Registration Data Access Protocol (RDAP) Query Format
draft-ietf-weirds-rdap-query-18
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-03-03
|
18 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2015-02-23
|
18 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2015-02-11
|
18 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2015-01-04
|
18 | (System) | IANA Action state changed to No IC |
2015-01-02
|
18 | Cindy Morgan | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2015-01-02
|
18 | (System) | RFC Editor state changed to EDIT |
2015-01-02
|
18 | (System) | Announcement was received by RFC Editor |
2015-01-01
|
18 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2015-01-01
|
18 | Cindy Morgan | IESG has approved the document |
2015-01-01
|
18 | Cindy Morgan | Closed "Approve" ballot |
2015-01-01
|
18 | Cindy Morgan | Ballot approval text was generated |
2014-12-31
|
18 | Pete Resnick | IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::Point Raised - writeup needed |
2014-12-29
|
18 | Pete Resnick | IESG state changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation::AD Followup |
2014-12-23
|
18 | Scott Hollenbeck | New version available: draft-ietf-weirds-rdap-query-18.txt |
2014-12-23
|
17 | Barry Leiba | [Ballot comment] Version -17 addresses my comments; thanks very much. |
2014-12-23
|
17 | Barry Leiba | [Ballot Position Update] Position for Barry Leiba has been changed to No Objection from Discuss |
2014-12-23
|
17 | Alissa Cooper | [Ballot comment] Thanks for addressing my comments. |
2014-12-23
|
17 | Alissa Cooper | [Ballot Position Update] Position for Alissa Cooper has been changed to No Objection from Discuss |
2014-12-23
|
17 | (System) | Sub state has been changed to AD Followup from Revised ID Needed |
2014-12-23
|
17 | Scott Hollenbeck | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2014-12-23
|
17 | Scott Hollenbeck | New version available: draft-ietf-weirds-rdap-query-17.txt |
2014-12-12
|
16 | Ted Lemon | [Ballot comment] Former DISCUSS Points, left as comments as a reminder to Pete. Quoting Pete: Point 1 - add explanatory text as discussed Point 2 … [Ballot comment] Former DISCUSS Points, left as comments as a reminder to Pete. Quoting Pete: Point 1 - add explanatory text as discussed Point 2 - unpleasant, but can live with it Point 3 - Stop talking about Posix and make it clear that asterisk is the only choice. Point 1: In section 3.1.1, it's not clear which of three alternative things you may have been specifying: (1) the ASCII representation of the IP address is intended to be converted to binary before use, (2) the ASCII representation is intended to be used directly, or (3) whether the IP address is converted to binary prior to use is an implementation choice. If (1) is what's intended, you should say so explicitly. If either (2) or (3) is intended, then the representation that's used needs to be in some canonical form, and the text as written does not ensure that it will be. So to address this discuss, you should either update the text to say that (1) is what's intended, and it won't work otherwise, or you need to require, not suggest, a canonical representation. If you go with the second option, your reference to RFC 5952 isn't adequate: you need to specifically reference section 4, and specifically exclude section 5. I have no preference as to how you resolve this. Point 2: In 3.1.3, the instructions as given don't really guide implementations toward interoperability. Why not just say that servers SHOULD either convert a-labels to u-labels, or u-labels to a-labels, and be done with it? It's not like it's a difficult conversion, and they have to do the conversion to do the comparison, unless for some reason they store both A- and U-labels as keys in their database, which seems really unlikely. The recommendations are written are so vague that I would expect interoperability to only be likely in the case of queries that contain no IDN labels. I wouldn't mind this in an Informational document, but it's pretty sketchy in a standards-track document. It's particularly weird that in one place you say "An RDAP server that receives a query string with a mixture of A-labels and U-labels MAY convert all the U-labels to A-labels, perform IDNA processing, and proceed with exact-match lookup" and then in the next paragraph you say "The server MAY perform the match using either the A-label or U-label form. Using one consistent form for matching every label is likely to be more reliable." I'm not sure how to resolve this. I think there's some underlying decision the working group has made that led to this language, but the lack of consistency I mention above leads me to wonder if either that decision wasn't very clear, or the document failed to reflect it. Interestingly, 3.1.4 is written as if 3.1.3 gives clear guidance as to how IDNs are represented. [point 