Flow Identity Extension for HTTP-Enabled Location Delivery (HELD)
draft-ietf-geopriv-flow-identity-02
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2013-04-10
|
02 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2013-04-02
|
02 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2013-03-13
|
02 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2013-03-08
|
02 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2013-03-08
|
02 | (System) | IANA Action state changed to Waiting on RFC Editor from Waiting on Authors |
2013-03-07
|
02 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2013-03-07
|
02 | Tero Kivinen | Closed request for Last Call review by SECDIR with state 'No Response' |
2013-03-04
|
02 | Cindy Morgan | State changed to RFC Ed Queue from Approved-announcement sent |
2013-03-04
|
02 | (System) | RFC Editor state changed to EDIT |
2013-03-04
|
02 | (System) | Announcement was received by RFC Editor |
2013-03-04
|
02 | (System) | IANA Action state changed to In Progress |
2013-03-04
|
02 | Cindy Morgan | State changed to Approved-announcement sent from Approved-announcement to be sent::Point Raised - writeup needed |
2013-03-04
|
02 | Cindy Morgan | IESG has approved the document |
2013-03-04
|
02 | Cindy Morgan | Closed "Approve" ballot |
2013-03-04
|
02 | Cindy Morgan | Ballot approval text was generated |
2013-03-04
|
02 | Robert Sparks | Ballot writeup was changed |
2013-03-04
|
02 | Cindy Morgan | New version available: draft-ietf-geopriv-flow-identity-02.txt |
2013-02-28
|
01 | Cindy Morgan | State changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation |
2013-02-28
|
01 | Adrian Farrel | [Ballot comment] My original Discuss read... > This is borderline for me, but I am trying to understand how an > existing deployed implementation of … [Ballot comment] My original Discuss read... > This is borderline for me, but I am trying to understand how an > existing deployed implementation of RFC 6155 handles the case > that a protocol element it is using has been deprecated. More > importantly, how a new implementation handles receipt of a > now-illegal protocol element. > > I understand that the change is "before, we said you could do this, > but we have discovered that you can't get it through some NATs, > so don't." But it seems to me that the problem is not with all NATs, > and anyway, not all circumstances inevitably involve the presence > of a NAT. So surely there will be some deployments using the > deprecated feature that are operating just fine and will find this > deprecation at least inconvenient. > > You can probably resolve this by adding a short section on > backwards compaitiblity noting: > - that deprecation means that new implementation MUST NOT, > but that existing implementations MAY continue > - that new implementations SHOULD continue to receive and > process Robert has explained to me that the problem being fixed is basically one that the entired deployed codebase has found and avoided. Therefore there is no risk of backward compatibility issues. That's enough for me to clear my Discuss, but maybe the issue could be addressed with a couple of lines of text, so I'll leave this Comment in place. |
2013-02-28
|
01 | Adrian Farrel | Ballot comment text updated for Adrian Farrel |
2013-02-28
|
01 | Adrian Farrel | [Ballot comment] My original Discuss read... > This is borderline for me, but I am trying to understand how an existing > deployed implementation of … [Ballot comment] My original Discuss read... > This is borderline for me, but I am trying to understand how an existing > deployed implementation of RFC 6155 handles the case that a protocol > element it is using has been deprecated. More importantly, how a new > implementation handles receipt of a now-illegal protocol element. > > I understand that the change is "before, we said you could do this, but > we have discovered that you can't get it through some NATs, so don't." > but it seems to me that the problem is not with all NATs, and anyway, > not all circumstances inevitably involve the presence of a NAT. So > surely there will be some deployments using the deprecated feature that > are operating just fine and will find this deprecation at least > inconvenient. > > You can probably resolve this by adding a short section on backwards > compaitiblity noting: > - that deprecation means that new implementation MUST NOT, but that > existing implementations MAY continue > - that new implementations SHOULD continue to receive and process Robert has explained to me that the problem being fixed is basically one that the entired deployed codebase has found and avoided. Therefore there is no risk of backward compatibility issues. That's enough for me to clear my Discuss, but maybe the issue could be addressed with a couple of lines of text, so I'll leave this Comment in place. |
2013-02-28
|
