Extensible Markup Language Evidence Record Syntax (XMLERS)
draft-ietf-ltans-xmlers-11
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
11 | (System) | post-migration administrative database adjustment to the No Objection position for Sean Turner |
2012-08-22
|
11 | (System) | post-migration administrative database adjustment to the No Objection position for Alexey Melnikov |
2011-04-27
|
11 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2011-04-26
|
11 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2011-04-26
|
11 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2011-04-13
|
11 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2011-03-31
|
11 | (System) | IANA Action state changed to In Progress |
2011-03-30
|
11 | Cindy Morgan | State changed to RFC Ed Queue from Approved-announcement sent. |
2011-03-30
|
11 | Cindy Morgan | IESG state changed to Approved-announcement sent |
2011-03-30
|
11 | Cindy Morgan | IESG has approved the document |
2011-03-30
|
11 | Cindy Morgan | Closed "Approve" ballot |
2011-03-30
|
11 | Cindy Morgan | Approval announcement text regenerated |
2011-03-30
|
11 | Cindy Morgan | Ballot writeup text changed |
2011-03-30
|
11 | Tim Polk | Ballot writeup text changed |
2011-03-29
|
11 | Peter Saint-Andre | [Ballot Position Update] Position for Peter Saint-Andre has been changed to No Objection from Discuss |
2011-02-10
|
11 | Alexey Melnikov | [Ballot comment] Since at the time being there is no standard for an XML Time-Stamp, the following structure example is provided (referring to … [Ballot comment] Since at the time being there is no standard for an XML Time-Stamp, the following structure example is provided (referring to the Entrust XML Schema for Time-Stamp http://www.entrust.com/schemas/timestamp19protocol-20020207), which is a digital signature compliant to [XMLDSig] specification containing Time-Stamp specific data, such as time-stamped value and time within element of a signature. Is this enough for interoperability? The text almost looks informative, however in other places in the document it is clear that a timestamp field is mandatory. |
2011-02-10
|
11 | Alexey Melnikov | [Ballot Position Update] Position for Alexey Melnikov has been changed to No Objection from Discuss |
2011-02-03
|
11 | Cindy Morgan | Removed from agenda for telechat |
2011-02-03
|
11 | Cindy Morgan | State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation. |
2011-02-03
|
11 | Amy Vezza | State changed to IESG Evaluation from IESG Evaluation - Defer. |
2011-02-03
|
11 | Jari Arkko | [Ballot comment] Ari Keränen helped me review this. Here are his comments: There are some musts and mays (e.g., in Section 2.2 and 3) that … [Ballot comment] Ari Keränen helped me review this. Here are his comments: There are some musts and mays (e.g., in Section 2.2 and 3) that could be capitalized (RFC2119'ised). I'd recommend going through all of them once more and capitalizing them when describing normative behavior. 2.1. Structure I guess these should be: REQUIRED Order attribute to indicate the order within the parent element and an OPTIONAL Type attribute to indicate processing directions. It is a bit confusing to have an *element* with the name "attribute" (that is the case, right?) when the same text uses also the term "attribute" to refer to element's (XML) attributes. 3.1.1. Hash Tree The newly calculated hash value is added to the next list of hashes Should that be "concatenated" instead of "added"? (same issue is found multiple times in this section). 3.2.1. Generation of Hash Tree 3. Group together items in the input list by the order of N "order of N" is not defined. Should that be "order of the hash tree"? |
2011-02-03
|
11 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded |
2011-02-02
|
11 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded |
2011-02-02
|
11 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded |
2011-02-02
|
11 | Ralph Droms | [Ballot Position Update] New position, No Objection, has been recorded |
2011-01-30
|
11 | Alexey Melnikov | [Ballot discuss] [Updated. All my other issues were resolved. Please let me know if I missed a resolution or reply to the only remaining issue.] … [Ballot discuss] [Updated. All my other issues were resolved. Please let me know if I missed a resolution or reply to the only remaining issue.] 3.1.2. Time-Stamp Since at the time being there is no standard for an XML Time-Stamp, the following structure example is provided (referring to the Entrust XML Schema for Time-Stamp http://www.entrust.com/schemas/timestamp19protocol-20020207), which is a digital signature compliant to [XMLDSig] specification containing Time-Stamp specific data, such as time-stamped value and time within element of a signature. Is this enough for interoperability? The text almost looks informative in places. |
2011-01-25
|
