Out-of-Band STIR for Service Providers
draft-ietf-stir-servprovider-oob-08
Revision differences
Document history
| Date | Rev. | By | Action |
|---|---|---|---|
|
2025-10-21
|
08 | (System) | RFC Editor state changed to AUTH48 |
|
2025-08-20
|
08 | (System) | RFC Editor state changed to EDIT from AUTH |
|
2025-07-23
|
08 | (System) | RFC Editor state changed to AUTH from EDIT |
|
2025-07-23
|
08 | (System) | RFC Editor state changed to EDIT |
|
2025-07-23
|
08 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
|
2025-07-23
|
08 | (System) | Announcement was received by RFC Editor |
|
2025-07-23
|
08 | (System) | IANA Action state changed to No IANA Actions from In Progress |
|
2025-07-23
|
08 | (System) | IANA Action state changed to In Progress |
|
2025-07-23
|
08 | (System) | Removed all action holders (IESG state changed) |
|
2025-07-23
|
08 | Morgan Condie | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
|
2025-07-23
|
08 | Morgan Condie | IESG has approved the document |
|
2025-07-23
|
08 | Morgan Condie | Closed "Approve" ballot |
|
2025-07-23
|
08 | Morgan Condie | Ballot approval text was generated |
|
2025-07-23
|
08 | Orie Steele | IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::AD Followup |
|
2025-07-07
|
08 | (System) | Changed action holders to Orie Steele (IESG state changed) |
|
2025-07-07
|
08 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
|
2025-07-07
|
08 | Jon Peterson | New version available: draft-ietf-stir-servprovider-oob-08.txt |
|
2025-07-07
|
08 | Jon Peterson | New version accepted (logged-in submitter: Jon Peterson) |
|
2025-07-07
|
08 | Jon Peterson | Uploaded new revision |
|
2025-05-08
|
07 | (System) | Changed action holders to Jon Peterson (IESG state changed) |
|
2025-05-08
|
07 | Cindy Morgan | IESG state changed to Approved-announcement to be sent::Revised I-D Needed from IESG Evaluation |
|
2025-05-07
|
07 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
|
2025-05-07
|
07 | Paul Wouters | [Ballot Position Update] New position, No Objection, has been recorded for Paul Wouters |
|
2025-05-07
|
07 | Mike Bishop | [Ballot Position Update] New position, No Objection, has been recorded for Mike Bishop |
|
2025-05-05
|
07 | Mohamed Boucadair | [Ballot comment] Hi Jon, Thank you for the effort put into this specification. Thanks Gyan Mishra for the OSPDIR review. Given the target PS, I … [Ballot comment] Hi Jon, Thank you for the effort put into this specification. Thanks Gyan Mishra for the OSPDIR review. Given the target PS, I hesitated to ballot a DISCUSS as the description smells more architectural than a (interface) specification. There are several options that are listed in some sections (e.g., DNS for discovery), without providing concrete details about how this will be implemented. Also, there is no discussion on the impact of the proposed solution on the CPS scalability and also session placement performance. Please find below some comments, fwiw. # Abstract OLD: means of carrying its Persona Assertion Tokens (PASSporTs) either in- band, within the headers of a Session Initiation Protocl (SIP) NEW: means of carrying its Personal Assertion Tokens (PASSporTs) either in- band, within the headers of a Session Initiation Protocol (SIP) # On Classes CURRENT: Environments that might support this flavor of STIR out-of-band include carriers, large enterprises, call centers, or any Internet service that aggregates on behalf of a large number of telephone endpoints. That last case may include certain classes of gateway or transit providers. Is the use of “classes” here similar to the use of class (1,2,3,4,5) in old PSTN? Or is this a generic term? Also, can we provide examples of “certain” we refer to here? # Deployment assumptions ## vs. RFC8816 It is not straightforward to see to what extent the assumptions in Section 3 are distinct/new vs. the base assumptions in RFC8816. If any refresh is made since 8816, then call these explicitly. Maybe this part requires an HTTP interface, while 8816 only assume “HTTPS Interface to the CPS” as an example? CURRENT: The applicability of this architecture is, therefore, to those cases where, for whatever reason, SIP requests cannot reliably convey PASSporTs end-to-end, but an HTTP transaction can reliably be sent to the CPS from an out-of-band authentication service (OOB-AS). ## CPS is a logical entity, anyway CURRENT: Moreover, a particular CPS can be a logically distributed entity compromised of several geographically distant entities that flood PASSporTs among themselves to support an anycast-like service. Unless I’m mistaken, we don’t mandate any internal CPS structure. I don’t thus parse what we meant by the “geographically distant entities” in this text. ## Internet connectivity CURRENT: The process of locating a destination CPS and submitting a PASSporT naturally requires Internet connectivity to the CPS. Maybe I misread this text, but couldn’t the OOB arch be deployed in the presence of federations with private interconnection? I see that you have this right in Section 4: CURRENT: These CPS URIs SHOULD be publicly reachable, as service providers cannot usually anticipate all of the potential callers that might want to connect with them, but in more constrained environments, they MAY be only reachable over a closed network. # CPS Advertisement/Discovery: many options with no concrete realization details This section includes many statements/options, without providing concrete details about how to put them into effect. For example, how DNS looking in this text have to be done? CURRENT: CPS advertisements could be made available through existing or new databases, potentially aggregated across multiple service providers and distributed to call originators as necessary. They could be discovered during the call routing process, including through a DNS lookup. They could be shared through a distributed database among the participants in a multilateral peering arrangement. Given the target PS track, I was expecting more description of the expected behavior: # Freshness interval CURRENT: event for no longer than the freshness interval of the PASSporT itself (a maximum of sixty seconds). Is this under control of service providers? Can this be negotiated when putting CPS interface in place? # Impact on session established delay and information gleaning CURRENT: Note that a multi-provider CPS will need to inspect the "dest" element of a PASSporT to determine which OOB-VS should receive the PASSporT. Do we have an idea about the impact of such inspection on the session establishment delay? Also, is there any information that can b “gleaned” from sch inspection that may be misused? Can that be controlled? What are the scalability impact on CPS? May be provide pointers to where these matters are discussed would be sufficient. # RFC 3986 is listed as normative but not cited in the document. Please fix that. Cheers, Med |
