Skip to main content

Identity-Based Encryption Architecture and Supporting Data Structures
draft-ietf-smime-ibearch-09

Revision differences

Document history

Date Rev. By Action
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Cullen Jennings
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Lisa Dusseault
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Chris Newman
2012-08-22
09 (System) post-migration administrative database adjustment to the Yes position for Tim Polk
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Lars Eggert
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2008-11-25
09 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2008-11-17
09 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2008-11-17
09 (System) IANA Action state changed to In Progress from Waiting on Authors
2008-11-14
09 (System) IANA Action state changed to Waiting on Authors from In Progress
2008-11-14
09 (System) IANA Action state changed to In Progress
2008-11-10
09 Cindy Morgan State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2008-11-10
09 Amy Vezza IESG state changed to Approved-announcement sent
2008-11-10
09 Amy Vezza IESG has approved the document
2008-11-10
09 Amy Vezza Closed "Approve" ballot
2008-11-10
09 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza
2008-11-07
09 Lisa Dusseault
[Ballot comment]
My DISCUSS previously pointed out problems with the lack of clear requirements for HTTP.  Because no mention is made of a requirement to …
[Ballot comment]
My DISCUSS previously pointed out problems with the lack of clear requirements for HTTP.  Because no mention is made of a requirement to support all of HTTP, and individual features aren't mentioned, it is likely that the first implementations will dictate the subset of interoperable features.  E.g. if the first implementations use redirects, then redirects will become an interoperable HTTP feature in this application; if the first implementations do not, then redirects will be unusable.

Since this is now Informational, I am not holding the document for this concern.
2008-11-07
09 Lisa Dusseault [Ballot Position Update] Position for Lisa Dusseault has been changed to No Objection from Abstain by Lisa Dusseault
2008-11-07
09 Lisa Dusseault [Ballot Position Update] Position for Lisa Dusseault has been changed to Abstain from Discuss by Lisa Dusseault
2008-11-07
09 (System) Removed from agenda for telechat - 2008-11-06
2008-11-06
09 Amy Vezza State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza
2008-11-06
09 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to Yes from Undefined by Tim Polk
2008-11-06
09 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk
2008-11-06
09 Cullen Jennings [Ballot Position Update] Position for Cullen Jennings has been changed to No Objection from Discuss by Cullen Jennings
2008-11-05
09 Chris Newman [Ballot comment]
I support Lisa's discuss.
2008-11-05
09 Chris Newman [Ballot Position Update] Position for Chris Newman has been changed to No Objection from Discuss by Chris Newman
2008-11-03
09 Cullen Jennings [Ballot comment]
2008-11-03
09 Cullen Jennings [Ballot discuss]
In section 8.2, XML section. I don't think this is the XML you want. Check out some of the other examples at http://www.iana.org/assignments/xml-registry/ns.html
2008-11-03
09 Cullen Jennings [Ballot Position Update] Position for Cullen Jennings has been changed to Discuss from Undefined by Cullen Jennings
2008-11-03
09 Cullen Jennings [Ballot Position Update] Position for Cullen Jennings has been changed to Undefined from Discuss by Cullen Jennings
2008-11-03
09 Cullen Jennings [Ballot discuss]
In section 8.2, XML section. I don't think this is the XML you want. Check out some of the other examples at http://www.iana.org/assignments/xml-registry/ns.html
2008-10-31
09 Tim Polk State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Tim Polk
2008-10-31
09 Tim Polk Placed on agenda for telechat - 2008-11-06 by Tim Polk
2008-10-27
09 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2008-10-23
09 Amanda Baber
IANA 2nd Last Call comments:

ACTION 1:

Upon approval, IANA will register the following media types at
http://www.iana.org/assignments/media-types/application/:

application/ibe-pp-data
application/ibe-key-request+xml
application/ibe-pkg-reply+xml


ACTION 2:

Upon approval, …
IANA 2nd Last Call comments:

ACTION 1:

Upon approval, IANA will register the following media types at
http://www.iana.org/assignments/media-types/application/:

application/ibe-pp-data
application/ibe-key-request+xml
application/ibe-pkg-reply+xml


ACTION 2:

Upon approval, IANA will add the following to the XML ns
registry at http://www.iana.org/assignments/xml-registry/ns.html:

urn:ietf:params:xml:ns:ibe

Registrant Contact:

