The Session Initiation Protocol (SIP) Digest Access Authentication Scheme
draft-ietf-sipcore-digest-scheme-15
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2020-03-19
|
15 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2020-03-09
|
15 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2020-03-09
|
15 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2020-01-28
|
15 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2019-11-15
|
15 | (System) | RFC Editor state changed to EDIT |
2019-11-15
|
15 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2019-11-15
|
15 | (System) | Announcement was received by RFC Editor |
2019-11-14
|
15 | (System) | IANA Action state changed to No IANA Actions from In Progress |
2019-11-14
|
15 | (System) | IANA Action state changed to In Progress |
2019-11-14
|
15 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2019-11-14
|
15 | Cindy Morgan | IESG has approved the document |
2019-11-14
|
15 | Cindy Morgan | Closed "Approve" ballot |
2019-11-14
|
15 | Cindy Morgan | Ballot approval text was generated |
2019-11-14
|
15 | Adam Roach | The document is ready for publication. Thanks! |
2019-11-14
|
15 | Adam Roach | IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::Point Raised - writeup needed |
2019-11-04
|
15 | Rifaat Shekh-Yusef | New version available: draft-ietf-sipcore-digest-scheme-15.txt |
2019-11-04
|
15 | (System) | New version approved |
2019-11-04
|
15 | (System) | Request for posting confirmation emailed to previous authors: Rifaat Shekh-Yusef |
2019-11-04
|
15 | Rifaat Shekh-Yusef | Uploaded new revision |
2019-10-31
|
14 | Cindy Morgan | IESG state changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation |
2019-10-31
|
14 | Alissa Cooper | [Ballot comment] Thanks for addressing my DISCUSS. |
2019-10-31
|
14 | Alissa Cooper | [Ballot Position Update] Position for Alissa Cooper has been changed to No Objection from Discuss |
2019-10-31
|
14 | Alexey Melnikov | [Ballot comment] Thank you for addressing my comments. |
2019-10-31
|
14 | Alexey Melnikov | Ballot comment text updated for Alexey Melnikov |
2019-10-31
|
14 | Michelle Cotton | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
2019-10-31
|
14 | Rifaat Shekh-Yusef | New version available: draft-ietf-sipcore-digest-scheme-14.txt |
2019-10-31
|
14 | (System) | New version approved |
2019-10-31
|
14 | (System) | Request for posting confirmation emailed to previous authors: Rifaat Shekh-Yusef |
2019-10-31
|
14 | Rifaat Shekh-Yusef | Uploaded new revision |
2019-10-31
|
13 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded for Magnus Westerlund |
2019-10-30
|
13 | Suresh Krishnan | [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan |
2019-10-30
|
13 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2019-10-30
|
13 | Rifaat Shekh-Yusef | New version available: draft-ietf-sipcore-digest-scheme-13.txt |
2019-10-30
|
13 | (System) | New version approved |
2019-10-30
|
13 | (System) | Request for posting confirmation emailed to previous authors: Rifaat Shekh-Yusef |
2019-10-30
|
13 | Rifaat Shekh-Yusef | Uploaded new revision |
2019-10-30
|
12 | Martin Vigoureux | [Ballot Position Update] New position, No Objection, has been recorded for Martin Vigoureux |
2019-10-30
|
12 | Warren Kumari | [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari |
2019-10-30
|
12 | Amanda Baber | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
2019-10-30
|
12 | Alexey Melnikov | [Ballot Position Update] Position for Alexey Melnikov has been changed to No Objection from No Record |
2019-10-30
|
12 | Alexey Melnikov | [Ballot comment] I am agreeing with Alissa's DISCUSS. Also, I have a few comments of my own: 1) Last para of Section 2.1: 2.1. Hash … [Ballot comment] I am agreeing with Alissa's DISCUSS. Also, I have a few comments of my own: 1) Last para of Section 2.1: 2.1. Hash Algorithms A UAS prioritizes which algorithm to use based on the ordering of the challenge header fields in the response it is preparing. This looks either wrong or confusing to me. I think you are just saying here that the order is decided by the server at this point. That process is specified in section 2.3 and parallels the process used in HTTP specified by [RFC7616]. So based on the above, my suggested replacement for both sentences: A UAS prioritizes which algorithm to use based on its policy, which is specified in section 2.3 and parallels the process used in HTTP specified by [RFC7616]. 2) Last para of Section 2.4: If the UAC cannot respond to any of the challenges in the response, then it SHOULD abandon attempts to send the request unless a local policy dictates otherwise. Is trying other non Digest algorithms covered by "SHOULD abandon"? If yes, maybe you should make this clearer. For example, if the UAC does not have credentials or has stale credentials for any of the realms, the UAC will abandon the request. 3) In Section 2.7: request-digest = LDQUOT *LHEX RDQUOT This now allows empty value. I suggest you specify a minimum number of hex digits allowed in the ABNF. Or at least change "*LHEX" to "2*LHEX". |