|
2025-05-05
|
07 | Mohamed Boucadair | [Ballot Position Update] New position, No Objection, has been recorded for Mohamed Boucadair |
|
2025-05-02
|
07 | (System) | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
|
2025-05-02
|
07 | Roman Danyliw | [Ballot comment] Thank you to Joel Halpern for the GENART review. |
|
2025-05-02
|
07 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
|
2025-04-29
|
07 | Andy Newton | [Ballot Position Update] New position, No Objection, has been recorded for Andy Newton |
|
2025-04-29
|
07 | Ketan Talaulikar | [Ballot Position Update] New position, No Objection, has been recorded for Ketan Talaulikar |
|
2025-04-29
|
07 | Gunter Van de Velde | [Ballot comment] Thanks for this write-up. I learned new interesting things about CPS and STIR. I do not have enough expertise regarding the technology area … [Ballot comment] Thanks for this write-up. I learned new interesting things about CPS and STIR. I do not have enough expertise regarding the technology area to judge if the technical parts are correct, but the flow and storyline reads well. |
|
2025-04-29
|
07 | Gunter Van de Velde | [Ballot Position Update] New position, No Objection, has been recorded for Gunter Van de Velde |
|
2025-04-27
|
07 | Deb Cooley | [Ballot comment] Thanks to both Barry Leiba and Ned Smith for secdir reviews. Section 1, paragraph 2, sentence 1: Pedantic, perhaps, but should 'complex security … [Ballot comment] Thanks to both Barry Leiba and Ned Smith for secdir reviews. Section 1, paragraph 2, sentence 1: Pedantic, perhaps, but should 'complex security measures' be 'complex security and privacy measures'? (see my comment on Privacy Considerations) Privacy Considerations: I was slightly surprised that this section didn't exist in this draft. I do see that RFC 8816 has an extensive privacy considerations section. It might be an interesting way to draw out how the differences described in Section 1, paragraph 2 affect privacy in addition to security. Normative Ref: Since RFC9110 was added, it appears that RFC3986 is no longer referenced, and could possibly be removed. |
|
2025-04-27
|
07 | Deb Cooley | [Ballot Position Update] New position, No Objection, has been recorded for Deb Cooley |
|
2025-04-25
|
07 | Jim Guichard | [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard |
|
2025-04-17
|
07 | Gorry Fairhurst | [Ballot comment] Thanks for this I-D, I did not see any transport-related concerns, and have only comments: There is a typo in the abstract: Session … [Ballot comment] Thanks for this I-D, I did not see any transport-related concerns, and have only comments: There is a typo in the abstract: Session Initiation Protocl (SIP). Please correct “Protocol”. I suggest it would be helpful to define STIR as “The Secure Telephone Identity Revisited (STIR)” also at the start of the introduction. Maybe: /requires security measures which are intended/requires security measures that are intended/ |
|
2025-04-17
|
07 | Gorry Fairhurst | [Ballot Position Update] New position, No Objection, has been recorded for Gorry Fairhurst |
|
2025-03-08
|
07 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
|
2025-03-04
|
07 | Jenny Bui | Placed on agenda for telechat - 2025-05-08 |
|
2025-03-04
|
07 | Orie Steele | Ballot has been issued |
|
2025-03-04
|
07 | Orie Steele | [Ballot Position Update] New position, Yes, has been recorded for Orie Steele |
|
2025-03-04
|
07 | Orie Steele | Created "Approve" ballot |
|
2025-03-04
|
07 | Orie Steele | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup |
|
2025-03-04
|
07 | Orie Steele | Ballot writeup was changed |
|
2025-03-03
|
07 | (System) | Changed action holders to Orie Steele (IESG state changed) |
|
2025-03-03
|
07 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
|
2025-03-03
|
07 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
|
2025-03-03
|
07 | Jon Peterson | New version available: draft-ietf-stir-servprovider-oob-07.txt |
|
2025-03-03
|
07 | (System) | New version approved |
|
2025-03-03
|
07 | (System) | Request for posting confirmation emailed to previous authors: Jon Peterson |
|
2025-03-03
|
07 | Jon Peterson | Uploaded new revision |
|
2024-08-23
|
06 | Orie Steele | I'd like to see Barry's comments addressed: https://datatracker.ietf.org/doc/review-ietf-stir-servprovider-oob-06-secdir-lc-leiba-2024-08-09/ |
|
2024-08-23
|
06 | (System) | Changed action holders to Jon Peterson (IESG state changed) |
|
2024-08-23
|
06 | Orie Steele | IESG state changed to Waiting for AD Go-Ahead::Revised I-D Needed from Waiting for AD Go-Ahead |
|
2024-08-12
|
06 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
|
2024-08-09
|
06 | (System) | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
|
2024-08-09
|
06 | David Dong | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-stir-servprovider-oob-06, which is currently in Last Call, and has the following comments: We … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-stir-servprovider-oob-06, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any registry actions. While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object. If this assessment is not accurate, please respond as soon as possible. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, David Dong IANA Services Sr. Specialist |
|
2024-08-09
|
06 | Barry Leiba | Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Barry Leiba. Sent review to list. |
|
2024-08-09
|
06 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Barry Leiba |
|
2024-08-02
|
06 | Ned Smith | Assignment of request for Last Call review by SECDIR to Ned Smith was rejected |
|
2024-08-02
|
06 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Ned Smith |
|
2024-07-29
|
