Skip to main content

Universally Unique IDentifiers (UUID)
draft-ietf-uuidrev-rfc4122bis-14

Revision differences

Document history

Date Rev. By Action
2024-05-07
(System)
Received changes through RFC Editor sync (changed state to RFC, created became rfc relationship between draft-ietf-uuidrev-rfc4122bis and RFC 9562, changed IESG state to RFC …
Received changes through RFC Editor sync (changed state to RFC, created became rfc relationship between draft-ietf-uuidrev-rfc4122bis and RFC 9562, changed IESG state to RFC Published)
2024-05-02
14 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2024-04-12
14 (System) RFC Editor state changed to AUTH48
2024-02-15
14 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2024-01-26
14 Gunter Van de Velde Request closed, assignment withdrawn: Joel Jaeggli Last Call OPSDIR review
2024-01-26
14 Gunter Van de Velde Closed request for Last Call review by OPSDIR with state 'Overtaken by Events': Cleaning up stale OPSDIR queue
2023-11-27
14 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2023-11-27
14 (System) IANA Action state changed to Waiting on RFC Editor from In Progress
2023-11-27
14 (System) IANA Action state changed to In Progress from Waiting on Authors
2023-11-17
14 (System) IANA Action state changed to Waiting on Authors from In Progress
2023-11-16
14 Tero Kivinen Closed request for Last Call review by SECDIR with state 'Overtaken by Events'
2023-11-16
14 Tero Kivinen Assignment of request for Last Call review by SECDIR to Tim Hollebeek was marked no-response
2023-11-14
14 (System) IANA Action state changed to In Progress from Waiting on Authors
2023-11-13
14 (System) IANA Action state changed to Waiting on Authors from In Progress
2023-11-08
14 (System) RFC Editor state changed to EDIT
2023-11-08
14 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2023-11-08
14 (System) Announcement was received by RFC Editor
2023-11-07
14 (System) IANA Action state changed to In Progress
2023-11-07
14 Cindy Morgan IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2023-11-07
14 Cindy Morgan IESG has approved the document
2023-11-07
14 Cindy Morgan Closed "Approve" ballot
2023-11-07
14 Cindy Morgan Ballot approval text was generated
2023-11-07
14 (System) Removed all action holders (IESG state changed)
2023-11-07
14 Murray Kucherawy IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2023-11-06
14 (System) Changed action holders to Murray Kucherawy (IESG state changed)
2023-11-06
14 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2023-11-06
14 Kyzer R. Davis New version available: draft-ietf-uuidrev-rfc4122bis-14.txt
2023-11-06
14 Kyzer R. Davis New version accepted (logged-in submitter: Kyzer Davis)
2023-11-06
14 Kyzer R. Davis Uploaded new revision
2023-10-23
13 (System) Changed action holders to Kyzer Davis, Brad Peabody, P. Leach (IESG state changed)
2023-10-23
13 Murray Kucherawy IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation::AD Followup
2023-10-22
13 Paul Wouters [Ballot comment]
Thanks for the document update. I've updated my ballot to No Objection.
2023-10-22
13 Paul Wouters [Ballot Position Update] Position for Paul Wouters has been changed to No Objection from Discuss
2023-10-20
13 Kyzer R. Davis New version available: draft-ietf-uuidrev-rfc4122bis-13.txt
2023-10-20
13 (System) New version approved
2023-10-20
13 (System) Request for posting confirmation emailed to previous authors: "P. Leach" , Brad Peabody , Kyzer Davis
2023-10-20
13 Kyzer R. Davis Uploaded new revision
2023-10-10
12 Robert Wilton [Ballot comment]
Thanks for addressing my comments.  Discuss cleared.
2023-10-10
12 Robert Wilton [Ballot Position Update] Position for Robert Wilton has been changed to No Objection from Discuss
2023-10-05
12 (System) Changed action holders to Murray Kucherawy (IESG state changed)
2023-10-05
12 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2023-10-05
12 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2023-10-05
12 Kyzer R. Davis New version available: draft-ietf-uuidrev-rfc4122bis-12.txt
2023-10-05
12 (System) New version approved
2023-10-05
12 (System) Request for posting confirmation emailed to previous authors: "P. Leach" , Brad Peabody , Kyzer Davis
2023-10-05
12 Kyzer R. Davis Uploaded new revision
2023-09-07
11 (System) Changed action holders to Kyzer Davis, Brad Peabody, P. Leach, Murray Kucherawy (IESG state changed)
2023-09-07
11 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2023-09-07
11 Robert Wilton
[Ballot discuss]
Hi,

Thanks for this document.  I'm particularly pleased to see that Brad has persevered with the IETF process after a somewhat negative initial …
[Ballot discuss]
Hi,

Thanks for this document.  I'm particularly pleased to see that Brad has persevered with the IETF process after a somewhat negative initial reaction on the main IETF mailing list when he first raised the problem.

I've flagged one question for which I think that would may be useful for discussion, or perhaps this has already been discussed and dismissed by the WG.

(1) p 14, sec 5.1.  UUID Version 1

  UUID version 1 is a time-based UUID featuring a 60 bit timestamp
  represented by Coordinated Universal Time (UTC) as a count of 100-
  nanosecond intervals since 00:00:00.00, 15 October 1582 (the date of
  Gregorian reform to the Christian calendar).

