An Architecture for Trustworthy and Transparent Digital Supply Chains
draft-ietf-scitt-architecture-22
Revision differences
Document history
| Date | Rev. | By | Action |
|---|---|---|---|
|
2026-03-06
|
22 | (System) | RFC Editor state changed to AUTH48 |
|
2026-03-02
|
22 | (System) | RFC Editor state changed to RFC-EDITOR from REF |
|
2026-02-24
|
22 | (System) | RFC Editor state changed to REF from EDIT |
|
2025-10-21
|
22 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
|
2025-10-21
|
22 | (System) | IANA Action state changed to Waiting on RFC Editor from Waiting on Authors |
|
2025-10-10
|
22 | (System) | RFC Editor state changed to EDIT from AUTH |
|
2025-10-10
|
22 | Henk Birkholz | New version available: draft-ietf-scitt-architecture-22.txt |
|
2025-10-10
|
22 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
|
2025-10-10
|
22 | Henk Birkholz | Uploaded new revision |
|
2025-10-09
|
21 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
|
2025-10-01
|
21 | (System) | RFC Editor state changed to AUTH from EDIT |
|
2025-10-01
|
21 | (System) | RFC Editor state changed to EDIT |
|
2025-10-01
|
21 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
|
2025-10-01
|
21 | (System) | Announcement was received by RFC Editor |
|
2025-10-01
|
21 | (System) | IANA Action state changed to In Progress |
|
2025-10-01
|
21 | (System) | Removed all action holders (IESG state changed) |
|
2025-10-01
|
21 | Morgan Condie | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
|
2025-10-01
|
21 | Morgan Condie | IESG has approved the document |
|
2025-10-01
|
21 | Morgan Condie | Closed "Approve" ballot |
|
2025-10-01
|
21 | Morgan Condie | Ballot approval text was generated |
|
2025-10-01
|
21 | Morgan Condie | Ballot writeup was changed |
|
2025-10-01
|
21 | Deb Cooley | IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::AD Followup |
|
2025-09-30
|
21 | Henk Birkholz | New version available: draft-ietf-scitt-architecture-21.txt |
|
2025-09-30
|
21 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
|
2025-09-30
|
21 | Henk Birkholz | Uploaded new revision |
|
2025-09-19
|
20 | Barry Leiba | Closed request for IETF Last Call review by ARTART with state 'Overtaken by Events': Document has finished IESG processing |
|
2025-09-19
|
20 | Barry Leiba | Assignment of request for IETF Last Call review by ARTART to Tara Whalen was marked no-response |
|
2025-09-18
|
20 | Ines Robles | Assignment of request for Telechat review by IOTDIR to Gonzalo Salgueiro was marked no-response |
|
2025-09-18
|
20 | Morgan Condie | IESG state changed to Approved-announcement to be sent::AD Followup from IESG Evaluation |
|
2025-09-17
|
20 | Roman Danyliw | [Ballot comment] Thank you to Roni Even for the GENART review. ** Idnits reports: == Unused Reference: 'RFC9334' is defined on line 1699, but … [Ballot comment] Thank you to Roni Even for the GENART review. ** Idnits reports: == Unused Reference: 'RFC9334' is defined on line 1699, but no explicit reference was found in the text ** Section 2.1 Lastly, where data exchange underpins serious business decision- making, it is important to hold the producers of those data to a higher standard of accountability. Defining the degree of accountability for producers is not in-scope for the charter. ** Section 2.2.3. What about this use case is unique to an “autonomous vehicle”, as opposed to a “non-autonomous vehicle” or “any vehicle”? ** Section 4 Reputable Issuers are thus incentivized to carefully review their Statements before signing them to produce Signed Statements. Similarly, reputable Transparency Services are incentivized to secure their Verifiable Data Structure, as any inconsistency can easily be pinpointed by any Auditor with read access to the Transparency Service. What makes an issuer or transparency service “reputable”? ** Section 4 The building blocks defined in SCITT are intended to support applications in any supply chain that produces or relies upon digital Artifacts, from the build and supply of software and IoT devices to advanced manufacturing and food supply. This statement is outside the scope of the SCITT charter. ** Section 5. The SCITT architecture enables a loose federation of Transparency Services, by providing a set of common formats and protocols for issuing and registering Signed Statements and auditing Transparent Statements. Where is the basis for this “federation” explained? What does it mean to be “federated”? ** Section 5.1.1.1. What is a “COSE-compatible trust anchor”? ** Section 6 Once all the Envelope headers are set, an Issuer MUST use a standard COSE implementation to produce an appropriately serialized Signed Statement. What is a “standard COSE implementation”, as opposed to using COSE? ** Section 9.4 Issuers and Transparency Services MUST: … * rotate their keys in well-defined cryptoperiods, see [KEY-MANAGEMENT] What makes a “cryptoperiod” well-defined? How is it interoperable. I wasn’t able to locate the relevant guidance in [KEY-MANAGEMENT] beyond statements of having a cryptoperiod. Additionally, since [KEY-MANAGEMENT] is informative, the guidance for it can’t come from this document. |
|
2025-09-17
|
20 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
|
2025-09-17
|
20 | Paul Wouters | [Ballot Position Update] New position, Yes, has been recorded for Paul Wouters |
|
2025-09-17
|
20 | Gunter Van de Velde | [Ballot Position Update] New position, No Objection, has been recorded for Gunter Van de Velde |
|
2025-09-17
|
20 | Éric Vyncke | [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-scitt-architecture-20 CC @evyncke Thank you for the work put into this document. Please find below some … [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-scitt-architecture-20 CC @evyncke Thank you for the work put into this document. Please find below some non-blocking COMMENT points/nits (replies would be appreciated even if only for my own education). Special thanks to Amaury Chamayou for the shepherd's write-up including the WG consensus _and_ the justification of the intended status. Other thanks to Jason Livingood, the IoT directorate reviewer (at my request), please consider this iot-dir review: https://datatracker.ietf.org/doc/review-ietf-scitt-architecture-20-iotdir-telechat-livingood-2025-09-12/ (I have not seen any reply by the authors, this review is to be considered as a IETF Last Call one, i.e., comments MUST be addressed) I hope that this review helps to improve the document, Regards, -éric ## COMMENTS (non-blocking) ### IoT Directorate review The IoT directorate review comments have not been addressed, and they should be considered as any other IETF Last Call comments. I am trusting the responsible AD to ensure that the comments will be addressed. ### Section 1 Suggest to split the very long paragraph one in 3 parts: problem to be solved, how to solve it, benefits. A graphical representation would also help to understand all the interactions (e.g., a simplified version of the nice Figure 2). The reader has often to read a very long paragraph in this document, while perfectly correct, this does not help the reader. ### Section 2.1 Isn't it weird to have a generic section 2.1 included in a specific 'software-only' section 2 ? BTW, thanks for using SVG graphics they are so much nicer in HTML rendering. ### Section 2.2.3 Is this short section about autonomous véhicle useful ? ### Section 3 Should "CWT" be expanded (and informational reference added) ? ### Section 5.1.1.1 s/ Transparency Service MUST, at a minimum,/ Transparency Service MUST/ ? Please add a reference to `x5t` or define it. Same for `kid` used later in the text, especially since "kid" is a common English word. ### Section 5.1.3 It is unclear (at least to me but perhaps to other implementers) whether draft-ietf-cose-merkle-tree-proofs is the only way to be implemented. ### Section 6 The list of references to other documents would benefit from adding a few words describing the reference. |
