Skip to main content

Multi-party Chat Using the Message Session Relay Protocol (MSRP)
draft-ietf-simple-chat-18

Revision differences

Document history

Date Rev. By Action
2015-11-12
18 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2015-10-26
18 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2015-10-21
18 (System) RFC Editor state changed to RFC-EDITOR from AUTH
2015-10-16
18 (System) RFC Editor state changed to AUTH from REF
2015-10-14
18 (System) RFC Editor state changed to REF from EDIT
2015-10-14
18 (System) Notify list changed from simple-chairs@ietf.org, draft-ietf-simple-chat@ietf.org to (None)
2015-09-08
18 (System) RFC Editor state changed to EDIT from MISSREF
2015-04-10
18 (System) RFC Editor state changed to MISSREF from EDIT
2015-04-10
18 (System) RFC Editor state changed to EDIT from MISSREF
2013-01-25
18 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2013-01-25
18 Cindy Morgan State changed to RFC Ed Queue from Approved-announcement sent
2013-01-25
18 (System) IANA Action state changed to Waiting on RFC Editor from Waiting on Authors
2013-01-24
18 (System) IANA Action state changed to Waiting on Authors from In Progress
2013-01-24
18 (System) IANA Action state changed to In Progress
2013-01-24
18 Amy Vezza State changed to Approved-announcement sent from Approved-announcement to be sent
2013-01-24
18 Amy Vezza IESG has approved the document
2013-01-24
18 Amy Vezza Closed "Approve" ballot
2013-01-24
18 Amy Vezza State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2013-01-24
18 Amy Vezza Ballot approval text was generated
2013-01-17
18 Robert Sparks Verifying the -18 changes with the SIMPLE working group
2013-01-17
18 Martin Stiemerling [Ballot comment]
Thank you for addressing my concerns.
2013-01-17
18 Martin Stiemerling [Ballot Position Update] Position for Martin Stiemerling has been changed to No Objection from Discuss
2013-01-13
18 Stephen Farrell [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss
2013-01-13
18 Miguel García New version available: draft-ietf-simple-chat-18.txt
2012-12-10
17 Martin Stiemerling
[Ballot discuss]
Updated based on -17:

1)
This question isn't answered to some extend:
How should an MSRP node react to them, e.g., how to …
[Ballot discuss]
Updated based on -17:

1)
This question isn't answered to some extend:
How should an MSRP node react to them, e.g., how to deal with nodes that are constantly overloaded by receiving messages?
The current text assumes that this is an temporary issue, but what it is not temporarily? E.g., the particular interface is down? A link to any other place in the document describing the desired behavior would suffice .

2) Picking up this point below (also related to Wes' comments)
" In order to  inform the user of the congestion, the MSRP switch can send a regular MSRP message indicating the user that some messages are discarded due to network congestion."

In what direction do you send this message? Back to the originator of the message or down the congested path? Please clarify this in the text.

Further: How can a piece of software learn from the chat messages (e.g., an error code or similar) that congestion is occurring?
2012-12-10
17 Martin Stiemerling Ballot comment and discuss text updated for Martin Stiemerling
2012-11-19
17 Sean Turner [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss
2012-11-19
17 Adrian Farrel [Ballot comment]
Thanks, this is a well-written and easy-to-read document, and thanks for
the work to address my Discuss and Comments.
2012-11-19
17 Adrian Farrel [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss
2012-11-18
17 Stephen Farrell
[Ballot discuss]
-17 resolves my discusses except for #2

1. cleared

2. p13, SHOULD start the distribution process as soon as the
first chunk is …
[Ballot discuss]
-17 resolves my discusses except for #2

1. cleared

2. p13, SHOULD start the distribution process as soon as the
first chunk is received is a potential DoS vector. How is that
mitigated? I think adding a sentence or reference to the
security considerations would be enough here, e.g. saying that
servers SHOULD implement some sanity checking in such cases.
MSRP's security considerations say it can't be used as a DoS
amplifier, but I guess this can based on the above.  (This is
similar to, but not the same as, Adrian's last discuss point.)

In -17 I do see the pointer from p15 (was p13) to the
security considerations, but I don't see a warning about
DoS in section 11, here's a suggestion:

"A chat room is by its nature a potential Denial-of-Service
(DoS) accellerator as it takes a message from one entity and
sends that to many. Implementers of both UAs and switches
need to carefully consider the set of anti-DoS measures
that are appropriate for this application and switch
implementations in particular ought to include appropriate
anti-DoS features. The details of what is appropriate will
vary over time and will also depend on the specific needs
of the implementation and so cannot be specified here."

3. cleared

4. Cleared. This AD is sometimes dim:-)

5. cleared
2012-11-18
17 Stephen Farrell Ballot comment and discuss text updated for Stephen Farrell
2012-11-18
17 Barry Leiba
[Ballot comment]
I was very much on the fence about whether to ballot ABSTAIN or NO OBJECTION.  It's clear that a lot has happened in …
[Ballot comment]
I was very much on the fence about whether to ballot ABSTAIN or NO OBJECTION.  It's clear that a lot has happened in the eight and a half years since this larva hatched, and the five since it pupated as a working group document.  I don't think the result is a butterfly; rather, it's been overtaken by events, and I'm not at all sure that it's best for the Internet to standardize this.  There are lots of instant messaging systems out there, and picking yet another about which to say, "This is a Proposed Standard," is questionable, I think.  In the end, because this isn't defining the IM system from the start, but is layering chat-room function on top of what's already there, and because it's been implemented, I've decided to go with NO OBJECTION.

To be clear: None of that internal debate I was having with myself had anything to do with the quality of the document.  It's a fine document, well written, and I appreciate the time spent on it over the many years.  We frequently have documents that are so long in the making that we don't want to abandon them, and this is only one.  So carry on, and I have no official objection to seeing this finished.