Luther Martin
Voltage Security
1070 Arastradero Rd Suite 100
Palo Alto CA 94304

Phone: +1 650 543 1280
Email: martin@voltage.com

XML:
BEGIN







algorithmOID


ibeIdentityInfo



ibeAuthData







bodyTags


END


We understand the above to be the only IANA actions for this
document.
2008-10-21
09 Tim Polk Intended Status has been changed to Informational from Proposed Standard
2008-10-20
09 Amy Vezza Last call sent
2008-10-20
09 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2008-10-16
09 Tim Polk State Changes to Last Call Requested from IESG Evaluation::AD Followup by Tim Polk
2008-10-16
09 Tim Polk Last Call was requested by Tim Polk
2008-10-09
09 (System) New version available: draft-ietf-smime-ibearch-09.txt
2008-09-09
08 (System) New version available: draft-ietf-smime-ibearch-08.txt
2008-08-09
09 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2008-08-08
09 (System) Sub state has been changed to AD Follow up from New Id Needed
2008-08-08
07 (System) New version available: draft-ietf-smime-ibearch-07.txt
2008-05-05
(System) Posted related IPR disclosure: Voltage Security, Inc.'s Statement about IPR related to RFC 5091, draft-martin-ibcs-08, draft-ietf-smime-ibearch-06, and draft-ietf-smime-bfibecms-08
2008-03-18
09 Tim Polk
[Ballot discuss]
[picking up Sam's discuss]

How does a key server know whether a user is authorized to use a
particular identity address?  One solution …
[Ballot discuss]
[picking up Sam's discuss]

How does a key server know whether a user is authorized to use a
particular identity address?  One solution is to do as Chris suggests
and to use 2821 addresses.  Another solution might be to require that
the PKG is built into the internal email infrastructure somehow and
can determine whether a given email address would be delivered to a
given mail box  and require the same authentication for that mailbox.

I find the use of application/octet-stream and the use of xhtml
completely inappropriate in sections 3 and 4.

According to the protocol public parameters are needed to decrypt the
message.  How does this work when you try to decrypt a historic
message?  What if the public parameters have changed?  (Note that this
document requires both senders and recipients to fetch public
parameters) How does this interact with the requirement in section 3
that public parameters not be used outside their validity time?


How is interoperability achieved if implementations "MAY REQUIRE"
certain extensions to function?  Shouldn't we require that
implementations have a mode that works with no extensions?

How do you know what district to use for a given email address?  How
do you know where to find the parameters?  How do you authenticate
that a given public parameters server is allowed to speak for a given
district?
2008-03-18
09 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to Discuss from Yes by Tim Polk
2008-03-17
09 Cullen Jennings
[Ballot discuss]
These things are all small and can likely be easily resolved.

Section 4.3: I assume the ibe:algorithmOID needs to be base64 encoded - …
[Ballot discuss]
These things are all small and can likely be easily resolved.

Section 4.3: I assume the ibe:algorithmOID needs to be base64 encoded - I don't think it says this

In section 4.5, I got confused by value="responseCode" in the XML. I could not decide if the responseCode would be replaced by 100, or by KEY_FOLLOWS. I can seen in a later example what it needs to be but if you could find a way to make this clear in a normative sort of way, I think it would eliminate any implementers being confused on this.

In section 4.7, this seems under specified. Once you get the enrollment URI, then what?

In section 7, XML section. I don't think this is the XML you want. Check out some of the other examples at http://www.iana.org/assignments/xml-registry/ns.html
2008-03-11
09 Sam Hartman
[Ballot discuss]
I support Chris, Lisa and Cullen's discusses.

How does a key server know whether a user is authorized to use a
particular identity …
[Ballot discuss]
I support Chris, Lisa and Cullen's discusses.

How does a key server know whether a user is authorized to use a
particular identity address?  One solution is to do as Chris suggests
and to use 2821 addresses.  Another solution might be to require that
the PKG is built into the internal email infrastructure somehow and
can determine whether a given email address would be delivered to a
given mail box  and require the same authentication for that mailbox.

I find the use of application/octet-stream and the use of xhtml
completely inappropriate in sections 3 and 4.

According to the protocol public parameters are needed to decrypt the
message.  How does this work when you try to decrypt a historic
message?  What if the public parameters have changed?  (Note that this
document requires both senders and recipients to fetch public
parameters) How does this interact with the requirement in section 3
that public parameters not be used outside their validity time?


How is interoperability achieved if implementations "MAY REQUIRE"
certain extensions to function?  Shouldn't we require that
implementations have a mode that works with no extensions?