|
2025-09-17
|
20 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
|
2025-09-16
|
20 | Andy Newton | [Ballot Position Update] New position, No Objection, has been recorded for Andy Newton |
|
2025-09-16
|
20 | Gorry Fairhurst | [Ballot Position Update] Position for Gorry Fairhurst has been changed to No Objection from No Record |
|
2025-09-16
|
20 | Gorry Fairhurst | [Ballot comment] Thanks for making this document. I have reviewed this from a transport layer perspective and have no technical comments. I was confused by … [Ballot comment] Thanks for making this document. I have reviewed this from a transport layer perspective and have no technical comments. I was confused by the text around word "notary", but note that I now see that US usage appears to have a different meaning to that with which I am accustomed. Maybe to be kind to others, it might be helpful just to omit the text trying to parallel this with a human notary? The text also says: "such as Certificate Transparency", could a (cross) reference be added to explain what that is? |
|
2025-09-16
|
20 | Gorry Fairhurst | Ballot comment text updated for Gorry Fairhurst |
|
2025-09-16
|
20 | Jim Guichard | [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard |
|
2025-09-13
|
20 | Erik Kline | [Ballot comment] # Internet AD comments for draft-ietf-scitt-architecture-20 CC @ekline * comment syntax: - https://github.com/mnot/ietf-comments/blob/main/format.md * "Handling Ballot Positions": - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/ ## Comments … [Ballot comment] # Internet AD comments for draft-ietf-scitt-architecture-20 CC @ekline * comment syntax: - https://github.com/mnot/ietf-comments/blob/main/format.md * "Handling Ballot Positions": - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/ ## Comments ### S3 * I can't help but feel that "Transparency Statement" is a slightly better term than the somewhat-generic-sounding "Transparent Statement", but I'm guessing this is well past the stage at which terminology can be changed. Just an observation. ### S9.4.2 * What should an Issuer or Transparency Service do when a key is compromised beyond "communicate"? Should it, for example, establish new credentials and replay all signing operations with the new key(s)? ## Nits ### S2.1 * "Taking the type and structure of all statements about digital and products into account might not be possible." s/digital and products/digital products/ I think improves readability. |
|
2025-09-13
|
20 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
|
2025-09-12
|
20 | Orie Steele | [Ballot comment] I contributed substantially to this document. |
|
2025-09-12
|
20 | Orie Steele | [Ballot Position Update] New position, Recuse, has been recorded for Orie Steele |
|
2025-09-12
|
20 | Amanda Baber | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
|
2025-09-12
|
20 | Mike Bishop | [Ballot comment] Given the varying functions performed by [notaries in different legal systems](https://edictsandstatutes.com/notaries-in-different-cultures/#The_Role_of_Notaries_in_Diverse_Legal_Systems), the comparison to a notarial stamp might be more confusing … [Ballot comment] Given the varying functions performed by [notaries in different legal systems](https://edictsandstatutes.com/notaries-in-different-cultures/#The_Role_of_Notaries_in_Diverse_Legal_Systems), the comparison to a notarial stamp might be more confusing than illuminating for a global audience. For example, in the US, a notary certifies the identity of the signer without verifying the accuracy of the document being signed ("confirm a policy is met before recording the statement"). In Section 2.1, please expand and/or link to a definition of the term "DevSecOps". I appreciate the thorough Terminology section. The definition of Non-equivocation uses the capitalized term "Single Verifiable Data Structure"; while I see "Verifiable Data Structure" defined, there's no definition of the capitalized Single or of SVDS as a term. Should this be "single Verifiable Data Structure" or is an additional definition needed? In Figure 2, I'm unclear why there's a line from Issuer's "verify" to the Transparency Service. Wouldn't that go only into Verify Transparent Statement? The claims being used (`iss`, `sub`) are from RFC8392. That's referenced to define the term "claim", but isn't given as a reference for these specific claim types. Please expand on that reference so people can follow that thread. Similarly, there's no introduction to `x5t`, `x5chain`, or `kid`. From context, I assumed they came from COSE_Sign1 in RFC 9052, but I don't find them there. Can you put pointers as appropriate? If this document is defining them, be clearer about that. In Section 9.5, what does "normatively signed" mean? If it means the media type requires a valid signature, consider "which include a signature and therefore...." In Section 9.7, "blame" may be a more loaded word than you want. I think this is trying to make a statement about attribution, not fault. ===NITS FOLLOW=== Section 2.1, "cyber security-based" => "cyber-security-based" Section 3, "for implementations" => "for implementations." Section 5.1.4 ends with a sentence fragment. Should this be part of the previous sentence? Section 6, no commas around the parentheses in the last paragraph Section 7.1, no comma after "[STD96]" Section 9.2, "unintentionally," => "unintentionally;" Section 9.5 and multiple Figures, "COSE Sign1" => "COSE_Sign1"? |
|
2025-09-12
|
20 | Mike Bishop | [Ballot Position Update] New position, No Objection, has been recorded for Mike Bishop |
|
2025-09-12
|
20 | Ketan Talaulikar | [Ballot comment] Thanks to the authors and the WG for their work on this document. I have a couple of comments: 1) I could not … [Ballot comment] Thanks to the authors and the WG for their work on this document. I have a couple of comments: 1) I could not find a reference to RFC 9334. Please remove from references if unused. 2) I am not following the intent of section 10.1. If IANA has already done the allocation via another document then it is not required to be mentioned in the IANA consideration section of this document. That codepoint can be directly referenced as is being done in section 7. Section 10.1 can be deleted. |