2019-10-30
|
12 | Alexey Melnikov | Ballot comment text updated for Alexey Melnikov |
2019-10-30
|
12 | Roman Danyliw | [Ballot comment] ** Section 2. Recommend a reference for SHA-256 and SHA-512/256 ** Recommend consistent notation on “SHA-512/256” (Section 2.0 and 2.2) and “SHA-512-256” (Abstract). … [Ballot comment] ** Section 2. Recommend a reference for SHA-256 and SHA-512/256 ** Recommend consistent notation on “SHA-512/256” (Section 2.0 and 2.2) and “SHA-512-256” (Abstract). “SHA-512-256” makes sense in the ABNF for Section 2.7. |
2019-10-30
|
12 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
2019-10-30
|
12 | Rifaat Shekh-Yusef | New version available: draft-ietf-sipcore-digest-scheme-12.txt |
2019-10-30
|
12 | (System) | New version approved |
2019-10-30
|
12 | (System) | Request for posting confirmation emailed to previous authors: Rifaat Shekh-Yusef |
2019-10-30
|
12 | Rifaat Shekh-Yusef | Uploaded new revision |
2019-10-30
|
11 | Alissa Cooper | [Ballot discuss] I appreciate the new text in Section 2.7, but I'm still a little unclear on the ABNF that is specified. As far as … [Ballot discuss] I appreciate the new text in Section 2.7, but I'm still a little unclear on the ABNF that is specified. As far as I can tell the relevant line from the original ABNF in RFC 3261 is: algorithm = "algorithm" EQUAL ( "MD5" / "MD5-sess" / token ) And what it is being replaced with is: algorithm = "algorithm" EQUAL ( "MD5" / "SHA-512-256" / "SHA-256" / token ) Each one of these algorithms might have a "-sess" variant, e.g., MD5-sess, SHA-256-sess, etc, as defined in [RFC7616] But the point of ABNF is to formally specify the syntax, so just having the note after the definition that says there might be -sess variants leaves it unclear whether those -sess variants are expected in the "algorithm=" line. And if it is valid for them to appear, they need to be formally included in the ABNF line, I think. |
2019-10-30
|
11 | Alissa Cooper | [Ballot Position Update] New position, Discuss, has been recorded for Alissa Cooper |
2019-10-30
|
11 | Alvaro Retana | [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana |
2019-10-28
|
11 | Ignas Bagdonas | [Ballot Position Update] New position, No Objection, has been recorded for Ignas Bagdonas |
2019-10-28
|
11 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2019-10-28
|
11 | Rifaat Shekh-Yusef | New version available: draft-ietf-sipcore-digest-scheme-11.txt |
2019-10-28
|
11 | (System) | New version approved |
2019-10-28
|
11 | (System) | Request for posting confirmation emailed to previous authors: Rifaat Shekh-Yusef |
2019-10-28
|
11 | Rifaat Shekh-Yusef | Uploaded new revision |
2019-10-28
|
10 | Benjamin Kaduk | [Ballot comment] Thanks for this document; it's always good to see ways to move off of md5. The genart thread suggests that we are expecting … [Ballot comment] Thanks for this document; it's always good to see ways to move off of md5. The genart thread suggests that we are expecting a new rev of the doc? I do have some comments, despite balloting Yes; please note especially the comment on Section 2.6, which may reflect an error in the document. Abstract nit: comma after "e.g." (as well as before). Section 2.1 A UAS prioritizes which algorithm to use based on the ordering of the challenge header fields in the response it is processing. That nit: the UAS is *preparing* the response, not processing it, right? Section 2.4 Why does the first paragraph get an exemption for local policy but the second paragraph does not? Section 2.6 6. [RFC7616] requires that a server check that the URI in the request line and the URI included in the Authorization header field point to the same resource. In a SIP context, these two URIs may refer to different users, due to forwarding at some proxy. Therefore, in SIP, a UAS MAY check that the Request-URI in the Authorization/Proxy-Authorization header field value corresponds to a user for whom the UAS is willing to accept forwarded or direct requests, but it is not necessarily a failure if the two fields are not equivalent. I think there's a subtle difference between what this says and what we want; we still want a "MUST check" requirement (right?), but the nature of the check changes, with default still being exact match but a "MAY" option for the relaxed target-user check. 8. A UAS MUST be able to properly handle "qop" parameter received in an Authorization/Proxy-Authorization header field, and a UAC MUST be able to properly handle "qop" parameter received in WWW-Authenticate and Proxy-Authenticate header fields. However, for backward compatibility reasons, the "qop" parameter is optional for RFC3261-based clients and servers to receive. Should we remind people what the default is when it's not specified? |