06 | Liz Flynn | The following Last Call announcement was sent out (ends 2024-08-12): From: The IESG To: IETF-Announce CC: ben@nostrum.com, draft-ietf-stir-servprovider-oob@ietf.org, orie@transmute.industries, stir-chairs@ietf.org, stir@ietf.org … The following Last Call announcement was sent out (ends 2024-08-12): From: The IESG To: IETF-Announce CC: ben@nostrum.com, draft-ietf-stir-servprovider-oob@ietf.org, orie@transmute.industries, stir-chairs@ietf.org, stir@ietf.org Reply-To: last-call@ietf.org Sender: Subject: Last Call: (Out-of-Band STIR for Service Providers) to Proposed Standard The IESG has received a request from the Secure Telephone Identity Revisited WG (stir) to consider the following document: - 'Out-of-Band STIR for Service Providers' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2024-08-12. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract The Secure Telephone Identity Revisited (STIR) framework defines means of carrying its Persona Assertion Tokens (PASSporTs) either in- band, within the headers of a Session Initiation Protocl (SIP) request, or out-of-band, through a service that stores PASSporTs for retrieval by relying parties. This specification defines a way that the out-of-band conveyance of PASSporTs can be used to support large service providers, for cases in which in-band STIR conveyance is not universally available. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-stir-servprovider-oob/ No IPR declarations have been submitted directly on this I-D. The document contains these normative downward references. See RFC 3967 for additional information: rfc8816: Secure Telephone Identity Revisited (STIR) Out-of-Band Architecture and Use Cases (Informational - Internet Engineering Task Force (IETF)) |
|
2024-07-29
|
06 | Liz Flynn | IESG state changed to In Last Call from Last Call Requested |
|
2024-07-29
|
06 | Liz Flynn | Last call announcement was generated |
|
2024-07-27
|
06 | Orie Steele | Last call was requested |
|
2024-07-27
|
06 | Orie Steele | Apologies for the confusion at the IETF 120 mic line. I had minor comments on this document, which I had failed to make available to … Apologies for the confusion at the IETF 120 mic line. I had minor comments on this document, which I had failed to make available to the working group. Authors have addressed my comments, and the remaining discussion regarding the downref was addressed at the mic line by Jon and Robert, with comments from the chairs. I repeat the comment on the downref from the shepheard writeup for the record here: There is a normative reference to an informational RFC: RFC 8816. This is appropriate because this draft describes a standard that realizes parts of the architecture defined in RFC 8816. That RFC is necessary reading to fully understand this draft. In particular, there are security considerations described in that RFC that implementors of this draft should understand. This downref should be called out in the IETF last call announcement. |
|
2024-07-27
|
06 | Orie Steele | IESG state changed to Last Call Requested from Waiting for AD Go-Ahead::AD Followup |
|
2024-07-08
|
06 | (System) | Changed action holders to Orie Steele (IESG state changed) |
|
2024-07-08
|
06 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
|
2024-07-08
|
06 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
|
2024-07-08
|
06 | Jon Peterson | New version available: draft-ietf-stir-servprovider-oob-06.txt |
|
2024-07-08
|
06 | Jon Peterson | New version accepted (logged-in submitter: Jon Peterson) |
|
2024-07-08
|
06 | Jon Peterson | Uploaded new revision |
|
2024-04-29
|
05 | Ned Smith | Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Ned Smith. Sent review to list. |
|
2024-04-08
|
05 | Orie Steele | I've reviewed IETF Last Call, and am suggesting revisions I would like to see before sending the document to the IESG. As such, I am … I've reviewed IETF Last Call, and am suggesting revisions I would like to see before sending the document to the IESG. As such, I am setting the substate to "Revised I-D Needed": Please address the directorate reviews, with an email to the list or a revision: - https://datatracker.ietf.org/doc/review-ietf-stir-servprovider-oob-05-genart-lc-halpern-2024-03-28/ - https://datatracker.ietf.org/doc/review-ietf-stir-servprovider-oob-05-artart-lc-fossati-2024-03-22/ See comments below: Abstract: SIP (expand on first use) Section 1. Introduction PSTN (expand on first use) Section 4. Advertising a CPS """ CPS URIs MUST be HTTPS URIs. """ Perhaps a citation to https://datatracker.ietf.org/doc/html/rfc3986 Not sure if this matters for your use case, but it is a common i18n / URI issue: https://url.spec.whatwg.org/#idna Section 5. Submitting a PASSporT """ and as such the information that appears in the PASSporT is redundant with call signaling that the terminating party will receive anyway. """ It would be nice to see a comment about not including additional information echoed in the security considerations section, or to enumerate all the "redundant" information, so that it is clearer. """ The OOB-AS SHOULD authenticate itself to the CPS via mutual TLS using its STIR credential [RFC8226], the same one it would use to sign calls; this helps mitigate the risk of flooding that more open OOB implementations may face. """ Is a reference to https://datatracker.ietf.org/doc/rfc9525/ useful here? Is there an alternative reference for mutual TLS? """ An OOB-AS will use a REST interface to submit PASSporTs to the CPS as described in [RFC8816] Section 9. """ This is almost a downref... if not normative, why not "might use"... "will use" implies "MUST"? (same comment applies to section 6). |
|
2024-04-08
|
05 | (System) | Changed action holders to Jon Peterson (IESG state changed) |
|
2024-04-08
|
05 | Orie Steele | IESG state changed to Waiting for AD Go-Ahead::Revised I-D Needed from Waiting for AD Go-Ahead |
|
2024-04-06
|
05 | Gyan Mishra | Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Gyan Mishra. Sent review to list. Submission of review completed at an earlier date. |
|
2024-04-06
|
05 | Gyan Mishra | Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Gyan Mishra. |
|
2024-03-31
|
05 | (System) | Changed action holders to Orie Steele (IESG state changed) |
|
2024-03-31
|
05 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
|
2024-03-30
|
05 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Ned Smith |
|
2024-03-28
|
05 | Joel Halpern | Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Joel Halpern. Sent review to list. Submission of review completed at an earlier … Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Joel Halpern. Sent review to list. Submission of review completed at an earlier date. |
|
2024-03-28
|
05 | Joel Halpern | Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Joel Halpern. |
|
2024-03-28
|
05 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
|
2024-03-28
|
