The Atom Publishing Protocol
draft-ietf-atompub-protocol-17
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
17 | (System) | post-migration administrative database adjustment to the No Objection position for Cullen Jennings |
2012-08-22
|
17 | (System) | post-migration administrative database adjustment to the No Objection position for Chris Newman |
2012-08-22
|
17 | (System) | post-migration administrative database adjustment to the No Objection position for Sam Hartman |
2012-08-22
|
17 | (System) | post-migration administrative database adjustment to the No Objection position for Russ Housley |
2007-08-13
|
17 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2007-08-13
|
17 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2007-08-13
|
17 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2007-07-27
|
17 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2007-07-26
|
17 | (System) | IANA Action state changed to In Progress |
2007-07-25
|
17 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2007-07-24
|
17 | Amy Vezza | IESG state changed to Approved-announcement sent |
2007-07-24
|
17 | Amy Vezza | IESG has approved the document |
2007-07-24
|
17 | Amy Vezza | Closed "Approve" ballot |
2007-07-24
|
17 | Amy Vezza | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza |
2007-07-24
|
17 | Sam Hartman | [Ballot Position Update] Position for Sam Hartman has been changed to No Objection from Discuss by Sam Hartman |
2007-07-18
|
17 | Sam Hartman | [Ballot discuss] First, I'd like to thank the atompub working group and the chairs and authors for working with me to help expand the security … [Ballot discuss] First, I'd like to thank the atompub working group and the chairs and authors for working with me to help expand the security considerations section. I think this expansion significantly helps me understand the security implications of the protocol. Unfortunately now that I understand the protocol, I think that we need to ask for wider review of the decision not to support end-to-end signatures between the original content provider and the consumer. Both atompub's security advisor and I believe that this is something that needs wider review. Phrasing this is going to be a bit tricky. We want to encourage serious review, but we also don't want a bunch of people to pop up and simply say that more security is required when it costs them nothing to do so and they are not involved in the solution. In particular, I believe that this is an area where as described in section 3.1 of the discuss criteria document, the IETF as a whole may not have consensus behind this approach even though the atompub working group does. To that end, I propose that we discover whether the IETF has such a consensus and if not forge a consensus behind this technical approach or another. but I think we want to be careful about how we phrase the question. Ultimately I think we want a second focused last call on this issue |
2007-07-18
|
17 | Sam Hartman | [Ballot discuss] First, I'd like to thank the atompub working group and the chairs and authors for working with me to help expand the security … [Ballot discuss] First, I'd like to thank the atompub working group and the chairs and authors for working with me to help expand the security considerations section. I think this expansion significantly helps me understand the security implications of the protocol. Unfortunately now that I understand the protocol, I think that we need to ask for wider review of the decision not to support end-to-end signatures between the original content provider and the consumer. Both atompub's security advisor and I believe that this is something that needs wider review. Phrasing this is going to be a bit tricky. We want to encourage serious review, but we also don't want a bunch of people to pop up and simply say that more security is required when it costs them nothing to do so and they are not involved in the solution. Ultimately I think we want a second focused last call on this issue but I think we want to be careful about how we phrase the question. |
2007-07-13
|
17 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley |
2007-07-11
|
17 | (System) | New version available: draft-ietf-atompub-protocol-17.txt |
2007-07-05
|
17 | Cullen Jennings | [Ballot Position Update] Position for Cullen Jennings has been changed to No Objection from Discuss by Cullen Jennings |
2007-07-05
|
17 | Cullen Jennings | [Ballot Position Update] Position for Cullen Jennings has been changed to Discuss from No Objection by Cullen Jennings |
2007-07-05
|
17 | Cullen Jennings | [Ballot Position Update] Position for Cullen Jennings has been changed to No Objection from Discuss by Cullen Jennings |
2007-07-05
|
17 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2007-07-05
|
16 | (System) | New version available: draft-ietf-atompub-protocol-16.txt |
2007-06-08
|