2019-10-28
|
10 | Benjamin Kaduk | [Ballot Position Update] New position, Yes, has been recorded for Benjamin Kaduk |
2019-10-28
|
10 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2019-10-25
|
10 | Éric Vyncke | [Ballot comment] Thank you for authoring this short document and deprecating MD5. I have only two comments and they are the same as Barry's first … [Ballot comment] Thank you for authoring this short document and deprecating MD5. I have only two comments and they are the same as Barry's first two comments (weird abstract phrasing and not clear about MD5) -éric |
2019-10-25
|
10 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
2019-10-25
|
10 | Mirja Kühlewind | [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind |
2019-10-24
|
10 | Al Morton | Request for Telechat review by OPSDIR Completed: Ready. Reviewer: Al Morton. Sent review to list. |
2019-10-22
|
10 | Roni Even | Request for Telechat review by GENART Completed: Almost Ready. Reviewer: Roni Even. Sent review to list. |
2019-10-18
|
10 | Gunter Van de Velde | Request for Telechat review by OPSDIR is assigned to Al Morton |
2019-10-18
|
10 | Gunter Van de Velde | Request for Telechat review by OPSDIR is assigned to Al Morton |
2019-10-18
|
10 | Gunter Van de Velde | Assignment of request for Last Call review by OPSDIR to Jon Mitchell was marked no-response |
2019-10-17
|
10 | Jean Mahoney | Request for Telechat review by GENART is assigned to Roni Even |
2019-10-17
|
10 | Jean Mahoney | Request for Telechat review by GENART is assigned to Roni Even |
2019-10-17
|
10 | Barry Leiba | [Ballot comment] Thanks for doing this. I have some editorial comments, and one substantive suggestion that we state more strongly here what's said in 7616: … [Ballot comment] Thanks for doing this. I have some editorial comments, and one substantive suggestion that we state more strongly here what's said in 7616: that MD5 is NOT RECOMMENDED. — Abstract — to replace the broken MD5 algorithm, which might be used for backward compatibility reasons only. I suggest that the “, which…” part isn’t useful in the Abstract, and should be removed. It's said in the Security Considerations, and we don't need to lead with it. — Section 2 — It replaces the reference to [RFC2617] with a reference to [RFC7616] in [RFC3261], and describes the modifications to the usage of the Digest mechanism in [RFC3261] resulting from that reference update. I had a hard time with this sentence. Let me suggest this: NEW It replaces the reference used in [RFC3261] for Digest Access Authentication, substituting [RFC7616] for the obsolete [RFC2617], and describes the modifications to the usage of the Digest mechanism in [RFC3261] resulting from that reference update. END — Section 2.1 — The IANA registry named "HTTP Digest Hash Algorithms" specifies the algorithms that correspond to 'algorithm' values. That is not the name of the registry; it’s “Hash Algorithms for HTTP Digest Authentication” (which you correctly cite in other sections). — Section 2.2 — If the MD5 algorithm is used to calculate the digest, then the digest will be represented as 32 hexadecimal characters, SHA-256 and SHA-512/256 by 64 hexadecimal characters. As we’re phasing out MD5, I suggest not using it as an example. Just: NEW If the SHA-256 or SHA-512/256 algorithm is used to calculate the digest, then the digest will be represented as 64 hexadecimal characters. END — Section 2.4 — If the UAC cannot respond to any of the challenges in the response, then it SHOULD abandon attempts to send the request, e.g. if the UAC does not have credentials or has stale credentials for any of the realms, unless a local policy dictates otherwise. This is really hard to parse; I think your “e.g.” clause gets in the way. I suggest this: NEW If the UAC cannot respond to any of the challenges in the response, then it SHOULD abandon attempts to send the request unless a local policy dictates otherwise. For example, if the UAC does not have credentials or has stale credentials for any of the realms, the UAC will abandon the request. END — Section 2.5 — When the forking proxy places multiple WWW-Authenticate and Proxy- Authenticate header fields from one received response into the single response it MUST maintain the order of these header fields. The ordering of values received from proxies relative to values received from other proxies is not significant. I can’t make sense of this; can you try rephrasing it? There’s one response and a single response. I don’t follow. There’s values received from proxies and values received from other proxies. What’s the difference between “proxies” and “other proxies”? I don’t follow. — Section 3 — This specification adds new secure algorithms to be used with the Digest mechanism to authenticate users, but leaves the broken MD5 algorithm for backward compatibility. I recommend being stronger about this by using text from 7616: NEW This specification adds new secure algorithms to be used with the Digest mechanism to authenticate users. The broken MD5 algorithm remains only for backward compatibility with [RFC2617], but its use is NOT RECOMMENDED. END |