2', which I forgot to label as a separate point, has been moved moved to a comment] Point 3: In 4.1, you don't actually specify the syntax for partial string matches. I think I can intuit what you mean, but you should be explicit, and you shouldn't suggest using POSIX regex searches unless that's what you really mean; if that's what you really mean, then you need to do a lot more work than you've done. I _think_ what you intend is to simply say that if one or more asterisks appear in a label, then when the search is done, any label that contains the non-asterisk characters in sequence plus zero or more characters in sequence in place of each asterisk would match. But you don't actually say that, so I'm not sure what you actually intended. The text could be read to mean that any arbitrary search mechanism is allowed, but if that's the case then you need to go into a lot more detail about the caveats, such as the '.' character in posix regexps and the start and end markers. The text on partial matches for unicode also seems unnecessarily complicated, and likely not implementable without massive knowledge of all the various unicode character sets, which I would not expect an implementation to bother with. It seems relatively harmless to allow searches on combining characters, particularly since it would be a lot of work to prevent it. For example, a search for *ཀ་ would not find all instances of a syllable that starts with the sound "ka" because ka can be either a head letter or subjoined, but a user might search first using the head letter and then the subjoined letter if (as is not unlikely) he or she were unsure of the correct spelling. It would be a shame if such a search were rendered impossible by an overly-thorough implementation of the current text. As I say, I don't really know what was intended here, so I can't make a definite suggestion as to what the right thing to do is to fix this; I think we just need to discuss it, hence the discuss point. Point A: In 3.1.2: For example, the following URL would be used to find information describing autonomous system number 12 (a number within a range of registered blocks): http://example.com/rdap/autnum/12 The following URL would be used to find information describing 4-byte autonomous system number 65538: http://example.com/rdap/autnum/65538 The examples don't really seem to illustrate what is said in the text. The syntax for both examples is the same, and we don't see any return results. So to say that one example is an example of a number within a range of registered blocks, while the other is a 4-byte number, doesn't make sense because the query formats are identical. The preceding text is clear, if I understand it correctly: a number in the path element following 'autnum' is an autonomous system number, which references a block of one or more numbers. If there are additional semantics, e.g., byte size boundaries for AS numbers, that are also encoded in the query, those should be described explicitly. But IMHO that doesn't make sense: in _this_ context, these are just decimal numbers of arbitrary precision, and how many bytes they are, or whether any particular number references a block or just a single number, is not something that should be mentioned in the examples. Point B: Section 6 appears to be confusing presentation and representation. A client might well present a UI that shows U-labels, but use A-labels on the back end. The text as written here really doesn't make sense. What are you trying to say? I think that you shouldn't confuse what's presented to the user with what's sent on the wire. Possibly this is related to the confusion over A-labels and U-labels that I called out in Point 2 of the discuss. Former discuss points: Point 2' from my initial discuss has been moved here because although I don't know of a mitigation strategy for the privacy concern I raised, I do see the valid use case, and so I don't feel like I have any action item to propose. It would be great if the authors could address this in the security considerations section, but I won't hold them to it. Point 2': In 3.2.1 and 3.2.2, the main use cases I can see for nameserver searches are for spammers to identify related domains, and for eavesdroppers to do the same. What's the motivation for including these capabilities? At a minimum, the privacy considerations for this search ought to be discussed in a privacy considerations section or in the security considerations section. |
2014-12-12
|
16 | Ted Lemon | [Ballot Position Update] Position for Ted Lemon has been changed to No Objection from Discuss |
2014-11-06
|
16 | Tero Kivinen | Closed request for Last Call review by SECDIR with state 'No Response' |
2014-10-30
|
16 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
2014-10-30
|
16 | Alia Atlas | [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas |
2014-10-30
|
