Skip to main content

Updates to the TLS Transport Model for SNMP
draft-ietf-opsawg-tlstm-update-15

Revision differences

Document history

Date Rev. By Action
2024-01-26
15 Gunter Van de Velde Request closed, assignment withdrawn: Niclas Comstedt Last Call OPSDIR review
2024-01-26
15 Gunter Van de Velde Closed request for Last Call review by OPSDIR with state 'Overtaken by Events': Cleaning up stale OPSDIR queue
2023-10-30
15 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2023-08-18
15 (System) RFC Editor state changed to AUTH48
2023-06-19
15 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2023-05-08
15 Kenneth Vaughn New version available: draft-ietf-opsawg-tlstm-update-15.txt
2023-05-08
15 (System) New version approved
2023-05-08
15 (System) Request for posting confirmation emailed to previous authors: Kenneth Vaughn
2023-05-08
15 Kenneth Vaughn Uploaded new revision
2023-04-25
14 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2023-04-25
14 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2023-04-25
14 (System) IANA Action state changed to In Progress from Waiting on Authors
2023-04-21
14 (System) IANA Action state changed to Waiting on Authors from In Progress
2023-04-20
14 Tero Kivinen Closed request for Last Call review by SECDIR with state 'Overtaken by Events'
2023-04-20
14 Tero Kivinen Assignment of request for Last Call review by SECDIR to Tobias Gondrom was marked no-response
2023-04-17
14 (System) RFC Editor state changed to EDIT
2023-04-17
14 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2023-04-17
14 (System) Announcement was received by RFC Editor
2023-04-17
14 (System) IANA Action state changed to In Progress
2023-04-17
14 Cindy Morgan IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2023-04-17
14 Cindy Morgan IESG has approved the document
2023-04-17
14 Cindy Morgan Closed "Approve" ballot
2023-04-17
14 Cindy Morgan Ballot approval text was generated
2023-04-17
14 (System) Removed all action holders (IESG state changed)
2023-04-17
14 Robert Wilton IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2023-04-05
14 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2023-03-30
14 (System) Changed action holders to Robert Wilton (IESG state changed)
2023-03-30
14 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2023-03-30
14 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2023-03-30
14 Kenneth Vaughn New version available: draft-ietf-opsawg-tlstm-update-14.txt
2023-03-30
14 Kenneth Vaughn New version accepted (logged-in submitter: Kenneth Vaughn)
2023-03-30
14 Kenneth Vaughn Uploaded new revision
2023-03-07
13 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2023-03-02
13 Paul Wouters [Ballot comment]
Thanks for addressing my concerns
2023-03-02
13 Paul Wouters [Ballot Position Update] Position for Paul Wouters has been changed to Yes from Discuss
2023-03-02
13 (System) Changed action holders to Kenneth Vaughn, Robert Wilton (IESG state changed)
2023-03-02
13 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2023-03-02
13 Murray Kucherawy [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy
2023-03-02
13 (System) IANA Review state changed to Version Changed - Review Needed from IANA - Not OK
2023-03-02
13 Kenneth Vaughn New version available: draft-ietf-opsawg-tlstm-update-13.txt
2023-03-02
13 Kenneth Vaughn New version accepted (logged-in submitter: Kenneth Vaughn)
2023-03-02
13 Kenneth Vaughn Uploaded new revision
2023-03-02
12 Andrew Alston [Ballot Position Update] New position, No Objection, has been recorded for Andrew Alston
2023-03-01
12 Amanda Baber
IANA state will be changed back to "IANA OK" after the IANA Considerations has been updated to include a new "Description" field for the registry …
IANA state will be changed back to "IANA OK" after the IANA Considerations has been updated to include a new "Description" field for the registry to be created at https://www.iana.org/assignments/smi-numbers. This field is being discussed.
2023-03-01
12 Amanda Baber IANA Review state changed to IANA - Not OK from IANA OK - Actions Needed
2023-03-01
13 (System) IANA Review state changed to IANA - Not OK from Version Changed - Review Needed
2023-03-01
12 Paul Wouters
[Ballot discuss]
Thanks for this document update. I have a minor DISCUSS that should be easy to resolve, and some comments.

Should Section 2.3 or …
[Ballot discuss]
Thanks for this document update. I have a minor DISCUSS that should be easy to resolve, and some comments.