How do you know what district to use for a given email address?  How
do you know where to find the parameters?  How do you authenticate
that a given public parameters server is allowed to speak for a given
district?
2007-11-29
09 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2007-11-29
09 Chris Newman
[Ballot discuss]
The email address used for identity should be a minimal-form RFC 2821
address with the domain name mapped to lower case, not an …
[Ballot discuss]
The email address used for identity should be a minimal-form RFC 2821
address with the domain name mapped to lower case, not an RFC 2822
address.  RFC 2822 allows arbitrary comments and folding whitespace in
the address.  Both forms allow quoting and mixed-case domain names.

A discussion of whether ACE-encoded or UTF-8 encoded domain names are
used in the canonical format is needed (refer to IDN).

The "GeneralizedTime" ASN.1 syntax element permits "local time",
a time without any zone referent so it doesn't interoperate.  It should
be mandatory to either include a UTC offset or use UTC.  See RFC 3339
section 4.4 for further discussion.

This document needs to discuss the issues raised by BCP #56.  In
particular, the fact this protocol masquerades as a regular XHTML
post + XHTML response with the actual protocol buried inside the XHTML
is a design I consider to be exceptionally dangerous and harmful to
the Internet as it encourages firewalls and other middle-boxes to
parse deep into the application protocol exchange and likely cause
severe damage.  The lower down the protocol stack you can distinguish
this protocol from browser-use-of-HTTP the better, IMHO.  A separate
port is my preferred design, but I can live with a separate media type
or new method.

ASN.1, XML and XHTML have security considerations this inherits, please
reference them.

I support Lisa's discuss.
2007-11-29
09 David Ward [Ballot Position Update] New position, No Objection, has been recorded by David Ward
2007-11-29
09 Sam Hartman
[Ballot discuss]
I support Chris, Lisa and Cullen's discusses.

How does a key server know whether a user is authorized to use a
particular identity …
[Ballot discuss]
I support Chris, Lisa and Cullen's discusses.

How does a key server know whether a user is authorized to use a
particular identity address?  One solution is to do as Chris suggests
and to use 2821 addresses.  Another solution might be to require that
the PKG is built into the internal email infrastructure somehow and
can determine whether a given email address would be delivered to a
given mail box  and require the same authentication for that mailbox.

I find the use of application/octet-stream and the use of xhtml
completely inappropriate in sections 3 and 4.

According to the protocol public parameters are needed to decrypt the
message.  How does this work when you try to decrypt a historic
message?  What if the public parameters have changed?  (Note that this
document requires both senders and recipients to fetch public
parameters) How does this interact with the requirement in section 3
that public parameters not be used outside their validity time?


How is interoperability achieved if implementations "MAY REQUIRE"
certain extensions to function?  Shouldn't we require that
implementations have a mode that works with no extensions?

There is no criticality indicator for extensions.  What should an
implement do if it receives unknown extensions?



How do you know what district to use for a given email address?  How
do you know where to find the parameters?  How do you authenticate
that a given public parameters server is allowed to speak for a given
district?


This specification has a different authentication infrastructure than
IMAP, POP and SMTP (the email protocols).  Has the S/MIME working
group discussed their choice not to support the same authentication as
email with the apps area?  Why is this the correct direction for the
Internet?

This document needs to be last called again; it has an informational
reference to the IBE crypto algorithms that is a down reference.  That
down reference was not noted in the last call per RFC 3967.
2007-11-29
09 Sam Hartman
[Ballot discuss]
I support Chris, Lisa and Cullen's discusses.

How does a key server know whether a user is authorized to user a
particular identity …
[Ballot discuss]
I support Chris, Lisa and Cullen's discusses.

How does a key server know whether a user is authorized to user a
particular identity address?  One solution is to do as Chris suggests
and to use 2821 addresses.  Another solution might be to require that
the PKG is built into the internal email infrastructure somehow and
can determine whether a given email address would be delivered to a
given mail box  and require the same authentication for that mailbox.

I find the use of application/octet-stream and the use of xhtml
completely inappropriate in sections 3 and 4.

According to the protocol public parameters are needed to decrypt the
message.  How does this work when you try to decrypt a historic
message?  What if the public parameters have changed?  (Note that this
document requires both senders and recipients to fetch public
parameters) How does this interact with the requirement in section 3
that public parameters not be used outside their validity time?