16 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2014-10-30
|
16 | Stephen Farrell | [Ballot comment] - Using https schemed URIs in the examples would be better. Mind you, https://example.com does get you a fairly odd certificate, so I … [Ballot comment] - Using https schemed URIs in the examples would be better. Mind you, https://example.com does get you a fairly odd certificate, so I can see why you might push back on that;-) - I think the privacy considerations from the json response draft might be better here. |
2014-10-30
|
16 | Stephen Farrell | [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell |
2014-10-30
|
16 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko |
2014-10-30
|
16 | Joel Jaeggli | [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli |
2014-10-30
|
16 | Richard Barnes | [Ballot comment] "Servers MUST return an HTTP 501 (Not Implemented) [RFC7231] response to inform clients of unsupported queries." Shouldn't this go in -using-http? … [Ballot comment] "Servers MUST return an HTTP 501 (Not Implemented) [RFC7231] response to inform clients of unsupported queries." Shouldn't this go in -using-http? Also, the wording here could use tightening. It seems like you want to use 501 for query *types* that you don't support, vs. 404 for things where you just don't have an answer. So sending a query for "bbc.co.uk" to the ".youtube" server would result in 404, but sending it to the ARIN server might result in 501. |
2014-10-30
|
16 | Richard Barnes | [Ballot Position Update] New position, No Objection, has been recorded for Richard Barnes |
2014-10-29
|
16 | Ted Lemon | [Ballot discuss] Point 1: In section 3.1.1, it's not clear which of three alternative things you may have been specifying: (1) the ASCII representation of … [Ballot discuss] Point 1: In section 3.1.1, it's not clear which of three alternative things you may have been specifying: (1) the ASCII representation of the IP address is intended to be converted to binary before use, (2) the ASCII representation is intended to be used directly, or (3) whether the IP address is converted to binary prior to use is an implementation choice. If (1) is what's intended, you should say so explicitly. If either (2) or (3) is intended, then the representation that's used needs to be in some canonical form, and the text as written does not ensure that it will be. So to address this discuss, you should either update the text to say that (1) is what's intended, and it won't work otherwise, or you need to require, not suggest, a canonical representation. If you go with the second option, your reference to RFC 5952 isn't adequate: you need to specifically reference section 4, and specifically exclude section 5. I have no preference as to how you resolve this. Point 2: In 3.1.3, the instructions as given don't really guide implementations toward interoperability. Why not just say that servers SHOULD either convert a-labels to u-labels, or u-labels to a-labels, and be done with it? It's not like it's a difficult conversion, and they have to do the conversion to do the comparison, unless for some reason they store both A- and U-labels as keys in their database, which seems really unlikely. The recommendations are written are so vague that I would expect interoperability to only be likely in the case of queries that contain no IDN labels. I wouldn't mind this in an Informational document, but it's pretty sketchy in a standards-track document. It's particularly weird that in one place you say "An RDAP server that receives a query string with a mixture of A-labels and U-labels MAY convert all the U-labels to A-labels, perform IDNA processing, and proceed with exact-match lookup" and then in the next paragraph you say "The server MAY perform the match using either the A-label or U-label form. Using one consistent form for matching every label is likely to be more reliable." I'm not sure how to resolve this. I think there's some underlying decision the working group has made that led to this language, but the lack of consistency I mention above leads me to wonder if either that decision wasn't very clear, or the document failed to reflect it. Interestingly, 3.1.4 is written as if 3.1.3 gives clear guidance as to how IDNs are represented. [point 2', which I forgot to label as a separate point, has been moved moved to a comment] Point 3: In 4.1, you don't actually specify the syntax for partial string matches. I think I can intuit what you mean, but you should be explicit, and you shouldn't suggest using POSIX regex searches unless that's what you really mean; if that's what you really mean, then you need to do a lot more work than you've done. I _think_ what you intend is to simply say that if one or more asterisks appear in a label, then when the search is done, any label that contains the non-asterisk characters in sequence plus zero or more characters in sequence in