|
2025-09-12
|
20 | Ketan Talaulikar | [Ballot Position Update] New position, No Objection, has been recorded for Ketan Talaulikar |
|
2025-09-12
|
20 | Jason Livingood | Request for Telechat review by IOTDIR Completed: Ready with Nits. Reviewer: Jason Livingood. Sent review to list. |
|
2025-09-12
|
20 | Mohamed Boucadair | [Ballot comment] Hi Henk, Antoine, Cédric, Yogesh, and Steve, Thank you for the effort put into this very well-written document. Please find below some comments: … [Ballot comment] Hi Henk, Antoine, Cédric, Yogesh, and Steve, Thank you for the effort put into this very well-written document. Please find below some comments: # (meta comments) Operationalization matters Many questions popped up when reading the document (e.g., how the various entities know/discover each other, how authentication is done, how bootstrapping is made, what registration actually means, how the receipts are retrieved, how collection is made, how the latest version of a statement on a specific component is made available rather than consuming a stale one, what if a TS is not available anymore, etc. As this is an architecture document (but not only), I was expecting some of these details to be grouped in a single place (even with a statement, these are out of scope). # On scalability and flexibility CURRENT (Abstract): This document proposes a scalable architecture for single-issuer signed statement transparency applicable to any supply chain. It ensures flexibility, interoperability between different transparency services, and compliance with various auditing procedures and regulatory (1) It is not clear to me how what means “scalable architecture” here. Scalability can be approach from various angles and I’m not sure which aspects is being focused on here. I’d prefer we back any claim here with a discussion on that in the main text. (2) Likewise, what does flexibility mean in this specific context? For example, there are some constraints imposed on how registration policies may be updated, etc. I think that exercising the architecture and playing with various contexts (complex component dependencies, other uses) would be needed first. (3) Idem, maybe I’m misreading this but what aspect in the spec you have in mind with “interoperability between different transparency services”? (4) nits * s/proposes/defines * Not easy at this stage to digest what is a “transparency service”. # How domain is defined in this specific context? CURRENT (S.1): As these messages provide the foundation of any transparency service implementation for global and cross-domain ^^^^^^^^^^^^ application interoperability, they are based on complementary COSE specifications, mainly [I-D.draft-ietf-cose-merkle-tree-proofs]. # Figure 1: These are still possible attacks. I don’t think we sat that SCITT will nullify those. Right? # DevSecops CURRENT (S.2.1): DevSecOps often depends on third-party and open-source software. I know what it means, but do we have an authoritative ref to cite for DevSecOps? # CWT_Claims CURRENT (S.3): In SCITT Statements and Receipts, the iss CWT Claim is a member of the COSE header parameter 15: CWT_Claims within the protected header of a COSE Envelope. (1) I don’t find CWT_Claims in the base COSE spec. (2) I guess we meant what is defined in RFC9597. If so, please add a pointer to that RFC. (3) Also, I think this and other occurrences in the document should be “CWT-Claims” to comply with 9597. # Receipts CURRENT (S.3): Receipt: a cryptographic proof that a Signed Statement is included in the Verifiable Data Structure. See [I-D.draft-ietf-cose-merkle-tree-proofs] for implementations Receipts are signed proofs of verifiable data-structure properties. The types of Receipts MUST support inclusion proofs and MAY support other proof types, such as consistency proofs. (1) I don’t parse the second sentence. (2) What is a “type of receipt”? Failed to find which part of draft-ietf-cose-merkle-tree-proofs this is referring to. (3) Weird to have the normative requirement in a terminology section. # SCITT instance CURRENT (S.4): A SCITT instance is referred to as a Transparency Service. Isn’t SCITT about the full architecture? Also, I don’t see “ SCITT instance” used anywhere in the document. # Mixing state and roles Figure 2 is mixing state, entities, and so on. Also the direction of arrows is confusing to me. For example, I expect sign and verify to act in distinct directions. No clear to me how to read this diagram. # Concretely CURRENT (S.5.1): Transparency Services MUST feature a Verifiable Data Structure. What does concretely mean? # Maintain CURRENT (S.5.1.1): Transparency Services MUST maintain Registration Policies. What does this concretely imply? # is there any value to notify the change to any other entity in the architecture when such event happens/planned? CURRENT (S.5.1.1.2): The operator of a Transparency Service MAY update the Registration Policy or the trust anchors of a Transparency Service at any time. # Enough information CURRENT (S.5.1.1.2): Transparency Services MUST ensure that for any Signed Statement they register, enough information is made available to Auditors to reproduce the Registration checks that were defined by the Registration Policies at the time of Registration. Can we list a minimum information to be logged and made available? # Standard COSE implem CURRENT (S.6): Once all the Envelope headers are set, an Issuer MUST use a standard COSE implementation to produce an appropriately serialized Signed Statement. That is? Cheers, Med |
|
2025-09-12
|
20 | Mohamed Boucadair | [Ballot Position Update] New position, No Objection, has been recorded for Mohamed Boucadair |
|
2025-09-10
|
20 | Chris Lonvick | Request for IETF Last Call review by SECDIR Completed: Ready. Reviewer: Chris Lonvick. Sent review to list. |
|
2025-09-10
|
20 | Ines Robles | Request for Telechat review by IOTDIR is assigned to Gonzalo Salgueiro |
|
2025-09-10
|
20 | Ines Robles | Assignment of request for Telechat review by IOTDIR to Terry Manderson was rejected |
|
2025-09-08
|
20 | Ines Robles | Request for Telechat review by IOTDIR is assigned to Terry Manderson |
|
2025-09-08
|
20 | Ines Robles | Assignment of request for Telechat review by IOTDIR to Jason Livingood was rejected |
|
2025-09-08
|
20 | Deb Cooley | Closed request for Telechat review by HTTPDIR with state 'Withdrawn': Being conservative, I was following up on the review by Darrel... I didn't realize that … Closed request for Telechat review by HTTPDIR with state 'Withdrawn': Being conservative, I was following up on the review by Darrel... I didn't realize that the authors had pretty much removed all of that text. Apologies. |