Should Section 2.3 or the Security Considerations not reference RFC 9325
"Recommendations for Secure Use of Transport Layer Security (TLS) and
Datagram Transport Layer Security (DTLS)" ? For one thing, it documents
that if one needs to still use TLS 1.2, what options should be used or avoided.
2023-03-01
12 Paul Wouters
[Ballot comment]
        REVISION    "202209090000Z"
        DESCRIPTION "This version of this MIB module is part of
    …
[Ballot comment]
        REVISION    "202209090000Z"
        DESCRIPTION "This version of this MIB module is part of
                RFC XXXX; see the RFC itself for full legal
                notices.  This version:


It will be easy to miss this "RFC XXXX" for the RFC Editor, can be make a clearer note
for the RFC editor to update that?

The REVISION is a date. Should that be updated to the publication date, or is it used
as a sort of early code point ?


        Historically, the 1-octet hashing algorithm identifier was
        based on the IANA TLS HashAlgorithm Registry (RFC 5246);
        however, this registry is only applicable to (D)TLS protocol
        versions prior to 1.3, which are now designated as obsolete
        and are not expected to ever support additional values.

I'm not sure "obsolete" is the right word?

Also, looking at:

https://www.iana.org/assignments/tls-parameters/tls-parameters.xhtml#tls-parameters-18
snmpTlstmCertCommonName OBJECT-IDENTITY

I don't see a note the registry is closed.

Perhaps weaken the claim to just "however, this registry is no longer in use for TLS 1.3
and above and are not expected to have any new registrations added to it."

        The policy for updates is Expert Review.

Why not specification required or RFC required?  (Or split the range, as Roman alluded to as well)
2023-03-01
12 Paul Wouters [Ballot Position Update] New position, Discuss, has been recorded for Paul Wouters
2023-03-01
12 Martin Duke [Ballot Position Update] New position, No Objection, has been recorded for Martin Duke
2023-03-01
12 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2023-03-01
12 Francesca Palombini
[Ballot comment]
Thank you for the work on this document.

I was going to have the same comment as Roman's first point. Additionally, and in …
[Ballot comment]
Thank you for the work on this document.

I was going to have the same comment as Roman's first point. Additionally, and in any case, it would be good in my opinion to expand the Expert Guidelines, as the only guideline right now is "consult the security area" (and even then, it's only encouraged).

For more input about what I think should be there, RFC 8126 says it best:
  The required documentation and review criteria, giving clear guidance
  to the designated expert, should be provided when defining the
  registry.  **It is particularly important to lay out what should be
  considered when performing an evaluation and reasons for rejecting a
  request.**  It is also a good idea to include, when possible, a sense
  of whether many registrations are expected over time, or if the
  registry is expected to be updated infrequently or in exceptional
  circumstances only.
2023-03-01
12 Francesca Palombini [Ballot Position Update] New position, No Objection, has been recorded for Francesca Palombini
2023-02-28
12 Zaheduzzaman Sarker
[Ballot comment]
Thanks for working on this specification. Special thanks for the shepherd's write-up, it was very helpful.

I was just wondering - as there …
[Ballot comment]
Thanks for working on this specification. Special thanks for the shepherd's write-up, it was very helpful.

I was just wondering - as there is an intended impact on the future here,

  "Renegotiation of sessions is not supported as it is not supported by TLS 1.3."

what is the intended implication on the application of future versions of TLS?
2023-02-28
12 Zaheduzzaman Sarker [Ballot Position Update] New position, No Objection, has been recorded for Zaheduzzaman Sarker
2023-02-28
12 John Scudder
[Ballot comment]
Thanks for this document. Thanks also to Joe Clarke for the detailed and helpful shepherd writeup.

I noticed one nit that I don’t …
[Ballot comment]
Thanks for this document. Thanks also to Joe Clarke for the detailed and helpful shepherd writeup.

I noticed one nit that I don’t think I’ve seen mentioned yet, “SMNPv3” -> “SNMPv3”.
2023-02-28
12 John Scudder Ballot comment text updated for John Scudder
2023-02-28
12 John Scudder
[Ballot comment]
Thanks for this document. Thanks also to Joe Clarke for the detailed and helpful shepherd right up.

I noticed one nit that I …
[Ballot comment]
Thanks for this document. Thanks also to Joe Clarke for the detailed and helpful shepherd right up.

I noticed one nit that I don’t think I’ve seen mentioned yet, “SMNPv3” -> “SNMPv3”.
2023-02-28
12 John Scudder [Ballot Position Update] New position, No Objection, has been recorded for John Scudder
2023-02-28
12 Roman Danyliw
[Ballot comment]
** Section 6. Per the new IANA registry:

-- Is the WG sure that expert review for the entire registry is sufficient?  I’ll …
[Ballot comment]
** Section 6. Per the new IANA registry:

-- Is the WG sure that expert review for the entire registry is sufficient?  I’ll point out that the “TLS HashAlgorithm” from which it forked defines ranges for code points (to include standards track … expert review). 

