Skip to main content

Service Identity in TLS
draft-ietf-uta-rfc6125bis-15

Revision differences

Document history

Date Rev. By Action
2023-11-06
15 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2023-10-30
15 (System) RFC Editor state changed to AUTH48
2023-10-23
15 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2023-08-19
15 Barry Leiba Closed request for Last Call review by ARTART with state 'Overtaken by Events': Document has finished IESG processing
2023-08-19
15 Barry Leiba Assignment of request for Last Call review by ARTART to Matthew Miller was marked no-response
2023-08-15
15 (System) RFC Editor state changed to EDIT
2023-08-15
15 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2023-08-15
15 (System) Announcement was received by RFC Editor
2023-08-15
15 (System) IANA Action state changed to No IANA Actions from In Progress
2023-08-15
15 (System) IANA Action state changed to In Progress
2023-08-15
15 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2023-08-15
15 Amy Vezza IESG has approved the document
2023-08-15
15 Amy Vezza Closed "Approve" ballot
2023-08-15
15 Amy Vezza Ballot approval text was generated
2023-08-15
15 Petr Špaček Request for Telechat review by DNSDIR Completed: Ready. Reviewer: Petr Špaček. Sent review to list.
2023-08-11
15 (System) Removed all action holders (IESG state changed)
2023-08-11
15 Paul Wouters IESG state changed to Approved-announcement to be sent from IESG Evaluation
2023-08-11
15 Paul Wouters IESG state changed to IESG Evaluation from IESG Evaluation::AD Followup
2023-08-11
15 Lars Eggert
[Ballot comment]
# GEN AD review of draft-ietf-uta-rfc6125bis-14

CC @larseggert

Thanks to Maria Ines Robles for the General Area Review Team (Gen-ART) review
(https://mailarchive.ietf.org/arch/msg/gen-art/kKymWzL6jRgmCfLhf0A8IJATMMQ …
[Ballot comment]
# GEN AD review of draft-ietf-uta-rfc6125bis-14

CC @larseggert

Thanks to Maria Ines Robles for the General Area Review Team (Gen-ART) review
(https://mailarchive.ietf.org/arch/msg/gen-art/kKymWzL6jRgmCfLhf0A8IJATMMQ).

## Comments

### Inclusive language

Found terminology that should be reviewed for inclusivity; see
https://www.rfc-editor.org/part2/#inclusive_language for background and more
guidance:

* Term `traditional`; alternatives might be `classic`, `classical`, `common`,
  `conventional`, `customary`, `fixed`, `habitual`, `historic`,
  `long-established`, `popular`, `prescribed`, `regular`, `rooted`,
  `time-honored`, `universal`, `widely used`, `widespread`

## Nits

All comments below are about very minor potential issues that you may choose to
address in some way - or ignore - as you see fit. Some were flagged by
automated tools (via https://github.com/larseggert/ietf-reviewtool), so there
will likely be some false positives. There is no need to let me know what you
did with these suggestions.

### Outdated references

Document references `draft-ietf-tls-subcerts`, but that has been published as
`RFC9345`.

### URLs

These URLs in the document can probably be converted to HTTPS:

* http://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf

### Grammar/style

#### Section 4.1, paragraph 1
```
SIP as described in [SIP-SIPS]). Typically this identifier type would supple
                                ^^^^^^^^^
```
A comma may be missing after the conjunctive/linking adverb "Typically".

#### Section 4.2, paragraph 4
```
s or IP-IDs. Again, because of multi-protocol attacks this practice is discou
                              ^^^^^^^^^^^^^^
```
This word is normally spelled as one.

#### Section 6.2, paragraph 7
```
DNS domain names more generally. Therefore the use of wildcard characters as
                                  ^^^^^^^^^
```
A comma may be missing after the conjunctive/linking adverb "Therefore".

## Notes

This review is in the ["IETF Comments" Markdown format][ICMF], You can use the
[`ietf-comments` tool][ICT] to automatically convert this review into
individual GitHub issues. Review generated by the [`ietf-reviewtool`][IRT].

[ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
[ICT]: https://github.com/mnot/ietf-comments
[IRT]: https://github.com/larseggert/ietf-reviewtool
2023-08-11
15 Lars Eggert [Ballot Position Update] Position for Lars Eggert has been changed to No Objection from Discuss
2023-08-10
15 Jim Reid Request for Telechat review by DNSDIR is assigned to Petr Špaček
2023-08-10
15 (System) Changed action holders to Paul Wouters (IESG state changed)
2023-08-10
15 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2023-08-10
15 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2023-08-10
15 Rich Salz New version available: draft-ietf-uta-rfc6125bis-15.txt
2023-08-10
15 Rich Salz New version accepted (logged-in submitter: Rich Salz)
2023-08-10
15 Rich Salz Uploaded new revision
2023-08-10
14 (System) Changed action holders to Paul Wouters, Peter Saint-Andre, Rich Salz (IESG state changed)
2023-08-10
14 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2023-08-10
14 Andrew Alston [Ballot Position Update] New position, No Objection, has been recorded for Andrew Alston
2023-08-10
14 Murray Kucherawy
[Ballot comment]
Sadly, I support Lars' Worst DISCUSS Ever.

Thanks for doing the work here.  It's quite well done.  Just a couple of comments:

In …
[Ballot comment]
Sadly, I support Lars' Worst DISCUSS Ever.

Thanks for doing the work here.  It's quite well done.  Just a couple of comments:

In Section 2, I find it weird to use SHOULD and MUST language to establish BCP 14 style interoperability requirements on future documents.

