Skip to main content

Content Delivery Network Interconnection (CDNI) Metadata
draft-ietf-cdni-metadata-21

Revision differences

Document history

Date Rev. By Action
2016-12-01
21 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2016-10-18
21 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2016-09-14
21 (System) RFC Editor state changed to RFC-EDITOR from AUTH
2016-09-13
21 (System) RFC Editor state changed to AUTH from EDIT
2016-09-06
21 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2016-09-01
21 (System) IANA Action state changed to Waiting on RFC Editor from Waiting on Authors
2016-09-01
21 (System) IANA Action state changed to Waiting on Authors from In Progress
2016-08-29
21 (System) RFC Editor state changed to EDIT
2016-08-29
21 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2016-08-29
21 (System) Announcement was received by RFC Editor
2016-08-29
21 (System) IANA Action state changed to In Progress
2016-08-29
21 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent::AD Followup
2016-08-29
21 Amy Vezza IESG has approved the document
2016-08-29
21 Amy Vezza Closed "Approve" ballot
2016-08-29
21 Amy Vezza Ballot approval text was generated
2016-08-29
21 Alexey Melnikov [Ballot comment]
Thank you for addressing my DISCUSS points.
2016-08-29
21 Alexey Melnikov [Ballot Position Update] Position for Alexey Melnikov has been changed to Yes from Discuss
2016-08-28
21 Kevin Ma New version available: draft-ietf-cdni-metadata-21.txt
2016-08-28
20 Alexey Melnikov
[Ballot discuss]
RFC 3490 is an obsoleted RFC, need to reference the latest IDNA RFC.

-- You updated description in the document to read (in …
[Ballot discuss]
RFC 3490 is an obsoleted RFC, need to reference the latest IDNA RFC.

-- You updated description in the document to read (in 2 places):

Internationalized Domain Names (IDN) must first be
transformed to the IDNA encoding as per [RFC5891].

However this is not clear enough, because you are not saying whether you want to use A-labels or U-labels. I suggest:

in 4.1.2, change:

        Internationalized Domain
        Names (IDN) must first be transformed to the IDNA encoding as
        per [RFC5891].

to:

        Internationalized Domain
        Names (IDN) must first be transformed to the A-label form as
        per [RFC5891].

You can also add "[RFC5890]" to the end of the sentence (and add it to Normative References), as it defines A-labels.


Similarly, in 4.3.3, change:

  Internationalized Domain Names (IDN) must first be
  transformed to the IDNA encoding as per [RFC5891].

to:

  Internationalized Domain Names (IDN) must first be
  transformed to the A-label form as per [RFC5891].
2016-08-28
20 Alexey Melnikov [Ballot comment]
IANA Auth type registry no longer created? Has this been moved to another draft?
2016-08-28
20 Alexey Melnikov Ballot comment and discuss text updated for Alexey Melnikov
2016-08-28
20 Alexey Melnikov
[Ballot discuss]
RFC 3490 is an obsoleted RFC, need to reference the latest IDNA RFC.

-- You updated description in the document to read (in …
[Ballot discuss]
RFC 3490 is an obsoleted RFC, need to reference the latest IDNA RFC.

-- You updated description in the document to read (in 2 places):

Internationalized Domain Names (IDN) must first be
transformed to the IDNA encoding as per [RFC5891].

However this is not clear enough, because you are not saying whether you want to use A-labels or U-labels. I think the former.


IANA Auth type registry no longer created? Has this been moved to another draft?


Issues from my earlier review (these might be already fixed):

In 8.3:

  An implementation of the CDNI metadata interface MUST use strong
  encryption and mutual authentication to prevent undetectable

Encryption doesn't necessarily provide integrity of data, so I would change "strong encryption" to TLS.

  modification of metadata (see Section 8.5).
2016-08-28
20 Alexey Melnikov Ballot discuss text updated for Alexey Melnikov
2016-08-03
20 Alexey Melnikov IESG state changed to Approved-announcement to be sent::AD Followup from Waiting for AD Go-Ahead::AD Followup
2016-08-03
20 Alexey Melnikov
[Ballot discuss]
RFC 3490 is an obsoleted RFC, need to reference the latest IDNA RFC.

-- You updated description in the document to read (in …
[Ballot discuss]
RFC 3490 is an obsoleted RFC, need to reference the latest IDNA RFC.

-- You updated description in the document to read (in 2 places):

Internationalized Domain Names (IDN) must first be
transformed to the IDNA encoding as per [RFC5891].

However this is not clear enough, because you are not saying whether you want to use A-labels or U-labels. I think the former.


IANA Auth type registry no longer created? Has this been moved to another draft?


Issues from my earlier review (these might be already fixed):

In 4.1.2: hostname need to have defined syntax (at least by reference). You also need to say whether IDN domain names are
allowed here.

In 8.3:

  An implementation of the CDNI metadata interface MUST use strong
  encryption and mutual authentication to prevent undetectable

Encryption doesn't necessarily provide integrity of data, so I would change "strong encryption" to TLS.

  modification of metadata (see Section 8.5).
2016-08-03
20 Alexey Melnikov Ballot discuss text updated for Alexey Melnikov
2016-08-02
20 (System) Sub state has been changed to AD Followup from Revised ID Needed
2016-08-02
20 Kevin Ma IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2016-08-02
20 Kevin Ma New version available: draft-ietf-cdni-metadata-20.txt
2016-07-27
19 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK
2016-07-25
19 (System) IANA Review state changed to IANA - Not OK from Version Changed - Review Needed
2016-07-25
19 Amanda Baber
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-cdni-metadata-19. If any part of this review is inaccurate, please let us know.

IANA …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-cdni-metadata-19. If any part of this review is inaccurate, please let us know.

IANA understands that there are three actions that are required to be completed upon approval of this document.

First, in the CDNI Payload Types registry under the Content Delivery Network Interconnection (CDNI) Parameters heading at

https://www.iana.org/assignments/cdni-parameters/

twenty (20) new payload types are to be registered as follows:

+--------------------------+---------------+
| Payload Type | Specification |
+--------------------------+---------------+
| MI.HostIndex | [ RFC-to-be ] |
| MI.HostMatch | [ RFC-to-be ] |
| MI.HostMetadata | [ RFC-to-be ] |
| MI.PathMatch | [ RFC-to-be ] |
| MI.PatternMatch | [ RFC-to-be ] |
| MI.PathMetadata | [ RFC-to-be ] |
| MI.SourceMetadata | [ RFC-to-be ] |
| MI.Source | [ RFC-to-be ] |
| MI.LocationACL | [ RFC-to-be ] |
| MI.LocationRule | [ RFC-to-be ] |
| MI.Footprint | [ RFC-to-be ] |
| MI.TimeWindowACL | [ RFC-to-be ] |
| MI.TimeWindowRule | [ RFC-to-be ] |
| MI.TimeWindow | [ RFC-to-be ] |
| MI.ProtocolACL | [ RFC-to-be ] |
| MI.ProtocolRule | [ RFC-to-be ] |
| MI.DeliveryAuthorization | [ RFC-to-be ] |
| MI.Cache | [ RFC-to-be ] |
| MI.Auth | [ RFC-to-be ] |
| MI.Grouping | [ RFC-to-be ] |
+--------------------------+---------------+

As this document requests registrations in a Specification Required (see RFC 5226) registry, we will initiate the required Expert Review via a separate request. Expert review will need to be completed before your document can be approved for publication as an RFC.