-- I applaud the design of this registry incorporating the notion of “Recommended”.  Based on the TLS experience of using that flag, specifically Section 5 of RFC8447, does stronger guidance need to be added on the threshold for getting a “Y” and the semantics of “N”.  In RFC8847, “Recommended=Y” requires a standards track; and “Recommended=N” allows for the possibility that the proposed algorithm is not “flawed”, simply that it hasn’t been reviewed by the IETF.
2023-02-28
12 Roman Danyliw [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw
2023-02-28
12 Éric Vyncke
[Ballot comment]

# Éric Vyncke, INT AD, comments for draft-ietf-opsawg-tlstm-update-12
CC @evyncke

Thank you for the work put into this document.

Please find below some …
[Ballot comment]

# Éric Vyncke, INT AD, comments for draft-ietf-opsawg-tlstm-update-12
CC @evyncke

Thank you for the work put into this document.

Please find below some non-blocking COMMENT points.

Special thanks to Joe Clarke for the shepherd's detailed write-up including the WG consensus **and** the justification of the intended status.

I hope that this review helps to improve the document,

Regards,

-éric

## COMMENTS

### MIB Doctor review

Like Lars, I wonder whether there was a MIB doctor review.

### Section 3.1

This text is repeated, is it on purpose ?
```
The reason 0-RTT is disallowed is that there are no "safe" messages that if replayed will be guaranteed to cause no harm at a server side: all incoming notification or command responses are meant to be acted upon only once. See Security considerations section for further details
```

## Notes

This review is in the ["IETF Comments" Markdown format][ICMF], You can use the
[`ietf-comments` tool][ICT] to automatically convert this review into
individual GitHub issues.

[ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
[ICT]: https://github.com/mnot/ietf-comments
2023-02-28
12 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2023-02-28
12 Lars Eggert
[Ballot comment]
# GEN AD review of draft-ietf-opsawg-tlstm-update-12

CC @larseggert

Thanks to Joel Halpern for the General Area Review Team (Gen-ART) review
(https://mailarchive.ietf.org/arch/msg/gen-art/VI00LPj0gVfsGW_qOfw9JlGAJdE). …
[Ballot comment]
# GEN AD review of draft-ietf-opsawg-tlstm-update-12

CC @larseggert

Thanks to Joel Halpern for the General Area Review Team (Gen-ART) review
(https://mailarchive.ietf.org/arch/msg/gen-art/VI00LPj0gVfsGW_qOfw9JlGAJdE).

## Comments

### Paragraph 2
```
                Updates to the TLS Transport Model for SNMP
                    draft-ietf-opsawg-tlstm-update-12
```
Was there a mibdoctors review of this I-D? Should there be?

### Section 1, paragraph 1
```
    This document updates and clarifies how the rules of [RFC6353] apply
    when using Transport Layer Security (TLS) or Datagram Transport Layer
    Security (DTLS) versions later than 1.2.  This document jointly
    refers to these two protocols as "(D)TLS".  The update also
    incorporates the [RFC8996] update, which prohibits the use of TLS
    versions prior to TLS 1.2.
```
Should this document then not also obsolete RFC8996?

### Missing references

No reference entries found for these items, which were mentioned in the text:
`[RFC3413]`, `[RFC2579]`, `[RFC3411]`, `[RFC2578]`, and `[RFC2580]`.

### Uncited references

Document updates `RFC6353`, but does not cite it as a reference, which is a bit
odd.

## Nits

All comments below are about very minor potential issues that you may choose to
address in some way - or ignore - as you see fit. Some were flagged by
automated tools (via https://github.com/larseggert/ietf-reviewtool), so there
will likely be some false positives. There is no need to let me know what you
did with these suggestions.

### Outdated references

Reference `[RFC5953]` to `RFC5953`, which was obsoleted by `RFC6353` (this may
be on purpose).

Reference `[RFC5246]` to `RFC5246`, which was obsoleted by `RFC8446` (this may
be on purpose).

### Grammar/style

#### Section 4, paragraph 28
```
s not specify converting to lowercase so this involves an extra step). This
                                    ^^^
```
Use a comma before "so" if it connects two independent clauses (unless they are
closely connected and short).

