The Incident Object Description Exchange Format Version 2
draft-ietf-mile-rfc5070-bis-26
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2016-11-17
|
26 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2016-11-06
|
26 | Takeshi Takahashi | Added to session: IETF-97: mile Fri-1150 |
2016-10-20
|
26 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2016-10-06
|
26 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2016-10-06
|
26 | (System) | RFC Editor state changed to RFC-EDITOR from IANA |
2016-10-05
|
26 | (System) | IANA Action state changed to Waiting on RFC Editor from On Hold |
2016-10-05
|
26 | (System) | IANA Action state changed to On Hold from Waiting on Authors |
2016-10-05
|
26 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-26.txt |
2016-10-05
|
26 | (System) | New version approved |
2016-10-05
|
25 | (System) | Request for posting confirmation emailed to previous authors: "Roman Danyliw" |
2016-10-05
|
25 | Roman Danyliw | Uploaded new revision |
2016-09-02
|
25 | (System) | RFC Editor state changed to IANA from EDIT |
2016-08-22
|
25 | (System) | IANA Action state changed to Waiting on Authors from On Hold |
2016-08-22
|
25 | (System) | IANA Action state changed to On Hold from In Progress |
2016-08-22
|
25 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2016-08-16
|
25 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2016-08-08
|
25 | (System) | IANA Action state changed to In Progress |
2016-08-03
|
25 | (System) | RFC Editor state changed to EDIT |
2016-08-03
|
25 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2016-08-03
|
25 | (System) | Announcement was received by RFC Editor |
2016-08-03
|
25 | Amy Vezza | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2016-08-03
|
25 | Amy Vezza | IESG has approved the document |
2016-08-03
|
25 | Amy Vezza | Closed "Approve" ballot |
2016-08-03
|
25 | Amy Vezza | Ballot approval text was generated |
2016-08-03
|
25 | Kathleen Moriarty | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2016-07-20
|
25 | Takeshi Takahashi | Added to session: IETF-96: mile Thu-1000 |
2016-07-08
|
25 | Pete Resnick | Assignment of request for Last Call review by GENART to Pete Resnick was rejected |
2016-07-07
|
25 | Alissa Cooper | [Ballot comment] Thank you for addressing my DISCUSS and COMMENT. |
2016-07-07
|
25 | Alissa Cooper | [Ballot Position Update] Position for Alissa Cooper has been changed to No Objection from Discuss |
2016-07-07
|
25 | Stephen Farrell | [Ballot comment] Thanks for handling my discuss. - comments below were on -22, I didn't check if they'd been addressed or not. (Happy to chat … [Ballot comment] Thanks for handling my discuss. - comments below were on -22, I didn't check if they'd been addressed or not. (Happy to chat more if that's useful) - My review is based on [1] [1] https://tools.ietf.org/rfcdiff?url1=rfc5070&url2=draft-ietf-mile-rfc5070-bis-22 - "cyber" galore - yuk! Which of the fourteen (14!) uses of that ill-defined marketing term are useful or even well defined? RFC5070 had zero uses of such terms. Why is it a good plan for us to damage the RFC series via the use of such marketing nonsense? Someone may answer that this is accepted in industry these days, and that is true, but is nonetheless not a good enough reason for us to assist with the promulgation of anti-scientific non-concepts. My suggestion is to try s/cyber//g and then to see what if anything is less clear - perhaps we'll find that things are more clear. (And yes, it's a bit of a bugbear of mine:-) The use of "cyber indicator" instead of just "indicator" in 3.19 is a good example of how that phrase makes the spec less clear. - 2.5.1, does base64 need a reference and aren't there multiple variants (url-encoded, etc, sorry for being vague - I have to look that stuff up afresh every time I need to write code to handle it;-) - 2.8: So you don't like leap-seconds? It's often good to be clear if that bit of ABNF is expected to be enforced along with schema validation or not. - 2.12: What about EAI? - 3.13.1 - is CoA expanded somewhere? (See, I just looked at the diff:-) - 3.18.1 - I think it'd be good to refer to the RFC for wriing down IPv6 addresses and prefixes. I forget it's number though:-) And who uses ipv6-net-mask? Don't we all use prefixes? - 3.21 - the hash and signature data are underspecified. You could mean any of pgp, smime or dkim. Or you could mean this is just a crypto binary value and you don't care about semantics, just pattern matching. - 4.3 - I also think that recommending schema validation of input documents is a bad plan. (Even if that was already in 5070.) - section 9: defining how to format privacy sensitive data means that this spec absolutely does introduce privacy issues. - 9.1: you could not here the DoS and possible other attacks (e.g. spoofed .xsd files loaded over port 80) that follow on from on-line schema - 9.2: Have there been any cases of people using IODEF for bad reasons? I mean that e.g. sending info about attacks or phish emails is good. But using this format to send information about tracking an individual for marketing purposes would be bad. Has the latter occurred though? (Just wondering, I don't know.) validation. |
