Internet Engineering Task Force (IETF)                           R. Salz
Request for Comments: 9851                           Akamai Technologies
Category: Standards Track                                      N. Aviram
ISSN: 2070-1721                                             January 2026

                      TLS 1.2 is in Feature Freeze

Abstract

   Use of TLS 1.3, which fixes some known deficiencies in TLS 1.2, is
   growing.  This document specifies that no changes will be approved
   for TLS 1.2 outside of urgent security fixes (as determined by TLS
   Working Group consensus), new TLS Exporter Labels, and new
   Application-Layer Protocol Negotiation (ALPN) Protocol IDs, no changes will be approved for TLS 1.2. IDs.  This
   prescription pertains
   applies to TLS only; it does not pertain apply to DTLS (in any DTLS version).

Status of This Memo

   This is an Internet Standards Track document.

   This document is a product of the Internet Engineering Task Force
   (IETF).  It represents the consensus of the IETF community.  It has
   received public review and has been approved for publication by the
   Internet Engineering Steering Group (IESG).  Further information on
   Internet Standards is available in Section 2 of RFC 7841.

   Information about the current status of this document, any errata,
   and how to provide feedback on it may be obtained at
   https://www.rfc-editor.org/info/rfc9851.

Copyright Notice

   Copyright (c) 2026 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (https://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Revised BSD License text as described in Section 4.e of the
   Trust Legal Provisions and are provided without warranty as described
   in the Revised BSD License.

Table of Contents

   1.  Introduction
   2.  Implications for Post-Quantum Cryptography (PQC)
   3.  Security Considerations
   4.  IANA Considerations
   5.  References
     5.1.  Normative References
     5.2.  Informative References
   Acknowledgments
   Authors' Addresses

1.  Introduction

   TLS 1.3 [TLS13] fixes most known deficiencies with TLS 1.2 [TLS12]
   and its use is growing.  Some examples of the fixes include
   encrypting more of the traffic so that it is not readable by
   outsiders and removing most cryptographic primitives that are now
   considered weak.  Importantly, TLS 1.3 enjoys robust security proofs.

   Both versions have several extension points.  Items like new
   cryptographic algorithms, new supported groups (formerly "named
   curves"), etc., can be added without defining a new protocol.  This
   document specifies that no changes will be approved for TLS 1.2
   outside of urgent security fixes (as determined by TLS Working Group
   consensus) and the exceptions listed in Section 4, no changes will be approved for TLS 1.2. 4.

   This prescription pertains applies to TLS only.  As such, it does not pertain apply to DTLS, in any
   DTLS version.

2.  Implications for Post-Quantum Cryptography (PQC)

   Cryptographically relevant quantum computers, once available, are
   likely to greatly lessen the time and effort needed to break RSA,
   finite-field-based Diffie-Hellman (FFDH), or Elliptic Curve
   Cryptography (ECC) which are currently used in TLS.  In 2016, the US
   National Institute of Standards and Technology (NIST) started a
   multi-year effort to standardize algorithms that will be "safe" once
   quantum computers are feasible [PQC].  Initial discussions in the
   IETF community happened around the same time [CFRGSLIDES].

   In 2024, NIST released standards for [ML-KEM], [ML-DSA], and
   [SLH-DSA].  Many other countries and organizations are publishing
   their roadmaps, including the multi-national standards organization
   ETSI [ETSI].

   While the industry was waiting for NIST to finish standardization,
   the IETF has had several efforts underway.  A working group was
   formed in early 2023 to work on the use of Post-Quantum Cryptography
   (PQC) in IETF protocols [PQUIPWG].  Several other working groups,
   including TLS [TLSWG], are working on specifications to support
   hybrid algorithms and identifiers, for use during a transition from
   classic to a post-quantum world.

   It is important to note that effort within the TLS Working Group is
   focused exclusively on TLS 1.3 or later.  Put bluntly, PQC for TLS
   1.2 will not be specified (see Section 4) at any time; anyone wishing
   to deploy PQC should expect to use TLS 1.3.

3.  Security Considerations

   This entire document is about security and provides post-quantum
   security concerns as an additional reason to upgrade to TLS 1.3.

4.  IANA Considerations

   No TLS registries [TLS13REG] are being closed by this document.
   Rather, this document modifies the instructions to IANA and the TLS
   Designated Experts to constrain the type of entries that can be added
   to existing registries.