place of each asterisk would match. But you don't actually say that, so I'm not sure what you actually intended. The text could be read to mean that any arbitrary search mechanism is allowed, but if that's the case then you need to go into a lot more detail about the caveats, such as the '.' character in posix regexps and the start and end markers. The text on partial matches for unicode also seems unnecessarily complicated, and likely not implementable without massive knowledge of all the various unicode character sets, which I would not expect an implementation to bother with. It seems relatively harmless to allow searches on combining characters, particularly since it would be a lot of work to prevent it. For example, a search for *ཀ་ would not find all instances of a syllable that starts with the sound "ka" because ka can be either a head letter or subjoined, but a user might search first using the head letter and then the subjoined letter if (as is not unlikely) he or she were unsure of the correct spelling. It would be a shame if such a search were rendered impossible by an overly-thorough implementation of the current text. As I say, I don't really know what was intended here, so I can't make a definite suggestion as to what the right thing to do is to fix this; I think we just need to discuss it, hence the discuss point. |
2014-10-29
|
16 | Ted Lemon | [Ballot comment] Point A: In 3.1.2: For example, the following URL would be used to find information describing autonomous system number 12 (a … [Ballot comment] Point A: In 3.1.2: For example, the following URL would be used to find information describing autonomous system number 12 (a number within a range of registered blocks): http://example.com/rdap/autnum/12 The following URL would be used to find information describing 4-byte autonomous system number 65538: http://example.com/rdap/autnum/65538 The examples don't really seem to illustrate what is said in the text. The syntax for both examples is the same, and we don't see any return results. So to say that one example is an example of a number within a range of registered blocks, while the other is a 4-byte number, doesn't make sense because the query formats are identical. The preceding text is clear, if I understand it correctly: a number in the path element following 'autnum' is an autonomous system number, which references a block of one or more numbers. If there are additional semantics, e.g., byte size boundaries for AS numbers, that are also encoded in the query, those should be described explicitly. But IMHO that doesn't make sense: in _this_ context, these are just decimal numbers of arbitrary precision, and how many bytes they are, or whether any particular number references a block or just a single number, is not something that should be mentioned in the examples. Point B: Section 6 appears to be confusing presentation and representation. A client might well present a UI that shows U-labels, but use A-labels on the back end. The text as written here really doesn't make sense. What are you trying to say? I think that you shouldn't confuse what's presented to the user with what's sent on the wire. Possibly this is related to the confusion over A-labels and U-labels that I called out in Point 2 of the discuss. Former discuss points: Point 2' from my initial discuss has been moved here because although I don't know of a mitigation strategy for the privacy concern I raised, I do see the valid use case, and so I don't feel like I have any action item to propose. It would be great if the authors could address this in the security considerations section, but I won't hold them to it. Point 2': In 3.2.1 and 3.2.2, the main use cases I can see for nameserver searches are for spammers to identify related domains, and for eavesdroppers to do the same. What's the motivation for including these capabilities? At a minimum, the privacy considerations for this search ought to be discussed in a privacy considerations section or in the security considerations section. |
2014-10-29
|
16 | Ted Lemon | Ballot comment and discuss text updated for Ted Lemon |
2014-10-29
|
16 | Ted Lemon | [Ballot discuss] Point 1: In section 3.1.1, it's not clear which of three alternative things you may have been specifying: (1) the ASCII representation of … [Ballot discuss] Point 1: In section 3.1.1, it's not clear which of three alternative things you may have been specifying: (1) the ASCII representation of the IP address is intended to be converted to binary before use, (2) the ASCII representation is intended to be used directly, or (3) whether the IP address is converted to binary prior to use is an implementation choice. If (1) is what's intended, you should say so explicitly. If either (2) or (3) is intended, then the representation that's used needs to be in some canonical form, and the text as written does not ensure that it