17 | (System) | Removed from agenda for telechat - 2007-06-07 |
2007-06-07
|
17 | Amy Vezza | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza |
2007-06-07
|
17 | (System) | [Ballot Position Update] New position, No Objection, has been recorded for Ron Bonica by IESG Secretary |
2007-06-07
|
17 | Lars Eggert | [Ballot comment] |
2007-06-07
|
17 | Jari Arkko | [Ballot comment] Review from Christian Vogt: This I-D specifies a simple, HTTP-based protocol for publishing and editing data on the Web. I did not find … [Ballot comment] Review from Christian Vogt: This I-D specifies a simple, HTTP-based protocol for publishing and editing data on the Web. I did not find any technical nits with this protocol, which is good. Two substantial editorial comments, though: (2) The Terminology section includes circular definitions, which actually makes some definitions completely useless. For instance, a "resource" is defined in terms of "resources" and "member resource". A "member resource, in turn, is a "resource" with special properties... (1) The document has no introduction. (The text in the Introduction section does not suffice in this regard.) |
2007-06-07
|
17 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko |
2007-06-07
|
17 | Mark Townsley | [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley |
2007-06-07
|
17 | Chris Newman | [Ballot Position Update] Position for Chris Newman has been changed to No Objection from Discuss by Chris Newman |
2007-06-07
|
17 | Jon Peterson | [Ballot Position Update] New position, No Objection, has been recorded by Jon Peterson |
2007-06-06
|
17 | Russ Housley | [Ballot discuss] Section 14 says: > > The type of authentication deployed is a local decision made by the > server operator. … [Ballot discuss] Section 14 says: > > The type of authentication deployed is a local decision made by the > server operator. Clients are likely to face authentication schemes > that vary across server deployments. At a minimum, client and server > implementations MUST be capable of being configured to use HTTP Basic > Authentication [RFC2617] in conjunction with a TLS [RFC2246] > connection as defined in [RFC2818] (but note that [RFC2246] has been > superseded by [RFC4346]). See [RFC4346] for more information on TLS. > The specification ought to say that it MUST support TLS 1.0 [RFC2246] or a sunsequent standards-track version of TLS, and that it MUST also support the conventions for using HTTP over TLS [RFC2818]. |
2007-06-06
|
17 | Russ Housley | [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley |
2007-06-06
|
17 | Tim Polk | [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk |
2007-06-06
|
17 | Sam Hartman | [Ballot discuss] Section 15 documents a number of security threats without any justification of why these threats are acceptable or why mechanisms were not included … [Ballot discuss] Section 15 documents a number of security threats without any justification of why these threats are acceptable or why mechanisms were not included to address these threats. The entire section needs to be fixed to include descriptions of how to avoid the threats or why the threats are reasonable residual threats. Of particular concern is replays and the mangling of digitally signed content. |
2007-06-06
|
17 | Sam Hartman | [Ballot Position Update] New position, Discuss, has been recorded by Sam Hartman |
2007-06-06
|
17 | Lisa Dusseault | State Changes to IESG Evaluation from DNP-waiting for AD note by Lisa Dusseault |
2007-06-06
|
17 | Dan Romascanu | State Changes to DNP-waiting for AD note from IESG Evaluation by Dan Romascanu |
2007-06-05
|
17 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon |
2007-06-05
|
17 | Lars Eggert | [Ballot comment] Section 14., paragraph 3: > At a minimum, client and server > implementations MUST be capable of being configured to use … [Ballot comment] Section 14., paragraph 3: > At a minimum, client and server > implementations MUST be capable of being configured to use HTTP Basic > Authentication [RFC2617] in conjunction with a TLS [RFC2246] > connection as defined in [RFC2818] (but note that [RFC2246] has been > superseded by [RFC4346]). RFC2246 shouldn't be cited anymore, if it's been obsoleted. |
2007-06-05
|
17 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert |
2007-06-04
|
17 | Chris Newman | [Ballot discuss] This is a blocking "this needs to be fixed" discuss. Our media type registration process (BCP 13) presently requires standards track … [Ballot discuss] This is a blocking "this needs to be fixed" discuss. Our media type registration process (BCP 13) presently requires standards track media types to be sent to the ietf-types mailing list for review: http://www.alvestrand.no/mailman/listinfo/ietf-types Using a google search, I was unable to find reference to "atomcat+xml" or "atomsvc+xml" in the mailing list archive. If this analysis is in error and the types were reviewed on that list, I will immediately clear this discuss. Note that I'm not a fan of this particular procedure and would gladly sponsor a document which amended BCP 13 to simplify or drop this requirement for IESG reviewed documents. However, as the apps area director who is watching media type issues it is unfortunately my job to enforce this rule. My apologies for any delay this causes. |
