Internet X.509 Public Key Infrastructure -- HTTP Transfer for the Certificate Management Protocol (CMP)
draft-ietf-pkix-cmp-transport-protocols-20
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-07-27
|
20 | Cindy Morgan | State changed to RFC Ed Queue from Approved-announcement sent |
2012-07-26
|
20 | (System) | IANA Action state changed to No IC |
2012-07-26
|
20 | Amy Vezza | State changed to Approved-announcement sent from Approved-announcement to be sent |
2012-07-26
|
20 | Amy Vezza | IESG has approved the document |
2012-07-26
|
20 | Amy Vezza | Closed "Approve" ballot |
2012-07-26
|
20 | Amy Vezza | Ballot approval text was generated |
2012-07-26
|
20 | Amy Vezza | Ballot writeup was changed |
2012-07-26
|
20 | Amy Vezza | State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2012-07-26
|
20 | Wesley Eddy | [Ballot comment] cleared my DISCUSS |
2012-07-26
|
20 | Wesley Eddy | [Ballot Position Update] Position for Wesley Eddy has been changed to No Objection from Discuss |
2012-07-25
|
20 | Martin Stiemerling | [Ballot comment] Thanks for addresing my points and only this agreed change didn't make it in the -20 version: > Section 3.7., paragraph 1: ************************************ … [Ballot comment] Thanks for addresing my points and only this agreed change didn't make it in the -20 version: > Section 3.7., paragraph 1: ************************************ In that case the CMP server is acting as an HTTP client. Does it make it clear when I add a sentence explaining that: OLD: A CMP server may create event-triggered announcements or generate them on a regular basis. It MAY utilize HTTP transport to convey them to a suitable recipient. As no request messages are specified for those announcements they can only be pushed to the recipient. NEW: A CMP server may create event-triggered announcements or generate them on a regular basis. It MAY utilize HTTP transport to convey them to a suitable recipient. In this use case the CMP server acts as an HTTP client and the recipient needs to utilize an HTTP server. As no request messages are specified |
2012-07-25
|
20 | Martin Stiemerling | [Ballot Position Update] Position for Martin Stiemerling has been changed to No Objection from Discuss |
2012-07-25
|
20 | Stephen Farrell | [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss |
2012-07-24
|
20 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2012-07-24
|
20 | Cindy Morgan | New version available: draft-ietf-pkix-cmp-transport-protocols-20.txt |
2012-05-24
|
19 | Cindy Morgan | State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation |
2012-05-24
|
19 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo |
2012-05-23
|
19 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded for Robert Sparks |
2012-05-23
|
19 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel |
2012-05-23
|
19 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded for Stewart Bryant |
2012-05-23
|
19 | Benoît Claise | [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise |
2012-05-22
|
19 | Ralph Droms | [Ballot Position Update] New position, No Objection, has been recorded for Ralph Droms |
2012-05-22
|
19 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley |
2012-05-22
|
19 | Pete Resnick | [Ballot comment] In 3.8: While implementations MAY make use of all defined features of the HTTP protocol, they SHOULD keep the protocol utilization … [Ballot comment] In 3.8: While implementations MAY make use of all defined features of the HTTP protocol, they SHOULD keep the protocol utilization as simple as possible. I find this potentially confusing. If the directive to implementers is that they are allowed to use (and therefore the other side needs to be aware of) all defined HTTP features, the MAY should be uppercased and the SHOULD should not. If the directive to implementers is that they SHOULD keep the protocol use simple, then the first part of the sentence is at best confusing. If the latter is the intent, try: While all defined features of the HTTP protocol are available to implementations, they SHOULD keep the protocol utilization as simple as possible. |
2012-05-22
|
19 | Pete Resnick | [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick |
2012-05-21
|
19 | Wesley Eddy | [Ballot discuss] There is significant confusion in terminology in this document, with "transport" used in cases where we would normally use "transfer" to be more … [Ballot discuss] There is significant confusion in terminology in this document, with "transport" used in cases where we would normally use "transfer" to be more clear and consistent with the existing body of RFCs. HTTP is a transfer protocol; TCP is a transport protocol. If the document was scrubbed to fix this terminology, I would have no problem with it going forward. |
2012-05-21