Was there any discussion in the WG about potentially marking some of the older UUID versions as being deprecated?  Or more specifically, is it still reasonable for new implementations to choose to use some of these older UUIDs versions, or would it be better for them to default to choosing one of the newer versions?
2023-09-07
11 Robert Wilton
[Ballot comment]
Minor level comments:

(2) p 14, sec 4.2.  Version Field

      Table 2: UUID variant 10x versions defined by this specification …
[Ballot comment]
Minor level comments:

(2) p 14, sec 4.2.  Version Field

      Table 2: UUID variant 10x versions defined by this specification
  An example version/variant layout for UUIDv4 follows the table where
  M represents the version placement for the hexadecimal representation
  of 0x4 (0b0100) and the N represents the variant placement for one of
  the four possible hexadecimal representation of variant 10x: 0x8
  (0b1000), 0x9 (0b1001), 0xA (0b1010), 0xB (0b1011)

Table 1 only defines 3 bits and doesn't obviously mention a 4th bit, and yet the examples below are displaying 4 bits, where I assume that the 4th bit is effectively arbitrary data in the UUID definition.  Please consider whether it would be helpful to clarify this.


(3) p 16, sec 5.3.  UUID Version 3

  UUIDv3 values are created by computing an MD5 [RFC1321] hash over a
  given name space value concatenated with the desired name value after
  both have been converted to a canonical sequence of octets in network
  byte order.  This MD5 value is then used to populate all 128 bits of
  the UUID layout.  The UUID version and variant then replace the
  respective bits as defined by Section 4.2 and Section 4.1.

Presumably the MD5 is only actually used to populate 122 bits, since the other 6 are already spoken for with 'ver' and 'var'.


(4) p 29, sec 6.2.  Monotonicity and Counters

      For example, let's assume a system timestamp of 1 Jan 2023
      12:34:56.1234567.  Taking the precision greater than 1ms gives us
      a value of 0.4567, as a fraction of a millisecond.  If we wish to
      encode this as 12 bits, we can take the count of possible values
      that fit in those bits (4096, or 2 to the 12th power) and multiply
      it by our millisecond fraction value of 0.4567 and truncate the
      result to an integer, which gives an integer value of 1870.
      Expressed as hexadecimal it is 0x74E, or the binary bits
      0b011101001110.  One can then use those 12 bits as the most
      significant (left-most) portion of the random section of the UUID
      (e.g., the rand_a field in UUIDv7).  This works for any desired
      bit length that fits into a UUID, and applications can decide the
      appropriate length based on available clock precision, but for
      UUIDv7, it is limited to 12 bits at maximum to reserve sufficient
      space for random bits.

Would a valid alternative way of achieving this be to just directly write the 10 bits of the timestamp, giving 2 extra bits of randomness and a slightly cheaper calculation?

Regards,
Rob
2023-09-07
11 Robert Wilton [Ballot Position Update] New position, Discuss, has been recorded for Robert Wilton
2023-09-07
11 Andrew Alston [Ballot Position Update] New position, No Objection, has been recorded for Andrew Alston
2023-09-07
11 Francesca Palombini
[Ballot comment]
Thank you for the work on this document.

Many thanks to Marco Tiloca for his ART ART review: https://mailarchive.ietf.org/arch/msg/art/wXCmWw9yLijUDNSHcZxLainEUb8/, and to the …
[Ballot comment]
Thank you for the work on this document.

Many thanks to Marco Tiloca for his ART ART review: https://mailarchive.ietf.org/arch/msg/art/wXCmWw9yLijUDNSHcZxLainEUb8/, and to the authors for addressing Marco's comments.

I agree with Paul and was surprised to see no IANA registry is created (at least for var and ver), but the document does explicitly mention that "the authors and working group have concluded that IANA is not required to track UUIDs used for identifying items such as versions, variants, namespaces, or hashspaces.", so that makes me believe a discussion has happened around it and a conclusion reached. Without knowing much of the background behind it, I'll leave it to the responsible AD to make sure that has been the case.
2023-09-07
11 Francesca Palombini Ballot comment text updated for Francesca Palombini
2023-09-07
11 Francesca Palombini
[Ballot comment]
Thank you for the work on this document.

Many thanks to Marco Tiloca for his ART ART review: https://mailarchive.ietf.org/arch/msg/art/wXCmWw9yLijUDNSHcZxLainEUb8/, and to the …
[Ballot comment]
Thank you for the work on this document.

Many thanks to Marco Tiloca for his ART ART review: https://mailarchive.ietf.org/arch/msg/art/wXCmWw9yLijUDNSHcZxLainEUb8/, and to the authors for addressing Marco's comments.
2023-09-07
11 Francesca Palombini [Ballot Position Update] New position, No Objection, has been recorded for Francesca Palombini
2023-09-06
11 Éric Vyncke
[Ballot comment]
Thanks again for this document and for addressing my previous blocking DISCUSS point
(see https://mailarchive.ietf.org/arch/msg/iesg/1ZxBR8Ohbz7lL2mipYTNxTtBdqU/)

-éric

# COMMENTS

## Section 1

Two …
[Ballot comment]
Thanks again for this document and for addressing my previous blocking DISCUSS point
(see https://mailarchive.ietf.org/arch/msg/iesg/1ZxBR8Ohbz7lL2mipYTNxTtBdqU/)

-éric

# COMMENTS

## Section 1

Two sentences appear to contradict each others:

- `A UUID is 128 bits long and requires no central registration process`
- `In addition, a global registration function is being provided by the Telecommunications Standardization Bureau of ITU-T`

## Section 2

Should there be an informative reference to `IEEE 802 node identifiers` ?