05 | David Dong | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-stir-servprovider-oob-05, which is currently in Last Call, and has the following comments: We … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-stir-servprovider-oob-05, which is currently in Last Call, and has the following comments: We understand that this document doesn't require any registry actions. While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object. If this assessment is not accurate, please respond as soon as possible. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, David Dong IANA Services Sr. Specialist |
|
2024-03-22
|
05 | Thomas Fossati | Request for Last Call review by ARTART Completed: Ready with Nits. Reviewer: Thomas Fossati. Sent review to list. |
|
2024-03-21
|
05 | Carlos Pignataro | Request for Last Call review by OPSDIR is assigned to Gyan Mishra |
|
2024-03-20
|
05 | Jenny Bui | Shepherding AD changed to Orie Steele |
|
2024-03-19
|
05 | Jean Mahoney | Request for Last Call review by GENART is assigned to Joel Halpern |
|
2024-03-18
|
05 | Barry Leiba | Request for Last Call review by ARTART is assigned to Thomas Fossati |
|
2024-03-17
|
05 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
|
2024-03-17
|
05 | Cindy Morgan | The following Last Call announcement was sent out (ends 2024-03-31): From: The IESG To: IETF-Announce CC: ben@nostrum.com, draft-ietf-stir-servprovider-oob@ietf.org, stir-chairs@ietf.org, stir@ietf.org, superuser@gmail.com … The following Last Call announcement was sent out (ends 2024-03-31): From: The IESG To: IETF-Announce CC: ben@nostrum.com, draft-ietf-stir-servprovider-oob@ietf.org, stir-chairs@ietf.org, stir@ietf.org, superuser@gmail.com Reply-To: last-call@ietf.org Sender: Subject: Last Call: (Out-of-Band STIR for Service Providers) to Proposed Standard The IESG has received a request from the Secure Telephone Identity Revisited WG (stir) to consider the following document: - 'Out-of-Band STIR for Service Providers' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2024-03-31. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract The Secure Telephone Identity Revisited (STIR) framework defines means of carrying its Persona Assertion Tokens (PASSporTs) either in- band, within the headers of a SIP request, or out-of-band, through a service that stores PASSporTs for retrieval by relying parties. This specification defines a way that the out-of-band conveyance of PASSporTs can be used to support large service providers, for cases in which in-band STIR conveyance is not universally available. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-stir-servprovider-oob/ No IPR declarations have been submitted directly on this I-D. The document contains these normative downward references. See RFC 3967 for additional information: rfc8816: Secure Telephone Identity Revisited (STIR) Out-of-Band Architecture and Use Cases (Informational - Internet Engineering Task Force (IETF)) |
|
2024-03-17
|
05 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
|
2024-03-17
|
05 | Cindy Morgan | Last call announcement was changed |
|
2024-03-16
|
05 | Murray Kucherawy | Last call was requested |
|
2024-03-16
|
05 | Murray Kucherawy | Ballot approval text was generated |
|
2024-03-16
|
05 | Murray Kucherawy | Ballot writeup was generated |
|
2024-03-16
|
05 | Murray Kucherawy | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
|
2024-03-16
|
05 | Murray Kucherawy | Last call announcement was generated |
|
2024-03-08
|
05 | Murray Kucherawy | IESG state changed to AD Evaluation::AD Followup from AD Evaluation |
|
2024-02-14
|
05 | Murray Kucherawy | IESG state changed to AD Evaluation from Publication Requested |
|
2024-02-02
|
05 | Ben Campbell | # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* Thank you for your service as a document shepherd. Among the … # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* Thank you for your service as a document shepherd. Among the responsibilities is answering the questions in this write-up to give helpful context to Last Call and Internet Engineering Steering Group ([IESG][1]) reviewers, and your diligence in completing it is appreciated. The full role of the shepherd is further described in [RFC 4858][2]. You will need the cooperation of the authors and editors to complete these checks. Note that some numbered items contain multiple related questions; please be sure to answer all of them. ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The consensus was mainly among a small group of individuals, but that is mostly standard operating procedure for the STIR working groups. Active participants comprise a small number of industry experts. Note: The primary consumers of the technologies collectively known as STIR are telecom SDOs that create profiles specific to their constituencies, for example, the ATIS/SIP Forum IP-NNI task force creates profiles of STIR as part of the SHAKEN framework for US telephone network operators. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? There have been concerns raised (mostly in venues other than STIR) about the potential for the substitution attack described in RFC 8816 section 7.4 could be a problem. There have been additional concerns raised about privacy implications of third-party Call Processing Services (CPS). Those concerns mainly applied to proposals that do not conform to this draft, which mitigates those concerns by placing the CPS at of one of the parties to a call. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) There have been no threats of appeal or indications of discontent. 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? The shepherd is aware of multiple non-public implementation efforts, but is not aware of any publicly available reports. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. In the shepherd's opinion, the normal directorate reviews will be sufficient. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. The draft does not specify models, media types, URIs, etc., that would trigger the need for formal expert reviews. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? The draft does not specify a YANG module. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. The draft does not use formal languages that would trigger the need for checks. idnits 2.17.1 mentions the normative downref described later in this writeup, but otherwise finds no material issues. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? The shepherd is of the opinion that this draft is ready to be handed off to the responsible area director. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? The document does not fall afoul of the issues listed for the ART area. While some issues in the SEC area list may apply, the shepherd believes they have had sufficient review by security experts who actively participate in the STIR working group. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? The intended status is Proposed Standard. This is the proper status because the draft specifies how to implement an interoperable service. It contains normative requirements which, if ignored, could impact the operation and security of the service. The intended status is correctly indicated in the data tracker. Note that earlier versions were labeled as informational. The working group agreed to change the status to Proposed Standard for the reasons listed above. This change is reflected in version 5. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. There are no IPR disclosures. The author has confirmed that there is no undisclosed IPR that he is aware of. 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) The only material nit of which the shepherd is aware is the normative downref described in 17. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. The references are correctly categorized. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All normative references are to IETF RFCs. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. There is a normative reference to an informational RFC: RFC 8816. This is appropriate because this draft describes a standard that realizes parts of the architecture defined in RFC 8816. That RFC is necessary reading to fully understand this draft. In particular, there are security considerations described in that RFC that implementors of this draft should understand. This downref should be called out in the IETF last call announcement. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? All normative references are to published RFCs. 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. This draft does not change the status of any RFC. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). The draft makes no requests of IANA. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. The draft makes no requests of IANA. [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
|
2024-02-02
|
05 | Ben Campbell | IETF WG state changed to Submitted to IESG for Publication from WG Document |
|
2024-02-02
|
05 | Ben Campbell | IESG state changed to Publication Requested from I-D Exists |
|
2024-02-02
|
05 | (System) | Changed action holders to Murray Kucherawy (IESG state changed) |
|
2024-02-02
|
05 | Ben Campbell | Responsible AD changed to Murray Kucherawy |
|
2024-02-02
|
05 | Ben Campbell | Document is now in IESG state Publication Requested |
|
2024-02-02
|
05 | Ben Campbell | # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* Thank you for your service as a document shepherd. Among the … # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* Thank you for your service as a document shepherd. Among the responsibilities is answering the questions in this write-up to give helpful context to Last Call and Internet Engineering Steering Group ([IESG][1]) reviewers, and your diligence in completing it is appreciated. The full role of the shepherd is further described in [RFC 4858][2]. You will need the cooperation of the authors and editors to complete these checks. Note that some numbered items contain multiple related questions; please be sure to answer all of them. ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The consensus was mainly among a small group of individuals, but that is mostly standard operating procedure for the STIR working groups. Active participants comprise a small number of industry experts. Note: The primary consumers of the technologies collectively known as STIR are telecom SDOs that create profiles specific to their constituencies, for example, the ATIS/SIP Forum IP-NNI task force creates profiles of STIR as part of the SHAKEN framework for US telephone network operators. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? There have been concerns raised (mostly in venues other than STIR) about the potential for the substitution attack described in RFC 8816 section 7.4 could be a problem. There have been additional concerns raised about privacy implications of third-party Call Processing Services (CPS). Those concerns mainly applied to proposals that do not conform to this draft, which mitigates those concerns by placing the CPS at of one of the parties to a call. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) There have been no threats of appeal or indications of discontent. 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? The shepherd is aware of multiple non-public implementation efforts, but is not aware of any publicly available reports. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. In the shepherd's opinion, the normal directorate reviews will be sufficient. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. The draft does not specify models, media types, URIs, etc., that would trigger the need for formal expert reviews. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? The draft does not specify a YANG module. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. The draft does not use formal languages that would trigger the need for checks. idnits 2.17.1 mentions the normative downref described later in this writeup, but otherwise finds no material issues. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? The shepherd is of the opinion that this draft is ready to be handed off to the responsible area director. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? The document does not fall afoul of the issues listed for the ART area. While some issues in the SEC area list may apply, the shepherd believes they have had sufficient review by security experts who actively participate in the STIR working group. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? The intended status is Proposed Standard. This is the proper status because the draft specifies how to implement an interoperable service. It contains normative requirements which, if ignored, could impact the operation and security of the service. The intended status is correctly indicated in the data tracker. Note that earlier versions were labeled as informational. The working group agreed to change the status to Proposed Standard for the reasons listed above. This change is reflected in version 5. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. There are no IPR disclosures. The author has confirmed that there is no undisclosed IPR that he is aware of. 