An Architecture for DNS-Bound Client and Sender Identities
draft-ietf-dance-architecture-10
Revision differences
Document history
| Date | Rev. | By | Action |
|---|---|---|---|
|
2026-01-22
|
10 | Cindy Morgan | Changed consensus to Yes from Unknown |
|
2026-01-22
|
10 | (System) | Changed action holders to Ash Wilson, Shumon Huque, Olle Johansson, Michael Richardson (IESG state changed) |
|
2026-01-22
|
10 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
|
2026-01-22
|
10 | Jean Mahoney | Closed request for IETF Last Call review by GENART with state 'Overtaken by Events': Gen AD has already balloted |
|
2026-01-22
|
10 | Jean Mahoney | Assignment of request for IETF Last Call review by GENART to Matt Joras was marked no-response |
|
2026-01-21
|
10 | Roman Danyliw | [Ballot discuss] ** Section 5. 5. Protocol implementations For each protocol implementation, a specific usage document needs to be published. In this document, … [Ballot discuss] ** Section 5. 5. Protocol implementations For each protocol implementation, a specific usage document needs to be published. In this document, the DANCE protocol requirements and usage needs to be specified (this is refered above as the "How to DANCE" document). These documents should as a minimum contain the following sections: I’m having trouble understanding the guidance in this section. -- What is a protocol implementation? What exactly is being implemented? -- Who has to publish a “usage document”? Where? -- This text references to a “How to DANCE” document “above” as having requirements? I am having trouble finding such a section in this document. -- This text appears to be mandating the creation of an artifact under certain circumstances (see above questions on clarifying that). Assuming this text is discussing future protocol work in the IETF, should an informational status document be providing such direction? Note, the typo "refered". |
|
2026-01-21
|
10 | Roman Danyliw | [Ballot comment] I support the DISCUSS position of Deb Cooley. ** Section 1. Attempting to use organizational PKI outside the organization can be … [Ballot comment] I support the DISCUSS position of Deb Cooley. ** Section 1. Attempting to use organizational PKI outside the organization can be challenging. What is an “organizational PKI”? ** Section 2 *DANCE protocol:* A DANCE protocol is protocol that has been taught to use DANE client mchanisms.. What does it mean to “teach” a protocol something? Is this equivalent to any protocol that uses DANE client mechanisms? If so, what precisely is a “DANE client mechanism”? Can a reference be provided? Note the typo of "mchanism". ** Section 2 *User:* A client whose name consists of a user identity and a DNS owner name prefixed with a _user label. Is there a reference that can be provided to formally define a “DNS owner name”? ** Section 3.1 Client/server communication patterns imply a direct connection between an entity which provides a service (the server), and an entity which initiates a connection to the server, called a client. A secure implementation of this pattern includes a TLS-protected session directly between the client and the server. A secure implementation may also include public key-based mutual authentication. What is a “direct connection”? Are middleboxes on path permitted? ** Section 3.1 Extending DANE to include client identity allows the server to authenticate clients independent of the private PKI used to issue the client certificate. Consider if you want to introduce “DANE” with a set of references. ** Section 3.1 In many cases the client is not a user specific device (like a laptop or smartphone), but rather an enterprise or residential device with a non-user specific name. … When the client is a user device, then additional precautions may be necessary to avoid divulging personally identitiable information in the DNS. Why could enterprise devices not have sensitive names? Note the typo of "identitiable" |
|
2026-01-21
|
10 | Roman Danyliw | [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw |
|
2026-01-21
|
10 | Gorry Fairhurst | [Ballot comment] Thank you for the effort put into this specification. I have only minor editorial comments that could be addressed in the next revision: … [Ballot comment] Thank you for the effort put into this specification. I have only minor editorial comments that could be addressed in the next revision: - I couldn't clearly identify what was intended by the words /The extension.../. - Please could you define both /DANE/ and /DANCE/ when first mentioned. - /The Messaging-oriented/ - Check whether the capital 'M'is correct? - It would be helpful to define /TLSA/ when first mentioned. - The last two bullets in section 5 currently omit a trailing period. Best wishes, Gorry |