Section 1.5 defines "delegated domain" but doesn't use that term anywhere.
2023-08-10
14 Murray Kucherawy [Ballot Position Update] New position, No Objection, has been recorded for Murray Kucherawy
2023-08-09
14 Warren Kumari
[Ballot comment]
I almost balloted DISCUSS, simply to seize Lars' "most pedantic Discuss ever" crown, but I decided that the entertainment potential wasn't really worth …
[Ballot comment]
I almost balloted DISCUSS, simply to seize Lars' "most pedantic Discuss ever" crown, but I decided that the entertainment potential wasn't really worth it:
"I think that the convention / standard terminology is "subject alternative name" or "subjectAltName", not "subjectAlternativeName"."

Instead, because the document is so very readable, I'm balloting Yes.


Nits:
"TLS uses the words client and server, where the client is the entity that initiates the connection." - this might be better as 'TLS uses the words "client" and "server", where the client is the entity that initiates the connection.'

"During the course of processing, a client might be exposed to identifiers that look like but are not reference identifiers." - "...look like, but are not..."

"Any intermediate values are not reference identifiers and MUST NOT be treated as such. [...] However, an application might define a process for authenticating these intermediate identifiers in a way that then allows them to be used as a reference identifier; see for example [SMTP-TLS]." -  erm... I know what you are trying to say here (at least I think that I do), but, as written this seems logically inconsistant.  Perhaps something like: "Unless an application defines a process for authenticating intermediate identifiers in a way that then allows them to be used as a reference identifier (see for example [SMTP-TLS]), any intermediate values are not reference identifiers and MUST NOT be treated as such."... or something...


Question:
"Note also that by policy, Top-Level Domains ([DNS-TERMS]) do not start with a digit (see Section 2.2.1.3.2 of [ICANN-AGB]); ..." - yup, that does indeed seem to be the current policy, but another round of new TLDs seems imminent and it isn't clear (to me at least) that this will always be true. Should the document note that this is not set in stone?


Notes:
I agree with Eric's comments / suggestions re: support of the new SVCB (draft-ietf-dnsop-svcb-https) mechanism. Unless there is a really good reason to not mention it, it seems like it should be discussed.

I'd also like to thank the DNSDIR ( Petr Špaček - https://datatracker.ietf.org/doc/review-ietf-uta-rfc6125bis-12-dnsdir-lc-spacek-2023-06-21/ ) and OPSDIR ( Quin Wu - https://datatracker.ietf.org/doc/review-ietf-uta-rfc6125bis-08-opsdir-early-wu-2022-12-16/ ) for their helpful reviews, and to the authors for working with them to address the comments.
2023-08-09
14 Warren Kumari [Ballot Position Update] Position for Warren Kumari has been changed to Yes from No Objection
2023-08-09
14 Warren Kumari
[Ballot comment]
I almost balloted DISCUSS, simply to seize Lar's "most pedantic Discuss ever" crown, but I decided that the entertainment potential wasn't really worth …
[Ballot comment]
I almost balloted DISCUSS, simply to seize Lar's "most pedantic Discuss ever" crown, but I decided that the entertainment potential wasn't really worth it:

"I think that the convention / standard terminology is "subject alternative name" or "subjectAltName", not "subjectAlternativeName"."

Nits:
"TLS uses the words client and server, where the client is the entity that initiates the connection." - this might be better as 'TLS uses the words "client" and "server", where the client is the entity that initiates the connection.'

"During the course of processing, a client might be exposed to identifiers that look like but are not reference identifiers." - "...look like, but are not..."

"Any intermediate values are not reference identifiers and MUST NOT be treated as such. [...] However, an application might define a process for authenticating these intermediate identifiers in a way that then allows them to be used as a reference identifier; see for example [SMTP-TLS]." -  erm... I know what you are trying to say here (at least I think that I do), but, as written this seems logically inconsistant.  Perhaps something like: "Unless an application defines a process for authenticating intermediate identifiers in a way that then allows them to be used as a reference identifier (see for example [SMTP-TLS]), any intermediate values are not reference identifiers and MUST NOT be treated as such."... or something...


Question:
"Note also that by policy, Top-Level Domains ([DNS-TERMS]) do not start with a digit (see Section 2.2.1.3.2 of [ICANN-AGB]); ..." - yup, that does indeed seem to be the current policy, but another round of new TLDs seems imminent and it isn't clear (to me at least) that this will always be true. Should the document note that this is not set in stone?


Notes:
I agree with Eric's comments / suggestions re: support of the new SVCB (draft-ietf-dnsop-svcb-https) mechanism. Unless there is a really good reason to not mention it, it seems like it should be discussed.

I'd also like to thank the DNSDIR ( Petr Špaček - https://datatracker.ietf.org/doc/review-ietf-uta-rfc6125bis-12-dnsdir-lc-spacek-2023-06-21/ ) and OPSDIR ( Quin Wu - https://datatracker.ietf.org/doc/review-ietf-uta-rfc6125bis-08-opsdir-early-wu-2022-12-16/ ) for their helpful reviews, and to the authors for working with them to address the comments.
2023-08-09
14 Warren Kumari [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari
2023-08-09
14 Zaheduzzaman Sarker
[Ballot comment]
Thanks for working on this necessary protocol maintenance.

Even though mentioning QUIC (multiple times) triggered TSV AD's bells I don't have any TSV …
[Ballot comment]
Thanks for working on this necessary protocol maintenance.

