Updates to Lightweight OCSP Profile for High Volume Environments
draft-ietf-lamps-rfc5019bis-12
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2024-09-19
|
12 | Tero Kivinen | Closed request for Last Call review by SECDIR with state 'Overtaken by Events' |
2024-09-19
|
12 | Tero Kivinen | Assignment of request for Last Call review by SECDIR to Ivaylo Petrov was marked no-response |
2024-09-13
|
12 | (System) | IANA Action state changed to No IANA Actions from In Progress |
2024-09-13
|
12 | (System) | RFC Editor state changed to MISSREF |
2024-09-13
|
12 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2024-09-13
|
12 | (System) | Announcement was received by RFC Editor |
2024-09-13
|
12 | (System) | IANA Action state changed to In Progress |
2024-09-13
|
12 | (System) | Removed all action holders (IESG state changed) |
2024-09-13
|
12 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2024-09-13
|
12 | Cindy Morgan | IESG has approved the document |
2024-09-13
|
12 | Cindy Morgan | Closed "Approve" ballot |
2024-09-13
|
12 | Cindy Morgan | Ballot approval text was generated |
2024-09-13
|
12 | Cindy Morgan | Ballot writeup was changed |
2024-09-13
|
12 | Roman Danyliw | IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::AD Followup |
2024-09-13
|
12 | Tadahiko Ito | New version available: draft-ietf-lamps-rfc5019bis-12.txt |
2024-09-13
|
12 | (System) | New version approved |
2024-09-13
|
12 | (System) | Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito |
2024-09-13
|
12 | Tadahiko Ito | Uploaded new revision |
2024-09-13
|
11 | (System) | Changed action holders to Roman Danyliw (IESG state changed) |
2024-09-13
|
11 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
2024-09-13
|
11 | Tadahiko Ito | New version available: draft-ietf-lamps-rfc5019bis-11.txt |
2024-09-13
|
11 | (System) | New version approved |
2024-09-13
|
11 | (System) | Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito |
2024-09-13
|
11 | Tadahiko Ito | Uploaded new revision |
2024-09-09
|
10 | Roman Danyliw | Per Murray Kucherawy's IESG review, please add replace "HTTP header" with "HTTP header field" in Section 6 and 7.2 |
2024-09-09
|
10 | (System) | Changed action holders to Sean Turner, Clint Wilson, Tadahiko Ito, Corey Bonnell (IESG state changed) |
2024-09-09
|
10 | Roman Danyliw | IESG state changed to Approved-announcement to be sent::Revised I-D Needed from IESG Evaluation::AD Followup |
2024-08-14
|
10 | Paul Wouters | [Ballot comment] thanks for confirming the IPR issue is properly set. |
2024-08-14
|
10 | Paul Wouters | [Ballot Position Update] Position for Paul Wouters has been changed to Yes from Discuss |
2024-08-11
|
10 | Tadahiko Ito | New version available: draft-ietf-lamps-rfc5019bis-10.txt |
2024-08-11
|
10 | (System) | New version approved |
2024-08-11
|
10 | (System) | Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito |
2024-08-11
|
10 | Tadahiko Ito | Uploaded new revision |
2024-08-11
|
09 | (System) | Changed action holders to Roman Danyliw (IESG state changed) |
2024-08-11
|
09 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
2024-08-11
|
09 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2024-08-11
|
09 | Tadahiko Ito | New version available: draft-ietf-lamps-rfc5019bis-09.txt |
2024-08-11
|
09 | (System) | New version approved |
2024-08-11
|
09 | (System) | Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito |
2024-08-11
|
09 | Tadahiko Ito | Uploaded new revision |
2024-07-15
|
08 | Carlos Pignataro | Closed request for Last Call review by OPSDIR with state 'Overtaken by Events' |
2024-07-15
|
08 | Carlos Pignataro | Assignment of request for Last Call review by OPSDIR to Nagendra Nainar was marked no-response |
2024-05-02
|
08 | Roman Danyliw | Please revise per IESG feedback -- to address the DISCUSS, replace the document boilerplate with the pre5378Trust200902 version. |
2024-04-18
|
08 | (System) | Changed action holders to Tadahiko Ito, Clint Wilson, Corey Bonnell, Sean Turner (IESG state changed) |
2024-04-18
|
08 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2024-04-18
|
08 | Murray Kucherawy | [Ballot comment] Where you say "header", I believe you mean "header field", especially below Section 7. |
2024-04-18
|
08 | Murray Kucherawy | [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy |
2024-04-18
|
08 | Deb Cooley | [Ballot comment] I have only one comment: Section 3.2.2, Appendix A: The two terms 'byName' and 'byKey' are used without being defined (note: this is … [Ballot comment] I have only one comment: Section 3.2.2, Appendix A: The two terms 'byName' and 'byKey' are used without being defined (note: this is true in RFC 5019 too). There are numerous 'Name' fields in the ASN.1, but no 'Key' fields. My suggestion is to define these terms by pointing to the appropriate ASN.1 field. [note: finally, I get to ballot on a document I understand. LOL] |
2024-04-18
|