|
2025-09-07
|
20 | Deb Cooley | Requested Telechat review by HTTPDIR |
|
2025-09-06
|
20 | Ines Robles | Request for Telechat review by IOTDIR is assigned to Jason Livingood |
|
2025-09-06
|
20 | Ines Robles | Assignment of request for Telechat review by IOTDIR to Hannes Tschofenig was rejected |
|
2025-09-03
|
20 | Ines Robles | Request for Telechat review by IOTDIR is assigned to Hannes Tschofenig |
|
2025-09-03
|
20 | Éric Vyncke | Requested Telechat review by IOTDIR |
|
2025-09-02
|
20 | Cindy Morgan | Placed on agenda for telechat - 2025-09-18 |
|
2025-09-02
|
20 | Henk Birkholz | New version available: draft-ietf-scitt-architecture-20.txt |
|
2025-09-02
|
20 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
|
2025-09-02
|
20 | Henk Birkholz | Uploaded new revision |
|
2025-09-01
|
19 | Deb Cooley | Ballot has been issued |
|
2025-09-01
|
19 | Deb Cooley | [Ballot Position Update] New position, Yes, has been recorded for Deb Cooley |
|
2025-09-01
|
19 | Deb Cooley | Created "Approve" ballot |
|
2025-09-01
|
19 | Deb Cooley | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
|
2025-09-01
|
19 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
|
2025-09-01
|
19 | Henk Birkholz | New version available: draft-ietf-scitt-architecture-19.txt |
|
2025-09-01
|
19 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
|
2025-09-01
|
19 | Henk Birkholz | Uploaded new revision |
|
2025-08-29
|
18 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
|
2025-08-28
|
18 | Roni Even | Request for IETF Last Call review by GENART Completed: Ready with Nits. Reviewer: Roni Even. Sent review to list. |
|
2025-08-22
|
18 | Tero Kivinen | Request for IETF Last Call review by SECDIR is assigned to Chris Lonvick |
|
2025-08-21
|
18 | David Dong | IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK |
|
2025-08-21
|
18 | David Dong | IANA Experts State changed to Expert Reviews OK from Issues identified |
|
2025-08-21
|
18 | David Dong | The CoAP Content-Formats registrations have been approved. |
|
2025-08-20
|
18 | David Dong | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
|
2025-08-20
|
18 | David Dong | IANA Experts State changed to Issues identified from Reviews assigned |
|
2025-08-20
|
18 | David Dong | the registration request explicitly requests IDs in the 0-255 range, without providing any reasoning why this range needs to be chosen. There is also no … the registration request explicitly requests IDs in the 0-255 range, without providing any reasoning why this range needs to be chosen. There is also no use of the content-format specified over CoAP described anywhere in this document - so a reason for requiring a short (0-255) Content-Format ID is also not clear from the protocol's usage. If there's no strong reason for a short ID I would suggest to update the document to request from the 256-9999 range, which is the usual/default choice for drafts going through the IETF review process. Of course it could be that a short ID is required to minimize the COSE object size - e.g. if the CoAP Content-Format ID happens to be encoded in a COSE header parameter, or tag, or so. I'm speculating here. If this is the case then the WG/authors should motivate this request better. This could be done either in the draft, or in this email thread (no preference for me). The request itself looks correct - it's only the range that looks (?) incorrect. |
|
2025-08-19
|
18 | David Dong | IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-scitt-architecture-18. If any part of this review is inaccurate, please let us know. IANA understands that, upon … IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-scitt-architecture-18. If any part of this review is inaccurate, please let us know. IANA understands that, upon approval of this document, there are three actions which we must complete. First, in the COSE Header Parameters registry in the CBOR Object Signing and Encryption (COSE) registry group located at: https://www.iana.org/assignments/cose/ the existing temporary assignment of: Name: receipts Label: 394 Value Type: array Value Registry: Description: Priority ordered sequence of CBOR encoded Receipts will be made permanent and its reference changed to [ RFC-to-be ]. Second, in the application namespace of the Media Types registry located at: https://www.iana.org/assignments/media-types/ two new registrations will be made as follows: Name: statement+cose Template: [ TBD-at-Registration ] Reference: [ RFC-to-be ] Name: receipt+cose Template: [ TBD-at-Registration ] Reference: [ RFC-to-be ] Third, in the CoAP Content-Formats registry in the Constrained RESTful Environments (CoRE) Parameters registry group located at: https://www.iana.org/assignments/core-parameters/ two new registrations are to be made as follows: Content Type: application/scitt-statement+cose Content Coding: Media Type: ID: [ TBD-at-Registration ] Reference: [ RFC-to-be ] Content Type: application/scitt-receipt+cose Content Coding: Media Type: ID: [ TBD-at-Registration ] Reference: [ RFC-to-be ] IANA understands that the authors have suggested IDs of 103 and 104 for these registrations. As this document requests registrations in an Expert Review or Specification Required (see RFC 8126) registry, we have initiated the required Expert Review via a separate request. This review must be completed before the document's IANA state can be changed to "IANA OK." We understand that these are the only actions required to be completed upon approval of this document. NOTE: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, David Dong IANA Services Sr. Specialist |
|
2025-08-19
|
18 | Barry Leiba | Request for IETF Last Call review by ARTART is assigned to Tara Whalen |
|
2025-08-18
|
18 | Jean Mahoney | Request for IETF Last Call review by GENART is assigned to Roni Even |
|
2025-08-15
|
18 | David Dong | IANA Experts State changed to Reviews assigned |
|
2025-08-15
|
18 | Morgan Condie | IANA Review state changed to IANA - Review Needed |
|
2025-08-15
|
18 | Morgan Condie | The following Last Call announcement was sent out (ends 2025-08-29): From: The IESG To: IETF-Announce CC: amchamay@microsoft.com, debcooley1@gmail.com, draft-ietf-scitt-architecture@ietf.org, scitt-chairs@ietf.org, scitt@ietf.org … The following Last Call announcement was sent out (ends 2025-08-29): From: The IESG To: IETF-Announce CC: amchamay@microsoft.com, debcooley1@gmail.com, draft-ietf-scitt-architecture@ietf.org, scitt-chairs@ietf.org, scitt@ietf.org Reply-To: last-call@ietf.org Sender: Subject: Last Call: (An Architecture for Trustworthy and Transparent Digital Supply Chains) to Proposed Standard The IESG has received a request from the Supply Chain Integrity, Transparency, and Trust WG (scitt) to consider the following document: - 'An Architecture for Trustworthy and Transparent Digital Supply Chains' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2025-08-29. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract Traceability in supply chains is a growing security concern. While verifiable data structures have addressed specific issues, such as equivocation over digital certificates, they lack a universal architecture for all supply chains. This document proposes a scalable architecture for single-issuer signed statement transparency applicable to any supply chain. It ensures flexibility, interoperability between different transparency services, and compliance with various auditing procedures and regulatory requirements. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-scitt-architecture/ No IPR declarations have been submitted directly on this I-D. |