Even though mentioning QUIC (multiple times) triggered TSV AD's bells I don't have any TSV related comments here. Thanks for Joe Touch for his TSVART review.
2023-08-09
14 Zaheduzzaman Sarker [Ballot Position Update] New position, No Objection, has been recorded for Zaheduzzaman Sarker
2023-08-08
14 Erik Kline [Ballot Position Update] New position, Yes, has been recorded for Erik Kline
2023-08-08
14 Martin Duke [Ballot comment]
thanks to Joe Touch for the TSVART review.
2023-08-08
14 Martin Duke [Ballot Position Update] New position, No Objection, has been recorded for Martin Duke
2023-08-05
14 Jim Guichard [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard
2023-08-04
14 John Scudder [Ballot Position Update] New position, No Objection, has been recorded for John Scudder
2023-08-04
14 Lars Eggert
[Ballot discuss]
# GEN AD review of draft-ietf-uta-rfc6125bis-14

CC @larseggert

Thanks to Maria Ines Robles for the General Area Review Team (Gen-ART) review
(https://mailarchive.ietf.org/arch/msg/gen-art/kKymWzL6jRgmCfLhf0A8IJATMMQ …
[Ballot discuss]
# GEN AD review of draft-ietf-uta-rfc6125bis-14

CC @larseggert

Thanks to Maria Ines Robles for the General Area Review Team (Gen-ART) review
(https://mailarchive.ietf.org/arch/msg/gen-art/kKymWzL6jRgmCfLhf0A8IJATMMQ).

## Discuss

### Section 4.2, paragraph 4
```
    Consider a SIP-accessible voice-over-IP (VoIP) server at the host
    voice.example.edu servicing SIP addresses of the form
    user@voice.example.edu and identified by a URI of
    .  A certificate for this service would
    include a URI-ID of sip:voice.example.edu (see [SIP-CERTS]) along
    with a DNS-ID of voice.example.edu.
```
This has got to be the most pedantic Discuss ever, but
AFAICT "example.edu" is not in fact a valid example domain, i.e.,
it's missing from
https://www.iana.org/assignments/special-use-domain-names/special-use-domain-names.xhtml
2023-08-04
14 Lars Eggert
[Ballot comment]
## Comments

### Inclusive language

Found terminology that should be reviewed for inclusivity; see
https://www.rfc-editor.org/part2/#inclusive_language for background and more
guidance:

* Term `traditional`; …
[Ballot comment]
## Comments

### Inclusive language

Found terminology that should be reviewed for inclusivity; see
https://www.rfc-editor.org/part2/#inclusive_language for background and more
guidance:

* Term `traditional`; alternatives might be `classic`, `classical`, `common`,
  `conventional`, `customary`, `fixed`, `habitual`, `historic`,
  `long-established`, `popular`, `prescribed`, `regular`, `rooted`,
  `time-honored`, `universal`, `widely used`, `widespread`

## Nits

All comments below are about very minor potential issues that you may choose to
address in some way - or ignore - as you see fit. Some were flagged by
automated tools (via https://github.com/larseggert/ietf-reviewtool), so there
will likely be some false positives. There is no need to let me know what you
did with these suggestions.

### Outdated references

Document references `draft-ietf-tls-subcerts`, but that has been published as
`RFC9345`.

### URLs

These URLs in the document can probably be converted to HTTPS:

* http://www.blackhat.com/presentations/bh-dc-09/Marlinspike/BlackHat-DC-09-Marlinspike-Defeating-SSL.pdf

### Grammar/style

#### Section 4.1, paragraph 1
```
SIP as described in [SIP-SIPS]). Typically this identifier type would supple
                                ^^^^^^^^^
```
A comma may be missing after the conjunctive/linking adverb "Typically".

#### Section 4.2, paragraph 4
```
s or IP-IDs. Again, because of multi-protocol attacks this practice is discou
                              ^^^^^^^^^^^^^^
```
This word is normally spelled as one.

#### Section 6.2, paragraph 7
```
DNS domain names more generally. Therefore the use of wildcard characters as
                                  ^^^^^^^^^
```
A comma may be missing after the conjunctive/linking adverb "Therefore".

## Notes

This review is in the ["IETF Comments" Markdown format][ICMF], You can use the
[`ietf-comments` tool][ICT] to automatically convert this review into
individual GitHub issues. Review generated by the [`ietf-reviewtool`][IRT].

[ICMF]: https://github.com/mnot/ietf-comments/blob/main/format.md
[ICT]: https://github.com/mnot/ietf-comments
[IRT]: https://github.com/larseggert/ietf-reviewtool
2023-08-04
14 Lars Eggert [Ballot Position Update] New position, Discuss, has been recorded for Lars Eggert
2023-08-01
14 Éric Vyncke
[Ballot comment]

# Éric Vyncke, INT AD, comments for draft-ietf-uta-rfc6125bis-14

Thank you for the work put into this document.

I find this document update useful …
[Ballot comment]

# Éric Vyncke, INT AD, comments for draft-ietf-uta-rfc6125bis-14

Thank you for the work put into this document.

I find this document update useful ***BUT*** it lacks the support of the new SVCB (draft-ietf-dnsop-svcb-https)... May I recommend that this document is sent back to the WG in order to incorporate the SCVB (it is very similar to SRV IMHO)? I appreciate that the SVCB started in a different WG hence the disconnect even if some authors of the two I-Ds have the same affiliation ;-) I added the SVCB authors in copy to this ballot, just in case.

Please find below some non-blocking COMMENT points (but replies would be appreciated even if only for my own education), and some nits.

Special thanks to Orie Steele for the shepherd's detailed write-up including the WG consensus, *but it lacks* the justification of the intended status.

I hope that this review helps to improve the document,

Regards,

-éric

# COMMENTS

## Component or label ?

The text uses terms like `component of a domain name` while RFC 8499 (DNS terminology) would prefer to use `label of a domain name`. Most parts of the document correctly use 'labels' but there are some use of 'component'.

## Section 1.4.2

s/Certificates representing client identities other than as described above, such as rfc822Name, are beyond the scope of this document/Certificates representing client identities, such as rfc822Name, other than as described above are beyond the scope of this document/ to simplify the parsing ?