## Section 2.1

What is the impact of randomised MAC address (cfr MADINAS WG and IEEE work) on bullet 4. Should this randomised MAC address be mentioned in the text ?

## Section 5.1

Why only IEEE 802.3 LAN what about 802.11 or 802.15.4 ? Should the text be relaxed ?

## Section 8

Should privacy be added in `MAC addresses pose inherent security risks ` ?

# NITS

## Section 3.3

The usual wording is more like `Note to RFC Editor: This section needs to be removed before publication as RFC`.

## Sections C.1 & C.5

Please use a documentation MAC address per section 2.1.2 of RFC 7042. *IF* the node is assumed to be a MAC address.
2023-09-06
11 Éric Vyncke [Ballot Position Update] Position for Éric Vyncke has been changed to No Objection from Discuss
2023-09-06
11 John Scudder [Ballot Position Update] New position, No Objection, has been recorded for John Scudder
2023-09-06
11 Geoff Huston Request for Telechat review by DNSDIR Completed: Ready. Reviewer: Geoff Huston. Sent review to list.
2023-09-06
11 Warren Kumari
[Ballot comment]
Firstly, I'd like to sincerely thank Geoff Huston and the authors for working so closely to address the comments in Geoff's excellent DnsDir …
[Ballot comment]
Firstly, I'd like to sincerely thank Geoff Huston and the authors for working so closely to address the comments in Geoff's excellent DnsDir review - https://datatracker.ietf.org/doc/review-ietf-uuidrev-rfc4122bis-10-dnsdir-telechat-huston-2023-08-26/ I believe that this has noticeably improved the document.

Other than my thanks for the above, and for a well written document, I'd like to support Eric's DISCUSS on the length of MAC addresses.
2023-09-06
11 Warren Kumari [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari
2023-09-06
11 Jim Guichard [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard
2023-09-06
11 Zaheduzzaman Sarker
[Ballot comment]
Thanks for working on this specification.

This specification does not raise transport related issues in my evaluation. However, for clarity in description I …
[Ballot comment]
Thanks for working on this specification.

This specification does not raise transport related issues in my evaluation. However, for clarity in description I think Eric's discuss need to be resolved. Supporting his discuss.
2023-09-06
11 Zaheduzzaman Sarker [Ballot Position Update] New position, No Objection, has been recorded for Zaheduzzaman Sarker
2023-09-05
11 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2023-09-05
11 Jim Reid Request for Telechat review by DNSDIR is assigned to Geoff Huston
2023-09-05
11 Paul Wouters
[Ballot discuss]
As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/, a
DISCUSS ballot is a request to have a discussion.

Why are hashspace IDs chosen to look like …
[Ballot discuss]
As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/, a
DISCUSS ballot is a request to have a discussion.

Why are hashspace IDs chosen to look like random uuids? Eg why not encode
"SHA2_224" (hex 534841325F323234) as 53484132-5F32-3234-0000-000000000000
or 00000000-0000-0000-5348-41325F323234 (plus or minus variant/version bits)
so that it becomes far more clear this is not an ordinary random uuid?

Similarly, why not do the same for namespace IDs? I guess that answer is
"because RFC 4122 defined it that way".

I am not sure that I agree that no IANA registry is required for hashspace
ID's. If another document adds new hashspace IDs, there won't be a single
document anymore that lists all of them, or massive duplication. This is
exactly what we use IANA registries for. Reconsider creating a new IANA registry.
2023-09-05
11 Paul Wouters
[Ballot comment]
        Padding:

                When timestamp padding is required, implementations
        …
[Ballot comment]
        Padding:

                When timestamp padding is required, implementations
                MUST pad the most significant bits (left-most) bits
                with zeros. An example is padding the most significant,
                left-most bits of a Unix timestamp with zeroes to fill
                out the 48 bit timestamp in UUIDv7. An alternative is to
                pad the most significant, left-most bits with the number
                of 32 bit Unix timestamp roll-overs after 2038-01-19.

How can this MUST clause have an alternative? Should it be a SHOULD? If
so, when would one use the alternative specified here?


        sharing the hashspace ID proves useful for identifying the algorithm.

It is not clear what the term "hashspace ID" refers to.

        Implementations SHOULD utilize a cryptographically secure
        pseudo-random number generator (CSPRNG) to provide values that
        are both difficult to predict ("unguessable") and have a low
        likelihood of collision ("unique").

Couldn't Verifiable Random Functions (VRF) also be used instead of a CSPRNG?

        use a message digest such as MD5 [RFC1321] or SHA-1 [FIPS180-4],
        take an arbitrary 6 bytes from the hash value, and set the
        multicast bit as described above.

While it might not matter, use of a more modern message digest algorithm is
still recommended here. One reason is that the IETF is trying to phase out
these older digests, and prefers to not reference these in new RFCs. A second
reason is that sometimes, cryptographic libraries are prevented from using
these older type of digests (eg when running in FIPS mode)

        Implementations can also leverage MAC address randomization
        techniques (IEEE 802.11bh) as an alternative to the pseudo-random
        logic provided in this section.