2016-07-07
|
25 | Stephen Farrell | [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss |
2016-06-24
|
25 | Alexey Melnikov | [Ballot Position Update] Position for Alexey Melnikov has been changed to Yes from Discuss |
2016-06-24
|
25 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-25.txt |
2016-06-23
|
24 | Stephen Farrell | [Ballot discuss] (1) 3.6: Does one confidence value apply to all of these? That seems wrong. And over-confidence is attributing threat actor identity is a … [Ballot discuss] (1) 3.6: Does one confidence value apply to all of these? That seems wrong. And over-confidence is attributing threat actor identity is a real issue with real consequences, hence the discuss to make sure we bottom out on this. I think it's just too error-prone to be ablve to associate one confidence value with two things about which one can have very different concreteness. Mixing up high confidence in a campaign with a lack of confidence in threat actor identification is precisely the kind of thing that goes wrong, or that could be deliberately manipulated (for eventual media/marketing reasons). (This overlaps with but isn't quite the same as Alissa's 2nd discuss point. In this case, I'm explicitly worried about the threat actor identity confidence, as that has possibly severe impacts, so the resolution here could differ from what results from Alissa's discuss.) (2) Cleared |
2016-06-23
|
24 | Stephen Farrell | [Ballot comment] - comments below were on -22, I didn't check if they'd been addressed or not. (Happy to chat more if that's useful) - … [Ballot comment] - comments below were on -22, I didn't check if they'd been addressed or not. (Happy to chat more if that's useful) - My review is based on [1] [1] https://tools.ietf.org/rfcdiff?url1=rfc5070&url2=draft-ietf-mile-rfc5070-bis-22 - "cyber" galore - yuk! Which of the fourteen (14!) uses of that ill-defined marketing term are useful or even well defined? RFC5070 had zero uses of such terms. Why is it a good plan for us to damage the RFC series via the use of such marketing nonsense? Someone may answer that this is accepted in industry these days, and that is true, but is nonetheless not a good enough reason for us to assist with the promulgation of anti-scientific non-concepts. My suggestion is to try s/cyber//g and then to see what if anything is less clear - perhaps we'll find that things are more clear. (And yes, it's a bit of a bugbear of mine:-) The use of "cyber indicator" instead of just "indicator" in 3.19 is a good example of how that phrase makes the spec less clear. - 2.5.1, does base64 need a reference and aren't there multiple variants (url-encoded, etc, sorry for being vague - I have to look that stuff up afresh every time I need to write code to handle it;-) - 2.8: So you don't like leap-seconds? It's often good to be clear if that bit of ABNF is expected to be enforced along with schema validation or not. - 2.12: What about EAI? - 3.13.1 - is CoA expanded somewhere? (See, I just looked at the diff:-) - 3.18.1 - I think it'd be good to refer to the RFC for wriing down IPv6 addresses and prefixes. I forget it's number though:-) And who uses ipv6-net-mask? Don't we all use prefixes? - 3.21 - the hash and signature data are underspecified. You could mean any of pgp, smime or dkim. Or you could mean this is just a crypto binary value and you don't care about semantics, just pattern matching. - 4.3 - I also think that recommending schema validation of input documents is a bad plan. (Even if that was already in 5070.) - section 9: defining how to format privacy sensitive data means that this spec absolutely does introduce privacy issues. - 9.1: you could not here the DoS and possible other attacks (e.g. spoofed .xsd files loaded over port 80) that follow on from on-line schema - 9.2: Have there been any cases of people using IODEF for bad reasons? I mean that e.g. sending info about attacks or phish emails is good. But using this format to send information about tracking an individual for marketing purposes would be bad. Has the latter occurred though? (Just wondering, I don't know.) validation. |
2016-06-23
|
24 | Stephen Farrell | Ballot comment and discuss text updated for Stephen Farrell |
2016-06-21
|
24 | Alexey Melnikov | [Ballot discuss] I will move to yes when the following issue is discussed. Robert Sparks' SecDir review reminded me: I am concerned by the requirement … [Ballot discuss] I will move to yes when the following issue is discussed. Robert Sparks' SecDir review reminded me: I am concerned by the requirement to automatically download updates from IANA. If many devices or software programs implement IODEF and start doing schema validation, this can cause DDoS attack on IANA infrastructure. I am still thinking whether the new text about automatic schema updates are reasonable. I will either clear or suggest some extra text in a few days. |
2016-06-21
|
24 | Alexey Melnikov | [Ballot comment] Thank you for addressing my comments. |