will be. So to address this discuss, you should either update the text to say that (1) is what's intended, and it won't work otherwise, or you need to require, not suggest, a canonical representation. If you go with the second option, your reference to RFC 5952 isn't adequate: you need to specifically reference section 4, and specifically exclude section 5. I have no preference as to how you resolve this. [point 2 moved to comment] Point 3: In 4.1, you don't actually specify the syntax for partial string matches. I think I can intuit what you mean, but you should be explicit, and you shouldn't suggest using POSIX regex searches unless that's what you really mean; if that's what you really mean, then you need to do a lot more work than you've done. I _think_ what you intend is to simply say that if one or more asterisks appear in a label, then when the search is done, any label that contains the non-asterisk characters in sequence plus zero or more characters in sequence in place of each asterisk would match. But you don't actually say that, so I'm not sure what you actually intended. The text could be read to mean that any arbitrary search mechanism is allowed, but if that's the case then you need to go into a lot more detail about the caveats, such as the '.' character in posix regexps and the start and end markers. The text on partial matches for unicode also seems unnecessarily complicated, and likely not implementable without massive knowledge of all the various unicode character sets, which I would not expect an implementation to bother with. It seems relatively harmless to allow searches on combining characters, particularly since it would be a lot of work to prevent it. For example, a search for *ཀ་ would not find all instances of a syllable that starts with the sound "ka" because ka can be either a head letter or subjoined, but a user might search first using the head letter and then the subjoined letter if (as is not unlikely) he or she were unsure of the correct spelling. It would be a shame if such a search were rendered impossible by an overly-thorough implementation of the current text. As I say, I don't really know what was intended here, so I can't make a definite suggestion as to what the right thing to do is to fix this; I think we just need to discuss it, hence the discuss point. |
2014-10-29
|
16 | Ted Lemon | [Ballot comment] Point A: In 3.1.2: For example, the following URL would be used to find information describing autonomous system number 12 (a … [Ballot comment] Point A: In 3.1.2: For example, the following URL would be used to find information describing autonomous system number 12 (a number within a range of registered blocks): http://example.com/rdap/autnum/12 The following URL would be used to find information describing 4-byte autonomous system number 65538: http://example.com/rdap/autnum/65538 The examples don't really seem to illustrate what is said in the text. The syntax for both examples is the same, and we don't see any return results. So to say that one example is an example of a number within a range of registered blocks, while the other is a 4-byte number, doesn't make sense because the query formats are identical. The preceding text is clear, if I understand it correctly: a number in the path element following 'autnum' is an autonomous system number, which references a block of one or more numbers. If there are additional semantics, e.g., byte size boundaries for AS numbers, that are also encoded in the query, those should be described explicitly. But IMHO that doesn't make sense: in _this_ context, these are just decimal numbers of arbitrary precision, and how many bytes they are, or whether any particular number references a block or just a single number, is not something that should be mentioned in the examples. Point B: Section 6 appears to be confusing presentation and representation. A client might well present a UI that shows U-labels, but use A-labels on the back end. The text as written here really doesn't make sense. What are you trying to say? I think that you shouldn't confuse what's presented to the user with what's sent on the wire. Possibly this is related to the confusion over A-labels and U-labels that I called out in Point 2 of the discuss. Former discuss points: Point 2 from my initial discuss has been moved here because although I don't know of a mitigation strategy for the privacy concern I raised, I do see the valid use case, and so I don't feel like I have any action item to propose. It would be great if the authors could address this in the security considerations section, but I won't hold them to it. Point 2: In 3.1.3, the instructions as given don't really guide implementations toward interoperability. Why not just say that servers SHOULD either convert a-labels to u-labels, or u-labels to a-labels, and be done with it? It's not like it's a difficult