How is interoperability achieved if implementations "MAY REQUIRE"
certain extensions to function?  Shouldn't we require that
implementations have a mode that works with no extensions?

There is no criticality indicator for extensions.  What should an
implement do if it receives unknown extensions?



How do you know what district to use for a given email address?  How
do you know where to find the parameters?  How do you authenticate
that a given public parameters server is allowed to speak for a given
district?


This specification has a different authentication infrastructure than
IMAP, POP and SMTP (the email protocols).  Has the S/MIME working
group discussed their choice not to support the same authentication as
email with the apps area?  Why is this the correct direction for the
Internet?
2007-11-29
09 Sam Hartman [Ballot Position Update] New position, Discuss, has been recorded by Sam Hartman
2007-11-29
09 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley
2007-11-29
09 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2007-11-29
09 Jon Peterson [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson
2007-11-29
09 Chris Newman
[Ballot discuss]
The email address used for identity should be a minimal-form RFC 2821
address with the domain name mapped to lower case, not an …
[Ballot discuss]
The email address used for identity should be a minimal-form RFC 2821
address with the domain name mapped to lower case, not an RFC 2822
address.  RFC 2822 allows arbitrary comments and folding whitespace in
the address.  Both forms allow quoting and mixed-case domain names.

A discussion of whether ACE-encoded or UTF-8 encoded domain names are
used in the canonical format is needed (refer to IDN).

The "GeneralizedTime" ASN.1 syntax element permits "local time",
a time without any zone referent so it doesn't interoperate.  It should
be mandatory to either include a UTC offset or use UTC.  See RFC 3339
section 4.4 for further discussion.

The protocol's use of TLS section is incomplete.  Correctly applying TLS
to an application protocol requires discussion of all sorts of things
including: which mandatory-to-implement cipher suite is used by that
protocol (if not the same as TLS base spec's DSA+3DES), if subjectAlt
name of dnsName is recommended, what sort of configuration knobs with
authentication is needed, etc.  See RFC 4513 for a good example.

This document needs to discuss the issues raised by BCP #56.  In
particular, the fact this protocol masquerades as a regular XHTML
post + XHTML response with the actual protocol buried inside the XHTML
is a design I consider to be exceptionally dangerous and harmful to
the Internet as it encourages firewalls and other middle-boxes to
parse deep into the application protocol exchange and likely cause
severe damage.  The lower down the protocol stack you can distinguish
this protocol from browser-use-of-HTTP the better, IMHO.  A separate
port is my preferred design, but I can live with a separate media type
or new method.

ASN.1 has serious security considerations that have resulted
in many real-world vulnerabilities in security software.  Specifically,
the nested lengths in ASN.1 can be inconsistent so ASN.1 parsers must
be prepared for such inconsistencies that might result in buffer
overflows or lengths that would cause a DOS if allocated.  This document
fails to discuss or reference ASN.1 security considerations.

XML also has security considerations, as does XHTML.

I support Lisa's discuss.
2007-11-29
09 Chris Newman [Ballot Position Update] New position, Discuss, has been recorded by Chris Newman
2007-11-28
09 Lisa Dusseault
[Ballot discuss]
This specification indicates the use of HTTP GET and POST without clarifying what level of HTTP support is required of clients and servers.  …
[Ballot discuss]
This specification indicates the use of HTTP GET and POST without clarifying what level of HTTP support is required of clients and servers.  (Can servers expect to use 100 or 300 level responses and have clients handle them?  Can clients use conditional request headers and have servers handle them?  there's another dozen issues like this.)

The use of three-digit response codes within HTTP responses, that are different from HTTP status codes, is confusing. 
        100  KEY_FOLLOWS
        101  RESERVED
        201  FOLLOW_ENROLL_URI
        300  SYSTEM_ERROR
        301  INVALID_REQUEST
        303  CLIENT_OBSOLETE
        304  AUTHORIZATION DENIED

What HTTP status code should be used in the first line of the response, when the body contains an IBE error, is not clear.

There are no examples of error responses.
2007-11-28
09 Lisa Dusseault [Ballot Position Update] New position, Discuss, has been recorded by Lisa Dusseault
2007-11-28
09 Russ Housley
[Ballot discuss]
The title of this document concerns me.  The document provides some
  overview of IBE, and then it defines some data structures.  These …
[Ballot discuss]
The title of this document concerns me.  The document provides some
  overview of IBE, and then it defines some data structures.  These
  data structures are important to apply IBE to CMS or other protocol
  environments.  These data structures are the reason that the document
  is on the standards track.  The title of the document should reflect
  the reason that these data structures are needed, and it should
  highlight the use of trusted third party servers.
2007-11-28
09 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley
2007-11-28
09 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2007-11-27
09 Cullen Jennings
[Ballot comment]
The XML would be clearer with a RelaxNG schema. I really encourage people to consider adding some schema.