2007-06-04
|
17 | Chris Newman | [Ballot Position Update] Position for Chris Newman has been changed to Discuss from No Objection by Chris Newman |
2007-06-04
|
17 | Chris Newman | [Ballot comment] While I'm deferring to my co-AD who is more of an expert on HTTP issues than I am, I'm concerned by the fact … [Ballot comment] While I'm deferring to my co-AD who is more of an expert on HTTP issues than I am, I'm concerned by the fact this protocol runs over port 80 by default. The litmus test in BCP 57 section 3 for reuse of port 80 is murky for this protocol (the first bullet is probably acceptable, but I'm unsure of the second and third bullets). Do organizations that punch a hole in their firewall for port 80 always intend to have atom publishing occurring? Let me explain why I care about this issue. In the email world, a large number of SMTP servers with dubious security properties were widely deployed. As a result, the network security community decided to run application-level firewalls on port 25. Such proxies are the most common cause of interoperability problems with SMTP, especially with respect to options negotiation and in particular they often defeat SMTP-level security features such as STARTTLS. Furthermore, port 25 is now widely used for submission of spam, something that was not considered at the time the protocol was designed. The email community has been trying to separate submission from transfer with port 587 so that separate security policies can be applied to transfer and submission easily. While this has had some success, it is very difficult to introduce a new port later, but it's not difficult to say "MUST try port X first, but feel free to use port 80 as a fallback" when the protocol is first deployed. I'm concerned that the extensive reuse of port 80 could lead to the widespread deployment of disruptive application-level proxies that could negatively impact all protocols on port 80. Hopefully I'm wrong that this is the likely outcome of the present reuse-port-80 trend, but my concern is informed by past experience with port 25. |
2007-06-04
|
17 | Chris Newman | [Ballot comment] While I'm deferring to my co-AD who is more of an expert on HTTP issues than I am, I'm concerned by the fact … [Ballot comment] While I'm deferring to my co-AD who is more of an expert on HTTP issues than I am, I'm concerned by the fact this protocol runs over port 80 by default. The litmus test in BCP 57 section 3 for reuse of port 80 is murky for this protocol (the first bullet is probably acceptable, but I'm unsure of the second and third bullets). Do organizations that punch a whole in their firewall for port 80 always intend to have atom publishing occuring? Let me explain why I care about this issue. In the email world, a large number of SMTP servers with dubious security properties were widely deployed. As a result, the network security community decided to run application-level firewalls on port 25. Such proxies are the most common cause of interoperability problems with SMTP, especially with respect to options negotiation and in particiular they often defeat SMTP-level security features such as STARTTLS. Furthermore, port 25 is now widely used for submission of spam, something that was not considered at the time the protocol was designed. The email community has been trying to separate submission from transfer with port 587 so that separate security policies can be applied to transfer and submission easily. While this has had some success, it is very difficult to introduce a new port later, but it's not difficult to say "MUST try port X first, but feel free to use port 80 as a fallback" when the protocol is first deployed. I'm concerned that the extensive reuse of port 80 could lead to the widespread deployment of destruptive application-level proxies that could negatively impact all protocols on port 80. Hopefully I'm wrong that this is the likely outcome of the present reuse-port-80 trend, but my concern is informed by past experience with port 25. |
2007-06-04
|
17 | Cullen Jennings | [Ballot comment] I have no idea how to implement the statement "It is RECOMMENDED that clients be implemented in such a way that new authentication … [Ballot comment] I have no idea how to implement the statement "It is RECOMMENDED that clients be implemented in such a way that new authentication schemes can be deployed". Requiring TLS+Basic is going to make it much harder for some embedded devices to support this protocol. Did the WG include designers of such systems and did they feel that TLS+Basic was better than HTTP Digest for clients? |