|
2025-08-15
|
18 | Morgan Condie | IESG state changed to In Last Call from Last Call Requested |
|
2025-08-15
|
18 | Deb Cooley | Last call was requested |
|
2025-08-15
|
18 | Deb Cooley | Last call announcement was generated |
|
2025-08-15
|
18 | Deb Cooley | Ballot approval text was generated |
|
2025-08-15
|
18 | Deb Cooley | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
|
2025-08-15
|
18 | Henk Birkholz | New version available: draft-ietf-scitt-architecture-18.txt |
|
2025-08-15
|
18 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
|
2025-08-15
|
18 | Henk Birkholz | Uploaded new revision |
|
2025-08-14
|
17 | Deb Cooley | Ballot writeup was changed |
|
2025-08-12
|
17 | Henk Birkholz | New version available: draft-ietf-scitt-architecture-17.txt |
|
2025-08-12
|
17 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
|
2025-08-12
|
17 | Henk Birkholz | Uploaded new revision |
|
2025-08-12
|
16 | (System) | Changed action holders to Deb Cooley (IESG state changed) |
|
2025-08-12
|
16 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
|
2025-08-12
|
16 | Henk Birkholz | New version available: draft-ietf-scitt-architecture-16.txt |
|
2025-08-12
|
16 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
|
2025-08-12
|
16 | Henk Birkholz | Uploaded new revision |
|
2025-08-01
|
15 | Deb Cooley | Comments can be found here: https://mailarchive.ietf.org/arch/msg/scitt/1Ojjb1ffnBBD_j578HI4MjzwhHM/ |
|
2025-08-01
|
15 | (System) | Changed action holders to Antoine Delignat-Lavaud, Henk Birkholz, Yogesh Deshpande, Cedric Fournet, Steve Lasker (IESG state changed) |
|
2025-08-01
|
15 | Deb Cooley | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation |
|
2025-07-30
|
15 | Deb Cooley | Ballot writeup was changed |
|
2025-07-20
|
15 | Henk Birkholz | New version available: draft-ietf-scitt-architecture-15.txt |
|
2025-07-20
|
15 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
|
2025-07-20
|
15 | Henk Birkholz | Uploaded new revision |
|
2025-07-04
|
14 | Henk Birkholz | New version available: draft-ietf-scitt-architecture-14.txt |
|
2025-07-04
|
14 | Henk Birkholz | New version approved |
|
2025-07-04
|
14 | (System) | Request for posting confirmation emailed to previous authors: Antoine Delignat-Lavaud , Cedric Fournet , Henk Birkholz , Steve Lasker , Yogesh Deshpande |
|
2025-07-04
|
14 | Henk Birkholz | Uploaded new revision |
|
2025-07-02
|
13 | Deb Cooley | IESG state changed to AD Evaluation from Publication Requested |
|
2025-07-02
|
13 | Deb Cooley | Ballot writeup was changed |
|
2025-06-18
|
13 | Henk Birkholz | New version available: draft-ietf-scitt-architecture-13.txt |
|
2025-06-18
|
13 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
|
2025-06-18
|
13 | Henk Birkholz | Uploaded new revision |
|
2025-06-17
|
12 | Christopher Inacio | # Shepherd Writeup for ietf-wg-scitt/draft-ietf-scitt-architecture ## Document History ### Was the document considered in any WG, and if so, why was it not adopted as … # Shepherd Writeup for ietf-wg-scitt/draft-ietf-scitt-architecture ## Document History ### Was the document considered in any WG, and if so, why was it not adopted as a work item there? No, the document was created and only considered by the SCITT WG. ### Was there controversy about particular points that caused the WG to not adopt the document? No. ### Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. ### For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as RFC 7942 recommends) or elsewhere (where)? I am aware of three implementations of the contents of the document, from Datatrails [0], Tradeverifyed [1] (formerly Transmute Industries), and Microsoft [2], all Open Source. Other parties have expressed an interest in implementing it as well, for example Dick Brooks, from Business Cyber Guardian [3]. [0] https://www.datatrails.ai [1] https://tradeverifyd.com [2] https://www.microsoft.com [3] https://businesscyberguardian.com ## Additional Reviews ### Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. Yes, the contents of the document closely interact with COSE, and COSE Receipts in particular, in the scope of the COSE Working Group. The document would likely benefit from their review, which I have requested. ### Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. The document contains two requests for IANA Media Type allocations that require formal expert review. If the document contains a YANG module, has the final version of the module been checked with any of the recommended validation tools for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC 8342? The document does not contain a YANG module. It contains CDDL schema snippets, which have been checked with the cddlc tool. ### Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. The document contains EDN and CDDL snippets, which have been reviewed by the Working Group and by the cddlc validation tool. ## Document Shepherd Checks ### Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? The shepherd believes that the document is needed, clearly written, complete and correctly designed. It is ready to be handed off to the responsible Area Director. ### Several IETF Areas have assembled lists of common issues that their reviewers encounter. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? There was a substantial amount of discussion around Security, some of which were resolved by using a known signing format with provision for agility (COSE). Discussion took place around steps that service operators could take to secure their instances, and converged on a clear, minimal text. The definition of the bytes to be signed was discussed extensively, and the tradeoffs and benefits of including unprotected headers weighed at length, before consensus was reached. Statement identification and references were also discussed, but consensus could not be reached, and it was agreed that it may be addressed in a separate, later document. ### What type of RFC publication is being requested on the IETF stream (Best Current Practice, Proposed Standard, Internet Standard, Informational, Experimental or Historic)? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? The intended type is Proposed Standard, because the document describes a data format for the purpose of interoperability, and uses BCP14 language. Implementations have moved past the experimental stage. The Datatracker does reflect the correct RFC status. ### Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in BCP 79? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. I have obtained confirmation by email from all authors that they have fulfilled their IPR disclosure obligations. To the best of my knowledge, no disclosure is necessary for this document. ### Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. All authors, editors and contributors have confirmed in email their willingness to be listed as such. ### Document any remaining I-D nits in this document. Simply running the idnits tool is not enough; please review the "Content Guidelines" on authors.ietf.org. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) There are no remaining idnits, they have all been addressed. ### Should any informative references be normative or vice-versa? See the IESG Statement on Normative and Informative References. No. ### List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All normative references are freely available and have been available to the community for over a year. ### Are there any normative downward references (see RFC 3967 and BCP 97) that are not already listed in the DOWNREF registry? If so, list them. There are no normative downward references in this document. ### Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? Yes, there are normative references to I-D.draft-ietf-cose-merkle-tree-proofs (COSE WG), which was delayed by re-chartering, and on which feedback from a first round of reviews is being addressed. There is also a normative reference to I-D.draft-ietf-scitt-scrapi (SCITT WG), which is waiting for submission to the IESG. ### Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. The publication of this document will not change the status of any existing RFCs. ### Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see RFC 8126). No new registries are created. The Media Type registry is clearly identified, the Media Type assignments are being submitted. ### The IANA considerations section is consistent with the body of the document, and calls for minimal but necessary assignments. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. This document does not establish any new registries. |
|
2025-06-17
|
12 | Christopher Inacio | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
|
2025-06-17
|
12 | Christopher Inacio | IESG state changed to Publication Requested from I-D Exists |
|
2025-06-17
|
12 | (System) | Changed action holders to Deb Cooley (IESG state changed) |
|
2025-06-17
|
12 | Christopher Inacio | Responsible AD changed to Deb Cooley |
|
2025-06-17
|
12 | Christopher Inacio | Document is now in IESG state Publication Requested |
|
2025-06-17
|
12 | Christopher Inacio | Tag Doc Shepherd Follow-up Underway cleared. |
|
2025-06-16
|
12 | Amaury Chamayou | # Shepherd Writeup for ietf-wg-scitt/draft-ietf-scitt-architecture ## Document History ### Was the document considered in any WG, and if so, why was it not adopted as … # Shepherd Writeup for ietf-wg-scitt/draft-ietf-scitt-architecture ## Document History ### Was the document considered in any WG, and if so, why was it not adopted as a work item there? No, the document was created and only considered by the SCITT WG. ### Was there controversy about particular points that caused the WG to not adopt the document? No. ### Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. ### For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as RFC 7942 recommends) or elsewhere (where)? I am aware of three implementations of the contents of the document, from Datatrails [0], Tradeverifyed [1] (formerly Transmute Industries), and Microsoft [2], all Open Source. Other parties have expressed an interest in implementing it as well, for example Dick Brooks, from Business Cyber Guardian [3]. [0] https://www.datatrails.ai [1] https://tradeverifyd.com [2] https://www.microsoft.com [3] https://businesscyberguardian.com ## Additional Reviews ### Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. Yes, the contents of the document closely interact with COSE, and COSE Receipts in particular, in the scope of the COSE Working Group. The document would likely benefit from their review, which I have requested. ### Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. The document contains two requests for IANA Media Type allocations that require formal expert review. If the document contains a YANG module, has the final version of the module been checked with any of the recommended validation tools for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC 8342? The document does not contain a YANG module. It contains CDDL schema snippets, which have been checked with the cddlc tool. ### Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. The document contains EDN and CDDL snippets, which have been reviewed by the Working Group and by the cddlc validation tool. ## Document Shepherd Checks ### Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? The shepherd believes that the document is needed, clearly written, complete and correctly designed. It is ready to be handed off to the responsible Area Director. ### Several IETF Areas have assembled lists of common issues that their reviewers encounter. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? There was a substantial amount of discussion around Security, some of which were resolved by using a known signing format with provision for agility (COSE). Discussion took place around steps that service operators could take to secure their instances, and converged on a clear, minimal text. The definition of the bytes to be signed was discussed extensively, and the tradeoffs and benefits of including unprotected headers weighed at length, before consensus was reached. Statement identification and references were also discussed, but consensus could not be reached, and it was agreed that it may be addressed in a separate, later document. ### What type of RFC publication is being requested on the IETF stream (Best Current Practice, Proposed Standard, Internet Standard, Informational, Experimental or Historic)? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? The intended type is Proposed Standard, because the document describes a data format for the purpose of interoperability, and uses BCP14 language. Implementations have moved past the experimental stage. The Datatracker does reflect the correct RFC status. ### Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in BCP 79? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. I have obtained confirmation by email from all authors that they have fulfilled their IPR disclosure obligations. To the best of my knowledge, no disclosure is necessary for this document. ### Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. All authors, editors and contributors have confirmed in email their willingness to be listed as such. ### Document any remaining I-D nits in this document. Simply running the idnits tool is not enough; please review the "Content Guidelines" on authors.ietf.org. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) There are no remaining idnits, they have all been addressed. ### Should any informative references be normative or vice-versa? See the IESG Statement on Normative and Informative References. No. ### List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All normative references are freely available and have been available to the community for over a year. ### Are there any normative downward references (see RFC 3967 and BCP 97) that are not already listed in the DOWNREF registry? If so, list them. There are no normative downward references in this document. ### Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? Yes, there are normative references to I-D.draft-ietf-cose-merkle-tree-proofs (COSE WG), which was delayed by re-chartering, and on which feedback from a first round of reviews is being addressed. There is also a normative reference to I-D.draft-ietf-scitt-scrapi (SCITT WG), which is waiting for submission to the IESG. ### Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. The publication of this document will not change the status of any existing RFCs. ### Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see RFC 8126). No new registries are created. The Media Type registry is clearly identified, the Media Type assignments are being submitted. ### The IANA considerations section is consistent with the body of the document, and calls for minimal but necessary assignments. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. This document does not establish any new registries. |
|
2025-06-13
|
12 | Amaury Chamayou | # Shepherd Writeup for ietf-wg-scitt/draft-ietf-scitt-architecture ## Document History ### Was the document considered in any WG, and if so, why was it not adopted as … # Shepherd Writeup for ietf-wg-scitt/draft-ietf-scitt-architecture ## Document History ### Was the document considered in any WG, and if so, why was it not adopted as a work item there? No, the document was created and only considered by the SCITT WG. ### Was there controversy about particular points that caused the WG to not adopt the document? No. ### Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. ### For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as RFC 7942 recommends) or elsewhere (where)? I am aware of three implementations of the contents of the document, from Datatrails, Transmute Industries, and Microsoft, all Open Source. Other parties have expressed an interest in implementing it as well, for example Dick Brooks, from Business Cyberguardian. ## Additional Reviews ### Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. Yes, the contents of the document closely interact with COSE, and COSE Receipts in particular, in the scope of the COSE Working Group. The document would likely benefit from their review, which I have requested. ### Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. The document contains two requests for IANA Media Type allocations that require formal expert review. If the document contains a YANG module, has the final version of the module been checked with any of the recommended validation tools for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC 8342? The document does not contain a YANG module. It contains CDDL schema snippets, which have been checked with the cddlc tool. ### Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. The document contains EDN and CDDL snippets, which have been reviewed by the Working Group and by the cddlc validation tool. ## Document Shepherd Checks ### Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? The shepherd believes that the document is needed, clearly written, complete and correctly designed. It is ready to be handed off to the responsible Area Director. ### Several IETF Areas have assembled lists of common issues that their reviewers encounter. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? There was a substantial amount of discussion around Security, some of which were resolved by using a known signing format with provision for agility (COSE). Discussion took place around steps that service operators could take to secure their instances, and converged on a clear, minimal text. The definition of the bytes to be signed was discussed extensively, and the tradeoffs and benefits of including unprotected headers weighed at length, before consensus was reached. Statement identification and references were also discussed, but consensus could not be reached, and it was agreed that it may be addressed in a separate, later document. ### What type of RFC publication is being requested on the IETF stream (Best Current Practice, Proposed Standard, Internet Standard, Informational, Experimental or Historic)? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? The intended type is Proposed Standard, because the document describes a data format for the purpose of interoperability, and uses BCP14 language. Implementations have moved past the experimental stage. The Datatracker does reflect the correct RFC status. ### Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in BCP 79? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. I have obtained confirmation by email from all authors that they have fulfilled their IPR disclosure obligations. To the best of my knowledge, no disclosure is necessary for this document. ### Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. All authors, editors and contributors have confirmed in email their willingness to be listed as such. ### Document any remaining I-D nits in this document. Simply running the idnits tool is not enough; please review the "Content Guidelines" on authors.ietf.org. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) There are no remaining idnits, they have all been addressed. ### Should any informative references be normative or vice-versa? See the IESG Statement on Normative and Informative References. No. ### List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All normative references are freely available and have been available to the community for over a year. ### Are there any normative downward references (see RFC 3967 and BCP 97) that are not already listed in the DOWNREF registry? If so, list them. There are no normative downward references in this document. ### Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? Yes, there are normative references to I-D.draft-ietf-cose-merkle-tree-proofs (COSE WG), which was delayed by re-chartering, and on which feedback from a first round of reviews is being addressed. There is also a normative reference to I-D.draft-ietf-scitt-scrapi (SCITT WG), which is waiting for submission to the IESG. ### Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. The publication of this document will not change the status of any existing RFCs. ### Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see RFC 8126). No new registries are created. The Media Type registry is clearly identified, the Media Type assignments are being submitted. ### The IANA considerations section is consistent with the body of the document, and calls for minimal but necessary assignments. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. This document does not establish any new registries. |