11 | Sean Turner | [Ballot discuss] This is an updated discuss based on draft -11. #1) addressed #2) addressed #3) addressed #4) addressed #5) addressed #6) addressed #7) addressed … [Ballot discuss] This is an updated discuss based on draft -11. #1) addressed #2) addressed #3) addressed #4) addressed #5) addressed #6) addressed #7) addressed #8) addressed #9) addressed #10) addressed #11) addressed |
2011-01-25
|
11 | Sean Turner | [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss |
2011-01-24
|
11 | Sean Turner | [Ballot comment] #1) addressed #2) addressed #3) addressed #4) addressed #5) Sec 2.1: Should probably also indicate how many of the fields can be included … [Ballot comment] #1) addressed #2) addressed #3) addressed #4) addressed #5) Sec 2.1: Should probably also indicate how many of the fields can be included (i.e, match the +, ?, * in the schema to the text). #6) I didn't see the changes for this one: Sec 3.1.1: I put that hex string in to a couple of Base64 encoders and got: QTk5OTNFMzYgNDcwNjgxNkEgQkEzRTI1NzEgNzg1MEMyNkMgOUNEMEQ4OUQ== #7) addressed |
2011-01-24
|
11 | Sean Turner | [Ballot discuss] This is an updated discuss based on draft -11. #1) addressed #2) addressed #3) addressed #4) addressed #5) addressed #6) Sec 3.1.1: What's … [Ballot discuss] This is an updated discuss based on draft -11. #1) addressed #2) addressed #3) addressed #4) addressed #5) addressed #6) Sec 3.1.1: What's the required Hash Algorithm? #7) addressed #8) addressed #9) addressed #10) addressed #11) addressed |
2011-01-24
|
11 | Peter Saint-Andre | [Ballot comment] COMMENTS 1. In Section 1.3, some of these terms are repeated from RFC 3275 and RFC 4051. Sometimes the definitions are the … [Ballot comment] COMMENTS 1. In Section 1.3, some of these terms are repeated from RFC 3275 and RFC 4051. Sometimes the definitions are the same (e.g., "Archive data object") and sometimes they are slightly different (e.g., "Evidence"). Why does this document not simply reference RFC 3275 and RFC 4051 for the repeated terms? 2. [addressed in -11] 3. [addressed in -11] 4. [addressed in -11] 5. [addressed in -11] 6. [addressed in -11] 7. [addressed in -11] 8. [addressed in -11] 9. [addressed in -11] |
2011-01-24
|
11 | Peter Saint-Andre | [Ballot discuss] This a reconstructed review, since the first one was lost in a datatracker accident. My apologies if I have missed anything that was … [Ballot discuss] This a reconstructed review, since the first one was lost in a datatracker accident. My apologies if I have missed anything that was in the initial review. (Updated per version -11 of the spec.) DISCUSSES 1. [addressed in -11] 2. [addressed in -11] 3. [addressed in -11] 4. [addressed in -11] 5. Section 2.1 states: tag holds a element with a Time-Stamp Token provided by the Time-Stamping Authority and optional element . This makes it sound as if the structure of the element (not "tag"!) is a sequence formed of a required element and an optional element. However, the schema in Section 7 defines the element as having a mixed content model. This is confusing. Furthermore, mixed content models can make parsing more complex. Is there a good reason why this document defines a mixed content model for the element? As a further clarification, in Section 3.1.2 there can be found the following examples... For example: MIAGCSqGSIb3DQEH... or ... . To prevent the mixed content model, why not do something like the following? MIAGCSqGSIb3DQEH... That would enable you to define the schema as something like this: Much simpler... 6. Section 2.1 states: tag contains additional information that may be provided by an LTA used to support processing of Evidence Records. An example of this supporting information may be a processing policy, like a renewal, a cryptographic (e.g. [RFC5698]) or an archiving policy. Such policies can provide inputs, which are relevant for data object(s) preservation and evidence validation at a later stage. Each data object is put into a separate child element , with a mandatory Order attribute to indicate the order within the parent element and an optional Type attribute to indicate processing directions. This makes it sound as if the structure of the element (not "tag"!) is a sequence formed of one or more required elements. However, the schema in Section 7 defines the element as having a mixed content model. This is confusing. Furthermore, mixed content models can make parsing more complex. Is there a good reason why this document defines a mixed content model for the element? 7. Section 2.1 does not define the syntax and semantics for the 'Type' attribute of the element or the element. The text says only that this attribute is used "to indicate processing directions". What does that mean? What values are allowed? How is the application supposed to determine the processing directions based on the value of the 'Type' attribute? The lack of specification here will likely cause interoperability problems. 