
      </table>
      <ul spacing="normal">
        <li>
          <t>Update note on the Recommended column with text in <xref target="rec-note"/>.</t>
        </li>
        <li>
          <t><xref target="I-D.ietf-tls-deprecate-obsolete-kex"/> sets the Recommended column
for the following cipher suites to "D". This document adds additional
references to indicate why the cipher suites are marked as "D".</t>
        </li>
      </ul>
      <aside>
        <t>RFC Editor NOTE: Replace [ThisRFC] in the table that follows with the
  RFCs for this document and <xref target="I-D.ietf-tls-deprecate-obsolete-kex"/>.</t>
      </aside>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Cipher Suite Name</th>
            <th align="right">Reference</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0x00,0x01</td>
            <td align="left">TLS_RSA_WITH_NULL_MD5</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x02</td>
            <td align="left">TLS_RSA_WITH_NULL_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x03</td>
            <td align="left">TLS_RSA_EXPORT_WITH_RC4_40_MD5</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x04</td>
            <td align="left">TLS_RSA_WITH_RC4_128_MD5</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x05</td>
            <td align="left">TLS_RSA_WITH_RC4_128_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x06</td>
            <td align="left">TLS_RSA_EXPORT_WITH_RC2_CBC_40_MD5</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x07</td>
            <td align="left">TLS_RSA_WITH_IDEA_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x08</td>
            <td align="left">TLS_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x09</td>
            <td align="left">TLS_RSA_WITH_DES_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x0B</td>
            <td align="left">TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x0C</td>
            <td align="left">TLS_DH_DSS_WITH_DES_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x0E</td>
            <td align="left">TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x0F</td>
            <td align="left">TLS_DH_RSA_WITH_DES_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x0B</td>
            <td align="left">TLS_DH_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x0C</td>
            <td align="left">TLS_DH_DSS_WITH_DES_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x0E</td>
            <td align="left">TLS_DH_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x0F</td>
            <td align="left">TLS_DH_RSA_WITH_DES_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x11</td>
            <td align="left">TLS_DHE_DSS_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x12</td>
            <td align="left">TLS_DHE_DSS_WITH_DES_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x14</td>
            <td align="left">TLS_DHE_RSA_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x15</td>
            <td align="left">TLS_DHE_RSA_WITH_DES_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x17</td>
            <td align="left">TLS_DH_anon_EXPORT_WITH_RC4_40_MD5</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x18</td>
            <td align="left">TLS_DH_anon_WITH_RC4_128_MD5</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x19</td>
            <td align="left">TLS_DH_anon_EXPORT_WITH_DES40_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x1A</td>
            <td align="left">TLS_DH_anon_WITH_DES_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x1B</td>
            <td align="left">TLS_DH_anon_WITH_3DES_EDE_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x2D</td>
            <td align="left">TLS_DHE_PSK_WITH_NULL_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x2E</td>
            <td align="left">TLS_RSA_PSK_WITH_NULL_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x34</td>
            <td align="left">TLS_DH_anon_WITH_AES_128_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x3A</td>
            <td align="left">TLS_DH_anon_WITH_AES_256_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x3B</td>
            <td align="left">TLS_RSA_WITH_NULL_SHA256</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x46</td>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x6C</td>
            <td align="left">TLS_DH_anon_WITH_AES_128_CBC_SHA256</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x6D</td>
            <td align="left">TLS_DH_anon_WITH_AES_256_CBC_SHA256</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x89</td>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x8E</td>
            <td align="left">TLS_DHE_PSK_WITH_RC4_128_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x92</td>
            <td align="left">TLS_RSA_PSK_WITH_RC4_128_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0xB4</td>
            <td align="left">TLS_DHE_PSK_WITH_NULL_SHA256</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0xB5</td>
            <td align="left">TLS_DHE_PSK_WITH_NULL_SHA384</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0xB8</td>
            <td align="left">TLS_RSA_PSK_WITH_NULL_SHA256</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0xB9</td>
            <td align="left">TLS_RSA_PSK_WITH_NULL_SHA384</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0x9B</td>
            <td align="left">TLS_DH_anon_WITH_SEED_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0xA6</td>
            <td align="left">TLS_DH_anon_WITH_AES_128_GCM_SHA256</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0xA7</td>
            <td align="left">TLS_DH_anon_WITH_AES_256_GCM_SHA384</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0xBF</td>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_CBC_SHA256</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0x00,0xC5</td>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_CBC_SHA256</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x01</td>
            <td align="left">TLS_ECDH_ECDSA_WITH_NULL_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x02</td>
            <td align="left">TLS_ECDH_ECDSA_WITH_RC4_128_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x0B</td>
            <td align="left">TLS_ECDH_RSA_WITH_NULL_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x0C</td>
            <td align="left">TLS_ECDH_RSA_WITH_RC4_128_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x15</td>
            <td align="left">TLS_ECDH_anon_WITH_NULL_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x16</td>
            <td align="left">TLS_ECDH_anon_WITH_RC4_128_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x17</td>
            <td align="left">TLS_ECDH_anon_WITH_3DES_EDE_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x18</td>
            <td align="left">TLS_ECDH_anon_WITH_AES_128_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x19</td>
            <td align="left">TLS_ECDH_anon_WITH_AES_256_CBC_SHA</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x46</td>
            <td align="left">TLS_DH_anon_WITH_ARIA_128_CBC_SHA256</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x47</td>
            <td align="left">TLS_DH_anon_WITH_ARIA_256_CBC_SHA384</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x5A</td>
            <td align="left">TLS_DH_anon_WITH_ARIA_128_GCM_SHA256</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x5B</td>
            <td align="left">TLS_DH_anon_WITH_ARIA_256_GCM_SHA384</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x84</td>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_128_GCM_SHA256</td>
            <td align="right">[ThisRFC]</td>
          </tr>
          <tr>
            <td align="left">0xC0,0x85</td>
            <td align="left">TLS_DH_anon_WITH_CAMELLIA_256_GCM_SHA384</td>
            <td align="right">[ThisRFC]</td>
          </tr>
        </tbody>
      </table>
    </section>
    <section anchor="tls-supported-groups">
      <name>TLS Supported Groups</name>
      <t>In order to reflect the changes in the Recommended column allocation,
IANA <bcp14>SHALL</bcp14> update the TLS Supported Groups registry as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Update the registration policy to include:</t>
        </li>
      </ul>
      <artwork><![CDATA[
    Setting a value to "Y" or "D" or transitioning the value from
    "Y" or "D" in the "Recommended" column requires
    IETF Standards Action [RFC8126] or IESG Approval
]]></artwork>
      <ul spacing="normal">
        <li>
          <t>Add a reference to this document under the reference heading.</t>
        </li>
        <li>
          <t>Update the "Recommended" column with the changes as listed below.  Entries
keep their existing "Y" and "N" entries except for the entries in following table.