|
19 | Wesley Eddy | [Ballot Position Update] New position, Discuss, has been recorded for Wesley Eddy |
2012-05-21
|
19 | Stephen Farrell | [Ballot discuss] (1) Today, using HTTP/TLS is not hard. If CMP messages are visible over a public network, then there may be a number of … [Ballot discuss] (1) Today, using HTTP/TLS is not hard. If CMP messages are visible over a public network, then there may be a number of high-level DoS-type attacks possible, e.g. bad-guy sees a certification request for example.com and knows that that will take ~1 day to process so bad-guy goes to another (not so careful) CA and get a cert for example.com denying service to the correct example.com and damaging the CA to whom the original certification request was directed. On this basis, I think this document really needs to make use of HTTP/TLS a MUST-use messages go over any untrusted network, and hence TLS would need to be mandatory-to-implement. I'd also say that IPsec isn't really very relevant here (but would work fine), so I'd suggest that the spec be changed along the lines of: OLD: "Therefore users of the HTTP transport for CMP might want to consider using HTTP over TLS according to [RFC2818] or virtual private networks created e.g. by utilizing Internet Protocol Security according to [RFC4301]." NEW: "HTTP over TLS [RFC2818] MUST be supported by all nodes implementing this protocol. TLS with strong confidentiality SHOULD be used in all cases, with the only exception being when CMP messages are sent over fully trusted networks, which doesn't happen very often." (2) How is RFC 1945 a MUST but not a normative reference and is that then a downref? Is http/1.0 *really* needed as a MUST these days? I'd say s/MUST support/might support/ for http/1.0 and leave 1945 as an informative reference and avoid the messing with new last calls etc. |
2012-05-21
|
19 | Stephen Farrell | [Ballot comment] 3.3 - is the 200 vs 201/202 point here consistent, seems like not. 3.5 also seems to say what's needed and better, so … [Ballot comment] 3.3 - is the 200 vs 201/202 point here consistent, seems like not. 3.5 also seems to say what's needed and better, so I'd suggest deleting 3.3 entirely 3.3 - what are the 3xx "security implications"? Either 4210 is ok or not, so I'm really not sure what's meant here. |
2012-05-21
|
19 | Stephen Farrell | [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell |
2012-05-21
|
19 | Sean Turner | State changed to IESG Evaluation from Waiting for AD Go-Ahead |
2012-05-21
|
19 | Martin Stiemerling | [Ballot discuss] Section 1., paragraph 4: > Before this document was published as an RFC, the draft version > underwent drastic changes during … [Ballot discuss] Section 1., paragraph 4: > Before this document was published as an RFC, the draft version > underwent drastic changes during the long-lasting work process. The > "TCP-Based Management Protocol" was enhanced and a TCP-Messages-over- > HTTP transport specification appeared. As both proved to be needless > and cumbersome, implementers preferred to use plain HTTP transport > following [RFC1945] or [RFC2616]. This document now reflects that by > exclusively describing HTTP as transport protocol for CMP. The sentence "TCP-Based Management Protocol" was enhanced and a TCP-Messages-over-HTTP transport specification appeared." hit my eye as Transport AD. Is there any meat to have this sentence in here? I would suggest to remove it, in order to not give a wrong impression that the IETF has worked at any time on a TCP over HTTP protocol. The "TCP-Based Management Protocol" is also sort of unknown to me. Section 3.7., paragraph 1: > A CMP server may create event-triggered announcements or generate > them on a regular basis. It MAY utilize HTTP transport to convey > them to a suitable recipient. As no request messages are specified > for those announcements they can only be pushed to the recipient. How can a HTTP server push data to the client with HTTP? HTTP is a request/response protocol where the client is sending out the requests. I assume that the CMP server is located at the HTTP server. However, the draft isn't completely clear about whether the CMP server is necessarily located at the HTTP server. Section 3.7., paragraph 7: > CMP Announcement messages do not require any CMP response. However, > the recipient MUST acknowledge receipt with a HTTP response having an > appropriate status code and an empty body. When not receiving such > response it MUST be assumed that the delivery was not successful and > if applicable the sending side may retry sending the Announcement > after waiting for an appropriate time span. What is this time span? Replace "may" with "MAY"? Section 3.7., paragraph 10: > A receiver MUST answer with a suitable 4xx or 5xx HTTP error code > when a problem occurs. This MUST here contradicts this statement "All applicable "Client Error 4xx" or "Server Error 5xx" status codes may be used to inform the client about errors." out of Section 3.3, as 4xx/5xx codes may be support, but this requires that they are supported. |
