BCP | Description | Author(s) | Status | Obsoleted by | Updated by |
---|---|---|---|---|---|
101 | Structure of the IETF Administrative Support Activity (IASA) | B. Haberman, J. Hall, J. Livingood, J. Arkko, T. Hardie, J. Klensin, Ed. | |||
102 | IAB Processes for Management of IETF Liaison Relationships | L. Daigle, Ed., Internet Architecture Board | |||
103 | Procedures for Handling Liaison Statements to and from the IETF | S. Trowbridge, S. Bradner, F. Baker | |||
104 | Terminology for Describing Internet Connectivity | J. Klensin | |||
105 | Embedding Globally-Routable Internet Addresses Considered Harmful | D. Plonka | |||
106 | Randomness Requirements for Security | D. Eastlake 3rd, J. Schiller, S. Crocker | |||
107 | Guidelines for Cryptographic Key Management | S. Bellovin, R. Housley | |||
108 | IP Performance Metrics (IPPM) Metrics Registry | E. Stephan | RFC 6248 | ||
109 | Deprecation of "ip6.int" | G. Huston | |||
110 | Tunneling Multiplexed Compressed RTP (TCRTP) | B. Thompson, T. Koren, D. Wing | |||
111 | Guidelines for Authors and Reviewers of MIB Documents | C. Heard, Ed. | |||
112 | Prioritized Treatment of Specific OSPF Version 2 Packets and Congestion Avoidance | G. Choudhury, Ed. | RFC 9454 | ||
114 | BGP Communities for Data Collection | D. Meyer | |||
116 | IANA Allocations for Pseudowire Edge to Edge Emulation (PWE3) | L. Martini | |||
117 | Interworking between the Session Initiation Protocol (SIP) and QSIG | J. Elwell, F. Derks, P. Mourot, O. Rousseau | RFC 8996 | ||
118 | Considerations for Lightweight Directory Access Protocol (LDAP) Extensions | K. Zeilenga | |||
119 | Session Initiation Protocol (SIP) Call Control - Conferencing for User Agents | A. Johnston, O. Levin | |||
120 | Source-Specific Protocol Independent Multicast in 232/8 | D. Meyer, R. Rockell, G. Shepherd | |||
121 | Multicast Source Discovery Protocol (MSDP) Deployment Scenarios | M. McBride, J. Meylor, D. Meyer | |||
122 | Classless Inter-domain Routing (CIDR): The Internet Address Assignment and Aggregation Plan | V. Fuller, T. Li | |||
123 | Observed DNS Resolution Misbehavior | M. Larson, P. Barber | RFC 9520 | ||
124 | Specifying Alternate Semantics for the Explicit Congestion Notification (ECN) Field | S. Floyd | RFC 6040 | ||
125 | Procedures for Protocol Extensions and Variations | S. Bradner, B. Carpenter, Ed., T. Narten | |||
126 | Operation of Anycast Services | J. Abley, K. Lindqvist | |||
127 | Network Address Translation (NAT) Behavioral Requirements for Unicast UDP | F. Audet, Ed., C. Jennings, S. Perreault, Ed., I. Yamagata, S. Miyakawa, A. Nakagawa, H. Ashida, R. Penno, S. Perreault, M. Boucadair, Ed., S. Sivakumar, K. Naito | |||
128 | Avoiding Equal Cost Multipath Treatment in MPLS Networks | G. Swallow, S. Bryant, L. Andersson | RFC 7274 | ||
129 | Change Process for Multiprotocol Label Switching (MPLS) and Generalized MPLS (GMPLS) Protocols and Procedures | L. Andersson, Ed., A. Farrel, Ed. | |||
130 | IANA Considerations for OSPF | K. Kompella, B. Fenner | |||
131 | Symmetric RTP / RTP Control Protocol (RTCP) | D. Wing | |||
132 | Guidance for Authentication, Authorization, and Accounting (AAA) Key Management | R. Housley, B. Aboba | |||
133 | Specifying New Congestion Control Algorithms | S. Floyd, M. Allman | |||
134 | Email Submission Operations: Access and Accountability Requirements | C. Hutzler, D. Crocker, P. Resnick, E. Allman, T. Finch | RFC 8314 | ||
