PASSporT Extension for Rich Call Data
draft-ietf-stir-passport-rcd-26
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2024-01-26
|
26 | Gunter Van de Velde | Request closed, assignment withdrawn: Nagendra Nainar Last Call OPSDIR review |
2024-01-26
|
26 | Gunter Van de Velde | Closed request for Last Call review by OPSDIR with state 'Overtaken by Events': Cleaning up stale OPSDIR queue |
2023-07-24
|
26 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2023-07-24
|
26 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2023-07-24
|
26 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2023-07-17
|
26 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2023-07-17
|
26 | (System) | IANA Action state changed to In Progress from On Hold |
2023-07-11
|
26 | (System) | IANA Action state changed to On Hold from In Progress |
2023-07-10
|
26 | (System) | RFC Editor state changed to MISSREF |
2023-07-10
|
26 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2023-07-10
|
26 | (System) | Announcement was received by RFC Editor |
2023-07-07
|
26 | (System) | IANA Action state changed to In Progress |
2023-07-07
|
26 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2023-07-07
|
26 | Cindy Morgan | IESG has approved the document |
2023-07-07
|
26 | Cindy Morgan | Closed "Approve" ballot |
2023-07-07
|
26 | Cindy Morgan | Ballot approval text was generated |
2023-07-07
|
26 | Murray Kucherawy | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2023-07-07
|
26 | Murray Kucherawy | Ballot writeup was changed |
2023-06-26
|
26 | Warren Kumari | [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari |
2023-06-26
|
26 | Roman Danyliw | [Ballot comment] Thank you to Vincent Roca for the SECDIR review Thank you for addressing my DISCUSS and COMMENT feedback. |
2023-06-26
|
26 | Roman Danyliw | [Ballot Position Update] Position for Roman Danyliw has been changed to No Objection from Discuss |
2023-06-05
|
26 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-26.txt |
2023-06-05
|
26 | Chris Wendt | New version accepted (logged-in submitter: Chris Wendt) |
2023-06-05
|
26 | Chris Wendt | Uploaded new revision |
2023-06-03
|
25 | (System) | Removed all action holders (IESG state changed) |
2023-06-03
|
25 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
2023-06-03
|
25 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-25.txt |
2023-06-03
|
25 | Chris Wendt | New version accepted (logged-in submitter: Chris Wendt) |
2023-06-03
|
25 | Chris Wendt | Uploaded new revision |
2023-05-12
|
24 | Murray Kucherawy | Changed action holders to Chris Wendt, Jon Peterson |
2023-05-12
|
24 | (System) | Changed action holders to Chris Wendt, Jon Peterson, Murray Kucherawy (IESG state changed) |
2023-05-12
|
24 | Murray Kucherawy | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation::AD Followup |
2023-03-15
|
24 | Russ Housley | Added to session: IETF-116: stir Wed-0630 |
2023-03-01
|
24 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2023-03-01
|
24 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-24.txt |
2023-03-01
|
24 | Chris Wendt | New version accepted (logged-in submitter: Chris Wendt) |
2023-03-01
|
24 | Chris Wendt | Uploaded new revision |
2023-01-24
|
23 | Vincent Roca | Request for Telechat review by SECDIR Completed: Ready. Reviewer: Vincent Roca. Sent review to list. |
2022-12-01
|
23 | Cindy Morgan | IESG state changed to IESG Evaluation::AD Followup from IESG Evaluation |
2022-12-01
|
23 | Francesca Palombini | [Ballot comment] Thank you for the work on this document. Many thanks to Harald Alvestrand for his ART ART review: https://mailarchive.ietf.org/arch/msg/art/rylz9YIkzKVh0MS7zVQJnWTD5Tc/, and to the … [Ballot comment] Thank you for the work on this document. Many thanks to Harald Alvestrand for his ART ART review: https://mailarchive.ietf.org/arch/msg/art/rylz9YIkzKVh0MS7zVQJnWTD5Tc/, and to the authors for addressing his comments. |
2022-12-01
|
23 | Francesca Palombini | [Ballot Position Update] New position, No Objection, has been recorded for Francesca Palombini |
2022-11-30
|
23 | Paul Wouters | [Ballot comment] # Sec AD review of draft-ietf-stir-passport-rcd-23 CC @paulwouters See https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions for more information about how to handle DISCUSS and COMMENT positions. This review … [Ballot comment] # Sec AD review of draft-ietf-stir-passport-rcd-23 CC @paulwouters See https://www.ietf.org/about/groups/iesg/statements/handling-ballot-positions for more information about how to handle DISCUSS and COMMENT positions. This review uses the format specified in https://github.com/mnot/ietf-comments/ which allows automated tools to process items (eg to produce github issues) Please see Roman's raised issues. Additionally, I have a few very minor comments. ## Comments ### Section 8.3 example the example there has a jCard with: ["org",{},"text","MI6;Q Branch Spy Gadgets"], and a corresponding PASSporT claims object with: "nam": "Q Branch Spy Gadgets", I wasn't sure if the org text and nam of the issuer needed to match here, so I just wanted to raise it in case this is a copy&paste error. ## odd modifier to 2119 language I am not sure how to read: ``` is likely NOT RECOMMENDED best practice. ``` It seems it should either not use RFC 2119 phrasing, or it should remove the modifier "likely". ### NITS [3GPP TS 24.229 v16.7.0] is not rendered into a proper reference There is a few ways -> There are a few ways Section 16 references "the IANA", instead of just "IANA". |
2022-11-30
|
23 | Paul Wouters | [Ballot Position Update] New position, No Objection, has been recorded for Paul Wouters |
2022-11-30
|
23 | Amanda Baber | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2022-11-30
|
23 | Robert Wilton | [Ballot Position Update] New position, No Objection, has been recorded for Robert Wilton |
2022-11-30
|
23 | Andrew Alston | [Ballot Position Update] New position, No Objection, has been recorded for Andrew Alston |
2022-11-29
|