08 | Deb Cooley | [Ballot Position Update] New position, No Objection, has been recorded for Deb Cooley |
2024-04-17
|
08 | John Scudder | [Ballot Position Update] New position, No Objection, has been recorded for John Scudder |
2024-04-17
|
08 | Paul Wouters | [Ballot discuss] This document updates and re-uses text from a pre2008 RFC, so it needs to use the pre5378Trust200902 boilerplate. Otherwise, the document looks good. … [Ballot discuss] This document updates and re-uses text from a pre2008 RFC, so it needs to use the pre5378Trust200902 boilerplate. Otherwise, the document looks good. See https://www.rfc-editor.org/rfc/rfc7991.html#appendix-A.1.1.4 |
2024-04-17
|
08 | Paul Wouters | Ballot discuss text updated for Paul Wouters |
2024-04-17
|
08 | Paul Wouters | [Ballot discuss] This document updates and re-uses text from a pre2008 RFC, so it needs to use the pre5378Trust200902 boilerplate. Otherwise, the document looks good. |
2024-04-17
|
08 | Paul Wouters | [Ballot Position Update] New position, Discuss, has been recorded for Paul Wouters |
2024-04-17
|
08 | Francesca Palombini | [Ballot Position Update] New position, No Objection, has been recorded for Francesca Palombini |
2024-04-16
|
08 | Jim Guichard | [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard |
2024-04-16
|
08 | Zaheduzzaman Sarker | [Ballot comment] Thanks for working on this update. One thing the I noticed that the profile transport uses HTTP only ( and not HTTPs). There … [Ballot comment] Thanks for working on this update. One thing the I noticed that the profile transport uses HTTP only ( and not HTTPs). There might be good reasons for using it that way in certain scenarios. I would strongly suggest to explain the rational(s) behind the choice. |
2024-04-16
|
08 | Zaheduzzaman Sarker | [Ballot Position Update] New position, No Objection, has been recorded for Zaheduzzaman Sarker |
2024-04-16
|
08 | Éric Vyncke | [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-lamps-rfc5019bis-08 Thank you for the work put into this document. Please find below some non-blocking COMMENT … [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-lamps-rfc5019bis-08 Thank you for the work put into this document. Please find below some non-blocking COMMENT points (including a nearly DISCUSS for section 3.1.1) but replies would be appreciated even if only for my own education). Special thanks to Russ Housley for the shepherd's detailed write-up including the WG consensus *but it lacks* the justification of the intended status. I hope that this review helps to improve the document, Regards, -éric # COMMENTS (non-blocking) ## Section 3.1.1 Even if 3.1.1 is included in 3.1 (profile-related), `OCSPRequests that conform to this profile` the "this" is a little unclear. Suggest to be more specific rather than using "this". About `these OCSP clients should transition`, should this be a normative "SHOULD" ? Also, the paragraph above has a "MUST" for SHA-256 and this text appears to allow for SHA-1. To be honest, I was really close to ballot a DISCUSS on this point. ## Section 3.1.2 I am confused after reading this section. Should the responders simply ignore invalid request signature ? How can a server "MUST be prepared" while still responders "MAY ignore the signature". ## Section 3.2.2 Isn't `on the returned OCSPResponse` a pleonasm ? I.e., the response is always 'returned'. ## Section 3.2.4 `producedAt MUST be expressed Greenwich Mean Time (Zulu)` or should be UTC ? ## Section 6 Even if the payload is signed and contains public information, is a non-https scheme suitable in `including the scheme and delimiters (http://)` ? ## Section 7.1 Should there be any recommendation on the Max-Age value in `responders MAY indicate when the client should fetch an updated OCSP response by using the cache- control:max-age directive`? ## Section 7.2 Are CDN implicitly covered by "HTTP proxies" ? In `max-age = < n > -where n is a time value later than thisUpdate but earlier than nextUpdate.` is max-age really an absolute time rather than a relative time in seconds ? ## Section 7.3 Probably due to my lack of knowledge about OCSP, but is there a difference in "OCSP responder" and "server" in this section ? Especially about `First, it allows for the caching of OCSP responses on the server, thus lowering the number of hits to the OCSP responder.` |
2024-04-16
|
08 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
2024-04-15
|
08 | Amanda Baber | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
2024-04-15
|