A reference to this document <bcp14>SHALL</bcp14> be added to these entries.</t>
        </li>
      </ul>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Curve</th>
            <th align="right">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">1</td>
            <td align="left">sect163k1</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">sect163r1</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">sect163r2</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">sect193r1</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">5</td>
            <td align="left">sect193r2</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">6</td>
            <td align="left">sect233k1</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">7</td>
            <td align="left">sect233r1</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">8</td>
            <td align="left">sect239k1</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">15</td>
            <td align="left">secp160k1</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">16</td>
            <td align="left">secp160r1</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">17</td>
            <td align="left">secp160r2</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">18</td>
            <td align="left">secp192k1</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">19</td>
            <td align="left">secp192r1</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">20</td>
            <td align="left">secp224k1</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">21</td>
            <td align="left">secp224r1</td>
            <td align="right">D</td>
          </tr>
        </tbody>
      </table>
      <ul spacing="normal">
        <li>
          <t>Update note on the Recommended column with text in <xref target="rec-note"/>.</t>
        </li>
        <li>
          <t>Remove the "Elliptic curve groups" note from the registration
procedures table.</t>
        </li>
        <li>
          <t>For each of the entries above, add the following link to the
Comment column:
https://datatracker.ietf.org/meeting/118/materials/slides-118-tls-rfc8447bis-00</t>
        </li>
      </ul>
    </section>
    <section anchor="tls-exporter-labels-registry">
      <name>TLS Exporter Labels Registry</name>
      <t>This document updates the registration procedure for the TLS Exporter
registry and updates the Recommended column allocation.
IANA <bcp14>SHALL</bcp14> update the TLS Exporter Labels Registry as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Change the registration procedure from Specification Required to
Expert Review and update it to include:</t>
        </li>
      </ul>
      <artwork><![CDATA[
    Setting a value to "Y" or "D" or transitioning the value from
    "Y" or "D" in the "Recommended" column requires
    IETF Standards Action [RFC8126] or IESG Approval.
]]></artwork>
      <ul spacing="normal">
        <li>
          <t>Add a reference to this document under the reference heading.</t>
        </li>
        <li>
          <t>Entries keep their existing Recommended column "Y" and "N" entries</t>
        </li>
        <li>
          <t>Update note on the Recommended column with text in <xref target="rec-note"/>.</t>
        </li>
        <li>
          <t>Update the note on the role of the expert reviewer as follows.</t>
        </li>
      </ul>
      <dl>
        <dt>Note:</dt>
        <dd>
          <t>The role of the designated expert is described in <xref section="17" sectionFormat="comma" target="RFC8447"/>.
Even though this registry does not require a specification, the
designated expert <xref target="RFC8126"/> will strongly encourage registrants
to provide a link to a publicly available specification. An
Internet-Draft (that is posted and never published as an RFC)
or a document from another standards body, industry consortium,
university site, etc. are suitable for these purposes.
The expert may provide more in-depth reviews, but their approval
should not be taken as an endorsement of the exporter label.  The
expert also verifies that the label is a string consisting of
printable ASCII characters beginning with "EXPORTER".  IANA <bcp14>MUST</bcp14>
also verify that one label is not a prefix of any other label.
For example, labels "key" or "master secretary" are forbidden.</t>
        </dd>
      </dl>
    </section>
    <section anchor="tls-certificate-types">
      <name>TLS Certificate Types</name>
      <t>In order to reflect the changes in the Recommended column allocation,
IANA <bcp14>SHALL</bcp14> update the the TLS Certificate Types registry as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Adjust the registration procedure related to setting the “Recommended” column as follows:</t>
        </li>
      </ul>
      <artwork><![CDATA[
    Setting a value to "Y" or "D" or transitioning the value from
    "Y" or "D" in the "Recommended" column requires
    IETF Standards Action [RFC8126] or IESG Approval.
]]></artwork>
      <ul spacing="normal">
        <li>
          <t>Add a reference to this document under the reference heading.</t>
        </li>
        <li>
          <t>Entries keep their existing Recommended column "Y" and "N" entries.</t>
        </li>
        <li>
          <t>Update note on the Recommended column with text in <xref target="rec-note"/>.</t>
        </li>
      </ul>
    </section>
    <section anchor="tls-hashalgorithm-registry">
      <name>TLS HashAlgorithm Registry</name>
      <t>Though TLS 1.0 and TLS 1.1 were deprecated <xref target="RFC8996"/>, TLS 1.2 will
be in use for some time. In order to reflect the changes in the Recommended
column allocation, IANA <bcp14>SHALL</bcp14> update the TLS HashAlgorithm Registry
registry as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Update the registration procedure to include:</t>
        </li>
      </ul>
      <artwork><![CDATA[
    Setting a value to "Y" or "D" or transitioning the value from
    "Y" or "D"  in the "Recommended" column requires
    IETF Standards Action [RFC8126] or IESG Approval.