23 | Roman Danyliw | [Ballot discuss] ** 5.*. Inconsistent requirements for URIs -- icn: appears to be any URI per Section 5.1.3. This would make gopher://, ftp://, https:// all … [Ballot discuss] ** 5.*. Inconsistent requirements for URIs -- icn: appears to be any URI per Section 5.1.3. This would make gopher://, ftp://, https:// all equally valid. These have different security characteristics. -- jcd: per Section 5.1.4 “is intended to directly match the Call-Info header field value defined in [I-D.ietf-sipcore-callinfo-rcd].” Section 4 of that document says it “MUST define the use HTTPS or a transport that can validate the integrity of the source of the resource as well as the transport channel through which the resource is retrieved”. -- jcl: is an HTTPS URL (per Section 5.1.5) Why are these different? Support different levels of transport security? ** Section 6. Implementations MAY support additional algorithms, but MUST NOT support known weak algorithms such as MD5 or SHA-1. -- How would these additional algorithms names be canonicalized in a way that is interoperable? -- How does one assess “known weak algorithms”? What is the vetting process? -- (COMMENT) Please provide references to MD5 and SHA-1. ** Section 6.* -- Why is rcdi supported for elements that are protected by the signature (e.g., nam, apn, the whole jcd claim)? Under what circumstance would it be used? -- What would it mean for the rcdi to be invalid but the signature to be valid? ** Section 6.1.3. The use of digest for the "/jcd" corresponding to the entire jCard array string can be included as a redundant mechanism to avoid any possibility of substitution, insertion attacks, or other potential techniques that may be possible to avoid integrity detection. What attacks are possible if there is NO digest for /jcd? Under what circumstances is this redundancy necessary? ** Section 6.1.4. To have parity between the jcd and jcl, the following additional guidance is needed in this section: -- an integrity digest MUST be provided for the jcl -- all URIs referenced in the jCard MUST also have an in integrity digest ** Section 5.1.1 and 8. The specification of “nam” is ambiguous. -- Section 5.1.1. which specifies the “nam” claim makes no mentions of RFC3261 -- Section 8 says “The key syntax of ‘nam’ follows the display-name ABNF given in [RFC3261].” MUST ‘nam” conform to the ABNF of RFC3261? ** Section 8.2. This section provides no guidance on how to handle rcdi values for non-URI values (e.g., nam) ** Section 8.2 Consequently, if URIs with contents covered by integrity digests are passed to another entity, the corresponding integrity digest MUST also be included, for example by passing the PASSporT. Entities that pass on the content without the URI do not have to pass on the corresponding integrity digest. What is the context for “passing” information? Is that application specific behavior? Why would one pass the URI+downloaded content as opposed to just the downloaded content? ** Section 8.2 If there is any issue with completing the integrity verification procedures for referenced external content, including HTTP or HTTPS errors, the referenced content MUST be considered not verified. What is the operator supposed to do with data that is “not verified”? ** Section 9.1 The re-construction of the "nam" claim, if using SIP protocol, should use the display-name string in the From header field. If the display-name isn’t used, how should the “nam” claim be reconstructed? ** Section 10.2 This may include accepting a valid signature over a PASSporT even if it is signed with a credential that does not attest authority over the identity in the "orig" claim of the PASSporT, provided that the verification service has some other reason to trust the signer. No further guidance on verification service authorization policy is given here. I’m likely misunderstanding something in the STIR architecture. Why is this text consistent with the validation practices of the first-party model. This text seems to suggest that PASSports with arbitrary “orig”-s could be accepted regardless of the cryptographic based security mechanisms presented as the basis for the security model of this token. ** Section 10 and 11. The iss value doesn’t appear to be consistently specified. (a) Section 10.1 says “the value of "iss" however MUST reflect the Subject of the certificate used to sign a third-party PASSporT.” (b) Section 10.1 depicts an example of ‘"iss":"Zorin Industries”’ -- Section 11 says “Therefore, third-party PASSporTs that carry "rcd" data MUST also carry an indication of the relationship of the generator of the PASSporT to the caller in the form of the "iss" claim. The constraints of iss as described and depicted in (a) and (b) in Section 10.1 are not consistent with (c) in Section 11. In what way is “Zorin Industries” suggesting the “relationship of the generator”? ** Section 12.2 The general verification proceedures defined in Section 8.1 should be followed, but the following paragraphs describe some of the specifics needed to implement a verification service using the SIP protocol. In additional to the Section 8.1 guidance, the guidance in Section 10.2 seems applicable too. ** Section 13.1 The Verification service that receives the PASSporT, if it supports this specification and chooses to, should interpret the "rcd" claim as simply just an additional claim intended to deliver and/or validate delivered Rich Call Data. Please be clear on what sections govern a “rcd” claim relevant here. Is it just Section 5? ** Section 13.2. Protected Header { "alg":"ES256", "typ":"passport", "ppt":"shaken", "x5u":"https://cert.example.org/passport.cer" } A Verification Service that supports "rcd" and "shaken" PASSporT extensions is able to receive the above PASSporT and interpret both the "shaken" claims as well as the "rcd" defined claim. The text states that both the “rcd” and “shaken” Passport extensions are being used. However, in the “ppt” claim only “shaken” is being named. Section 8.1 of RFC8225 states that “If it is necessary for an extension to PASSporT to require that a relying party support a particular extended claim or set of claims in the PASSporT object, it can do so by specifying a "ppt" element for the PASSporT JOSE Header.” How is support for two simultaneous extensions supposed to be represented in the ppt header? ** Section 17. Please discuss that the dereferencing of URIs will (a) depending on the scheme leak, information to an on-path attacker about the referenced content; and (b) provide the off-path hosting providing of the reference content some insight into the calling patterns. ** Section 17. The process of signing information contained in a "rcd" PASSporT, whether the identities, identifiers, alternate identities or identifiers, images, logos, physical addresses, or otherwise should follow some vetting process in which an authoritative entity should follow an appropriate consistent policy defined and governed by the eco-system using RCD and the STIR framework. The lack normative language and reliance on “should” seems to allow for no vetting and an inconsistent process with the RCD and STIR framework. In my understanding of the STIR ecosystem this would violate a basic premise of the ecosystem ** Section 17. (a) The use of JWTClaimConstraints, a mechanism defined in [RFC8226] and extended in [RFC9118] to constrain any of the RCD information in the public certificate by including that information in the certificate, depending on the availability in the deployment of the PKI system, may present a privacy issue. (b) The use of "rcdi" claim and digests for representing JWT claim contents is RECOMMENDED for the prevention of the exposure of that information through the certificates which are often publically accessible and available. -- Per (a), please explicitly state what that privacy issue might be. Is it that the claim constraints might encode sensitive permittedValues? Is the existence of claims sensitive? -- Per (b), in what way does rcdi/digest “represent JWT claim content” and prevent exposure of information in the certificate? |