conversion, and they have to do the conversion to do the comparison, unless for some reason they store both A- and U-labels as keys in their database, which seems really unlikely. The recommendations are written are so vague that I would expect interoperability to only be likely in the case of queries that contain no IDN labels. I wouldn't mind this in an Informational document, but it's pretty sketchy in a standards-track document. It's particularly weird that in one place you say "An RDAP server that receives a query string with a mixture of A-labels and U-labels MAY convert all the U-labels to A-labels, perform IDNA processing, and proceed with exact-match lookup" and then in the next paragraph you say "The server MAY perform the match using either the A-label or U-label form. Using one consistent form for matching every label is likely to be more reliable." I'm not sure how to resolve this. I think there's some underlying decision the working group has made that led to this language, but the lack of consistency I mention above leads me to wonder if either that decision wasn't very clear, or the document failed to reflect it. Interestingly, 3.1.4 is written as if 3.1.3 gives clear guidance as to how IDNs are represented. In 3.2.1 and 3.2.2, the main use cases I can see for nameserver searches are for spammers to identify related domains, and for eavesdroppers to do the same. What's the motivation for including these capabilities? At a minimum, the privacy considerations for this search ought to be discussed in a privacy considerations section or in the security considerations section. |
2014-10-29
|
16 | Ted Lemon | Ballot comment and discuss text updated for Ted Lemon |
2014-10-29
|
16 | Martin Stiemerling | [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling |
2014-10-29
|
16 | Kathleen Moriarty | [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty |
2014-10-29
|
16 | Ted Lemon | [Ballot discuss] Point 1: In section 3.1.1, it's not clear which of three alternative things you may have been specifying: (1) the ASCII representation of … [Ballot discuss] Point 1: In section 3.1.1, it's not clear which of three alternative things you may have been specifying: (1) the ASCII representation of the IP address is intended to be converted to binary before use, (2) the ASCII representation is intended to be used directly, or (3) whether the IP address is converted to binary prior to use is an implementation choice. If (1) is what's intended, you should say so explicitly. If either (2) or (3) is intended, then the representation that's used needs to be in some canonical form, and the text as written does not ensure that it will be. So to address this discuss, you should either update the text to say that (1) is what's intended, and it won't work otherwise, or you need to require, not suggest, a canonical representation. If you go with the second option, your reference to RFC 5952 isn't adequate: you need to specifically reference section 4, and specifically exclude section 5. I have no preference as to how you resolve this. Point 2: In 3.1.3, the instructions as given don't really guide implementations toward interoperability. Why not just say that servers SHOULD either convert a-labels to u-labels, or u-labels to a-labels, and be done with it? It's not like it's a difficult conversion, and they have to do the conversion to do the comparison, unless for some reason they store both A- and U-labels as keys in their database, which seems really unlikely. The recommendations are written are so vague that I would expect interoperability to only be likely in the case of queries that contain no IDN labels. I wouldn't mind this in an Informational document, but it's pretty sketchy in a standards-track document. It's particularly weird that in one place you say "An RDAP server that receives a query string with a mixture of A-labels and U-labels MAY convert all the U-labels to A-labels, perform IDNA processing, and proceed with exact-match lookup" and then in the next paragraph you say "The server MAY perform the match using either the A-label or U-label form. Using one consistent form for matching every label is likely to be more reliable." I'm not sure how to resolve this. I think there's some underlying decision the working group has made that led to this language, but the lack of consistency I mention above leads me to wonder if either that decision wasn't very clear, or the document failed to reflect it. Interestingly, 3.1.4 is written as if 3.1.3 gives clear guidance as to how IDNs are represented. In 3.2.1 and 3.2.2, the main use cases I can see for nameserver searches are for spammers to identify related domains, and for eavesdroppers to do the same. What's the motivation for including these capabilities? At a minimum, the privacy considerations for this search ought to be discussed in a privacy considerations section