]]></artwork>
      <ul spacing="normal">
        <li>
          <t>Add a reference to this document under the reference heading.</t>
        </li>
        <li>
          <t>Update the TLS HashAlgorithm registry to add a "Recommended" column
as follows:</t>
        </li>
      </ul>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="right">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0</td>
            <td align="left">none</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">md5</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">sha1</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">sha224</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">sha256</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">5</td>
            <td align="left">sha384</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">6</td>
            <td align="left">sha512</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">8</td>
            <td align="left">Intrinsic</td>
            <td align="right">Y</td>
          </tr>
        </tbody>
      </table>
      <ul spacing="normal">
        <li>
          <t>Add note on the Recommended column with text in <xref target="rec-note"/>.</t>
        </li>
      </ul>
    </section>
    <section anchor="tls-signaturealgorithm-registry">
      <name>TLS SignatureAlgorithm registry</name>
      <t>Though TLS 1.0 and TLS 1.1 were deprecated <xref target="RFC8996"/>, TLS 1.2 will
be in use for some time. In order to reflect the changes in the Recommended
column allocation, IANA <bcp14>SHALL</bcp14> update the TLS SignatureAlgorithm registry
registry as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Update the registration procedure to include:</t>
        </li>
      </ul>
      <artwork><![CDATA[
    Setting a value to "Y" or "D" or transitioning the value from
    "Y" or "D"  in the "Recommended" column requires
    IETF Standards Action [RFC8126] or IESG Approval.
]]></artwork>
      <ul spacing="normal">
        <li>
          <t>Add a reference to this document under the reference heading.</t>
        </li>
        <li>
          <t>Update the TLS SignatureAlgorithm registry to add a "Recommended"
column as follows:</t>
        </li>
      </ul>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="right">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">0</td>
            <td align="left">anonymous</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">1</td>
            <td align="left">rsa</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">dsa</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">ecdsa</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">7</td>
            <td align="left">ed25519</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">8</td>
            <td align="left">ed448</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">64</td>
            <td align="left">gostr34102012_256</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">65</td>
            <td align="left">gostr34102012_512</td>
            <td align="right">N</td>
          </tr>
        </tbody>
      </table>
      <ul spacing="normal">
        <li>
          <t>Add note on the Recommended column with text in <xref target="rec-note"/>.</t>
        </li>
      </ul>
    </section>
    <section anchor="tls-clientcertificatetype-identifiers-registry">
      <name>TLS ClientCertificateType Identifiers registry</name>
      <t>Though TLS 1.0 and TLS 1.1 were deprecated <xref target="RFC8996"/>, TLS 1.2 will
be in use for some time. In order to refect the changes in the Recommended
column allocation, IANA <bcp14>SHALL</bcp14> update the  TLS ClientCertificateType Identifier
registry as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Update the registration procedure to include:</t>
        </li>
      </ul>
      <artwork><![CDATA[
    Setting a value to "Y" or "D" or transitioning the value from
    "Y" or "D"  in the "Recommended" column requires
    IETF Standards Action [RFC8126] or IESG Approval.
]]></artwork>
      <ul spacing="normal">
        <li>
          <t>Add a reference to this document under the reference heading.</t>
        </li>
        <li>
          <t>Update the TLS ClientCertificateType Identifier registry to add a "Recommended"
column as follows:</t>
        </li>
      </ul>
      <table>
        <thead>
          <tr>
            <th align="left">Value</th>
            <th align="left">Description</th>
            <th align="right">Recommended</th>
          </tr>
        </thead>
        <tbody>
          <tr>
            <td align="left">1</td>
            <td align="left">rsa_sign</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">2</td>
            <td align="left">dss_sign</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">3</td>
            <td align="left">rsa_fixed_dh</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">4</td>
            <td align="left">dss_fixed_dh</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">5</td>
            <td align="left">rsa_ephemeral_dh_RESERVED</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">6</td>
            <td align="left">dss_ephemeral_dh_RESERVED</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">20</td>
            <td align="left">fortezza_dms_RESERVED</td>
            <td align="right">D</td>
          </tr>
          <tr>
            <td align="left">64</td>
            <td align="left">ecdsa_sign</td>
            <td align="right">Y</td>
          </tr>
          <tr>
            <td align="left">65</td>
            <td align="left">rsa_fixed_ecdh</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">66</td>
            <td align="left">ecdsa_fixed_ecdh</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">67</td>
            <td align="left">gost_sign256</td>
            <td align="right">N</td>
          </tr>
          <tr>
            <td align="left">68</td>
            <td align="left">gost_sign512</td>
            <td align="right">N</td>
          </tr>
        </tbody>
      </table>
      <ul spacing="normal">
        <li>
          <t>Add note on the Recommended column with text in <xref target="rec-note"/>.</t>
        </li>
      </ul>
    </section>
    <section anchor="tls-pskkeyexchangemode-registry">
      <name>TLS PskKeyExchangeMode registry</name>
      <t>In order to reflect the changes in the Recommended column allocation,
IANA <bcp14>SHALL</bcp14> update the TLS PskKeyExchangeMode registry as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Update the registration procedure to include:</t>
        </li>
      </ul>
      <artwork><![CDATA[
    Setting a value to "Y" or "D" or transitioning the value from
    "Y" or "D"  in the "Recommended" column requires
    IETF Standards Action [RFC8126] or IESG Approval.