2012-05-21
|
19 | Martin Stiemerling | [Ballot comment] Section 3.3., paragraph 2: > While "Redirection 3xx" status codes MAY be supported by > implementations, clients should only be enabled … [Ballot comment] Section 3.3., paragraph 2: > While "Redirection 3xx" status codes MAY be supported by > implementations, clients should only be enabled to automatically > follow them after careful consideration of possible security > implications. It would be good to link to your security section about the the discussion of this. Section 3.4., paragraph 0: > All applicable "Client Error 4xx" or "Server Error 5xx" status codes > may be used to inform the client about errors. Replace "may" with "MAY"? But see also my DISUCSS about 4xx/5xx codes. Section 3.4., paragraph 1: > The Internet Media Type "application/pkixcmp" MUST be set in the HTTP > header when conveying a PKIMessage. to be precise: MUST be set in the Content-Type header. - Section 4: In support of Brian's comment, i.e., what is the purpose of this section? |
2012-05-21
|
19 | Martin Stiemerling | [Ballot Position Update] New position, Discuss, has been recorded for Martin Stiemerling |
2012-05-21
|
19 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call |
2012-05-19
|
19 | Barry Leiba | [Ballot comment] Substantive comments; these are non-blocking, but please consider them seriously, and feel free to chat with me about them: I agree with Brian … [Ballot comment] Substantive comments; these are non-blocking, but please consider them seriously, and feel free to chat with me about them: I agree with Brian Haberman's comments #3 and #4. On #3: there is a short note in the Security Considerations about using 301 Moved Permanently, but, in general, this should say more about the security implications of using HTTP redirection. Otherwise, "careful consideration of possible security implications" isn't likely. On #4, I think you either need to remove the section or explain it quite a bit better. ======== Other comments; no need to respond to these: A note to the doc shepherd: Thank you for being clear about the low level of WG interest in the document and the reasons for publishing it despite that. Too often, shepherd writeups try to give what they think are "the right answers", rather than the true and accurate ones. A note on Brian Haberman's comment #1: In contrast, I think the "history" in the introduction is useful. After reading Brian's comment I considered each paragraph for removal or abridgment, and found that each one was useful in explaining why the document is making the choices it's making and going in the direction it's going. |
2012-05-19
|
19 | Barry Leiba | Ballot comment text updated for Barry Leiba |
2012-05-19
|
19 | Barry Leiba | [Ballot comment] Substantive comments; these are non-blocking, but please consider them seriously, and feel free to chat with me about them: I agree with Brian … [Ballot comment] Substantive comments; these are non-blocking, but please consider them seriously, and feel free to chat with me about them: I agree with Brian Haberman's comments #3 and #4. On #3: there is a short note in the Security Considerations about using 301 Moved Permanently, but, in general, this should say more about the security implications of using HTTP redirection. Otherwise, "careful consideration of possible security implications" isn't likely. On #4, I think you either need to remove the section or explain it quite a bit better. ======== Other comments; no need to respond to these: A note to the doc shepherd: Thank you for being clear about the low level of WG interest in the document and the reasons for publishing it despite that. Too often, shepherd writeups try to give what think are "the right answers", rather than the true and accurate ones. A note on Brian Haberman's comment #1: In contrast, I think the "history" in the introduction is useful. After reading Brian's comment I considered each paragraph for removal or abridgment, and found that each one was useful in explaining why the document is making the choices it's making and going in the direction it's going. |
2012-05-19
|
19 | Barry Leiba | [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba |
2012-05-18
|