|
2026-01-21
|
10 | Gorry Fairhurst | [Ballot Position Update] New position, No Objection, has been recorded for Gorry Fairhurst |
|
2026-01-21
|
10 | Deb Cooley | [Ballot discuss] I'm discussing two ideas promoted by this draft: 1. using DNS as a public directory for people (privacy issue), 2. The trade of … [Ballot discuss] I'm discussing two ideas promoted by this draft: 1. using DNS as a public directory for people (privacy issue), 2. The trade of trusting CAs vs trusting a DNS DANE entry. Is more secure than the other (security)? Section 1, para 4, 5, and 7: 'require users and devices', does this draft target users (i.e. people)? I've heard that it is only for 'devices', but yet Section 4.1.3 (TLS user auth for an LDAP query), Section 4.1.7 (domain users), 4.1.11 (SSH client), and any other place the draft uses the term 'users' points to this being for both devices and people. Using DNS as a public directory for people public keys/certificates has massive privacy implications. Section 3.1: This architecture seems to be making a trade of 'trusting private CAs' to 'trust what is in a DNS DANE entry'. These two mechanisms are basically the same from a trust perspective. Either a server trusts a CA, or it trusts the certificate/pub key in a DNS entry. I see no advantage here, and it impacts both privacy and interoperability. Section 3.2: Again, users? people? Using DNS as a public directory has massive privacy issues. Section 3.3: I normally think of S/MIME as being used by people, and out of band public key discovery mechanisms is, in fact, a public directory. |
|
2026-01-21
|
10 | Deb Cooley | [Ballot comment] Thanks to Magnus Nyström for their secdir review. Have the dance drafts (this and the 2 protocol drafts) been vetted through the tls … [Ballot comment] Thanks to Magnus Nyström for their secdir review. Have the dance drafts (this and the 2 protocol drafts) been vetted through the tls working group? Section 1, para 5: 'chilling effect', seems a little extreme. It is a barrier, but surely not 'chilling'. Section 1, para 6: I would argue that this is 'by design'. Why would I trust another domain? At least without understanding the rules by which they run their system. If that trust exists, then there are cross certificates which can provide the extension of trust of the private CAs. Section 4.1, para 1: One can use otherName uid attributes, but those classically can't be trusted by the server unless one can map that uid to an entity that the server knows/trusts. This technique does not solve the privacy issues. Section 4.1.1: So, one has to know which client domains are allowed, how would one accomplish that? While trusting private CAs and mutual authenticated TLS is too hard. Section 6.5, para 2: indeed. and it isn't discussed here. Section 6.5.1: 'revocation is performed by simple removing a DNS record'... How do the systems that cache DNS entries get this? Section 6.5.2: Let me understand this. For this particular protocol to work a manufacturer has to sign up to support their devices... forever? Replacing devices because a manufacturer has walked away is, interesting. How many manufacturers are interested in 'continuously involved with the day to day operation of the device', especially IoT devices? |
|
2026-01-21
|
10 | Deb Cooley | [Ballot Position Update] New position, Discuss, has been recorded for Deb Cooley |
|
2026-01-21
|
10 | Jim Guichard | [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard |
|
2026-01-20
|
10 | Mohamed Boucadair | [Ballot comment] Hi Ash, Shumon, Olle, and Michael, Thank you for the effort put into this specification. Please find some comments below: # Document goals … [Ballot comment] Hi Ash, Shumon, Olle, and Michael, Thank you for the effort put into this specification. Please find some comments below: # Document goals It would be useful to add a mention about expected use/target of this document to the introduction. You may also consider a forward citation to the appropriate section to highlight the requirements you are making for specification protocols. # Agents CURRENT: *Store-and-forward system:* A message handling system in-path between the sending agent and the receiving agent. Not sure to which components listed in the section, the sending/receiving agents map to. # Extension CURRENT: The extension also allows an application to find an application identity and set up a secure communication channel directly. Which extension are we referring to here? Please make that clearer in the doc. # References for the “many” existing protocols CURRENT: Within many existing store-and-forward protocols, certificates may be transmitted within the signed message itself. Can we provide examples of these “many existing” protocols? Citing reference would suffice. # constrained CURRENT: Within IoT applications, we find that networks may be more constrained. Maybe cite draft-ietf-iotops-7228bis#section 2.1 for a definition of “constrained”. # stale references There are several references that points to IDs that were adopted or published as RFCs. You may consider refreshing these. Cheers, Med |