8. [addressed in -11] 9. In Section 3.1.2, the "ts:" prefix is undefined. Is it hardcoded to "ts:" or is that just an example? Is the "ts:" prefix associated with the (unspecified) namespace from ? Are you aware that the referenced URL currently yields an HTTP 404 error at www.entrust.com? Can you please provide a stable reference to the "Entrust XML Schema for Time-Stamp"? The lack of a clear definition or a stable reference is problematic. Finally, if the text beginning with is intended to be a schema snippet that defines the element, then this should be included in the schema within Section 7 or in a separate schema, and we should make sure that this contribution was made in conformance with the IETF's "Note Well" policy. 10. [addressed in -11] 11. In Section 7, I suggest that you redefine the schema so that it no longer uses mixed content models. 12. [addressed in -11] 13. [addressed in -11] 14. [addressed in -11] 15. [addressed in -11] |
2011-01-24
|
11 | (System) | New version available: draft-ietf-ltans-xmlers-11.txt |
2011-01-21
|
11 | Peter Saint-Andre | [Ballot comment] COMMENTS 1. In Section 1.3, some of these terms are repeated from RFC 3275 and RFC 4051. Sometimes the definitions are the … [Ballot comment] COMMENTS 1. In Section 1.3, some of these terms are repeated from RFC 3275 and RFC 4051. Sometimes the definitions are the same (e.g., "Archive data object") and sometimes they are slightly different (e.g., "Evidence"). Why does this document not simply reference RFC 3275 and RFC 4051 for the repeated terms? 2. The text in Section 2.1 with lots of angle brackets looks like XML, but it's really a kind of pseudo-XML. This is confusing. For example, something like " +" is presumably meant to show that the element may/should/must include an 'Order' attribute and a 'Type' attribute and that the element may/should/must be included one or more times. However, that's not clear from the text. I suggest saying that this is "pseudo-XML" and providing a forward pointer to the schema in Section 7 before the angle-bracket-blob. 3. In Section 2.1, this sentence is supposed to point to Section 7, not Section 6: The syntax of an evidence record is defined as an XML schema [XMLSchema], see Section 6. 4. Why does Section 2.1 include the XML declaration and the opening tag? That is: The schema uses the following XML namespace [XMLName] urn:ietf:params:xml:ns:ers as default namespace and starts with following definition: That information is duplicated from the schema in Section 7, but for no apparent reason. I suggest removing everything after "and starts with the following definition...". 5. Section 2.1 states: The XML tags have the following meanings: However, XML attributes are not tags. Please use correct XML terminology. I suggest: The XML elements and attributes have the following meanings: 6. The document does not specify allowable values for the 'Algorithm' attribute of the element. Could we possibly point to the IANA registry for "Hash Function Textual Names" and recommend the use of those values? 7. The document does not specify allowable values for the 'Algorithm' attribute of the element. Do we need a registry of such values? 8. In Section 3.1.2, please enclose the literal values "XMLENTRUST" and "RFC3161" in quotes. Thus: ...with values "XMLENTRUST" or "RFC3161" respectively... 9. In both Section 4.1.1 and 4.1.2, the values of the 'Algorithm' attribute seem to be limited to those defined in RFC 3275 and RFC 4051. Does that limit algorithm-agility? |
2011-01-21
|
11 | Peter Saint-Andre | [Ballot discuss] This a reconstructed review, since the first one was lost in a datatrack accident. My apologies if I have missed anything that was … [Ballot discuss] This a reconstructed review, since the first one was lost in a datatrack accident. My apologies if I have missed anything that was in the initial review. DISCUSSES 1. In Section 1.3, "Digest Method" is defined as a one-way hash function and in Section 2.1 the element is described as "a required element" that "identifies the digest algorithm". However, in actuality (and in the XML schema) it is the 'Algorithm' attribute of the element that identifies the one-way hash function, whereas the XML character data of the element is the output of the hash function. This is confusing and will likely cause interoperability problems if not corrected. 2. Section 2.1 seems to state that the defined children of the element are and . However, the schema in Section 7 states that the element names are and . These are in conflict and will likely cause interoperability problems if not corrected. Furthermore, the semantics of these child elements are not defined anywhere in the specification, which will also likely cause interoperability problems. 3. I concur with Alexey Melnikov's DISCUSS regarding the 'Version' attribute described in Section 2.1. I suggest looking at Section 4.7.5 of draft-ietf-xmpp-3920bis-22 for text about versioning. You might even be able to borrow some of that text directly, or modify it to meet your needs. 