I'm not sure why the Section didn't lead with this more obvious approach?

NITS:

for readability, change:

        The increment value MAY be one when the number of UUIDs generated
        in a particular period of time is ...

to

        The increment value MAY be 1 when the number of UUIDs generated
        in a particular period of time is ...



        However, it SHOULD NOT be used by implementations that favor
        unguessability, as the resulting values are easily guessable.

What does "it" refer to? Incrementing by 1? Write it out instead of using "it"
2023-09-05
11 Paul Wouters [Ballot Position Update] New position, Discuss, has been recorded for Paul Wouters
2023-09-05
11 Kyzer R. Davis New version available: draft-ietf-uuidrev-rfc4122bis-11.txt
2023-09-05
11 Kyzer R. Davis New version accepted (logged-in submitter: Kyzer Davis)
2023-09-05
11 Kyzer R. Davis Uploaded new revision
2023-09-05
10 Roman Danyliw
[Ballot comment]
Section 6.6
  High Impact:
      A duplicate key causes an airplane to receive the wrong course
      which …
[Ballot comment]
Section 6.6
  High Impact:
      A duplicate key causes an airplane to receive the wrong course
      which puts people's lives at risk.  In this scenario there is no
      margin for error.  Collisions MUST be avoided and failure is
      unacceptable.  Applications dealing with this type of scenario
      MUST employ as much collision resistance as possible within the
      given application context.

Not to trivialize the seriousness of the described scenario, but normative language around airplane design and operation doesn’t seem appropriate or in scope for the WG.  Furthermore “as much collision resistance as possible” isn’t particularly precise.  Recommend s/MUST/must/

** Section 6.9
  A generic approach, however, is
  to accumulate as many sources as possible into a buffer, use a
  message digest such as MD5 [RFC1321] or SHA-1 [FIPS180-4], take an
  arbitrary 6 bytes from the hash value, and set the multicast bit as
  described above.

RFC4112 referenced MD5 and SHA-1, but didn’t tie the implementation to them, why can’t a modern hash algorithm (SHA-256) be recommended here instead?

** Section 6.11

  UUIDs SHOULD be treated as opaque values and implementations SHOULD
  NOT examine the bits in a UUID.  However, inspectors MAY refer to
  Section 4.1 and Section 4.2 when required to determine UUID version
  and variant.

  As general guidance, we recommend not parsing UUID values
  unnecessarily, and instead treating them as opaquely as possible.
  Although application-specific concerns could of course require some
  degree of introspection (e.g., to examine the variant, version or
  perhaps the timestamp of a UUID), the advice here is to avoid this or
  other parsing unless absolutely necessary.

Why are both of these paragraphs needed?  The first seems to say the same thing as the second except with normative language.

** Section 8
Implementations SHOULD NOT assume that UUIDs are hard to guess. For example, they MUST NOT be used as security capabilities (identifiers whose mere possession grants access).

-- Why isn’t this a “MUST NOT assume”?

** Section 8
  MAC addresses pose inherent security risks and SHOULD NOT be used within a UUID.

Is there any advisory language that can be provided that could explain when a MAC address should be used?
2023-09-05
10 Roman Danyliw [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw
2023-09-01
10 Donald Eastlake Request for Telechat review by INTDIR Completed: On the Right Track. Reviewer: Donald Eastlake. Submission of review completed at an earlier date.
2023-09-01
10 Donald Eastlake Request for Telechat review by INTDIR Completed: On the Right Track. Reviewer: Donald Eastlake.
2023-08-31
10 Juan-Carlos Zúñiga Request for Telechat review by INTDIR is assigned to Donald Eastlake
2023-08-31
10 Éric Vyncke
[Ballot discuss]

# Éric Vyncke, INT AD, comments for draft-ietf-uuidrev-rfc4122bis-10

Thank you for the work put into this document. A very useful piece of work …
[Ballot discuss]

# Éric Vyncke, INT AD, comments for draft-ietf-uuidrev-rfc4122bis-10

Thank you for the work put into this document. A very useful piece of work and do not worry too much about the DISCUSS

Please find below one blocking DISCUSS points (easy to address), some non-blocking COMMENT points (but replies would be appreciated even if only for my own education), and some nits.

Special thanks to Michael Richardson for the shepherd's detailed write-up including the WG consensus *and* the justification of the intended status.

I hope that this review helps to improve the document,

Regards,

-éric


# DISCUSS

As noted in https://www.ietf.org/blog/handling-iesg-ballot-positions/, a DISCUSS ballot is a request to have a discussion on the following topics:

## Section 5.1

Not all MAC addresses are 48-bit value (IEEE 802.15.4 has 16 or 64-bit MAC addresses). So, please recommend what to do in this situation.
2023-08-31
10 Éric Vyncke
[Ballot comment]

# COMMENTS

## Section 1

Two sentences appear to contradict each others:

- `A UUID is 128 bits long and requires no central …
[Ballot comment]

# COMMENTS

## Section 1

Two sentences appear to contradict each others:

- `A UUID is 128 bits long and requires no central registration process`
- `In addition, a global registration function is being provided by the Telecommunications Standardization Bureau of ITU-T`

## Section 2

Should there be an informative reference to `IEEE 802 node identifiers` ?