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) The only material nit of which the shepherd is aware is the normative downref described in 17. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. The references are correctly categorized. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All normative references are to IETF RFCs. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. There is a normative reference to an informational RFC: RFC 8816. This is appropriate because this draft describes a standard that realizes parts of the architecture defined in RFC 8816. That RFC is necessary reading to fully understand this draft. In particular, there are security considerations described in that RFC that implementors of this draft should understand. This downref should be called out in the IETF last call announcement. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? All normative references are to published RFCs. 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. This draft does not change the status of any RFC. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). The draft makes no requests of IANA. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. The draft makes no requests of IANA. [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
|
2024-01-10
|
05 | Ben Campbell | # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* Thank you for your service as a document shepherd. Among the … # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* Thank you for your service as a document shepherd. Among the responsibilities is answering the questions in this write-up to give helpful context to Last Call and Internet Engineering Steering Group ([IESG][1]) reviewers, and your diligence in completing it is appreciated. The full role of the shepherd is further described in [RFC 4858][2]. You will need the cooperation of the authors and editors to complete these checks. Note that some numbered items contain multiple related questions; please be sure to answer all of them. ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The consensus was mainly among a small group of individuals, but that is mostly standard operating procedure for the STIR working groups. Active participants comprise a small number of industry experts. Note: The primary consumers of the technologies collectively known as STIR are telecom SDOs that create profiles specific to their constituencies, for example, the ATIS/SIP Forum IP-NNI task force creates profiles of STIR as part of the SHAKEN framework for US telephone network operators. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? There have been concerns raised (mostly in venues other than STIR) about the potential for the substitution attack described in RFC 8816 section 7.4 could be a problem. There have been additional concerns raised about privacy implications of third-party Call Processing Services (CPS). Those concerns mainly applied to proposals that do not conform to this draft, which mitigates those concerns by placing the CPS at of one of the parties to a call. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) There have been no threats of appeal or indications of discontent. 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? The shepherd is aware of multiple non-public implementation efforts, but is not aware of any publicly available reports. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. In the shepherd's opinion, the normal directorate reviews will be sufficient. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. The draft does not specify models, media types, URIs, etc., that would trigger the need for formal expert reviews. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? The draft does not specify a YANG module. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. The draft does not use formal languages that would trigger the need for checks. idnits 2.17.1 mentions the normative downref described later in this writeup, but otherwise finds no material issues. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? The shepherd is of the opinion that this draft is ready to be handed off to the responsible area director. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? The document does not fall afoul of the issues listed for the ART area. While some issues in the SEC area list may apply, the shepherd believes they have had sufficient review by security experts who actively participate in the STIR working group. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? The intended status is Proposed Standard. This is the proper status because the draft specifies how to implement an interoperable service. It contains normative requirements which, if ignored, could impact the operation and security of the service. The intended status is correctly indicated in the data tracker. Note that earlier versions were labeled as informational. The working group agreed to change the status to Proposed Standard for the reasons listed above. This change is reflected in version 5. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. [In Progress] 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. [In Progress] 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) The only material nit of which the shepherd is aware is the normative downref described in 17. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. The references are correctly categorized. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All normative references are to IETF RFCs. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. There is a normative reference to an informational RFC: RFC 8816. This is appropriate because this draft describes a standard that realizes parts of the architecture defined in RFC 8816. That RFC is necessary reading to fully understand this draft. In particular, there are security considerations described in that RFC that implementors of this draft should understand. This downref should be called out in the IETF last call announcement. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? All normative references are to published RFCs. 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. This draft does not change the status of any RFC. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). The draft makes no requests of IANA. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. The draft makes no requests of IANA. [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
|
2024-01-09
|