Second, a new registry is to be created called the CDNI Metadata Footprint Types registry. This registry will be located in the existing Content Delivery Network Interconnection (CDNI) Parameters registry located at:

https://www.iana.org/assignments/cdni-parameters/

The new registry will be managed through Specification Required as defined by RFC 5226. These are the initial registrations:

+----------------+-------------------------------+---------------+
| Footprint Type | Description | Specification |
+----------------+-------------------------------+---------------+
| ipv4cidr | IPv4 CIDR address block | [ RFC-to-be ] |
| ipv6cidr | IPv6 CIDR address block | [ RFC-to-be ] |
| asn | Autonomous System (AS) Number | [ RFC-to-be ] |
| countrycode | ISO 3166-1 alpha-2 code | [ RFC-to-be ] |
+----------------+-------------------------------+---------------+

Third, a new registry is to be created called the CDNI Metadata Protocol Types registry. This registry will also be located in the existing Content Delivery Network Interconnection (CDNI) Parameters registry located at:

https://www.iana.org/assignments/cdni-parameters/

The new registry will be managed through Specification Required as defined by RFC 5226. These are the initial registrations:

+-----------+----------------------+---------------+----------------+
| Protocol | Description | Type | Protocol |
| Type | | Specification | Specifications |
+-----------+----------------------+---------------+----------------+
| http/1.1 | Hypertext Transfer | [ RFC-to-be ] | RFC7230 |
| | Protocol -- HTTP/1.1 | | |
| https/1.1 | HTTP/1.1 Over TLS | [ RFC-to-be ] | RFC7230, |
| | | | RFC2818 |
+-----------+----------------------+---------------+----------------+

IANA understands that these three actions are the only ones required to be completed upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed. 

Thank you,

Amanda Baber
IANA Lead Specialist
ICANN
2016-07-25
19 Alexey Melnikov IESG state changed to Waiting for AD Go-Ahead::Revised I-D Needed from Waiting for AD Go-Ahead
2016-07-25
19 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2016-07-11
19 Gunter Van de Velde Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Sheng Jiang.
2016-07-11
19 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: "IETF-Announce"
CC: alexey.melnikov@isode.com, flefauch@cisco.com, cdni@ietf.org, draft-ietf-cdni-metadata@ietf.org, cdni-chairs@ietf.org
Reply-To: ietf@ietf.org …
The following Last Call announcement was sent out:

From: The IESG
To: "IETF-Announce"
CC: alexey.melnikov@isode.com, flefauch@cisco.com, cdni@ietf.org, draft-ietf-cdni-metadata@ietf.org, cdni-chairs@ietf.org
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (CDN Interconnection Metadata) to Proposed Standard


The IESG has received a request from the Content Delivery Networks
Interconnection WG (cdni) to consider the following document:
- 'CDN Interconnection Metadata'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2016-07-25. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

This is the Second IETF Last Call to point out that the document has a DownRef to RFC 6707.

Abstract


  The Content Delivery Networks Interconnection (CDNI) metadata
  interface enables interconnected Content Delivery Networks (CDNs) to
  exchange content distribution metadata in order to enable content
  acquisition and delivery.  The CDNI metadata associated with a piece
  of content provides a downstream CDN with sufficient information for
  the downstream CDN to service content requests on behalf of an
  upstream CDN.  This document describes both a base set of CDNI
  metadata and the protocol for exchanging that metadata.





The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-cdni-metadata/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-cdni-metadata/ballot/


No IPR declarations have been submitted directly on this I-D.

2016-07-11
19 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2016-07-11
19 Amy Vezza Last call announcement was changed
2016-07-09
19 Alexey Melnikov
[Ballot discuss]
IANA Auth type registry no longer created? Has this been moved to another draft?

RFC 3490 is an obsoleted RFC, need to reference …
[Ballot discuss]
IANA Auth type registry no longer created? Has this been moved to another draft?

RFC 3490 is an obsoleted RFC, need to reference the latest IDNA RFC.

Some outstanding issues in 6.8 (Versionning)

Check remaining AD review comments reported earlier.

In regards to Spencer's comment:

  A server implementation of the
  CDNI metadata interface MUST reject all methods other than GET and
  HEAD.

I think this text needs to be deleted, because it puts extra requirements on generic HTTP servers that might be used to serve CDNI Metadata, which I think is a wrong thing to do.
2016-07-09
19 Alexey Melnikov Ballot discuss text updated for Alexey Melnikov
2016-07-09
19 Alexey Melnikov Last call was requested
2016-07-09
19 Alexey Melnikov IESG state changed to Last Call Requested from IESG Evaluation::AD Followup
2016-07-09
19 Alexey Melnikov Last call announcement was changed
2016-07-09
19 Alexey Melnikov Last call announcement was generated
2016-07-09
19 Stephen Farrell
[Ballot comment]

Thanks for the discussion. Old comments below, I didn't
check if those were handled. If they were, thanks. If you
want to chat …
[Ballot comment]

Thanks for the discussion. Old comments below, I didn't
check if those were handled. If they were, thanks. If you
want to chat about any, feel free to but you don't need to.

------------

- general: I agree with Ben's discuss about use of TLS. I
also wonder if IPsec is really going to be used here. And
even if so, you might be better off to say that TLS with
mutual-auth SHOULD be used in all cases.

- general: Don't you need some guidance for the dCDN to say
when to stop following (what might be circular) links?

- general: I think it'd be better if the examples given used
https in all cases, assuming we do think that'd be better.
And if it'd not be better, saying why would I think be good.

- 1.2, last para: I don't get what this is saying. What
additional things need specifying? If all you mean is that
the dCDN and uCDN need to be able to setup TLS sessions, and
hence need to agree on what CAs and ciphersuites to use,
then maybe just say that. (You do already refer to RFC7525
so most of that is covered there I think.)

- 4.1.1: I don't think I-JSON requires that order be
preserved, but you seem to need that here, e.g. if a tCDN
decodes and re-encodes, or if a uCDN round-trips a data
structure. Is there a missing "MUST preserve order"
somewhere?

- 4.1.x, 4.2.x, 4.3.x: I wonder if the specification is a
bit too loose in places here, e.g. what does "$$" mean in
4.1.5 and why is that special?  In the same section I also
wasn't clear if "/movies/" is the same as "/movies/*" or
not, nor if you consider that "/movies/*" does or doesn't
match "/movies/1/2/3". Isn't a reference needed in 4.3.4?
I'd guess that a lot of this is close enough that
implementations will likely get a lot, but not all, of this
right, and that that might lead to corner-cases where
interop isn't so good.  Improving that would seem like a
good idea, but perhaps it's better to wait and see what
deployments do and then tidy this up? Not sure.  In reading
I spotted a number of places where such things occurred to
me (but didn't write them all down, sorry;-).