# NITS

## Section 1.4.2

`for our purposes we care`, RFCs usually do not use a personal voice. But this is a matter of taste.
2023-08-01
14 Éric Vyncke [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke
2023-07-31
14 Roman Danyliw
[Ballot comment]
Thank you to Derrell Piper for the SECDIR review.

Thank you for this critical maintenance to RFC6125.

** Section 5.

  If …
[Ballot comment]
Thank you to Derrell Piper for the SECDIR review.

Thank you for this critical maintenance to RFC6125.

** Section 5.

  If the certificate will be used for only a single type of application
  service, the service provider SHOULD request a certificate that
  includes DNS-ID or IP-ID values that identify that service or, if
  appropriate for the application service type, SRV-ID or URI-ID values
  that limit the deployment scope of the certificate to only the
  defined application service type.

Given the scope of the document being restricted to DNS-, IP-, SRV-, and URI-ID, what is the circumstances under which this “SHOULD” guidance would NOT be followed?
 
  If a service provider offers multiple application service types and
  wishes to limit the applicability of certificates using SRV-IDs or
  URI-IDs, they SHOULD request multiple certificates, rather than a
  single certificate containing multiple SRV-IDs or URI-IDs each
  identifying a different application service type.

The SHOULD in this text implies there is an alternative to requesting multiple certificates?  What is that?

** Section 6.1.1
  *  If a server for the application service type is typically
      associated with a URI for security purposes (i.e., a formal
      protocol document specifies the use of URIs in server
      certificates), then the reference identifier SHOULD be a URI-ID.

I appreciate that this is unchanged language from RFC6125.  If the application service is using a URI, under what circumstances would the reference identifier NOT be a URI-ID?

** Section 6.2
  The
  search succeeds if any presented identifier matches one of the
  reference identifiers, at which point the client SHOULD stop the
  search.

What is the standardized behavior if the client keeps looking after the first match (i.e., it is a SHOULD, not a MUST to stop)?

** From idnits:

  == Outdated reference: draft-ietf-tls-subcerts has been published as RFC
    9345
2023-07-31
14 Roman Danyliw [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw
2023-07-25
14 Cindy Morgan Placed on agenda for telechat - 2023-08-10
2023-07-25
14 Paul Wouters Ballot has been issued
2023-07-25
14 Paul Wouters [Ballot Position Update] New position, Yes, has been recorded for Paul Wouters
2023-07-25
14 Paul Wouters Created "Approve" ballot
2023-07-25
14 Paul Wouters IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead
2023-07-25
14 Paul Wouters Ballot writeup was changed
2023-07-03
14 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2023-06-29
14 (System) IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2023-06-29
14 David Dong
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-uta-rfc6125bis-14, which is currently in Last Call, and has the following comments:

We …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-uta-rfc6125bis-14, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any registry actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object.

If this assessment is not accurate, please respond as soon as possible.

For definitions of IANA review states, please see:

https://datatracker.ietf.org/help/state/draft/iana-review

Thank you,

David Dong
IANA Services Specialist
2023-06-28
14 Petr Špaček Request for Last Call review by DNSDIR Completed: Ready. Reviewer: Petr Špaček. Sent review to list.
2023-06-27
14 Rich Salz New version available: draft-ietf-uta-rfc6125bis-14.txt
2023-06-27
14 Rich Salz New version approved
2023-06-27
14 (System) Request for posting confirmation emailed to previous authors: Peter Saint-Andre , Rich Salz
2023-06-27
14 Rich Salz Uploaded new revision
2023-06-22
13 Jim Reid Request for Last Call review by DNSDIR is assigned to Petr Špaček
2023-06-21
13 Petr Špaček Request for Last Call review by DNSDIR Completed: Ready with Nits. Reviewer: Petr Špaček. Sent review to list.
2023-06-20
13 Jim Reid Request for Last Call review by DNSDIR is assigned to Petr Špaček
2023-06-19
13 Cindy Morgan
The following Last Call announcement was sent out (ends 2023-07-03):

From: The IESG
To: IETF-Announce
CC: draft-ietf-uta-rfc6125bis@ietf.org, orie@transmute.industries, paul.wouters@aiven.io, uta-chairs@ietf.org, uta@ietf.org …
The following Last Call announcement was sent out (ends 2023-07-03):

From: The IESG
To: IETF-Announce
CC: draft-ietf-uta-rfc6125bis@ietf.org, orie@transmute.industries, paul.wouters@aiven.io, uta-chairs@ietf.org, uta@ietf.org
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (Service Identity in TLS) to Proposed Standard


The IESG has received a request from the Using TLS in Applications WG (uta)
to consider the following document: - 'Service Identity in TLS'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2023-07-03. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  Many application technologies enable secure communication between two
  entities by means of Transport Layer Security (TLS) with Internet
  Public Key Infrastructure Using X.509 (PKIX) certificates.  This
  document specifies procedures for representing and verifying the
  identity of application services in such interactions.

  This document obsoletes RFC 6125.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-uta-rfc6125bis/



No IPR declarations have been submitted directly on this I-D.