4. Section 2.1 states that the current version is "1.0". However, the XML schema in Section 7 fixes the version to "1", not "1.0". These are in conflict, and will likely cause interoperability problems if not corrected. 5. Section 2.1 states: tag holds a element with a Time-Stamp Token provided by the Time-Stamping Authority and optional element . This makes it sound as if the structure of the element (not "tag"!) is a sequence formed of a required element and an optional element. However, the schema in Section 7 defines the element as having a mixed content model. This is confusing. Furthermore, mixed content models can make parsing more complex. Is there a good reason why this document defines a mixed content model for the element? As a further clarification, in Section 3.1.2 there can be found the following examples... For example: MIAGCSqGSIb3DQEH... or ... . To prevent the mixed content model, why not do something like the following? MIAGCSqGSIb3DQEH... That would enable you to define the schema as something like this: Much simpler... 6. Section 2.1 states: tag contains additional information that may be provided by an LTA used to support processing of Evidence Records. An example of this supporting information may be a processing policy, like a renewal, a cryptographic (e.g. [RFC5698]) or an archiving policy. Such policies can provide inputs, which are relevant for data object(s) preservation and evidence validation at a later stage. Each data object is put into a separate child element , with a mandatory Order attribute to indicate the order within the parent element and an optional Type attribute to indicate processing directions. This makes it sound as if the structure of the element (not "tag"!) is a sequence formed of one or more required elements. However, the schema in Section 7 defines the element as having a mixed content model. This is confusing. Furthermore, mixed content models can make parsing more complex. Is there a good reason why this document defines a mixed content model for the element? 7. Section 2.1 does not define the syntax and semantics for the 'Type' attribute of the element or the element. The text says only that this attribute is used "to indicate processing directions". What does that mean? What values are allowed? How is the application supposed to determine the processing directions based on the value of the 'Type' attribute? The lack of specification here will likely cause interoperability problems. 8. Sections 2.2, 2.3, 3.2, 3.3, and 3.4 do not contain conformance terms (e.g., MUST or SHOULD) regarding the algorithms for generation and verification of data. This is worrisome, because implementers are likely to consider these algorithms non-normative. I strongly suggest modifying these sections to specify that the algorithms are MUST-implement. 9. In Section 3.1.2, the "ts:" prefix is undefined. Is it hardcoded to "ts:" or is that just an example? Is the "ts:" prefix associated with the (unspecified) namespace from ? Are you aware that the referenced URL currently yields an HTTP 404 error at www.entrust.com? Can you please provide a stable reference to the "Entrust XML Schema for Time-Stamp"? The lack of a clear definition or a stable reference is problematic. Finally, if the text beginning with is intended to be a schema snippet that defines the element, then this should be included in the schema within Section 7 or in a separate schema, and we should make sure that this contribution was made in conformance with the IETF's "Note Well" policy. 10. In Section 3.1.2 and elsewhere, please specify which flavor of Base64 is to be used for encoding. For example: The text value of the element SHALL be the base64 encoding of this bit string viewed as a 20-octet octet stream, where the encoding MUST adhere to the definition from Section 4 of [RFC4648] with the padding bits set to zero. 11. In Section 7, I suggest that you redefine the schema so that it no longer uses mixed content models. 12. In Section 7, why is the type of the 'Version' attribute not "xs:decimal"? 13. In Section 7, why are you using processContents="skip" instead of processContents="lax"? That is, why are you preventing applications from validating the contents if they are able to do so? 14. In Section 7, there are only two defined values for the 'Type' attribute of the element. Why not define an enumeration? (I recognize that additional values might be defined in the future via registration with the IANA's new "Time-Stamp Toek Type" sub-registry, so that might be a reason not to define an enumeration.) Is one of those values the default? Is the datatype really "xs:string"? It seems to me that "xs:NMTOKEN" might be more appropriate. 15. In Section 7, there are only four defined values for the 'Type' attribute of the element. Why not define an enumeration? (I recognize that additional values might be defined in the future via registration with the IANA's new "Cryptographic Information Type" sub-registry, so that might be a reason not to define an enumeration.) Is one of those values the default? Is the datatype really "xs:string"? It seems to me that "xs:NMTOKEN" might be more appropriate. |