## Section 2.1

What is the impact of randomised MAC address (cfr MADINAS WG and IEEE work) on bullet 4. Should this randomised MAC address be mentioned in the text ?

## Section 5.1

Why only IEEE 802.3 LAN what about 802.11 or 802.15.4 ? Should the text be relaxed ?

## Section 8

Should privacy be added in `MAC addresses pose inherent security risks ` ?

# NITS

## Section 3.3

The usual wording is more like `Note to RFC Editor: This section needs to be removed before publication as RFC`.

## Sections C.1 & C.5

Please use a documentation MAC address per section 2.1.2 of RFC 7042. *IF* the node is assumed to be a MAC address.
2023-08-31
10 Éric Vyncke [Ballot Position Update] New position, Discuss, has been recorded for Éric Vyncke
2023-08-26
10 Erik Kline
[Ballot comment]
# Internet AD comments for draft-ietf-uuidrev-rfc4122bis-10
CC @ekline

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Nits …
[Ballot comment]
# Internet AD comments for draft-ietf-uuidrev-rfc4122bis-10
CC @ekline

* comment syntax:
  - https://github.com/mnot/ietf-comments/blob/main/format.md

* "Handling Ballot Positions":
  - https://ietf.org/about/groups/iesg/statements/handling-ballot-positions/

## Nits

### S6.2

* "which is sorts" -> "which is sorted"?

### S6.10

* "UUIDs formats" -> "UUID formats"
2023-08-26
10 Erik Kline [Ballot Position Update] New position, Yes, has been recorded for Erik Kline
2023-08-26
10 Geoff Huston Request for Telechat review by DNSDIR Completed: Ready with Issues. Reviewer: Geoff Huston. Sent review to list.
2023-08-26
10 Jim Reid Request for Telechat review by DNSDIR is assigned to Geoff Huston
2023-08-25
10 Éric Vyncke Requested Telechat review by INTDIR
2023-08-25
10 Cindy Morgan Placed on agenda for telechat - 2023-09-07
2023-08-25
10 Murray Kucherawy Ballot has been issued
2023-08-25
10 Murray Kucherawy [Ballot Position Update] New position, Yes, has been recorded for Murray Kucherawy
2023-08-25
10 Murray Kucherawy Created "Approve" ballot
2023-08-25
10 (System) Changed action holders to Murray Kucherawy (IESG state changed)
2023-08-25
10 Murray Kucherawy IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup
2023-08-25
10 Murray Kucherawy Ballot writeup was changed
2023-08-23
10 (System) Removed all action holders (IESG state changed)
2023-08-23
10 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2023-08-23
10 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2023-08-23
10 Kyzer R. Davis New version available: draft-ietf-uuidrev-rfc4122bis-10.txt
2023-08-23
10 Kyzer R. Davis New version accepted (logged-in submitter: Kyzer Davis)
2023-08-23
10 Kyzer R. Davis Uploaded new revision
2023-08-10
09 Murray Kucherawy Changed action holders to Kyzer Davis, Brad Peabody, P. Leach
2023-08-08
09 Murray Kucherawy ARTART review produced some feedback that will result in a revision.
2023-08-08
09 (System) Changed action holders to Murray Kucherawy, Kyzer Davis, Brad Peabody, P. Leach (IESG state changed)
2023-08-08
09 Murray Kucherawy IESG state changed to Waiting for AD Go-Ahead::Revised I-D Needed from Waiting for AD Go-Ahead
2023-08-08
09 Marco Tiloca Request for Last Call review by ARTART Completed: Ready with Nits. Reviewer: Marco Tiloca. Sent review to list.
2023-08-08
09 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2023-08-07
09 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2023-08-07
09 David Dong
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-uuidrev-rfc4122bis-09, which is currently in Last Call, and has the following comments:

We …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Functions Operator has reviewed draft-ietf-uuidrev-rfc4122bis-09, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any registry actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, we do not object.

If this assessment is not accurate, please respond as soon as possible.

For definitions of IANA review states, please see:

https://datatracker.ietf.org/help/state/draft/iana-review

Thank you,

David Dong
IANA Services Sr. Specialist
2023-08-04
09 Florian Obser Request for Last Call review by DNSDIR Completed: Ready. Reviewer: Florian Obser. Sent review to list.
2023-08-04
09 Jim Reid Request for Last Call review by DNSDIR is assigned to Florian Obser
2023-08-04
09 Kyzer R. Davis New version available: draft-ietf-uuidrev-rfc4122bis-09.txt
2023-08-04
09 Kyzer R. Davis New version accepted (logged-in submitter: Kyzer Davis)
2023-08-04
09 Kyzer R. Davis Uploaded new revision
2023-08-02
08 Roni Even Request for Last Call review by GENART Completed: Ready. Reviewer: Roni Even. Review has been revised by Roni Even.
2023-08-02
08 Roni Even Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Roni Even. Sent review to list.
2023-08-02
08 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Joel Jaeggli
2023-07-28
08 Jean Mahoney Request for Last Call review by GENART is assigned to Roni Even
2023-07-27
08 Barry Leiba Request for Last Call review by ARTART is assigned to Marco Tiloca
2023-07-27
08 Tero Kivinen Request for Last Call review by SECDIR is assigned to Tim Hollebeek
2023-07-26
08 Florian Obser Request for Last Call review by DNSDIR Completed: Ready with Issues. Reviewer: Florian Obser. Sent review to list.
2023-07-25
08 Jim Reid Request for Last Call review by DNSDIR is assigned to Florian Obser
2023-07-25
08 Amy Vezza IANA Review state changed to IANA - Review Needed
2023-07-25
08 Amy Vezza
The following Last Call announcement was sent out (ends 2023-08-08):