]]></artwork>
      <ul spacing="normal">
        <li>
          <t>Add a reference to this document under the reference heading.</t>
        </li>
        <li>
          <t>Entries keep their existing Recommended column "Y" and "N" entries.</t>
        </li>
        <li>
          <t>Update note on the Recommended column with text in <xref target="rec-note"/>.</t>
        </li>
      </ul>
    </section>
    <section anchor="tls-signaturescheme-registry">
      <name>TLS SignatureScheme registry</name>
      <t>IANA is requested to add a reference to this document under the reference heading.</t>
    </section>
    <section anchor="adding-comment-column">
      <name>Adding "Comment" Column</name>
      <t>IANA is requested to add a "Comment" column to the following registries:</t>
      <ul spacing="normal">
        <li>
          <t>TLS ExtensionType Values</t>
        </li>
        <li>
          <t>TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs</t>
        </li>
        <li>
          <t>TLS CachedInformationType Values</t>
        </li>
        <li>
          <t>TLS Certificate Compression Algorithm IDs</t>
        </li>
        <li>
          <t>TLS Cipher Suites</t>
        </li>
        <li>
          <t>TLS ContentType</t>
        </li>
        <li>
          <t>TLS EC Point Formats</t>
        </li>
        <li>
          <t>TLS EC Curve Types</t>
        </li>
        <li>
          <t>TLS Supplemental Data Formats (SupplementalDataType)</t>
        </li>
        <li>
          <t>TLS UserMappingType Values</t>
        </li>
        <li>
          <t>TLS Authorization Data Formats</t>
        </li>
        <li>
          <t>TLS Heartbeat Message Types</t>
        </li>
        <li>
          <t>TLS Heartbeat Modes</t>
        </li>
        <li>
          <t>TLS SignatureScheme</t>
        </li>
        <li>
          <t>TLS PskKeyExchangeMode</t>
        </li>
        <li>
          <t>TLS KDF Identifiers</t>
        </li>
      </ul>
      <t>This list of registries is all registries that do not already have a
"Comment" or "Notes" column or that were not orphaned by TLS 1.3.</t>
    </section>
    <section anchor="expert-review-of-current-and-potential-ietf-and-irtf-documents">
      <name>Expert Review of Current and Potential IETF and IRTF Documents</name>
      <t>The intent of the Specification Required standard for TLS code points
is to allow for easy registration for code points associated with
protocols and algorithms that are not being actively developed inside
IETF or IRTF. When TLS-based technologies are being developed inside
the IRTF/IETF they should be done in coordination with the TLS WG in
order to provide appropriate review. For this reason, unless the TLS WG
chairs indicate otherwise via email, designated
experts should decline code point registrations for documents which
have already been adopted or are being proposed for adoption by IETF
working groups or IRTF research groups.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The change to Specification Required from IETF Review lowers the amount
of review provided by the WG for cipher suites and supported groups.
This change reflects reality in that the WG essentially provided no
cryptographic review of the cipher suites or supported groups.  This
was especially true of national cipher suites.</t>
      <t>Recommended algorithms are regarded as secure for general use at the
time of registration; however, cryptographic algorithms and parameters
will be broken or weakened over time.  It is possible that the
"Recommended" status in the registry lags behind the most recent advances
in cryptanalysis.  Implementers and users need to check that the
cryptographic algorithms listed continue to provide the expected level
of security.</t>
      <t>Designated experts ensure the specification is publicly available.  They may
provide more in-depth reviews.  Their review should not be taken as an
endorsement of the cipher suite, extension, supported group, etc.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document is entirely about changes to TLS-related IANA registries.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC8447">
        <front>
          <title>IANA Registry Updates for TLS and DTLS</title>
          <author fullname="J. Salowey" initials="J." surname="Salowey"/>
          <author fullname="S. Turner" initials="S." surname="Turner"/>
          <date month="August" year="2018"/>
          <abstract>
            <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy. These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
            <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8447"/>
        <seriesInfo name="DOI" value="10.17487/RFC8447"/>
      </reference>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC8126">
        <front>
          <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
          <author fullname="M. Cotton" initials="M." surname="Cotton"/>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <author fullname="T. Narten" initials="T." surname="Narten"/>
          <date month="June" year="2017"/>
          <abstract>
            <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
            <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
            <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="26"/>
        <seriesInfo name="RFC" value="8126"/>
        <seriesInfo name="DOI" value="10.17487/RFC8126"/>
      </reference>
      <reference anchor="RFC4346">
        <front>
          <title>The Transport Layer Security (TLS) Protocol Version 1.1</title>
          <author fullname="T. Dierks" initials="T." surname="Dierks"/>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <date month="April" year="2006"/>
          <abstract>
            <t>This document specifies Version 1.1 of the Transport Layer Security (TLS) protocol. The TLS protocol provides communications security over the Internet. The protocol allows client/server applications to communicate in a way that is designed to prevent eavesdropping, tampering, or message forgery.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4346"/>
        <seriesInfo name="DOI" value="10.17487/RFC4346"/>
      </reference>
      <reference anchor="RFC7465">
        <front>
          <title>Prohibiting RC4 Cipher Suites</title>
          <author fullname="A. Popov" initials="A." surname="Popov"/>
          <date month="February" year="2015"/>
          <abstract>
            <t>This document requires that Transport Layer Security (TLS) clients and servers never negotiate the use of RC4 cipher suites when they establish connections. This applies to all TLS versions. This document updates RFCs 5246, 4346, and 2246.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7465"/>
        <seriesInfo name="DOI" value="10.17487/RFC7465"/>
      </reference>
      <reference anchor="RFC5469">
        <front>
          <title>DES and IDEA Cipher Suites for Transport Layer Security (TLS)</title>
          <author fullname="P. Eronen" initials="P." role="editor" surname="Eronen"/>
          <date month="February" year="2009"/>
          <abstract>
            <t>Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346) include cipher suites based on DES (Data Encryption Standard) and IDEA (International Data Encryption Algorithm) algorithms. DES (when used in single-DES mode) and IDEA are no longer recommended for general use in TLS, and have been removed from TLS version 1.2 (RFC 5246). This document specifies these cipher suites for completeness and discusses reasons why their use is no longer recommended. This memo provides information for the Internet community.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="5469"/>
        <seriesInfo name="DOI" value="10.17487/RFC5469"/>
      </reference>
      <reference anchor="RFC9155">
        <front>
          <title>Deprecating MD5 and SHA-1 Signature Hashes in TLS 1.2 and DTLS 1.2</title>
          <author fullname="L. Velvindron" initials="L." surname="Velvindron"/>
          <author fullname="K. Moriarty" initials="K." surname="Moriarty"/>
          <author fullname="A. Ghedini" initials="A." surname="Ghedini"/>
          <date month="December" year="2021"/>
          <abstract>
            <t>The MD5 and SHA-1 hashing algorithms are increasingly vulnerable to attack, and this document deprecates their use in TLS 1.2 and DTLS 1.2 digital signatures. However, this document does not deprecate SHA-1 with Hashed Message Authentication Code (HMAC), as used in record protection. This document updates RFC 5246.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="9155"/>
        <seriesInfo name="DOI" value="10.17487/RFC9155"/>
      </reference>
      <reference anchor="I-D.ietf-tls-deprecate-obsolete-kex">
        <front>
          <title>Deprecating Obsolete Key Exchange Methods in TLS 1.2</title>
          <author fullname="Carrick Bartle" initials="C." surname="Bartle">
            <organization>Roblox</organization>
          </author>
          <author fullname="Nimrod Aviram" initials="N." surname="Aviram">
         </author>
          <date day="3" month="September" year="2024"/>
          <abstract>
            <t>   This document deprecates the use of RSA key exchange and Diffie
   Hellman over a finite field in TLS 1.2, and discourages the use of
   static elliptic curve Diffie Hellman cipher suites.