08 | Gunter Van de Velde | [Ballot comment] # Gunter Van de Velde, RTG AD, comments for draft-ietf-lamps-rfc5019bis-08 Thank you for the work put into this document. Please find below some … [Ballot comment] # Gunter Van de Velde, RTG AD, comments for draft-ietf-lamps-rfc5019bis-08 Thank you for the work put into this document. Please find below some non-blocking COMMENT points. I hope that this review helps to improve the document, 117 (For brevity we refer to OCSP as being used to verify certificate 118 status, but only the revocation status of a certificate is checked 119 via this protocol.) As networking generalist i am unclear what the 'but only' refers towards? it reads a bit odd. in addition not sure if the word 'we' helps in a formal document. What about following rewrite suggestion: For brevity, the term "OCSP" is used herein to denote the verification of certificate status; however, it should be noted that this protocol is employed solely to ascertain the revocation status of a certificate. 121 To date, many OCSP deployments have been used to ensure timely and 122 secure certificate status information for high-value electronic 123 transactions or highly sensitive information, such as in the banking 124 and financial environments. As such, the requirement for an OCSP This text processes difficult for me. Would he following text be a potential rewrite? To date, numerous OCSP deployments have been implemented to provide timely and secure certificate status information, crucial for high-value electronic transactions and the handling of highly sensitive information, particularly within the banking and financial sectors. 128 is not an issue, and have run on client and server systems where 129 processing power is not constrained. I assume that there is no additional constraints beyond the capabilities of the CPU/memory used? 151 This document addresses the scalability issues inherent when using 152 OCSP in PKI environments described above by defining a message 153 profile and clarifying OCSP client and responder behavior that will 154 permit: Instead of writing 'in PKI environments described above' would it not be more simpler to say 'in highly scaled PKI environments'? 668 8. Security Considerations Is there a special fallback consideration in scenarios where the OCSP check fails (either due to responder issues or network problems)? Are there any additional privacy considerations associated with the lightweight solution beyond those already noted for the traditional OCSP? G/ |
2024-04-15
|
08 | Gunter Van de Velde | Ballot comment text updated for Gunter Van de Velde |
2024-04-15
|
08 | Gunter Van de Velde | [Ballot comment] # Gunter Van de Velde, RTG AD, comments for draft-ietf-lamps-rfc5019bis-08 Thank you for the work put into this document. Please find below some … [Ballot comment] # Gunter Van de Velde, RTG AD, comments for draft-ietf-lamps-rfc5019bis-08 Thank you for the work put into this document. Please find below some non-blocking COMMENT points. Please find https://www.ietf.org/blog/handling-iesg-ballot-positions/ documenting the handling of ballots. I hope that this review helps to improve the document, 117 (For brevity we refer to OCSP as being used to verify certificate 118 status, but only the revocation status of a certificate is checked 119 via this protocol.) As networking generalist i am unclear what the 'but only' refers towards? it reads a bit odd. in addition not sure if the word 'we' helps in a formal document. What about following rewrite suggestion: For brevity, the term "OCSP" is used herein to denote the verification of certificate status; however, it should be noted that this protocol is employed solely to ascertain the revocation status of a certificate. 121 To date, many OCSP deployments have been used to ensure timely and 122 secure certificate status information for high-value electronic 123 transactions or highly sensitive information, such as in the banking 124 and financial environments. As such, the requirement for an OCSP This text processes difficult for me. Would he following text be a potential rewrite? To date, numerous OCSP deployments have been implemented to provide timely and secure certificate status information, crucial for high-value electronic transactions and the handling of highly sensitive information, particularly within the banking and financial sectors. 128 is not an issue, and have run on client and server systems where 129 processing power is not constrained. I assume that there is no additional constraints beyond the capabilities of the CPU/memory used? 151 This document addresses the scalability issues inherent when using 152 OCSP in PKI environments described above by defining a message 153 profile and clarifying OCSP client and responder behavior that will 154 permit: Instead of writing 'in PKI environments described above' would it not be more simpler to say 'in highly scaled PKI environments'? 668 8. Security Considerations Is there a special fallback consideration in scenarios where the OCSP check fails (either due to responder issues or network problems)? Are there any additional privacy considerations associated with the lightweight solution beyond those already noted for the traditional OCSP? G/ |
2024-04-15
|