- 6.8: I didn't follow this, sorry;-) I assume it's
considered clear enough for implementers, so feel free to
ignore me, but I didn't get how to know whether or not e.g.
".v2.2.2" is newer than ".v2" or ".fixed-v1".

- 8.3: did the WG consider (possibly future) uses of JOSE to
provide e2e security from uCDN to dCDN even via tCDN? I'm ok
that you don't define that now, but wondered, as it seems
like a fairly obvious thing to want. (To this security nerd
anyway:-) I also wondered the same for 8.4, but I get that
that'd be less likely of widespread utility. If using IPsec
to security inter-CDN links, something like JOSE would seem
to me to add quite a bit of value, if the CDNs insist on not
using TLS.
2016-07-09
19 Stephen Farrell [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss
2016-07-08
19 (System) Sub state has been changed to AD Followup from Revised ID Needed
2016-07-08
19 Kevin Ma IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2016-07-08
19 Kevin Ma New version available: draft-ietf-cdni-metadata-19.txt
2016-07-07
18 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2016-07-07
18 Stephen Farrell
[Ballot discuss]

(1) cleared, was just a document split issue

(2) 6.5: I think you're missing a MUST in the list here.
I'd suggest something …
[Ballot discuss]

(1) cleared, was just a document split issue

(2) 6.5: I think you're missing a MUST in the list here.
I'd suggest something like: "5. Describe the security and
privacy (for the person/user-agent, not only xCDN)
consequences of the extension." I'm assuming that we agree
that it'd be a bad idea if e.g. some extension were defined
that allowed a uCDN tell a dCDN to try to track and report
on all of a user's activities. (Or at least, that'd need to
be documented/justified.)
2016-07-07
18 Stephen Farrell Ballot discuss text updated for Stephen Farrell
2016-07-07
18 Alexey Melnikov
[Ballot discuss]
I will need to re-Last Call the document due to 2 DownRefs:

RFC 5861 (HTTP Cache-Control Extensions for Stale Content).
RFC6707 (terminology).


In …
[Ballot discuss]
I will need to re-Last Call the document due to 2 DownRefs:

RFC 5861 (HTTP Cache-Control Extensions for Stale Content).
RFC6707 (terminology).


In regards to Spencer's comment:

  A server implementation of the
  CDNI metadata interface MUST reject all methods other than GET and
  HEAD.

I think this text needs to be deleted, because it puts extra requirements on generic HTTP servers that might be used to serve CDNI Metadata, which I think is a wrong thing to do.
2016-07-07
18 Alexey Melnikov [Ballot Position Update] Position for Alexey Melnikov has been changed to Discuss from Yes
2016-07-07
18 Alexey Melnikov
[Ballot comment]
I will need to re-Last Call the document due to 2 DownRefs:

RFC 5861 (HTTP Cache-Control Extensions for Stale Content).
RFC6707 (terminology).


In …
[Ballot comment]
I will need to re-Last Call the document due to 2 DownRefs:

RFC 5861 (HTTP Cache-Control Extensions for Stale Content).
RFC6707 (terminology).


In regards to Spencer's comment:

  A server implementation of the
  CDNI metadata interface MUST reject all methods other than GET and
  HEAD.

I think this text needs to be deleted, because it puts extra requirements on generic HTTP servers that might be used to serve CDNI Metadata, which I think is a wrong thing to do.
2016-07-07
18 Alexey Melnikov Ballot comment text updated for Alexey Melnikov
2016-07-07
18 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko
2016-07-07
18 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2016-07-06
18 Joel Jaeggli [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli
2016-07-06
18 Alissa Cooper
[Ballot comment]
- Sec 4.2.2.1: It seems odd to me that deny is the default given that footprints are mandatory to specify. It seems like …
[Ballot comment]
- Sec 4.2.2.1: It seems odd to me that deny is the default given that footprints are mandatory to specify. It seems like if footprints are going to be specified, the more common case would be to specify footprints where access is allowed, rather than where access is not allowed.

- Sec 6.3: "the HostIndex URI could be discovered" seems like conjecture unless some discovery mechanism has been specified somewhere. I would suggest either citing an existing discovery mechanism or not saying this.

- Sec 6.7: It seems like saying that CSPs and CDNs should avoid metadata conflict isn't quite enough. If a dCDN encounters conflicting metadata, what is it supposed to do? I think some sort of error condition would be useful to specify.

- I support Stephen's DISCUSS.
2016-07-06
18 Alissa Cooper [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper
2016-07-06
18 Ben Campbell
[Ballot comment]
The authors have proposed text to address my discuss comments (Thanks!), so I am clearing it on the assumption that people will do …
[Ballot comment]
The authors have proposed text to address my discuss comments (Thanks!), so I am clearing it on the assumption that people will do the right thing.  (See the document history for reference if needed.)

Substantive Comments:

- 4.1, example (applies to all examples of referenced objects): Given the rather strong guidance to use TLS to move metadata around, shouldn't the examples that show referenced objects use HTTPS URLs?

- 4.1.3, "paths" property: Am I correct to assume that _only_ the first match is used?

- 7.4: If the Auth type registry is initially unpopulated, doesn't that make the Auth property useless for the time being? Why even specify it now?

- 8.1, 2nd bullet: Could this sort of attack be used to distribute compromised content (e.g. malware) to  end users?

- 8.3: Couldn't lack of integrity protection enable theft-of-content, in addition to DoS? For example, if a MiTM changes the ACLs for a piece of content?

- 11.1, reference to 6706: This is another normative downref that does not appear to have been called out in the IETF last call announcement. I will leave it to the authors and AD to decide if that's okay.

Editorial Comments and Nits:

- General: I don't expect action on this in general, but this draft seems to have a lot of repeated material, which makes it considerably longer and harder to digest than necessary for the content. (Note that, for _normative_ text, such redundancy makes future updates error prone, even if the text is consistent now.)

- 3, first paragraph: I’m not sure what you mean by “aggregated” in this context.

- 3.2, third paragraph, last sentence: The MUST seems unneeded. Please consider simply saying " ... the dCDN processes the content request in accordance with the rest of the metadata.

- 4, paragraph 5: The MUST seems unneeded. There's no choice to make here;  this is simply the way CDNI metadata objects are encoded. (Recurs in 6.4, which seems redundant to this section.)

- 4.1.2, "Note" in definition of Host property: I usually think of "Note" to designate parenthetical or "sidebar" content. Please consider dropping the "Note" prefix for text that contains 2119 keywords. (There are multiple occurrences throughout.)

- 7.1.x Do you expect IANA to do something with these subsections? I don’t see this sort of detail in the IANA registry. Otherwise, they seems to belong in the main body, not the IANA considerations.
2016-07-06
18 Ben Campbell [Ballot Position Update] Position for Ben Campbell has been changed to No Objection from Discuss
2016-07-06
18 Alia Atlas [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas
2016-07-06
18 Alexey Melnikov [Ballot comment]
I will need to re-Last Call the document due to 2 DownRefs:

RFC 5861 (HTTP Cache-Control Extensions for Stale Content).
RFC6707 (terminology).
2016-07-06
18 Alexey Melnikov Ballot comment text updated for Alexey Melnikov
2016-07-06
18 Alexey Melnikov
1. Summary
 
The document shepherd is Francois Le Faucheur. The responsible AD is Alexey Melnikov. The requested RFC status is Standards Track.
 