|
2026-01-20
|
10 | Mohamed Boucadair | [Ballot Position Update] New position, No Objection, has been recorded for Mohamed Boucadair |
|
2026-01-17
|
10 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
|
2026-01-15
|
10 | Gunter Van de Velde | [Ballot Position Update] New position, No Objection, has been recorded for Gunter Van de Velde |
|
2026-01-14
|
10 | Morgan Condie | Placed on agenda for telechat - 2026-01-22 |
|
2026-01-14
|
10 | Paul Wouters | Ballot has been issued |
|
2026-01-14
|
10 | Paul Wouters | [Ballot Position Update] New position, Yes, has been recorded for Paul Wouters |
|
2026-01-14
|
10 | Paul Wouters | Created "Approve" ballot |
|
2026-01-14
|
10 | Paul Wouters | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
|
2026-01-14
|
10 | Paul Wouters | Ballot writeup was changed |
|
2025-12-19
|
10 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
|
2025-12-18
|
10 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
|
2025-12-09
|
10 | Jean Mahoney | Request for IETF Last Call review by GENART is assigned to Matt Joras |
|
2025-12-07
|
10 | Barry Leiba | Request for IETF Last Call review by ARTART is assigned to Cullen Jennings |
|
2025-12-05
|
10 | Morgan Condie | IANA Review state changed to IANA - Review Needed |
|
2025-12-05
|
10 | Morgan Condie | The following Last Call announcement was sent out (ends 2025-12-19): From: The IESG To: IETF-Announce CC: dance-chairs@ietf.org, dance@ietf.org, draft-ietf-dance-architecture@ietf.org, paul.wouters@aiven.io, wjhns1@hardakers.net … The following Last Call announcement was sent out (ends 2025-12-19): From: The IESG To: IETF-Announce CC: dance-chairs@ietf.org, dance@ietf.org, draft-ietf-dance-architecture@ietf.org, paul.wouters@aiven.io, wjhns1@hardakers.net Reply-To: last-call@ietf.org Sender: Subject: Last Call: (An Architecture for DNS-Bound Client and Sender Identities) to Informational RFC The IESG has received a request from the DANE Authentication for Network Clients Everywhere WG (dance) to consider the following document: - 'An Architecture for DNS-Bound Client and Sender Identities' as Informational RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2025-12-19. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This architecture document defines terminology, interaction, and authentication patterns, related to the use of DANE DNS records for TLS client and messaging peer identity, within the context of existing object security and TLS-based protocols. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-dance-architecture/ No IPR declarations have been submitted directly on this I-D. |
|
2025-12-05
|
10 | Morgan Condie | IESG state changed to In Last Call from Last Call Requested |
|
2025-12-05
|
10 | Paul Wouters | Last call was requested |
|
2025-12-05
|
10 | Paul Wouters | Ballot approval text was generated |
|
2025-12-05
|
10 | Paul Wouters | Ballot writeup was generated |
|
2025-12-05
|
10 | Paul Wouters | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
|
2025-12-05
|
10 | Paul Wouters | Last call announcement was generated |
|
2025-12-02
|
10 | Ash Wilson | New version available: draft-ietf-dance-architecture-10.txt |
|
2025-12-02
|
10 | Michael Richardson | New version approved |
|
2025-12-02
|
10 | (System) | Request for posting confirmation emailed to previous authors: Ash Wilson , Michael Richardson , Olle Johansson , Shumon Huque |
|
2025-12-02
|
10 | Ash Wilson | Uploaded new revision |
|
2025-10-20
|
09 | (System) | Changed action holders to Paul Wouters (IESG state changed) |
|
2025-10-20
|
09 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
|
2025-10-20
|
09 | Ash Wilson | New version available: draft-ietf-dance-architecture-09.txt |
|
2025-10-20
|
09 | Michael Richardson | New version approved |
|
2025-10-20
|
09 | (System) | Request for posting confirmation emailed to previous authors: Ash Wilson , Michael Richardson , Olle Johansson , Shumon Huque |
|
2025-10-20
|
09 | Ash Wilson | Uploaded new revision |
|
2025-10-20
|
09 | (System) | Request for posting confirmation emailed to previous authors: Ash Wilson , Michael Richardson , Olle Johansson , Shumon Huque |