Version -17 addresses the two minor editorial items I had; thanks.
2012-11-18
17 Barry Leiba Ballot comment text updated for Barry Leiba
2012-11-17
17 (System) Sub state has been changed to AD Followup from Revised ID Needed
2012-11-17
17 Miguel García New version available: draft-ietf-simple-chat-17.txt
2012-09-25
16 Suresh Krishnan Request for Telechat review by GENART Completed: Ready. Reviewer: Suresh Krishnan.
2012-09-13
16 Tero Kivinen Request for Telechat review by SECDIR Completed: Ready with Nits. Reviewer: Vincent Roca.
2012-09-13
16 Cindy Morgan State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation
2012-09-13
16 Wesley Eddy [Ballot Position Update] Position for Wesley Eddy has been changed to No Objection from Discuss
2012-09-13
16 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo
2012-09-13
16 Benoît Claise [Ballot comment]
I'll trust the 5 DISCUSS from my IESG fellows on this document.
2012-09-13
16 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2012-09-12
16 Wesley Eddy
[Ballot discuss]
Section 1 says:

  Similar conferences supporting chat rooms are already available
  today.  For example, Internet Relay Chat (IRC) [RFC2810], …
[Ballot discuss]
Section 1 says:

  Similar conferences supporting chat rooms are already available
  today.  For example, Internet Relay Chat (IRC) [RFC2810], Extensible
  Messaging and Presence Protocol (XMPP): Core [RFC6120] based chat
  rooms, and many other proprietary systems provide chat room
  functionality.  Specifying equivalent functionality for MSRP-based
  systems provides competitive features and enables interworking
  between the systems.

I do not think this document enables interworking; at least I don't think there's sufficient information here to justify that claim.  Further, I don't think the motivation given here suffices to do yet-another-messaging-protocol, simply because N others already exist.  Particularly, with regards to existing IETF Standards Track protocols, I think there needs to be better motivation for adding yet another.

It might help me clear if there was some description of how this is being used in practice or whether people really are doing interworking.
2012-09-12
16 Wesley Eddy
[Ballot comment]
My comments are related to the congestion avoidance section.  I think it needs to be tweaked somewhat, as the recommendations are not really …
[Ballot comment]
My comments are related to the congestion avoidance section.  I think it needs to be tweaked somewhat, as the recommendations are not really effective.  However, I don't feel the need to make this a DISCUSS, because in the end, the authors are right that TCP is protecting the network paths ... the only downside to doing things poorly (i.e. using the current recommendations in the document) is suboptimal performance in the application.  So it will be in the WG's best interest to improve this, but it won't cause the Internet to fail.

Section 6.4, in the first paragraph, I think the motivations are misguided.  The issue is not fast or slow paths, but rather the total loading of traffic on the paths from this and other applications.  Also note that the messaging applications do not really send at any "rate", since message flow is highly asynchronous.  I believe that the buffers discussed in this section need to be sized such that nominal bursts of messages can be accommodated arriving asynchronously, and with the understanding the overly large buffers in comparison to the link rate will create excessive delay to be shared by all other messages on that TCP connection due to head-of-line blocking.

The first suggestion of sending messages to let a destination know that it's TCP connection is congested seems to be a bit counter-productive.  It's equivalent to sending emails to someone to inform them that their inbox is full.

Also not that inferring congestion via the length of the TCP send buffer is not quite so easy to do as the document assumes.  First of all, the send buffer's length is not part of the typical TCP API, so you're likely going to need OS-specific ways of accessing this.  Further, all this means is that you have pending data, not that there's actually congestion on the network path which is causing losses.  You could be getting serious congestion and losses without the send buffer growing to the high-water mark defined, or due to a limited advertised receive window, you could be throttled by the receiving application and not losing packets at all inside the network.
2012-09-12
16 Wesley Eddy [Ballot Position Update] New position, Discuss, has been recorded for Wesley Eddy
2012-09-12
16 Sean Turner
[Ballot discuss]
1) REQ-4 and S8: I'm confused by the following in s8:

For example, a participant would like to learn if the
MSRP switch …
[Ballot discuss]
1) REQ-4 and S8: I'm confused by the following in s8:

For example, a participant would like to learn if the
MSRP switch supports private messaging, otherwise, the participant
may send what he believes is a private instant message addressed to a
participant, but since the MSRP switch does not support the functions
specified in this memo, the message gets eventually distributed to
all the participants of the chat room.

Aren't servers required to support private messages?  I get that clients might not support 'em, but based on REQ-4 don't servers have to support 'em?
2012-09-12
16 Sean Turner
[Ballot comment]
1) So this is probably a .0001% case (maybe need some more zeros there :), but it might be worth mentioning that clients …
[Ballot comment]
1) So this is probably a .0001% case (maybe need some more zeros there :), but it might be worth mentioning that clients who use TLS client side certificates with real names in the certificates won't be anonymous to whatever server they connect to.  The name in the certificate might not get used by the MSDP protocol but the server will have the certificate with an actual name in it.

2) s8: Had trouble parsing the following:

In this type of extensions, are must be
taken in the selection of the token to avoid a clash with any of the
tokens previously defined.
2012-09-12
16 Sean Turner [Ballot Position Update] New position, Discuss, has been recorded for Sean Turner
2012-09-11
16 Pete Resnick
[Ballot comment]
5.2:

  The conference focus of a chat room MUST learn the chat room
  capabilities of each participant that joins the chat …
[Ballot comment]
5.2:

  The conference focus of a chat room MUST learn the chat room
  capabilities of each participant that joins the chat room.  The
  conference focus MUST inform the MSRP switch of such support in order
  to prevent the MSRP switch from distributing private messages to
  participants who do not support private messaging.

The first MUST is superfluous. Try this instead:

  The conference focus of a chat room MUST inform the MSRP switch of
  the chat room capabilities of each participant that joins the chat
  room in order to prevent the MSRP switch from distributing private
  messages to participants who do not support private messaging.

There are a few other examples of such superfluous uses below, but I'm sure I didn't catch all of them. Please review for places where the 2119 keyword is being used (incorrectly) for a description of the behavior instead of (correctly) for the protocol requirement.
 
6.1:

  The actual instant message
  payload MUST be included as payload of the 'Message/CPIM' wrapper

Silly MUST. Instead: "The payload of the 'Message/CPIM' wrapper will be the actual instant message payload."

  An MSRP switch that uses this fast forwarding procedure MUST
  temporarily store the Message-Id of the MSRP message to correlate the
  different chunks, as well as it MUST temporarily store the list of
  recipients to which the initial chunks were delivered.

Why does the switch have to store the Message-Ids and recipients? Is it so that it can figure out which recipients got which messages? If so, then these are not protocol requirements. In order to accomplish the protocol requirement ("SHOULD forward subsequent chunks only to..."), the switch "will need to" store these things.

  An MSRP endpoint that receives a SEND request from the MSRP switch
  containing a Message/CPIM wrapper SHOULD first inspect the To header
  field of the Message/CPIM wrapper.  If the To header field is set to
  the chat room URI, it should render it as a regular message that has
  been distributed to all the participants in the chat room.  Then the
  MSRP endpoint SHOULD inspect the From header field of the Message/
  CPIM wrapper to identify the sender.

Why SHOULD the endpoint inspect the headers? Again, I suspect that the *inspection* is not the protocol requirement. I'm not even sure I know what is in this paragraph.