This document defines …
1. Summary
 
The document shepherd is Francois Le Faucheur. The responsible AD is Alexey Melnikov. The requested RFC status is Standards Track.
 
This document defines a protocol by which a downstream CDN (dCDN) may query an upstream CDN (uCDN), in a CDN Interconnection (CDNI), to retrieve metadata related to a specific content asset being delivered by the dCDN, on behalf of the uCDN.  The metadata provides basic content delivery information, e.g., how to acquire the content asset, as well as optional content delivery policy information, e.g., geographic, time, and delegation restrictions.  The WG believes that a standardized method/protocol for organizing and conveying metadata from a uCDN to a dCDN is needed and will be useful.
 
2. Review and Consensus
 
The protocol is a straightforward RESTful API with JSON payloads.

The metadata is organized hierarchically, starting with the host and further differentiated by URI path of the content.  There was a lot of discussion early on as to whether a generic metadata interface was feasible or needed; there was concern that the complexity of designing a generic metadata interface would be prohibitive.

Much effort was put into defining how the metadata should be organized, so as to allow inheritance and override within the hierarchy, as well as metadata object reuse between hierarchies. There was broad discussion in the WG on this topic.  There were requirements for being able to exchange core pieces of metadata (e.g., how to acquire content), but there was also a desire to create an extensible protocol.  Multiple drafts were submitted and merged to arrive at the final design.  In addition to the extensible structure of the metadata, much discussion and effort was put into making sure that transit CDNs, which may or may not understand how to enforce the metadata, are able to safely redistribute the metadata or are able to recognize when redistribution of the metadata may violate content delivery policies.
 
The focus of the document is on providing metadata for delivering content via HTTP.  While the same metadata can be used to deliver content via HTTPS, there is no metadata defined for conveying metadata specific to setting up TLS connections between the dCDN and the end user.  It was discussed within the WG, but a secure solution was not deemed within the expertise of the WG.  Other solutions (e.g., LURK) could be used to address the TLS connection setup problem, and a CDNI metadata extension could be added once such a solution is available.
 
The metadata interface provides the same TLS guidelines as the CDNI logging, redirection, and control triggers interfaces.  There has been much discussion on privacy, with respect to CDNI logging and redirection and this has been considered for the CDNI metadata interface.  It should be noted that the metadata interface provides information about the uCDN and CSP policies to the dCDN. Though the metadata may contain private information, none of the information is third party end user information.
 
An early chair review was performed by Francois Le Faucheur, raising many editorial issues and requesting clarification on path matching, metadata override, and policy enforcement in cascaded CDN scenarios; all comments were addressed.  A subsequent independent review was performed by Vijay Gurbani, raising editorial comments, ambiguities, and requests for more details and more examples; all comments were addressed.  A final chair review was provided by Francois Le Faucheur, raising editorial and consistency issues; all comments were addressed.  Two additional independent reviews were performed by Linda Dunbar and Jan Seedorf, raising editorial comments which were all addressed.  An AppsDir early review was performed by Matt Miller, raising JSON issues, the need for more examples, and editorial issues; all comments were addressed. An early AD review was conducted by Alex Melnikov, raising a number of comments around security, proper use of RFC2119 terminology, references and autodiscovery; most comments have been addressed and the remaining ones have been discussed and are to be addressed in an upcoming version.
 
3. Intellectual Property
 
Each author has confirmed conformance with BCP 78/79.

There were no IPR disclosure made against this document.
 
4. Other Points
 
There is a downward reference for RFC5861, which is not in the DownrefRegistry.
 
There is a downward reference for RFC6707, which is not (yet) in the DownrefRegistry. RFC6707 is identified as a Normative Reference because its terminology is reused in this document.
 
The IANA Considerations registers 20 new CDNI Payload Types, one for each of the GenericMetadata objects defined in the document. Both of the designated expert reviewers for the CDNI Payload Types registry are authors of this document and have approved the additions.
 
The IANA Considerations creates a new "CDNI Metadata Footprint Types" registry with sufficient guidelines provided to both IANA and the designated expert reviewer.  The registry defines footprint types used by both the Metadata LocationACL, as well as the footprints defined in the Footprint and Capabilities Semantics document (already approved by the IESG).
 
The IANA Considerations creates a new "CDNI Metadata Protocols" registry with sufficient guidelines provided to both IANA and the designated expert reviewer.  The registry defines delivery and acquisition protocols used by both the Metadata ProtocolACL, as well as the DeliveryProtocol and AcquisitionProtocol capabilities defined in the Footprint and Capabilities Semantics document (already approved by the IESG).
 
The IANA Considerations creates a new "CDNI Metadata Auth Types" registry with sufficient guidelines provided to both IANA and the designated expert reviewer.  The registry is initially empty.  The initial Auth type is being defined in the URI Signing document which is preparing for WGLC.
2016-07-06
18 Benoît Claise
[Ballot comment]
My review flagged the same DISCUSS point 1 as Ben: the downref (The writeup mentions the two downrefs though).

Secondly, the writeup, https://datatracker.ietf.org/doc/draft-ietf-cdni-metadata/shepherdwriteup/ …
[Ballot comment]
My review flagged the same DISCUSS point 1 as Ben: the downref (The writeup mentions the two downrefs though).

Secondly, the writeup, https://datatracker.ietf.org/doc/draft-ietf-cdni-metadata/shepherdwriteup/, is not really readable.

And finally, Sheng Jiang's OPS DIR review flagged:
The example of footprint object has examples using IPv4. Because the other parts of this document does have IPv6 example, I think this is probably a mistake rather than not supporting IPv6 here on purpose (if it is on purpose, an explanation for reasons are necessary).
2016-07-06
18 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2016-07-06
18 Stephen Farrell
[Ballot discuss]

(1) I don't get the model for telling a dCDN that the user
agent has to have authenticated or that some authorization
is …
[Ballot discuss]

(1) I don't get the model for telling a dCDN that the user
agent has to have authenticated or that some authorization
is needed before content is to be delivered. Can you
explain?  For example, neither 4.2.5 nor 4.2.7 tell me how
to do anything but allow open-access, and the relevant IANA
registry (section 7.4) is empty, so I'm puzzled.

(2) 6.5: I think you're missing a MUST in the list here.
I'd suggest something like: "5. Describe the security and
privacy (for the person/user-agent, not only xCDN)
consequences of the extension." I'm assuming that we agree
that it'd be a bad idea if e.g. some extension were defined
that allowed a uCDN tell a dCDN to try to track and report
on all of a user's activities. (Or at least, that'd need to
be documented/justified.)
2016-07-06
18 Stephen Farrell
[Ballot comment]

- general: I agree with Ben's discuss about use of TLS. I
also wonder if IPsec is really going to be used here. …
[Ballot comment]

- general: I agree with Ben's discuss about use of TLS. I
also wonder if IPsec is really going to be used here. And
even if so, you might be better off to say that TLS with
mutual-auth SHOULD be used in all cases.