|
2025-10-20
|
09 | Ash Wilson | Uploaded new revision |
|
2025-08-29
|
08 | (System) | Changed action holders to Paul Wouters, Ash Wilson, Shumon Huque, Olle Johansson, Michael Richardson (IESG state changed) |
|
2025-08-29
|
08 | Paul Wouters | IESG state changed to AD Evaluation::Revised I-D Needed from Publication Requested |
|
2025-07-31
|
08 | Joey Salazar | # Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did … # Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The WG was very active in the beginning and very much solidified around the architecture in question. As time went on, many of the most active participants ended up dropping away due to job changes, etc. But the core architecture still remains solid and accepted today (but it took a while to get the three WG documents, including this one, to this point). 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? Generally the WG all agreed on a rough direction and there wasn't any strong controversy. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? No. 4. For protocol documents, are there existing implementations of the contents of the document? I believe so, but I can not point to any directly. CIRA had certainly started some. 5. Have a significant number of potential implementers indicated plans to implement? There has been some recent push by various groups, including DRIP proponents, to get this published as they want to make use of it. # Additional Reviews 1. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. The DANCE WG and the TLS WG participants did work together and agreed on the overall approach (and specifically looked closely at the other documents that are more TLS protocol impacting). I believe all necessary reviews have been done. 2. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. No formal review of these were required aside from consulting with the TLS WG. 3. If the document contains a YANG module... N/A 4. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. Only the idnits tool was needed as there is no other formal language in it. Or with non-ascii characters, which are in the acknowledgments. One page is too long, but that's a generation issue. # Document Shepherd Checks 1. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? Yes. 2. Several IETF Areas have assembled lists of common issues that their reviewers encounter. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? There are no known current issues. Past reviews were undertaken by iotdir and secdir, but have been addressed. 3. What type of RFC publication is being requested on the IETF stream (Best Current Practice, Proposed Standard, Internet Standard, Informational, Experimental or Historic)? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Informational for this document. There are two associated DANCE documents in the standards track, however. 4. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in BCP 79? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. To the best of my knowledge all authors are very aware of the IPR requirements. 5. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes (and only 4 authors) 6. Document any remaining I-D nits in this document. Simply running the idnits tool is not enough; please review the "Content Guidelines" on authors.ietf.org. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) The only nits that exist are bogus about references without usage (and there is), or missing ID information. 7. Should any informative references be normative or vice-versa? See the IESG Statement on Normative and Informative References. No changes needed. 8. List any normative references that are not freely available to anyone. All normative references are RFCs. |
|
2025-07-31
|
08 | Joey Salazar | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
|
2025-07-31
|
08 | Joey Salazar | IESG state changed to Publication Requested from I-D Exists |
|
2025-07-31
|
08 | (System) | Changed action holders to Paul Wouters (IESG state changed) |
|
2025-07-31
|
08 | Joey Salazar | Responsible AD changed to Paul Wouters |
|
2025-07-31
|
08 | Joey Salazar | Document is now in IESG state Publication Requested |
|
2025-07-24
|
08 | Wes Hardaker | Intended Status changed to Informational from None |
|
2025-07-20
|