05 | Ben Campbell | # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* Thank you for your service as a document shepherd. Among the … # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* Thank you for your service as a document shepherd. Among the responsibilities is answering the questions in this write-up to give helpful context to Last Call and Internet Engineering Steering Group ([IESG][1]) reviewers, and your diligence in completing it is appreciated. The full role of the shepherd is further described in [RFC 4858][2]. You will need the cooperation of the authors and editors to complete these checks. Note that some numbered items contain multiple related questions; please be sure to answer all of them. ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The consensus was mainly among a small group of individuals, but that is mostly standard operating procedure for the STIR working groups. Active participants comprise a small number of industry experts. Note: The primary consumers of the technologies collectively known as STIR are telecom SDOs that create profiles specific to their constituencies, for example, the ATIS/SIP Forum IP-NNI task force creates profiles of STIR as part of the SHAKEN framework for US telephone network operators. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? There have been concerns raised (mostly in venues other than STIR) about the potential for the substitution attack described in RFC 8816 section 7.4 could be a problem. There have been additional concerns raised about privacy implications of third-party Call Processing Services (CPS). Those concerns mainly applied to proposals that do not conform to this draft, which mitigates those concerns by placing the CPS at of one of the parties to a call. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) There have been no threats of appeal or indications of discontent. 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? The shepherd is aware of multiple non-public implementation efforts, but is not aware of any publicly available reports. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. In the shepherd's opinion, the normal directorate reviews will be sufficient. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. The draft does not specify models, media types, URIs, etc., that would trigger the need for formal expert reviews. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? The draft does not specify a YANG module. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. The draft does not use formal languages that would trigger the need for checks. idnits 2.17.1 mentions the normative downref described later in this writeup, but otherwise finds no material issues. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? The shepherd is of the opinion that this draft is ready to be handed off to the responsible area director. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? The document does not fall afoul of the issues listed for the ART area. While some issues in the SEC area list may apply, the shepherd believes they have had sufficient review by security experts who actively participate in the STIR working group. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? The intended status is Proposed Standard. This is the proper status because the draft specifies how to implement an interoperable service. It contains normative requirements which, if ignored, could impact the operation and security of the service. The intended status is correctly indicated in the data tracker. Note that earlier versions were labeled as informational. The working group agreed to change the status to Proposed Standard for the reasons listed above. This change is reflected in version 5. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. [In Progress] 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. [In Progress] 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) The only material nit of which the shepherd is aware is the normative downref described in 17. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. The references are correctly categorized. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All normative references are to IETF RFCs. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. There is a normative reference to an informational RFC: RFC 8816. This is appropriate because this draft describes a standard that realizes parts of the architecture defined in RFC 8816. That RFC is necessary reading to fully understand this draft. In particular, there are security considerations described in that RFC that implementors of this draft should understand. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? All normative references are to published RFCs. 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. This draft does not change the status of any RFC. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). The draft makes no requests of IANA. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. The draft makes no requests of IANA. [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
|
2024-01-09
|
05 | Ben Campbell | # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* Thank you for your service as a document shepherd. Among the … # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* Thank you for your service as a document shepherd. Among the responsibilities is answering the questions in this write-up to give helpful context to Last Call and Internet Engineering Steering Group ([IESG][1]) reviewers, and your diligence in completing it is appreciated. The full role of the shepherd is further described in [RFC 4858][2]. You will need the cooperation of the authors and editors to complete these checks. Note that some numbered items contain multiple related questions; please be sure to answer all of them. ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The consensus was mainly among a small group of individuals, but that is mostly standard operating procedure for the STIR working groups. Active participants comprise a small number of industry experts. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? There have been concerns raised (mostly in venues other than STIR) about the potential for the substitution attack described in RFC 8816 section 7.4 could be a problem. There have been additional concerns raised about privacy implications of third-party Call Processing Services (CPS). Those concerns mainly applied to proposals that do not conform to this draft, which mitigates those concerns by placing the CPS at of one of the parties to a call. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) There have been no threats of appeal or indications of discontent. 