- general: Don't you need some guidance for the dCDN to say
when to stop following (what might be circular) links?

- general: I think it'd be better if the examples given used
https in all cases, assuming we do think that'd be better.
And if it'd not be better, saying why would I think be good.

- 1.2, last para: I don't get what this is saying. What
additional things need specifying? If all you mean is that
the dCDN and uCDN need to be able to setup TLS sessions, and
hence need to agree on what CAs and ciphersuites to use,
then maybe just say that. (You do already refer to RFC7525
so most of that is covered there I think.)

- 4.1.1: I don't think I-JSON requires that order be
preserved, but you seem to need that here, e.g. if a tCDN
decodes and re-encodes, or if a uCDN round-trips a data
structure. Is there a missing "MUST preserve order"
somewhere?

- 4.1.x, 4.2.x, 4.3.x: I wonder if the specification is a
bit too loose in places here, e.g. what does "$$" mean in
4.1.5 and why is that special?  In the same section I also
wasn't clear if "/movies/" is the same as "/movies/*" or
not, nor if you consider that "/movies/*" does or doesn't
match "/movies/1/2/3". Isn't a reference needed in 4.3.4?
I'd guess that a lot of this is close enough that
implementations will likely get a lot, but not all, of this
right, and that that might lead to corner-cases where
interop isn't so good.  Improving that would seem like a
good idea, but perhaps it's better to wait and see what
deployments do and then tidy this up? Not sure.  In reading
I spotted a number of places where such things occurred to
me (but didn't write them all down, sorry;-).

- 6.8: I didn't follow this, sorry;-) I assume it's
considered clear enough for implementers, so feel free to
ignore me, but I didn't get how to know whether or not e.g.
".v2.2.2" is newer than ".v2" or ".fixed-v1".

- 8.3: did the WG consider (possibly future) uses of JOSE to
provide e2e security from uCDN to dCDN even via tCDN? I'm ok
that you don't define that now, but wondered, as it seems
like a fairly obvious thing to want. (To this security nerd
anyway:-) I also wondered the same for 8.4, but I get that
that'd be less likely of widespread utility. If using IPsec
to security inter-CDN links, something like JOSE would seem
to me to add quite a bit of value, if the CDNs insist on not
using TLS.
2016-07-06
18 Stephen Farrell [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell
2016-07-05
18 Suresh Krishnan [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan
2016-07-05
18 Terry Manderson [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson
2016-07-05
18 Spencer Dawkins
[Ballot comment]
I agree with Ben's Discuss, and several comments from Ben and other ADs, but I'm balloting Yes, assuming those get sorted.

I did …
[Ballot comment]
I agree with Ben's Discuss, and several comments from Ben and other ADs, but I'm balloting Yes, assuming those get sorted.

I did have a couple of questions, of course.

I'm a little bit mystified by this SHOULD:

  If any metadata not supported
  by the dCDN is marked as "mandatory-to-enforce", the dCDN SHOULD NOT
  accept the content redirection request, in order to avoid receiving
  content requests that it will not be able to satisfy/serve.
 
so, why _would_ a dCDN accept the content redirection request? If this isn't a MUST, it would be nice to explain that - I'm reading this text as "you SHOULD NOT do this unless you like getting unnecessary support calls".

This next one is probably my lack of understanding about CDNI implementations, but the document mentions the HTTP HEAD method exactly twice:

  The HTTP Method in the request defines the operation the request
  would like to perform.  A server implementation of the CDNI metadata
  interface MUST support the HTTP GET and HEAD methods.
 
and

  The CDNI metadata interface specified in this document is a read-only
  interface.  Therefore support for other HTTP methods such as PUT,
  POST, DELETE, etc. is not specified.  A server implementation of the
  CDNI metadata interface MUST reject all methods other than GET and
  HEAD.
 
The MUST support for GET, and the MUST reject for all methods other than GET and HEAD, make perfect sense with your explanation, but I'm not sure why support for HEAD is a MUST.
 
Is that just so a client can check the HTTP metadata for the CDNI metadata without GETting it? Or is there more to it than that? I won't be surprised if you say "no, nothing more to it than that" ... but if that's the answer, it might be worth saying so.
2016-07-05
18 Spencer Dawkins [Ballot Position Update] New position, Yes, has been recorded for Spencer Dawkins
2016-07-05
18 Ben Campbell
[Ballot discuss]
I have two concerns that I would like to see discussed prior to publication:

1) Section 6.2 cites a normative reference to RFC …
[Ballot discuss]
I have two concerns that I would like to see discussed prior to publication:

1) Section 6.2 cites a normative reference to RFC 5861. That's an ISE stream informational RFC. The text as written seems to normatively require implementation of that RFC to enable the "caching" feature. Did the working group discuss the implications of that? (I also note that this doesn't appear to have been called out at IETF last call. While there has been some discussion about relaxing that requirement, I'm not sure this is an appropriate place to do so.)

2) Section 8.5 contains the "In an environment where any such protection is required" language that has been discussed for several CDNI drafts. But in this particular case, the implication that there may be environments where such protection is _not_ required seems to conflict with the multiple occurrences of "MUST use strong encryption/mutual authentication" in sections 8.1-8.4.
2016-07-05
18 Ben Campbell
[Ballot comment]
Substantive Comments:

- 4.1, example (applies to all examples of referenced objects): Given the rather strong guidance to use TLS to move metadata …
[Ballot comment]
Substantive Comments:

- 4.1, example (applies to all examples of referenced objects): Given the rather strong guidance to use TLS to move metadata around, shouldn't the examples that show referenced objects use HTTPS URLs?

- 4.1.3, "paths" property: Am I correct to assume that _only_ the first match is used?

- 7.4: If the Auth type registry is initially unpopulated, doesn't that make the Auth property useless for the time being? Why even specify it now?

- 8.1, 2nd bullet: Could this sort of attack be used to distribute compromised content (e.g. malware) to  end users?

- 8.3: Couldn't lack of integrity protection enable theft-of-content, in addition to DoS? For example, if a MiTM changes the ACLs for a piece of content?

- 11.1, reference to 6706: This is another normative downref that does not appear to have been called out in the IETF last call announcement. I will leave it to the authors and AD to decide if that's okay.

Editorial Comments and Nits:

- General: I don't expect action on this in general, but this draft seems to have a lot of repeated material, which makes it considerably longer and harder to digest than necessary for the content. (Note that, for _normative_ text, such redundancy makes future updates error prone, even if the text is consistent now.)

- 3, first paragraph: I’m not sure what you mean by “aggregated” in this context.

- 3.2, third paragraph, last sentence: The MUST seems unneeded. Please consider simply saying " ... the dCDN processes the content request in accordance with the rest of the metadata.

- 4, paragraph 5: The MUST seems unneeded. There's no choice to make here;  this is simply the way CDNI metadata objects are encoded. (Recurs in 6.4, which seems redundant to this section.)

- 4.1.2, "Note" in definition of Host property: I usually think of "Note" to designate parenthetical or "sidebar" content. Please consider dropping the "Note" prefix for text that contains 2119 keywords. (There are multiple occurrences throughout.)