#### Section 4, paragraph 90
```
nd this hash value MUST match exactly or the connection MUST NOT be establis
                                    ^^^
```
Use a comma before "or" if it connects two independent clauses (unless they are
closely connected and short).

## Notes

This review is in the ["IETF Comments" Markdown format][ICMF], You can use the
[`ietf-comments` tool][ICT] to automatically convert this review into
individual GitHub issues. Review generated by the [`ietf-reviewtool`][IRT].

[ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
[ICT]: https://github.com/mnot/ietf-comments
[IRT]: https://github.com/larseggert/ietf-reviewtool
2023-02-28
12 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded for Lars Eggert
2023-02-27
12 Robert Wilton Telechat date has been changed to 2023-03-02 from 2023-03-16
2023-02-25
12 Erik Kline [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline
2023-02-24
12 Cindy Morgan Placed on agenda for telechat - 2023-03-16
2023-02-24
12 Robert Wilton Ballot has been issued
2023-02-24
12 Robert Wilton [Ballot Position Update] New position, Yes, has been recorded for Robert Wilton
2023-02-24
12 Robert Wilton Created "Approve" ballot
2023-02-24
12 Robert Wilton IESG state changed to IESG Evaluation from Waiting for Writeup
2023-02-23
12 Robert Wilton Ballot writeup was changed
2023-02-20
12 (System) IESG state changed to Waiting for Writeup from In Last Call
2023-02-18
12 Di Ma Request for Last Call review by DNSDIR Completed: Ready. Reviewer: Di Ma.
2023-02-18
12 Di Ma Request for Last Call review by DNSDIR Completed: Ready. Reviewer: Di Ma. Sent review to list. Submission of review completed at an earlier date.
2023-02-15
12 (System) IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed
2023-02-15
12 David Dong
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-opsawg-tlstm-update-12. If any part of this review is inaccurate, please let …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has completed its review of draft-ietf-opsawg-tlstm-update-12. If any part of this review is inaccurate, please let us know.

The IANA Functions Operator has a question about one of the actions requested in the IANA Considerations section of this document.

The IANA Functions Operator understands that, upon approval of this document, there is a single action which we must complete.

A new registry is to be created called the SNMP-TLSTM HashAlgorithm registry. The new registry will be located on the Structure of Management Information (SMI) Numbers (MIB Module Registrations) registry page located at:

https://www.iana.org/assignments/smi-numbers/

IANA Question --> It is not completely clear where this registry should be located on the Structure of Management Information (SMI) Numbers (MIB Module Registrations) registry page. Could the authors describe, more precisely, the exact location they would like the new registry to appear on the page?

The new registry will be managed through Expert Review as defined by RFC8126. There are initial registrations in the new registry as follows:

Value Description Recommended Reference
0 none N [RFC5246]
1 md5 N [RFC5246]
2 sha1 N [RFC5246]
3 sha224 Y [RFC5246]
4 sha256 Y [RFC5246]
5 sha384 Y [RFC5246]
6 sha512 Y [RFC5246]
7 reserved [RFC8447]
8 intrinsic N [RFC8422]
9-223 reserved [RFC8447]
224-255 private [RFC5246]

The IANA Functions Operator understands that this is the only action required to be completed upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed.

For definitions of IANA review states, please see:

https://datatracker.ietf.org/help/state/draft/iana-review

Thank you,

David Dong
IANA Services Specialist
2023-02-15
12 Kenneth Vaughn New version available: draft-ietf-opsawg-tlstm-update-12.txt
2023-02-15
12 Kenneth Vaughn New version approved
2023-02-15
12 (System) Request for posting confirmation emailed to previous authors: Kenneth Vaughn
2023-02-15
12 Kenneth Vaughn Uploaded new revision
2023-02-09
11 Joel Halpern Request for Last Call review by GENART Completed: Ready. Reviewer: Joel Halpern. Sent review to list.
2023-02-09
11 Jean Mahoney Request for Last Call review by GENART is assigned to Joel Halpern
2023-02-07
11 Jim Reid Request for Last Call review by DNSDIR is assigned to Di Ma
2023-02-06
11 Cindy Morgan IANA Review state changed to IANA - Review Needed
2023-02-06
11 Cindy Morgan
The following Last Call announcement was sent out (ends 2023-02-20):

From: The IESG
To: IETF-Announce
CC: draft-ietf-opsawg-tlstm-update@ietf.org, jclarke@cisco.com, opsawg-chairs@ietf.org, opsawg@ietf.org, rwilton@cisco.com …
The following Last Call announcement was sent out (ends 2023-02-20):