2023-06-19
13 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2023-06-19
13 Cindy Morgan Last call announcement was generated
2023-06-19
13 Paul Wouters Last call was requested
2023-06-19
13 Paul Wouters IESG state changed to Last Call Requested from Waiting for AD Go-Ahead::AD Followup
2023-06-19
13 (System) Changed action holders to Paul Wouters (IESG state changed)
2023-06-19
13 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2023-06-19
13 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2023-06-19
13 Rich Salz New version available: draft-ietf-uta-rfc6125bis-13.txt
2023-06-19
13 (System) New version approved
2023-06-19
13 (System) Request for posting confirmation emailed to previous authors: Peter Saint-Andre , Rich Salz
2023-06-19
13 Rich Salz Uploaded new revision
2023-06-19
12 (System) Changed action holders to Peter Saint-Andre, Rich Salz, Paul Wouters (IESG state changed)
2023-06-19
12 Paul Wouters IESG state changed to Waiting for AD Go-Ahead::Revised I-D Needed from Waiting for AD Go-Ahead
2023-05-26
12 Joseph Touch Request for Last Call review by TSVART Completed: Ready. Reviewer: Joseph Touch. Sent review to list.
2023-05-26
12 Ines Robles Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Ines Robles. Sent review to list.
2023-05-26
12 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2023-05-21
12 Petr Špaček
Request for Last Call review by DNSDIR Completed: Ready with Nits. Reviewer: Petr Špaček. Sent review to list. Submission of review completed at an earlier …
Request for Last Call review by DNSDIR Completed: Ready with Nits. Reviewer: Petr Špaček. Sent review to list. Submission of review completed at an earlier date.
2023-05-21
12 Petr Špaček Request for Last Call review by DNSDIR Completed: Ready with Nits. Reviewer: Petr Špaček.
2023-05-17
12 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2023-05-17
12 David Dong
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-uta-rfc6125bis-12, which is currently in Last Call, and has the following comments:

We …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-uta-rfc6125bis-12, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any registry actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object.

If this assessment is not accurate, please respond as soon as possible.

For definitions of IANA review states, please see:

https://datatracker.ietf.org/help/state/draft/iana-review

Thank you,

David Dong
IANA Services Specialist
2023-05-16
12 Jean Mahoney Request for Last Call review by GENART is assigned to Ines Robles
2023-05-15
12 Magnus Westerlund Request for Last Call review by TSVART is assigned to Joseph Touch
2023-05-14
12 Jim Reid Request for Last Call review by DNSDIR is assigned to Petr Špaček
2023-05-13
12 Barry Leiba Request for Last Call review by ARTART is assigned to Matthew Miller
2023-05-12
12 Amy Vezza IANA Review state changed to IANA - Review Needed
2023-05-12
12 Amy Vezza
The following Last Call announcement was sent out (ends 2023-05-26):

From: The IESG
To: IETF-Announce
CC: draft-ietf-uta-rfc6125bis@ietf.org, orie@transmute.industries, paul.wouters@aiven.io, uta-chairs@ietf.org, uta@ietf.org …
The following Last Call announcement was sent out (ends 2023-05-26):

From: The IESG
To: IETF-Announce
CC: draft-ietf-uta-rfc6125bis@ietf.org, orie@transmute.industries, paul.wouters@aiven.io, uta-chairs@ietf.org, uta@ietf.org
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (Service Identity in TLS) to Proposed Standard


The IESG has received a request from the Using TLS in Applications WG (uta)
to consider the following document: - 'Service Identity in TLS'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2023-05-26. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  Many application technologies enable secure communication between two
  entities by means of Transport Layer Security (TLS) with Internet
  Public Key Infrastructure Using X.509 (PKIX) certificates.  This
  document specifies procedures for representing and verifying the
  identity of application services in such interactions.

  This document obsoletes RFC 6125.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-uta-rfc6125bis/



No IPR declarations have been submitted directly on this I-D.




2023-05-12
12 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2023-05-12
12 Paul Wouters Last call was requested
2023-05-12
12 Paul Wouters Ballot approval text was generated
2023-05-12
12 Paul Wouters Ballot writeup was generated
2023-05-12
12 (System) Changed action holders to Paul Wouters (IESG state changed)
2023-05-12
12 Paul Wouters IESG state changed to Last Call Requested from Publication Requested
2023-05-12
12 Paul Wouters Last call announcement was generated
2023-03-27
12 Francesca Palombini Shepherding AD changed to Paul Wouters
2023-03-16
12 Orie Steele
Document Shepherd Write-Up for draft-ietf-uta-rfc6125bis

March 15th 2023.

Document History

1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, …
Document Shepherd Write-Up for draft-ietf-uta-rfc6125bis

March 15th 2023.

Document History

1. Does the working group (WG) consensus represent the strong concurrence of a few individuals,
  with others being silent, or did it reach broad agreement?

  a. The document passes the WGLC in July 2022 with plenty of reviews and was about to be sent to the IESG,
    but at the last moment a suggestion was made to include handling of IP addresses in certificates too
    (which was considered out of scope for this document before, since it was focused on domain names).
    After some discussion a consensus was achieved to make this addition and thus to delay the publication.
    During the second WGLC in the fall of 2022 the activity of the WG was relatively low, with only few reviews.
    Later, early in 2023, there was good discussion regarding how much detail to apply regarding internationalized domain names.
    I believe the document represents broad agreement from the working group.

2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough?

  a. The document was originally published as an individual draft in February 2021 with a modest goal of updating RFC 6125
    to disallow a common practice of using the commonName attribute in certificates to represent service identities that
    can be represented in the subjectAlternativeName. The draft was adopted in April 2021 with strong support from WG
    members. It was very well discussed in the ML right after its adoption and during this discussion the WG made a
    decision (backed up by the responsible AD) to create a replacement document for RFC 6125 instead of updating it.
    Some of the original authors of RFC 6125 agreed to co-author a -bis document, and the draft received a
    lot of attention from WG members with a good level of discussion.

  b. There has been some controversy regarding how much detail should be provided on IDNA2003 / IDNA2008 / UTS-46.
    Chairs ran a call for consensus and concluded that the working group had no consensus to profile or
    elaborate in great detail on the differences between IDNA2008 and UTS-46.

3. Has anyone threatened an appeal or otherwise indicated extreme discontent?
  If so, please summarize the areas of conflict in separate email messages to the responsible Area Director.
  (It should be in a separate email because this questionnaire is publicly available.)

  a. Not to our knowledge.