2022-11-29
|
23 | Roman Danyliw | [Ballot comment] Thank you to Vincent Roca for the SECDIR review ** This document makes multiple normative dependencies to draft-ietf-sipcore-callinfo-rcd. While this document has been … [Ballot comment] Thank you to Vincent Roca for the SECDIR review ** This document makes multiple normative dependencies to draft-ietf-sipcore-callinfo-rcd. While this document has been adopted by SIPCORE, it appears to have expired multiple times. Is it expected to complete? Is there acceptable risk here? Is the reference stable enough to publish this document (and let it sit in the MISREF queue)? ** Section 1. Editorial. As such, based on some use-cases, this document extends ... What use cases are being referenced here? ** Section 4. This document defines a mechanism that allows for a direct or indirect party that controls the policy ... Should “controls the policy” be “enforces the policy” to distinguish between the entity that might define it and those that might implement it (but can’t change it)? ** Section 4. The RCD integrity mechanism is a process of generating a sufficiently strong cryptographic digest for each resource ... Is there anything to read into saying “sufficiently strong cryptographic digest” instead of just “cryptographic digest”? Is there some gradient of security being suggested? ** Section 5.1.2 How the signer determines that a user is authorized to present the number in question is a policy decision outside the scope of this document, however, the vetting of the alternate presentation number should follow the same level of vetting as telephone identities or any other information contained in an "rcd" PASSporT or "rcd" claims. Is this text implicitly saying that the apn value needs to be in the TNAuthList of the signing certificate so that the verifier can validated that this is a legitimate apn? Otherwise, can’t arbitrary apn values be included and the verifier wouldn’t know. ** Section 5.1.3. Note that [I-D.ietf-sipcore-callinfo-rcd] extends the specific usage of "icon" in SIP in the context of the larger rich call data framework with specific guidance on referencing images and image types, sizes and formats. In what way does this guidance constrain the definition of “icn”? I’m not sure why this text is here. ** Section 5.1.5. Mixing normative language is confusion. Recommend: OLD The "jcd" or "jcl" keys MAY only appear once in the "rcd" claim but MUST be mutually exclusive. NEW Either a “jcd" or "jcl" MAY appear in the “rcd” claim, but not both. ** Section 6. The SHA2 algorithms need a normative reference ** Section 6. The values of each key/value pair consists of a digest across either the direct values or indirectly referenced resources Consider restating this to cover there being three instances of what rcdi provides a digest for: content inline to the token; the content of a resource specified by an inline URI in the token; and the content of a resource specified by a URI that is in embedded in content specified by an inline URI (i.e., jcl). ** Section 6.1.2 If the URI references externally linked content there would need to be a JSON pointer and digest entry for the content in that linked resource. Is this the same as saying “If the URI references externally linked content there MUST be a JSON pointer ...”? Please be explicit. ** Section 6.1.2 ...the JSON pointer string would be "/icn" and the digest string would be created using the image file data following the rules of JSON pointer What JSON pointer rules? Section 6.1 states that “For any URI referenced content, the bytes of the body of the HTTP response is the input for the hash function”? ** Section 6.1.2 Even though this is probably not the typical case, an "rcdi" JSON pointer or integrity digest Why is it a “JSON pointer _or_ integrity digest”? What would the JSON be used for if not for the digest? How would there be a digest without a pointer? ** Section 6.1.2 However, even though the direct value can be protected by the signature and can be constrained directly with JWTClaimConstraints, since the length of the image data is likely much larger than the integrity digest, the use of the "rcdi" JSON pointer and integrity digest as the constraint value in JWTClaimConstraints over the image data is RECOMMENDED. What does the length of the image data have to do with whether the rcdi is used or not? ** Section 6.2. Editorial. The "permittedValues" for the "rcd" claim can contain a single entry or optionally contain multiple entries with the intent of supporting cases where the certificate holder is authorized to use different sets of rich call data corresponding to different call scenarios. Please re-write this section using RFC2119 keywords to make it clear on the normative guidance. ** Section 7.1. -- What is an “authoritative certificate creator” as opposed to a issuer? -- Integrity is being used here in a way that is different than how it is presented in the document. I recommend explicitly describing that this is about constraining the behavior of the entity that is generating the claim rather than an attacker. ** Section 8.1. Per “it has a valid signature”, where is the guidance on what constitutes a valid signature. Is that a simple JWT process? ** Section 8.1. Per “it abides by all rules set forth in the proper construction of the claims”, please specify what sections define that proper construction. ** Section 12.1 Note that the information that is included in a signed PASSporT is RECOMMENDED to be vetted by an entity that is authoritative over determining the accuracy of that information, so how that information is received by the authentication service is important and the use of Call-Info as a source of RCD information on the authentication side is likely NOT RECOMMENDED best practice. Can this sentence be restated? The guidance isn't clear. ** Section 13. It isn’t clear what additional guidance is being provided to implementers using the rcd passport. Specifically: Note: There is one very important caveat to this capability, because generally if there is URI referenced content in an "rcd" PASSporT there is often the requirement to use "rcdi" and JWT Claims Constraints. So, it is important for the user of this specification to recognize that the certificates used should include the necessary JWT Claims Constraints for proper integrity and security of the values in the "rcd" claim incorporated into PASSporTs that are not "rcd". -- The use of rcdi is required in some cases, here it is suggested that “often” there is such a requirement -- it isn’t clear under what circumstances the JWT Claim Constraints should be used ** Section 16.3. Per “Any new registrations should consist only of a name and a reference document”, does this mean that