From: The IESG
To: IETF-Announce
CC: draft-ietf-opsawg-tlstm-update@ietf.org, jclarke@cisco.com, opsawg-chairs@ietf.org, opsawg@ietf.org, rwilton@cisco.com
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (Updates to the TLS Transport Model for SNMP) to Proposed Standard


The IESG has received a request from the Operations and Management Area
Working Group WG (opsawg) to consider the following document: - 'Updates to
the TLS Transport Model for SNMP'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2023-02-20. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  This document updates RFC 6353 "Transport Layer Security (TLS)
  Transport Model for the Simple Network Management Protocol (SNMP)",
  to reflect changes necessary to support Transport Layer Security
  Version 1.3 (TLS 1.3) and Datagram Transport Layer Security Version
  1.3 (DTLS 1.3), which are jointly known as "(D)TLS 1.3".  This
  document is compatible with (D)TLS 1.2 and is intended to be
  compatible with future versions of SNMP and (D)TLS.

  This document updates the SNMP-TLS-TM-MIB as defined in RFC 6353.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-opsawg-tlstm-update/



No IPR declarations have been submitted directly on this I-D.




2023-02-06
11 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2023-02-06
11 Robert Wilton Last call was requested
2023-02-06
11 Robert Wilton Ballot approval text was generated
2023-02-06
11 Robert Wilton Ballot writeup was generated
2023-02-06
11 Robert Wilton IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2023-02-06
11 Robert Wilton Last call announcement was generated
2022-12-23
11 (System) Changed action holders to Robert Wilton (IESG state changed)
2022-12-23
11 (System) Sub state has been changed to AD Followup from Revised ID Needed
2022-12-23
11 Kenneth Vaughn New version available: draft-ietf-opsawg-tlstm-update-11.txt
2022-12-23
11 (System) New version approved
2022-12-23
11 (System) Request for posting confirmation emailed to previous authors: Kenneth Vaughn
2022-12-23
11 Kenneth Vaughn Uploaded new revision
2022-12-19
10 (System) Changed action holders to Kenneth Vaughn, Robert Wilton (IESG state changed)
2022-12-19
10 Robert Wilton IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation
2022-12-16
10 (System) Changed action holders to Robert Wilton (IESG state changed)
2022-12-16
10 Robert Wilton IESG state changed to AD Evaluation from Publication Requested
2022-10-09
10 Joe Clarke
# Document Shepherd Write-Up for Group Documents

## Document History

The document was actively discussed between a number of working group individuals as well as …
# Document Shepherd Write-Up for Group Documents

## Document History

The document was actively discussed between a number of working group individuals as well as in consultation with members of the TLS working group.  No one has expressed dissent in the work or its direction, but I would have liked to see reviews from the SEC DIR and from the broader OPS DIR.  Requests for those reviews went unanswered.

One area to pay special attention to is how new hash algorithms are allocated in the new IANA-maintained registry.  One thought was to have new algorithms auto-added based on work happening in TLS 1.3.  However, that could lead to a proliferation of algorithms in this registry that are never used.  Therefore, the current text stipulates an additional expert review and work on behalf of interested parties to propose a new hash algorithm be added (and that represents the consensus of the group).

It is also important to call out that the reason this document requests a new registry vs. adding to the existing one is that the TLS working group did not want to imply that any new algorithms added to the existing fingerprint registry worked with TLS 1.2.  Choosing this approach allowed for a much more simplified update to RFC 6353.

## Additional Reviews

The contents of this document do interact closely with TLS and thus a review from the TLS WG was requested.  Their input was key in choosing this document's current direction (see above).  However, I would have liked to have received some other directorate-level reviews to reinforce the approach in the registry is sound.

From a MIB standpoint, by taking a simplified approach, the updates were minimal.  That is, even though this document moves to a new hash algorithm registry, the semantics of the MIB and the SnmpTLSFingerprint textual convention remain the same, thus backwards compatibility is preserved.  This was confirmed by Jürgen Shönwälder.

## Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

Yes.

10. Several IETF Areas have assembled [lists of common issues that their
    reviewers encounter][6]. For which areas have such issues been identified
    and addressed? For which does this still need to happen in subsequent
    reviews?

SEC DIR and OPS DIR should review.

11. What type of RFC publication is being requested on the IETF stream ([Best
    Current Practice][12], [Proposed Standard, Internet Standard][13],
    [Informational, Experimental or Historic][14])? Why is this the proper type
    of RFC? Do all Datatracker state attributes correctly reflect this intent?