6.2:

  Then the MSRP switch MUST inspect the To header field of the Message/
  CPIM wrapper.

Superfluous sentence, let alone superfluous MUST. Delete.

  Then the MSRP switch MUST verify
  that the To header of the Message/CPIM wrapper matches the URI of a
  participant of the chat room.

Same as above.

  Finally, the MSRP switch MUST verify that the recipient supports
  private messages.

Same as above.

  It is RECOMMENDED that the MSRP switch can map a
  URI to two or more MSRP sessions.

It is "RECOMMENDED" that the switch "can" do something? That doesn't make sense.

6.3:

  MSRP switches MUST follow the success report and failure report
  handling described in section 7 of RFC 4975 [RFC4975], complemented
  with the procedures described in this section.  The MSRP switch MUST
  act as an MSRP endpoint receiver of the request according to section
  5.3 of RFC 4975 [RFC4975].

Wouldn't this be better as:

  The MSRP switch is an MSRP endpoint receiver of the report requests
  as described in section 5.3 of 4975 and will follow the report
  handling procedures described in section 7 of 4975, complemented with
  the procedures described in this section.
 
7:

First it says:

  Therefore, if a user joins the
  chat room under the same URI from multiple devices, he or she may
  request the same nickname across all these devices.
 
Then it says:

  This memo specifies the nickname as a string.  The nickname string
  MUST be unambiguous within the scope of the chat room (conference
  instance).

These two statements seem like they are in conflict. I think a bit more explaining is in order. Can I use the same nickname across all devices or can't I?
 
7.1:

  This mitigates the problem of nickname duplication, but it does not
  solve a problem whereby users can choose similar (but different)
  characters to represent two different nicknames.  For example, "BOY"
  and "B0Y" are different nicknames which can mislead users.  The
  former uses the capital letter "O" while the latter uses the number
  zero "0".  In many fonts the letter "O" and the number zero "0" might
  be quite similar, and difficult to be perceived as different
  characters.  Chat rooms MAY provide a mechanism to mitigate
  confusable nicknames.

I don't see how this discussion is really necessary. Whether confusables are an issue at all is a completely implementation specific detail, not a protocol issue.

  In addition to preparing and comparing following the rules above, the
  MSRP switch SHOULD validate that the SIP AOR identifying the user is
  entitled to reserve the nickname.  This may include, e.g., allowing
  that the participant's URI may use the same nickname when the
  participant has joined the chat room from different devices under the
  same URI.
 
The protocol requirement is not to validate that the user is entitled to reserve the nickname. The protocol requirement is that the MSRP switch SHOULD only allow the registration of a duplicate nickname if the same user that is currently using the nickname is making the second request. As written, this is confusing.

  If the MSRP switch is able to accept the suggested nickname to be
  used by this user, the MSRP switch MUST answer the NICKNAME request
  with a 200 response as per regular MSRP procedures.

MUST? No, I think that's a MAY. Why would it be a MUST?
2012-09-11
16 Pete Resnick [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick
2012-09-11
16 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded for Russ Housley
2012-09-11
16 Stephen Farrell
[Ballot discuss]
These should all be very easy discuss points to resolve.

1. 5.2, what is an "anonymous URI"? What kind of anonymity is
being …
[Ballot discuss]
These should all be very easy discuss points to resolve.

1. 5.2, what is an "anonymous URI"? What kind of anonymity is
being provided here? I think you need at least a reference or
else to get rid of the paragraph or else provide more text
that says how it might work so that a client could implement
it with a reasonable expectation that a server will be ok with
it.

2. p13, SHOULD start the distribution process as soon as the
first chunk is received is a potential DoS vector. How is that
mitigated? I think adding a sentence or reference to the
security considerations would be enough here, e.g. saying that
servers SHOULD implement some sanity checking in such cases.
MSRP's security considerations say it can't be used as a DoS
amplifier, but I guess this can based on the above.  (This is
similar to, but not the same as, Adrian's last discuss point.)

3. Where are the security considerations about unsafe content?
E.g. HTML scripts that are phishing attempts. Again, I think a
reference to some other document or small bit of text is
needed.

4. Cleared. This AD is sometimes dim:-)

5. (Promoted from a comment at the request of an author, so
it gets tracked.)
Everyone sends an 'accept-types' attribute, right?  Is it
clear what happens if an IM containing a CPIM containing a
payload with a MIME type that's not supported everywhere is
sent to all?
2012-09-11
16 Stephen Farrell
[Ballot comment]
- I agree with Adrian's first discuss point about the need to
better reference or describe how policy stuff can be done
here. …
[Ballot comment]
- I agree with Adrian's first discuss point about the need to
better reference or describe how policy stuff can be done
here.

- Don't we prefer one protocol for each thing in general, so
why not say that? That is, shouldn't we say somewhere that, in
general, folks ought use XMPP but that this protocol is useful
for SIP-oriented deployments? (Apologies if I've stirred a
hornet's nest but I think we prefer XMPP, based on our own
usage at least.)

- section 1: Saying that this "provides competitive features"
to XMPP seems wrong, I'd suggest deleting that phrase.

- section 1: it wasn't clear to me if "interop" here is being
used just for SIMPLE clients and servers or more broadly to
mean interop with other chat services, in particular XMPP.  I
assume you mean the former.

- section 1: Is the last sentence saying this is a short-term
solution only or that this is something that'll be available
soon? The latter would be fine (if true) but the former would
seem problematic without more warnings for implementers about
when they may need to replace this.

- section 2: it might be good to note explicitly that a
"private" IM is seen by the server and isn't only seen by the
sender and recipient.

- section 3 talks about the "identifier" of a sender or
recipient, but that's not a term defined in section 2. It'd be
better to clarify that I think.

- s4, p10: s/is logged/is logged in/ and do you need to define
what you mean by "logged in" in section 2? (Not sure, its
fairly clear I think, but this is the first time you've said I
can be connected more than once.)


- last para of section 8: Just noting that I expected the
extension to be called "foo.chat" given the reversal of
example.com. Is the text correct?

- Section 8: should you note that implementations cannot
assume anything about similar private extension names because
they won't know which bit is the DNS name and which is the
extension name?  i.e. uk.co.bbc.foo.bar and ie.tcd.foo.bar
don't tell me that both are doing foo.bar (or bar.foo;-)
2012-09-11
16 Stephen Farrell Ballot comment and discuss text updated for Stephen Farrell
2012-09-11
16 Stephen Farrell
[Ballot discuss]

These should all be very easy discuss points to resolve.

1. 5.2, what is an "anonymous URI"? What kind of anonymity is
being …
[Ballot discuss]

These should all be very easy discuss points to resolve.

