Skip to main content

Extended Key Usage (EKU) for Session Initiation Protocol (SIP) X.509 Certificates
draft-ietf-sip-eku-08

Revision differences

Document history

Date Rev. By Action
2012-08-22
08 (System) post-migration administrative database adjustment to the Yes position for Cullen Jennings
2012-08-22
08 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
08 (System) post-migration administrative database adjustment to the No Objection position for Ronald Bonica
2012-08-22
08 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2010-06-23
08 Robert Sparks Note field has been cleared by Robert Sparks
2010-06-23
08 Robert Sparks
The intended status of this changed to Experimental during IESG discussion (see the resolution of several of the DISCUSSes captured in the tracker). The status …
The intended status of this changed to Experimental during IESG discussion (see the resolution of several of the DISCUSSes captured in the tracker). The status in the tracker was not updated correctly before the approval was issued.
2010-06-23
08 Robert Sparks Intended Status has been changed to Experimental from Proposed Standard
2010-02-24
08 (System) IANA Action state changed to No IC from Waiting on ADs
2009-11-10
08 Cindy Morgan State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2009-11-10
08 (System) IANA Action state changed to Waiting on ADs from In Progress
2009-11-10
08 (System) IANA Action state changed to In Progress
2009-11-09
08 Cindy Morgan IESG state changed to Approved-announcement sent
2009-11-09
08 Cindy Morgan IESG has approved the document
2009-11-09
08 Cindy Morgan Closed "Approve" ballot
2009-10-21
08 Dan Romascanu [Ballot comment]
2009-10-21
08 Dan Romascanu [Ballot discuss]
2009-10-21
08 Dan Romascanu [Ballot Position Update] Position for Dan Romascanu has been changed to No Objection from Discuss by Dan Romascanu
2009-10-20
08 (System) New version available: draft-ietf-sip-eku-08.txt
2009-10-20
08 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Undefined by Tim Polk
2009-10-20
08 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to Undefined from Discuss by Tim Polk
2009-10-20
08 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2009-10-20
07 (System) New version available: draft-ietf-sip-eku-07.txt
2009-10-20
08 (System) Sub state has been changed to AD Follow up from New Id Needed
2009-10-20
06 (System) New version available: draft-ietf-sip-eku-06.txt
2009-07-16
08 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2009-07-16
08 Ron Bonica [Ballot Position Update] Position for Ron Bonica has been changed to No Objection from Discuss by Ron Bonica
2009-07-16
08 Tim Polk
[Ballot discuss]
The id-kp-serverAuth and id-kp-clientAuth EKU values seem an odd fit for SIP EKU, but this specification permits acceptance as a matter of local …
[Ballot discuss]
The id-kp-serverAuth and id-kp-clientAuth EKU values seem an odd fit for SIP EKU, but this specification permits acceptance as a matter of local policy.  Since there os no installed base that is already accepting these OIDs to authenticate SIP proxies, I  believe we should remove support for these OIDs.
2009-07-16
08 Cullen Jennings [Ballot Position Update] Position for Cullen Jennings has been changed to Yes from Discuss by Cullen Jennings
2009-07-16
08 Alexey Melnikov [Ballot Position Update] Position for Alexey Melnikov has been changed to No Objection from Discuss by Alexey Melnikov
2009-07-16
08 Russ Housley
[Ballot comment]
The OID needed for the ASN.1 module identifier is:
  id-mod-sip-domain-extns2007  OBJECT IDENTIFIER ::= { id-mod 62 }

  I see no reason …
[Ballot comment]
The OID needed for the ASN.1 module identifier is:
  id-mod-sip-domain-extns2007  OBJECT IDENTIFIER ::= { id-mod 62 }

  I see no reason to include id-pe and id-aca in the module.
2009-07-16
08 Russ Housley
[Ballot discuss]
It is my understanding that the installed base does not use either
  id-kp-serverAuth and id-kp-clientAuth values.  The only reason to
  include …
[Ballot discuss]
It is my understanding that the installed base does not use either
  id-kp-serverAuth and id-kp-clientAuth values.  The only reason to
  include them is to support an installed base.
2009-07-16
08 Alexey Melnikov
[Ballot comment]
Bernard Aboba  done an O&M Area review of the document which said:

Previous EKU extensions (such as [RFC 4334]) have not …
[Ballot comment]
Bernard Aboba  done an O&M Area review of the document which said:

Previous EKU extensions (such as [RFC 4334]) have not been widely
deployed, due to the additional operational complexity they would
have introduced, and the limited benefits.