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated plans to implement?
  Are any existing implementations reported somewhere, either in the document
  itself (as RFC 7942 recommends) or elsewhere (where)?

  a. There are many implementations because RFC 6125 is cited by dozens of specs.

Additional Reviews

5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations,
  and would it therefore benefit from their review? Have those reviews occurred?
  If yes, describe which reviews took place.

  a. Opdsdir provided an early review:
    i. https://mailarchive.ietf.org/arch/msg/uta/PybBEjGBcYEH42v4dHABs3xBgq8/
  b. I18n provided an unofficial review:
    i. https://mailarchive.ietf.org/arch/msg/uta/nVtcFhJri8T7mW36Jmb4DoHXbbg/
  c. Secdir provided a review:
    i. https://mailarchive.ietf.org/arch/msg/uta/5X3it5mygcgw3A8kNOdQSE-_yHQ/

6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

  a. N/A

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the recommended validation tools for syntax and formatting validation?
  If there are any resulting errors or warnings, what is the justification
  for not fixing them at this time? Does the YANG module comply with the
  Network Management Datastore Architecture (NMDA) as specified in RFC 8342?

  a. N/A

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.

  a. Reviews were performed on the mailing list, there was no automated checking.

Document Shepherd Checks

9. Based on the shepherd's review of the document,
  is it their opinion that this document is needed,
  clearly written, complete, correctly designed,
  and ready to be handed off to the responsible Area Director?

  a. Yes.

10. Several IETF Areas have assembled lists of common issues that their
  reviewers encounter. For which areas have such issues been identified and addressed?
  For which does this still need to happen in subsequent Reviews?

  a. N/A

11. What type of RFC publication is being requested on the IETF stream (Best
  Current Practice, Proposed Standard, Internet Standard, Informational, Experimental or Historic)?
  Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent?

  a. Proposed Standard, see answer to (2), Yes, data tracker indicates "Intended RFC status: Proposed Standard"

12. Have reasonable efforts been made to remind all authors of the intellectual
  property rights (IPR) disclosure obligations described in BCP 79?
  To the best of your knowledge, have all required disclosures been filed?
  If not, explain why. If yes, summarize any relevant discussion,
  including links to publicly-available messages when applicable.

  a. Yes, I have asked the authors privately and they confirmed they are not aware of any IPR issues related to the document.

13. Has each author, editor, and contributor shown their willingness to be listed as such?
  If the total number of authors and editors on the front page is greater than five, please provide a justification.

  a. Yes

14. Document any remaining I-D nits in this document. Simply running the idnits
  tool is not enough; please review the "Content Guidelines" on authors.ietf.org.
  (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.)
 
  a. There are no major I-D nits.
 
15. Should any informative references be normative or vice-versa? See the IESG
  Statement on Normative and Informative References.

  a. Not to our knowledge.

16. List any normative references that are not freely available to anyone. Did
  the community have sufficient access to review any such normative references?

  a. None.

17. Are there any normative downward references (see RFC 3967 and BCP 97)
  that are not already listed in the DOWNREF registry? If so, list them.

  a. Not to our knowledge.

18. Are there normative references to documents that are not ready to be
  submitted to the IESG for publication or are otherwise in an unclear state?
  If so, what is the plan for their completion?

  a. No.

19. Will publication of this document change the status of any existing RFCs? If
  so, does the Datatracker metadata correctly reflect this and are those RFCs listed
  on the title page, in the abstract, and discussed in the
  introduction? If not, explain why and point to the part of the document
  where the relationship of this document to these other RFCs is discussed.

  a. This document will obsolete RFC 6125.

20. Describe the document shepherd's review of the IANA considerations section,
  especially with regard to its consistency with the body of the document.
  Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified.
  Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see RFC 8126).

  a. There are no IANA considerations

21. List any new IANA registries that require Designated Expert Review for
future allocations. Are the instructions to the Designated Expert clear?
Please include suggestions of designated experts, if appropriate.

  a. There are no IANA considerations.
2023-03-16
12 Orie Steele Responsible AD changed to Francesca Palombini
2023-03-16
12 Orie Steele IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2023-03-16
12 Orie Steele IESG state changed to Publication Requested from I-D Exists
2023-03-16
12 Orie Steele Document is now in IESG state Publication Requested
2023-03-16
12 Orie Steele Tag Awaiting Expert Review/Resolution of Issues Raised cleared.
2023-03-15
12 Orie Steele
Document Shepherd Write-Up for draft-ietf-uta-rfc6125bis

March 15th 2023.

Document History

1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, …
Document Shepherd Write-Up for draft-ietf-uta-rfc6125bis

March 15th 2023.

Document History

1. Does the working group (WG) consensus represent the strong concurrence of a few individuals,
  with others being silent, or did it reach broad agreement?

  a. The document passes the WGLC in July 2022 with plenty of reviews and was about to be sent to the IESG,
    but at the last moment a suggestion was made to include handling of IP addresses in certificates too
    (which was considered out of scope for this document before, since it was focused on domain names).
    After some discussion a consensus was achieved to make this addition and thus to delay the publication.
    During the second WGLC in the fall of 2022 the activity of the WG was relatively low, with only few reviews.
    Later, early in 2023, there was good discussion regarding how much detail to apply regarding internationalized domain names.
    I believe the document represents broad agreement from the working group.

2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough?

  a. The document was originally published as an individual draft in February 2021 with a modest goal of updating RFC 6125
    to disallow a common practice of using the commonName attribute in certificates to represent service identities that
    can be represented in the subjectAlternativeName. The draft was adopted in April 2021 with strong support from WG
    members. It was very well discussed in the ML right after its adoption and during this discussion the WG made a
    decision (backed up by the responsible AD) to create a replacement document for RFC 6125 instead of updating it.
    Some of the original authors of RFC 6125 agreed to co-author a -bis document, and the draft received a
    lot of attention from WG members with a good level of discussion.

  b. There has been some controversy regarding how much detail should be provided on IDNA2003 / IDNA2008 / UTS-46.
    Chairs ran a call for consensus and concluded that the working group had no consensus to profile or
    elaborate in great detail on the differences between IDNA2008 and UTS-46.