08 | Gunter Van de Velde | [Ballot Position Update] New position, No Objection, has been recorded for Gunter Van de Velde |
2024-04-13
|
08 | Erik Kline | [Ballot comment] # Internet AD comments for draft-ietf-lamps-rfc5019bis-08 CC @ekline * comment syntax: - https://github.com/mnot/ietf-comments/blob/main/format.md * "Handling Ballot Positions": - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/ ## Nits … [Ballot comment] # Internet AD comments for draft-ietf-lamps-rfc5019bis-08 CC @ekline * comment syntax: - https://github.com/mnot/ietf-comments/blob/main/format.md * "Handling Ballot Positions": - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/ ## Nits ### Appendix B.5 * Out of curiosity, what causes the different formats for the time strings: - "GeneralizedTime 10/04/2024 12:37:47 GMT", and - "UTCTime 02/04/2024 12:37:47 GMT"? Clearly they're both GMT, and therefore compliant with S3.2.4. I'm just curious... |
2024-04-13
|
08 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
2024-04-12
|
08 | Orie Steele | [Ballot comment] # Orie Steele, ART AD, comments for draft-ietf-lamps-rfc5019bis-08 CC @OR13 This review is in the ["IETF Comments" Markdown format][ICMF]. You can use the … [Ballot comment] # Orie Steele, ART AD, comments for draft-ietf-lamps-rfc5019bis-08 CC @OR13 This review is in the ["IETF Comments" Markdown format][ICMF]. You can use the [`ietf-comments` tool][ICT] to automatically convert this review into individual GitHub issues, or using this [online validator](https://mnot.github.io/ietf-comments/). Line numbers are generated with this: https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-lamps-rfc5019bis-08.txt&submitcheck=True ## Comments ### Section 1 profile discovery ``` 169 OCSP does not have the means to signal responder capabilities within 170 the protocol. Thus, clients will need to use out-of-band mechanisms 171 to determine whether a responder conforms to the profile defined in 172 this document. Regardless of the availability of such out-of-band 173 mechanisms, this profile ensures that interoperability will still 174 occur between an OCSP client that fully conforms with [RFC6960] and a 175 responder that is operating in a mode as described in this 176 specification. ``` Consider documenting at least 1 out of band mechanism in an appendix? ### Section 3.1.1 missing Signature ``` 194 Provided for convenience here, but unchanged from [RFC6960], the 195 ASN.1 structure corresponding to the OCSPRequest with the relevant 196 CertID is: ``` https://datatracker.ietf.org/doc/html/rfc6960#section-4.1.1 contains: ``` Signature ::= SEQUENCE { signatureAlgorithm AlgorithmIdentifier, signature BIT STRING, certs [0] EXPLICIT SEQUENCE OF Certificate OPTIONAL} ``` But this section does not. I am not sure if this impacts "copy paste / validation", but it is a "change" that I noticed. Later sections note that unsigned requests are acceptable, perhaps this is the reason for the ommision? ### Section 3.1.1 which AlgorithmIdentifier is used for SHA-256? ``` 221 The CertID.issuerNameHash and CertID.issuerKeyHash fields contain 222 hashes of the issuer's DN and public key, respectively. OCSP clients 223 that conform with this profile MUST use SHA-256 as defined in 224 [RFC6234] as the hashing algorithm for the CertID.issuerNameHash and 225 the CertID.issuerKeyHash values. ``` I wondered if there is a better reference for the AlgorithmIdentifier that is SHA-256. Something more ASN.1 specific? ### sha-1 still ok? In Section 3.1.1: ``` 230 However, these OCSP clients should transition from SHA-1 to SHA-256 231 as soon as practical. ``` Capitalize SHOULD? Why not MUST? (given the as soon as practical comment) Later in security considerations: ``` 749 8.7. Use of SHA-1 for the calculation of CertID field values 751 Although the use of SHA-1 for the calculation of CertID field values 752 is not of concern from a cryptographic security standpoint, the 753 continued use of SHA-1 in an ecosystem requires that software that 754 interoperates with the ecosystem maintain support for SHA-1. This 755 increases implementation complexity and potential attack surface for 756 the software in question. Thus, the continued use of SHA-1 in an 757 ecosystem to maintain interoperability with legacy software must be 758 weighed against the increased implementation complexity and potential 759 attack surface. ``` 8.7 framing reads as "no rush", which does not seem like a security consideration. ### Section 3.1.2 ignore requestorName? ``` 246 If the OCSPRequest is signed, the client SHALL specify its name in 247 the OCSPRequest.requestorName field; otherwise, clients SHOULD NOT 248 include the requestorName field in the OCSPRequest. OCSP servers 249 MUST be prepared to receive unsigned OCSP requests that contain the 250 requestorName field, but MUST handle such requests as if the 251 requestorName field were absent. ``` Why not "clients MUST NOT include the requestorName field in the OCSPRequest" ? Wording