   This document does not introduce any new limitations on the
   registrations for either of the following two registries:

   *  TLS Application-Layer Protocol Negotiation (ALPN) Protocol IDs

   *  TLS Exporter Labels

   The following note has been added to the other TLS registries:

   |  Any TLS entry added after the IESG approves publication of RFC
   |  9851 is intended for TLS 1.3 or later, and makes no similar
   |  requirement on DTLS.  Such entries should have an informal
   |  indication like "For TLS 1.3 or later" in that entry, such as the
   |  "Comment" column.

   At the time of publication, the note has been added to the following
   TLS registries:

   *  TLS Alerts

   *  TLS Authorization Data Formats

   *  TLS CachedInformationType Values

   *  TLS Certificate Compression Algorithm IDs

   *  TLS Certificate Status Types

   *  TLS Certificate Types

   *  TLS Cipher Suites

   *  TLS ClientCertificateType Identifiers

   *  TLS ContentType

   *  TLS EC Curve Types

   *  TLS EC Point Formats

   *  TLS ExtensionType Values

   *  TLS HandshakeType

   *  TLS HashAlgorithm

   *  TLS Heartbeat Message Types

   *  TLS Heartbeat Modes

   *  TLS KDF Identifiers

   *  TLS PskKeyExchangeMode

   *  TLS SignatureAlgorithm

   *  TLS SignatureScheme

   *  TLS Supplemental Data Formats (SupplementalDataType)

   *  TLS Supported Groups

   *  TLS UserMappingType Values

   Any TLS registry created after this document is approved for
   publication should indicate whether the actions defined here are
   applicable.

5.  References

5.1.  Normative References

   [TLS12]    Dierks, T. and E. Rescorla, "The Transport Layer Security
              (TLS) Protocol Version 1.2", RFC 5246,
              DOI 10.17487/RFC5246, August 2008,
              <https://www.rfc-editor.org/info/rfc5246>.

   [TLS13]    Rescorla, E., "The Transport Layer Security (TLS) Protocol
              Version 1.3", RFC 9846, DOI 10.17487/RFC9846, January
              2026, <https://www.rfc-editor.org/info/rfc9846>.

   [TLS13REG] Salowey, J. and S. Turner, "IANA Registry Updates for TLS
              and DTLS", RFC 9847, DOI 10.17487/RFC9847, December 2025,
              <https://www.rfc-editor.org/info/rfc9847>.

5.2.  Informative References

   [CFRGSLIDES]
              McGrew, D., "Post Quantum Secure Cryptography Discussion",
              IETF 95 Proceedings, April 2016,
              <https://www.ietf.org/proceedings/95/slides/slides-95-
              cfrg-4.pdf>.

   [ETSI]     ETSI, "CYBER; Migration strategies and recommendations to
              Quantum Safe schemes", Version 1.1.1, ETSI TR 103 619,
              July 2020, <https://www.etsi.org/deliver/
              etsi_tr/103600_103699/103619/01.01.01_60/
              tr_103619v010101p.pdf>.

   [ML-DSA]   NIST, "Module-Lattice-Based Digital Signature Standard",
              NIST FIPS 204, DOI 10.6028/NIST.FIPS.204, August 2024,
              <https://csrc.nist.gov/pubs/fips/204/final>.

   [ML-KEM]   NIST, "Module-Lattice-Based Key-Encapsulation Mechanism
              Standard", NIST FIPS 203, DOI 10.6028/NIST.FIPS.203,
              August 2024, <https://csrc.nist.gov/pubs/fips/203/final>.

   [PQC]      NIST, "Post-Quantum Cryptography (PQC)", January 2017,
              <https://csrc.nist.gov/projects/post-quantum-
              cryptography>.

   [PQUIPWG]  IETF, "Post-Quantum Use in Protocols",
              <https://datatracker.ietf.org/wg/pquip/about/>.

   [SLH-DSA]  NIST, "Stateless Hash-Based Digital Signature Standard",
              NIST FIPS 205, DOI 10.6028/NIST.FIPS.205, August 2024,
              <https://csrc.nist.gov/pubs/fips/205/final>.

   [TLSWG]    IETF, "Transport Layer Security",
              <https://datatracker.ietf.org/wg/tls/about/>.

Acknowledgments

   We gratefully acknowledge Amanda Baber, David Dong, and Sabrina
   Tanamal of IANA for their help in revising and clarifying Section 4.

Authors' Addresses

   Rich Salz
   Akamai Technologies
   Email: rsalz@akamai.com

   Nimrod Aviram
   Email: nimrod.aviram@gmail.com