Given this, and the potential interoperability impact of this document,
the Experimental classification would probably be more appropriate.
2009-07-16
08 Alexey Melnikov [Ballot discuss]
2009-07-16
08 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to Discuss from Yes by Russ Housley
2009-07-16
08 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2009-07-16
08 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded by Adrian Farrel
2009-07-16
08 Adrian Farrel
[Ballot comment]
The text says...
  Consider the SIP RFC 3261 [2] trapezoid shown in Figure 1.
...but the figure does not show a trapezoid. …
[Ballot comment]
The text says...
  Consider the SIP RFC 3261 [2] trapezoid shown in Figure 1.
...but the figure does not show a trapezoid.
I guess there is an implied dotted line between alice and bob?


No doubt Appendix A needs the BSD license applied.
2009-07-16
08 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko
2009-07-16
08 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund
2009-07-15
08 Ron Bonica [Ballot discuss]
Supporting Bernard Aboba's comments cited by Alexy
2009-07-15
08 Ron Bonica [Ballot Position Update] Position for Ron Bonica has been changed to Discuss from Undefined by Ron Bonica
2009-07-15
08 Ron Bonica [Ballot Position Update] Position for Ron Bonica has been changed to Undefined from No Objection by Ron Bonica
2009-07-15
08 Dan Romascanu
[Ballot comment]
1. I support the DISCUSS by Alexey about possibly approving this document at Experimental only, taking into accound that EKU did not enjoy …
[Ballot comment]
1. I support the DISCUSS by Alexey about possibly approving this document at Experimental only, taking into accound that EKU did not enjoy wide deployment yet

2. Section 3

"A Certificate Authority issuing a certificate whose purpose is to
bind a SIP domain identity without binding other non-SIP identities
MUST include an id-kp-SIPdomain attribute in the Extended Key Usage extension value (see Section 3.1)."

Question: What is the definition of "SIP domain identity"?  This is not included in the terminology section.

3. Section 4

"Section 7.1 of Domain Certificates in the Session Initiation Protoco [8] contains the steps for finding an identity (or a set of
identities) in an X.509 certificate for SIP.  In order to determine
whether the usage of a certificate is restricted to serve as a SIP
certificate only, implementations MUST perform the step given below as a part of the certificate validation:"

Not sure how the first sentence relates to the rest of the paragraph. Is the intent to suggest that the process for finding the identity needs to be carried out in order to make the determination?  If so, then [8] would be a normative reference.

4. "If the certificate does not contain any EKU values (the Extended Key Usage extension does not exist), it is a matter of local policy whether or not to accept the certificate for use as a SIP certificate."

There are a large number of existing certificates issued without these EKUs. In situations in which these existing certificates are expected, leaving their acceptance up to "local policy" would seem likely to create an interoperability problem.

5.  " If the certificate contains the id-kp-sipDomain EKU extension, then implementations MUST consider the certificate acceptable for use as a SIP certificate."

I presume that this means "implementations of this specification", correct? Pre-existing implementations don't know about these EKU extensions, and so will make their determination based on other factors.


6. "If EKU extension exists but does not contain any of the id-kp-sipDomain, id-kp-anyExtendedKeyUsage, id-kp-serverAuth, or id-kp-clientAuth EKU values, then implementations MUST NOT consider the certificate as acceptable for use as a SIP certificate."

Here I think you're referring to pre-existing implementations as well,
correct?
2009-07-15
08 Dan Romascanu
[Ballot discuss]
This DISCUSS and COMMENT is partly based on the OPS-DIR review performed by Bernard Aboba.


In situations where there are pre-existing certificates without …
[Ballot discuss]
This DISCUSS and COMMENT is partly based on the OPS-DIR review performed by Bernard Aboba.


In situations where there are pre-existing certificates without the EKU extensions, this specification could result in interoperability problems if the "local policy" is not carefully implemented.  One concern is that the language on "local policy" could be used by implementers to justify refusing to support existing certificate formats.

I do not think that the document adequately addresses how to manage the transition.  For example, during an interim period, it would be necessary for implementations to support both legacy certificates as well as certificates with the new extensions.  At some point, once the legacy certificates have expired, "local policy" could be changed to require only certificates with extensions.