08 | Wes Hardaker | # Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did … # Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The WG was very active in the beginning and very much solidified around the architecture in question. As time went on, many of the most active participants ended up dropping away due to job changes, etc. But the core architecture still remains solid and accepted today (but it took a while to get the three WG documents, including this one, to this point). 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? Generally the WG all agreed on a rough direction and there wasn't any strong controversy. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? No. 4. For protocol documents, are there existing implementations of the contents of the document? I believe so, but I can not point to any directly. CIRA had certainly started some. 5. Have a significant number of potential implementers indicated plans to implement? There has been some recent push by various groups, including DRIP proponents, to get this published as they want to make use of it. # Additional Reviews 1. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. The DANCE WG and the TLS WG participants did work together and agreed on the overall approach (and specifically looked closely at the other documents that are more TLS protocol impacting). I believe all necessary reviews have been done. 2. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. No formal review of these were required aside from consulting with the TLS WG. 3. If the document contains a YANG module... N/A 4. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. Only the idnits tool was needed as there is no other formal language in it. Or with non-ascii characters, which are in the acknowledgments. One page is too long, but that's a generation issue. # Document Shepherd Checks 1. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? Yes. 2. Several IETF Areas have assembled lists of common issues that their reviewers encounter. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? There are no known current issues. Past reviews were undertaken by iotdir and secdir, but have been addressed. 3. What type of RFC publication is being requested on the IETF stream (Best Current Practice, Proposed Standard, Internet Standard, Informational, Experimental or Historic)? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Informational for this document. There are two associated DANCE documents in the standards track, however. 4. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in BCP 79? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. To the best of my knowledge all authors are very aware of the IPR requirements. 5. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes (and only 4 authors) 6. Document any remaining I-D nits in this document. Simply running the idnits tool is not enough; please review the "Content Guidelines" on authors.ietf.org. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) The only nits that exist are bogus about references without usage (and there is), or missing ID information. 7. Should any informative references be normative or vice-versa? See the IESG Statement on Normative and Informative References. No changes needed. 8. List any normative references that are not freely available to anyone. All normative references are RFCs. |
|
2025-07-20
|
08 | Wes Hardaker | Notification list changed to wjhns1@hardakers.net because the document shepherd was set |
|
2025-07-20
|
08 | Wes Hardaker | Document shepherd changed to Wes Hardaker |
|
2025-06-06
|
08 | Joey Salazar | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
|
2025-04-22
|
08 | Michael Richardson | New version available: draft-ietf-dance-architecture-08.txt |
|
2025-04-22
|
08 | Shumon Huque | New version approved |
|
2025-04-22
|
08 | (System) | Request for posting confirmation emailed to previous authors: Ash Wilson , Michael Richardson , Olle Johansson , Shumon Huque |
|
2025-04-22
|
08 | Michael Richardson | Uploaded new revision |
|
2025-04-18
|
07 | (System) | Document has expired |
|
2024-10-15
|
07 | Michael Richardson | New version available: draft-ietf-dance-architecture-07.txt |
|
2024-10-15
|
07 | Michael Richardson | New version approved |
|
2024-10-15
|
07 | (System) | Request for posting confirmation emailed to previous authors: Ash Wilson , Michael Richardson , Olle Johansson , Shumon Huque |
|
2024-10-15
|
07 | Michael Richardson | Uploaded new revision |
|
2024-07-24
|
06 | Magnus Nyström | Request for Early review by SECDIR Completed: Not Ready. Reviewer: Magnus Nyström. Sent review to list. |
|
2024-07-24
|
06 | Ines Robles | Assignment of request for Early review by IOTDIR to Daniel Migault was marked no-response |
|
2024-07-24
|
06 | Ines Robles | Assignment of request for Early review by IOTDIR to Terry Manderson was marked no-response |
|
2024-07-24
|
06 | Ines Robles | Assignment of request for Early review by IOTDIR to Loganaden Velvindron was marked no-response |
|
2024-07-19
|