01 | Adrian Farrel | [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss |
2013-02-28
|
01 | Stephen Farrell | [Ballot comment] - The RFC editor note on the privacy considerations is good, thanks. - I had a security discuss on this draft but Robert … [Ballot comment] - The RFC editor note on the privacy considerations is good, thanks. - I had a security discuss on this draft but Robert convinced me there was no problem so I'll record it here as a comment. The potential problem would be if a bad actor could ask about flows and received "no information" for non-existent flows but "unauthorized" when the bad actor stumbled onto an existing flow. Robert told me that in that case the bad actor will get "unauthorized" all the time so its not a problem. - general: how (if at all) would this be affected by shared address space? (I ask since you say this is motivated by CGNs.) - section 3: Interesting that the example on p5 looks like its not something from which you could (by itself) determine a specific location. Where does it explain how you could determine a location based on that info? - section 3: I was confused on 1st reading by the last para here - I thought you were saying that the src/dst elements from the example were attributes, might be worth saying that src is both an element name and an attribute value or something. - 4: The "layer3" attribute just seems broken since it assumes both ends of the flow are using the same address family and they might not. - 4: I guess the layer4 attribute might be broken by an ALG. I'm also not sure how tcp or udp will really help there. - 4: What'd you put in layer4 if using e.g. SCTP/UDP? Don't you need to say? - 4: I don't get what it might mean if I put in number for a port that's usable with either tcp or udp, e.g. 53. Its just hard to believe there are no tricky combinations based on use of port numbers that'd need explaining. I've gotta say: given the above comments, and that this is deprecating a feature from a pretty recent (2011) but presumably now known-faulty RFC, and that there are no known implementations (inferred from the write-up), and that this'll be referenced from other "national" specs, I'd be quite nervous that this isn't fully baked and might have to be fixed yet again after someone does write code and try it out. |
2013-02-28
|
01 | Stephen Farrell | [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss |
2013-02-28
|
01 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo |
2013-02-28
|
01 | Robert Sparks | State changed to IESG Evaluation from Waiting for AD Go-Ahead |
2013-02-28
|
01 | Barry Leiba | Ballot comment text updated for Barry Leiba |
2013-02-28
|
01 | Adrian Farrel | [Ballot discuss] This is borderline for me, but I am trying to understand how an existing deployed implementation of RFC 6155 handles the case that … [Ballot discuss] This is borderline for me, but I am trying to understand how an existing deployed implementation of RFC 6155 handles the case that a protocol element it is using has been deprecated. More importantly, how a new implementation handles receipt of a now-illegal protocol element. I understand that the change is "before, we said you could do this, but we have discovered that you can't get it through some NATs, so don't." but it seems to me that the problem is not with all NATs, and anyway, not all circumstances inevitably involve the presence of a NAT. So surely there will be some deployments using the deprecated feature that are operating just fine and will find this deprecation at least inconvenient. You can probably resolve this by adding a short section on backwards compaitiblity noting: - that deprecation means that new implementation MUST NOT, but that existing implementations MAY continue - that new implementations SHOULD continue to receive and process |
2013-02-28
|
01 | Adrian Farrel | [Ballot Position Update] New position, Discuss, has been recorded for Adrian Farrel |
2013-02-28
|
01 | Sean Turner | [Ballot comment] I support Stephen's discuss. |
2013-02-28
|
01 | Sean Turner | [Ballot Position Update] New position, No Objection, has been recorded for Sean Turner |
2013-02-27
|
01 | Wesley Eddy | [Ballot Position Update] New position, No Objection, has been recorded for Wesley Eddy |
2013-02-27
|
01 | Robert Sparks | Ballot writeup was changed |
2013-02-27
|
01 | Stephen Farrell | [Ballot discuss] I had a chat with Robert where he conviced me I was mistaken about some of this. (1) Can we add the following … [Ballot discuss] I had a chat with Robert where he conviced me I was mistaken about some of this. (1) Can we add the following (or similar) to section 6: "This specification assumes that the LIS already has access to the internal state of e.g. a NAT and so can usefully map the flow information to locations. If the LIS did not have access to that internal state then sending the flow information to the LIS would represent an additional privacy exposure for the client." (2) cleared, now a comment |