Proposed Standard.  This is the correct type based on the RFC it updates and that it defines a [modified] MIB module.  This status is correctly reflected in Datatracker.

12. Have reasonable efforts been made to remind all authors of the intellectual
    property rights (IPR) disclosure obligations described in [BCP 79][7]? To
    the best of your knowledge, have all required disclosures been filed? If
    not, explain why. If yes, summarize any relevant discussion, including links
    to publicly-available messages when applicable.

Yes.  An IPR call was conducted and no IPR was reported.  The author explicitly stated he knows of no IPR.

13. Has each author, editor, and contributor shown their willingness to be
    listed as such? If the total number of authors and editors on the front page
    is greater than five, please provide a justification.

Yes.

14. Document any remaining I-D nits in this document. Simply running the [idnits
    tool][8] is not enough; please review the ["Content Guidelines" on
    authors.ietf.org][15]. (Also note that the current idnits tool generates
    some incorrect warnings; a rewrite is underway.)

Most IDNITS have been sorted.  However, this is still a reference to the obsolete RFC 5246, and that is intentional as we are incorporating the values from the old TLS 1.2 registry.

Also note, the references from the MIB have been added as norm/inform references (in a style similar to what is done in YANG modules), and in the case of RFC 5890, has been made normative with new language in the MIB.

15. Should any informative references be normative or vice-versa? See the [IESG
    Statement on Normative and Informative References][16].

References look correct.

16. List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?

All normative references are freely available.

17. Are there any normative downward references (see [RFC 3967][9] and [BCP
    97
][10]) that are not already listed in the [DOWNREF registry][17]? If so,
    list them.

No.

18. Are there normative references to documents that are not ready to be
    submitted to the IESG for publication or are otherwise in an unclear state?
    If so, what is the plan for their completion?

No.

19. Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

It will update RFC 6353.  That metadata in the document is correct.

20. Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see [RFC 8126][11]).

The ask of IANA is clearly called out.  One registry is requested with initial contents clearly spelled out.

21. List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

The one new registry is SNMP-TLSTM HashAlgorithm Registry.  It is designated as expert review whereby the Security Area via the TLS WG is consulted as to whether or not a new algorithm should be added.  New algorithms should not show up here first.  They would appear in the TLS Cipher Suites registry.  Someone wanting to use the same algorithm for SNMP TLSTM would then request that algorithm receive a one-byte allocation in this new registry.
2022-10-09
10 Joe Clarke Responsible AD changed to Robert Wilton
2022-10-09
10 Joe Clarke IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2022-10-09
10 Joe Clarke IESG state changed to Publication Requested from I-D Exists
2022-10-09
10 Joe Clarke IESG process started in state Publication Requested
2022-10-09
10 Joe Clarke
# Document Shepherd Write-Up for Group Documents

## Document History

The document was actively discussed between a number of working group individuals as well as …
# Document Shepherd Write-Up for Group Documents

## Document History

The document was actively discussed between a number of working group individuals as well as in consultation with members of the TLS working group.  No one has expressed dissent in the work or its direction, but I would have liked to see reviews from the SEC DIR and from the broader OPS DIR.  Requests for those reviews went unanswered.

One area to pay special attention to is how new hash algorithms are allocated in the new IANA-maintained registry.  One thought was to have new algorithms auto-added based on work happening in TLS 1.3.  However, that could lead to a proliferation of algorithms in this registry that are never used.  Therefore, the current text stipulates an additional expert review and work on behalf of interested parties to propose a new hash algorithm be added (and that represents the consensus of the group).

It is also important to call out that the reason this document requests a new registry vs. adding to the existing one is that the TLS working group did not want to imply that any new algorithms added to the existing fingerprint registry worked with TLS 1.2.  Choosing this approach allowed for a much more simplified update to RFC 6353.

## Additional Reviews

The contents of this document do interact closely with TLS and thus a review from the TLS WG was requested.  Their input was key in choosing this document's current direction (see above).  However, I would have liked to have received some other directorate-level reviews to reinforce the approach in the registry is sound.

From a MIB standpoint, by taking a simplified approach, the updates were minimal.  That is, even though this document moves to a new hash algorithm registry, the semantics of the MIB and the SnmpTLSFingerprint textual convention remain the same, thus backwards compatibility is preserved.  This was confirmed by Jürgen Shönwälder.