2016-06-21
|
24 | Alexey Melnikov | Ballot comment and discuss text updated for Alexey Melnikov |
2016-06-20
|
24 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-24.txt |
2016-06-20
|
23 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2016-06-20
|
23 | Roman Danyliw | IANA Review state changed to Version Changed - Review Needed from IANA - Not OK |
2016-06-20
|
23 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-23.txt |
2016-06-13
|
22 | Gunter Van de Velde | Closed request for Last Call review by OPSDIR with state 'No Response' |
2016-06-02
|
22 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Robert Sparks. |
2016-06-02
|
22 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from Waiting for AD Go-Ahead |
2016-06-02
|
22 | Joel Jaeggli | [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli |
2016-06-01
|
22 | Stephen Farrell | [Ballot discuss] (1) 3.6: Does one confidence value apply to all of these? That seems wrong. And over-confidence is attributing threat actor identity is a … [Ballot discuss] (1) 3.6: Does one confidence value apply to all of these? That seems wrong. And over-confidence is attributing threat actor identity is a real issue with real consequences, hence the discuss to make sure we bottom out on this. I think it's just too error-prone to be ablve to associate one confidence value with two things about which one can have very different concreteness. Mixing up high confidence in a campaign with a lack of confidence in threat actor identification is precisely the kind of thing that goes wrong, or that could be deliberately manipulated (for eventual media/marketing reasons). (This overlaps with but isn't quite the same as Alissa's 2nd discuss point. In this case, I'm explicitly worried about the threat actor identity confidence, as that has possibly severe impacts, so the resolution here could differ from what results from Alissa's discuss.) (2) 3.18.1 - you provide a way to specify e.g. an address and netmask, or v6 prefix. But you don't specify any way to say that some of the address (or prefix) bits are not real or are additionally masked for privacy reasons. E.g. If everyone in 2001:1:1:beef::/64 is misbehaving, but I don't (yet) want to specify the exact prefix, I might want to say " some 2001:1:1:xxxx::/64" is misbehaving, meaning one /64 in 2001:1:1::/48 is being bad and not the entire /48. Why is support for that not required? (IPFIX does have that as an option, and it's been added to CDNI too.) Same idea can apply to other address forms too. |
2016-06-01
|
22 | Stephen Farrell | [Ballot comment] - My review is based on [1] [1] https://tools.ietf.org/rfcdiff?url1=rfc5070&url2=draft-ietf-mile-rfc5070-bis-22 - "cyber" galore - yuk! Which of the fourteen (14!) uses of that ill-defined … [Ballot comment] - My review is based on [1] [1] https://tools.ietf.org/rfcdiff?url1=rfc5070&url2=draft-ietf-mile-rfc5070-bis-22 - "cyber" galore - yuk! Which of the fourteen (14!) uses of that ill-defined marketing term are useful or even well defined? RFC5070 had zero uses of such terms. Why is it a good plan for us to damage the RFC series via the use of such marketing nonsense? Someone may answer that this is accepted in industry these days, and that is true, but is nonetheless not a good enough reason for us to assist with the promulgation of anti-scientific non-concepts. My suggestion is to try s/cyber//g and then to see what if anything is less clear - perhaps we'll find that things are more clear. (And yes, it's a bit of a bugbear of mine:-) The use of "cyber indicator" instead of just "indicator" in 3.19 is a good example of how that phrase makes the spec less clear. - 2.5.1, does base64 need a reference and aren't there multiple variants (url-encoded, etc, sorry for being vague - I have to look that stuff up afresh every time I need to write code to handle it;-) - 2.8: So you don't like leap-seconds? It's often good to be clear if that bit of ABNF is expected to be enforced along with schema validation or not. - 2.12: What about EAI? - 3.13.1 - is CoA expanded somewhere? (See, I just looked at the diff:-) - 3.18.1 - I think it'd be good to refer to the RFC for wriing down IPv6 addresses and prefixes. I forget it's number though:-) And who uses ipv6-net-mask? Don't we all use prefixes? - 3.21 - the hash and signature data are underspecified. You could mean any of pgp, smime or dkim. Or you could mean this is just a crypto binary value and you don't care about semantics, just pattern matching. - 4.3 - I also think that recommending schema validation of input documents is a bad plan. (Even if that was already in 5070.) - section 9: defining how to format privacy sensitive data means that this spec absolutely does introduce privacy issues. - 9.1: you could not here the DoS and possible other attacks (e.g. spoofed .xsd files loaded over port 80) that follow on from on-line schema - 9.2: Have there been any cases of people using IODEF for bad reasons? I mean that e.g. sending info about attacks or phish emails is good. But using this format to send information about tracking an individual for marketing purposes would be bad. Has the latter occurred though? (Just wondering, I don't know.) validation. |