of the second part could also be clearer, something like: ``` 248 include the requestorName field in the OCSPRequest. OCSP servers 249 MUST handle unsigned OCSP requests that contain the 250 requestorName field, as if the requestorName field were absent. ``` ### Section 3.2.3 resource exhaustion? ``` 382 Also, in order to ensure the database of revocation information does 383 not grow unbounded over time, the responder MAY remove the status 384 records of expired certificates. Requests from clients for ``` Why not SHOULD? Under what circumstances SHOULD the status records for expired certificates be retained indefinitely? ### Section 3.2.4 redundant MUST? ``` 400 available about the status of the certificate. Responders MUST 401 always include this value to aid in response caching. See 402 Section 7 for additional information on caching. ``` The MUST here seems redundant? Are these fields always present, or optional except for this one? The text in later sections implies these are all mandatory. ### Section 4.2 expiration checks ``` 439 Similarly, an application MUST validate the signature on certificates 440 in a chain, before asking an OCSP client to check the status of the 441 certificate. If the certificate signature is invalid or the 442 application is not able to verify it, an OCSP check MUST NOT be 443 requested. Clients SHOULD NOT make a request to check the status of 444 expired certificates. ``` Why not MUST NOT? Consider: ``` 441 certificate. If the certificate signature is invalid or the 442 application is not able to verify it, or the certificate is expired, 443 an OCSP check MUST NOT be requested. ``` ### Section 6 HTTP vs HTTPs ``` 492 6. Transport Profile 494 OCSP clients can send HTTP-based OCSP requests using either the GET 495 or POST method. The OCSP responder MUST support requests and 496 responses over HTTP. When sending requests that are less than or 497 equal to 255 bytes in total (after encoding) including the scheme and 498 delimiters (http://), server name and base64-encoded OCSPRequest ``` I assume the use of `http` instead of `https` is intentional, I wouldn't mind a brief comment on why not HTTPs here. # 8.5. Modification of HTTP Headers is ok? ``` 734 manipulated by an attacker. Clients SHOULD use these values for 735 caching guidance only and ultimately SHOULD rely only on the values 736 present in the signed OCSPResponse. Clients SHOULD NOT rely on ``` Why not MUST? ## Nits ### Section 8.3 capitalize must ``` 715 As detailed in [RFC6960], clients must properly validate the 716 signature of the OCSP response and the signature on the OCSP response 717 signer certificate to ensure an authorized responder created it. ``` ### 8.4. Denial-of-Service Attacks Consider alternative language to "should", such as "ought to", or capitalize it, and make it more actionable. ### Section 3.1.1 DN expand on first use ``` 221 The CertID.issuerNameHash and CertID.issuerKeyHash fields contain 222 hashes of the issuer's DN and public key, respectively. OCSP clients ``` |
2024-04-12
|
08 | Orie Steele | [Ballot Position Update] New position, No Objection, has been recorded for Orie Steele |
2024-04-10
|
08 | Roman Danyliw | Placed on agenda for telechat - 2024-04-18 |
2024-04-10
|
08 | Roman Danyliw | Ballot has been issued |
2024-04-10
|
08 | Roman Danyliw | [Ballot Position Update] New position, Yes, has been recorded for Roman Danyliw |
2024-04-10
|
08 | Roman Danyliw | Created "Approve" ballot |
2024-04-10
|
08 | Roman Danyliw | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup |
2024-04-10
|
08 | Roman Danyliw | Ballot writeup was changed |
2024-04-10
|
08 | Roman Danyliw | Ballot approval text was generated |
2024-04-10
|
08 | (System) | Changed action holders to Roman Danyliw (IESG state changed) |
2024-04-10
|
08 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
2024-04-10
|
08 | Tadahiko Ito | New version available: draft-ietf-lamps-rfc5019bis-08.txt |
2024-04-10
|
08 | (System) | New version approved |
2024-04-10
|
08 | (System) | Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito |
2024-04-10
|
08 | Tadahiko Ito | Uploaded new revision |
2024-04-04
|
07 | Roman Danyliw | Thanks for making the revisions in response to IETF LC directorate feedback. In -07 the text in the abstract saying that this document obsoletes RFC5019 … Thanks for making the revisions in response to IETF LC directorate feedback. In -07 the text in the abstract saying that this document obsoletes RFC5019 was lost. Please add it back in. |
2024-04-04
|
07 | (System) | Changed action holders to Sean Turner, Clint Wilson, Tadahiko Ito, Corey Bonnell (IESG state changed) |
2024-04-04
|
07 | Roman Danyliw | IESG state changed to Waiting for AD Go-Ahead::Revised I-D Needed from Waiting for AD Go-Ahead |
2024-04-03
|
07 | Tadahiko Ito | New version available: draft-ietf-lamps-rfc5019bis-07.txt |
2024-04-03
|
07 | (System) | New version approved |