The document is missing an operational considerations section and and there seems to be quite a lot of operational implications. For example it does not discuss what kinds of "local policy" are appropriate in various situations or how the "local policy" can be configured or managed.  It does not discuss how certificate interoperability issues can be dealt with, or how operational problems could be diagnosed. Some additional discussion in this area would be needed.
2009-07-15
08 Dan Romascanu
[Ballot comment]
1. I support the DISCUSS by Alexey about possibly approving this document at Experimental only, taking into accound that EKU did not enjoy …
[Ballot comment]
1. I support the DISCUSS by Alexey about possibly approving this document at Experimental only, taking into accound that EKU did not enjoy wide deployment yet

2. Section 3

"A Certificate Authority issuing a certificate whose purpose is to
bind a SIP domain identity without binding other non-SIP identities
MUST include an id-kp-SIPdomain attribute in the Extended Key Usage extension value (see Section 3.1)."

Question: What is the definition of "SIP domain identity"?  This is not included in the terminology section.

3. Section 4

"Section 7.1 of Domain Certificates in the Session Initiation Protoco [8] contains the steps for finding an identity (or a set of
identities) in an X.509 certificate for SIP.  In order to determine
whether the usage of a certificate is restricted to serve as a SIP
certificate only, implementations MUST perform the step given below as a part of the certificate validation:"

Not sure how the first sentence relates to the rest of the paragraph. Is the intent to suggest that the process for finding the identity needs to be carried out in order to make the determination?  If so, then [8] would be a normative reference.

4. "If the certificate does not contain any EKU values (the Extended Key Usage extension does not exist), it is a matter of local policy whether or not to accept the certificate for use as a SIP certificate."

There are a large number of existing certificates issued without these EKUs. In situations in which these existing certificates are expected, leaving their acceptance up to "local policy" would seem likely to create an interoperability problem.

5.  " If the certificate contains the id-kp-sipDomain EKU extension, then implementations MUST consider the certificate acceptable for use as a SIP certificate."

I presume that this means "implementations of this specification", correct? Pre-existing implementations don't know about these EKU extensions, and so will make their determination based on other factors.


6. "If EKU extension exists but does not contain any of the id-kp-sipDomain, id-kp-anyExtendedKeyUsage, id-kp-serverAuth, or id-kp-clientAuth EKU values, then implementations MUST NOT consider the certificate as acceptable for use as a SIP certificate."

Here I think you're referring to pre-existing implementations as well,
correct?
2009-07-15
08 Dan Romascanu
[Ballot discuss]
This DISCUSS and COMMENT is partly based on the OPS-DIR review performed by Bernard Aboba.

1. In situations where there are pre-existing certificates …
[Ballot discuss]
This DISCUSS and COMMENT is partly based on the OPS-DIR review performed by Bernard Aboba.

1. In situations where there are pre-existing certificates without the EKU extensions, this specification could result in interoperability problems if the "local policy" is not carefully implemented.  One concern is that the language on "local policy" could be used by implementers to justify refusing to support existing certificate formats.

I do not think that the document adequately addresses how to manage the transition.  For example, during an interim period, it would be necessary for implementations to support both legacy certificates as well as certificates with the new extensions.  At some point, once the legacy certificates have expired, "local policy" could be changed to require only certificates with extensions.

The document is missing an operational considerations section and and there seems to be quite a lot of operational implications. For example it does not discuss what kinds of "local policy" are appropriate in various situations or how the "local policy" can be configured or managed.  It does not discuss how certificate interoperability issues can be dealt with, or how operational problems could be diagnosed. Some additional discussion in this area would be needed.
2009-07-15
08 Dan Romascanu [Ballot Position Update] New position, Discuss, has been recorded by Dan Romascanu
2009-07-15
08 Alexey Melnikov
[Ballot discuss]
This is a DISCUSS DISCUSS and I intend to clear it after/during the IESG telechat. Bernard Aboba  done an O&M Area review of …
[Ballot discuss]
This is a DISCUSS DISCUSS and I intend to clear it after/during the IESG telechat. Bernard Aboba  done an O&M Area review of the document which said:

Previous EKU extensions (such as [RFC 4334]) have not been widely
deployed, due to the additional operational complexity they would
have introduced, and the limited benefits.

Given this, and the potential interoperability impact of this document,
the Experimental classification would probably be more appropriate.
2009-07-15
08 Alexey Melnikov [Ballot Position Update] Position for Alexey Melnikov has been changed to Discuss from No Objection by Alexey Melnikov
2009-07-14
08 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2009-07-14
08 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks
2009-07-14
08 Tim Polk
[Ballot discuss]
This is a discuss-discuss; I intend to clear on the call (if not before) after discussion of this relatively minor point.