- 7.1.x Do you expect IANA to do something with these subsections? I don’t see this sort of detail in the IANA registry. Otherwise, they seems to belong in the main body, not the IANA considerations.
2016-07-05
18 Ben Campbell [Ballot Position Update] New position, Discuss, has been recorded for Ben Campbell
2016-07-05
18 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2016-07-05
18 Kathleen Moriarty
[Ballot comment]
I can see why unauthorized access to content isn't a concern since this draft is just about the metadata, but wouldn't billing/theft be …
[Ballot comment]
I can see why unauthorized access to content isn't a concern since this draft is just about the metadata, but wouldn't billing/theft be a possible avenue of attack to be listed as a consideration through alterations of the metadata?
2016-07-05
18 Kathleen Moriarty [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty
2016-07-05
18 Mirja Kühlewind
[Ballot comment]
Two comments:

1) It's still not really clear to me why the use of HTTPS is not mandatory... maybe that's related to my …
[Ballot comment]
Two comments:

1) It's still not really clear to me why the use of HTTPS is not mandatory... maybe that's related to my second comment below...?

2) I'm a little confused with the use of the term 'caching'. Maybe I'm assuming a wrong scenario, but to my understanding a dCDN would request metadata from an uCDN and simply store them. Or would the dCDN re-distribute the metadata it got from the uCDN to other dCDNs?
2016-07-05
18 Mirja Kühlewind [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind
2016-07-01
18 Alexey Melnikov IESG state changed to IESG Evaluation from Waiting for Writeup
2016-07-01
18 Alexey Melnikov Ballot has been issued
2016-07-01
18 Alexey Melnikov [Ballot Position Update] New position, Yes, has been recorded for Alexey Melnikov
2016-07-01
18 Alexey Melnikov Created "Approve" ballot
2016-07-01
18 Alexey Melnikov Ballot writeup was changed
2016-07-01
18 Alexey Melnikov Changed consensus to Yes from Unknown
2016-06-30
18 Meral Shirazipour Request for Last Call review by GENART Completed: Ready. Reviewer: Meral Shirazipour.
2016-06-30
18 Meral Shirazipour Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Meral Shirazipour.
2016-06-30
18 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Dacheng Zhang.
2016-06-29
18 Sabrina Tanamal IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK
2016-06-27
18 (System) IESG state changed to Waiting for Writeup from In Last Call
2016-06-24
18 (System) IANA Review state changed to IANA - Not OK from IANA - Review Needed
2016-06-24
18 Sabrina Tanamal
(Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-cdni-metadata-18.txt. If any part of this review is inaccurate, please let us know.

IANA …
(Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs:

IANA has completed its review of draft-ietf-cdni-metadata-18.txt. If any part of this review is inaccurate, please let us know.

IANA understands that, upon approval of this document, there are four actions which much be completed.

As this document requests registrations in an Expert Review or Specification Required (see RFC 5226) registry, we will initiate the required Expert Review via a separate request. Expert review will need to be completed before your document can be approved for publication as an RFC.

First, in the CDNI Payload Types subregistry of the Content Delivery Network Interconnection (CDNI) Parameters registry located at:

http://www.iana.org/assignments/cdni-parameters/

twenty new payload types are to be registered as follows:

+--------------------------+---------------------+
| Payload Type | Specification |
+--------------------------+---------------------+
| MI.HostIndex | [ RFC-to-be ] |
| MI.HostMatch | [ RFC-to-be ] |
| MI.HostMetadata | [ RFC-to-be ] |
| MI.PathMatch | [ RFC-to-be ] |
| MI.PatternMatch | [ RFC-to-be ] |
| MI.PathMetadata | [ RFC-to-be ] |
| MI.SourceMetadata | [ RFC-to-be ] |
| MI.Source | [ RFC-to-be ] |
| MI.LocationACL | [ RFC-to-be ] |
| MI.LocationRule | [ RFC-to-be ] |
| MI.Footprint | [ RFC-to-be ] |
| MI.TimeWindowACL | [ RFC-to-be ] |
| MI.TimeWindowRule | [ RFC-to-be ] |
| MI.TimeWindow | [ RFC-to-be ] |
| MI.ProtocolACL | [ RFC-to-be ] |
| MI.ProtocolRule | [ RFC-to-be ] |
| MI.DeliveryAuthorization | [ RFC-to-be ] |
| MI.Cache | [ RFC-to-be ] |
| MI.Auth | [ RFC-to-be ] |
| MI.Grouping | [ RFC-to-be ] |
+--------------------------+---------------------+

Second, a new subregistry is to be created called the CDNI Metadata Footprint Types registry. The new registry will be a subregistry of the Content Delivery Network Interconnection (CDNI) Parameters registry located at:

http://www.iana.org/assignments/cdni-parameters/

The registration rules for the new registry are "Specification Required" as defined by RFC 5226. There are initial registrations in the new registry as follows:

+----------------+-------------------------------+---------------------+
| Footprint Type | Description | Specification |
+----------------+-------------------------------+---------------------+
| ipv4cidr | IPv4 CIDR address block | [ RFC-to-be ] |
| ipv6cidr | IPv6 CIDR address block | [ RFC-to-be ] |
| asn | Autonomous System (AS) Number | [ RFC-to-be ] |
| countrycode | ISO 3166-1 alpha-2 code | [ RFC-to-be ] |
+----------------+-------------------------------+---------------------+

Third, a new subregistry is to be created called the CDNI Metadata Protocol Types registry. The new registry will be a subregistry of the Content Delivery Network Interconnection (CDNI) Parameters registry located at:

http://www.iana.org/assignments/cdni-parameters/

The registration rules for the new registry are "Specification Required" as defined by RFC 5226. There are initial registrations in the new registry as follows:

+-----------+----------------------+---------------------+----------------+
| Protocol | Description | Type | Protocol |
| Type | | Specification | Specifications |
+-----------+----------------------+---------------------+----------------+
| http/1.1 | Hypertext Transfer | [ RFC-to-be ] | RFC7230 |
| | Protocol -- HTTP/1.1 | | |
| https/1.1 | HTTP/1.1 Over TLS | [ RFC-to-be ] | RFC7230, |
| | | | RFC2818 |
+-----------+----------------------+---------------------+----------------+

Fourth, a new subregistry is to be created called the CDNI Metadata Auth Types registry. The new registry will be a subregistry of the Content Delivery Network Interconnection (CDNI) Parameters registry located at:

http://www.iana.org/assignments/cdni-parameters/

The registration rules for the new registry are "Specification Required" as defined by RFC 5226. There are no initial registrations in the new registry.

IANA understands that, upon approval of this document, these are the only actions that need to be completed by IANA.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed. 