this is a two column registry with column1 = “Name” and column2 = “Reference Document”? For consistency other PASSport registries seem to have column2 = “Reference”. Recommend being explicit. ** Section 17. Are there best practices around handling URLs covered in Section 7 of RFC3986? ** From idnits: == The document seems to lack the recommended RFC 2119 boilerplate, even if it appears to use RFC 2119 keywords. (The document does seem to have the reference to RFC 2119 which the ID-Checklist requires). -- The exact meaning of the all-uppercase expression 'MAY NOT' is not defined in RFC 2119. If it is intended as a requirements expression, it should be rewritten using one of the combinations defined in RFC 2119; otherwise it should not be all-uppercase. == The expression 'MAY NOT', while looking like RFC 2119 requirements text, is not defined in RFC 2119, and should not be used. Consider using 'MUST NOT' instead (if that is what you mean). Found 'MAY NOT' in this paragraph: The jCard object value for "jcd" MUST be a jCard JSON object that MAY have URI referenced content, but that URI referenced content MAY NOT further reference URIs. Future specifications may extend this capability, but as stated in [I-D.ietf-sipcore-callinfo-rcd] it constrains the security properties of RCD information and the integrity of the content referenced by URIs. == The expression 'MAY NOT', while looking like RFC 2119 requirements text, is not defined in RFC 2119, and should not be used. Consider using 'MUST NOT' instead (if that is what you mean). Found 'MAY NOT' in this paragraph: The jCard object referenced by the URI value for "jcl" MUST be a jCard JSON object that MAY have URI referenced content, but that URI referenced content MAY NOT further reference URIs. Future specifications may extend this capability, but as stated in [I-D.ietf-sipcore-callinfo-rcd] it constrains the security properties of RCD information and the integrity of the content referenced by URIs. Checking references for intended status: Proposed Standard ---------------------------------------------------------------------------- ** Obsolete normative reference: RFC 7159 (Obsoleted by RFC 8259) |
2022-11-29
|
23 | Roman Danyliw | [Ballot Position Update] New position, Discuss, has been recorded for Roman Danyliw |
2022-11-29
|
23 | John Scudder | [Ballot comment] Thanks for this document, it seems thorough and well-written, as far as this non-expert can tell. I have just a few nit-level things … [Ballot comment] Thanks for this document, it seems thorough and well-written, as far as this non-expert can tell. I have just a few nit-level things to mention. 1. In Section 4, "This mechanism is inspired by and based on the W3C Subresource Integrity specification (http://www.w3.org/TR/SRI/)." Instead of listing the URL inline, that seems like it really should be a reference. 2. Section 4, first paragraph, "what data is allowed to be used". Shouldn't that be "data are"? (I said these were nits...) 3. Section 4, last para, "The third and fourth mode cover cases", should be "modes". That's it. Yours for agreement in number. |
2022-11-29
|
23 | John Scudder | [Ballot Position Update] New position, No Objection, has been recorded for John Scudder |
2022-11-28
|
23 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
2022-11-28
|
23 | Éric Vyncke | [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-stir-passport-rcd-23 CC @evyncke Thank you for the work put into this document. Please find below some … [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-stir-passport-rcd-23 CC @evyncke Thank you for the work put into this document. Please find below some non-blocking COMMENT points (but replies would be appreciated even if only for my own education), and some nits. Special thanks to Russ Housley for the shepherd's detailed write-up including the WG consensus *but* the justification of the intended status is missing. Other thanks to Florian Obser for the DNS directorate Last Call review: https://mailarchive.ietf.org/arch/msg/dnsdir/Fv-pKTtPyHLVXYDD2phBfvab9nc/ Thank you, Chris, for your reply on the mailing list. I hope that this review helps to improve the document, Regards, -éric ## COMMENTS ### MAY NOT As indicated by idnits: ``` The expression 'MAY NOT', while looking like RFC 2119 requirements text, is not defined in RFC 2119, and should not be used. ``` ### Section 1 `In this document, we utilize` suggest not to use the first person when writing a specification. ### Section 5.1.1 and 3GPP Releases Rather than "3GPP TS 24.229 v16.7.0", should 3GPP release v17 be used ? ### Section 5.1.3 Suggest to use "https://wwww.example.com/alice/photo.jpg" rather than "http://wwww.example.com/alice/photo.jpg", i.e., use HTTPS as in other examples. ### Section 6 Suggest to provide a reference either to the NIST specification or to the different SHA variations. Should there be a registry for all those algorithms in order to facilitate interoperation ? (to be honest, I hesitated to ballot a DISCUSS on this point) ### Section 6.1.3 I love your James Bond's example ;-) ### Section Shocking ! Alas, there is no April 1st DISCUSS else I would have balloted a DISCUSS on "Her Majesty" as it is now "His Majesty" ;-) ;-) ## NITS ### Section 1 Even if "JWT" is in the list of accepted abbreviations by the RFC editor, it may be worth to expand it at first use. Same for "STIR" (or use "STIR WG") ;-) Also in this section there is at least one sentence that is 7 lines long... this does not help the readability of the document. It also occurs in multiple places in the I-D. ### E.g. AFAIK, "e.g." is always followed by a comma. Same for "i.e.". ## Notes This review is in the ["IETF Comments" Markdown format][ICMF], You can use the [`ietf-comments` tool][ICT] to automatically convert this review into individual GitHub issues. [ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md [ICT]: https://github.com/mnot/ietf-comments |
2022-11-28
|
23 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
2022-11-11
|
23 | Tero Kivinen | Request for Telechat review by SECDIR is assigned to Vincent Roca |
2022-11-11
|
23 | Tero Kivinen | Request for Telechat review by SECDIR is assigned to Vincent Roca |
2022-11-08
|
23 | Cindy Morgan | Placed on agenda for telechat - 2022-12-01 |
2022-11-08
|
23 | Murray Kucherawy | Ballot has been issued |
2022-11-08
|
23 | Murray Kucherawy | [Ballot Position Update] New position, Yes, has been recorded for Murray Kucherawy |
2022-11-08
|
23 | Murray Kucherawy | Created "Approve" ballot |
2022-11-08
|
23 | Murray Kucherawy | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup |
2022-11-08
|
23 | Murray Kucherawy | Ballot writeup was changed |
2022-11-07
|
23 | (System) | Changed action holders to Murray Kucherawy (IESG state changed) |
2022-11-07
|
23 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2022-11-07
|
23 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-23.txt |
2022-11-07
|