or in the security considerations section. Point 3: In 4.1, you don't actually specify the syntax for partial string matches. I think I can intuit what you mean, but you should be explicit, and you shouldn't suggest using POSIX regex searches unless that's what you really mean; if that's what you really mean, then you need to do a lot more work than you've done. I _think_ what you intend is to simply say that if one or more asterisks appear in a label, then when the search is done, any label that contains the non-asterisk characters in sequence plus zero or more characters in sequence in place of each asterisk would match. But you don't actually say that, so I'm not sure what you actually intended. The text could be read to mean that any arbitrary search mechanism is allowed, but if that's the case then you need to go into a lot more detail about the caveats, such as the '.' character in posix regexps and the start and end markers. The text on partial matches for unicode also seems unnecessarily complicated, and likely not implementable without massive knowledge of all the various unicode character sets, which I would not expect an implementation to bother with. It seems relatively harmless to allow searches on combining characters, particularly since it would be a lot of work to prevent it. For example, a search for *ཀ་ would not find all instances of a syllable that starts with the sound "ka" because ka can be either a head letter or subjoined, but a user might search first using the head letter and then the subjoined letter if (as is not unlikely) he or she were unsure of the correct spelling. It would be a shame if such a search were rendered impossible by an overly-thorough implementation of the current text. As I say, I don't really know what was intended here, so I can't make a definite suggestion as to what the right thing to do is to fix this; I think we just need to discuss it, hence the discuss point. |
2014-10-29
|
16 | Ted Lemon | [Ballot comment] Point A: In 3.1.2: For example, the following URL would be used to find information describing autonomous system number 12 (a … [Ballot comment] Point A: In 3.1.2: For example, the following URL would be used to find information describing autonomous system number 12 (a number within a range of registered blocks): http://example.com/rdap/autnum/12 The following URL would be used to find information describing 4-byte autonomous system number 65538: http://example.com/rdap/autnum/65538 The examples don't really seem to illustrate what is said in the text. The syntax for both examples is the same, and we don't see any return results. So to say that one example is an example of a number within a range of registered blocks, while the other is a 4-byte number, doesn't make sense because the query formats are identical. The preceding text is clear, if I understand it correctly: a number in the path element following 'autnum' is an autonomous system number, which references a block of one or more numbers. If there are additional semantics, e.g., byte size boundaries for AS numbers, that are also encoded in the query, those should be described explicitly. But IMHO that doesn't make sense: in _this_ context, these are just decimal numbers of arbitrary precision, and how many bytes they are, or whether any particular number references a block or just a single number, is not something that should be mentioned in the examples. Point B: Section 6 appears to be confusing presentation and representation. A client might well present a UI that shows U-labels, but use A-labels on the back end. The text as written here really doesn't make sense. What are you trying to say? I think that you shouldn't confuse what's presented to the user with what's sent on the wire. Possibly this is related to the confusion over A-labels and U-labels that I called out in Point 2 of the discuss. |
2014-10-29
|
16 | Ted Lemon | [Ballot Position Update] New position, Discuss, has been recorded for Ted Lemon |
2014-10-29
|
16 | Benoît Claise | [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise |
2014-10-28
|
16 | Barry Leiba | [Ballot discuss] -- Section 3.2.1 -- None of the syntaxes begin with "/", and then you have a examples that do. Probably should take the … [Ballot discuss] -- Section 3.2.1 -- None of the syntaxes begin with "/", and then you have a examples that do. Probably should take the "/" off the examples, no? But I see that the json-response document also uses the leading slash. But but, the bootstrapping document says that the URLs MUST end with slashes, because query specifications are appended to them (therefore the query specifications don't begin with slashes). This all seems somewhat inconsistent. |
2014-10-28
|