   Note that these prescriptions apply only to TLS 1.2 since TLS 1.0 and
   1.1 are deprecated by RFC 8996 and TLS 1.3 either does not use the
   affected algorithm or does not share the relevant configuration
   options.

   This document updates RFCs 9325, 4346, 5246, 4162, 6347, 5932, 5288,
   6209, 6367, 8422, 5289, 5469, 4785, 4279, 5487, 6655, and 7905.

            </t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-ietf-tls-deprecate-obsolete-kex-05"/>
      </reference>
      <reference anchor="RFC8996">
        <front>
          <title>Deprecating TLS 1.0 and TLS 1.1</title>
          <author fullname="K. Moriarty" initials="K." surname="Moriarty"/>
          <author fullname="S. Farrell" initials="S." surname="Farrell"/>
          <date month="March" year="2021"/>
          <abstract>
            <t>This document formally deprecates Transport Layer Security (TLS) versions 1.0 (RFC 2246) and 1.1 (RFC 4346). Accordingly, those documents have been moved to Historic status. These versions lack support for current and recommended cryptographic algorithms and mechanisms, and various government and industry profiles of applications using TLS now mandate avoiding these old TLS versions. TLS version 1.2 became the recommended version for IETF protocols in 2008 (subsequently being obsoleted by TLS version 1.3 in 2018), providing sufficient time to transition away from older versions. Removing support for older versions from implementations reduces the attack surface, reduces opportunity for misconfiguration, and streamlines library and product maintenance.</t>
            <t>This document also deprecates Datagram TLS (DTLS) version 1.0 (RFC 4347) but not DTLS version 1.2, and there is no DTLS version 1.1.</t>
            <t>This document updates many RFCs that normatively refer to TLS version 1.0 or TLS version 1.1, as described herein. This document also updates the best practices for TLS usage in RFC 7525; hence, it is part of BCP 195.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="195"/>
        <seriesInfo name="RFC" value="8996"/>
        <seriesInfo name="DOI" value="10.17487/RFC8996"/>
      </reference>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA+0823LbxpLv+IpZ5sU+RVIkRVKXk80JRdKxTmzZK8rxulIp
1RAYkohAAMEAkpnIqfzGVu1W7bfsp+RLtrtnAAxAgKITZbdcZVUiU8Ppnu6e
vs2tW62WFbuxJ07Z+ehixC7F0pVxtGFvQofHQrJFELGrFzPGfYdN4IPF5/NI
3J6yJ5On2F4JZTmB7fM1IHUivohbrogXrdiTrWhhH/f7R3NXtro9SybztSul
G/jxJkQKplfPLBsQLINoc8pk7FiJQnjKDo/6J0026BwdNVl/eNyBz73+EH4f
dQbw+/jouMmGgx60Hx12uk2Gw1hA5qFluWF0yuIokXGv0znp9CweCX7KGjNh
J5EbbxrWXRDdLKMgCaH1KuK+DIMoZi/4RkQs73UjNtDRATr9WES+iFsT5M66