|
2025-06-12
|
12 | Jon Geater | Changed consensus to Yes from Unknown |
|
2025-06-12
|
12 | Jon Geater | Intended Status changed to Proposed Standard from None |
|
2025-06-12
|
12 | Jon Geater | Tag Doc Shepherd Follow-up Underway set. |
|
2025-06-12
|
12 | Jon Geater | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
|
2025-05-28
|
12 | Christopher Inacio | Notification list changed to amchamay@microsoft.com because the document shepherd was set |
|
2025-05-28
|
12 | Christopher Inacio | Document shepherd changed to Amaury Chamayou |
|
2025-05-13
|
12 | Christopher Inacio | This document has had significantly broad review and participation in drafting it. The chairs are still giving 3-weeks to do last call on this document … This document has had significantly broad review and participation in drafting it. The chairs are still giving 3-weeks to do last call on this document and progress it out of the WG. If you haven't already filed your git issue and submitted your pull request on this draft, now is the time!! Chris and Jon |
|
2025-05-13
|
12 | Christopher Inacio | IETF WG state changed to In WG Last Call from WG Document |
|
2025-05-08
|
12 | Henk Birkholz | New version available: draft-ietf-scitt-architecture-12.txt |
|
2025-05-08
|
12 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
|
2025-05-08
|
12 | Henk Birkholz | Uploaded new revision |
|
2025-03-03
|
11 | Steve Lasker | New version available: draft-ietf-scitt-architecture-11.txt |
|
2025-03-03
|
11 | Henk Birkholz | New version approved |
|
2025-03-03
|
11 | (System) | Request for posting confirmation emailed to previous authors: Antoine Delignat-Lavaud , Cedric Fournet , Henk Birkholz , Steve Lasker , Yogesh Deshpande |
|
2025-03-03
|
11 | Steve Lasker | Uploaded new revision |
|
2024-11-13
|
10 | Steve Lasker | New version available: draft-ietf-scitt-architecture-10.txt |
|
2024-11-13
|
10 | Steve Lasker | New version approved |
|
2024-11-13
|
10 | (System) | Request for posting confirmation emailed to previous authors: Antoine Delignat-Lavaud , Cedric Fournet , Henk Birkholz , Steve Lasker , Yogesh Deshpande |
|
2024-11-13
|
10 | Steve Lasker | Uploaded new revision |
|
2024-10-15
|
09 | Steve Lasker | New version available: draft-ietf-scitt-architecture-09.txt |
|
2024-10-15
|
09 | Steve Lasker | New version approved |
|
2024-10-15
|
09 | (System) | Request for posting confirmation emailed to previous authors: Antoine Delignat-Lavaud , Cedric Fournet , Henk Birkholz , Steve Lasker , Yogesh Deshpande |
|
2024-10-15
|
09 | Steve Lasker | Uploaded new revision |
|
2024-07-22
|
08 | Henk Birkholz | New version available: draft-ietf-scitt-architecture-08.txt |
|
2024-07-22
|
08 | Steve Lasker | New version approved |
|
2024-07-22
|
08 | (System) | Request for posting confirmation emailed to previous authors: Antoine Delignat-Lavaud , Cedric Fournet , Henk Birkholz , Steve Lasker , Yogesh Deshpande |
|
2024-07-22
|
08 | Henk Birkholz | Uploaded new revision |
|
2024-07-08
|
07 | Henk Birkholz | New version available: draft-ietf-scitt-architecture-07.txt |
|
2024-07-08
|
07 | Steve Lasker | New version approved |
|
2024-07-08
|
07 | (System) | Request for posting confirmation emailed to previous authors: Antoine Delignat-Lavaud , Cedric Fournet , Henk Birkholz , Steve Lasker , Yogesh Deshpande |
|
2024-07-08
|
07 | Henk Birkholz | Uploaded new revision |
|
2024-07-08
|
07 | (System) | Request for posting confirmation emailed to previous authors: Antoine Delignat-Lavaud , Cedric Fournet , Henk Birkholz , Steve Lasker , Yogesh Deshpande |
|
2024-07-08
|
07 | Henk Birkholz | Uploaded new revision |
|
2024-03-18
|
06 | Jon Geater | Added to session: IETF-119: scitt Thu-2330 |
|
2024-03-04
|
06 | Steve Lasker | New version available: draft-ietf-scitt-architecture-06.txt |
|
2024-03-04
|
06 | Steve Lasker | New version accepted (logged-in submitter: Steve Lasker) |
|
2024-03-04
|
06 | Steve Lasker | Uploaded new revision |
|
2024-02-10
|
05 | Orie Steele | Changed document external resources from: None to: github_repo https://github.com/ietf-wg-scitt/draft-ietf-scitt-architecture |
|
2024-02-09
|
05 | Steve Lasker | New version available: draft-ietf-scitt-architecture-05.txt |
|
2024-02-09
|
05 | Steve Lasker | New version accepted (logged-in submitter: Steve Lasker) |
|
2024-02-09
|
05 | Steve Lasker | Uploaded new revision |
|
2023-10-23
|
04 | Henk Birkholz | New version available: draft-ietf-scitt-architecture-04.txt |
|
2023-10-23
|
04 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
|
2023-10-23
|
04 | Henk Birkholz | Uploaded new revision |
|
2023-10-16
|
03 | Steve Lasker | New version available: draft-ietf-scitt-architecture-03.txt |
|
2023-10-16
|
03 | Hannes Tschofenig | New version approved |
|
2023-10-16
|
03 | (System) | Request for posting confirmation emailed to previous authors: Antoine Delignat-Lavaud , Cedric Fournet , Henk Birkholz , Steve Lasker , Yogesh Deshpande , scitt-chairs@ietf.org |
|
2023-10-16
|
03 | Steve Lasker | Uploaded new revision |
|
2023-07-10
|
02 | Henk Birkholz | New version available: draft-ietf-scitt-architecture-02.txt |
|
2023-07-10
|
02 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
|
2023-07-10
|
02 | Henk Birkholz | Uploaded new revision |
|
2023-04-24
|
01 | Darrel Miller | Request for Early review by HTTPDIR Completed: On the Right Track. Reviewer: Darrel Miller. Sent review to list. Submission of review completed at an earlier … Request for Early review by HTTPDIR Completed: On the Right Track. Reviewer: Darrel Miller. Sent review to list. Submission of review completed at an earlier date. |
|
2023-04-24
|
01 | Darrel Miller | Request for Early review by HTTPDIR Completed: On the Right Track. Reviewer: Darrel Miller. |
|
2023-03-27
|
01 | Mark Nottingham | Request for Early review by HTTPDIR is assigned to Darrel Miller |
|
2023-03-27
|
01 | Mark Nottingham | Requested Early review by HTTPDIR |
|
2023-03-13
|
01 | Henk Birkholz | New version available: draft-ietf-scitt-architecture-01.txt |
|
2023-03-13
|
01 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
|
2023-03-13
|
01 | Henk Birkholz | Uploaded new revision |
|
2022-12-08
|
00 | Henk Birkholz | This document now replaces draft-birkholz-scitt-architecture instead of None |
|
2022-12-08
|
00 | Henk Birkholz | New version available: draft-ietf-scitt-architecture-00.txt |
|
2022-12-08
|
00 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
|
2022-12-08
|
00 | Henk Birkholz | Uploaded new revision |