2016-06-01
|
22 | Stephen Farrell | [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell |
2016-06-01
|
22 | (System) | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
2016-06-01
|
22 | Sabrina Tanamal | (Via drafts-lastcall-comment@iana.org): |
2016-06-01
|
22 | Alia Atlas | [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas |
2016-06-01
|
22 | Ben Campbell | [Ballot comment] I concur with Alissa's and Alexey's discuss points. Additionally, I think the rest of the points in Robert Spark's secdir review[1] deserve responses. … [Ballot comment] I concur with Alissa's and Alexey's discuss points. Additionally, I think the rest of the points in Robert Spark's secdir review[1] deserve responses. The shepherd writeup mentions a desire for more XML review. Did that occur? (I note that it also says the XML had been mechanically verified.) [1] https://mailarchive.ietf.org/arch/msg/mile/0Io60Sdn--hRzQWN3Q0keCYIA1w |
2016-06-01
|
22 | Ben Campbell | [Ballot Position Update] New position, No Objection, has been recorded for Ben Campbell |
2016-06-01
|
22 | Alexey Melnikov | [Ballot discuss] I will move to yes when the following issue is discussed. Robert Sparks' SecDir review reminded me: I am concerned by the requirement … [Ballot discuss] I will move to yes when the following issue is discussed. Robert Sparks' SecDir review reminded me: I am concerned by the requirement to automatically download updates from IANA. If many devices or software programs implement IODEF and start doing schema validation, this can cause DDoS attack on IANA infrastructure. |
2016-06-01
|
22 | Alexey Melnikov | [Ballot Position Update] Position for Alexey Melnikov has been changed to Discuss from Yes |
2016-06-01
|
22 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
2016-05-31
|
22 | Suresh Krishnan | [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan |
2016-05-31
|
22 | Terry Manderson | [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson |
2016-05-31
|
22 | Alissa Cooper | [Ballot discuss] The Confidence class as defined in 3.12.5 seems underspecified. It does not specify a max value, so some implementations might use 1 as … [Ballot discuss] The Confidence class as defined in 3.12.5 seems underspecified. It does not specify a max value, so some implementations might use 1 as the max while others might use 100. It's also hard to understand how a single confidence value is supposed to be applied to elements with multiple fields, as in 3.12 and 3.29. What do I do if I have high confidence in my estimate of SystemImpact but low confidence in my estimate of MonetaryImpact? |
2016-05-31
|
22 | Alissa Cooper | [Ballot comment] (1) Section 1: It would be useful to define "cyber," "cyber indicator" (somewhere before 3.29), "cyber threat," and "cyber event." I chuckled when … [Ballot comment] (1) Section 1: It would be useful to define "cyber," "cyber indicator" (somewhere before 3.29), "cyber threat," and "cyber event." I chuckled when I wrote that, but I'm serious. The term "cyber" did not appear in RFC 5070. It has clearly taken on some (mythical, perhaps) meaning in venues external to the IETF. I think if this document is going to use the term, it needs to explain what it means. If there are some external definitions to point to or adopt, that would be fine. (2) Section 3.19.2: If I want to list the admin contact for a particular domain in a Contact element within a DomainContacts element, do I set the role in the Contact to "admin" or to "zone"? I think this is not entirely clear from how the roles are specified in 3.9 since most of the roles are more generic than "zone." |
2016-05-31
|
22 | Alissa Cooper | [Ballot Position Update] New position, Discuss, has been recorded for Alissa Cooper |
2016-05-31
|
22 | Alvaro Retana | [Ballot comment] I am out of my depth here… I noticed that rfc6685 Updated rfc5070, which this document Obsoletes. rfc6685 just "specifies additional expert … [Ballot comment] I am out of my depth here… I noticed that rfc6685 Updated rfc5070, which this document Obsoletes. rfc6685 just "specifies additional expert reviews for IODEF extensions". But a similar consideration was not included in the bis. Is it not needed? Should this document also Obsolete rfc6685? |
2016-05-31
|
22 | Alvaro Retana | Ballot comment text updated for Alvaro Retana |
2016-05-31
|
22 | Alvaro Retana | [Ballot comment] I am out of my depth here… I noticed that rfc6685 Updated rfc5070, which this document Obsoletes. rfc6685 just "specifies additional expert … [Ballot comment] I am out of my depth here… I noticed that rfc6685 Updated rfc5070, which this document Obsoletes. rfc6685 just "specifies additional expert reviews for IODEF extensions". But a similar consideration was not included in the bis. Is it not needed? Should this document also Obsolete rfc6685? |
2016-05-31
|
22 | Alvaro Retana | [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana |
2016-05-31
|