The id-kp-serverAuth …
[Ballot discuss]
This is a discuss-discuss; I intend to clear on the call (if not before) after discussion of this relatively minor point.

The id-kp-serverAuth and id-kp-clientAuth EKU values seem an odd fit for SIP EKU, but this specification permits acceptance as a matter of local policy.  Is there an installed base that is already accepting these OIDs to authenticate SIP proxies?
2009-07-14
08 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2009-07-13
08 Ralph Droms [Ballot Position Update] New position, No Objection, has been recorded by Ralph Droms
2009-07-13
08 Russ Housley
[Ballot comment]
The OID needed for the ASN.1 module identifier is:
  id-mod-sip-domain-extns2007  OBJECT IDENTIFIER ::= { id-mod 62 }

  I see no reason …
[Ballot comment]
The OID needed for the ASN.1 module identifier is:
  id-mod-sip-domain-extns2007  OBJECT IDENTIFIER ::= { id-mod 62 }

  I see no reason to include id-pe and id-aca in the module.
2009-07-13
08 Russ Housley [Ballot Position Update] New position, Yes, has been recorded by Russ Housley
2009-07-12
08 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2009-07-08
08 Alexey Melnikov [Ballot Position Update] New position, No Objection, has been recorded by Alexey Melnikov
2009-06-25
08 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Paul Hoffman.
2009-06-24
08 Cullen Jennings
[Ballot discuss]
IANA says:

IESG/Russ/Authors,

We understand that draft-ietf-sip-eku-05.txt doesn't ask for any
IANA actions. But Russ, should we have a pointer to the pkix …
[Ballot discuss]
IANA says:

IESG/Russ/Authors,

We understand that draft-ietf-sip-eku-05.txt doesn't ask for any
IANA actions. But Russ, should we have a pointer to the pkix
registry in http://www.iana.org/assignments/smi-numbers?

Thanks,

Amanda Baber
IANA
2009-06-24
08 Cullen Jennings [Ballot Position Update] Position for Cullen Jennings has been changed to Discuss from Yes by Cullen Jennings
2009-06-24
08 Cullen Jennings Telechat date was changed to 2009-07-16 from 2009-07-02 by Cullen Jennings
2009-06-24
08 Cullen Jennings Placed on agenda for telechat - 2009-07-02 by Cullen Jennings
2009-06-24
08 Cullen Jennings Note field has been cleared by Cullen Jennings
2009-06-24
08 Cullen Jennings State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Cullen Jennings
2009-06-24
08 Cullen Jennings [Ballot Position Update] New position, Yes, has been recorded for Cullen Jennings
2009-06-24
08 Cullen Jennings Ballot has been issued by Cullen Jennings
2009-06-24
08 Cullen Jennings Created "Approve" ballot
2009-06-08
08 Amanda Baber
IANA comments/question for Russ:

We understand that draft-ietf-sip-eku-05.txt doesn't ask for any
IANA actions. But should we have a pointer to the pkix
registry in …
IANA comments/question for Russ:

We understand that draft-ietf-sip-eku-05.txt doesn't ask for any
IANA actions. But should we have a pointer to the pkix
registry in http://www.iana.org/assignments/smi-numbers?
2009-06-05
08 (System) State has been changed to Waiting for AD Go-Ahead from In Last Call by system
2009-05-24
08 Samuel Weiler Request for Last Call review by SECDIR is assigned to Paul Hoffman
2009-05-24
08 Samuel Weiler Request for Last Call review by SECDIR is assigned to Paul Hoffman
2009-05-22
08 Amy Vezza Last call sent
2009-05-22
08 Amy Vezza State Changes to In Last Call from Last Call Requested::AD Followup by Amy Vezza
2009-05-22
08 Cullen Jennings [Note]: 'Need to deal with special LC as this is for closed SIP WG' added by Cullen Jennings
2009-05-22
08 Cullen Jennings Last Call was requested by Cullen Jennings
2009-05-22
08 Cullen Jennings State Changes to Last Call Requested::AD Followup from Last Call Requested by Cullen Jennings
2009-05-19
08 Cullen Jennings Last Call was requested by Cullen Jennings
2009-05-19
08 (System) Ballot writeup text was added
2009-05-19
08 (System) Last call text was added
2009-05-19
08 (System) Ballot approval text was added
2009-05-19
08 Cullen Jennings State Changes to Last Call Requested from AD Evaluation::External Party by Cullen Jennings
2009-05-18
05 (System) New version available: draft-ietf-sip-eku-05.txt
2009-04-27
08 Cullen Jennings State Changes to AD Evaluation::External Party from AD Evaluation by Cullen Jennings
2009-04-27
08 Cullen Jennings [Note]: 'Need to talk to Vijay about domain certs and EKU' added by Cullen Jennings
2009-04-27
08 Cullen Jennings State Changes to AD Evaluation from Publication Requested by Cullen Jennings
2009-04-10
08 Cullen Jennings State Changes to Publication Requested from AD is watching by Cullen Jennings
2009-04-10
08 Cullen Jennings State Changes to AD is watching from Publication Requested by Cullen Jennings
2009-04-08
08 Amy Vezza
PROTO writeup for http://www.ietf.org/internet-drafts/draft-ietf-sip-eku-04: "Using
Extended Key Usage (EKU) for Session Initiation Protocol (SIP) X.509 Certificates"