A full example test message …
[Ballot comment]
The XML would be clearer with a RelaxNG schema. I really encourage people to consider adding some schema.

A full example test message would really help implementers get this right.
2007-11-27
09 Cullen Jennings
[Ballot discuss]
These things are all small and can likely be easily resolved. It may just be my lack on understanding.

Section 4.3: I assume …
[Ballot discuss]
These things are all small and can likely be easily resolved. It may just be my lack on understanding.

Section 4.3: I assume the ibe:algorithmOID needs to be base64 encoded - I don't think it says this

In section 4.5, I got confused by value="responseCode" in the XML. I could not decide if the responseCode would be replaced by 100, or by KEY_FOLLOWS. I can seen in a later example what it needs to be but if you could find a way to make this clear in a normative sort of way, I think it would eliminate any implementers being confused on this.

In section 4.7, I don't really see how this works. Once you get the enrollment URI, then what?

In section 7, XML section. I don't think this is the XML you want. Check out some of the other examples at http://www.iana.org/assignments/xml-registry/ns.html
2007-11-27
09 Cullen Jennings [Ballot Position Update] New position, Discuss, has been recorded by Cullen Jennings
2007-11-27
09 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2007-11-27
09 Amanda Baber
Revised IANA comments:

Upon approval of this document, the IANA will make the following
assignments in the "NS" registry located at
http://www.iana.org/assignments/xml-registry/ns.html

ID |URI |Registration …
Revised IANA comments:

Upon approval of this document, the IANA will make the following
assignments in the "NS" registry located at
http://www.iana.org/assignments/xml-registry/ns.html

ID |URI |Registration template |Reference
ibe urn:ietf:params:xml:ns:ibe | ibe | [RFC-ietf-smime-ibearch-06.txt]

Registration template:

        URI:

        urn:ietf:params:xml:ns:ibe

        Registrant Contact:

          Luther Martin
          Voltage Security
          1070 Arastradero Rd Suite 100
          Palo Alto CA 94304
           
          Phone: +1 650 543 1280
          Email: martin@voltage.com 
       
        XML:
        BEGIN
       
           
             
           
           
           
             
                algorithmOID 
             
             
              ibeIdentityInfo 
             
           
           
       
       
       
           
           
              bodyTags
           
       
        END


We understand the above to be the only IANA Actions for this
document.
2007-11-27
09 Lars Eggert [Ballot Position Update] Position for Lars Eggert has been changed to No Objection from Discuss by Lars Eggert
2007-11-27
09 Lars Eggert [Ballot discuss]
Discuss-discuss: Can anyone explain how this document falls under the S/MIME charter? I also don't see a milestone for it.
2007-11-27
09 Lars Eggert [Ballot Position Update] New position, Discuss, has been recorded by Lars Eggert
2007-11-27
09 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund
2007-11-26
09 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko
2007-11-25
09 Tim Polk Ballot has been issued by Tim Polk
2007-11-19
09 Tim Polk [Ballot Position Update] New position, Yes, has been recorded by Tim Polk
2007-11-19
09 Tim Polk Created "Approve" ballot
2007-11-19
09 Tim Polk State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Tim Polk
2007-11-19
09 Tim Polk Placed on agenda for telechat - 2007-11-29 by Tim Polk
2007-11-08
06 (System) New version available: draft-ietf-smime-ibearch-06.txt
2007-10-25
09 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2007-10-18
09 Amanda Baber
IANA Last Call comments:

Upon approval of this document, the IANA will make the following
assignments in the "NS" registry located at
http://www.iana.org/assignments/xml-registry/ns.html

ID |URI …
IANA Last Call comments:

Upon approval of this document, the IANA will make the following
assignments in the "NS" registry located at
http://www.iana.org/assignments/xml-registry/ns.html

ID |URI |Registration template |Reference
ibe urn:ietf:params:xml:ns:ibe | ibe | [RFC-smime-ibearch-05]

As the document does not include a registration template, IANA
proposes the following text:

Registration request for the IBE namespace

URI: urn:ietf:params:xml:ns:ibe

Specification: [RFC-smime-ibearch-05]

Registrant Contact:

IETF
SMIME Working Group


XML: none

We understand the above to be the only IANA Actions for this
document.