1. 5.2, what is an "anonymous URI"? What kind of anonymity is
being provided here? I think you need at least a reference or
else to get rid of the paragraph or else provide more text
that says how it might work so that a client could implement
it with a reasonable expectation that a server will be ok with
it.

2. p13, SHOULD start the distribution process as soon as the
first chunk is received is a potential DoS vector. How is that
mitigated? I think adding a sentence or reference to the
security considerations would be enough here, e.g. saying that
servers SHOULD implement some sanity checking in such cases.
MSRP's security considerations say it can't be used as a DoS
amplifier, but I guess this can based on the above.  (This is
similar to, but not the same as, Adrian's last discuss point.)

3. Where are the security considerations about unsafe content?
E.g. HTML scripts that are phishing attempts. Again, I think a
reference to some other document or small bit of text is
needed.

4. Cleared. This AD is sometimes dim:-)
2012-09-11
16 Stephen Farrell
[Ballot comment]
- I agree with Adrian's first discuss point about the need to
better reference or describe how policy stuff can be done
here. …
[Ballot comment]
- I agree with Adrian's first discuss point about the need to
better reference or describe how policy stuff can be done
here.

- Don't we prefer one protocol for each thing in general, so
why not say that? That is, shouldn't we say somewhere that, in
general, folks ought use XMPP but that this protocol is useful
for SIP-oriented deployments? (Apologies if I've stirred a
hornet's nest but I think we prefer XMPP, based on our own
usage at least.)

- section 1: Saying that this "provides competitive features"
to XMPP seems wrong, I'd suggest deleting that phrase.

- section 1: it wasn't clear to me if "interop" here is being
used just for SIMPLE clients and servers or more broadly to
mean interop with other chat services, in particular XMPP.  I
assume you mean the former.

- section 1: Is the last sentence saying this is a short-term
solution only or that this is something that'll be available
soon? The latter would be fine (if true) but the former would
seem problematic without more warnings for implementers about
when they may need to replace this.

- section 2: it might be good to note explicitly that a
"private" IM is seen by the server and isn't only seen by the
sender and recipient.

- section 3 talks about the "identifier" of a sender or
recipient, but that's not a term defined in section 2. It'd be
better to clarify that I think.

- s4, p10: s/is logged/is logged in/ and do you need to define
what you mean by "logged in" in section 2? (Not sure, its
fairly clear I think, but this is the first time you've said I
can be connected more than once.)

- Everyone sends an 'accept-types' attribute, right?  Is it
clear what happens if an IM containing a CPIM containing a
payload with a MIME type that's not supported everywhere is
sent to all?

- last para of section 8: Just noting that I expected the
extension to be called "foo.chat" given the reversal of
example.com. Is the text correct?

- Section 8: should you note that implementations cannot
assume anything about similar private extension names because
they won't know which bit is the DNS name and which is the
extension name?  i.e. uk.co.bbc.foo.bar and ie.tcd.foo.bar
don't tell me that both are doing foo.bar (or bar.foo;-)
2012-09-11
16 Stephen Farrell Ballot comment and discuss text updated for Stephen Farrell
2012-09-11
16 Ralph Droms
[Ballot comment]
A small but important matter - my compliments to the document shepherd
for the well-written and comprehensive description of the working
group process …
[Ballot comment]
A small but important matter - my compliments to the document shepherd
for the well-written and comprehensive description of the working
group process and document review for this document, and for the due
diligence I infer on the part of the document shepherd in preparing
the writeup and document for IESG review.
2012-09-11
16 Ralph Droms Ballot comment text updated for Ralph Droms
2012-09-11
16 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded for Ralph Droms
2012-09-11
16 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded for Stewart Bryant
2012-09-10
16 Ron Bonica [Ballot comment]
supporting Adrian's DISCUSS
2012-09-10
16 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded for Ronald Bonica
2012-09-10
16 Martin Stiemerling
[Ballot discuss]
I have no general concerns with this draft, but one discuss issue:

Section 6.4.  Congestion Avoidance

I am not sure that you are …
[Ballot discuss]
I have no general concerns with this draft, but one discuss issue:

Section 6.4.  Congestion Avoidance

I am not sure that you are really discussing congestion in the sense of network path congestion (including end hosts), but this is more about overload handling at MSRP nodes IMHO. It is a different level where the congestion can occur, i.e., in the MSRP application. A cause for  congestion at this level can be a congested network path.

The reasons are that there are number of cases why message(s) to a certain MSRP receiver/agent cannot be delivered, e.g., :
- TCP cannot deliver in-time, as the network path or the receiving system are congested

- the particular interface is down

- the IP address used for the TCP connection is just gone

- the DNS resolution for the FQDN in the SIP URI just takes too long

- (as you noted) the sender is sending with a rate that cannot be received by a receiver

- the at other end is overwhelmed with the processing of the messages


How should an MSRP node react to them, e.g., how to deal with nodes that are constantly overloaded by receiving messages?

Did you actually check back with the SIP overload control work?

This said, a section about overload handling is good to have.
2012-09-10
16 Martin Stiemerling Ballot discuss text updated for Martin Stiemerling
2012-09-10
16 Martin Stiemerling
[Ballot discuss]
I have no general concerns with this draft, but one discuss issue:

Section 6.4.  Congestion Avoidance

I am not sure that you are …
[Ballot discuss]
I have no general concerns with this draft, but one discuss issue:

Section 6.4.  Congestion Avoidance

I am not sure that you are really discussing congestion in the sense of network path congestion (including end hosts), but this is more about overload handling at MSRP nodes IMHO. It is a different level where the congestion can occur, i.e., in the MSRP application. A cause for  congestion at this level can be a congested network path.

The reasons are that there are number of cases why message(s) to a certain MSRP receiver/agent cannot be delivered, e.g., :
- TCP cannot deliver in-time, as the network path or the receiving system are congested
- the particular interface is down
- the IP address used for the TCP connection is just gone
- the DNS resolution for the FQDN in the SIP URI just takes too long
- (as you noted) the sender is sending with a rate that cannot be received by a receiver
- the at other end is overwhelmed with the processing of the messages

How should an MSRP node react to them, e.g., how to deal with nodes that are constantly overloaded by receiving messages?

Did you actually check back with the SIP overload control work?

This said, a section about overload handling is good to have.
2012-09-10
16 Martin Stiemerling
[Ballot comment]
Section 2., paragraph 8:

>    Recipient:  the destination chat room participant(s).  This defaults
>      to the full conference participant list …
[Ballot comment]
Section 2., paragraph 8:

>    Recipient:  the destination chat room participant(s).  This defaults
>      to the full conference participant list minus the IM Sender.