2011-01-21
|
11 | Peter Saint-Andre | [Ballot Position Update] New position, Discuss, has been recorded |
2011-01-19
|
11 | Peter Saint-Andre | State changed to IESG Evaluation - Defer from IESG Evaluation. |
2011-01-19
|
11 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded |
2011-01-19
|
11 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded |
2011-01-19
|
11 | Alexey Melnikov | [Ballot discuss] 2.1. Structure The XML tags have the following meanings: Version attribute indicates the syntax version, for compatibility with future … [Ballot discuss] 2.1. Structure The XML tags have the following meanings: Version attribute indicates the syntax version, for compatibility with future revisions of this specification and to distinguish it from earlier non-conformant or proprietary versions of the XMLERS. Current version of the XMLERS syntax is 1.0. What is the meaning of major and minor versions and what are the requirements on forward compatibility? 3.1.1. Hash Tree The algorithm by which a root hash value is generated from the element is as follows: the content of each element within the first element is base64 decoded to obtain a binary value (representing the hash value). All collected hash values from the sequence are ordered in binary ascending order, concatenated and a new hash value is generated from that string. With one exception from this rule: when the first element has only one element, then its binary value is added to the next list obtained from the next element. The newly calculated hash value is added to the next list of hashes obtained Does this sentence apply only together with the previous sentence ("With one exception from this rule") or unconditionally? If the latter, then I suggest you split the paragraph into 2 paragraphs. from the next element and the previous step is repeated until there is only one hash value left, i.e. when there are no elements left. The last calculated hash value is the root hash value. When an archive object is a group and composed of more than one data object, the first hash list MUST contain the hash values of all its data objects. 3.1.2. Time-Stamp Since at the time being there is no standard for an XML Time-Stamp, the following structure example is provided (referring to the Entrust XML Schema for Time-Stamp http://www.entrust.com/schemas/timestamp19protocol-20020207), which is a digital signature compliant to [XMLDSig] specification containing Time-Stamp specific data, such as time-stamped value and time within element of a signature. Is this enough for interoperability? The text almost looks informative in places. 3.2.1. Generation of Hash Tree Example: An input list with 18 hash values, where the h'1 is generated for a group of data objects (d4, d5, d6 and d7) and has been grouped by 3. The group could be of any size (2, 3...). I am sorry for being dense, but I don't quite understand how this works from the description and the ASCII art. Should grouping be done into groups of the same size at each level of the tree? It is also possible to extend the tree with "dummy" values; "Dummy" values don't contribute hashes, right? to make every node have the same number of children. |
2011-01-19
|
11 | Alexey Melnikov | [Ballot comment] 3.1.2. Time-Stamp Time-Stamp Token is an attestation generated by a TSA that a data item existed at a certain time. The … [Ballot comment] 3.1.2. Time-Stamp Time-Stamp Token is an attestation generated by a TSA that a data item existed at a certain time. The Time-Stamp Token is a signed data object that contains the hash value, the identity of the TSA, and the exact time (obtained from trusted time source) of Time-Stamping. This proves that the given data existed before the time of Time-Stamping. For example, [RFC3161] specifies a structure for signed Time-Stamp Tokens in ASN.1 format. Since at the time being there is no standard for an XML Time-Stamp, the following structure example is provided (referring to the Entrust XML Schema for Time-Stamp http://www.entrust.com/schemas/timestamp19protocol-20020207), I think this URL should be made a proper reference 3.1.3. Cryptographic Information List Digital certificates, CRLs, SCVP or OCSP-Responses needed to verify the Time-Stamp Token SHOULD be stored in the Time-Stamp Token itself. When this is not possible, such data MAY be stored in the element, each data object into a I think "is stored" is missing after "into". separate element, using a mandatory Order attribute. In 4.1.1: the first mentioning of "URI" needs an Informative Reference. In 4.1.2: the first mentioning of "UTF-8" needs an Informative Reference. |