2024-04-03
|
07 | (System) | Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito |
2024-04-03
|
07 | Tadahiko Ito | Uploaded new revision |
2024-04-03
|
06 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2024-04-03
|
06 | Tadahiko Ito | New version available: draft-ietf-lamps-rfc5019bis-06.txt |
2024-04-03
|
06 | (System) | New version approved |
2024-04-03
|
06 | (System) | Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito |
2024-04-03
|
06 | Tadahiko Ito | Uploaded new revision |
2024-03-29
|
05 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
2024-03-23
|
05 | Paul Kyzivat | Request for Last Call review by GENART Completed: Ready with Issues. Reviewer: Paul Kyzivat. |
2024-03-14
|
05 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Ivaylo Petrov |
2024-03-13
|
05 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2024-03-13
|
05 | David Dong | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-lamps-rfc5019bis-05, which is currently in Last Call, and has the following comments: We … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-lamps-rfc5019bis-05, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any registry actions. While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object. If this assessment is not accurate, please respond as soon as possible. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, David Dong IANA Services Sr. Specialist |
2024-03-13
|
05 | Jean Mahoney | Request for Last Call review by GENART is assigned to Paul Kyzivat |
2024-03-12
|
05 | Carlos Pignataro | Request for Last Call review by OPSDIR is assigned to Nagendra Nainar |
2024-03-08
|
05 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2024-03-08
|
05 | Cindy Morgan | The following Last Call announcement was sent out (ends 2024-03-29): From: The IESG To: IETF-Announce CC: draft-ietf-lamps-rfc5019bis@ietf.org, housley@vigilsec.com, lamps-chairs@ietf.org, rdd@cert.org, spasm@ietf.org … The following Last Call announcement was sent out (ends 2024-03-29): From: The IESG To: IETF-Announce CC: draft-ietf-lamps-rfc5019bis@ietf.org, housley@vigilsec.com, lamps-chairs@ietf.org, rdd@cert.org, spasm@ietf.org Reply-To: last-call@ietf.org Sender: Subject: Last Call: (Updates to Lightweight OCSP Profile for High Volume Environments) to Proposed Standard The IESG has received a request from the Limited Additional Mechanisms for PKIX and SMIME WG (lamps) to consider the following document: - 'Updates to Lightweight OCSP Profile for High Volume Environments' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2024-03-29. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract RFC 5019 defines a lightweight profile for OCSP that makes the protocol more suitable for use in high-volume environments. The lightweight profile specifies the mandatory use of SHA-1 when calculating the values of several fields in OCSP requests and responses. In recent years, weaknesses have been demonstrated with the SHA-1 algorithm. As a result, SHA-1 is increasingly falling out of use even for non-security relevant use cases. This document obsoletes the lightweight profile as specified in RFC 5019 to instead recommend the use of SHA-256 where SHA-1 was previously required. An RFC 5019-compliant OCSP client is still able to use SHA-1, but the use of SHA-1 may become obsolete in the future. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-lamps-rfc5019bis/ No IPR declarations have been submitted directly on this I-D. The document contains these normative downward references. See RFC 3967 for additional information: draft-ietf-tls-rfc8446bis: The Transport Layer Security (TLS) Protocol Version 1.3 (None - Internet Engineering Task Force (IETF)) |
2024-03-08
|
05 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2024-03-08
|
05 | Cindy Morgan | Last call announcement was changed |
2024-03-08
|
05 | Roman Danyliw | Last call was requested |
2024-03-08
|
05 | Roman Danyliw | Last call announcement was generated |
2024-03-08
|
05 | Roman Danyliw | Ballot approval text was generated |
2024-03-08
|
05 | Roman Danyliw | Ballot writeup was generated |
2024-03-08
|
05 | Roman Danyliw | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
2024-03-08
|
05 | (System) | Changed action holders to Roman Danyliw (IESG state changed) |
2024-03-08
|
05 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
2024-03-08
|
05 | Cindy Morgan | New version available: draft-ietf-lamps-rfc5019bis-05.txt |
2024-03-08
|
05 | Cindy Morgan | Secretariat manually posting. Approvals already received |
2024-03-08
|
05 | Cindy Morgan | Uploaded new revision |
2024-03-05
|
04 | Roman Danyliw | AD Review: https://mailarchive.ietf.org/arch/msg/spasm/zZ1_nLaIKq1wwC-cokyw1ei12fU/ |
2024-03-05
|
04 | (System) | Changed action holders to Roman Danyliw, Tadahiko Ito, Clint Wilson, Corey Bonnell, Sean Turner (IESG state changed) |
2024-03-05
|