  Expand 'IM' on first use.

>    REQ-2:  A recipient of an instant message in a chat room must be able
>            to determine the identifier of the sender of the message.
>            Note that the actual identifier depends on the one which was
>            used by the sender when he or she joined the chat room.

  A complete nuts nit: what if the sender isn't he or she, but
  a sensor? Also interesting in conjunction with Section 6.4, i..e. how to tell such a machine to stop sending?
2012-09-10
16 Martin Stiemerling [Ballot Position Update] New position, Discuss, has been recorded for Martin Stiemerling
2012-09-10
16 Stephen Farrell
[Ballot discuss]


These should all be very easy discuss points to resolve.

1. 5.2, what is an "anonymous URI"? What kind of anonymity is
being …
[Ballot discuss]


These should all be very easy discuss points to resolve.

1. 5.2, what is an "anonymous URI"? What kind of anonymity is
being provided here? I think you need at least a reference or
else to get rid of the paragraph or else provide more text
that says how it might work so that a client could implement
it with a reasonable expectation that a server will be ok with
it.

2. p13, SHOULD start the distribution process as soon as the
first chunk is received is a potential DoS vector. How is that
mitigated? I think adding a sentence or reference to the
security considerations would be enough here, e.g. saying that
servers SHOULD implement some sanity checking in such cases.
MSRP's security considerations say it can't be used as a DoS
amplifier, but I guess this can based on the above.  (This is
similar to, but not the same as, Adrian's last discuss point.)

3. Where are the security considerations about unsafe content?
E.g. HTML scripts that are phishing attempts. Again, I think a
reference to some other document or small bit of text is
needed.

4. Can a valid conference participant send a message with
a From: field containing the identifier (e.g. AOR) of another
valid conference participant and have that work? I don't
think this is just down to "policy," but presumably just
MUST NOT work, right?
2012-09-10
16 Stephen Farrell
[Ballot comment]

- I agree with Adrian's first discuss point about the need to
better reference or describe how policy stuff can be done
here. …
[Ballot comment]

- I agree with Adrian's first discuss point about the need to
better reference or describe how policy stuff can be done
here.

- Don't we prefer one protocol for each thing in general, so
why not say that? That is, shouldn't we say somewhere that, in
general, folks ought use XMPP but that this protocol is useful
for SIP-oriented deployments? (Apologies if I've stirred a
hornet's nest but I think we prefer XMPP, based on our own
usage at least.)

- section 1: Saying that this "provides competitive features"
to XMPP seems wrong, I'd suggest deleting that phrase.

- section 1: it wasn't clear to me if "interop" here is being
used just for SIMPLE clients and servers or more broadly to
mean interop with other chat services, in particular XMPP.  I
assume you mean the former.

- section 1: Is the last sentence saying this is a short-term
solution only or that this is something that'll be available
soon? The latter would be fine (if true) but the former would
seem problematic without more warnings for implementers about
when they may need to replace this.

- section 2: it might be good to note explicitly that a
"private" IM is seen by the server and isn't only seen by the
sender and recipient.

- section 3 talks about the "identifier" of a sender or
recipient, but that's not a term defined in section 2. It'd be
better to clarify that I think.

- s4, p10: s/is logged/is logged in/ and do you need to define
what you mean by "logged in" in section 2? (Not sure, its
fairly clear I think, but this is the first time you've said I
can be connected more than once.)

- Everyone sends an 'accept-types' attribute, right?  Is it
clear what happens if an IM containing a CPIM containing a
payload with a MIME type that's not supported everywhere is
sent to all?

- last para of section 8: Just noting that I expected the
extension to be called "foo.chat" given the reversal of
example.com. Is the text correct?

- Section 8: should you note that implementations cannot
assume anything about similar private extension names because
they won't know which bit is the DNS name and which is the
extension name?  i.e. uk.co.bbc.foo.bar and ie.tcd.foo.bar
don't tell me that both are doing foo.bar (or bar.foo;-)
2012-09-10
16 Stephen Farrell [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell
2012-09-06
16 Jean Mahoney Request for Telechat review by GENART is assigned to Suresh Krishnan
2012-09-06
16 Jean Mahoney Request for Telechat review by GENART is assigned to Suresh Krishnan
2012-09-06
16 Jean Mahoney Assignment of request for Telechat review by GENART to Christer Holmberg was rejected
2012-09-06
16 Jean Mahoney Request for Telechat review by GENART is assigned to Christer Holmberg
2012-09-06
16 Jean Mahoney Request for Telechat review by GENART is assigned to Christer Holmberg
2012-09-04
16 Barry Leiba
[Ballot comment]
I was very much on the fence about whether to ballot ABSTAIN or NO OBJECTION.  It's clear that a lot has happened in …
[Ballot comment]
I was very much on the fence about whether to ballot ABSTAIN or NO OBJECTION.  It's clear that a lot has happened in the eight and a half years since this larva hatched, and the five since it pupated as a working group document.  I don't think the result is a butterfly; rather, it's been overtaken by events, and I'm not at all sure that it's best for the Internet to standardize this.  There are lots of instant messaging systems out there, and picking yet another about which to say, "This is a Proposed Standard," is questionable, I think.  In the end, because this isn't defining the IM system from the start, but is layering chat-room function on top of what's already there, and because it's been implemented, I've decided to go with NO OBJECTION.

To be clear: None of that internal debate I was having with myself had anything to do with the quality of the document.  It's a fine document, well written, and I appreciate the time spent on it over the many years.  We frequently have documents that are so long in the making that we don't want to abandon them, and this is only one.  So carry on, and I have no official objection to seeing this finished.

Apart from what Adrian caught, there's one very minor editorial thing that I noticed while I was reviewing:

-- Section 11 --

  If a participant wants to avoid eavesdropping, the participant's MSRP
  client can send the messages over a TLS [RFC5246] transport
  connection, as allowed by MSRP.  It's up to the policy of the MSRP
  switch if the messages are forwarded to the other participant's in
  the chat room using TLS [RFC5246] transport.

The first clause is ambiguous, and when I first read it I thought it was talking about the participant not wanting to *be* the eavesdropper.  I suggest re-wording it.  While you're at it, you can take that stray apostrophe out of "participants" at the end.

Oh, also... In Section 12, I know that at least one of the Contributors has changed affiliations.  Have you checked with them to make sure the affiliations you list are what they want to have there now?
2012-09-04
16 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2012-09-04
16 Brian Haberman [Ballot comment]
I have no problems with the publication of this well-written document.  I do support Adrian's first two DISCUSS points.
2012-09-04
16 Brian Haberman [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman
2012-09-04
16 Adrian Farrel
[Ballot discuss]
Thanks, this is a well-written and easy-to-read document. Just a couple
(well, three) of small issues that I would like to Discuss.