2011-01-19
|
11 | Alexey Melnikov | [Ballot Position Update] New position, Discuss, has been recorded |
2011-01-19
|
11 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded |
2011-01-19
|
11 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded |
2011-01-17
|
11 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded |
2011-01-17
|
11 | Lars Eggert | [Ballot comment] I agree with Sean's discuss on RFC2119 usage. |
2011-01-17
|
11 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded |
2011-01-14
|
11 | Tim Polk | State Change Notice email list have been change to tobias.gondrom@gondrom.org, ltans-chairs@tools.ietf.org, draft-ietf-ltans-xmlers@tools.ietf.org from ltans-chairs@tools.ietf.org, draft-ietf-ltans-xmlers@tools.ietf.org |
2011-01-13
|
11 | Sean Turner | [Ballot discuss] This is an updated discuss based on draft -10. In the general I think this document is fine, but I think there's some … [Ballot discuss] This is an updated discuss based on draft -10. In the general I think this document is fine, but I think there's some issues with the 2119-language (i.e., I think there needs to be more). The authors need to do a review to ensure that there is 2119-language associated with the implementation requirements. I found many, but I'm sure I missed some: #1) Section 2.1 and 3: I think you mean MUST in the following: 2.1: This process must continue during the desired archiving period of the archive data object(s) 3: To achieve this, an ATS must be renewed before it becomes invalid If implementations don't do these steps then the whole thing falls apart. #2) Section 2.1: When describing the XML elements I think you need to use 2119 language for each element (i.e., is a MUST, SHOULD): Add: The Version attribute MUST be included. Change: tag is OPTIONAL Change: tag is OPTIONAL Change: is REQUIRED and contains a sequence of one or more . Change: is a REQUIRED field that holds .... and the order MUST be ... Change: is a REQUIRED Change: is a REQUIRED Change: is an OPTIONAL tag that holds... Change: is REQUIRED and it holds a element with a Time-Stamp Token provided by the Time-Stamping Authority and OPTIONAL element . Change: is an OPTIONAL tag that Change: The Order attribute is REQUIRED ... #3) Sec 2.1: Need to explain what the TimeStampToken Type is. It's later explained in 3.1.2 so maybe a pointer to it there? #4) Sec 2.2 & 2.1: Step #2 seems to imply there is some kind of ordering that needs to be maintained for . This is not captured in the description in section 2.1. If the order is to maintained then I think you should state this using 2119 language. #5) Sec 3.1.1: Need a normative reference to RFC 4648 for Base64 encoding. Also note that there are two alphabets. You need to specify which one is used. #6) Sec 3.1.1: What's the required Hash Algorithm? #7) addressed #8) Sec 3.1.3: Mandatory isn't 2119-lagnuage. Use MUST/REQUIRED. #9) addressed #10) Sec 4.1.2: .. (URIs) MUST be used ... #11) In the IANA considerations you need to say under what circumstances the registry will be updated. See Sec 4.1 of http://tools.ietf.org/html/rfc5226. |
2011-01-13
|
10 | (System) | New version available: draft-ietf-ltans-xmlers-10.txt |
2011-01-12
|
11 | Sean Turner | [Ballot comment] #1) Expand: ERS, ASN.1 in abstract #2) Delete the "Conventions" before the TOC. There's already a section in 1.4 for 2119 language. #3) … [Ballot comment] #1) Expand: ERS, ASN.1 in abstract #2) Delete the "Conventions" before the TOC. There's already a section in 1.4 for 2119 language. #3) Section 1.1 & 3: (tales from the crypt) What's a "decomposing Time-Stamping authority"? Should it be decommissioning TSA? #4) Section 1.3, TS definition: I think you need to add: [ISO-18014-1.2002], [ISO-18014-2.2002], [ISO-18014-3.2004], and [ANSI.X9-95.2005] as informative references. #5) Sec 2.1: Should probably also indicate how many of the fields can be included (i.e, match the +, ?, * in the schema to the text). #6) Sec 3.1.1: I put that hex string in to a couple of Base64 encoders and got: QTk5OTNFMzYgNDcwNjgxNkEgQkEzRTI1NzEgNzg1MEMyNkMgOUNEMEQ4OUQ== #7) Sec 3.1.2): Expand CRLs, SCVP and OCSP. |
2011-01-12
|