23 | Chris Wendt | New version accepted (logged-in submitter: Chris Wendt) |
2022-11-07
|
23 | Chris Wendt | Uploaded new revision |
2022-11-06
|
22 | (System) | Changed action holders to Jon Peterson, Murray Kucherawy, Chris Wendt (IESG state changed) |
2022-11-06
|
22 | Murray Kucherawy | IESG state changed to Waiting for AD Go-Ahead::Revised I-D Needed from Waiting for Writeup::AD Followup |
2022-10-20
|
22 | Dale Worley | Request for Last Call review by GENART Completed: On the Right Track. Reviewer: Dale Worley. Sent review to list. |
2022-10-16
|
22 | Murray Kucherawy | IESG state changed to Waiting for Writeup::AD Followup from Waiting for Writeup |
2022-10-16
|
22 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA - Not OK |
2022-10-16
|
22 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-22.txt |
2022-10-16
|
22 | Chris Wendt | New version accepted (logged-in submitter: Chris Wendt) |
2022-10-16
|
22 | Chris Wendt | Uploaded new revision |
2022-10-13
|
21 | Jean Mahoney | Request for Last Call review by GENART is assigned to Dale Worley |
2022-10-13
|
21 | Jean Mahoney | Request for Last Call review by GENART is assigned to Dale Worley |
2022-10-13
|
21 | David Dong | IANA Experts State changed to Expert Reviews OK from Reviews assigned |
2022-10-13
|
21 | Harald Alvestrand | Request for Last Call review by ARTART Completed: Ready with Issues. Reviewer: Harald Alvestrand. Sent review to list. |
2022-10-12
|
21 | Vincent Roca | Request for Last Call review by SECDIR Completed: Not Ready. Reviewer: Vincent Roca. Sent review to list. |
2022-10-12
|
21 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2022-10-12
|
21 | Florian Obser | Request for Last Call review by DNSDIR Completed: Ready with Nits. Reviewer: Florian Obser. Sent review to list. |
2022-10-11
|
21 | David Dong | IANA Experts State changed to Reviews assigned |
2022-10-11
|
21 | (System) | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
2022-10-11
|
21 | David Dong | (Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-stir-passport-rcd-21. If any part of this review is inaccurate, please let … (Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-ietf-stir-passport-rcd-21. If any part of this review is inaccurate, please let us know. The IANA Functions Operator understands that, upon approval of this document, there are three actions which we must complete. First, in the JSON Web Token Claims registry on the JSON Web Token (JWT) registry page located at: https://www.iana.org/assignments/jwt/ three, new registrations are to be registered as follows: Claim Name: "rcd" Claim Description: Rich Call Data Information Change Controller: IESG Specification Document(s): [ RFC-to-be ] Claim Name: "rcdi" Claim Description: Rich Call Data Integrity Information Change Controller: IESG Specification Document(s): [ RFC-to-be ] Claim Name: "crn" Claim Description: Call Reason Change Controller: IESG Specification Document(s): [ RFC-to-be ] Because this registry requires Expert Review [RFC8126] for registration, we've contacted the IESG-designated expert in a separate ticket to request approval. Expert review should be completed before your document can be approved for publication as an RFC. IANA Question --> Would it be acceptable to list the IETF as the change controller for the JWT registrations instead of the IESG? There has been a preference for doing so, as described in the expired document at https://datatracker.ietf.org/doc/html/draft-leiba-ietf-iana-registrations-00, but it hasn\u2019t been recorded in a permanent document yet. Second, in the Personal Assertion Token (PASSporT) Extensions registry on the Personal Assertion Token (PASSporT) registry page located at: https://www.iana.org/assignments/passport/ a single, new registration will be made as follows: ppt value: rcd Reference: [ RFC-to-be ] Because this registry also requires Expert Review [RFC8126] for registration, we've contacted the IESG-designated expert in a separate ticket to request approval. Expert review should be completed before your document can be approved for publication as an RFC. Third, a new registry is to be created called the PASSporT RCD types registry. The new registry will be located on the Personal Assertion Token (PASSporT) registry page located at: https://www.iana.org/assignments/passport/ The new registry will have a registration procedure of Specification Required as defined in RFC8126. There are five, initial registrations in the new registry as follows: RCD Type Reference --------+------------- nam [ RFC-to-be ] apn [ RFC-to-be ] icn [ RFC-to-be ] jcd [ RFC-to-be ] jcl [ RFC-to-be ] The IANA Functions Operator understands that these three actions are the only ones required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, David Dong IANA Services Specialist |
2022-10-10
|
21 | Jim Reid | Request for Last Call review by DNSDIR is assigned to Florian Obser |
2022-10-10
|
21 | Jim Reid | Request for Last Call review by DNSDIR is assigned to Florian Obser |
2022-10-09
|
21 | Meral Shirazipour | Assignment of request for Last Call review by GENART to Meral Shirazipour was rejected |
2022-10-06
|
21 | Barry Leiba | Request for Last Call review by ARTART is assigned to Harald Alvestrand |
2022-10-06
|
21 | Barry Leiba | Request for Last Call review by ARTART is assigned to Harald Alvestrand |
2022-10-05
|
21 | Mark Nottingham | Assignment of request for Last Call review by ARTART to Mark Nottingham was rejected |
2022-10-05
|
21 | Barry Leiba | Request for Last Call review by ARTART is assigned to Mark Nottingham |
2022-10-05
|
21 | Barry Leiba | Request for Last Call review by ARTART is assigned to Mark Nottingham |
2022-10-05
|
21 | Jaime Jimenez | Assignment of request for Last Call review by ARTART to Jaime Jimenez was rejected |
2022-10-04
|
21 | Barry Leiba | Request for Last Call review by ARTART is assigned to Jaime Jimenez |
2022-10-04
|
21 | Barry Leiba | Request for Last Call review by ARTART is assigned to Jaime Jimenez |
2022-09-29
|
21 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Vincent Roca |
2022-09-29
|
21 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Vincent Roca |
2022-09-29
|
21 | Jean Mahoney | Request for Last Call review by GENART is assigned to Meral Shirazipour |
2022-09-29
|
21 | Jean Mahoney | Request for Last Call review by GENART is assigned to Meral Shirazipour |
2022-09-28
|
21 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Nagendra Nainar |
2022-09-28
|
21 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Nagendra Nainar |
2022-09-28
|
21 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2022-09-28
|