3. Has anyone threatened an appeal or otherwise indicated extreme discontent?
  If so, please summarize the areas of conflict in separate email messages to the responsible Area Director.
  (It should be in a separate email because this questionnaire is publicly available.)

  a. Not to our knowledge.

4. For protocol documents, are there existing implementations of the contents of
  the document? Have a significant number of potential implementers indicated plans to implement?
  Are any existing implementations reported somewhere, either in the document
  itself (as RFC 7942 recommends) or elsewhere (where)?

  a. There are many implementations because RFC 6125 is cited by dozens of specs.

Additional Reviews

5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations,
  and would it therefore benefit from their review? Have those reviews occurred?
  If yes, describe which reviews took place.

  a. Opdsdir provided an early review:
    i. https://mailarchive.ietf.org/arch/msg/uta/PybBEjGBcYEH42v4dHABs3xBgq8/
  b. I18n provided an unofficial review:
    i. https://mailarchive.ietf.org/arch/msg/uta/nVtcFhJri8T7mW36Jmb4DoHXbbg/
  c. Secdir provided a review:
    i. https://mailarchive.ietf.org/arch/msg/uta/5X3it5mygcgw3A8kNOdQSE-_yHQ/

6. Describe how the document meets any required formal expert review criteria,
  such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

  a. N/A

7. If the document contains a YANG module, has the final version of the module
  been checked with any of the recommended validation tools for syntax and formatting validation?
  If there are any resulting errors or warnings, what is the justification
  for not fixing them at this time? Does the YANG module comply with the
  Network Management Datastore Architecture (NMDA) as specified in RFC 8342?

  a. N/A

8. Describe reviews and automated checks performed to validate sections of the
  final version of the document written in a formal language, such as XML code,
  BNF rules, MIB definitions, CBOR's CDDL, etc.

  a. Reviews were performed on the mailing list, there was no automated checking.

Document Shepherd Checks

9. Based on the shepherd's review of the document,
  is it their opinion that this document is needed,
  clearly written, complete, correctly designed,
  and ready to be handed off to the responsible Area Director?

  a. Yes.

10. Several IETF Areas have assembled lists of common issues that their
  reviewers encounter. For which areas have such issues been identified and addressed?
  For which does this still need to happen in subsequent Reviews?

  a. N/A

11. What type of RFC publication is being requested on the IETF stream (Best
  Current Practice, Proposed Standard, Internet Standard, Informational, Experimental or Historic)?
  Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent?

  a. Proposed Standard, see answer to (2), Yes, data tracker indicates "Intended RFC status: Proposed Standard"

12. Have reasonable efforts been made to remind all authors of the intellectual
  property rights (IPR) disclosure obligations described in BCP 79?
  To the best of your knowledge, have all required disclosures been filed?
  If not, explain why. If yes, summarize any relevant discussion,
  including links to publicly-available messages when applicable.

  a. Yes, I have asked the authors privately and they confirmed they are not aware of any IPR issues related to the document.

13. Has each author, editor, and contributor shown their willingness to be listed as such?
  If the total number of authors and editors on the front page is greater than five, please provide a justification.

  a. Yes

14. Document any remaining I-D nits in this document. Simply running the idnits
  tool is not enough; please review the "Content Guidelines" on authors.ietf.org.
  (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.)
 
  a. There are no major I-D nits.
 
15. Should any informative references be normative or vice-versa? See the IESG
  Statement on Normative and Informative References.

  a. Not to our knowledge.

16. List any normative references that are not freely available to anyone. Did
  the community have sufficient access to review any such normative references?

  a. None.

17. Are there any normative downward references (see RFC 3967 and BCP 97)
  that are not already listed in the DOWNREF registry? If so, list them.

  a. Not to our knowledge.

18. Are there normative references to documents that are not ready to be
  submitted to the IESG for publication or are otherwise in an unclear state?
  If so, what is the plan for their completion?

  a. No.

19. Will publication of this document change the status of any existing RFCs? If
  so, does the Datatracker metadata correctly reflect this and are those RFCs listed
  on the title page, in the abstract, and discussed in the
  introduction? If not, explain why and point to the part of the document
  where the relationship of this document to these other RFCs is discussed.

  a. This document will obsolete RFC 6125.

20. Describe the document shepherd's review of the IANA considerations section,
  especially with regard to its consistency with the body of the document.
  Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified.
  Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see RFC 8126).

  a. There are no IANA considerations

21. List any new IANA registries that require Designated Expert Review for
future allocations. Are the instructions to the Designated Expert clear?
Please include suggestions of designated experts, if appropriate.