  (1.a)  Who is the Document Shepherd for this …
PROTO writeup for http://www.ietf.org/internet-drafts/draft-ietf-sip-eku-04: "Using
Extended Key Usage (EKU) for Session Initiation Protocol (SIP) X.509 Certificates"

  (1.a)  Who is the Document Shepherd for this document?  Has the
          Document Shepherd personally reviewed this version of the
          document and, in particular, does he or she believe this
          version is ready for forwarding to the IESG for publication?

Keith Drage

The document has been reviewed and is ready for forwarding to IESG for publication.

Document history:

- The document was separated out from draft-gurbani-sip-domain-certs-06
which was submitted 9th July 2007 and expired 10th January 2008.
- draft-ietf-sip-eku-00 was submitted 8th November 2007 and expires 11th
May 2008.
- draft-ietf-sip-eku-01 was submitted 18th February 2008 and expired 21st
August 2008.
- draft-ietf-sip-eku-02 was submitted 11th July 2008 and expires 12 January
2009.
- draft-ietf-sip-eku-03 was submitted 6th October 2008 and expires 9th
April 2009.
- draft-ietf-sip-eku-04 was submitted 7th April 2009 and expires 9th
October 2009.

The document forms a normative dependency from draft-ietf-sip-domain-certs aside from
being usable in its own right.

WGLC was announced in the SIP WG on 22nd February 2008 to complete 7th March 2008 on -00
version.

Review was made and comments were received from: John Elwell, Eric Rescorla.

  (1.b)  Has the document had adequate review both from key WG members
          and from key non-WG members?  Does the Document Shepherd have
          any concerns about the depth or breadth of the reviews that
          have been performed?

The document has had adequate review from working group members.

  (1.c)  Does the Document Shepherd have concerns that the document
          needs more review from a particular or broader perspective,
          e.g., security, operational complexity, someone familiar with
          AAA, internationalization, or XML?

The document shepherd considers that no external review from an external specialist is
necessary, apart from as follows.

The document has been reviewed by members of the PKIX working group on a number of
occasions, primarily Stephen Kent.

The document has not had a separate security review, and that should therefore occur,
although it has been reviewed by the security advisor to the RAI area.

  (1.d)  Does the Document Shepherd have any specific concerns or
          issues with this document that the Responsible Area Director
          and/or the IESG should be aware of?  For example, perhaps he
          or she is uncomfortable with certain parts of the document, or
          has concerns whether there really is a need for it.  In any
          event, if the WG has discussed those issues and has indicated
          that it still wishes to advance the document, detail those
          concerns here.  Has an IPR disclosure related to this document
          been filed?  If so, please include a reference to the
          disclosure and summarize the WG discussion and conclusion on
          this issue.

The document shepherd has no specific concerns with any aspects of this document.

There have been no IPR disclosures on this document.

  (1.e)  How solid is the WG consensus behind this document?  Does it
          represent the strong concurrence of a few individuals, with
          others being silent, or does the WG as a whole understand and
          agree with it?

Full consensus exists on this document.

  (1.f)  Has anyone threatened an appeal or otherwise indicated extreme
          discontent?  If so, please summarize the areas of conflict in
          separate email messages to the Responsible Area Director.  (It
          should be in a separate email because this questionnaire is
          entered into the ID Tracker.)

None indicated.