21 | Cindy Morgan | The following Last Call announcement was sent out (ends 2022-10-12): From: The IESG To: IETF-Announce CC: draft-ietf-stir-passport-rcd@ietf.org, housley@vigilsec.com, stir-chairs@ietf.org, stir@ietf.org, superuser@gmail.com … The following Last Call announcement was sent out (ends 2022-10-12): From: The IESG To: IETF-Announce CC: draft-ietf-stir-passport-rcd@ietf.org, housley@vigilsec.com, stir-chairs@ietf.org, stir@ietf.org, superuser@gmail.com Reply-To: last-call@ietf.org Sender: Subject: Last Call: (PASSporT Extension for Rich Call Data) to Proposed Standard The IESG has received a request from the Secure Telephone Identity Revisited WG (stir) to consider the following document: - 'PASSporT Extension for Rich Call Data' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2022-10-12. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document extends PASSporT, a token for conveying cryptographically-signed call information about personal communications, to include rich meta-data about a call and caller that can be signed and integrity protected, transmitted, and subsequently rendered to the called party. This framework is intended to include and extend caller and call specific information beyond human-readable display name comparable to the "Caller ID" function common on the telephone network and is also enhanced with a integrity mechanism that is designed to protect the authoring and transport of this information for different authoritative use-cases. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-stir-passport-rcd/ No IPR declarations have been submitted directly on this I-D. |
2022-09-28
|
21 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2022-09-28
|
21 | Murray Kucherawy | Last call was requested |
2022-09-28
|
21 | Murray Kucherawy | Ballot approval text was generated |
2022-09-28
|
21 | Murray Kucherawy | Ballot writeup was generated |
2022-09-28
|
21 | (System) | Changed action holders to Murray Kucherawy (IESG state changed) |
2022-09-28
|
21 | Murray Kucherawy | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
2022-09-28
|
21 | Murray Kucherawy | Last call announcement was generated |
2022-09-26
|
21 | (System) | Removed all action holders (IESG state changed) |
2022-09-26
|
21 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2022-09-26
|
21 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-21.txt |
2022-09-26
|
21 | Chris Wendt | New version accepted (logged-in submitter: Chris Wendt) |
2022-09-26
|
21 | Chris Wendt | Uploaded new revision |
2022-09-25
|
20 | Murray Kucherawy | Changed action holders to Jon Peterson, Chris Wendt |
2022-09-25
|
20 | (System) | Changed action holders to Jon Peterson, Murray Kucherawy, Chris Wendt (IESG state changed) |
2022-09-25
|
20 | Murray Kucherawy | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation |
2022-09-22
|
20 | (System) | Changed action holders to Murray Kucherawy (IESG state changed) |
2022-09-22
|
20 | Murray Kucherawy | IESG state changed to AD Evaluation from Publication Requested |
2022-09-20
|
20 | Russ Housley | Shepherd Write-up for draft-ietf-stir-passport-rcd-20 (1) Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did … Shepherd Write-up for draft-ietf-stir-passport-rcd-20 (1) Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? There is broad support for this document in the STIR WG. (2) Was there controversy about particular points, or were there decisions where the consensus was particularly rough? When work began on this document, the was some controversy about the integrity mechanism, bur consensus emerged for the solution in the document. No one spoke against this approach for over two years. (3) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No one has threatened an appeal or indicated extreme discontent. (4) For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as RFC 7942 recommends) or elsewhere (where)? Many people have expressed an intention implement this document. (5) Does this document need review from other IETF working groups or external organizations? Have those reviews occurred? None needed. (6) Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. None needed. (7) If the document contains a YANG module, has the final version of the module been checked with any of the recommended validation tools for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC 8342? YANG is not used in the document. (8) Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. JSON is used. The use if STIR PASSporT was reviewed on the jwt-reg-review@ietf.org mailing list in 2016. There are new JSON Web Token (JWT) Claims defined in this document, but they have not yet been explicitly discussed on the jwt-reg-review@ietf.org mailing list to get the advice of the Designated Experts. A posting was made on 15 September 2022 to make sure that the experts on that mailing list have an opportunity to comment. (9) Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? The document shepherd finds the document clear and complete. (10) Several IETF Areas have assembled lists of common issues that their reviewers encounter. Do any such issues remain that would merit specific attention from subsequent reviews? The document shepherd finds no concerns. (11) What type of RFC publication is being requested on the IETF stream (Best Current Practice, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Proposed Standard. The datatracker indicates this intent. (12) Has the interested community confirmed that any and all appropriate IPR disclosures required by BCP 78 and BCP 79 have been filed? If not, explain why. If yes, summarize any discussion and conclusion regarding the intellectual property rights (IPR) disclosures, including links to relevant emails. All authors and contributors have explicitly confirmed that all IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. There are none. (13) Has each Author or Contributor confirmed their willingness to be listed as such? If the number of Authors/Editors on the front page is greater than 5, please provide a justification. All authors have explicitly confirmed their willingness to be listed as an author. All contributors are listed as authors. (14) Identify any remaining I-D nits in this document. (See the idnits tool and the checkbox items found in Guidelines to Authors of Internet-Drafts). Simply running the idnits tool is not enough; please review the entire guidelines document. IDnits discovered one place where "MAY NOT" needs to be changed to "MUST NOT". The authors are making this change, and it will be posted when other changes are needed. The document shepherd review of the document did not find any issues related to the Guidelines to Authors of Internet-Drafts. (15) Should any informative references be normative or vice-versa? All references are in the proper category. (16) List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All normative references are RFCs, or will be when finished. (17) Are there any normative downward references (see RFC 3967, BCP 97)? If so, list them. There are no downrefs. (18) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If they exist, what is the plan for their completion? One of the normative references has not been published yet: draft-ietf-sipcore-callinfo-rcd. This is moving forward in a different IETF working group. (19) Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. Publication of this document will not effect the status of any other documents. (20) Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see RFC 8126). No concerns were found. As noted above, three new JSON Web Token (JWT) Claims are defined, these have been raised on the jwt-reg-review@ietf.org mailing list to get the advice of the Designated Experts. (21) List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. One new IANA registries is needed. The PASSporT RCD Types registry is described in Section 17.3, and it will use the Specification Required policy for new entries to be added in the future. |