19 | Brian Haberman | [Ballot comment] I have no issues with the publication of this document. I only have some non-blocking comments: 1. Part of the Introduction sounds more … [Ballot comment] I have no issues with the publication of this document. I only have some non-blocking comments: 1. Part of the Introduction sounds more like a history lesson and does not bolster the content of the document. I would suggest paring it down and focusing on introducing the functionality. 2. Terms like "PKIMessage" and "DER-encoded" are not defined anywhere before they are used. 3. The 2nd paragraph of section 3.3 seems incomplete. It would be useful if some example security implications were discussed. 4. What purpose does section 4 serve? Are there interoperability functions that could be described? I would suggest providing guidance on how the potential interactions can be handled. 5. While I appreciate the impact of having unresponsive authors, I don't think the explanatory text in section 7 (paragraph 1) is needed. Simply list those people as previously contributing authors. |
2012-05-18
|
19 | Brian Haberman | [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman |
2012-05-18
|
19 | Christer Holmberg | Request for Last Call review by GENART Completed. Reviewer: Christer Holmberg. |
2012-05-17
|
19 | Jean Mahoney | Request for Last Call review by GENART is assigned to Christer Holmberg |
2012-05-17
|
19 | Jean Mahoney | Request for Last Call review by GENART is assigned to Christer Holmberg |
2012-05-17
|
19 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded for Ronald Bonica |
2012-05-17
|
19 | Sean Turner | Ballot has been issued |
2012-05-17
|
19 | Sean Turner | [Ballot Position Update] New position, Yes, has been recorded for Sean Turner |
2012-05-17
|
19 | Sean Turner | Created "Approve" ballot |
2012-05-16
|
19 | Pearl Liang | IANA understands that, upon approval of this document, there are no IANA Actions that need completion. |
2012-05-15
|
19 | Martin Peylo | New version available: draft-ietf-pkix-cmp-transport-protocols-19.txt |
2012-05-14
|
18 | Christer Holmberg | Request for Last Call review by GENART Completed. Reviewer: Christer Holmberg. |
2012-05-11
|
18 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Eric Rescorla |
2012-05-11
|
18 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Eric Rescorla |
2012-05-10
|
18 | Jean Mahoney | Request for Last Call review by GENART is assigned to Christer Holmberg |
2012-05-10
|
18 | Jean Mahoney | Request for Last Call review by GENART is assigned to Christer Holmberg |
2012-05-07
|
18 | Sean Turner | Placed on agenda for telechat - 2012-05-24 |
2012-05-07
|
18 | Amy Vezza | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (Internet X.509 Public Key Infrastructure -- … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (Internet X.509 Public Key Infrastructure -- HTTP Transport for CMP) to Proposed Standard The IESG has received a request from the Public-Key Infrastructure (X.509) WG (pkix) to consider the following document: - 'Internet X.509 Public Key Infrastructure -- HTTP Transport for CMP' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2012-05-21. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document describes how to layer the Certificate Management Protocol over HTTP. It is the "CMPtrans" document referenced in RFC 4210 and therefore updates the reference given therein. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-pkix-cmp-transport-protocols/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-pkix-cmp-transport-protocols/ballot/ No IPR declarations have been submitted directly on this I-D. |
2012-05-07
|
18 | Amy Vezza | State changed to In Last Call from Last Call Requested |
2012-05-07
|
18 | Sean Turner | Last call was requested |
2012-05-07
|
18 | Sean Turner | Ballot approval text was generated |
2012-05-07
|
18 | Sean Turner | State changed to Last Call Requested from AD Evaluation::AD Followup |
2012-05-07
|
18 | Sean Turner | Last call announcement was generated |
2012-05-07
|
18 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2012-05-07
|
18 | Martin Peylo | New version available: draft-ietf-pkix-cmp-transport-protocols-18.txt |
2012-05-07
|
17 | Sean Turner | State changed to AD Evaluation::Revised ID Needed from AD Evaluation::AD Followup |
2012-05-07
|
17 | Sean Turner | Ballot writeup was changed |
2012-05-07
|
17 | Sean Turner | Ballot writeup was generated |
2012-05-07
|
17 | Sean Turner | Last call announcement was generated |
2012-05-06
|
17 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2012-05-06
|
17 | Martin Peylo | New version available: draft-ietf-pkix-cmp-transport-protocols-17.txt |
2012-03-06
|
16 | Sean Turner | State changed to AD Evaluation::Revised ID Needed from AD Evaluation::AD Followup |
2012-02-16
|
16 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2012-02-16
|
16 | (System) | New version available: draft-ietf-pkix-cmp-transport-protocols-16.txt |
2012-02-02
|
16 | Sean Turner | State changed to AD Evaluation::Revised ID Needed from Publication Requested. |
2012-02-02
|