2013-02-27
|
01 | Stephen Farrell | [Ballot comment] - I had a security discuss on this draft but Robert convinced me there was no problem so I'll record it here as … [Ballot comment] - I had a security discuss on this draft but Robert convinced me there was no problem so I'll record it here as a comment. The potential problem would be if a bad actor could ask about flows and received "no information" for non-existent flows but "unauthorized" when the bad actor stumbled onto an existing flow. Robert told me that in that case the bad actor will get "unauthorized" all the time so its not a problem. - general: how (if at all) would this be affected by shared address space? (I ask since you say this is motivated by CGNs.) - section 3: Interesting that the example on p5 looks like its not something from which you could (by itself) determine a specific location. Where does it explain how you could determine a location based on that info? - section 3: I was confused on 1st reading by the last para here - I thought you were saying that the src/dst elements from the example were attributes, might be worth saying that src is both an element name and an attribute value or something. - 4: The "layer3" attribute just seems broken since it assumes both ends of the flow are using the same address family and they might not. - 4: I guess the layer4 attribute might be broken by an ALG. I'm also not sure how tcp or udp will really help there. - 4: What'd you put in layer4 if using e.g. SCTP/UDP? Don't you need to say? - 4: I don't get what it might mean if I put in number for a port that's usable with either tcp or udp, e.g. 53. Its just hard to believe there are no tricky combinations based on use of port numbers that'd need explaining. I've gotta say: given the above comments, and that this is deprecating a feature from a pretty recent (2011) but presumably now known-faulty RFC, and that there are no known implementations (inferred from the write-up), and that this'll be referenced from other "national" specs, I'd be quite nervous that this isn't fully baked and might have to be fixed yet again after someone does write code and try it out. |
2013-02-27
|
01 | Stephen Farrell | Ballot comment and discuss text updated for Stephen Farrell |
2013-02-27
|
01 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call |
2013-02-26
|
01 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded for Stewart Bryant |
2013-02-26
|
01 | Benoît Claise | [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise |
2013-02-26
|
01 | Barry Leiba | [Ballot comment] Anti-support for Stephen's DISCUSS: As I see it, this is asking for exactly the same information, for exactly the same entity, as specified … [Ballot comment] Anti-support for Stephen's DISCUSS: As I see it, this is asking for exactly the same information, for exactly the same entity, as specified in 6155. It's just passing more information in the request in order to deal with certain NAT situations, but this isn't allowing it to get information it shouldn't be getting. It seems to me that 6155 already has this covered. |
2013-02-26
|
01 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2013-02-26
|
01 | Martin Stiemerling | [Ballot comment] In support of Stephen's DISCUSS points abut security and privacy, i.e., I did also wonder if nothing has really changed. |
2013-02-26
|
01 | Martin Stiemerling | [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling |
2013-02-25
|
01 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded for Ronald Bonica |
2013-02-25
|
01 | Pearl Liang | IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-geopriv-flow-identity-01. Authors should review the comments and/or questions below. Please report any inaccuracies and respond to any questions as soon … IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-geopriv-flow-identity-01. Authors should review the comments and/or questions below. Please report any inaccuracies and respond to any questions as soon as possible. We understand that, upon approval of this document, there are two actions which IANA must complete. First, in the namespaces registry of the IANA XML documents registry located at: http://www.iana.org/assignments/xml-registry/ns.html a new namespace will be registered as follows: ID: geopriv:held:flow URI: urn:ietf:params:xml:ns:geopriv:held:flow Registration template: [ As provided in Section 5.1 of the current document ] Reference: [ RFC-to-be ] Second, in the schema registry of the IANA XML documents registry located at: http://www.iana.org/assignments/xml-registry/schema.html ID: geopriv:held:flow URI: urn:ietf:params:xml:ns:geopriv:held:flow Filename:geopriv:held:flow Reference: [ RFC-to-be ] We understand these two actions to be the only ones required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed. |
2013-02-25
|