From: The IESG
To: IETF-Announce
CC: draft-ietf-uuidrev-rfc4122bis@ietf.org, mcr+ietf@sandelman.ca, superuser@gmail.com, uuidrev-chairs@ietf.org, uuidrev@ietf.org …
The following Last Call announcement was sent out (ends 2023-08-08):

From: The IESG
To: IETF-Announce
CC: draft-ietf-uuidrev-rfc4122bis@ietf.org, mcr+ietf@sandelman.ca, superuser@gmail.com, uuidrev-chairs@ietf.org, uuidrev@ietf.org
Reply-To: last-call@ietf.org
Sender:
Subject: Last Call:  (Universally Unique IDentifiers (UUID)) to Proposed Standard


The IESG has received a request from the Revise Universally Unique Identifier
Definitions WG (uuidrev) to consider the following document: - 'Universally
Unique IDentifiers (UUID)'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-call@ietf.org mailing lists by 2023-08-08. Exceptionally, comments may
be sent to iesg@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


  This specification defines the UUIDs (Universally Unique IDentifiers)
  and the UUID Uniform Resource Name (URN) namespace.  UUIDs are also
  known as GUIDs (Globally Unique IDentifiers).  A UUID is 128 bits
  long and is intended to guarantee uniqueness across space and time.
  UUIDs were originally used in the Apollo Network Computing System and
  later in the Open Software Foundation's (OSF) Distributed Computing
  Environment (DCE), and then in Microsoft Windows platforms.

  This specification is derived from the DCE specification with the
  kind permission of the OSF (now known as The Open Group).
  Information from earlier versions of the DCE specification have been
  incorporated into this document.  This document obsoletes RFC4122.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-uuidrev-rfc4122bis/



No IPR declarations have been submitted directly on this I-D.




2023-07-25
08 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2023-07-25
08 Amy Vezza Last call announcement was changed
2023-07-24
08 Murray Kucherawy Last call was requested
2023-07-24
08 Murray Kucherawy Ballot approval text was generated
2023-07-24
08 Murray Kucherawy Ballot writeup was generated
2023-07-24
08 (System) Changed action holders to Murray Kucherawy (IESG state changed)
2023-07-24
08 Murray Kucherawy IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2023-07-24
08 Murray Kucherawy Last call announcement was generated
2023-07-24
08 (System) Changed action holders to Michael Richardson (IESG state changed)
2023-07-24
08 (System) Sub state has been changed to AD Followup from Revised I-D Needed
2023-07-24
08 Kyzer R. Davis New version available: draft-ietf-uuidrev-rfc4122bis-08.txt
2023-07-24
08 Kyzer R. Davis New version accepted (logged-in submitter: Kyzer Davis)
2023-07-24
08 Kyzer R. Davis Uploaded new revision
2023-07-13
07 Murray Kucherawy IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation::AD Followup
2023-07-09
07 Murray Kucherawy Changed action holders to Kyzer Davis, P. Leach, Brad Peabody, Michael Richardson
2023-07-09
07 Murray Kucherawy IESG state changed to AD Evaluation::AD Followup from AD Evaluation
2023-06-10
07 (System) Changed action holders to Murray Kucherawy (IESG state changed)
2023-06-10
07 Murray Kucherawy IESG state changed to AD Evaluation from Publication Requested
2023-06-10
07 Michael Richardson
Document Shepherd Write-Up for Group Documents
This version is dated 4 July 2022.

>Document History
>Does the working group (WG) consensus represent the strong concurrence …
Document Shepherd Write-Up for Group Documents
This version is dated 4 July 2022.

>Document History
>Does the working group (WG) consensus represent the strong concurrence of a
>few individuals, with others being silent, or did it reach broad agreement?

The document represents a strong concurrence of a many individuals, including
many from outside the IETF community who maintain running code.

>Was there controversy about particular points, or were there decisions where
>the consensus was particularly rough?

There were many small discussions, but not big ones and consensus was not rought.

>Has anyone threatened an appeal or otherwise indicated extreme discontent?

No.

>For protocol documents, are there existing implementations of the contents of
>the document? Have a significant number of potential implementers indicated
>plans to implement? Are any existing implementations reported somewhere,
>either in the document itself (as RFC 7942 recommends) or elsewhere
>(where)?

Yes there are a number of implementators involved, and many have implemented
the changes.

>Additional Reviews
>Do the contents of this document closely interact with technologies in other
>IETF working groups or external organizations, and would it therefore benefit
>from their review? Have those reviews occurred? If yes, describe which
>reviews took place.

The ITU-T and the ISO published documents similiar to RFC4122 at the time,
but they have not responded to this BIS process.

>Describe how the document meets any required formal expert review criteria,
>such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

None.

>If the document contains a YANG module, has the final version of the module

No YANG module.