22 | Benoît Claise | [Ballot comment] From a quick assessment of this bis document, I believe there are no OPS aspects to look at. |
2016-05-31
|
22 | Benoît Claise | [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise |
2016-05-30
|
22 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2016-05-30
|
22 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2016-05-30
|
22 | Mirja Kühlewind | [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind |
2016-05-28
|
22 | Alexey Melnikov | |
2016-05-28
|
22 | Alexey Melnikov | [Ballot Position Update] New position, Yes, has been recorded for Alexey Melnikov |
2016-05-27
|
22 | Kathleen Moriarty | Ballot has been issued |
2016-05-27
|
22 | Kathleen Moriarty | [Ballot Position Update] New position, Yes, has been recorded for Kathleen Moriarty |
2016-05-27
|
22 | Kathleen Moriarty | Created "Approve" ballot |
2016-05-26
|
22 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-22.txt |
2016-05-25
|
21 | Kathleen Moriarty | Ballot writeup was changed |
2016-05-25
|
21 | Kathleen Moriarty | Ballot writeup was changed |
2016-05-23
|
21 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Victor Kuarsingh |
2016-05-23
|
21 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Victor Kuarsingh |
2016-05-23
|
21 | Gunter Van de Velde | Closed request for Last Call review by OPSDIR with state 'Withdrawn' |
2016-05-23
|
21 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Tina Tsou |
2016-05-23
|
21 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Tina Tsou |
2016-05-19
|
21 | Jean Mahoney | Request for Last Call review by GENART is assigned to Pete Resnick |
2016-05-19
|
21 | Jean Mahoney | Request for Last Call review by GENART is assigned to Pete Resnick |
2016-05-19
|
21 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Robert Sparks |
2016-05-19
|
21 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Robert Sparks |
2016-05-18
|
21 | Amy Vezza | The following Last Call announcement was sent out: From: The IESG To: "IETF-Announce" CC: rdd@cert.org, mile-chairs@tools.ietf.org, takeshi_takahashi@nict.go.jp, Kathleen.Moriarty.ietf@gmail.com, mile-chairs@ietf.org, mile@ietf.org … The following Last Call announcement was sent out: From: The IESG To: "IETF-Announce" CC: rdd@cert.org, mile-chairs@tools.ietf.org, takeshi_takahashi@nict.go.jp, Kathleen.Moriarty.ietf@gmail.com, mile-chairs@ietf.org, mile@ietf.org, draft-ietf-mile-rfc5070-bis@ietf.org Reply-To: ietf@ietf.org Sender: Subject: Last Call: (The Incident Object Description Exchange Format v2) to Proposed Standard The IESG has received a request from the Managed Incident Lightweight Exchange WG (mile) to consider the following document: - 'The Incident Object Description Exchange Format v2' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2016-06-01. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract The Incident Object Description Exchange Format (IODEF) defines a data representation for security incident reports and cyber indicators commonly exchanged by operational security teams for mitigation and watch and warning. This document describes an updated information model for the IODEF and provides an associated data model specified with XML Schema. This new information and data model obsoletes Request for Comment (RFC) 5070, "The Incident Object Description Exchange Format". The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-mile-rfc5070-bis/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-mile-rfc5070-bis/ballot/ No IPR declarations have been submitted directly on this I-D. |
2016-05-18
|
21 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2016-05-18
|
21 | Kathleen Moriarty | Last call was requested |
2016-05-18
|
21 | Kathleen Moriarty | Ballot approval text was generated |
2016-05-18
|
21 | Kathleen Moriarty | Ballot writeup was generated |
2016-05-18
|
21 | Kathleen Moriarty | IESG state changed to Last Call Requested from IESG Evaluation |
2016-05-18
|
21 | Kathleen Moriarty | Last call announcement was generated |
2016-05-18
|
21 | Kathleen Moriarty | IESG state changed to IESG Evaluation from AD is watching |
2016-05-18
|
21 | Kathleen Moriarty | Placed on agenda for telechat - 2016-06-02 |
2016-05-10
|
21 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-21.txt |
2016-05-09
|
20 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-20.txt |
2016-04-26
|
19 | Kathleen Moriarty | Notification list changed to rdd@cert.org, mile-chairs@tools.ietf.org, mile@ietf.org from "Takeshi Takahashi" <takeshi_takahashi@nict.go.jp> |
2016-04-26
|
19 | Kathleen Moriarty | Changed consensus to Yes from Unknown |
2016-04-26
|
19 | Kathleen Moriarty | IESG state changed to AD is watching from Publication Requested |
2016-04-21
|