## Document Shepherd Checks

9. Based on the shepherd's review of the document, is it their opinion that this
  document is needed, clearly written, complete, correctly designed, and ready
  to be handed off to the responsible Area Director?

Yes.

10. Several IETF Areas have assembled [lists of common issues that their
    reviewers encounter][6]. For which areas have such issues been identified
    and addressed? For which does this still need to happen in subsequent
    reviews?

SEC DIR and OPS DIR should review.

11. What type of RFC publication is being requested on the IETF stream ([Best
    Current Practice][12], [Proposed Standard, Internet Standard][13],
    [Informational, Experimental or Historic][14])? Why is this the proper type
    of RFC? Do all Datatracker state attributes correctly reflect this intent?

Proposed Standard.  This is the correct type based on the RFC it updates and that it defines a [modified] MIB module.  This status is correctly reflected in Datatracker.

12. Have reasonable efforts been made to remind all authors of the intellectual
    property rights (IPR) disclosure obligations described in [BCP 79][7]? To
    the best of your knowledge, have all required disclosures been filed? If
    not, explain why. If yes, summarize any relevant discussion, including links
    to publicly-available messages when applicable.

Yes.  An IPR call was conducted and no IPR was reported.  The author explicitly stated he knows of no IPR.

13. Has each author, editor, and contributor shown their willingness to be
    listed as such? If the total number of authors and editors on the front page
    is greater than five, please provide a justification.

Yes.

14. Document any remaining I-D nits in this document. Simply running the [idnits
    tool][8] is not enough; please review the ["Content Guidelines" on
    authors.ietf.org][15]. (Also note that the current idnits tool generates
    some incorrect warnings; a rewrite is underway.)

Most IDNITS have been sorted.  However, this is still a reference to the obsolete RFC 5246, and that is intentional as we are incorporating the values from the old TLS 1.2 registry.

Also note, the references from the MIB have been added as norm/inform references (in a style similar to what is done in YANG modules), and in the case of RFC 5890, has been made normative with new language in the MIB.

15. Should any informative references be normative or vice-versa? See the [IESG
    Statement on Normative and Informative References][16].

References look correct.

16. List any normative references that are not freely available to anyone. Did
    the community have sufficient access to review any such normative
    references?

All normative references are freely available.

17. Are there any normative downward references (see [RFC 3967][9] and [BCP
    97
][10]) that are not already listed in the [DOWNREF registry][17]? If so,
    list them.

No.

18. Are there normative references to documents that are not ready to be
    submitted to the IESG for publication or are otherwise in an unclear state?
    If so, what is the plan for their completion?

No.

19. Will publication of this document change the status of any existing RFCs? If
    so, does the Datatracker metadata correctly reflect this and are those RFCs
    listed on the title page, in the abstract, and discussed in the
    introduction? If not, explain why and point to the part of the document
    where the relationship of this document to these other RFCs is discussed.

It will update RFC 6353.  That metadata in the document is correct.

20. Describe the document shepherd's review of the IANA considerations section,
    especially with regard to its consistency with the body of the document.
    Confirm that all aspects of the document requiring IANA assignments are
    associated with the appropriate reservations in IANA registries. Confirm
    that any referenced IANA registries have been clearly identified. Confirm
    that each newly created IANA registry specifies its initial contents,
    allocations procedures, and a reasonable name (see [RFC 8126][11]).

The ask of IANA is clearly called out.  One registry is requested with initial contents clearly spelled out.

21. List any new IANA registries that require Designated Expert Review for
    future allocations. Are the instructions to the Designated Expert clear?
    Please include suggestions of designated experts, if appropriate.