2007-06-04
|
17 | Cullen Jennings | [Ballot discuss] This is a discuss discuss and I will clear this part of it after the call. In section 6.1, I don't understand why … [Ballot discuss] This is a discuss discuss and I will clear this part of it after the call. In section 6.1, I don't understand why the name are the way they are or who is going to make the PURL registration or why we would need this instead of the normal way we deal with XML namespace names. Should the IANA section tell IANA to go do this? Does this require one to name the namespace "app:" in the document? Give this is a an IETF standards track document, the change controller for the Media Type registrations should be the "The IETF". |
2007-06-04
|
17 | Chris Newman | [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman |
2007-06-04
|
17 | Cullen Jennings | [Ballot Position Update] New position, Discuss, has been recorded by Cullen Jennings |
2007-06-04
|
17 | Lisa Dusseault | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Lisa Dusseault |
2007-06-04
|
17 | Lisa Dusseault | State Changes to Waiting for AD Go-Ahead from Waiting for Writeup::AD Followup by Lisa Dusseault |
2007-05-30
|
17 | Lisa Dusseault | Placed on agenda for telechat - 2007-06-07 by Lisa Dusseault |
2007-05-30
|
17 | Lisa Dusseault | [Ballot Position Update] New position, Yes, has been recorded for Lisa Dusseault |
2007-05-30
|
17 | Lisa Dusseault | Ballot has been issued by Lisa Dusseault |
2007-05-30
|
17 | Lisa Dusseault | Created "Approve" ballot |
2007-05-30
|
17 | Lisa Dusseault | PROTO writeup based on the RFC 4858 guide. (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally … PROTO writeup based on the RFC 4858 guide. (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Paul Hoffman. Yes. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? Yes. No. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization, or XML? No. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. Yes: we don't know whether the security considerations section will cause the document to be rejected by the Security ADs. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Fairly strong across the WG; in fact, it seems stronger since the IETF Last Call. There is lots of positive feelings for the overall document. We have seen multiple implementations already, and the informal workshop showed that many of them interoperate quite well. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) Rob Sayre has already appealed the theory behind what has become the Security Considerations section. This has been discussed on the ietf-general list and the WG mailing list. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/.) Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type, and URI type reviews? If the document does not already indicate its intended status at the top of the first page, please indicate the intended status here. Yes (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. Yes. No. N/A. No. N/A. (1.i) Has the Document Shepherd verified that the document's IANA Considerations section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC2434]. If the document describes an Expert Review process, has the Document Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during IESG Evaluation? Yes. Hopefully. Yes. Yes. N/A. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? No, but many others have. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: |
2007-05-29
|
17 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2007-05-29
|
15 | (System) | New version available: draft-ietf-atompub-protocol-15.txt |
2007-04-17
|
17 | Lisa Dusseault | State Changes to Waiting for Writeup::Revised ID Needed from Waiting for Writeup by Lisa Dusseault |
2007-03-30
|
17 | Sam Weiler | Request for Last Call review by SECDIR is assigned to Susan Thomson |
2007-03-30
|
17 | Sam Weiler | Request for Last Call review by SECDIR is assigned to Susan Thomson |
2007-03-27
|
17 | Yoshiko Fong | IANA Last Call Comments: Action #1: (Sections 16.1 & 16.2) Upon approval of this document, the IANA will make the following assignments in the "Application … IANA Last Call Comments: Action #1: (Sections 16.1 & 16.2) Upon approval of this document, the IANA will make the following assignments in the "Application Media-Types" registry located at http://www.iana.org/assignments/media-types/application/ atomsvc+xml [RFC-atompub-protocol-14] atomcat+xml [RFC-atompub-protocol-14] Action #2: (Section 16.3) Upon approval of this document, the IANA will make the following assignments in the "Permanent Message Header Field Names" registry located at http://www.iana.org/assignments/message-headers/perm-headers.html Header Field Name Protocol Status Reference SLUG http standard [RFC-atompub-protocol-14] Action #3: (Section 16.4 & 16.5) Upon approval of this document, the IANA will make the following assignments in the "Link Relations - per [RFC4287]" registry located at http://www.iana.org/assignments/link-relations.html Value Reference Registration Date (if applicable) edit [RFC-atompub-protocol-14] edit-media [RFC-atompub-protocol-14] Action #4: (Section 16.6) Upon approval of this document, the IANA will update the following assignments in the "Application Media-Types" registry located at http://www.iana.org/assignments/media-types/application/ OLD: atom+xml [RFC4287] NEW: atom+xml [RFC4287,RFC-atompub-protocol-14] We understand the above to be the only IANA Action for this document. |