--- …
[Ballot discuss]
Thanks, this is a well-written and easy-to-read document. Just a couple
(well, three) of small issues that I would like to Discuss.

---

Surpised that there are no requirements on authetication or control of
admission to chat rooms. Was this topic discussed by the WG and left out
on purpose (in which case we should add a note to that effect), was it
forgotten (in which case we should address it), or is it not relevant
for this type of chat (in which case you just need to explain it to me)?

I would assume that the INVITE can be policed in some way. The best I
could find was in Section 5.2

  Participants usually join the chat room by sending an INVITE request
  to the chat room URI.  As long as the chat room policy allows, the
  INVITE request is accepted by the focus and the user is brought into
  the actual chat room.

Indeed, there are several mentions of things being allowed according to
chat-room policy, but no wider discussion of the full set of policy
attributes, or how chat room policy is set.

---

Section 6.1

  On sending a regular message the sender MUST populate the To header
  of the Message/CPIM wrapper with the URI of the chat room.  The
  sender SHOULD populate the From header of the Message/CPIM wrapper
  with a proper identifier by which the user is recognized in the chat
  room.

I'm uncomfortable with the "SHOULD" here. It implies that you can think
of a good reason why the sender MAY use some other (improper) identifier
or no identifier at all. Can you either give an example (perhaps: "The
sender MAY set an arbitrary and meaningless value in order to hide its
identitiy"), or tighten the SHOULD to a MUST.

---

Section 6.1

  An MSRP
  switch that uses this fast forwarding procedure MUST temporarily
  store the Message-Id of the MSRP message to correlate the different
  chunks, as well as it MUST temporarily store the list of recipients
  to which the initial chunks were delivered.

The motivaiton is clear. I think you could add that the storage can be
released when the last chunk is seen. But what happens when the last
chunk is not seen (or delayed)? How temporary is the storage, and how is
it released?

Or do we assume that because MSRP uses TCP (or similar) that loss will
always be accompanied by connection failure and so that is the only
trigger needed to abandon temporary storage?
2012-09-04
16 Adrian Farrel
[Ballot comment]
Section 4

  In order to enter a chat room, one must first be created.

Obviously, I spend to much time hanging out …
[Ballot comment]
Section 4

  In order to enter a chat room, one must first be created.

Obviously, I spend to much time hanging out with the Queen, but when you
say "one must be created" I suspect you meant the chat room, not one's
self. Maybe reword as...
   
Before a chat room can be entered, it must be created.

---

Section 6.1 (trivial nit)

  The SEND request MUST contain a top-level wrapper of type 'Message/
  CPIM' according to RFC 3862 [RFC3862].  The actual instant message
  payload MUST be included as payload of the 'Message/CPIM' wrapper and
  MAY be of any type negotiated in the SDP 'accept-types' attribute
  according to the MSRP rules.

I think s/MAY/may/. That is, a type must be set, and the type must be
only one of those that has been negotiated.
2012-09-04
16 Adrian Farrel [Ballot Position Update] New position, Discuss, has been recorded for Adrian Farrel
2012-08-30
16 Tero Kivinen Request for Telechat review by SECDIR is assigned to Vincent Roca
2012-08-30
16 Tero Kivinen Request for Telechat review by SECDIR is assigned to Vincent Roca
2012-08-27
16 Robert Sparks Placed on agenda for telechat - 2012-09-13
2012-08-27
16 Robert Sparks State changed to IESG Evaluation from Waiting for AD Go-Ahead::External Party
2012-08-27
16 Robert Sparks Ballot has been issued
2012-08-27
16 Robert Sparks [Ballot Position Update] New position, Yes, has been recorded for Robert Sparks
2012-08-27
16 Robert Sparks Created "Approve" ballot
2012-08-27
16 Robert Sparks Ballot writeup was changed
2012-08-27
16 Robert Sparks Updated shepherd writeup at
2012-08-27
16 Ben Campbell Changed shepherd to Ben Campbell
2012-08-27
16 Ben Campbell Changed protocol writeup
2012-08-16
16 Miguel García New version available: draft-ietf-simple-chat-16.txt
2012-07-19
15 Robert Sparks Will be talking with the Apps area about the plan for finishing one of this draft's normative dependencies at IETF 84.
2012-07-19
15 Robert Sparks State changed to Waiting for AD Go-Ahead::External Party from Waiting for AD Go-Ahead::AD Followup
2012-07-13
15 (System) Sub state has been changed to AD Followup from Revised ID Needed
2012-07-13
15 Geir Sandbakken New version available: draft-ietf-simple-chat-15.txt
2012-05-03
14 Gonzalo Camarillo Responsible AD changed to Robert Sparks from Gonzalo Camarillo
2012-04-11
14 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Vincent Roca.
2012-03-20
14 Gonzalo Camarillo State changed to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead::AD Followup
2012-03-01
14 (System) Sub state has been changed to AD Followup from Revised ID Needed
2012-03-01
14 Miguel García New version available: draft-ietf-simple-chat-14.txt
2012-02-27
13 Suresh Krishnan Request for Last Call review by GENART Completed. Reviewer: Suresh Krishnan.
2012-02-16
13 Martin Stiemerling Request for Last Call review by TSVDIR Completed. Reviewer: Cullen Jennings.
2012-02-16
13 Christer Holmberg Request for Last Call review by GENART Completed. Reviewer: Christer Holmberg.
2012-02-13
13 Gonzalo Camarillo State changed to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead.
2012-02-10
13 Jean Mahoney Request for Last Call review by GENART is assigned to Suresh Krishnan
2012-02-10
13 Jean Mahoney Request for Last Call review by GENART is assigned to Suresh Krishnan
2012-02-07
13 Amanda Baber
IANA understands that, upon approval of this document, there are four
actions which need to be completed.

First, in the MSRP Methods registry in the …
IANA understands that, upon approval of this document, there are four
actions which need to be completed.

