Skip to main content

Stop Doing Cryptographic Algorithm Drafts when Email to IANA is All You Need
draft-barnes-tls-this-could-have-been-an-email-00

Document Type Active Internet-Draft (individual)
Author Richard Barnes
Last updated 2026-02-23
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state I-D Exists
Telechat date (None)
Responsible AD (None)
Send notices to (None)
draft-barnes-tls-this-could-have-been-an-email-00
Transport Layer Security                                       R. Barnes
Internet-Draft                                                     Cisco
Intended status: Informational                          24 February 2026
Expires: 28 August 2026

Stop Doing Cryptographic Algorithm Drafts when Email to IANA is All You
                                  Need
           draft-barnes-tls-this-could-have-been-an-email-00

Abstract

   People keep pitching drafts to the TLS Working Group where the only
   thing the draft does is register a code point for a cryptographic
   algorithm.  Stop doing that.  It's unnecessary.  Write an email to
   IANA instead.

About This Document

   This note is to be removed before publishing as an RFC.

   The latest revision of this draft can be found at
   https://bifurcation.github.io/no-more-crypto/draft-barnes-tls-this-
   could-have-been-an-email.html.  Status information for this document
   may be found at https://datatracker.ietf.org/doc/draft-barnes-tls-
   this-could-have-been-an-email/.

   Discussion of this document takes place on the Transport Layer
   Security Working Group mailing list (mailto:tls@ietf.org), which is
   archived at https://mailarchive.ietf.org/arch/browse/tls/.  Subscribe
   at https://www.ietf.org/mailman/listinfo/tls/.

   Source for this draft and an issue tracker can be found at
   https://github.com/bifurcation/no-more-crypto.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at https://datatracker.ietf.org/drafts/current/.

Barnes                   Expires 28 August 2026                 [Page 1]
Internet-Draft               No More Crypto                February 2026

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on 28 August 2026.

Copyright Notice

   Copyright (c) 2026 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents (https://trustee.ietf.org/
   license-info) in effect on the date of publication of this document.
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.  Code Components
   extracted from this document must include Revised BSD License text as
   described in Section 4.e of the Trust Legal Provisions and are
   provided without warranty as described in the Revised BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Conventions and Definitions . . . . . . . . . . . . . . . . .   3
   3.  When Are Crypto Documents OK? . . . . . . . . . . . . . . . .   3
   4.  Security Considerations . . . . . . . . . . . . . . . . . . .   4
   5.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   4
   6.  References  . . . . . . . . . . . . . . . . . . . . . . . . .   4
     6.1.  Normative References  . . . . . . . . . . . . . . . . . .   4
     6.2.  Informative References  . . . . . . . . . . . . . . . . .   4
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .   5

1.  Introduction

   There used to be a grand tradition of debating the merits of
   cryptographic algorithms in the TLS working group.  Over time, folks
   realized that this was not a productive use of the WG's time.  The
   typical TLS WG participant is not a cryptographer, and the
   cryptographic choices of TLS users are typically dictated by other
   factors than the opinion of the TLS WG.

Barnes                   Expires 28 August 2026                 [Page 2]
Internet-Draft               No More Crypto                February 2026

   As a result, [RFC8447] loosened the registration policy on the TLS
   registries to Specification Required, with a very limited carve-outs
   related to the "Recommended" column.  As a result, anyone can
   register a code point for a cryptographic algorithm with a stable
   public specification, without having to convince the TLS WG of
   anything.  Registration is as simple as one email to iana@iana.org
   (mailto:iana@iana.org).

   This document proposes that the TLS WG adopt a restrictive policy
   that if the only thing a document does could be done without the WG,
   that document will not be adopted.

2.  Conventions and Definitions

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
   "OPTIONAL" in this document are to be interpreted as described in
   BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
   capitals, as shown here.

3.  When Are Crypto Documents OK?

   The registry policies in [RFC8447] define a few specific things that
   require working group action.

   *  Initial registration with Recommended=Y

   *  Changing the value of the Recommended column to "Y" or "D" from
      something else

   *  Changing the value of the Recommended column from "Y" or "D" to
      something else

   Unless a document does one of these things it MUST NOT be adopted by
   the WG.  Even if there are additional technical details to be
   specified, the proponents can publish their own specification; even
   an individual -00 Internet-draft meets IANA's criteria for a stable,
   public specification.

   For example:

   *  [I-D.ietf-tls-mlkem] and [I-D.ietf-tls-mldsa] define technical
      details, but do not request Recommended=Y.  The authors could have
      simply published these details on their own (e.g., in an
      individual Internet-draft) and requested code points.

Barnes                   Expires 28 August 2026                 [Page 3]
Internet-Draft               No More Crypto                February 2026

   *  [I-D.reddy-tls-slhdsa] simply registers SLH-DSA code points,
      pointing to the existing FIPS documents for all technical details.
      Nonetheless, it has consumed a significant amount of WG time,
      including multiple challenges and appeals.

   Authors that just want to register a code point should skip the
   working group and go directly to IANA.  It's easier, it's faster, and
   it won't waste a bunch of other folks' time in the working group.

4.  Security Considerations

   The policy proposed in this document has no impact on security.  The
   registry policies already allow any algorithm with a specification to
   be registered.  Let's just not spend the WG's time debating things
   that the WG doesn't need to opine on.

5.  IANA Considerations

   This document has no IANA actions.  Ironically.

6.  References

6.1.  Normative References

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119,
              DOI 10.17487/RFC2119, March 1997,
              <https://www.rfc-editor.org/rfc/rfc2119>.

   [RFC8174]  Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
              2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
              May 2017, <https://www.rfc-editor.org/rfc/rfc8174>.

   [RFC8447]  Salowey, J. and S. Turner, "IANA Registry Updates for TLS
              and DTLS", RFC 8447, DOI 10.17487/RFC8447, August 2018,
              <https://www.rfc-editor.org/rfc/rfc8447>.

6.2.  Informative References

   [I-D.ietf-tls-mldsa]
              Hollebeek, T., Schmieg, S., and B. Westerbaan, "Use of ML-
              DSA in TLS 1.3", Work in Progress, Internet-Draft, draft-
              ietf-tls-mldsa-01, 26 September 2025,
              <https://datatracker.ietf.org/doc/html/draft-ietf-tls-
              mldsa-01>.

Barnes                   Expires 28 August 2026                 [Page 4]
Internet-Draft               No More Crypto                February 2026

   [I-D.ietf-tls-mlkem]
              Connolly, D., "ML-KEM Post-Quantum Key Agreement for TLS
              1.3", Work in Progress, Internet-Draft, draft-ietf-tls-
              mlkem-07, 12 February 2026,
              <https://datatracker.ietf.org/doc/html/draft-ietf-tls-
              mlkem-07>.

   [I-D.reddy-tls-slhdsa]
              Reddy.K, T., Hollebeek, T., Gray, J., and S. Fluhrer, "Use
              of SLH-DSA in TLS 1.3", Work in Progress, Internet-Draft,
              draft-reddy-tls-slhdsa-02, 17 November 2025,
              <https://datatracker.ietf.org/doc/html/draft-reddy-tls-
              slhdsa-02>.

Author's Address

   Richard Barnes
   Cisco
   Email: rlb@ipv.sx

Barnes                   Expires 28 August 2026                 [Page 5]