01 | Stephen Farrell | [Ballot discuss] (1) I don't buy that there are no new privacy considerations. 6155's privacy considerations are mostly about targets asking about their own location, … [Ballot discuss] (1) I don't buy that there are no new privacy considerations. 6155's privacy considerations are mostly about targets asking about their own location, but asking about yourself seems to be irrelevant for this draft - why would a target ask for its own location based on a flow with some other host? 6155, 4.2 does seem relevant, but I would think ought be repeated or expanded upon here. This draft also exposes that a flow is occurring and between which hosts and (implicitly) when, which seems like new and sensitive information compared to 6155. (2) I don't buy that there are no new security considerations. What if I ask about a src/dst pair neither of which is me? What if I get a different (esp. negative) answer based on whether or not the flow concerned actually exists at the moment or not? Doesn't that seem new compared to 6155? It does to me. |
2013-02-25
|
01 | Stephen Farrell | [Ballot comment] - general: how (if at all) would this be affected by shared address space? (I ask since you say this is motivated by … [Ballot comment] - general: how (if at all) would this be affected by shared address space? (I ask since you say this is motivated by CGNs.) - section 3: Interesting that the example on p5 looks like its not something from which you could (by itself) determine a specific location. Where does it explain how you could determine a location based on that info? - section 3: I was confused on 1st reading by the last para here - I thought you were saying that the src/dst elements from the example were attributes, might be worth saying that src is both an element name and an attribute value or something. - 4: The "layer3" attribute just seems broken since it assumes both ends of the flow are using the same address family and they might not. - 4: I guess the layer4 attribute might be broken by an ALG. I'm also not sure how tcp or udp will really help there. - 4: What'd you put in layer4 if using e.g. SCTP/UDP? Don't you need to say? - 4: I don't get what it might mean if I put in number for a port that's usable with either tcp or udp, e.g. 53. Its just hard to believe there are no tricky combinations based on use of port numbers that'd need explaining. I've gotta say: given the above comments, and that this is deprecating a feature from a pretty recent (2011) but presumably now known-faulty RFC, and that there are no known implementations (inferred from the write-up), and that this'll be referenced from other "national" specs, I'd be quite nervous that this isn't fully baked and might have to be fixed yet again after someone does write code and try it out. |
2013-02-25
|
01 | Stephen Farrell | [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell |
2013-02-25
|
01 | Brian Haberman | [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman |
2013-02-24
|
01 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley |
2013-02-24
|
01 | Pete Resnick | [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick |
2013-02-19
|
01 | Robert Sparks | Ballot has been issued |
2013-02-19
|
01 | Robert Sparks | [Ballot Position Update] New position, Yes, has been recorded for Robert Sparks |
2013-02-19
|
01 | Robert Sparks | Created "Approve" ballot |
2013-02-19
|
01 | Robert Sparks | Placed on agenda for telechat - 2013-02-28 |
2013-02-14
|
01 | Jean Mahoney | Request for Last Call review by GENART is assigned to Kathleen Moriarty |
2013-02-14
|
01 | Jean Mahoney | Request for Last Call review by GENART is assigned to Kathleen Moriarty |
2013-02-14
|
01 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Jeffrey Hutzelman |
2013-02-14
|
01 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Jeffrey Hutzelman |
2013-02-13
|
01 | Cindy Morgan | IANA Review state changed to IANA Review Needed |
2013-02-13
|
01 | Cindy Morgan | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (Flow Identity Extension for HELD) to … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (Flow Identity Extension for HELD) to Proposed Standard The IESG has received a request from the Geographic Location/Privacy WG (geopriv) to consider the following document: - 'Flow Identity Extension for HELD' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2013-02-27. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract RFC 6155 specifies an extension for the HTTP-Enabled Location Delivery (HELD) Protocol allowing the use of an IP address and port number to request a Device location based on an individual packet flow. However, certain kinds of NAT require that identifiers for both ends of the packet flow must be specified in order to unambiguously satisfy the location request. This document specifies an XML Schema and URN Sub-Namespace for a Flow Identity Extension for HELD to support this requirement. This document updates RFC 6155 by deprecating the port number elements specified therein. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-geopriv-flow-identity/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-geopriv-flow-identity/ballot/ No IPR declarations have been submitted directly on this I-D. |
