<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 3.4.8) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-barnes-tls-this-could-have-been-an-email-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="No More Crypto">Stop Doing Cryptographic Algorithm Drafts when Email to IANA is All You Need</title>
    <seriesInfo name="Internet-Draft" value="draft-barnes-tls-this-could-have-been-an-email-00"/>
    <author fullname="Richard Barnes">
      <organization>Cisco</organization>
      <address>
        <email>rlb@ipv.sx</email>
      </address>
    </author>
    <date year="2026" month="February" day="24"/>
    <area>Security</area>
    <workgroup>Transport Layer Security</workgroup>
    <keyword>next generation</keyword>
    <keyword>unicorn</keyword>
    <keyword>sparkling distributed ledger</keyword>
    <abstract>
      <?line 38?>

<t>People keep pitching drafts to the TLS Working Group where the only thing the
draft does is register a code point for a cryptographic algorithm.  Stop doing
that.  It's unnecessary.  Write an email to IANA instead.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://bifurcation.github.io/no-more-crypto/draft-barnes-tls-this-could-have-been-an-email.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-barnes-tls-this-could-have-been-an-email/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transport Layer Security Working Group mailing list (<eref target="mailto:tls@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tls/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tls/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/bifurcation/no-more-crypto"/>.</t>
    </note>
  </front>
  <middle>
    <?line 44?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>There used to be a grand tradition of debating the merits of cryptographic
algorithms in the TLS working group.  Over time, folks realized that this was
not a productive use of the WG's time.  The typical TLS WG participant is not a
cryptographer, and the cryptographic choices of TLS users are typically dictated
by other factors than the opinion of the TLS WG.</t>
      <t>As a result, <xref target="RFC8447"/> loosened the registration policy on the TLS registries
to Specification Required, with a very limited carve-outs related to the
"Recommended" column.  As a result, anyone can register a code point for a
cryptographic algorithm with a stable public specification, without having to
convince the TLS WG of anything.  Registration is as simple as one email to
<eref target="mailto:iana@iana.org">iana@iana.org</eref>.</t>
      <t>This document proposes that the TLS WG adopt a restrictive policy that if the
only thing a document does could be done without the WG, that document will not
be adopted.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="when-are-crypto-documents-ok">
      <name>When Are Crypto Documents OK?</name>
      <t>The registry policies in <xref target="RFC8447"/> define a few specific things that require
working group action.</t>
      <ul spacing="normal">
        <li>
          <t>Initial registration with Recommended=Y</t>
        </li>
        <li>
          <t>Changing the value of the Recommended column to "Y" or "D" from something else</t>
        </li>
        <li>
          <t>Changing the value of the Recommended column from "Y" or "D" to something else</t>
        </li>
      </ul>
      <t>Unless a document does one of these things it <bcp14>MUST NOT</bcp14> be adopted by the WG.
Even if there are additional technical details to be specified, the proponents
can publish their own specification; even an individual -00 Internet-draft meets
IANA's criteria for a stable, public specification.</t>
      <t>For example:</t>
      <ul spacing="normal">
        <li>
          <t><xref target="I-D.ietf-tls-mlkem"/> and <xref target="I-D.ietf-tls-mldsa"/> define technical details,
but do not request Recommended=Y.  The authors could have simply published
these details on their own (e.g., in an individual Internet-draft) and
requested code points.</t>
        </li>
        <li>
          <t><xref target="I-D.reddy-tls-slhdsa"/> simply registers SLH-DSA code points, pointing to
the existing FIPS documents for all technical details.  Nonetheless, it has
consumed a significant amount of WG time, including multiple challenges and
appeals.</t>
        </li>
      </ul>
      <t>Authors that just want to register a code point should skip the working group
and go directly to IANA.  It's easier, it's faster, and it won't waste a bunch
of other folks' time in the working group.</t>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The policy proposed in this document has no impact on security.  The registry
policies already allow any algorithm with a specification to be registered.