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? The shepherd is aware of multiple non-public implementation efforts, but is not aware of any publicly available reports. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. In the shepherd's opinion, the normal directorate reviews will be sufficient. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. The draft does not specify models, media types, URIs, etc., that would trigger the need for formal expert reviews. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? The draft does not specify a YANG module. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. The draft does not use formal languages that would trigger the need for checks. idnits 2.17.1 mentions the normative downref described later in this writeup, but otherwise finds no material issues. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? The shepherd is of the opinion that this draft is ready to be handed off to the responsible area director. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? The document does not fall afoul of the issues listed for the ART area. While some issues in the SEC area list may apply, the shepherd believes they have had sufficient review by security experts who actively participate in the STIR working group. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? The intended status is Proposed Standard. This is the proper status because the draft specifies how to implement an interoperable service. It contains normative requirements which, if ignored, could impact the operation and security of the service. The intended status is correctly indicated in the data tracker. Note that earlier versions were labeled as informational. The working group agreed to change the status to Proposed Standard for the reasons listed above. This change is reflected in version 5. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. [In Progress] 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. [In Progress] 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) The only material nit of which the shepherd is aware is the normative downref described in 17. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. The references are correctly categorized. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All normative references are to IETF RFCs. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. There is a normative reference to an informational RFC: RFC 8816. This is appropriate because this draft describes a standard that realizes parts of the architecture defined in RFC 8816. That RFC is necessary reading to fully understand this draft. In particular, there are security considerations described in that RFC that implementors of this draft should understand. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? All normative references are to published RFCs. 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. This draft does not change the status of any RFC. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). The draft makes no requests of IANA. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. The draft makes no requests of IANA. [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
|
2024-01-09
|
05 | Ben Campbell | Changed consensus to Yes from Unknown |
|
2024-01-09
|
05 | Ben Campbell | Changed from Informational to Proposed Standard in version 5. This was originally expected to be informational, but ended up making normative statements that seemed more … Changed from Informational to Proposed Standard in version 5. This was originally expected to be informational, but ended up making normative statements that seemed more appropriate for the standards track. Verified with STIR working group mailing list on Oct 30 with no objections. |
|
2024-01-09
|
05 | Ben Campbell | Intended Status changed to Proposed Standard from Informational |
|
2023-10-23
|
05 | Jon Peterson | New version available: draft-ietf-stir-servprovider-oob-05.txt |
|
2023-10-23
|
05 | (System) | New version approved |
|
2023-10-23
|
05 | (System) | Request for posting confirmation emailed to previous authors: Jon Peterson |
|
2023-10-23
|
05 | Jon Peterson | Uploaded new revision |
|
2023-10-12
|
04 | Ben Campbell | Notification list changed to ben@nostrum.com because the document shepherd was set |
|
2023-10-12
|
04 | Ben Campbell | Document shepherd changed to Ben Campbell |
|
2023-10-12
|
04 | Ben Campbell | Intended Status changed to Informational from None |
|
2023-09-14
|
04 | (System) | Document has expired |
|
2023-03-15
|
04 | Russ Housley | Added to session: IETF-116: stir Wed-0630 |
|
2023-03-13
|
04 | Jon Peterson | New version available: draft-ietf-stir-servprovider-oob-04.txt |
|
2023-03-13
|
04 | (System) | New version approved |
|
2023-03-13
|
04 | (System) | Request for posting confirmation emailed to previous authors: Jon Peterson |
|
2023-03-13
|
04 | Jon Peterson | Uploaded new revision |
|
2022-10-24
|
03 | Jon Peterson | New version available: draft-ietf-stir-servprovider-oob-03.txt |
|
2022-10-24
|
03 | (System) | New version approved |
|
2022-10-24
|
03 | (System) | Request for posting confirmation emailed to previous authors: Jon Peterson |
|
2022-10-24
|
03 | Jon Peterson | Uploaded new revision |
|
2022-10-23
|
02 | (System) | Document has expired |
|
2022-04-21
|
02 | Ben Campbell | Added to session: interim-2022-stir-01 |
|
2022-04-21
|
02 | Jon Peterson | New version available: draft-ietf-stir-servprovider-oob-02.txt |
|
2022-04-21
|
02 | (System) | New version approved |
|
2022-04-21
|
02 | (System) | Request for posting confirmation emailed to previous authors: Jon Peterson , stir-chairs@ietf.org |
|
2022-04-21
|
02 | Jon Peterson | Uploaded new revision |
|
2021-08-26
|
01 | (System) | Document has expired |
|
2021-03-01
|
01 | Russ Housley | Added to session: IETF-110: stir Fri-1530 |
|
2021-02-22
|
01 | Jon Peterson | New version available: draft-ietf-stir-servprovider-oob-01.txt |
|
2021-02-22
|
01 | (System) | New version approved |
|
2021-02-22
|
01 | (System) | Request for posting confirmation emailed to previous authors: Jon Peterson |
|
2021-02-22
|
01 | Jon Peterson | Uploaded new revision |
|
2020-11-03
|
00 | Robert Sparks | This document now replaces draft-peterson-stir-servprovider-oob instead of None |
|
2020-11-02
|
00 | Jon Peterson | New version available: draft-ietf-stir-servprovider-oob-00.txt |
|
2020-11-02
|
00 | (System) | WG -00 approved |
|
2020-11-02
|
00 | Jon Peterson | Set submitter to "Jon Peterson ", replaces to (none) and sent approval email to group chairs: stir-chairs@ietf.org |
|
2020-11-02
|
00 | Jon Peterson | Uploaded new revision |