04 | Roman Danyliw | IESG state changed to AD Evaluation::Revised I-D Needed from Publication Requested |
2024-03-02
|
04 | Russ Housley | # Shepherd Write-up for draft-ietf-lamps-rfc5019bis-04 ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with … # Shepherd Write-up for draft-ietf-lamps-rfc5019bis-04 ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? There is broad support in the LAMPS WG for this document. WG Last Call included many implementers, and all of the issues that were raise were resolved quickly. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? Suggested improvements were readily accepted by the authors. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No one has threatened an appeal; however, one concern was raised during WG Last Call that should be highlighted. This document includes: ~~~ OCSP responders SHOULD NOT distribute OCSP responses that contain CertIDs that use SHA-1 if the OCSP responder has no clients that require the use of SHA-1. ~~~ It is recognized that there is no obvious point in time when this will be true. However, no one could offer a better criteria for stopping support for SHA-1, which everyone wants to do. 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? OCSP is widely deployed. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. No concerns about interaction with other technologies. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. No special reviews are needed. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? This document does not include a YANG module. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. ASN.1 is used. It is a subset of the ASN.1 from the full OCSP specification in RFC 6960. As a result, this document does not contain an ASN.1 module. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? Yes. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? No concerns were noticed. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? As reflected in the Datatracker: Proposed Standard on the IETF Stream. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. The authors have explicitly stated that thye is unaware of any IPR that needs to be declared. 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) IDnits offers the following complaint: ~~~ The abstract seems to indicate that this document updates RFC5019, but the header doesn't have an 'Updates:' line to match this. ~~~ This is an error. This document obsoletes RFC 5019, and the header indicates this. Further, the Introduction contains a list of bullets for the "Substantive changes to RFC 5019". IDnits offers the following additional complaints: ~~~ -- Looks like a reference, but probably isn't: '0' on line 282 -- Looks like a reference, but probably isn't: '1' on line 283 -- Looks like a reference, but probably isn't: '2' on line 203 ~~~ This is not the case. These are ASN.1 tags. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. No concerns. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All references are freely available. [OCSPMP] takes a minute to locate, but it is available. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. There are no downward references. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? This document will wait on [I-D.ietf-tls-rfc8446bis], which seems to be progressing fairly rapidly. 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. This document obsoletes RFC 5019. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). No updates to any IANA registries are needed. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. No new IANA registries are needed. |
2024-03-02
|
04 | Russ Housley | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2024-03-02
|
04 | Russ Housley | IESG state changed to Publication Requested from I-D Exists |
2024-03-02
|
04 | (System) | Changed action holders to Roman Danyliw (IESG state changed) |
2024-03-02
|
04 | Russ Housley | Responsible AD changed to Roman Danyliw |
2024-03-02
|
04 | Russ Housley | Document is now in IESG state Publication Requested |
2024-03-02
|
04 | Russ Housley | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2024-03-02
|
04 | Russ Housley | # Shepherd Write-up for draft-ietf-lamps-rfc5019bis-04 ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with … # Shepherd Write-up for draft-ietf-lamps-rfc5019bis-04 ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? There is broad support in the LAMPS WG for this document. WG Last Call included many implementers, and all of the issues that were raise were resolved quickly. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? Suggested improvements were readily accepted by the authors. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No one has threatened an appeal; however, one concern was raised during WG Last Call that should be highlighted. This document includes: ~~~ OCSP responders SHOULD NOT distribute OCSP responses that contain CertIDs that use SHA-1 if the OCSP responder has no clients that require the use of SHA-1. ~~~ It is recognized that there is no obvious point in time when this will be true. However, no one could offer a better criteria for stopping support for SHA-1, which everyone wants to do. 