Thank you,

Sabrina Tanamal
IANA Specialist
ICANN
2016-06-23
18 François Le Faucheur
{\rtf1\ansi\ansicpg1252\cocoartf1404\cocoasubrtf470
{\fonttbl\f0\fmodern\fcharset0 CourierNewPSMT;\f1\froman\fcharset0 TimesNewRomanPSMT;}
{\colortbl;\red255\green255\blue255;}
\paperw11900\paperh16840\margl1440\margr1440\vieww34140\viewh25560\viewkind0
\deftab720
\pard\pardeftab720\partightenfactor0

\f0\fs36 \cf0 \expnd0\expndtw0\kerning0
1. Summary
\f1 \

\f0 \'a0
\f1 \

\f0 The document shepherd is Francois …
{\rtf1\ansi\ansicpg1252\cocoartf1404\cocoasubrtf470
{\fonttbl\f0\fmodern\fcharset0 CourierNewPSMT;\f1\froman\fcharset0 TimesNewRomanPSMT;}
{\colortbl;\red255\green255\blue255;}
\paperw11900\paperh16840\margl1440\margr1440\vieww34140\viewh25560\viewkind0
\deftab720
\pard\pardeftab720\partightenfactor0

\f0\fs36 \cf0 \expnd0\expndtw0\kerning0
1. Summary
\f1 \

\f0 \'a0
\f1 \

\f0 The document shepherd is Francois Le Faucheur.\'a0The responsible AD is Alexey Melnikov. The requested RFC status is Standards Track.
\f1 \

\f0 \'a0
\f1 \

\f0 This document defines a protocol by which a downstream CDN (dCDN) may query an upstream CDN (uCDN), in a CDN Interconnection (CDNI), to retrieve metadata related to a specific content asset being delivered by the dCDN, on behalf of the uCDN.\'a0 The metadata provides basic content delivery information, e.g., how to acquire the content asset, as well as optional content delivery policy information, e.g., geographic, time, and delegation restrictions.\'a0 The WG believes that a standardized method/protocol for organizing and conveying metadata from a uCDN to a dCDN is needed and will be useful.
\f1 \

\f0 \'a0
\f1 \

\f0 2. Review and Consensus
\f1 \

\f0 \'a0
\f1 \

\f0 The protocol is a straightforward RESTful API with JSON payloads.
\f1 \

\f0 \
The metadata is organized hierarchically, starting with the host
\f1 
\f0 and further differentiated by URI path of the content.\'a0 There was a lot of discussion early on as to whether a generic metadata interface was feasible or needed; there was concern that the complexity of designing a generic metadata interface would be prohibitive. \
\
Much effort was put into defining how the metadata should be
\f1 
\f0 organized, so as to allow inheritance and override within the hierarchy, as well as metadata object reuse between hierarchies. There was broad discussion in the WG on this topic.\'a0 There were requirements for being able to exchange core pieces of metadata (e.g., how to acquire content), but there was also a desire to create an extensible protocol.\'a0 Multiple drafts were submitted and merged to arrive at the final design.\'a0 In addition to the extensible structure of the metadata, much discussion and effort was put into making sure that transit CDNs, which may or may not understand how to enforce the metadata, are able to safely redistribute the metadata or are able to recognize when redistribution of the metadata may violate content delivery policies.
\f1 \

\f0 \'a0
\f1 \

\f0 The focus of the document is on providing metadata for delivering
\f1 
\f0 content via HTTP.\'a0 While the same metadata can be used to deliver content via HTTPS, there is no metadata defined for conveying metadata specific to setting up TLS connections between the dCDN and the end user.\'a0 It was discussed within the WG, but a secure solution was not deemed within the expertise of the WG.\'a0 Other solutions (e.g., LURK) could be used to address the TLS connection setup problem, and a CDNI metadata extension could be added once such a solution is available.
\f1 \

\f0 \'a0
\f1 \

\f0 The metadata interface provides the same TLS guidelines as the CDNI logging, redirection, and control triggers interfaces.\'a0 There has been much discussion on privacy, with respect to CDNI logging and redirection and this has been considered for the CDNI metadata interface.\'a0 It should be noted that the metadata interface provides information about the uCDN and CSP policies to the dCDN. Though the metadata may contain private information, none of the information is third party end user information.
\f1 \

\f0 \'a0
\f1 \

\f0 An early chair review was performed by Francois Le Faucheur, raising many editorial issues and requesting clarification on path matching, metadata override, and policy enforcement in cascaded CDN scenarios; all comments were addressed.\'a0 A subsequent independent review was performed by Vijay Gurbani, raising editorial comments, ambiguities, and requests for more details and more examples; all comments were addressed.\'a0 A final chair review was provided by Francois Le Faucheur, raising editorial and consistency issues; all comments were addressed.\'a0 Two additional independent reviews were performed by Linda Dunbar and Jan Seedorf, raising editorial comments which were all addressed.\'a0 An AppsDir early review was performed by Matt Miller, raising JSON issues, the need for more examples, and editorial issues; all comments were addressed. An early AD review was conducted by Alex Melnikov, raising a number of comments around security, proper use of RFC2119 terminology, references and autodiscovery; most comments have been addressed and the remaining ones have been discussed and are to be addressed in an upcoming version.
\f1 \

\f0 \'a0
\f1 \

\f0 3. Intellectual Property
\f1 \

\f0 \'a0
\f1 \

\f0 Each author has confirmed conformance with BCP 78/79.
\f1 \
\

\f0 There were no IPR disclosure made against this document.
\f1 \

\f0 \'a0
\f1 \

\f0 4. Other Points
\f1 \

\f0 \'a0
\f1 \

\f0 There is a downward reference for RFC5861, which is not in the DownrefRegistry.
\f1 \

\f0 \'a0
\f1 \

\f0 There is a downward reference for RFC6707, which is not (yet) in the DownrefRegistry. RFC6707 is identified as a Normative Reference because its terminology is reused in this document.
\f1 \

\f0 \'a0
\f1 \

\f0 The IANA Considerations registers 20 new CDNI Payload Types, one for each of the GenericMetadata objects defined in the document. Both of the designated expert reviewers for the CDNI Payload Types
\f1 
\f0 registry are authors of this document and have approved the additions.
\f1 \

\f0 \'a0
\f1 \

\f0 The IANA Considerations creates a new "CDNI Metadata Footprint Types" registry with sufficient guidelines provided to both IANA and the designated expert reviewer.\'a0 The registry defines footprint types used by both the Metadata LocationACL, as well as the footprints defined in the Footprint and Capabilities Semantics document (already approved by the IESG).
\f1 \

\f0 \'a0
\f1 \

\f0 The IANA Considerations creates a new "CDNI Metadata Protocols"
\f1 
\f0 registry with sufficient guidelines provided to both IANA and the designated expert reviewer.\'a0 The registry defines delivery and acquisition protocols used by both the Metadata ProtocolACL, as well as the DeliveryProtocol and AcquisitionProtocol capabilities defined in the Footprint and Capabilities Semantics document (already approved by the IESG).
\f1 \