11 | Sean Turner | [Ballot discuss] In the general I think this document is fine, but I think there's some issues with the 2119-language (i.e., I think there needs … [Ballot discuss] In the general I think this document is fine, but I think there's some issues with the 2119-language (i.e., I think there needs to be more). The authors need to do a review to ensure that there is 2119-language associated with the implementation requirements. I found many, but I'm sure I missed some: #1) Section 2.1 and 3: I think you mean MUST in the following: 2.1: This process must continue during the desired archiving period of the archive data object(s) 3: To achieve this, an ATS must be renewed before it becomes invalid If implementations don't do these steps then the whole thing falls apart. #2) Section 2.1: When describing the XML elements I think you need to use 2119 language for each element (i.e., is a MUST, SHOULD): Add: The Version attribute MUST be included. Change: tag is OPTIONAL Change: tag is OPTIONAL Change: is REQUIRED and contains a sequence of one or more . Change: is a REQUIRED field that holds .... and the order MUST be ... Change: is a REQUIRED Change: is a REQUIRED Change: is an OPTIONAL tag that holds... Change: is REQUIRED and it holds a element with a Time-Stamp Token provided by the Time-Stamping Authority and OPTIONAL element . Change: is an OPTIONAL tag that Change: The Order attribute is REQUIRED ... #3) Sec 2.1: Need to explain what the TimeStampToken Type is. It's later explained in 3.1.2 so maybe a pointer to it there? #4) Sec 2.2 & 2.1: Step #2 seems to imply there is some kind of ordering that needs to be maintained for . This is not captured in the description in section 2.1. If the order is to maintained then I think you should state this using 2119 language. #5) Sec 3.1.1: Need a normative reference to RFC 4648 for Base64 encoding. Also note that there are two alphabets. You need to specify which one is used. #6) Sec 3.1.1: What's the required Hash Algorithm? #7) Sec 3.1: Think you meant MUST: The Attribute type MUST be used ... and ... element MUST contain #8) Sec 3.1.3: Mandatory isn't 2119-lagnuage. Use MUST/REQUIRED. #9) Sec 4.1.1: ... those MUST be used ... #10) Sec 4.1.2: .. (URIs) MUST be used ... #11) In the IANA considerations you need to say under what circumstances the registry will be updated. See Sec 4.1 of http://tools.ietf.org/html/rfc5226. |
2011-01-12
|
11 | Sean Turner | [Ballot Position Update] New position, Discuss, has been recorded |
2011-01-12
|
11 | Tim Polk | State changed to IESG Evaluation from Waiting for AD Go-Ahead. |
2011-01-12
|
11 | Tim Polk | [Ballot Position Update] New position, Yes, has been recorded for Tim Polk |
2011-01-12
|
11 | Tim Polk | Ballot has been issued |
2011-01-12
|
11 | Tim Polk | Created "Approve" ballot |
2011-01-11
|
11 | Tim Polk | Placed on agenda for telechat - 2011-01-20 |
2011-01-11
|
11 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call. |
2011-01-10
|
11 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Shawn Emery. |
2011-01-10
|
09 | (System) | New version available: draft-ietf-ltans-xmlers-09.txt |
2011-01-06
|
11 | Amanda Baber | Upon approval of this document, IANA understands that there are five IANA Actions that need to be completed. First, in the IANA XML ns registry … Upon approval of this document, IANA understands that there are five IANA Actions that need to be completed. First, in the IANA XML ns registry located at: http://www.iana.org/assignments/xml-registry/ns.html a new XML namespace will be registered as follows: id: ers URI: urn:ietf:params:xml:ns:ers Registration template: none Reference [RFC-to-be] Second, in the IANA XML schema registry located at: http://www.iana.org/assignments/xml-registry/schema.html a new XML schema will be registered as follows: id: ers URI: urn:ietf:params:xml:schema:ers filename: Provided by Section 6 of the approved document reference: [RFC-to-be] Third, IANA is to create a new IANA registry entitled "XML Evidence Record Syntax (ERSXML)". This registry will contain two sub-registries: "Time-Stamp Token Type" and "Cryptographic Information Type" The policy for future assignments to both sub-registries is "RFC Required". The reference for both sub-registries is to be [RFC-to-be]. Fourth, the "Time-Stamp Token Type" subregistry is to have the following initial values: Value Description Reference ----- ------------- ------------------------ RFC3161 RFC3161 Time-Stamp Token RFC 3161 XMLENTRUST EnTrust XML Schema http://www.entrust.com/schema/timestamp19protocol-20020207 Fifth, the sub-registry "Cryptographic Information Type" will have the following initial values: Value Description Reference ----- ------------------ ----------------- CERT DER-encoded X.509 Certificate RFC 5280 CRL DER-encoded X.509 RFC 5280 Certificate Revocation List OCSP DER-encoded OCSPResponse RFC 2560 SCVP DER-encoded SCVP response RFC 5055 (CVResponse) IANA understands that these five actions are the only ones required to be completed upon approval of this document. |
2011-01-04
|
11 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Shawn Emery |
2011-01-04
|
11 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Shawn Emery |
2010-12-21
|
11 | Amy Vezza | Last call sent |
2010-12-21
|