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? OCSP is widely deployed. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. No concerns about interaction with other technologies. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. No special reviews are needed. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? This document does not include a YANG module. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. ASN.1 is used. It is a subset of the ASN.1 from the full OCSP specification in RFC 6960. As a result, this document does not contain an ASN.1 module. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? Yes. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? No concerns were noticed. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? As reflected in the Datatracker: Proposed Standard on the IETF Stream. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. The authors have explicitly stated that thye is unaware of any IPR that needs to be declared. 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) IDnits offers the following complaint: ~~~ The abstract seems to indicate that this document updates RFC5019, but the header doesn't have an 'Updates:' line to match this. ~~~ This is an error. This document obsoletes RFC 5019, and the header indicates this. Further, the Introduction contains a list of bullets for the "Substantive changes to RFC 5019". IDnits offers the following additional complaints: ~~~ -- Looks like a reference, but probably isn't: '0' on line 282 -- Looks like a reference, but probably isn't: '1' on line 283 -- Looks like a reference, but probably isn't: '2' on line 203 ~~~ This is not the case. These are ASN.1 tags. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. No concerns. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All references are freely available. [OCSPMP] takes a minute to locate, but it is available. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. There are no downward references. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? This document will wait on [I-D.ietf-tls-rfc8446bis], which seems to be progressing fairly rapidly. 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. This document obsoletes RFC 5019. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). No updates to any IANA registries are needed. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. No new IANA registries are needed. |
2024-02-29
|
04 | Russ Housley | Notification list changed to housley@vigilsec.com because the document shepherd was set |
2024-02-29
|
04 | Russ Housley | Document shepherd changed to Russ Housley |
2024-02-29
|
04 | Russ Housley | Changed consensus to Yes from Unknown |
2024-02-29
|
04 | Russ Housley | Intended Status changed to Proposed Standard from None |
2024-02-25
|
04 | Tadahiko Ito | New version available: draft-ietf-lamps-rfc5019bis-04.txt |
2024-02-25
|
04 | (System) | New version approved |
2024-02-25
|
04 | (System) | Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito |
2024-02-25
|
04 | Tadahiko Ito | Uploaded new revision |
2024-02-23
|
03 | Tadahiko Ito | New version available: draft-ietf-lamps-rfc5019bis-03.txt |
2024-02-23
|
03 | (System) | New version approved |
2024-02-23
|
03 | (System) | Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito |
2024-02-23
|
03 | Tadahiko Ito | Uploaded new revision |
2024-01-29
|
02 | Tadahiko Ito | New version available: draft-ietf-lamps-rfc5019bis-02.txt |
2024-01-29
|
02 | Corey Bonnell | New version approved |
2024-01-29
|
02 | (System) | Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito |
2024-01-29
|
02 | Tadahiko Ito | Uploaded new revision |
2024-01-11
|
02 | (System) | Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito |
2024-01-11
|
02 | Tadahiko Ito | Uploaded new revision |
2024-01-10
|
01 | Russ Housley | IETF WG state changed to In WG Last Call from WG Document |
2023-12-14
|
01 | Tadahiko Ito | New version available: draft-ietf-lamps-rfc5019bis-01.txt |
2023-12-14
|
01 | (System) | New version approved |
2023-12-14
|
01 | (System) | Request for posting confirmation emailed to previous authors: Clint Wilson , Corey Bonnell , Sean Turner , Tadahiko Ito |
2023-12-14
|
01 | Tadahiko Ito | Uploaded new revision |
2023-11-06
|
00 | Russ Housley | This document now replaces draft-bonnell-rfc5019bis instead of None |
2023-11-06
|
00 | Tadahiko Ito | New version available: draft-ietf-lamps-rfc5019bis-00.txt |
2023-11-06
|
00 | Russ Housley | WG -00 approved |
2023-11-06
|
00 | Tadahiko Ito | Set submitter to "伊藤忠彦", replaces to draft-bonnell-rfc5019bis and sent approval email to group chairs: lamps-chairs@ietf.org |
2023-11-06
|
00 | Tadahiko Ito | Uploaded new revision |