\f0 \'a0
\f1 \

\f0 The IANA Considerations creates a new "CDNI Metadata Auth Types" registry with sufficient guidelines provided to both IANA and the designated expert reviewer.\'a0 The registry is initially empty.\'a0 The initial Auth type is being defined in the URI Signing document which is preparing for WGLC.
\f1 \
}
2016-06-20
18 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Sheng Jiang
2016-06-20
18 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Sheng Jiang
2016-06-17
18 Tero Kivinen Request for Last Call review by SECDIR is assigned to Dacheng Zhang
2016-06-17
18 Tero Kivinen Request for Last Call review by SECDIR is assigned to Dacheng Zhang
2016-06-16
18 Jean Mahoney Request for Last Call review by GENART is assigned to Meral Shirazipour
2016-06-16
18 Jean Mahoney Request for Last Call review by GENART is assigned to Meral Shirazipour
2016-06-13
18 Amy Vezza IANA Review state changed to IANA - Review Needed
2016-06-13
18 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: "IETF-Announce"
CC: alexey.melnikov@isode.com, flefauch@cisco.com, cdni@ietf.org, draft-ietf-cdni-metadata@ietf.org, cdni-chairs@ietf.org
Reply-To: ietf@ietf.org …
The following Last Call announcement was sent out:

From: The IESG
To: "IETF-Announce"
CC: alexey.melnikov@isode.com, flefauch@cisco.com, cdni@ietf.org, draft-ietf-cdni-metadata@ietf.org, cdni-chairs@ietf.org
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (CDN Interconnection Metadata) to Proposed Standard


The IESG has received a request from the Content Delivery Networks
Interconnection WG (cdni) to consider the following document:
- 'CDN Interconnection Metadata'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2016-06-27. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  The Content Delivery Networks Interconnection (CDNI) metadata
  interface enables interconnected Content Delivery Networks (CDNs) to
  exchange content distribution metadata in order to enable content
  acquisition and delivery.  The CDNI metadata associated with a piece
  of content provides a downstream CDN with sufficient information for
  the downstream CDN to service content requests on behalf of an
  upstream CDN.  This document describes both a base set of CDNI
  metadata and the protocol for exchanging that metadata.

The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-cdni-metadata/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-cdni-metadata/ballot/


No IPR declarations have been submitted directly on this I-D.


2016-06-13
18 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2016-06-13
18 Alexey Melnikov Placed on agenda for telechat - 2016-07-07
2016-06-13
18 Alexey Melnikov Last call was requested
2016-06-13
18 Alexey Melnikov Ballot approval text was generated
2016-06-13
18 Alexey Melnikov Ballot writeup was generated
2016-06-13
18 Alexey Melnikov IESG state changed to Last Call Requested from AD Evaluation
2016-06-13
18 Alexey Melnikov IESG state changed to AD Evaluation from Publication Requested
2016-06-13
18 Alexey Melnikov IESG state changed to Publication Requested from AD is watching
2016-06-13
18 Alexey Melnikov Shepherding write-up will be finished while the document is in IETF LC.
2016-06-13
18 Alexey Melnikov Tag Revised I-D Needed - Issue raised by AD cleared.
2016-06-13
18 Alexey Melnikov Last call announcement was changed
2016-06-13
18 Alexey Melnikov Last call announcement was generated
2016-06-13
18 Alexey Melnikov
Most of my issues from AD review were fixed in -18. Here are the remaining issues:


In 4.1.2: hostname need to have defined syntax (at …
Most of my issues from AD review were fixed in -18. Here are the remaining issues:


In 4.1.2: hostname need to have defined syntax (at least by reference). You also need to say whether IDN domain names are
allowed here.

In 6.1:

  The CDNI metadata interface specified in this document is a read-only
  interface.  Therefore support for other HTTP methods such as PUT,
  POST, DELETE, etc. is not specified.  A server implementation of the
  CDNI metadata interface MUST reject all methods other than GET and
  HEAD.

I think the change to the MUST is too strong and is a wrong thing to do,
because that means that existing HTTP/1.1 software might have to be modified to
support this specification.

So I would prefer that you either delete the last sentence or reword to say
"doesn't have to support any methods other that ..."

In 8.3:

  An implementation of the CDNI metadata interface MUST use strong
  encryption and mutual authentication to prevent undetectable

Encryption doesn't necessarily provide integrity of data, so I would change "strong encryption" to TLS.

  modification of metadata (see Section 8.5).
2016-06-11
18 Kevin Ma IETF WG state changed to WG Consensus: Waiting for Write-Up from Waiting for WG Chair Go-Ahead
2016-06-11
18 Kevin Ma New version available: draft-ietf-cdni-metadata-18.txt
2016-06-08
17 Alexey Melnikov Tag Revised I-D Needed - Issue raised by AD set.
2016-06-08
17 Alexey Melnikov IETF WG state changed to Waiting for WG Chair Go-Ahead from WG Document
2016-06-03
17 Alexey Melnikov Early AD review: https://www.ietf.org/mail-archive/web/cdni/current/msg02649.html
2016-05-20
17 Kevin Ma New version available: draft-ietf-cdni-metadata-17.txt
2016-04-28
16 Kevin Ma New version available: draft-ietf-cdni-metadata-16.txt
2016-04-12
15 Kevin Ma New version available: draft-ietf-cdni-metadata-15.txt
2016-04-12
14 Kevin Ma New version available: draft-ietf-cdni-metadata-14.txt
2016-04-06
13 Amy Vezza Shepherding AD changed to Alexey Melnikov
2016-03-21
13 Kevin Ma New version available: draft-ietf-cdni-metadata-13.txt
2015-10-19
12 Matt Caulfield New version available: draft-ietf-cdni-metadata-12.txt
2015-10-14
11 (System) Notify list changed from cdni-chairs@ietf.org, draft-ietf-cdni-metadata@ietf.org to (None)
2015-07-27
11 Ben Niven-Jenkins New version available: draft-ietf-cdni-metadata-11.txt
2015-07-18
10 Spencer Dawkins Shepherding AD changed to Barry Leiba
2015-07-06
10 Ben Niven-Jenkins New version available: draft-ietf-cdni-metadata-10.txt
2015-03-04
09 Ben Niven-Jenkins New version available: draft-ietf-cdni-metadata-09.txt
2014-10-27
08 Matt Caulfield New version available: draft-ietf-cdni-metadata-08.txt
2014-07-03
07 Ben Niven-Jenkins New version available: draft-ietf-cdni-metadata-07.txt
2014-02-18
06 François Le Faucheur Document shepherd changed to Francois Le Faucheur
2014-02-14
06 Kevin Ma New version available: draft-ietf-cdni-metadata-06.txt
2014-02-14
05 Matt Caulfield New version available: draft-ietf-cdni-metadata-05.txt
2013-12-06
04 Matt Caulfield New version available: draft-ietf-cdni-metadata-04.txt
2013-10-21
03 Matt Caulfield New version available: draft-ietf-cdni-metadata-03.txt
2013-07-15
02 Matt Caulfield New version available: draft-ietf-cdni-metadata-02.txt
2013-05-20
01 Cindy Morgan Shepherding AD changed to Spencer Dawkins
2013-02-25
01 Matt Caulfield New version available: draft-ietf-cdni-metadata-01.txt
2012-12-18
00 Martin Stiemerling Intended Status changed to Proposed Standard
2012-12-18
00 Martin Stiemerling IESG process started in state AD is watching
2012-10-02
00 Matt Caulfield New version available: draft-ietf-cdni-metadata-00.txt