  a. There are no IANA considerations.
2023-03-13
12 Rich Salz New version available: draft-ietf-uta-rfc6125bis-12.txt
2023-03-13
12 Rich Salz New version accepted (logged-in submitter: Rich Salz)
2023-03-13
12 Rich Salz Uploaded new revision
2023-03-02
11 Rich Salz New version available: draft-ietf-uta-rfc6125bis-11.txt
2023-03-02
11 Rich Salz New version accepted (logged-in submitter: Rich Salz)
2023-03-02
11 Rich Salz Uploaded new revision
2023-01-25
10 Rich Salz New version available: draft-ietf-uta-rfc6125bis-10.txt
2023-01-25
10 Rich Salz New version accepted (logged-in submitter: Rich Salz)
2023-01-25
10 Rich Salz Uploaded new revision
2023-01-24
09 Rich Salz New version available: draft-ietf-uta-rfc6125bis-09.txt
2023-01-24
09 Rich Salz New version accepted (logged-in submitter: Rich Salz)
2023-01-24
09 Rich Salz Uploaded new revision
2022-12-26
08 Derrell Piper Request for Early review by SECDIR Completed: Ready. Reviewer: Derrell Piper. Sent review to list.
2022-12-24
08 Tero Kivinen Request for Early review by SECDIR is assigned to Derrell Piper
2022-12-18
08 Valery Smyslov Tag Awaiting Expert Review/Resolution of Issues Raised set.
2022-12-16
08 Qin Wu Request for Early review by OPSDIR Completed: Has Nits. Reviewer: Qin Wu. Sent review to list.
2022-12-14
08 Gunter Van de Velde Request for Early review by OPSDIR is assigned to Qin Wu
2022-12-14
08 Gunter Van de Velde Request for Early review by OPSDIR is assigned to Qin Wu
2022-12-12
08 Orie Steele Notification list changed to orie@transmute.industries because the document shepherd was set
2022-12-12
08 Orie Steele Document shepherd changed to Orie Steele
2022-12-12
08 Valery Smyslov Requested Early review by I18NDIR
2022-12-12
08 Valery Smyslov Requested Early review by OPSDIR
2022-12-12
08 Valery Smyslov Requested Early review by SECDIR
2022-12-11
08 Valery Smyslov Changed consensus to Yes from Unknown
2022-12-11
08 Valery Smyslov Intended Status changed to Proposed Standard from None
2022-12-11
08 Valery Smyslov IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2022-10-17
08 Valery Smyslov Tag Revised I-D Needed - Issue raised by WGLC cleared.
2022-10-17
08 Valery Smyslov IETF WG state changed to In WG Last Call from WG Document
2022-10-12
08 Rich Salz New version available: draft-ietf-uta-rfc6125bis-08.txt
2022-10-12
08 Rich Salz New version approved
2022-10-12
08 (System) Request for posting confirmation emailed to previous authors: Peter Saint-Andre , Rich Salz
2022-10-12
08 Rich Salz Uploaded new revision
2022-08-15
07 Valery Smyslov IETF WG state changed to WG Document from WG Consensus: Waiting for Write-Up
2022-07-19
07 Valery Smyslov Added to session: IETF-114: uta  Wed-1330
2022-07-05
07 Rich Salz New version available: draft-ietf-uta-rfc6125bis-07.txt
2022-07-05
07 Valery Smyslov New version approved
2022-07-05
07 (System) Request for posting confirmation emailed to previous authors: Jeff Hodges , Peter Saint-Andre , Rich Salz , uta-chairs@ietf.org
2022-07-05
07 Rich Salz Uploaded new revision
2022-07-04
06 Valery Smyslov Tag Revised I-D Needed - Issue raised by WGLC set.
2022-07-04
06 Valery Smyslov IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2022-06-12
06 Valery Smyslov IETF WG state changed to In WG Last Call from WG Document
2022-05-26
06 Rich Salz New version available: draft-ietf-uta-rfc6125bis-06.txt
2022-05-26
06 Rich Salz New version approved
2022-05-26
06 (System) Request for posting confirmation emailed to previous authors: Jeff Hodges , Peter Saint-Andre , Rich Salz
2022-05-26
06 Rich Salz Uploaded new revision
2022-05-02
05 Rich Salz New version available: draft-ietf-uta-rfc6125bis-05.txt
2022-05-02
05 Rich Salz New version approved
2022-05-02
05 (System) Request for posting confirmation emailed to previous authors: Jeff Hodges , Peter Saint-Andre , Rich Salz , uta-chairs@ietf.org
2022-05-02
05 Rich Salz Uploaded new revision
2021-11-18
04 Rich Salz New version available: draft-ietf-uta-rfc6125bis-04.txt
2021-11-18
04 (System) New version approved
2021-11-18
04 (System) Request for posting confirmation emailed to previous authors: Jeff Hodges , Peter Saint-Andre , Rich Salz
2021-11-18
04 Rich Salz Uploaded new revision
2021-11-05
03 Valery Smyslov Added to session: IETF-112: uta  Fri-1600
2021-10-13
03 Rich Salz New version available: draft-ietf-uta-rfc6125bis-03.txt
2021-10-13
03 (System) New version approved
2021-10-13
03 (System) Request for posting confirmation emailed to previous authors: Jeff Hodges , Peter Saint-Andre , Rich Salz
2021-10-13
03 Rich Salz Uploaded new revision
2021-09-08
02 Rich Salz New version available: draft-ietf-uta-rfc6125bis-02.txt
2021-09-08
02 (System) New version approved
2021-09-08
02 (System) Request for posting confirmation emailed to previous authors: Jeff Hodges , Peter Saint-Andre , Rich Salz
2021-09-08
02 Rich Salz Uploaded new revision
2021-07-15
01 Valery Smyslov Added to session: IETF-111: uta  Wed-1430
2021-07-08
01 Rich Salz New version available: draft-ietf-uta-rfc6125bis-01.txt
2021-07-08
01 (System) New version approved
2021-07-08
01 (System) Request for posting confirmation emailed to previous authors: Jeff Hodges , Peter Saint-Andre , Rich Salz
2021-07-08
01 Rich Salz Uploaded new revision
2021-06-29
00 Valery Smyslov This document now replaces draft-ietf-uta-use-san instead of None
2021-06-29
00 Rich Salz New version available: draft-ietf-uta-rfc6125bis-00.txt
2021-06-29
00 (System) WG -00 approved
2021-06-29
00 Rich Salz Set submitter to "Rich Salz ", replaces to (none) and sent approval email to group chairs: uta-chairs@ietf.org
2021-06-29
00 Rich Salz Uploaded new revision