>Describe reviews and automated checks performed to validate sections of the
>final version of the document written in a formal language, such as XML code,
>BNF rules, MIB definitions, CBOR's CDDL, etc.

None required.

>Document Shepherd Checks
>Based on the shepherd's review of the document, is it their opinion that this
>document is needed, clearly written, complete, correctly designed, and ready
>to be handed off to the responsible Area Director?

yes.

>Several IETF Areas have assembled lists of common issues that their
>reviewers encounter. For which areas have such issues been identified
>and addressed? For which does this still need to happen in subsequent
>reviews?

None relevant.

>What type of RFC publication is being requested on the IETF stream (Best
>Current Practice, Proposed Standard, Internet Standard,

Internet Standard.
This is an IETF revision of a Proposed Standard.
After the two year delay, it may be appropriate to mark it as Internet Standard.

>Have reasonable efforts been made to remind all authors of the intellectual
>property rights (IPR) disclosure obligations described in BCP 79? To
>the best of your knowledge, have all required disclosures been filed? If
>not, explain why. If yes, summarize any relevant discussion, including links
>to publicly-available messages when applicable.

yes.

>Has each author, editor, and contributor shown their willingness to be
>listed as such? If the total number of authors and editors on the front page
>is greater than five, please provide a justification.

Yes, although one previous author was unresponsive, and was removed as an author.

>Document any remaining I-D nits in this document. Simply running the idnits
>tool is not enough; please review the "Content Guidelines" on
>authors.ietf.org. (Also note that the current idnits tool generates
>some incorrect warnings; a rewrite is underway.)

Three potential downrefs have been identified.

>Should any informative references be normative or vice-versa? See the IESG
>Statement on Normative and Informative References.

Three references could be informative.

>List any normative references that are not freely available to anyone. Did
>the community have sufficient access to review any such normative
>references?

Although the IEC version of the document was not freely available, it was not used.

>Are there any normative downward references (see RFC 3967 and BCP
>97) that are not already listed in the DOWNREF registry? If so,
>list them.

None.

>Are there normative references to documents that are not ready to be
>submitted to the IESG for publication or are otherwise in an unclear state?
A>If so, what is the plan for their completion?

None.

>Will publication of this document change the status of any existing RFCs?

Just obsolete RFC4122.

>Describe the document shepherd's review of the IANA considerations section,
>especially with regard to its consistency with the body of the document.

No IANA Considerations.

2023-06-10
07 Michael Richardson Responsible AD changed to Murray Kucherawy
2023-06-10
07 Michael Richardson IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2023-06-10
07 Michael Richardson IESG state changed to Publication Requested from I-D Exists
2023-06-10
07 Michael Richardson Document is now in IESG state Publication Requested
2023-06-10
07 Michael Richardson Changed consensus to Yes from Unknown
2023-06-10
07 Michael Richardson Please insert into Q for 2025 consideration for Internet Standard.
2023-06-10
07 Michael Richardson Intended Status changed to Proposed Standard from None
2023-06-10
07 Michael Richardson Notification list changed to mcr+ietf@sandelman.ca because the document shepherd was set
2023-06-10
07 Michael Richardson Document shepherd changed to Michael Richardson
2023-06-10
07 Michael Richardson
Document Shepherd Write-Up for Group Documents
This version is dated 4 July 2022.

>Document History
>Does the working group (WG) consensus represent the strong concurrence …
Document Shepherd Write-Up for Group Documents
This version is dated 4 July 2022.

>Document History
>Does the working group (WG) consensus represent the strong concurrence of a
>few individuals, with others being silent, or did it reach broad agreement?

The document represents a strong concurrence of a many individuals, including
many from outside the IETF community who maintain running code.

>Was there controversy about particular points, or were there decisions where
>the consensus was particularly rough?

There were many small discussions, but not big ones and consensus was not rought.

>Has anyone threatened an appeal or otherwise indicated extreme discontent?

No.

>For protocol documents, are there existing implementations of the contents of
>the document? Have a significant number of potential implementers indicated
>plans to implement? Are any existing implementations reported somewhere,
>either in the document itself (as RFC 7942 recommends) or elsewhere
>(where)?

Yes there are a number of implementators involved, and many have implemented
the changes.

>Additional Reviews
>Do the contents of this document closely interact with technologies in other
>IETF working groups or external organizations, and would it therefore benefit
>from their review? Have those reviews occurred? If yes, describe which
>reviews took place.

The ITU-T and the ISO published documents similiar to RFC4122 at the time,
but they have not responded to this BIS process.

>Describe how the document meets any required formal expert review criteria,
>such as the MIB Doctor, YANG Doctor, media type, and URI type reviews.

None.

>If the document contains a YANG module, has the final version of the module

No YANG module.

>Describe reviews and automated checks performed to validate sections of the
>final version of the document written in a formal language, such as XML code,
>BNF rules, MIB definitions, CBOR's CDDL, etc.

None required.

>Document Shepherd Checks
>Based on the shepherd's review of the document, is it their opinion that this
>document is needed, clearly written, complete, correctly designed, and ready
>to be handed off to the responsible Area Director?

yes.

>Several IETF Areas have assembled lists of common issues that their
>reviewers encounter. For which areas have such issues been identified
>and addressed? For which does this still need to happen in subsequent
>reviews?

None relevant.