FX4iTi3GHkbBmOK08RZGdP0l+wZBsH3NXQ/aQUhfo7TaQbTEZh7ZK2hexXEo
Tw8OsBc2ubeinXY7wIaDeRTcSXEA8AcIt3TjVTJXCO+WB7ncG5YlY5jMa+4F
PlCygdmSax7F1z8lAUnaD6zQPWXfx4HdZBK4iMRCwqfNGj/8YFk8iVdBBAy3
YCDGXB+A/tlmM8B4JzbUpib/n4EotAKx3Hd/5jHM+Cn7Tvh84dIXQnH/YyC+
lqp/G8RbGGDWZlcJCD0y8M8E983WIn7pH0aOiV5C96+ptW0Ha8vyg2gNfW9h
7izXXxh/tVotxueg0dyOLetq5UoGGp2shR8zrZEsXglmr7i/xM9BwUaUUUTK
KFwQ8Jo7Athgl8/GpJhtdh4z7jiSceaLO3bLvUSwxqRB5ua40g6SiC+FYwFm
HOhSAMUwvCMcZgdesvZZsKBvpPCEHUMzjpsPibRYeoTGmGBj2UhhASv3PAbc
Ab8mVLziMbAKOhBb3AMzcTZsxaFPBZb2LsksAg/mETUceJan1seaL4qSJKUm
Y+06jics6wu0vShwEhvnuEwAKAqYuR1LNQHA5ZrfFGYJxJ2s52CSWnrYzzL4
j4THUZg4oTVGzJ6ApJ+queYxX0Z8bdX3RXV4Cqq7EjInRAmqoEGoIaCE7Jdf
/gUEhpx/+AC8f8mlC6oD9nnjBHf+vzbmXmDfNL4Ctb54dTUldUEeTllREjIU
trtAjgzmcbwo9dTwtyIDfVKJEEaEGHR8eUB0fKUFrrHbZGiFaW8YipppG2DD
wGGqWcAcsXB91Kt45UZOyQLcWKy1MoKvNg2ijTpwJaK16wdesNwgRYKBZ2bo
miVrvHwzu2o01b8oI/x8Of23N+eX0wl+nj0fvXiRfbB0j9nzV29eTPJPOeT4
1cuX04uJAoZWVmiyGi9H7xpKXRuvXl+dv7oYvWggx3FhPpALYHqOooXYEUYC
tYxDoBTSjtw5/AEwZ+PX//Pf3b5Wgl63e/LhQ6oR3aM+/HG3Er4aLfC9jf4T
BL+xeBgKHiEWtGybh27MPXDbHKZrBarDViISIL2/fY+S+eGUfTm3w27/K92A
DBcaU5kVGklm2y1bwEqIFU0Vw2TSLLSXJF2kd/Su8Hcqd6Pxy394qF2t7vE/
QGlBZUaOg86oqJ9j0k+lQqnvAI2W2/NnWOy2K25aQeQuXR8Ev0GvribTMCDy
PI5TVPYmansTbN4hQwLilL5rU4DRG5Nc7xvkQ1iImh+j7lAvaWk/Vml3oHQQ
y96dWpix0CiphyfXB8kW+HbwEMCx8GWSf6eiLtggUmHMQlt5GVK9NQRTAxuX
MrBd9J0EvBboT1xJGBZuTFaN/cIkCgMp6O+7lWuvYBx2B1QofwD2jeBjIH2R
eAwDEEpGc5lOh/I7KUpzLJUcCFtIybWTA5FElPEoOsPQA0nMXQ/dM+EFDjIU
avirVDwgfc8BKrRs836acwqNngtTovkuoG+yeQLMuWCPYRTcoiMvDg9kgZAx
phI6wpA6BDDyjULNlU5qGeTcAvs5pziJkK6Ad1EyAPm4gDaRaPMXNSpAU4wq
AOEefJPwmUC1ogg4VylbpilKgGXdoWjhBzknkDYFSa5EMgH6TWGbmmKIPQ1f
QtGS8uV6G61O3M9HLyqXx++E01RKSV2AnFylxXuIObI0rWt3udKTZyh/wDxB
qY6v4w9GXfLS4PgbMEAmkDlEQ5oQFDGgQRXVWlBWsAimAOzXnB+YkMmuCUFB
GAFPiQZpwWGURoJ6wMxSmgJa5cfuYlM0O41TMRoJmXiYHaEazj1kzaW52FBc
QkyQ3idgi1wpD2d3gt8wO9qEcQAJTgiGCmEFVmWwqiDF48YkGCPZHJDpnB3C
XADuKpVEPrQPOh56wQbVpc3eQgjLuON5fgJfwm9N0O+//efk99/+q8kEECAi
7YcXENF8UBSmHUGaoGq/ziiuub7tJaCkMllAxuLC95o+ne8HvspGYsopBDil
jVIyTRJqOZkGTSzOx/k69EjXwa8QLh3acIpRzggN0QdVJ8ppNNT+DpjIpzsO
tN2nFFA2FoByKLsnB5b7yjyOIttp6E41AnRrJuJYyVIFEuCu8a6BnTG7QlFh
skrIVdARuuMiCtZmVwqCNaElEj8lLuiVRfY0Q/fKMf0aUQDNcpbeEIIfpqjT
2TdsFKIX5F6bXYCJY5aizEx7fsx+c0SQUds3tHYAZ6A0fY6Lndgq8NNmI3CT
JEf0GwFqx50L8SVNgB00JwAjMVzoKJrmpdKae9y/oUii4mmecyY+zJi7BMJw
KGBVRLfwOfE98Ex5BowhH9BjWvpFITUAHgX75QuIHS2gTHywrCm6IhS5kQjr
tRX2QJetvBv3jZi3nW602TOl8GZGjR4jkVKlHrQuTOYSJokWA0KnNZTT0Fhu
ughxLNJGDp1AoUFT0wCU6gZqgtIPLvWqDpZzFrIH/4AXW9Qk/abYm6i5Vd6d
uLVI6NAjc+d/ZxHHqSQ4t8ZPal+g45dFRhqvoiBZrvIglft3UD4ctkkAld4a
gkhkuZJ8F8mbYgoqRzrdaGPg5KSQbYac19mHZXAP8qtx7RRTd9tzExYIIaDG
