| BCP | Description | Author(s) | Status | Obsoleted by | Updated by |
|---|---|---|---|---|---|
| 201 | Guidelines for Cryptographic Algorithm Agility and Selecting Mandatory-to-Implement Algorithms | R. Housley | |||
| 202 | Reducing Energy Consumption of Router Advertisements | A. Yourtchenko, L. Colitti | |||
| 203 | Changing the Registration Policy for the NETCONF Capability URNs Registry | B. Leiba | |||
| 204 | Host Address Availability Recommendations | L. Colitti, V. Cerf, S. Cheshire, D. Schinazi | |||
| 205 | Improving Awareness of Running Code: The Implementation Status Section | Y. Sheffer, A. Farrel | |||
| 206 | Problem Statement and Architecture for Information Exchange between Interconnected Traffic-Engineered Networks | A. Farrel, Ed., J. Drake, N. Bitar, G. Swallow, D. Ceccarelli, X. Zhang | |||
| 207 | DNSSEC Roadblock Avoidance | W. Hardaker, O. Gudmundsson, S. Krishnaswamy | |||
| 208 | Network Transport Circuit Breakers | G. Fairhurst | |||
| 209 | Initializing a DNS Resolver with Priming Queries | P. Koch, M. Larson, P. Hoffman | |||
| 210 | Minimal IPv6 over the TSCH Mode of IEEE 802.15.4e (6TiSCH) Configuration | X. Vilajosana, Ed., K. Pister, T. Watteyne | |||
| 211 | BGPsec Operational Considerations | R. Bush | |||
| 212 | OAuth 2.0 for Native Apps | W. Denniss, J. Bradley | |||
| 213 | Use of Multicast across Inter-domain Peering Points | P. Tarapore, Ed., R. Sayko, G. Shepherd, T. Eckert, Ed., R. Krishnan | |||
| 214 | Mitigating the Negative Impact of Maintenance through BGP Session Culling | W. Hargrave, M. Griswold, J. Snijders, N. Hilliard | |||
| 215 | YANG Tree Diagrams | M. Bjorklund, L. Berger, Ed. | RFC 8791 | ||
| 216 | Guidelines for Authors and Reviewers of Documents Containing YANG Data Models | A. Bierman | RFC 8819 | ||
| 217 | Guidelines for Multihomed and IPv4/IPv6 Dual-Stack Interactive Connectivity Establishment (ICE) | P. Martinsen, T. Reddy, P. Patil | |||
| 218 | Deprecate Triple-DES (3DES) and RC4 in Kerberos | B. Kaduk, M. Short | |||
| 219 | DNS Terminology | P. Hoffman, K. Fujiwara | |||
| 220 | IPv6 Node Requirements | T. Chown, J. Loughney, T. Winters | |||
| 221 | Registration Data Access Protocol (RDAP) Object Tagging | S. Hollenbeck, A. Newton | |||
| 222 | DNS Underscored Naming. | D | |||
| 223 | Network Time Protocol Best Current Practices | D. Reilly, H. Stenn, D. Sibold | |||
| 224 | BGPsec Router Certificate Rollover | B. Weis, R. Gagliano, K. Patel | |||
| 225 | JSON Web Token Best Current Practices | Y. Sheffer, D. Hardt, M. Jones | |||
| 226 | Meeting Venue Selection and Policy | E. Lear, Ed., S. Krishnan, M. Duke, J. Daley, Ed., S | |||
| 227 | Deprecating RC4 in Secure Shell (SSH) | L. Velvindron | |||
| 228 | Best Practices for Securing RTP Media Signaled with SIP | J. Peterson, R. Barnes, R. Housley | |||
| 229 | Deprecating Any-Source Multicast (ASM) for Interdomain Multicast | M. Abrahamsson, T. Chown, L. Giuliano, T. Eckert | |||
| 230 | IP Fragmentation Considered Fragile | R. Bonica, F. Baker, G. Huston, R. Hinden, O. Troan, F. Gont | |||
| 231 | A Common Operational Problem in DNS Servers: Failure to Communicate | M. Andrews, R. Bellis | |||
| 232 | Recommendations for DNS Privacy Service Operators | S. Dickinson, B. Overeinder, R. van Rijswijk-Deij, A. Mankin | |||
| 233 | Requirements for Time-Based Loss Detection | M. Allman | |||
| 234 | Improving the Reaction of Customer Edge Routers to IPv6 Renumbering Events | F. Gont, J. ˇor˛, R. Patterson, B. Volz | |||
| 235 | DNS Transport over TCP - Operational Requirements | J. Kristoff, D. Wessels | |||
| 236 | Guidance for NSEC3 Parameter Settings | W. Hardaker, V. Dukhovni | |||
| 237 | DNS Security Extensions (DNSSEC) | P. Hoffman | |||
| 238 | Avoiding Route Origin Authorizations (ROAs) Containing Multiple IP Prefixes | Z. Yan, R. Bush, G. Geng, T. de Kock, J. Yao | |||
| 239 | Open Participation Principle regarding Remote Registration Fee | M. Kühlewind, J. Reed, R. Salz | |||
| 240 | Best Current Practice for OAuth 2.0 Security | T. Lodderstedt, J. Bradley, A. Labunets, D. Fett | |||
| 241 | Operational Considerations for Use of DNS in Internet of Things (IoT) Devices | M. Richardson, W. Pan | |||
| 242 | Clarification of IPv6 Address Allocation Policy | B. Carpenter, S. Krishnan, D. Farmer | |||
| 243 | Operational Considerations for Using TLS Pre-Shared Keys (TLS-PSKs) with RADIUS | A. DeKok | |||
| 244 | Best Practices for Deletion of Domain and Host Objects in the Extensible Provisioning Protocol (EPP) | S. Hollenbeck, W. Carroll, G. Akiwate |