2019-10-17
|
10 | Barry Leiba | [Ballot Position Update] New position, Yes, has been recorded for Barry Leiba |
2019-10-14
|
10 | Amanda Baber | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
2019-10-14
|
10 | Amy Vezza | Placed on agenda for telechat - 2019-10-31 |
2019-10-14
|
10 | Adam Roach | IESG state changed to IESG Evaluation from Waiting for Writeup::AD Followup |
2019-10-14
|
10 | Adam Roach | Ballot has been issued |
2019-10-14
|
10 | Adam Roach | [Ballot Position Update] New position, Yes, has been recorded for Adam Roach |
2019-10-14
|
10 | Adam Roach | Created "Approve" ballot |
2019-10-14
|
10 | Adam Roach | Ballot writeup was changed |
2019-09-19
|
10 | Rifaat Shekh-Yusef | New version available: draft-ietf-sipcore-digest-scheme-10.txt |
2019-09-19
|
10 | (System) | New version approved |
2019-09-19
|
10 | (System) | Request for posting confirmation emailed to previous authors: Rifaat Shekh-Yusef |
2019-09-19
|
10 | Rifaat Shekh-Yusef | Uploaded new revision |
2019-09-17
|
09 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2019-09-17
|
09 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2019-09-17
|
09 | Rifaat Shekh-Yusef | New version available: draft-ietf-sipcore-digest-scheme-09.txt |
2019-09-17
|
09 | (System) | New version approved |
2019-09-17
|
09 | (System) | Request for posting confirmation emailed to previous authors: Rifaat Shekh-Yusef |
2019-09-17
|
09 | Rifaat Shekh-Yusef | Uploaded new revision |
2019-09-16
|
08 | Adam Roach | Waiting for new version to address nits found during AD review. |
2019-09-16
|
08 | Adam Roach | IESG state changed to Waiting for Writeup::Revised I-D Needed from Waiting for Writeup |
2019-09-12
|
08 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Ready. Reviewer: David Mandelberg. |
2019-09-12
|
08 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2019-09-10
|
08 | Roni Even | Assignment of request for Last Call review by GENART to Roni Even was rejected |
2019-09-09
|
08 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2019-09-09
|
08 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has reviewed draft-ietf-sipcore-digest-scheme-08, which is currently in Last Call, and has the following comments: We … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has reviewed draft-ietf-sipcore-digest-scheme-08, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any registry actions. While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object. If this assessment is not accurate, please respond as soon as possible. Thank you, Sabrina Tanamal Senior IANA Services Specialist |
2019-09-05
|
08 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to David Mandelberg |
2019-09-05
|
08 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to David Mandelberg |
2019-09-02
|
08 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Jon Mitchell |
2019-09-02
|
08 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Jon Mitchell |
2019-08-30
|
08 | Jean Mahoney | Request for Last Call review by GENART is assigned to Roni Even |
2019-08-30
|
08 | Jean Mahoney | Request for Last Call review by GENART is assigned to Roni Even |
2019-08-29
|
08 | Amy Vezza | IANA Review state changed to IANA - Review Needed |
2019-08-29
|
08 | Amy Vezza | The following Last Call announcement was sent out (ends 2019-09-12): From: The IESG To: IETF-Announce CC: Jean Mahoney , adam@nostrum.com, sipcore-chairs@ietf.org, sipcore@ietf.org, … The following Last Call announcement was sent out (ends 2019-09-12): From: The IESG To: IETF-Announce CC: Jean Mahoney , adam@nostrum.com, sipcore-chairs@ietf.org, sipcore@ietf.org, mahoney@nostrum.com, draft-ietf-sipcore-digest-scheme@ietf.org Reply-To: ietf@ietf.org Sender: Subject: Last Call: (The Session Initiation Protocol (SIP) Digest Authentication Scheme) to Proposed Standard The IESG has received a request from the Session Initiation Protocol Core WG (sipcore) to consider the following document: - 'The Session Initiation Protocol (SIP) Digest Authentication Scheme' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2019-09-12. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document updates RFC 3261 by updating the Digest Access Authentication scheme used by the Session Initiation Protocol (SIP) to add support for more secure digest algorithms, e.g. SHA-256 and SHA-512-256, to replace the broken MD5 algorithm, which might be used for backward compatibility reasons only. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/ballot/ No IPR declarations have been submitted directly on this I-D. |