2UhCrSFgvAl5rr8XfA6O8Ptv/yFNr4PE2x7HtWib8mDcJZi+B/5w1+1qEwr2
nUokrXMfCEBXA0QDBtxVKCwMtV5V7ESAEQRqLdi0aOGtFgVGzlw3au7uC8rV
gnT9x0TG5opVuWqaRCeJhLlSl9rjYW+IFAaFEDMyIs0Bfv31V+W5/4yvJAwf
6y8Rptpnfq895g/bDpPoJak4FCL19Ko1fWGZQrFCSS3ttFI5NG6k6O3ZejKz
yJROOpmKpHxQgOxA66e+2tJisOgWIXZ2I5Vl0foKxEFrYUiYhOoJX9oizFcA
abPrG5tEkCR6ArO00S72lF5hbkyLLLWlITOUwOI96RW7z7WNPfBzX9Doe+v+
tIU/+p8Hfu7NP04BuA8IYRnpo79yrldrbleNmP5McLzBIbsHM/aVk752HfYE
bB7iBqJ4WgnS77D7yzQi1fJVBBl+LEiuLmZ0qjB/pTTifaxWvVnE+0Aqp2MV
K0qlSevh4kYh5kw4p1lipwc4tdLd77u7u7bL7Sjb9XZvBe5MccpUe51u9+Co
c3TYORweZx/aobMo0HGHI2hB6KAPa5ZbUUtS5vjqyKrflF/L5QEde4gl/H/r
iruDwdlk2Ht+9uzH4Hok37beHQer75K3U9Fdnh9kHnrshhjaZrB6AvLS0xXM
7W4ho8btHTojQTOCNMGm3lJ1Lu2XkdkthU9gGL1oXzgS5uIG0ijLGptIKNBi
74s3YHDANMoXjUltDWfLWZ2qLtQihGMQVbvqmBaJ96HamQYSgak2ex0FcQDC
o83pNPSqzAQpChZgsph+UNZlURgir1keAonGhEXvsYa0zoAAp3ZZrYI4ygFV
zWaQhfES47lUpv/++tXlFQlBLYZUNyL9TqCQMyMFnBbOWrfd1Zlv/7A/JP3X
E7mFnfvbwsQFPx6tIJ96a5XkFAnrNvFwBsFHqk1tv+X6LejZUvvijMcxpMsy
7V+kjWnarBJtl+M+JiTc5I8woMstIFCAR/3hgAAnU3XUcT6Zjmg45AIzEeAi
AgiaGVGleSXi8g3vQX94Argha45w+JeTAUZB8Petrt55QD+/zZqCPukOFGWf
c5jPOcwnnsOUDnLSRROdEN8oJ1E60sEjptarb/NTuXuWZkFmHGEXfC3+SCq0
Zy5UmRRhTsQ67zudZud9dwojAK3X316eDa7fnl89vwZPcj0+G1+DUMqJyIQx
A7bX2YIF93Xd7R3vAdvdgkXPtefAvVqi0Unthu3XEv0w7KCe6CJwBezQhFWB
rEh6v6M4v1fJYQZ4VAd4Oe6ZgGW443q4fh3MyR5EIqdluNEeNFbBnT1AYxXM
WMO8nn2r+mI+VMXN8ajc01TPUuezTh3a3mC41blb1/nwuG90HmPnTjrz0/Hk
+RR/z0a1hCuIozqIagYIqNspAF0+NEi3W91/xxCHhwWQB8SqQE6qQeqoOhzt
7l+cDAVythukYkrOUiegMNYgPhvkvQBJEdcjrcQgVzpvTdrZXawsk2oFcxl4
Aj7ciPcfPmAuImuGgDCUxsA88NmFJFfteZXjmLqK4qhNbe4BHmOXCo8x9CZf
tv9eRFq1YtlxNwLv2UxhLCAVr0mcAiehxyEcf49Uwbc/pJlOrJJqXO/o1CpL
IBQeqRkuMAPZwS+/7CVM8+7EH4zL98bS8zGCshmTO6llFm24FJ5ySnL5mUh6
lUhKsfUhJIcGkhr3/DCSfpmSmoC7E8mgDkkVR3VIhrXsFKLUbiRHZUrqEpdd
SI5rKIE4C0SUkNUhOSlTUpO67USSes8JgM9mDxBTh2RcRLKbmDok0xzJw2Kp
Q/KsiOSPUfJZJltIsnQBY+yDQqlD0ish2UlKHZK+geRBodQhGZSQ/CFKjnLB
4ubRbhdZh+S4hGSni6xDcrKDkr1lMqqi5GNlclaF5BCxTCfTPT1bb2LMznbO
WPqpQ5LaDk7vH0Vy2K9iZwTc4OyU5VKHpFKwiASTz32RnLGagI6p657s9IdV
lIxHL6cvXpyPyjzVIBmO95BJRlQdkskeMnkIyXFZ7YvslKRbh2RapWx16UUN
kpNelbJ9JJKz/i61L09zHZLBLiS4gNkHyfEu29mXkpNdSPak5KTSn8ym00n1
XlElklGl2qca+8345T7KNip7+4LGaiQZV3UyebavAaoFaSWS8WBfta9GMi6s
MnDZXLMrUQ3YqwEsbgNUw5pr9co9imqwcSXYHgNmcZ4gc2E9NGJ3WA23z5BH
1aBbMbAO/rgavhx06sBP6sFNh1gDXh0hRpf7KKdCUG0ml0XFVBsplQgG1dEy
pcCw1joElS4jo8Cw1BoEx5VBv2CkD1Nx/LCR1lKSHjnPkhAfsAhHPUn7P7gQ
VB6x9iDNOPEpHqQFnmtv1O4RXfL85E7FPh+K7X2xJ987S6JbwSrOqvA/tbkF
4QbvPHaHhzddlu60YijRrVHeemi09rLWftp6YvYdGK1536Fu7R2aox3lrQaG
46z1xOjb1YjD7rBjNg/zZgNH98hozsnoHqfNJz0TyUnebCCh8zRs7vX6poy6
eXPW+5G2ny/FOrjVKjr1PDeMXZvZNJn0blY2FH66hly2dVCg7Nhcpkqlb/UI
bq/S27KpDu6+0aP0C3DqG+NbN3qAW46PP29ElN/oWQuBpnDQ7R4frEEckcs9