2022-09-20
|
20 | Russ Housley | Responsible AD changed to Murray Kucherawy |
2022-09-20
|
20 | Russ Housley | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2022-09-20
|
20 | Russ Housley | IESG state changed to Publication Requested from I-D Exists |
2022-09-20
|
20 | Russ Housley | IESG process started in state Publication Requested |
2022-09-20
|
20 | Russ Housley | Tags Revised I-D Needed - Issue raised by WGLC, Doc Shepherd Follow-up Underway cleared. |
2022-09-20
|
20 | Russ Housley | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2022-09-20
|
20 | Russ Housley | Shepherd Write-up for draft-ietf-stir-passport-rcd-20 (1) Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did … Shepherd Write-up for draft-ietf-stir-passport-rcd-20 (1) Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? There is broad support for this document in the STIR WG. (2) Was there controversy about particular points, or were there decisions where the consensus was particularly rough? When work began on this document, the was some controversy about the integrity mechanism, bur consensus emerged for the solution in the document. No one spoke against this approach for over two years. (3) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No one has threatened an appeal or indicated extreme discontent. (4) For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as RFC 7942 recommends) or elsewhere (where)? Many people have expressed an intention implement this document. (5) Does this document need review from other IETF working groups or external organizations? Have those reviews occurred? None needed. (6) Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. None needed. (7) If the document contains a YANG module, has the final version of the module been checked with any of the recommended validation tools for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in RFC 8342? YANG is not used in the document. (8) Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. JSON is used. The use if STIR PASSporT was reviewed on the jwt-reg-review@ietf.org mailing list in 2016. There are new JSON Web Token (JWT) Claims defined in this document, but they have not yet been explicitly discussed on the jwt-reg-review@ietf.org mailing list to get the advice of the Designated Experts. A posting was made on 15 September 2022 to make sure that the experts on that mailing list have an opportunity to comment. (9) Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? The document shepherd finds the document clear and complete. (10) Several IETF Areas have assembled lists of common issues that their reviewers encounter. Do any such issues remain that would merit specific attention from subsequent reviews? The document shepherd finds no concerns. (11) What type of RFC publication is being requested on the IETF stream (Best Current Practice, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Proposed Standard. The datatracker indicates this intent. (12) Has the interested community confirmed that any and all appropriate IPR disclosures required by BCP 78 and BCP 79 have been filed? If not, explain why. If yes, summarize any discussion and conclusion regarding the intellectual property rights (IPR) disclosures, including links to relevant emails. All authors and contributors have explicitly confirmed that all IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. There are none. (13) Has each Author or Contributor confirmed their willingness to be listed as such? If the number of Authors/Editors on the front page is greater than 5, please provide a justification. All authors have explicitly confirmed their willingness to be listed as an author. All contributors are listed as authors. (14) Identify any remaining I-D nits in this document. (See the idnits tool and the checkbox items found in Guidelines to Authors of Internet-Drafts). Simply running the idnits tool is not enough; please review the entire guidelines document. IDnits discovered one place where "MAY NOT" needs to be changed to "MUST NOT". The authors are making this change, and it will be posted when other changes are needed. The document shepherd review of the document did not find any issues related to the Guidelines to Authors of Internet-Drafts. (15) Should any informative references be normative or vice-versa? All references are in the proper category. (16) List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All normative references are RFCs, or will be when finished. (17) Are there any normative downward references (see RFC 3967, BCP 97)? If so, list them. There are no downrefs. (18) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If they exist, what is the plan for their completion? One of the normative references has not been published yet: draft-ietf-sipcore-callinfo-rcd. This is moving forward in a different IETF working group. (19) Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. Publication of this document will not effect the status of any other documents. (20) Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see RFC 8126). No concerns were found. As noted above, three new JSON Web Token (JWT) Claims are defined, these have been raised on the jwt-reg-review@ietf.org mailing list to get the advice of the Designated Experts. (21) List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. One new IANA registries is needed. The PASSporT RCD Types registry is described in Section 17.3, and it will use the Specification Required policy for new entries to be added in the future. |
2022-09-15
|
20 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-20.txt |
2022-09-15
|
20 | Chris Wendt | New version accepted (logged-in submitter: Chris Wendt) |
2022-09-15
|
20 | Chris Wendt | Uploaded new revision |
2022-07-25
|
19 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-19.txt |
2022-07-25
|
19 | Chris Wendt | New version accepted (logged-in submitter: Chris Wendt) |
2022-07-25
|
19 | Chris Wendt | Uploaded new revision |
2022-07-13
|
18 | Russ Housley | Added to session: IETF-114: stir Tue-1500 |
2022-07-08
|
18 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-18.txt |
2022-07-08
|
18 | (System) | New version approved |
2022-07-08
|