06 | Vladimír Čunát | Request for Early review by DNSDIR Completed: Ready with Nits. Reviewer: Vladimír Čunát. Sent review to list. |
|
2024-07-17
|
06 | Ines Robles | Request for Early review by IOTDIR Completed: Not Ready. Reviewer: Ines Robles. Sent review to list. |
|
2024-07-01
|
06 | Ines Robles | Request for Early review by IOTDIR is assigned to Ines Robles |
|
2024-07-01
|
06 | Ines Robles | Assignment of request for Early review by IOTDIR to Loganaden Velvindron was rejected |
|
2024-06-26
|
06 | Ines Robles | Request for Early review by IOTDIR is assigned to Loganaden Velvindron |
|
2024-06-26
|
06 | Ines Robles | Assignment of request for Early review by IOTDIR to Terry Manderson was rejected |
|
2024-06-24
|
06 | Ines Robles | Request for Early review by IOTDIR is assigned to Terry Manderson |
|
2024-06-24
|
06 | Ines Robles | Assignment of request for Early review by IOTDIR to Daniel Migault was rejected |
|
2024-06-20
|
06 | Tero Kivinen | Request for Early review by SECDIR is assigned to Magnus Nyström |
|
2024-06-20
|
06 | Jim Reid | Request for Early review by DNSDIR is assigned to Vladimír Čunát |
|
2024-06-20
|
06 | Ines Robles | Request for Early review by IOTDIR is assigned to Daniel Migault |
|
2024-06-19
|
06 | Wes Hardaker | Requested Early review by DNSDIR |
|
2024-06-19
|
06 | Wes Hardaker | Requested Early review by IOTDIR |
|
2024-06-19
|
06 | Wes Hardaker | Requested Early review by SECDIR |
|
2024-05-28
|
06 | Wes Hardaker | Starting 4 weeks of Working Group last call on this document. |
|
2024-05-28
|
06 | Wes Hardaker | IETF WG state changed to In WG Last Call from WG Document |
|
2024-05-27
|
06 | Michael Richardson | New version available: draft-ietf-dance-architecture-06.txt |
|
2024-05-27
|
06 | Michael Richardson | New version approved |
|
2024-05-27
|
06 | (System) | Request for posting confirmation emailed to previous authors: Ash Wilson , Michael Richardson , Olle Johansson , Shumon Huque |
|
2024-05-27
|
06 | Michael Richardson | Uploaded new revision |
|
2024-04-24
|
05 | Michael Richardson | New version available: draft-ietf-dance-architecture-05.txt |
|
2024-04-24
|
05 | Michael Richardson | New version approved |
|
2024-04-24
|
05 | (System) | Request for posting confirmation emailed to previous authors: Ash Wilson , Michael Richardson , Olle Johansson , Shumon Huque |
|
2024-04-24
|
05 | Michael Richardson | Uploaded new revision |
|
2024-03-24
|
04 | Michael Richardson | New version available: draft-ietf-dance-architecture-04.txt |
|
2024-03-24
|
04 | Michael Richardson | New version approved |
|
2024-03-24
|
04 | (System) | Request for posting confirmation emailed to previous authors: Ash Wilson , Michael Richardson , Olle Johansson , Shumon Huque |
|
2024-03-24
|
04 | Michael Richardson | Uploaded new revision |
|
2024-01-30
|
03 | Michael Richardson | New version available: draft-ietf-dance-architecture-03.txt |
|
2024-01-30
|
03 | Michael Richardson | New version approved |
|
2024-01-30
|
03 | (System) | Request for posting confirmation emailed to previous authors: Ash Wilson , Michael Richardson , Olle Johansson , Shumon Huque |
|
2024-01-30
|
03 | Michael Richardson | Uploaded new revision |
|
2024-01-25
|
02 | (System) | Document has expired |
|
2023-07-23
|
02 | Ash Wilson | New version available: draft-ietf-dance-architecture-02.txt |
|
2023-07-23
|
02 | Michael Richardson | New version approved |
|
2023-07-23
|
02 | (System) | Request for posting confirmation emailed to previous authors: Ash Wilson , Michael Richardson , Olle Johansson , Shumon Huque |
|
2023-07-23
|
02 | Ash Wilson | Uploaded new revision |
|
2023-03-27
|
01 | Joey Salazar | Changed document external resources from: None to: github_repo https://github.com/ietf-wg-dance/draft-dance-architecture |
|
2023-01-23
|
01 | Michael Richardson | New version available: draft-ietf-dance-architecture-01.txt |
|
2023-01-23
|
01 | Michael Richardson | New version approved |
|
2023-01-23
|
01 | (System) | Request for posting confirmation emailed to previous authors: Ash Wilson , Michael Richardson , Olle Johansson , Shumon Huque |
|
2023-01-23
|
01 | Michael Richardson | Uploaded new revision |
|
2022-11-12
|
00 | Wes Hardaker | This document now replaces draft-wilson-dance-architecture instead of None |
|
2022-11-05
|
00 | Wes Hardaker | Added to session: IETF-115: dance Thu-1530 |
|
2022-07-28
|
00 | Ash Wilson | New version available: draft-ietf-dance-architecture-00.txt |
|
2022-07-28
|
00 | Joey Salazar | WG -00 approved |
|
2022-07-28
|
00 | Ash Wilson | Set submitter to "Ash Wilson ", replaces to (none) and sent approval email to group chairs: dance-chairs@ietf.org |
|
2022-07-28
|
00 | Ash Wilson | Uploaded new revision |