>What type of RFC publication is being requested on the IETF stream (Best
>Current Practice, Proposed Standard, Internet Standard,

Internet Standard.
This is an IETF revision of a Proposed Standard.
After the two year delay, it may be appropriate to mark it as Internet Standard.

>Have reasonable efforts been made to remind all authors of the intellectual
>property rights (IPR) disclosure obligations described in BCP 79? To
>the best of your knowledge, have all required disclosures been filed? If
>not, explain why. If yes, summarize any relevant discussion, including links
>to publicly-available messages when applicable.

yes.

>Has each author, editor, and contributor shown their willingness to be
>listed as such? If the total number of authors and editors on the front page
>is greater than five, please provide a justification.

Yes, although one previous author was unresponsive, and was removed as an author.

>Document any remaining I-D nits in this document. Simply running the idnits
>tool is not enough; please review the "Content Guidelines" on
>authors.ietf.org. (Also note that the current idnits tool generates
>some incorrect warnings; a rewrite is underway.)

Three potential downrefs have been identified.

>Should any informative references be normative or vice-versa? See the IESG
>Statement on Normative and Informative References.

Three references could be informative.

>List any normative references that are not freely available to anyone. Did
>the community have sufficient access to review any such normative
>references?

Although the IEC version of the document was not freely available, it was not used.

>Are there any normative downward references (see RFC 3967 and BCP
>97) that are not already listed in the DOWNREF registry? If so,
>list them.

None.

>Are there normative references to documents that are not ready to be
>submitted to the IESG for publication or are otherwise in an unclear state?
A>If so, what is the plan for their completion?

None.

>Will publication of this document change the status of any existing RFCs?

Just obsolete RFC4122.

>Describe the document shepherd's review of the IANA considerations section,
>especially with regard to its consistency with the body of the document.

No IANA Considerations.

2023-06-09
07 Jim Fenton IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call
2023-06-09
07 Kyzer R. Davis New version available: draft-ietf-uuidrev-rfc4122bis-07.txt
2023-06-09
07 (System) New version approved
2023-06-09
07 (System) Request for posting confirmation emailed to previous authors: "P. Leach" , Brad Peabody , Kyzer Davis , Michael Mealling , uuidrev-chairs@ietf.org
2023-06-09
07 Kyzer R. Davis Uploaded new revision
2023-06-06
06 Kyzer R. Davis New version available: draft-ietf-uuidrev-rfc4122bis-06.txt
2023-06-06
06 (System) New version approved
2023-06-06
06 (System) Request for posting confirmation emailed to previous authors: Brad Peabody , Kyzer Davis , Michael Mealling , Paul Leach , uuidrev-chairs@ietf.org
2023-06-06
06 Kyzer R. Davis Uploaded new revision
2023-06-02
05 Kyzer R. Davis New version available: draft-ietf-uuidrev-rfc4122bis-05.txt
2023-06-02
05 (System) New version approved
2023-06-02
05 (System) Request for posting confirmation emailed to previous authors: Brad Peabody , Kyzer Davis , Michael Mealling , Paul Leach
2023-06-02
05 Kyzer R. Davis Uploaded new revision
2023-05-23
04 Kyzer R. Davis New version available: draft-ietf-uuidrev-rfc4122bis-04.txt
2023-05-23
04 (System) New version approved
2023-05-23
04 (System) Request for posting confirmation emailed to previous authors: Brad Peabody , Kyzer Davis , Michael Mealling , Paul Leach
2023-05-23
04 Kyzer R. Davis Uploaded new revision
2023-05-10
03 Michael Richardson IETF WG state changed to In WG Last Call from WG Document
2023-04-12
03 Kyzer R. Davis New version available: draft-ietf-uuidrev-rfc4122bis-03.txt
2023-04-12
03 (System) New version approved
2023-04-12
03 (System) Request for posting confirmation emailed to previous authors: Brad Peabody , Kyzer Davis , Michael Mealling , Paul Leach
2023-04-12
03 Kyzer R. Davis Uploaded new revision
2023-02-16
02 Kyzer R. Davis New version available: draft-ietf-uuidrev-rfc4122bis-02.txt
2023-02-16
02 (System) New version approved
2023-02-16
02 (System) Request for posting confirmation emailed to previous authors: Brad Peabody , Kyzer Davis , Michael Mealling , Paul Leach
2023-02-16
02 Kyzer R. Davis Uploaded new revision
2023-01-23
01 Kyzer R. Davis New version available: draft-ietf-uuidrev-rfc4122bis-01.txt
2023-01-23
01 (System) New version approved
2023-01-23
01 (System) Request for posting confirmation emailed to previous authors: Brad Peabody , Kyzer Davis , Michael Mealling , Paul Leach
2023-01-23
01 Kyzer R. Davis Uploaded new revision
2022-10-17
00 Michael Richardson This document now replaces draft-peabody-dispatch-new-uuid-format instead of None
2022-10-17
00 Kyzer R. Davis New version available: draft-ietf-uuidrev-rfc4122bis-00.txt
2022-10-17
00 Michael Richardson WG -00 approved
2022-10-17
00 Kyzer R. Davis Set submitter to ""Kyzer R. Davis" ", replaces to draft-peabody-dispatch-new-uuid-format and sent approval email to group chairs: uuidrev-chairs@ietf.org
2022-10-17
00 Kyzer R. Davis Uploaded new revision