  (1.g)  Has the Document Shepherd personally verified that the
          document satisfies all ID nits?  (See
          http://www.ietf.org/ID-Checklist.html and
          http://tools.ietf.org/tools/idnits/.)  Boilerplate checks are
          not enough; this check needs to be thorough.  Has the document
          met all formal review criteria it needs to, such as the MIB
          Doctor, media type, and URI type reviews?  If the document
          does not already indicate its intended status at the top of
          the first page, please indicate the intended status here.

The document has been reviewed against the guidelines in RFC 4485 and it is believed
that the document is conformant with those guidelines.

For ID-NITS the checks against idnits 2.11.08 report NITS as follows.

    Summary: 1 error (**), 0 warnings (==), 3 comments (--).

The error relates to an indication that it does not contain an "Introduction".
However document does contain an early section "Problem Statement" which serves
exactly this function.

  (1.h)  Has the document split its references into normative and
          informative?  Are there normative references to documents that
          are not ready for advancement or are otherwise in an unclear
          state?  If such normative references exist, what is the
          strategy for their completion?  Are there normative references
          that are downward references, as described in [RFC3967]?  If
          so, list these downward references to support the Area
          Director in the Last Call procedure for them [RFC3967].

The document has separate sections for normative and informative references. The
normative references have been checked and found to be normative.

  (1.i)  Has the Document Shepherd verified that the document's IANA
          Considerations section exists and is consistent with the body
          of the document?  If the document specifies protocol
          extensions, are reservations requested in appropriate IANA
          registries?  Are the IANA registries clearly identified?  If
          the document creates a new registry, does it define the
          proposed initial contents of the registry and an allocation
          procedure for future registrations?  Does it suggest a
          reasonable name for the new registry?  See [RFC2434].  If the
          document describes an Expert Review process, has the Document
          Shepherd conferred with the Responsible Area Director so that
          the IESG can appoint the needed Expert during IESG Evaluation?

The document has no IANA registration requirements. The object identifiers forms part of
the existing allocation made by IANA to the PKIX working group.

  (1.j)  Has the Document Shepherd verified that sections of the
          document that are written in a formal language, such as XML
          code, BNF rules, MIB definitions, etc., validate correctly in
          an automated checker?

The document defines an object identifier using the formal language ASN.1. This
definition is trivial and has been confirmed by visual inspection.

  (1.k)  The IESG approval announcement includes a Document
          Announcement Write-Up.  Please provide such a Document
          Announcement Write-Up.  Recent examples can be found in the
          "Action" announcements for approved documents.  The approval
          announcement contains the following sections:

          Technical Summary
            Relevant content can frequently be found in the abstract
            and/or introduction of the document.  If not, this may be
            an indication that there are deficiencies in the abstract
            or introduction.

          Working Group Summary
            Was there anything in the WG process that is worth noting?
            For example, was there controversy about particular points
            or were there decisions where the consensus was
            particularly rough?

          Document Quality
            Are there existing implementations of the protocol?  Have a
            significant number of vendors indicated their plan to
            implement the specification?  Are there any reviewers that
            merit special mention as having done a thorough review,
            e.g., one that resulted in important changes or a
            conclusion that the document had no substantive issues?  If
            there was a MIB Doctor, Media Type, or other Expert Review,
            what was its course (briefly)?  In the case of a Media Type
            Review, on what date was the request posted?

          Personnel
            Who is the Document Shepherd for this document?  Who is the
            Responsible Area Director?  If the document requires IANA
            experts(s), insert 'The IANA Expert(s) for the registries
            in this document are .'

Technical summary.

This memo documents an extended key usage (EKU) X.509 certificate extension for
restricting the applicability of a certificate to use with a Session Initiation
Protocol (SIP) service.  As such, in addition to providing rules for SIP
implementations, this memo also provides guidance to issuers of certificates for
use with SIP.

Working group summary.

There is consensus in the working group to publish this document.

Document Quality

There has been no indication of implementation.

Personnel

The document shepherd for this document was Keith Drage. The responsible Area Director
was Cullen Jennings. 'The IANA Expert(s) for the registries in this document are .
2009-04-08
08 Amy Vezza Draft Added by Amy Vezza in state Publication Requested
2009-04-08
04 (System) New version available: draft-ietf-sip-eku-04.txt
2008-10-06
03 (System) New version available: draft-ietf-sip-eku-03.txt
2008-02-18
01 (System) New version available: draft-ietf-sip-eku-01.txt
2007-11-08
00 (System) New version available: draft-ietf-sip-eku-00.txt