16 | Cindy Morgan | (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he … (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Stephen Kent is the document shepherd. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The document has received review by some WG members, but it is not considered central to PKI technology in general. The document was created by the authors to enable use of CMP in the 3GPP environment, as called for by a 3GPP document from 2009. It fills in a gap from RFC 4210 (CMP). (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? I look forward to an APPLICATION area review, since this document discusses how to use HTTP for transport, and the PKIX WG does not have HTTP expertise. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. There are no specific concerns to highlight to the AD or IESG. No IPR disclosures have been filed related to this document. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? Most WG members don't care about this, because it is 3GPP-specific. But, to be good SDO neighbors we ought to progress it. No WG members have expressed opposition to any technical aspects of this document. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See http://www.ietf.org/ID-Checklist.html and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? ID nits OK, no MIB. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. References have been split into normative and informative sections. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC5226]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? The I-D has an IANA Considerations section that indicates there are no IANA considerations, and cites the extant MIME type registration. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? There is no use of formal languages in this document, other than lists of ASN.1 explicit tags for the CMP message types that MUST be supported. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary CMP was designed [RFC 2510] to be carried over various transport protocols, and the initial specification described how to do so for TCP, HTTP, FTP, and MIME (at varying levels of detail). The current version of CMP [RFC 4210] included an informative reference to a document that was supposed to define how to carry CMP over various transport protocols. That document expired in 2000, leaving no updated, detailed description for how to transport CMP messages. This document was prepared to replace that old one. The authors of this document resurrected the HTTP part of that document, after the original authors indicated that they were not available to work on this document. Working Group Summary As noted above, this document attracted little interest in the WG, because it focuses on use of CMP (which is not popular) in the 3GPP environment (which is equally uninteresting to most WG members). Document Quality The document is reasonably well written and fairly clear (modulo some spelling errors), especially considering that the authors are not native English speakers. |
2012-02-02
|
16 | Cindy Morgan | Draft added in state Publication Requested |
2012-02-02
|
16 | Cindy Morgan | [Note]: 'Steve Kent (kent@bbn.com) is the Document Shepherd.' added |
2012-01-10
|
15 | (System) | New version available: draft-ietf-pkix-cmp-transport-protocols-15.txt |
2011-09-29
|
14 | (System) | New version available: draft-ietf-pkix-cmp-transport-protocols-14.txt |
2011-06-30
|
13 | (System) | New version available: draft-ietf-pkix-cmp-transport-protocols-13.txt |
2011-06-16
|
12 | (System) | New version available: draft-ietf-pkix-cmp-transport-protocols-12.txt |
2011-04-19
|
11 | (System) | New version available: draft-ietf-pkix-cmp-transport-protocols-11.txt |
2011-04-02
|
16 | (System) | Document has expired |
2010-09-29
|
10 | (System) | New version available: draft-ietf-pkix-cmp-transport-protocols-10.txt |
2010-07-09
|
09 | (System) | New version available: draft-ietf-pkix-cmp-transport-protocols-09.txt |
2010-04-27
|
08 | (System) | New version available: draft-ietf-pkix-cmp-transport-protocols-08.txt |
2009-10-26
|
07 | (System) | New version available: draft-ietf-pkix-cmp-transport-protocols-07.txt |
2009-07-30
|
06 | (System) | New version available: draft-ietf-pkix-cmp-transport-protocols-06.txt |
2004-02-11
|
05 | (System) | New version available: draft-ietf-pkix-cmp-transport-protocols-05.txt |
2001-05-23
|
04 | (System) | New version available: draft-ietf-pkix-cmp-transport-protocols-04.txt |
2000-12-01
|
03 | (System) | New version available: draft-ietf-pkix-cmp-transport-protocols-03.txt |
2000-10-03
|
02 | (System) | New version available: draft-ietf-pkix-cmp-transport-protocols-02.txt |
2000-07-21
|
01 | (System) | New version available: draft-ietf-pkix-cmp-transport-protocols-01.txt |
2000-06-26
|
00 | (System) | New version available: draft-ietf-pkix-cmp-transport-protocols-00.txt |