<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.21 (Ruby 2.6.10) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-rsalz-crypto-registries-00" category="bcp" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.24.0 -->
  <front>
    <title abbrev="IANA Crypto Registries">A Template for IANA Cryptographic Registries</title>
    <seriesInfo name="Internet-Draft" value="draft-rsalz-crypto-registries-00"/>
    <author initials="R." surname="Salz" fullname="Rich Salz">
      <organization>Akamai Technologies</organization>
      <address>
        <email>rsalz@akamai.com</email>
      </address>
    </author>
    <date year="2024" month="November" day="13"/>
    <area>Security</area>
    <workgroup>TBD</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <?line 45?>

<t>This document provides recommendations for how IETF Working Groups
should create IANA registries that are related to cryptographic
algorithms.
It is based on the lessons learned from the TLS registries over
the years.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-rsalz-crypto-registries/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        SAAG Security Area mailing list (<eref target="mailto:saag@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/saag/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/saag/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/rsalz/draft-rsalz-crypto-registries"/>.</t>
    </note>
  </front>
  <middle>
    <?line 53?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>This document provides recommendations for how IETF Working Groups
should create IANA registries that are related to cryptographic
algorithms.
It is based on the lessons learned from the TLS registries over
the years as described in <xref target="RFC8447"/> and <xref target="I-D.draft-ietf-tls-rfc8447bis"/>.</t>
      <t>The guidance here can be summarized as follows:</t>
      <ol spacing="normal" type="1"><li>
          <t>Each registry <bcp14>SHOULD</bcp14> be "Specification Required," as defined
in <xref section="4.6" sectionFormat="comma" target="RFC8126"/>.</t>
        </li>
        <li>
          <t>If required by the "Value" format (see <xref target="value-column"/>), consider reserving
a section for Private or Experimental Use.</t>
        </li>
        <li>
          <t>Each registry <bcp14>SHOULD</bcp14> have a "Recommended" column (see <xref target="recommended-column"/>).</t>
        </li>
        <li>
          <t>Each registry <bcp14>SHOULD</bcp14> have a "Comments" column (see <xref target="comments-column"/>).</t>
        </li>
        <li>
          <t>Most registries will need additional columns.</t>
        </li>
      </ol>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCPÂ 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="spec-required">
      <name>Specification Required</name>
      <t>The intent of the Specification Required standard for cryptographic code points
is to allow for relatively easy registration of code points associated with
protocols and algorithms that are being developed outside of
IETF or IRTF. A key requirement is that the specification of the semantics
must be "permanent and readily available" as described
in <xref section="4.6" sectionFormat="comma" target="RFC8126"/>.
The defining document should make explicit if Internet-Draft
documents qualify, as Section 4.6 does not say.
Authors of the defining document should read the entire <xref target="RFC8126"/>
and make sure their descriptions and requirements are clear.</t>
      <t>Note that the IESG picks the Designated Experts, so they should not be named
in the defining document. Instead, specify the number of experts and how many
are required to approve.  Phrases like "one of two" or "two of three" are
common requirements for approval.  The defining document <bcp14>SHOULD NOT</bcp14> suggest
one person, to avoid a single point of failure.</t>
      <t>Designated experts ensure the specification is publicly available.  They may
provide more in-depth reviews.  Their review should not be taken as an
endorsement of the new registry entry.</t>
      <t>When the work is done by an IETF WG or IRTF RG, that group should
collaborate with the defining WG in order to provide appropriate review.
A WG that defines a cryptographic registry <bcp14>MAY</bcp14> wish to include text like
the following in its instructions to the experts to enforce this
behavior.  Such instructions should appear in the defining document.</t>
      <dl>
        <dt>DE Instructions</dt>
        <dd>
          <t>Unless the WG chairs indicate otherwise via email, the Designated Experts
should decline code point registrations for documents which have already been
adopted or are being proposed for adoption by IETF working groups or IRTF
research groups.</t>
        </dd>
      </dl>
    </section>
    <section anchor="suggested-columns">
      <name>Suggested Columns</name>
      <t>Here is a summary of the recommendation; each column is described in its
own sub-section below. The following paragraph can be used as a
template when defining a registry.</t>
      <t>The columns are defined as follows:</t>
      <ul spacing="normal">
        <li>
          <t>Value (required):  The value that appears in the data structure or protocol.