Let's just not spend the WG's time debating things that the WG doesn't need to
opine on.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.  Ironically.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC8447">
          <front>
            <title>IANA Registry Updates for TLS and DTLS</title>
            <author fullname="J. Salowey" initials="J." surname="Salowey"/>
            <author fullname="S. Turner" initials="S." surname="Turner"/>
            <date month="August" year="2018"/>
            <abstract>
              <t>This document describes a number of changes to TLS and DTLS IANA registries that range from adding notes to the registry all the way to changing the registration policy. These changes were mostly motivated by WG review of the TLS- and DTLS-related registries undertaken as part of the TLS 1.3 development process.</t>
              <t>This document updates the following RFCs: 3749, 5077, 4680, 5246, 5705, 5878, 6520, and 7301.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8447"/>
          <seriesInfo name="DOI" value="10.17487/RFC8447"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="I-D.ietf-tls-mlkem">
          <front>
            <title>ML-KEM Post-Quantum Key Agreement for TLS 1.3</title>
            <author fullname="Deirdre Connolly" initials="D." surname="Connolly">
              <organization>SandboxAQ</organization>
            </author>
            <date day="12" month="February" year="2026"/>
            <abstract>
              <t>   This memo defines ML-KEM-512, ML-KEM-768, and ML-KEM-1024 as
   NamedGroups and and registers IANA values in the TLS Supported Groups
   registry for use in TLS 1.3 to achieve post-quantum (PQ) key
   establishment.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-mlkem-07"/>
        </reference>
        <reference anchor="I-D.ietf-tls-mldsa">
          <front>
            <title>Use of ML-DSA in TLS 1.3</title>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="Sophie Schmieg" initials="S." surname="Schmieg">
              <organization>Google</organization>
            </author>
            <author fullname="Bas Westerbaan" initials="B." surname="Westerbaan">
              <organization>Cloudflare</organization>
            </author>
            <date day="26" month="September" year="2025"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme ML-DSA
   (FIPS 204) is used for authentication in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-tls-mldsa-01"/>
        </reference>
        <reference anchor="I-D.reddy-tls-slhdsa">
          <front>
            <title>Use of SLH-DSA in TLS 1.3</title>
            <author fullname="Tirumaleswar Reddy.K" initials="T." surname="Reddy.K">
              <organization>Nokia</organization>
            </author>
            <author fullname="Tim Hollebeek" initials="T." surname="Hollebeek">
              <organization>DigiCert</organization>
            </author>
            <author fullname="John Gray" initials="J." surname="Gray">
              <organization>Entrust Limited</organization>
            </author>
            <author fullname="Scott Fluhrer" initials="S." surname="Fluhrer">