11 | Amy Vezza | State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: … State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (Extensible Markup Language Evidence Record Syntax) to Proposed Standard The IESG has received a request from the Long-Term Archive and Notary Services WG (ltans) to consider the following document: - 'Extensible Markup Language Evidence Record Syntax' as a Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2011-01-11 (note extension by one week to provide ample review time). Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-ltans-xmlers/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-ltans-xmlers/ |
2010-12-21
|
11 | Tim Polk | Last Call was requested |
2010-12-21
|
11 | Tim Polk | State changed to Last Call Requested from Publication Requested. |
2010-12-21
|
11 | Tim Polk | Last Call text changed |
2010-12-21
|
11 | (System) | Ballot writeup text was added |
2010-12-21
|
11 | (System) | Last call text was added |
2010-12-21
|
11 | (System) | Ballot approval text was added |
2010-10-14
|
11 | Tim Polk | (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the … (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Carl Wallace (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? Yes. The document has received slight but sufficient review. It specifies an XML equivalent of ERS (RFC4998). (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization, or XML? No. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. No. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Within the LTANS context, the support is sufficiently solid. The draft has been before the working group for years. There were some late objections related to bundling DSSC policies in the structure, but this is not done in ERS and there's been no compelling reason given for doing so here. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/.) Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type, and URI type reviews? If the document does not already indicate its intended status at the top of the first page, please indicate the intended status here. The IDNITS output was inspected. There were no warnings of concern. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. Yes, the references have been split. No, there are no normative references to documents that are not ready for advancement. There are no downward references. (1.i) Has the Document Shepherd verified that the document's IANA Considerations section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC2434]. If the document describes an Expert Review process, has the Document Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during IESG Evaluation? There is an IANA section that is consistent with discussion held during the last working group meeting. The AD can decide which method is best for IANA registration. The draft proposes "RFC Required" but "Expert Review" is probably fine too. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? The authors provided output from an XML schema checking tool and the results were reviewed by the document shepherd. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary In many scenarios, users must be able to demonstrate the (time of) existence, integrity and validity of data including signed data for long or undetermined periods of time. This document specifies XML syntax and processing rules for creating evidence for long-term non-repudiation of existence of data. ERS-XML incorporates alternative syntax and processing rules to ASN.1 ERS syntax by using XML language. Working Group Summary The WG process was uneventful. The document is an XML equivalent of ERS [RFC4998]. Author's Note: some of the authors of the document are not native English speakers. There was review and correction of language/grammar and the AD suggested at the last WG meeting (in Maastricht) that it is ok to submit the draft for IETF LC and leverage the superior professional editing skills of the RFC editor for final language adjustments if necessary. Document Quality There are a few existing implementations of the protocol. The specification may pick-up further implementations after its release as RFC (i.e. when implementers can rely on it being stable). Personnel Document Shepherd: Carl Wallace Responsible AD: Tim Polk |
2010-10-14
|
11 | Tim Polk | Draft added in state Publication Requested by Tim Polk |
2010-10-14
|
11 | Tim Polk | [Note]: 'Carl Wallace is the document sheperd' added by Tim Polk |
2010-09-20
|
08 | (System) | New version available: draft-ietf-ltans-xmlers-08.txt |
2010-08-23
|
07 | (System) | New version available: draft-ietf-ltans-xmlers-07.txt |
2010-06-01
|
06 | (System) | New version available: draft-ietf-ltans-xmlers-06.txt |
2010-05-10
|
05 | (System) | New version available: draft-ietf-ltans-xmlers-05.txt |
2009-08-04
|
04 | (System) | New version available: draft-ietf-ltans-xmlers-04.txt |
2009-01-26
|
03 | (System) | New version available: draft-ietf-ltans-xmlers-03.txt |
2008-06-06
|
02 | (System) | New version available: draft-ietf-ltans-xmlers-02.txt |
2007-12-04
|
01 | (System) | New version available: draft-ietf-ltans-xmlers-01.txt |
2007-02-26
|
00 | (System) | New version available: draft-ietf-ltans-xmlers-00.txt |