2013-02-13
|
01 | Cindy Morgan | State changed to In Last Call from Last Call Requested |
2013-02-13
|
01 | Robert Sparks | Last call was requested |
2013-02-13
|
01 | Robert Sparks | Ballot approval text was generated |
2013-02-13
|
01 | Robert Sparks | State changed to Last Call Requested from AD Evaluation::AD Followup |
2013-02-13
|
01 | Robert Sparks | Last call announcement was generated |
2013-02-13
|
01 | Robert Sparks | Ballot writeup was changed |
2013-02-13
|
01 | Robert Sparks | Ballot writeup was generated |
2013-02-13
|
01 | Robert Sparks | Changed consensus to Yes from Unknown |
2013-02-13
|
01 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2013-02-13
|
01 | Ray Bellis | New version available: draft-ietf-geopriv-flow-identity-01.txt |
2013-02-12
|
00 | Robert Sparks | State changed to AD Evaluation::Revised ID Needed from Publication Requested |
2013-02-01
|
00 | Cindy Morgan | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? The RFC is being requested as Proposed Standard, and the title page lists it as Standards Track. This is the the proper classification because it is an update to a Standards Track RFC, 6155. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary: This document specifies an extension to the HTTP-Enabled Location Delivery (HELD) Protocol to allow a location of an endpoint behind certain kinds of NAT to be requested. Working Group Summary: This document is a simple extension to an existing protocol and was uncontroversial in the working group. Document Quality: This document received thorough review in the working group. National standards bodies plan to refer to this extension, and providers of Location Information Servers may choose to implement it depending on their user bases. Personnel: Alissa Cooper is the Document Shepherd. Robert Sparks is the Responsible Area Director. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The shepherd performed a thorough review of this short document. It is ready for publication. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. The document needs no further review. We have individuals with XML expertise in the WG who reviewed the document. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. There are no concerns or issues with this document. It is a simple update. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why? Yes. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No IPR disclosure has been filed. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The WG is firmly behind this document. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) There have been no appeals or expressions of extreme discontent. (11) Identify any ID nits the Document Shepherd has found in this document. (See http://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. There are is one actionable nit that will require a change before RFC Editor processing: the abstract needs to mention that this document updates RFC 6155. I suggest adding the following sentence at the end of the last paragraph of the abstract: "It updates RFC 6155." (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. No formal reviews are required. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? There are no such references. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. There are no such references. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. The suggested mention of RFC 6155 in the abstract is included in (11) above. I suggest adding the following text at the end of the last paragraph of the introduction: "It updates RFC 6155 to include this extension and it deprecates the port number elements specified in Section 3.3 of RFC 6155." (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The IANA Considerations section is consistent with the body of the document and clearly identifies what is required of IANA. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. This document creates no new registries. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. All instances of XML in the document have been validated. |
2013-02-01
|
00 | Cindy Morgan | Note added 'Alissa Cooper (acooper@cdt.org) is the Document Shepherd.' |
2013-02-01
|
00 | Cindy Morgan | Intended Status changed to Proposed Standard |
2013-02-01
|
00 | Cindy Morgan | IESG process started in state Publication Requested |
2013-02-01
|
00 | (System) | Earlier history may be found in the Comment Log for draft-bellis-geopriv-flow-identity |
2012-09-13
|
00 | Ray Bellis | New version available: draft-ietf-geopriv-flow-identity-00.txt |