The one new registry is SNMP-TLSTM HashAlgorithm Registry.  It is designated as expert review whereby the Security Area via the TLS WG is consulted as to whether or not a new algorithm should be added.  New algorithms should not show up here first.  They would appear in the TLS Cipher Suites registry.  Someone wanting to use the same algorithm for SNMP TLSTM would then request that algorithm receive a one-byte allocation in this new registry.
2022-10-08
10 Kenneth Vaughn New version available: draft-ietf-opsawg-tlstm-update-10.txt
2022-10-08
10 Kenneth Vaughn New version accepted (logged-in submitter: Kenneth Vaughn)
2022-10-08
10 Kenneth Vaughn Uploaded new revision
2022-10-04
09 Kenneth Vaughn New version available: draft-ietf-opsawg-tlstm-update-09.txt
2022-10-04
09 Kenneth Vaughn New version accepted (logged-in submitter: Kenneth Vaughn)
2022-10-04
09 Kenneth Vaughn Uploaded new revision
2022-09-29
08 Kenneth Vaughn New version available: draft-ietf-opsawg-tlstm-update-08.txt
2022-09-29
08 Kenneth Vaughn New version accepted (logged-in submitter: Kenneth Vaughn)
2022-09-29
08 Kenneth Vaughn Uploaded new revision
2022-09-27
07 Joe Clarke Tag Revised I-D Needed - Issue raised by WG cleared.
2022-09-27
07 Joe Clarke IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2022-09-27
07 Joe Clarke Changed consensus to Yes from Unknown
2022-09-27
07 Joe Clarke Intended Status changed to Proposed Standard from None
2022-09-27
07 Joe Clarke Notification list changed to jclarke@cisco.com because the document shepherd was set
2022-09-27
07 Joe Clarke Document shepherd changed to Joe Clarke
2022-09-26
07 Kenneth Vaughn New version available: draft-ietf-opsawg-tlstm-update-07.txt
2022-09-26
07 Kenneth Vaughn New version accepted (logged-in submitter: Kenneth Vaughn)
2022-09-26
07 Kenneth Vaughn Uploaded new revision
2022-09-09
06 Kenneth Vaughn New version available: draft-ietf-opsawg-tlstm-update-06.txt
2022-09-09
06 Kenneth Vaughn New version accepted (logged-in submitter: Kenneth Vaughn)
2022-09-09
06 Kenneth Vaughn Uploaded new revision
2022-09-06
05 Joe Clarke
Extending LC for this to try and get some directorate reviews.  Plus, some LC comments came from the WG, and a revised I-D will be …
Extending LC for this to try and get some directorate reviews.  Plus, some LC comments came from the WG, and a revised I-D will be required.
2022-09-06
05 Joe Clarke Tag Revised I-D Needed - Issue raised by WG set.
2022-08-29
05 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Niclas Comstedt
2022-08-29
05 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Niclas Comstedt
2022-08-25
05 Tero Kivinen Request for Last Call review by SECDIR is assigned to Tobias Gondrom
2022-08-25
05 Tero Kivinen Request for Last Call review by SECDIR is assigned to Tobias Gondrom
2022-08-24
05 Joe Clarke Requested Last Call review by OPSDIR
2022-08-24
05 Joe Clarke Requested Last Call review by SECDIR
2022-08-11
05 Joe Clarke IETF WG state changed to In WG Last Call from WG Document
2022-05-26
05 Kenneth Vaughn New version available: draft-ietf-opsawg-tlstm-update-05.txt
2022-05-26
05 (System) New version approved
2022-05-26
05 (System) Request for posting confirmation emailed to previous authors: Kenneth Vaughn
2022-05-26
05 Kenneth Vaughn Uploaded new revision
2022-05-16
04 Kenneth Vaughn New version available: draft-ietf-opsawg-tlstm-update-04.txt
2022-05-16
04 (System) New version approved
2022-05-16
04 (System) Request for posting confirmation emailed to previous authors: Kenneth Vaughn
2022-05-16
04 Kenneth Vaughn Uploaded new revision
2022-05-05
03 Kenneth Vaughn New version available: draft-ietf-opsawg-tlstm-update-03.txt
2022-05-05
03 (System) New version approved
2022-05-05
03 (System) Request for posting confirmation emailed to previous authors: Kenneth Vaughn
2022-05-05
03 Kenneth Vaughn Uploaded new revision
2022-04-06
02 Kenneth Vaughn New version available: draft-ietf-opsawg-tlstm-update-02.txt
2022-04-06
02 (System) New version accepted (logged-in submitter: Kenneth Vaughn)
2022-04-06
02 Kenneth Vaughn Uploaded new revision
2022-03-05
01 Kenneth Vaughn New version available: draft-ietf-opsawg-tlstm-update-01.txt
2022-03-05
01 (System) New version accepted (logged-in submitter: Kenneth Vaughn)
2022-03-05
01 Kenneth Vaughn Uploaded new revision
2021-12-17
00 Joe Clarke This document now replaces draft-vaughn-tlstm-update instead of None
2021-12-17
00 Kenneth Vaughn New version available: draft-ietf-opsawg-tlstm-update-00.txt
2021-12-17
00 (System) WG -00 approved
2021-12-16
00 Kenneth Vaughn Set submitter to "Kenneth Vaughn ", replaces to draft-vaughn-tlstm-update and sent approval email to group chairs: opsawg-chairs@ietf.org
2021-12-16
00 Kenneth Vaughn Uploaded new revision