135 | IP Multicast Requirements for a Network Address Translator (NAT) and a Network Address Port Translator (NAPT) | D. Wing, T. Eckert | |||
136 | Secure Connectivity and Mobility Using Mobile IPv4 and IKEv2 Mobility and Multihoming (MOBIKE) | V. Devarapalli, P. Eronen | |||
137 | ASCII Escaping of Unicode Characters | J. Klensin | |||
138 | A Registry for SMTP Enhanced Mail System Status Codes | T. Hansen, J. Klensin | |||
139 | Templates for Internet-Drafts Containing MIB Modules | D. Harrington, Ed. | |||
140 | Preventing Use of Recursive Nameservers in Reflector Attacks | J. Damas, F. Neves | |||
141 | IANA Considerations and IETF Protocol and Documentation Usage for IEEE 802 Parameters | D. Eastlake 3rd, J. Abley, Y. Li | |||
142 | NAT Behavioral Requirements for TCP | S. Guha, Ed., K. Biswas, B. Ford, S. Sivakumar, P. Srisuresh | RFC 7857 | ||
143 | Deployment Considerations for Lemonade-Compliant Mobile Email | R. Gellens | |||
144 | Session Initiation Protocol Service Examples | A. Johnston, Ed., R. Sparks, C. Cunningham, S. Donovan, K. Summers | |||
145 | UDP Usage Guidelines | L. Eggert, G. Fairhurst, G. Shepherd | RFC 8899 | ||
146 | Guidelines for Specifying the Use of IPsec Version 2 | S. Bellovin | |||
147 | Example Call Flows of Race Conditions in the Session Initiation Protocol (SIP) | M. Hasebe, J. Koshiko, Y. Suzuki, T. Yoshikawa, P. Kyzivat | |||
148 | NAT Behavioral Requirements for ICMP | P. Srisuresh, B. Ford, S. Sivakumar, S. Guha | RFC 7857 | ||
149 | Session Initiation Protocol (SIP) Call Control - Transfer | R. Sparks, A. Johnston, Ed., D. Petrie | |||
150 | Network Address Translation (NAT) Behavioral Requirements for the Datagram Congestion Control Protocol | R. Denis-Courmont | |||
151 | H.248/MEGACO Registration Procedures | C. Groves, Y. Lin | |||
152 | DNS Proxy Implementation Guidelines | R. Bellis | |||
153 | Special-Purpose IP Address Registries | J. Weil, V. Kuarsingh, C. Donley, C. Liljenstolpe, M. Azinger, M. Cotton, L. Vegoda, R. Bonica, Ed., B. Haberman | |||
154 | Considerations for Civic Addresses in the Presence Information Data Format Location Object (PIDF-LO): Guidelines and IANA Registry Definition | K. Wolf, A. Mayrhofer | |||
155 | Nameservers for IPv4 and IPv6 Reverse Zones | J. Abley, T. Manderson | |||
156 | Recommendations for Transport-Protocol Port Randomization | M. Larsen, F. Gont | |||
157 | IPv6 Address Assignment to End Sites | T. Narten, G. Huston, L. Roberts | |||
158 | RADIUS Design Guidelines | A. DeKok, Ed., G. Weber | RFC 6929, RFC 8044 | ||
159 | Reducing the TIME-WAIT State Using TCP Timestamps | F. Gont | |||
160 | An Architecture for Location and Location Privacy in Internet Applications | R. Barnes, M. Lepinski, A. Cooper, J. Morris, H. Tschofenig, H. Schulzrinne | |||
161 | Guidelines for the Use of the "OAM" Acronym in the IETF | L. Andersson, H. van Helvoort, R. Bonica, D. Romascanu, S. Mansfield | |||
162 | Logging Recommendations for Internet-Facing Servers | A. Durand, I. Gashinsky, D. Lee, S. Sheppard | |||
163 | Locally Served DNS Zones. | M | |||
164 | IANA Considerations for Network Layer Protocol Identifiers | D. Eastlake 3rd | |||
165 | Internet Assigned Numbers Authority (IANA) Procedures for the Management of the Service Name and Transport Protocol Port Number Registry | M. Cotton, L. Eggert, J. Touch, M. Westerlund, S. Cheshire | |||
166 | Terminology Used in Internationalization in the IETF | P. Hoffman, J. Klensin | |||