19 | Takeshi Takahashi | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic) Why is this the proper type of RFC Is this type of RFC indicated in the title page header Standards Track RFC is requested, and this is indicated in the title page header. IODEF is defined in 2007 as a standard track RFC in RFC 5070, and this document is an important update that relects the needed changes in present days. Moreover, this document works as the core of the MILE techniques studied in the MILE WG, and many other works are based on IODEF. Therefore, the WG believes this document should be a standards track RFC. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the Action announcements for approved documents. The approval announcement contains the following sections Technical Summary The Incident Object Description Exchange Format (IODEF) defines a data representation for security incident reports and cyber indicators commonly exchanged by operational security teams for mitigation and watch and warning. This document describes an updated information model for the IODEF and provides an associated data model specified with XML Schema. This new information and data model obsoletes [RFC5070] Working Group Summary This document updates IODEF version 1, and it is not backward compatible. The document can describe wider range of information regarding incident and its hints than previous version, while it still allows users to describe information in a simple manner. The document received extensive review from the WG, which refined the output of the document. The discussion was structured and managed using the issue tracker. Document Quality Regarding the implementation, we already have a running implementation, i.e., EMC/RSA RID agent, which is described in draft-ietf-mile-implementreport-06 draft. More over, several organizations are willing to impelement a tool compatible with this IODEF-bis draft. Regarding the document: the acknowledgment section of this draft is appropriately made to acknowledge the contributions during the review phase. Personnel Takeshi Takahashi is the Document Shepherd and Kathleen Moriarty is the Responsible Area Director (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. I believe this document is ready for publication. The initial version of this draft was proposed on May 5, 2013. 54 issues are discussed, and these are managed and summarized at the issue tracker. Each of the issuue were closed based on discussion in the WG. Please see the issue tracker on how each issue was discussed. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed No. I believe 3 years of review using the issue tracker are good enough. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization If so, describe the review that took place. The document has been already reviewed by experts from different areas, but it would be always nice to have more eyes on this. Especially, reviews from XML and application area experts are welcomed. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director andor the IESG should be aware of For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. The issues have been thoroughly discussed as we can see in the issue tracker. Only the note is the backward incompatibility issue. The WG (including I myself) thinks that it is not an issue, but it could worth mentioning. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes, the author has declared that "all IPR disclosures have been made." (8) Has an IPR disclosure been filed that references this document If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No. (9) How solid is the WG consensus behind this document Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it During three year discussion of this draft, ideas were discussed in the WG in a constructive manner. The MILE WG is rather small, and that helped the WG as a whole to understand and agree with it. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. The editor provided revised version(https://www.ietf.org/id/draft-ietf-mile-rfc5070-bis-19.txt) in order to cope with idnits warnings. This version still contains minor nits, but the editors will reflect them when coping with IESG comments or RFC-editor. In the abstract, Current: [RFC 5070] -> New: RFC 5070 In Section 3.29.6 Current: Invalid algebraic expressions while valid XML, MUST not be specified. -> New: Invalid algebraic expressions while valid XML, MUST NOT be specified. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. This document does not have any issue that require any external formal review, such as MIB Doctor, media type, and URI type reviews. (13) Have all references within this document been identified as either normative or informative This document has 23 normative references and 9 informative references. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state If such normative references exist, what is the plan for their completion Such normative reference does not exist in this document. (15) Are there downward normative references references (see RFC 3967) If so, list these downward references to support the Area Director in the Last Call procedure. This document refers to an information RFC, i.e., RFC 2781 titled "UTF-16, an encoding of ISO 10646." I believe this downward normative reference is within the scope of the allowed exceptions described in Section 2 of RFC 3967. (16) Will publication of this document change the status of any existing RFCs Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. This document supersedes the RFC 5070. This is described properly in the abstract and Section 1.3. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). These registries should be mentioned in Section 10.2 "PostalAddress-type" "TimeImpact-metric" These registries should be mentioned prior to Section 10.2 "TimeImpact-metrics" (I guess it is just a typo. It should be "TimeImpact-metric" "Confidence-rating" (Please review the sentences in Section 3.12.5, or get rid of this registry.) (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. The review requires certain level of knowledge on incident response operations. Therefore, CSIRT-related people are desirable to be delegated as the IANA Experts. In addition, participants to MILE, SACM, DOTS are also knowledgeable enough to be able to conduct the review. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. The examples and schema of IODEF version 2, which are mentioned in the document, are checked using XML validators (i.e., MSV and XMLspy). |
2016-04-21
|
19 | Takeshi Takahashi | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic) Why is this the proper type of RFC Is this type of RFC indicated in the title page header Standards Track RFC is requested, and this is indicated in the title page header. IODEF is defined in 2007 as a standard track RFC in RFC 5070, and this document is an important update that relects the needed changes in present days. Moreover, this document works as the core of the MILE techniques studied in the MILE WG, and many other works are based on IODEF. Therefore, the WG believes this document should be a standards track RFC. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the Action announcements for approved documents. The approval announcement contains the following sections Technical Summary The Incident Object Description Exchange Format (IODEF) defines a data representation for security incident reports and cyber indicators commonly exchanged by operational security teams for mitigation and watch and warning. This document describes an updated information model for the IODEF and provides an associated data model specified with XML Schema. This new information and data model obsoletes [RFC5070] Working Group Summary This document updates IODEF version 1, and it is not backward compatible. The document can describe wider range of information regarding incident and its hints than previous version, while it still allows users to describe information in a simple manner. The document received extensive review from the WG, which refined the output of the document. The discussion was structured and managed using the issue tracker. Document Quality Regarding the implementation, we already have a running implementation, i.e., EMC/RSA RID agent, which is described in draft-ietf-mile-implementreport-06 draft. More over, several organizations are willing to impelement a tool compatible with this IODEF-bis draft. Regarding the document: the acknowledgment section of this draft is appropriately made to acknowledge the contributions during the review phase. Personnel Takeshi Takahashi is the Document Shepherd and Kathleen Moriarty is the Responsible Area Director (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. I believe this document is ready for publication. The initial version of this draft was proposed on May 5, 2013. 54 issues are discussed, and these are managed and summarized at the issue tracker. Each of the issuue were closed based on discussion in the WG. Please see the issue tracker on how each issue was discussed. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed No. I believe 3 years of review using the issue tracker are good enough. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization If so, describe the review that took place. The document has been already reviewed by experts from different areas, but it would be always nice to have more eyes on this. Especially, reviews from XML and application area experts are welcomed. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director andor the IESG should be aware of For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. The issues have been thoroughly discussed as we can see in the issue tracker. Only the note is the backward incompatibility issue. The WG (including I myself) thinks that it is not an issue, but it could worth mentioning. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Yes, the author has declared that "all IPR disclosures have been made." (8) Has an IPR disclosure been filed that references this document If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No. (9) How solid is the WG consensus behind this document Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it During three year discussion of this draft, ideas were discussed in the WG in a constructive manner. The MILE WG is rather small, and that helped the WG as a whole to understand and agree with it. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. The editor provided revised version(https://www.ietf.org/id/draft-ietf-mile-rfc5070-bis-19.txt) in order to cope with idnits warnings. This version still contains minor nits, but the editors will reflect them when coping with IESG comments or RFC-editor. In the abstract, Current: [RFC 5070] -> New: RFC 5070 In Section 3.29.6 Current: Invalid algebraic expressions while valid XML, MUST not be specified. -> New: Invalid algebraic expressions while valid XML, MUST NOT be specified. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. This document does not have any issue that require any external formal review, such as MIB Doctor, media type, and URI type reviews. (13) Have all references within this document been identified as either normative or informative This document has 23 normative references and 9 informative references. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state If such normative references exist, what is the plan for their completion Such normative reference does not exist in this document. (15) Are there downward normative references references (see RFC 3967) If so, list these downward references to support the Area Director in the Last Call procedure. This document refers to an information RFC, i.e., RFC 2781 titled "UTF-16, an encoding of ISO 10646." I believe this downward normative reference is within the scope of the allowed exceptions described in Section 2 of RFC 3967. (16) Will publication of this document change the status of any existing RFCs Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. This document supersedes the RFC 5070. This is described properly in the abstract and Section 1.3. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). IANA consideration section is already consistent with the body of the document. In order to avoid any inconsistency, the IANA consideration section just lists pointers to the related sections of the document. These registries should be mentioned in Section 10.2 "PostalAddress-type" "TimeImpact-metric" These registries should be mentioned prior to Section 10.2 "TimeImpact-metrics" (I guess it is just a typo. It should be "TimeImpact-metric" "Confidence-rating" (Please review the sentences in Section 3.12.5, or get rid of this registry.) (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. The review requires certain level of knowledge on incident response operations. Therefore, CSIRT-related people are desirable to be delegated as the IANA Experts. In addition, participants to MILE, SACM, DOTS are also knowledgeable enough to be able to conduct the review. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. The examples and schema of IODEF version 2, which are mentioned in the document, are checked using XML validators (i.e., MSV and XMLspy). |
2016-04-21
|
19 | Takeshi Takahashi | Responsible AD changed to Kathleen Moriarty |
2016-04-21
|
19 | Takeshi Takahashi | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2016-04-21
|
19 | Takeshi Takahashi | IESG state changed to Publication Requested |
2016-04-21
|
19 | Takeshi Takahashi | IESG process started in state Publication Requested |
2016-04-21
|
19 | Takeshi Takahashi | Changed document writeup |
2016-04-21
|
19 | Takeshi Takahashi | Notification list changed to "Takeshi Takahashi" <takeshi_takahashi@nict.go.jp> |
2016-04-21
|
19 | Takeshi Takahashi | Document shepherd changed to Takeshi Takahashi |
2016-04-21
|
19 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-19.txt |
2016-03-21
|
18 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-18.txt |
2016-03-20
|
17 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-17.txt |
2016-03-11
|
16 | Takeshi Takahashi | IETF WG state changed to WG Consensus: Waiting for Write-Up from WG Document |
2016-02-01
|
16 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-16.txt |
2015-10-16
|
15 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-15.txt |
2015-07-20
|
14 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-14.txt |
2015-06-20
|
13 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-13.txt |
2015-06-18
|
12 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-12.txt |
2015-03-23
|
11 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-11.txt |
2014-11-09
|
10 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-10.txt |
2014-10-26
|
09 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-09.txt |
2014-08-05
|
08 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-08.txt |
2014-07-23
|
07 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-07.txt |
2014-05-29
|
06 | Takeshi Takahashi | Intended Status changed to Proposed Standard from None |
2014-02-13
|
06 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-06.txt |
2014-01-31
|
05 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-05.txt |
2014-01-17
|
04 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-04.txt |
2014-01-07
|
03 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-03.txt |
2013-10-19
|
02 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-02.txt |
2013-08-28
|
01 | Roman Danyliw | New version available: draft-ietf-mile-rfc5070-bis-01.txt |
2013-05-05
|
00 | Paul Stoecker | New version available: draft-ietf-mile-rfc5070-bis-00.txt |