18 | (System) | Request for posting confirmation emailed to previous authors: Chris Wendt , Jon Peterson |
2022-07-08
|
18 | Chris Wendt | Uploaded new revision |
2022-05-10
|
17 | Russ Housley | Tag Doc Shepherd Follow-up Underway set. |
2022-04-25
|
17 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-17.txt |
2022-04-25
|
17 | Chris Wendt | New version accepted (logged-in submitter: Chris Wendt) |
2022-04-25
|
17 | Chris Wendt | Uploaded new revision |
2022-04-21
|
16 | Ben Campbell | Added to session: interim-2022-stir-01 |
2022-04-19
|
16 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-16.txt |
2022-04-19
|
16 | Chris Wendt | New version accepted (logged-in submitter: Chris Wendt) |
2022-04-19
|
16 | Chris Wendt | Uploaded new revision |
2022-03-07
|
15 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-15.txt |
2022-03-07
|
15 | (System) | New version accepted (logged-in submitter: Chris Wendt) |
2022-03-07
|
15 | Chris Wendt | Uploaded new revision |
2021-10-25
|
14 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-14.txt |
2021-10-25
|
14 | (System) | New version approved |
2021-10-25
|
14 | (System) | Request for posting confirmation emailed to previous authors: Chris Wendt , Jon Peterson |
2021-10-25
|
14 | Chris Wendt | Uploaded new revision |
2021-10-07
|
13 | Russ Housley | Tag Revised I-D Needed - Issue raised by WGLC set. |
2021-09-13
|
13 | Robert Sparks | Added to session: interim-2021-stir-02 |
2021-09-09
|
13 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-13.txt |
2021-09-09
|
13 | (System) | New version approved |
2021-09-09
|
13 | (System) | Request for posting confirmation emailed to previous authors: Chris Wendt , Jon Peterson |
2021-09-09
|
13 | Chris Wendt | Uploaded new revision |
2021-07-29
|
12 | Russ Housley | Tag Revised I-D Needed - Issue raised by WG cleared. |
2021-07-12
|
12 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-12.txt |
2021-07-12
|
12 | (System) | New version approved |
2021-07-12
|
12 | (System) | Request for posting confirmation emailed to previous authors: Chris Wendt , Jon Peterson |
2021-07-12
|
12 | Chris Wendt | Uploaded new revision |
2021-03-29
|
11 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-11.txt |
2021-03-29
|
11 | (System) | New version approved |
2021-03-29
|
11 | (System) | Request for posting confirmation emailed to previous authors: Chris Wendt , Jon Peterson |
2021-03-29
|
11 | Chris Wendt | Uploaded new revision |
2021-03-28
|
10 | Russ Housley | Notification list changed to housley@vigilsec.com because the document shepherd was set |
2021-03-28
|
10 | Russ Housley | Document shepherd changed to Russ Housley |
2021-03-28
|
10 | Russ Housley | Tag Revised I-D Needed - Issue raised by WG set. |
2021-03-13
|
10 | Russ Housley | Tag Revised I-D Needed - Issue raised by WG cleared. |
2021-03-01
|
10 | Russ Housley | Added to session: IETF-110: stir Fri-1530 |
2021-02-22
|
10 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-10.txt |
2021-02-22
|
10 | (System) | New version approved |
2021-02-22
|
10 | (System) | Request for posting confirmation emailed to previous authors: Chris Wendt , Jon Peterson |
2021-02-22
|
10 | Chris Wendt | Uploaded new revision |
2021-01-15
|
09 | Russ Housley | Tag Revised I-D Needed - Issue raised by WG set. |
2021-01-15
|
09 | Russ Housley | Changed consensus to Yes from Unknown |
2021-01-15
|
09 | Russ Housley | Intended Status changed to Proposed Standard from None |
2020-12-08
|
09 | Robert Sparks | IETF WG state changed to In WG Last Call from WG Document |
2020-11-18
|
09 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-09.txt |
2020-11-18
|
09 | (System) | New version accepted (logged-in submitter: Chris Wendt) |
2020-11-18
|
09 | Chris Wendt | Uploaded new revision |
2020-11-16
|
08 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-08.txt |
2020-11-16
|
08 | (System) | New version accepted (logged-in submitter: Chris Wendt) |
2020-11-16
|
08 | Chris Wendt | Uploaded new revision |
2020-11-02
|
07 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-07.txt |
2020-11-02
|
07 | (System) | New version approved |
2020-11-02
|
07 | (System) | Request for posting confirmation emailed to previous authors: Jon Peterson , Chris Wendt |
2020-11-02
|
07 | Chris Wendt | Uploaded new revision |
2020-09-10
|
06 | (System) | Document has expired |
2020-04-19
|
06 | Robert Sparks | Added to session: interim-2020-stir-01 |
2020-03-09
|
06 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-06.txt |
2020-03-09
|
06 | (System) | New version approved |
2020-03-09
|
06 | (System) | Request for posting confirmation emailed to previous authors: Jon Peterson , Chris Wendt |
2020-03-09
|
06 | Chris Wendt | Uploaded new revision |
2019-11-04
|
05 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-05.txt |
2019-11-04
|
05 | (System) | New version approved |
2019-11-04
|
05 | (System) | Request for posting confirmation emailed to previous authors: Jon Peterson , Chris Wendt |
2019-11-04
|
05 | Chris Wendt | Uploaded new revision |
2019-07-12
|
04 | Russ Housley | Added to session: IETF-105: stir Mon-1000 |
2019-07-08
|
04 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-04.txt |
2019-07-08
|
04 | (System) | New version approved |
2019-07-08
|
04 | (System) | Request for posting confirmation emailed to previous authors: Jon Peterson , Chris Wendt |
2019-07-08
|
04 | Chris Wendt | Uploaded new revision |
2019-03-26
|
03 | Robert Sparks | Added to session: IETF-104: stir Fri-0900 |
2019-03-11
|
03 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-03.txt |
2019-03-11
|
03 | (System) | New version approved |
2019-03-11
|
03 | (System) | Request for posting confirmation emailed to previous authors: Jon Peterson , Chris Wendt |
2019-03-11
|
03 | Chris Wendt | Uploaded new revision |
2019-02-19
|
02 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-02.txt |
2019-02-19
|
02 | (System) | New version approved |
2019-02-19
|
02 | (System) | Request for posting confirmation emailed to previous authors: Jon Peterson , Chris Wendt |
2019-02-19
|
02 | Chris Wendt | Uploaded new revision |
2018-10-22
|
01 | Chris Wendt | New version available: draft-ietf-stir-passport-rcd-01.txt |
2018-10-22
|
01 | (System) | New version approved |
2018-10-22
|
01 | (System) | Request for posting confirmation emailed to previous authors: Jon Peterson , Chris Wendt |
2018-10-22
|
01 | Chris Wendt | Uploaded new revision |
2018-01-04
|
00 | (System) | Document has expired |
2017-07-16
|
00 | Robert Sparks | Added to session: IETF-99: stir Wed-1330 |
2017-07-05
|
00 | Robert Sparks | This document now replaces draft-peterson-stir-cnam instead of None |
2017-07-03
|
00 | Jon Peterson | New version available: draft-ietf-stir-passport-rcd-00.txt |
2017-07-03
|
00 | (System) | WG -00 approved |
2017-07-03
|
00 | Jon Peterson | Set submitter to "Jon Peterson ", replaces to (none) and sent approval email to group chairs: stir-chairs@ietf.org |
2017-07-03
|
00 | Jon Peterson | Uploaded new revision |