eSA91xGyBY3lB86djnHjkjxdxF5wMDfzRk/9C8qaOwOptZlordxzgomaSHY6
5/bOmw7VFJd985j8yU6CcT5nhReDl8pnOuruOwwlohga8X6UwQHe/f2Effvj
3XjQnrnSL1dMcIWrfiwbNsKMiScKPJFZoJpNddsNLxRl+tJOb42f0iV8E0hd
+qK7MBqe7iAZTyOz13RNfFxLou/S09TpLV371re+XSOLyO6bp9fIePHhKj2c
tLaHLjxeoNdbgC7wl3ilzdf36jJlx/dWMKHZHa7MwXAWJnPIT/BJ4C1eEMRz
psL4+HbBKpYSYE/UVXgJuQ0FZ5xHHy/9KWxylV4fw6Oppxa9xMn0iCwN8j+6
Fi8zTZ0HzqaJB2wJiQUvaoFpu8m6aSW+C7glvUVzY3CYIrbbdNimHm55mb+R
2dM9mMerfJ7XfJMxvw4ifEeJZ2GgREoDpHoEp7SWp2mPXNEzJvXsDNz5jfA1
W6CMQSTVU7Jco5Qr8tAVtekdl6WHBw8cMGBBvXXO3gdQT3W5Dd9H0Lsp8AjK
ZIKFFUKbYm80G5+fY1aET/3xft8cJtYnv0Gm0FC7m9PLBt74R3eJNwqtfFz9
6CzwjVGRL5h/sGb3PXKBl3bUrCgWLApb7zk+JGqqNskaN2KjvNKaS2QX4nAk
Yh5BK1eOf+5CeuTnF/nHIAKlTuC0N+FffYs/jQ1bw36+AvepBYT240QErYfP
uVyNsueBZnJDblndP+0QDek92fIVWu10T07A6TZ1rx55X4sezdMNUnqKE6xB
Yu5atNnH67q1reusPgeqYeujl6mZsv/12cynoL1vdknZrE+hnsxXvq9iReHn
q8MJJQ3qsnr1fUbGSlcnth5xMFwc+ejR79k7pheUbO0M8gtztJhc8dI6csV7
vfwCUF830b7Nu3wFueJqF+Zdvnxc8QGdV77LVolY5sSFabd1qxb8n7fVGWU7
oI3bMv/kDXYXb5+t9lGtdoeoa0wX6K+K4ff7W275zlO14eIG6GYdJPKeXWTG
G0memRcamkN/X2SmK2zH6IE7LMLpDQa0e5IbpXD6/ePcctGIl5CnR4f9bqfX
6faula0rtMPB1tfKyC8exZx1Bujhi3YjIaOHCeeqJoCL+ez/l3E/pm3vxepn
C39cC39I3g/ae6W1f0Sg3sPetWlf4xK+ZN8ybcyNHHvCikw4184q+6Kve299
MdAQIlzBcjTiHnx5fTmdTS+/m04Ku78IvrsXbbcucBX788/82lnLCkT91A0V
uRkOCpRDj5zE4TCDqfr2SDsgQlhwTcfmN4/vlV7Lm2/FZvpe2f7LwBGGG/qr
j5V2DP7ZM3zi681SCjuz0ehM3UKtoD3AnxIh9b4C/3Ps57XD9GlBXjdsx3B5
57zkYvEkIi/eQbpYW5hBfTXKX8u2VI3B9DUtuxDLIHaV5j4ZvXh98TT/7nyS
IhhzEJZznpe92R7D3NcB8iEboNqsLE/xDHTmC+W0LcDCGTEiThkas9eBCyJ+
RqPKvFmd4qlNq1Z2HKzq6nCPKiumQOyJ+RV+g2BPNdgbKaKXPAxBpBVSo0ql
uiJoAanu8FzwKJ4LHrOXWJJkWSTJ+BbcSEZoUf1067bb0V98O3lmJmT6yAcP
X3Fr0CjhgtuVnldTjZMVq3FauX6hH8F99by6J+3YAiRldVQWJwqBKirqpZO5
Q1Ls4skLUAOzEqUPHF4HsXpxndf/Or+EDxNtNjKtmxcbe7U15zzpZnRWTdhG
txwGVK7MlboeaXBH3wsuN0V/TFVMcohyLSUrLD4sT9XVqOajdprJaVPNU28D
6S78E4R0vIAPNFQpI3SiwKWuSwWktuacKm0Je0UVJ139GkVh20KCQkAEB4Qt
xhpberN7jvXrfMqe7QAioOsr5rKjeZTL22/wMXkWH42ycVEQRsiy3ldPiwCR
9+ESc2ddmihHZYEuupHM39bk5ZFuXa6q4jaNsxe9qS5Tih1hUxXFXPSFaVEv
Y1IvKlWJKkvpp1ZWVTjLCcJYlVHKBYf8BFLXJ6AeKAvQT6oBfaerI6uD4XRS
qAoT1lXQ7WpTI6u1OtYv0BVxSjttfTwZ1GkmnZnQXGkrwOrDkZIih1WkH1tk
pfSdng6yI+wAs0WqWXyqBCoos6stKaVk9JoanfXQzFE9A9cobgc4YRaV5Xmb
fEg/sIr12KLMarefS+HKrEwCoxdZFtZaFHQORfjjKKFTOKWMWFrCRIRVAowI
bVgWp737Jdi0OpGqe/OvSgHiCtHwdrp40QpEfYtFnmoKzSlZhjzia0HF1ugw
DuxoHgV4YoQlJAWeHaFy4RmZWohibWV1gibd7HEXUlFMsbBkYZKlm1mK6PEl
HgKtXF0wcg1pMlaAVI/Ybjk+WMO6BUQzB4ltpEvVoIyqcOoQW+KntHgZhAr7
JiellmN9KceGUOr6Krc0i21kNTU8dDyommkZDKzLUD7KhJn2JaWxq9LZIwlo
63xSna1t8FDP2nmopzq6UaqEted5VsV5nqlhTaBU5zzNssqq00iycUq0tu27
UPsZmY3BppEhqkFZLM7dSk+aSrW5cQDcFZ5z+8b6X8PPz9EOXwAA

-->

</rfc>