              <organization>Cisco Systems</organization>
            </author>
            <date day="17" month="November" year="2025"/>
            <abstract>
              <t>   This memo specifies how the post-quantum signature scheme SLH-DSA
   [FIPS205] is used for authentication in TLS 1.3.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-reddy-tls-slhdsa-02"/>
        </reference>
      </references>
    </references>
  </back>
  <!-- ##markdown-source:
H4sIAAAAAAAAA5VX23IbuRF9x1cg9IOTLQ612qhqN4xjm9bFZkUXR5LL5Url
ATPTJBHNABMAQ5qr2n/Zb8mX5TQwQ3IsJal9kDgDAo3u06dPN7MsE0GHiqZy
dBdsI8+sNkt56rZNsEunmpUu5KxaWqfDqpZnTi2Cl5sVGXleK13JYOV8dj2T
2mNbJb/YVl4TlSOh8tzRGmavrbyyjjqbI1GoQLC3nUptFlaI0hZG1XCgZONZ
rpwhn4UKfyvts8K2VZmt1JqynMhkymTEN2fffy98m9fae21N2DawMD+/v5Dy
hVSVt7hZm5Iawj8TRmM5olIHxKEqfpnP3uHDOjzd3l+MhGnrnNxUlPBuKgpr
PBnf+qkMriWBOP4olCPFMFHRAo3tSGyse1g62zZYvXfK+Ma6IC/Vlpzc73qg
LTaWUyEzaehrkEsy5FSA17zUGl1YFx99o9xDxfiX2gen8zZQKSsql+TEmkwL
z6T8/zdKmeAYfYaDbO49H+F1Bg7rAPetprCYWLfkZeWKFZZXITR+enTEu3hJ
r2nSbzvihaPc2Y2nI5w/4nNLkKLNcTLXi9YVMaYjY7Ma+c6KLt9SVsDUh4ML
DrZPko2Jtt8cPPptdJisQl2NhFBtWFnHYONiKRdtVSV23epipVwp30WD8UuE
pYz+OfoxlafaFzauU4LJVflb3awn/qsQxroa+9bIgGDa7t8mk4kQWZZJlSNn
qghCfCTbVCQfiBrZ6AAgOaWpdFAvYUXy/vJODrLDNYUi4e+sqbZ44K/wKuJB
WVryXGSOluAG0q1kYUuSDeo1SDjEC4OqVX3VTqSMpV1yaYuwUgEr8/DSg3uG
CvJeuS2WPmM3SWVS/PvKNrhPlV2UtS7LioR4IecmOFu2RSSyuI/utx6ExcEc
dkBUZfDmFOoOe6RdyJJy4JYCkzXhQs/LA8fFznEEbHZobTq0Iv3h7c0aIARd
0xjRVw+MjKr0z3w/ImT8oFPKI3MBvjSdq+voI9/Jdj+/BwhsA/YQAJeNLlSV
svNeohyDLnSjgDCsRUviwFdyYxlDxNEh9sXKagDL97AtXOk8qmx3AxJc6iKg
LkqRb6WFBScXII/FPvifwraNNh1wO868Rx5msIVwfVuFsXx8/N3txelPJyc/
/vKLrKyFblFyKVElKQ14UukCN+0B7b7WKAZk7K6hQi90Kkp5S/9qtaNyLDdI
BG4D2FtZ6VqzIhXKofxsGxh0Lu6yo7UY3VJh65o1txyBoFVbG2A7cFiZrTUA
DEH+DzKL/0Lm3iEfVI4aa9occUE5D7xPTsM9CZmIZLMs6Hgs6ABIhhW+xEKD
j7eHaCHbykuva65jPLHDfVWIV1oZ9Zb/sTC+njD5cQB9rEXkgbnWIA2+J+Lu
QlXaJiQkgHtiY5eXuFXHPIuD+ld7q1EAovpxdZXsUR9movI4Gdkd2Gj0Y3BW
cDHyzcQ1/EKeAgp8jzB9ZO8ZLUCz+B7LGLq15WorvRxdfbq7527Jn/L6Jj7f
nv/t0/z2/Iyf7z7MLi93D6Lbcffh5tPl2f5pf/L05urq/PosHcaqHCyJ0dXs
yyjV1Ojm4/385np2OUoicAhwLKQoMqALucYRUxC1XpIv0DbxgjPvTj/++9fj
k65Afjg+/hMKpKuW4x9P8MJjTLotQp5eAeZWqKYh5dgKahVUhYpjphhHUqzs
xkhWO6D53d8ZmX9M5au8aI5PXncLHPBgscdssBgxe7ry5HAC8ZmlZ67ZoTlY
/wbpob+zL4P3HveDxVdvMJSQzI5/evNaMIU+8/w32810GBpTZry8+eubRKJO
XbaJ4Jqilj8+7qWqZNpxm1jQZle/ifZd5bgkQmKg/FLFhsPYowOBtpDrgdBF
fTiQob98wc5TSOqy7ztrVbW7FnCws9MrptboyyjOhmcjuXC2lt7WlCqSKk+/
1WA0cWASF3xjUHwyFfrwk3rnKk92PfXY6CB7jsl9act82+nARJyjvjsxQY64
WlSZejDAClSsTOxyJQUomu9KqUsBaz7biSJmOKeClTrqrF/xV9pJroCB5P5Z
Et+JjZi59VqXLexjQuchgTBvhSxNMTURDPJYgcZb8LyBebybXpKij5+VdKT7
Apvoq2JFnnLyHx/fzLOzOJ/G6bCuHqgGr7icn35XerXn3BMIxhj7MGwD89jk
mXiQ6CGLuhEhzZe9EvMcmtrEtocIHV12CesBTk23w+33NFlOxlFaBmgNkfoD
xwFDnSuRS32D9JOD+NGky20M0lerFGXnT99cvby7/JCd3c0OTYzTZ9cdo8NA
F/t55WL+8W5HRJ/SUz3DHEByDY7gLJN3zMxcKR6t+ecTDpecVb00MY2s27Vt
8QFCoxmm0Q09uWpLvrTGcKC53WJMryoyS/IdBlGMK4561oEf5eGfLVK0Ybsg
8POTBLSas+QfdBMjHCiJYKYsLQYxR0XglpsG3n44JuU1T3iaXxaKradmgTA3
1rzkyz0PzKCOKVYCYXVzHI+jL2OA/QA7HF5ZQvtfa9yOvS67H4RdB+6Ggm6Q
KJ92QMAMpkokGnLI/PKduY6lvfqKnfqqCvNxueVE2g3PPc+MVIMRMKlCjyvP
DpfESETYuUo8/7QejtGH8/1ex9OWKGiMmqE4LwqebvnHToQj/tJ4CsUzMced
qQkwAefOmjRRdz9QclU8iP8AcoIjwdcQAAA=

-->

</rfc>