Additional sentences that describe the format, such as fixed-number of
bytes, text string, etc., should be added.</t>
        </li>
        <li>
          <t>Description (required): A brief desription, often pointing to a section
in the defining Reference.</t>
        </li>
        <li>
          <t>Reference (required): The publication defining the entry.</t>
        </li>
        <li>
          <t>Recommended (required): Whether or not this value is recommended for
general use.</t>
        </li>
        <li>
          <t>Comments (optional): Text that may be added to explain transitions,
or similar useful information.</t>
        </li>
      </ul>
      <section anchor="value-column">
        <name>The "Value" column</name>
        <t>The "Value" column is the identifier for the cryptographic items in the
registry. Every value <bcp14>SHOULD</bcp14> be unique within the registry.  Values
<bcp14>SHOULD</bcp14> ONLYy be re-used because of earlier mistakes and if they still
guarantee there is little to no chance of confusion.</t>
        <t>Sometimes values are inherently unique. Example of this include ISO
Object Identifiers, and string identifiers like those in OpenSSH that
allow an identifier to have an "@domain-name" appended.  It is up to the
Working Group to decide if such values should be in a registry. Values
that would have a Recommended value of "Y" probably <bcp14>SHOULD</bcp14> appear.</t>
        <t>In some registries, such as TLS Cipher Suites <xref target="TLSREG"/>, the values are
one or more bytes, while NTP uses a single multi-byte value, while JOSE
uses short text names (<xref target="JOSEREG"/>), such as "s5c" for an X.509
certificate chain.</t>
        <t>If a name is not inherently unique, the defining WG <bcp14>MAY</bcp14> wish to set
aside a specific range or values for "Experimental or Private Use." It
does not seem necessary to separate "Experimental" from the "Private
Use" concept.  An example of private string identifiers from
<xref target="RFC6838"/>, Sections 3.2 and 3.4, are the previxes "vnd." and "x.",
respectively.</t>
        <t>Another reason for reserved values is for "greasing" the protocol,
to help prevent ossification by nework devices that do not allow
protocols to grow and evolve. See <xref target="RFC8701"/> for more information.
Such entries are often makred as "Reserved" in their Description, and
a reference to "RFC8710" in their reference.</t>
      </section>
      <section anchor="description-column">
        <name>The "Description" colummn</name>
        <t>The "Description" is a brief description of the item.
In many cases, it will be a short reminder text that should serve
as a "guidepost" to the reference documentation, as done with the
NTP Extension Field Types in the NTP Registries, <xref target="NTPREG"/>.</t>
      </section>
      <section anchor="reference-column">
        <name>The "Reference" column</name>
        <t>For work done in the IETF or IRTF, the "Reference" entry will almost
always point to a RFC about to be published.
For work done outside these organizations, the reference should be
a URL that the Designated Experts have verified to meet the requirements
of <xref target="spec-required"/>.</t>
      </section>
      <section anchor="recommended-column">
        <name>The "Recommended" column</name>
        <t>This document specifies that a "Recommended" column be defined, with
three values that correspond to yes, no, and no opinion.  Specifying an
initial value of "Y" or "D" in this column <bcp14>MUST</bcp14> require Standards Action
<xref target="RFC8126"/> for the defining RFC, otherwise the the field <bcp14>MUST</bcp14> be empty
or have the value of "N".
Not all
items defined in Standards Track RFCs need to be set to "Y" or "D".</t>
        <t>The entry <bcp14>SHOULD</bcp14> also be left blank for values that are unassigned or
reserved.</t>
        <dl>
          <dt>Y</dt>
          <dd>
            <t>Indicates that the IETF has consensus that the item is <bcp14>RECOMMENDED</bcp14>. This
only means that the associated mechanism is fit for the purpose for which it
was defined.  Careful reading of the documentation for the mechanism is
necessary to understand the applicability of that mechanism.  When the IETF
recommends mechanisms that have limited applicability, the working <bcp14>SHOULD</bcp14>
provide applicability statements that describe any limitations of the
mechanism or necessary constraints on its use.</t>
          </dd>
          <dt>D</dt>
          <dd>
            <t>Indicates that the item is discouraged. This marking could be used
to identify mechanisms that might result in problems if they are used,
such as a weak cryptographic algorithm or a mechanism that might cause
interoperability problems in deployment. Implementers <bcp14>SHOULD</bcp14> consult the
linked references associated with the item to determine the conditions
under which it <bcp14>SHOULD NOT</bcp14> or <bcp14>MUST NOT</bcp14> be used.</t>
          </dd>
          <dt>N</dt>
          <dd>
            <t>Indicates that the item has not been evaluated by the IETF and that
the IETF has made no statement about the suitability of the associated
mechanism. This does not necessarily mean that the mechanism is flawed,
only that no consensus exists.  The IETF might have consensus to leave
an items marked as "N" on the basis of it having limited applicability
or usage constraints.</t>
          </dd>
        </dl>
        <t>Once an entry is created, there are specific requirements to change
the value. Cryptographic algorithms become weaker over time, as more
attacks on them are defined.
Any state transition to or from a "Y" or "D" value requires IESG Approval.</t>
        <t>The following is text that can be used in the notes section of
any registry that has a "Recommended" column:</t>
        <dl>
          <dt>Note</dt>
          <dd>
            <t>If the "Recommended" column is set to "N", it does not necessarily mean
that it is flawed; but rather that the item either has not
been through the IETF consensus process, has limited applicability, or
is intended only for specific use cases.  If the "Recommended" column
is set to "D" the item is discouraged and <bcp14>SHOULD NOT</bcp14> or <bcp14>MUST NOT</bcp14> be used.