167 | DomainKeys Identified Mail (DKIM) and Mailing Lists | M. Kucherawy | |||
168 | IP Router Alert Considerations and Usage | F. Le Faucheur, Ed. | |||
169 | Unique Origin Autonomous System Numbers (ASNs) per Node for Globally Anycasted Services | D. McPherson, R. Donnelly, F. Scalzo | |||
170 | Guidelines for Considering New Performance Metric Development | A. Clark, B. Claise | |||
171 | Time to Remove Filters for Previously Unallocated IPv4 /8s | L. Vegoda | |||
172 | Recommendation for Not Using AS_SET and AS_CONFED_SET in BGP | W. Kumari, K. Sriram | |||
173 | Certificate Policy (CP) for the Resource Public Key Infrastructure (RPKI) | S. Kent, D. Kong, K. Seo, R. Watro | |||
174 | Certification Authority (CA) Key Rollover in the Resource Public Key Infrastructure (RPKI) | G. Huston, G. Michaelson, S. Kent | |||
175 | Procedures for Maintaining the Time Zone Database | E. Lear, P. Eggert | |||
176 | IP Performance Metrics (IPPM) Standard Advancement Testing | R. Geib, Ed., A. Morton, R. Fardid, A. Steinmitz | |||
177 | IPv6 Support Required for All IP-Capable Nodes | W. George, C. Donley, C. Liljenstolpe, L. Howard | |||
178 | Deprecating the "X-" Prefix and Similar Constructs in Application Protocols | P. Saint-Andre, D. Crocker, M. Nottingham | |||
179 | Deprecate DES, RC4-HMAC-EXP, and Other Weak Cryptographic Algorithms in Kerberos | L. Hornquist Astrand, T. Yu | |||
180 | DHCPv6 Redundancy Deployment Considerations | J. Brzozowski, J. Tremblay, J. Chen, T. Mrugalski | |||
181 | Best Current Practice for Communications Services in Support of Emergency Calling | B. Rosen, J. Polk | RFC 7840, RFC 7852 | ||
182 | Algorithm Agility Procedure for the Resource Public Key Infrastructure (RPKI) | R. Gagliano, S. Kent, S. Turner | |||
183 | A Uniform Resource Name (URN) Namespace for Examples | P. Saint-Andre | |||
184 | Guidelines for Authors and Reviewers of IP Flow Information Export (IPFIX) Information Elements | B. Trammell, B. Claise | |||
185 | Multicast in Virtual Private LAN Service (VPLS) | R. Aggarwal, Ed., Y. Kamite, L. Fang, Y. Rekhter, C. Kodeboniya, Y. Gilad, S. Goldberg, K. Sriram, J. Snijders, B. Maddison | |||
186 | Recommendations on Filtering of IPv4 Packets Containing IPv4 Options | F. Gont, R. Atkinson, C. Pignataro | |||
187 | Guidelines for Creating New DHCPv6 Options | D. Hankins, T. Mrugalski, M. Siodelski, S. Jiang, S. Krishnan | |||
188 | Pervasive Monitoring Is an Attack | S. Farrell, H. Tschofenig | |||
189 | An Acceptable Use Policy for New ICMP Types and Codes | M. Shore, C. Pignataro | |||
190 | URI Design and Ownership | M. Nottingham | |||
191 | IANA Considerations for Connectivity Fault Management (CFM) Code Points | D. Eastlake 3rd | |||
193 | Diameter Applications Design Guidelines | L. Morand, Ed., V. Fajardo, H. Tschofenig | |||
194 | BGP Operations and Security | J. Durand, I. Pepelnjak, G. Doering | |||
195 | Deprecating TLS 1.0 and TLS 1.1 | Y. Sheffer, R. Holz, P. Saint-Andre, K. Moriarty, S. Farrell, T | |||
196 | Deprecating the Anycast Prefix for 6to4 Relay Routers | O. Troan, B. Carpenter, Ed. | |||
197 | IETF Recommendations Regarding Active Queue Management | F. Baker, Ed., G. Fairhurst, Ed. | |||
198 | IPv6 Prefix Length Recommendation for Forwarding | M. Boucadair, A. Petrescu, F. Baker | |||
199 | DHCPv6-Shield: Protecting against Rogue DHCPv6 Servers | F. Gont, W. Liu, G. Van de Velde | |||
200 | IAB and IESG Statement on Cryptographic Technology and the Internet | IAB, IESG |