First, in the MSRP Methods registry in the Message Session Relay
Protocol (MSRP) Parameters registry located at:

http://www.iana.org/assignments/msrp-parameters/msrp-parameters.xml

a new method is to be added to the registry as follows:

Description: NICKNAME
Reference: [ RFC-to-be ]

Second, in the MSRP Header Fields registry also located in the Message
Session Relay Protocol (MSRP) Parameters registry located at:

http://www.iana.org/assignments/msrp-parameters/msrp-parameters.xml

a new header field is to be added as follows:

Description: Use-Nickname
Reference: [ RFC-to-be ]

Third, in the MSRP Status Codes registry also located in the Message
Session Relay Protocol (MSRP) Parameters registry located at:

http://www.iana.org/assignments/msrp-parameters/msrp-parameters.xml

three new status codes are to be added as follows:

Value: 404
Description: Failure to resolve recipient's URI
Reference: [ RFC-to-be ]

Value: 423
Description: Unable to allocate requested nickname
Reference: [ RFC-to-be ]

Value: 428
Description: Private messages not supported
Reference: [ RFC-to-be ]

Fourth, in the SDP media level only attribute registry (att-field (media
level only)) located in the Session Description Protocol (SDP)
Parameters located at:

www.iana.org/assignments/sdp-parameters/sdp-parameters.xml

a new attribute will be added as follows:

Type: att-field (media level only)
SDP Name: chatroom
Reference: [ RFC-to-be ]

IANA understands these to be the only actions required upon approval of
this document.
2012-02-06
13 (System) State changed to Waiting for AD Go-Ahead from In Last Call.
2012-02-03
13 Martin Stiemerling Request for Last Call review by TSVDIR is assigned to Cullen Jennings
2012-02-03
13 Martin Stiemerling Request for Last Call review by TSVDIR is assigned to Cullen Jennings
2012-01-27
13 Samuel Weiler Request for Last Call review by SECDIR is assigned to Vincent Roca
2012-01-27
13 Samuel Weiler Request for Last Call review by SECDIR is assigned to Vincent Roca
2012-01-26
13 Jean Mahoney Request for Last Call review by GENART is assigned to Christer Holmberg
2012-01-26
13 Jean Mahoney Request for Last Call review by GENART is assigned to Christer Holmberg
2012-01-23
13 Amy Vezza Last call sent
2012-01-23
13 Amy Vezza
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: …
State changed to In Last Call from Last Call Requested.

The following Last Call Announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (Multi-party Chat Using the Message Session Relay Protocol (MSRP)) to Proposed Standard


The IESG has received a request from the SIP for Instant Messaging and
Presence Leveraging Extensions WG (simple) to consider the following
document:
- 'Multi-party Chat Using the Message Session Relay Protocol (MSRP)'
  as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2012-02-06. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  The Message Session Relay Protocol (MSRP) defines a mechanism for
  sending instant messages within a peer-to-peer session, negotiated
  using the Session Initiation Protocol (SIP) and the Session
  Description Protocol (SDP).  This document defines the necessary
  tools for establishing multi-party chat sessions, or chat rooms,
  using MSRP.


Note that This document has a downward reference to RFC 4353.
Please comment during the last call on the appropriateness of
this downref.

The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-simple-chat/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-simple-chat/


No IPR declarations have been submitted directly on this I-D.


2012-01-23
13 Gonzalo Camarillo Last Call was requested
2012-01-23
13 Gonzalo Camarillo State changed to Last Call Requested from Publication Requested.
2012-01-23
13 Gonzalo Camarillo Last Call text changed
2012-01-23
13 (System) Ballot writeup text was added
2012-01-23
13 (System) Last call text was added
2012-01-23
13 (System) Ballot approval text was added
2012-01-23
13 (System) New version available: draft-ietf-simple-chat-13.txt
2011-12-19
13 Cindy Morgan
PROTO writeup for http://tools.ietf.org/id/draft-ietf-simple-chat-12.txt : "Multi-party Chat Using the Message Session Relay Protocol"


  (1.a)  Who is the Document Shepherd for this document?  Has the …
PROTO writeup for http://tools.ietf.org/id/draft-ietf-simple-chat-12.txt : "Multi-party Chat Using the Message Session Relay Protocol"


  (1.a)  Who is the Document Shepherd for this document?  Has the
        Document Shepherd personally reviewed this version of the
        document and, in particular, does he or she believe this
        version is ready for forwarding to the IESG for publication?

The document shepherd for this document is Ben Campbell.

The document has been reviewed and is ready for forwarding to IESG for
publication.


  (1.b)  Has the document had adequate review both from key WG members
        and from key non-WG members?  Does the Document Shepherd have
        any concerns about the depth or breadth of the reviews that
        have been performed?

The document has quite a bit of review over its lifespan in the SIMPLE
work group. It lists Eva Leppanen, Adamu Haruna, Adam Roach, Matt
Lepinski, Mary Barnes, Ben Campbell, Paul Kyzivat, Adrianv Georgescu,
and Nancy Greene as reviewers in the acknowledgments.

The document has undergone an MMUSIC expert review by Flemming
Andreasen, since it contains SDP extensions.

The Document Shepherd does not have concerns about the depth or breadth
of the reviews.


  (1.c)  Does the Document Shepherd have concerns that the document
        needs more review from a particular or broader perspective,
        e.g., security, operational complexity, someone familiar with
        AAA, internationalization, or XML?

The document should undergo the usual Gen-ART review. But otherwise the
Document Shepherd does not have concerns over the level and breadth of
review for this document.


  (1.d)  Does the Document Shepherd have any specific concerns or
        issues with this document that the Responsible Area Director
        and/or the IESG should be aware of?  For example, perhaps he
        or she is uncomfortable with certain parts of the document, or
        has concerns whether there really is a need for it.  In any
        event, if the WG has discussed those issues and has indicated
        that it still wishes to advance the document, detail those
        concerns here.  Has an IPR disclosure related to this document
        been filed?  If so, please include a reference to the
        disclosure and summarize the WG discussion and conclusion on
        this issue.

The shepherd has previously argued that the nickname management
extension to MSRP is in fact a signaling or control function that should
be handled in the control layer, not as part of the media stream. This
was extensively discussed in the working group, and the consensus was to
keep the nickname management extension as described in this document.
The shepherd accepts the consensus.

  (1.e)  How solid is the WG consensus behind this document?  Does it
        represent the strong concurrence of a few individuals, with
        others being silent, or does the WG as a whole understand and
        agree with it?

Among the people currently active in the WG there is a wide consensus
behind the document. No significant objections have been raised to this
version of the document.

However, there has been some controversy over how this work relates to
XCON. See the Working Group Summary in section 1.k, below.


  (1.f)  Has anyone threatened an appeal or otherwise indicated extreme
        discontent?  If so, please summarize the areas of conflict in
        separate email messages to the Responsible Area Director.  (It
        should be in a separate email because this questionnaire is
        entered into the ID Tracker.)

Nobody has threatened an appeal or otherwise indicated extreme
discontent.