Defining a "Recommended" column value to "Y" or "D" requires Standards
Action <xref target="RFC8126"/>. Any state transition to or from a "Y" or "D"
value requires IESG Approval.</t>
          </dd>
        </dl>
      </section>
      <section anchor="comments-column">
        <name>The "Comments" Column</name>
        <t>This is a brief free-text column that can be used to describe
transitions or limits on usage.
Examples include:</t>
        <ul spacing="normal">
          <li>
            <t>Obsoleted by RFC xxx</t>
          </li>
          <li>
            <t>Only for TLS 1.3 or later</t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>Using Specification Required rather than IETF Review does, admittedly,
lower the theoretical amount of review provided by a WG.  Experience has
shown, however, that WG members generally provided no cryptographic
review, especially in the case of referring to national cipher suites.</t>
      <t>Recommended algorithms are regarded as secure for general use at the time of
registration, Over time, however, cryptographic algorithms and parameters
will be broken or weakened.  It is possible that the "Recommended" status in
the registry lags behind the most recent advances in cryptanalysis.
Implementers and users need to check that the cryptographic algorithms listed
continue to provide the expected level of security.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document is entirely about best practices for IANA-maintained
cryptographic registries.
It does not define any new registries but provides guidance to
those who need to do so.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8126">
          <front>
            <title>Guidelines for Writing an IANA Considerations Section in RFCs</title>
            <author fullname="M. Cotton" initials="M." surname="Cotton"/>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <author fullname="T. Narten" initials="T." surname="Narten"/>
            <date month="June" year="2017"/>
            <abstract>
              <t>Many protocols make use of points of extensibility that use constants to identify various protocol parameters. To ensure that the values in these fields do not have conflicting uses and to promote interoperability, their allocations are often coordinated by a central record keeper. For IETF protocols, that role is filled by the Internet Assigned Numbers Authority (IANA).</t>
              <t>To make assignments in a given registry prudently, guidance describing the conditions under which new values should be assigned, as well as when and how modifications to existing values can be made, is needed. This document defines a framework for the documentation of these guidelines by specification authors, in order to assure that the provided guidance for the IANA Considerations is clear and addresses the various issues that are likely in the operation of a registry.</t>
              <t>This is the third edition of this document; it obsoletes RFC 5226.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="26"/>
          <seriesInfo name="RFC" value="8126"/>
          <seriesInfo name="DOI" value="10.17487/RFC8126"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
        <reference anchor="RFC6838">
          <front>
            <title>Media Type Specifications and Registration Procedures</title>
            <author fullname="N. Freed" initials="N." surname="Freed"/>
            <author fullname="J. Klensin" initials="J." surname="Klensin"/>
            <author fullname="T. Hansen" initials="T." surname="Hansen"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines procedures for the specification and registration of media types for use in HTTP, MIME, and other Internet protocols. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="13"/>
          <seriesInfo name="RFC" value="6838"/>
          <seriesInfo name="DOI" value="10.17487/RFC6838"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="JOSEREG" target="https://www.iana.org/assignments/jose/jose.xhtml#web-signature-encryption-header-parameters">
          <front>
            <title>JSON Web Signature and Encryption Header Parameters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="NTPREG" target="https://www.iana.org/assignments/ntp-parameters/ntp-parameters.xhtml#ntp-parameters-3">
          <front>
            <title>Network Time Protocol (NTP) Parameters</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TLSREG" target="https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-4">
          <front>
            <title>TLS Cipher Suites</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="RFC8447">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy. These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="I-D.draft-ietf-tls-rfc8447bis">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="Joseph A. Salowey" initials="J. A." surname="Salowey">
              <organization>Venafi</organization>
            </author>
            <author fullname="Sean Turner" initials="S." surname="Turner">
              <organization>sn3rd</organization>
            </author>
            <date day="3" month="November" year="2024"/>
            <abstract>
              <t>   This document updates the changes to TLS and DTLS IANA registries
   made in RFC 8447.  It adds a new value "D" for discouraged to the
   recommended column of the selected TLS registries and adds a
   "Comments" column to all active registries.

   This document updates the following RFCs: 3749, 5077, 4680, 5246,
   5705, 5878, 6520, 7301, and 8447.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-rfc8447bis-10"/>
        </reference>
        <reference anchor="RFC8701">
          <front>
            <title>Applying Generate Random Extensions And Sustain Extensibility (GREASE) to TLS Extensibility</title>
            <author fullname="D. Benjamin" initials="D." surname="Benjamin"/>
            <date month="January" year="2020"/>
            <abstract>
              <t>This document describes GREASE (Generate Random Extensions And Sustain Extensibility), a mechanism to prevent extensibility failures in the TLS ecosystem. It reserves a set of TLS protocol values that may be advertised to ensure peers correctly handle unknown values.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8701"/>
          <seriesInfo name="DOI" value="10.17487/RFC8701"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