2019-08-29
|
08 | Amy Vezza | IESG state changed to In Last Call from Last Call Requested |
2019-08-29
|
08 | Adam Roach | Last call was requested |
2019-08-29
|
08 | Adam Roach | Last call announcement was generated |
2019-08-29
|
08 | Adam Roach | Ballot approval text was generated |
2019-08-29
|
08 | Adam Roach | Ballot writeup was generated |
2019-08-29
|
08 | Adam Roach | See AD review at https://mailarchive.ietf.org/arch/msg/sipcore/z1cnSSF0ySbRmAHnBvsENS0E_X4 |
2019-08-29
|
08 | Adam Roach | IESG state changed to Last Call Requested from Publication Requested |
2019-07-03
|
08 | Jean Mahoney | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Proposed Standard, which is indicated in the title page header. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. The authentication framework for the Session Initiation Protocol (SIP, RFC 3261) closely parallels that of the Hypertext Transfer Protocol (HTTP) Digest Access Authentication (RFC 2617). RFC 2617 was obsoleted by RFC 7616, which introduces more secure digest algorithms (e.g., SHA-256 and SHA-512-256). This document updates the authentication scheme used by SIP to add support for these more secure algorithms that are listed in the "Hash Algorithms for HTTP Digest Authentication" registry created by RFC 7616. Although the MD5 algorithm is considered cryptographically broken, it is still supported for backward compatibility. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? Work on this topic (initially as draft-yusef-sipcore-digest-scheme) started in January 2014, somewhat in parallel with the HTTP Digest Access Authentication work [RFC7616]. The SIPCORE participants who voiced an opinion thought it was a good idea, and provided careful reviews. The draft went through multiple iterations as feedback was incorporated. There was no pushback against the concept on-list; however, at the London IETF 89 SIPCORE WG session, it was discussed that SIP authentication in general needed an overhaul, not just the digest scheme. While some work went into that effort, both the new work and draft-yusef-sipcore-digest-scheme expired about six months later. In 2017 the author resurrected the draft, and again the draft received support and feedback, but then the draft expired later in the year. It was resurrected again in spring 2019, and adopted as a WG item. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? The content of this document has been implemented and deployed in mobile IMS networks. Several reviewers provided substantial feedback and they have been thanked in the Acknowledgments section. The content of the document does not require expert review. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? Document Shepherd: Jean Mahoney Responsible Area Director: Adam Roach (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. Document Shepherd went through the mail archives back to 2014 to ensure that feedback was addressed. She considers the draft ready to proceed. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The Document Shepherd is satisfied with the breadth and depth of reviews performed by the working group. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. None required. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. The author has confirmed conformance with BCPs 78 and 79. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No disclosure has been filed. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The only pushback this document has received has been at IETF 89 in 2014, when the WG wanted to solve a bigger problem. Otherwise it has received WG support and careful review. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No one has indicated any discontent with the draft. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. idnits 2.16.02 was run, and no issues were found. The Shepherd checked the draft against https://www.ietf.org/standards/ids/checklist/. No issues were found with the draft. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. No formal review needed. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? All normative references are to published RFCs. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. There are no downward normative references. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. This document updates RFC 3261. This information is clearly captured in the header, abstract, and introduction. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The IANA Considerations section of this document merely points to the registry that RFC 7616 created and specifies that algorithms defined in that registry may be used in SIP digest authentication. It does not create nor modify any IANA registry, and thus has no actions for IANA. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. This document does not create any new IANA registries. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. The document makes two small changes to the ABNF of SIP [RFC3261]. The working group provided feedback on the ABNF. The Doc Shepherd inspected the ABNF manually and found no issues. |
2019-07-03
|
08 | Jean Mahoney | Responsible AD changed to Adam Roach |
2019-07-03
|
08 | Jean Mahoney | IETF WG state changed to Submitted to IESG for Publication from WG Document |
2019-07-03
|
08 | Jean Mahoney | IESG state changed to Publication Requested from I-D Exists |
2019-07-03
|
08 | Jean Mahoney | IESG process started in state Publication Requested |
2019-07-03
|
08 | Jean Mahoney | As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated … As required by RFC 4858, this is the current template for the Document Shepherd Write-Up. Changes are expected over time. This version is dated 24 February 2012. (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Proposed Standard, which is indicated in the title page header. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. The authentication framework for the Session Initiation Protocol (SIP, RFC 3261) closely parallels that of the Hypertext Transfer Protocol (HTTP) Digest Access Authentication (RFC 2617). RFC 2617 was obsoleted by RFC 7616, which introduces more secure digest algorithms (e.g., SHA-256 and SHA-512-256). This document updates the authentication scheme used by SIP to add support for these more secure algorithms that are listed in the "Hash Algorithms for HTTP Digest Authentication" registry created by RFC 7616. Although the MD5 algorithm is considered cryptographically broken, it is still supported for backward compatibility. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? Work on this topic (initially as draft-yusef-sipcore-digest-scheme) started in January 2014, somewhat in parallel with the HTTP Digest Access Authentication work [RFC7616]. The SIPCORE participants who voiced an opinion thought it was a good idea, and provided careful reviews. The draft went through multiple iterations as feedback was incorporated. There was no pushback against the concept on-list; however, at the London IETF 89 SIPCORE WG session, it was discussed that SIP authentication in general needed an overhaul, not just the digest scheme. While some work went into that effort, both the new work and draft-yusef-sipcore-digest-scheme expired about six months later. In 2017 the author resurrected the draft, and again the draft received support and feedback, but then the draft expired later in the year. It was resurrected again in spring 2019, and adopted as a WG item. Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? The content of this document has been implemented and deployed in mobile IMS networks. Several reviewers provided substantial feedback and they have been thanked in the Acknowledgments section. The content of the document does not require expert review. Personnel Who is the Document Shepherd? Who is the Responsible Area Director? Document Shepherd: Jean Mahoney Responsible Area Director: Adam Roach (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. Document Shepherd went through the mail archives back to 2014 to ensure that feedback was addressed. She considers the draft ready to proceed. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? The Document Shepherd is satisfied with the breadth and depth of reviews performed by the working group. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. None required. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concerns. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. The author has confirmed conformance with BCPs 78 and 79. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No disclosure has been filed. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The only pushback this document has received has been at IETF 89 in 2014, when the WG wanted to solve a bigger problem. Otherwise it has received WG support and careful review. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No one has indicated any discontent with the draft. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. idnits 2.16.02 was run, and no issues were found. The Shepherd checked the draft against https://www.ietf.org/standards/ids/checklist/. No issues were found with the draft. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. No formal review needed. (13) Have all references within this document been identified as either normative or informative? Yes. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? All normative references are to published RFCs. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. There are no downward normative references. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. This document updates RFC 3261. This information is clearly captured in the header, abstract, and introduction. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). The IANA Considerations section of this document merely points to the registry that RFC 7616 created and specifies that algorithms defined in that registry may be used in SIP digest authentication. It does not create nor modify any IANA registry, and thus has no actions for IANA. (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. This document does not create any new IANA registries. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. The document makes two small changes to the ABNF of SIP [RFC3261]. The working group provided feedback on the ABNF. The Doc Shepherd inspected the ABNF manually and found no issues. |
2019-07-03
|
08 | Rifaat Shekh-Yusef | New version available: draft-ietf-sipcore-digest-scheme-08.txt |
2019-07-03
|
08 | (System) | New version approved |
2019-07-03
|
08 | (System) | Request for posting confirmation emailed to previous authors: Rifaat Shekh-Yusef |
2019-07-03
|
08 | Rifaat Shekh-Yusef | Uploaded new revision |
2019-07-03
|
07 | Rifaat Shekh-Yusef | New version available: draft-ietf-sipcore-digest-scheme-07.txt |
2019-07-03
|
07 | (System) | New version approved |
2019-07-03
|
07 | (System) | Request for posting confirmation emailed to previous authors: Rifaat Shekh-Yusef |
2019-07-03
|
07 | Rifaat Shekh-Yusef | Uploaded new revision |
2019-07-02
|
06 | Rifaat Shekh-Yusef | New version available: draft-ietf-sipcore-digest-scheme-06.txt |
2019-07-02
|
06 | (System) | New version approved |
2019-07-02
|
06 | (System) | Request for posting confirmation emailed to previous authors: Rifaat Shekh-Yusef |
2019-07-02
|
06 | Rifaat Shekh-Yusef | Uploaded new revision |
2019-06-06
|
05 | Jean Mahoney | Notification list changed to Jean Mahoney <mahoney@nostrum.com> |
2019-06-06
|
05 | Jean Mahoney | Document shepherd changed to Jean Mahoney |
2019-06-06
|
05 | Jean Mahoney | Changed consensus to Yes from Unknown |
2019-06-06
|
05 | Jean Mahoney | Intended Status changed to Proposed Standard from None |
2019-05-30
|
05 | Rifaat Shekh-Yusef | New version available: draft-ietf-sipcore-digest-scheme-05.txt |
2019-05-30
|
05 | (System) | New version approved |
2019-05-30
|
05 | (System) | Request for posting confirmation emailed to previous authors: Rifaat Shekh-Yusef |
2019-05-30
|
05 | Rifaat Shekh-Yusef | Uploaded new revision |
2019-05-28
|
04 | Rifaat Shekh-Yusef | New version available: draft-ietf-sipcore-digest-scheme-04.txt |
2019-05-28
|
04 | (System) | New version approved |
2019-05-28
|
04 | (System) | Request for posting confirmation emailed to previous authors: Rifaat Shekh-Yusef |
2019-05-28
|
04 | Rifaat Shekh-Yusef | Uploaded new revision |
2019-05-26
|
03 | Rifaat Shekh-Yusef | New version available: draft-ietf-sipcore-digest-scheme-03.txt |
2019-05-26
|
03 | (System) | New version approved |
2019-05-26
|
03 | (System) | Request for posting confirmation emailed to previous authors: Rifaat Shekh-Yusef |
2019-05-26
|
03 | Rifaat Shekh-Yusef | Uploaded new revision |
2019-05-09
|
02 | Rifaat Shekh-Yusef | New version available: draft-ietf-sipcore-digest-scheme-02.txt |
2019-05-09
|
02 | (System) | New version approved |
2019-05-09
|
02 | (System) | Request for posting confirmation emailed to previous authors: Rifaat Shekh-Yusef |
2019-05-09
|
02 | Rifaat Shekh-Yusef | Uploaded new revision |
2019-05-08
|
01 | Rifaat Shekh-Yusef | New version available: draft-ietf-sipcore-digest-scheme-01.txt |
2019-05-08
|
01 | (System) | New version approved |
2019-05-08
|
01 | (System) | Request for posting confirmation emailed to previous authors: Rifaat Shekh-Yusef |
2019-05-08
|
01 | Rifaat Shekh-Yusef | Uploaded new revision |
2019-04-18
|
00 | Jean Mahoney | This document now replaces draft-yusef-sipcore-digest-scheme instead of None |
2019-04-18
|
00 | Rifaat Shekh-Yusef | New version available: draft-ietf-sipcore-digest-scheme-00.txt |
2019-04-18
|
00 | (System) | WG -00 approved |
2019-04-18
|
00 | Rifaat Shekh-Yusef | Set submitter to "Rifaat Shekh-Yusef ", replaces to draft-yusef-sipcore-digest-scheme and sent approval email to group chairs: sipcore-chairs@ietf.org |
2019-04-18
|
00 | Rifaat Shekh-Yusef | Uploaded new revision |