  (1.g)  Has the Document Shepherd personally verified that the
        document satisfies all ID nits?  (See
        http://www.ietf.org/ID-Checklist.html and
        http://tools.ietf.org/tools/idnits/.)  Boilerplate checks are
        not enough; this check needs to be thorough.  Has the document
        met all formal review criteria it needs to, such as the MIB
        Doctor, media type, and URI type reviews?  If the document
        does not already indicate its intended status at the top of
        the first page, please indicate the intended status here.


The Document Shepherd believes that the document contains all needed
information. The document has undergone an MMUSIC expert review, since
it contains an SDP extension.


  (1.h)  Has the document split its references into normative and
        informative?  Are there normative references to documents that
        are not ready for advancement or are otherwise in an unclear
        state?  If such normative references exist, what is the
        strategy for their completion?  Are there normative references
        that are downward references, as described in [RFC3967]?  If
        so, list these downward references to support the Area
        Director in the Last Call procedure for them [RFC3967].

The draft contains both normative and informative references. There is a
normative downref to RFC 4353 (The conferencing framework.). This was
discussed in the working group, with a consensus that RFC 4353 was
necessary to fully understanding this document.

There are normative references to draft-ietf-xcon-common-data-model-32
and draft-ietf-xcon-event-package-01, both of which are in the RFC
editor's queue at the time of this writing.

  (1.i)  Has the Document Shepherd verified that the document's IANA
        Considerations section exists and is consistent with the body
        of the document?  If the document specifies protocol
        extensions, are reservations requested in appropriate IANA
        registries?  Are the IANA registries clearly identified?  If
        the document creates a new registry, does it define the
        proposed initial contents of the registry and an allocation
        procedure for future registrations?  Does it suggest a
        reasonable name for the new registry?  See [RFC2434].  If the
        document describes an Expert Review process, has the Document
        Shepherd conferred with the Responsible Area Director so that
        the IESG can appoint the needed Expert during IESG Evaluation?


The Document Shepherd believes that the IANA Consideration contains the
appropriate information, and is consistent with the rest of the
document.


  (1.j)  Has the Document Shepherd verified that sections of the
        document that are written in a formal language, such as XML
        code, BNF rules, MIB definitions, etc., validate correctly in
        an automated checker?

The authors indicate that the ABNF in this draft was verified with an
automatic checker.

  (1.k)  The IESG approval announcement includes a Document
        Announcement Write-Up.  Please provide such a Document
        Announcement Write-Up.  Recent examples can be found in the
        "Action" announcements for approved documents.  The approval
        announcement contains the following sections:

        Technical Summary
            Relevant content can frequently be found in the abstract
            and/or introduction of the document.  If not, this may be
            an indication that there are deficiencies in the abstract
            or introduction.

The Message Session Relay Protocol (MSRP) defines a mechanism for
sending instant messages within a peer-to-peer session, negotiated using
the Session Initiation Protocol (SIP) and the Session Description
Protocol (SDP).  This document defines the necessary tools for
establishing multi-party chat sessions, or chat rooms, using MSRP.

        Working Group Summary
            Was there anything in the WG process that is worth noting?
            For example, was there controversy about particular points
            or were there decisions where the consensus was
            particularly rough?

There has been controversy about doing this work in SIMPLE. The XCON
working group was chartered to do create similar mechanisms in a media
independent fashion. There was a compromise consensus to do this draft
in SIMPLE with the idea that, with its smaller scope, it could complete
more quickly than the XCON work, and that it would be a short-term
solution until XCON completed the more general work.

This in fact did not occur, as this draft took longer than expected due
to several editor changes. Discussion at the SIMPLE meeting at IETF75
concluded that we should capture the parts of this draft were specific
about mixing MSRP at a conference bridge, but abandon the rest in favor
of XCON. However, this conclusion did not achieve consensus when brought
it to the working group list at large.

We readdressed this on the SIMPLE list in September 2010. A few
participants strongly argued that the work should be abandoned, as it
conflicted with (now substantially complete) work in XCON. But others
(including at least one implementor) argued for completion. In
particular, several people argued that this draft enabled them to build
a light weight text-chat service without requiring all the features
enabled by XCON. Note that the XCON working group has since completed
its work and closed.

In summary, the working group originally had a consensus to complete
this work, and has not achieved a consensus to change that plan.

We had agreement to pubreq version 07 in late 2010. The shepherd found
some issues during the PROTO review. The work group discussed the
substantive changes since version 07 on list, and we believe we have a
similar consensus to pubreq version 11 without a new WGLC


        Document Quality
            Are there existing implementations of the protocol?  Have a
            significant number of vendors indicated their plan to
            implement the specification?  Are there any reviewers that
            merit special mention as having done a thorough review,
            e.g., one that resulted in important changes or a
            conclusion that the document had no substantive issues?  If
            there was a MIB Doctor, Media Type, or other Expert Review,
            what was its course (briefly)?  In the case of a Media Type
            Review, on what date was the request posted?

There are at least two existing implementations, "Blink" as a client and
"SylkServer" as a server. A few others have indicated the intent to
implement it.

        Personnel
            Who is the Document Shepherd for this document?  Who is the
            Responsible Area Director?  If the document requires IANA
            experts(s), insert 'The IANA Expert(s) for the registries
            in this document are .'

The document shepherd for this document is Ben Campbell.

The responsible Area Director is Gonzalo Camarillo.

The IANA Expert(s) for the registries in this document are .

2011-12-19
13 Cindy Morgan Draft added in state Publication Requested
2011-12-19
13 Cindy Morgan [Note]: 'Ben Campbell (ben@nostrum.com) is the document shepherd.' added
2011-12-16
12 (System) New version available: draft-ietf-simple-chat-12.txt
2011-12-04
11 (System) New version available: draft-ietf-simple-chat-11.txt
2011-09-20
10 (System) New version available: draft-ietf-simple-chat-10.txt
2011-06-03
09 (System) New version available: draft-ietf-simple-chat-09.txt
2011-03-07
08 (System) New version available: draft-ietf-simple-chat-08.txt
2010-12-02
13 (System) Document has expired
2010-05-31
07 (System) New version available: draft-ietf-simple-chat-07.txt
2010-04-08
06 (System) New version available: draft-ietf-simple-chat-06.txt
2009-10-05
05 (System) New version available: draft-ietf-simple-chat-05.txt
2009-03-09
04 (System) New version available: draft-ietf-simple-chat-04.txt
2008-10-30
03 (System) New version available: draft-ietf-simple-chat-03.txt
2008-02-04
02 (System) New version available: draft-ietf-simple-chat-02.txt
2008-01-28
01 (System) New version available: draft-ietf-simple-chat-01.txt
2007-06-14
00 (System) New version available: draft-ietf-simple-chat-00.txt