2007-03-26
|
17 | (System) | State has been changed to Waiting for Writeup from In Last Call by system |
2007-03-12
|
17 | Amy Vezza | Last call sent |
2007-03-12
|
17 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2007-03-12
|
17 | Lisa Dusseault | Last Call was requested by Lisa Dusseault |
2007-03-12
|
17 | Lisa Dusseault | State Changes to Last Call Requested from AD Evaluation::AD Followup by Lisa Dusseault |
2007-03-12
|
17 | (System) | Ballot writeup text was added |
2007-03-12
|
17 | (System) | Last call text was added |
2007-03-12
|
17 | (System) | Ballot approval text was added |
2007-03-07
|
17 | Ted Hardie | PROTO write-up (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, … PROTO write-up (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Paul Hoffman. Yes and yes. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? Yes and yes. No (God no...). (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? No. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. No (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Fairly strong. There is lots of positive feelings for the overall document. We are also seeing multiple implementations already. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) Rob Sayre has already appealed the theory behind what has become the Security Considerations section. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? Yes. Yes. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. Yes. No. N/A. No. N/A. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC2434]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? Yes. Yes. Yes. N/A. N/A. N/A. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? No, but I trust that the editors have. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Technical Summary The Atom Publishing Protocol HTTP-based protocol for publishing and editing web resources, and is particularly useful for (but not limited to) blogs. It supports ideas such as collections of multimedia items and categorization of items. It uses the Atom format (RFC 4287) for its messages. Working Group Summary The document went through many revisions and was discussed actively. It had a few WG Last Calls. Document Quality There are multiple implementations of the spec and active interoperability testing among them. There are additional implementers who have said they want to implement when it is clear that this is going to Standards Track. Personnel Paul Hoffman is the Document Shepherd. Lisa Dusseault is the Responsible Area Director. |
2007-03-06
|
14 | (System) | New version available: draft-ietf-atompub-protocol-14.txt |
2007-02-13
|
13 | (System) | New version available: draft-ietf-atompub-protocol-13.txt |
2006-12-27
|
17 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2006-12-27
|
12 | (System) | New version available: draft-ietf-atompub-protocol-12.txt |
2006-11-07
|
17 | Lisa Dusseault | State Changes to AD Evaluation::Revised ID Needed from AD Evaluation by Lisa Dusseault |
2006-10-11
|
17 | Lisa Dusseault | State Changes to AD Evaluation from Publication Requested by Lisa Dusseault |
2006-10-11
|
17 | Lisa Dusseault | Draft Added by Lisa Dusseault in state Publication Requested |
2006-10-05
|
11 | (System) | New version available: draft-ietf-atompub-protocol-11.txt |
2006-09-12
|
10 | (System) | New version available: draft-ietf-atompub-protocol-10.txt |
2006-06-29
|
09 | (System) | New version available: draft-ietf-atompub-protocol-09.txt |
2006-02-22
|
08 | (System) | New version available: draft-ietf-atompub-protocol-08.txt |
2006-01-03
|
07 | (System) | New version available: draft-ietf-atompub-protocol-07.txt |
2005-11-08
|
06 | (System) | New version available: draft-ietf-atompub-protocol-06.txt |
2005-10-11
|
05 | (System) | New version available: draft-ietf-atompub-protocol-05.txt |
2005-05-10
|
04 | (System) | New version available: draft-ietf-atompub-protocol-04.txt |
2005-03-23
|
03 | (System) | New version available: draft-ietf-atompub-protocol-03.txt |
2004-10-08
|
02 | (System) | New version available: draft-ietf-atompub-protocol-02.txt |
2004-07-22
|
01 | (System) | New version available: draft-ietf-atompub-protocol-01.txt |
2004-07-09
|
00 | (System) | New version available: draft-ietf-atompub-protocol-00.txt |