If the proposed template is incorrect, please let us know.
2007-10-11
09 Samuel Weiler Request for Last Call review by SECDIR is assigned to Bernard Aboba
2007-10-11
09 Samuel Weiler Request for Last Call review by SECDIR is assigned to Bernard Aboba
2007-10-11
09 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2007-10-11
09 Tim Polk State Changes to Last Call Requested from AD Evaluation by Tim Polk
2007-10-11
09 Tim Polk Last Call was requested by Tim Polk
2007-10-11
09 (System) Ballot writeup text was added
2007-10-11
09 (System) Last call text was added
2007-10-11
09 (System) Ballot approval text was added
2007-10-04
09 Tim Polk State Changes to AD Evaluation from Publication Requested by Tim Polk
2007-10-03
09 Tim Polk
raft-ietf-smime-ibearch-05 is ready for IETF-wide last call. Below find the
Document Shepherd writeup.

Answering questions 1.a-1.h in RFC 4858:

1.a - Blake Ramsdell is …
raft-ietf-smime-ibearch-05 is ready for IETF-wide last call. Below find the
Document Shepherd writeup.

Answering questions 1.a-1.h in RFC 4858:

1.a - Blake Ramsdell is the Shepherd. He's personally reviewed the document
      and knows it is ready for IESG publication.

1.b - This document has been reviewed deeply by at least one WG member.

1.c - There is no need for broader review.

1.d - There are no specific concerns that the AD and/or IESG should be aware
      of.

1.e - The WG was relatively quiet about this document.

1.f - There has been no threat of an appeal.

1.g - The nits have been addressed.

1.h - The document splits it references.

1.i - The document has an IANA consideration and it is consistent with the
      main body. A reservation is requested in the IETF XML registry.

1.j - The reviewer has NOT personally verified the XML IANA registration or
      the ASN.1. I know that there was at least one reviewer of the ASN.1 in
      the WG.

1.k - Write-up is as follows:

Technical Summary

This document describes the security architecture required to implement
identity-based encryption, a public-key encryption technology that uses a
user's identity to generate their public key.

Working Group Summary

There was very little public discussion about this draft. During WG last call
comments were raised and addressed, and after last call some nits were
addressed.

Document Quality

I know that there is at least one implementation by Voltage of this protocol.
I am not aware of other vendor plans for implementation.

Personnel

Blake Ramsdell  is the document Shepherd. Tim Polk
is the responsible Security Area AD.

Blake
--
Blake Ramsdell | Sendmail, Inc. | http://www.sendmail.com
2007-10-03
09 Tim Polk Draft Added by Tim Polk in state Publication Requested
2007-09-26
05 (System) New version available: draft-ietf-smime-ibearch-05.txt
2007-09-25
(System) Posted related IPR disclosure: Voltage Security Inc.'s Statement about IPR related to draft-martin-ibcs-06, draft-ietf-smime-ibearch-04, and draft-ietf-smime-ibecms-04
2007-07-05
04 (System) New version available: draft-ietf-smime-ibearch-04.txt
2007-03-14
(System) Posted related IPR disclosure: Voltage Security Inc.'s statement about IPR claimed in  draft-ietf-smime-ibearch-01.txt, draft-martin-ibcs-01.txt, draft-ietf-smime-ibecms-01.txt
2007-03-06
03 (System) New version available: draft-ietf-smime-ibearch-03.txt
2006-12-20
02 (System) New version available: draft-ietf-smime-ibearch-02.txt
2006-10-20
01 (System) New version available: draft-ietf-smime-ibearch-01.txt
2006-10-11
(System) Posted related IPR disclosure: Voltage Security Inc.'s statement about IPR claimed in  draft-ietf-smime-ibearch-01.txt, draft-ietf-martin-ibcs-01.txt, draft-ietf-smime-ibecms-01.txt
2006-06-28
00 (System) New version available: draft-ietf-smime-ibearch-00.txt
2006-06-14
(System) Posted related IPR disclosure: Voltage Security Inc.'s statement about IPR claimed in  draft-ietf-smime-ibearch-00.txt, draft-ietf-smime-ibcs-00.txt, draft-ietf-smime-bfibecms-01.txt, draft-ietf-smime-ibepps-00.txt, draft-ietf-smime-ibepkg-00.txt