16 | Barry Leiba | [Ballot comment] -- Section 1.1 -- You have some repetition repetition in the definition of REST. I suggest adding a little to the definition of … [Ballot comment] -- Section 1.1 -- You have some repetition repetition in the definition of REST. I suggest adding a little to the definition of IDNA, to make it clear that it's not just a handy abbreviation, but a pointer to something specific: "Internationalized Domain Names in Applications, a protocol for the handling of IDNs." Also, some of these terms (such as NFC and NFKC) have references where they're used down below. It wouldn't be a bad idea to cite those references up here as well. -- Section 3 -- Queries are formed by retrieving the appropriate base URL from the registry This may seem picayune, but I think it should be "an appropriate base URL", not "the". There may be more than one, and the bootstrap doc says that if one doesn't work, try another. It also doesn't give any guidance on selecting from among multiple https URLs, or multiple http ones. -- Section 3.1.3 -- IDNs SHOULD NOT be represented as a mixture of A-labels and U-labels; that is, all internationalized labels in an IDN SHOULD be either A-labels or U-labels. You think the bit after the "that is" clarifies, but I don't. I suggest that this does: NEW IDNs SHOULD NOT be represented as a mixture of A-labels and U-labels; that is, internationalized labels in an IDN SHOULD be either all A-labels or all U-labels. END -- Section 4.1 -- Partial matching is not feasible across combinations of Unicode characters because Unicode characters can be combined with another Unicode character or characters. Servers SHOULD NOT partially match combinations of Unicode characters where a Unicode character may be legally combined with another Unicode character or characters. It should be noted, though, that it may not always be possible to detect possible cases where a character could have been combined with another character, but was not, because of the way combining characters can be combined with many other characters. I'm not going to try to re-write that myself (don't try this at home!), and I did understand it... but I have to say that it's a truly convoluted paragraph. Please see if you can say this and the subsequent paragraph in a different way without the "combined combining character characters with combined character combinations" feel to it. |
2014-10-28
|
16 | Barry Leiba | [Ballot Position Update] New position, Discuss, has been recorded for Barry Leiba |
2014-10-28
|
16 | Brian Carpenter | Request for Last Call review by GENART Completed: Ready. Reviewer: Brian Carpenter. |
2014-10-28
|
16 | Alissa Cooper | [Ballot discuss] = Section 3.2.3 = If I'm reading the document correctly, when searching for an entity, the search pattern is expected to represent an … [Ballot discuss] = Section 3.2.3 = If I'm reading the document correctly, when searching for an entity, the search pattern is expected to represent an entity using the syntax specified in Section 6.1 of draft-ietf-weirds-json-response. But when the path segment is provided, rather than a search, Section 3.1.5 says this: The parameter represents an entity (such as a contact, registrant, or registrar) identifier whose syntax is specific to the registration provider. For example, for some DNRs contact identifiers are specified in RFC 5730 [RFC5730] and RFC 5733 [RFC5733]. This makes it seem as if an entity in a path segment uses different syntax (actually, non-standard syntax that is up to the registration provider) than an entity that someone might search for. Is there some specific field in the entity definition in draft-ietf-weirds-json-response that is supposed to correspond to? Aren't HTTP GETs for both path segments and searches meant to provide responses based on the same underlying data? If so, I don't understand why there is a specified syntax for entities in one but not the other. This also seems inconsistent with the following text in Section 6.1 of draft-ietf-weirds-json-response: The entity object class appears throughout this document and is an appropriate response for the /entity/XXXX query defined in Registration Data Access Protocol Lookup Format [I-D.ietf-weirds-rdap-query] |
2014-10-28
|
16 | Alissa Cooper | [Ballot comment] = Section 3 = "The query URL is constructed by concatenating the base URL to the help path segment specified in … [Ballot comment] = Section 3 = "The query URL is constructed by concatenating the base URL to the help path segment specified in either Section 3.1.6." The "either" is extraneous, or there is some other section missing at the end of this sentence. = Section 4.2 and Section 8: I think it would be helpful here to point out that the identity/authorization of the searcher may be a relevant factor in determining how broad the response set should be for any particular query (and not just a single static policy that applies to all searchers equally). |
2014-10-28
|
16 | Alissa Cooper | [Ballot Position Update] New position, Discuss, has been recorded for Alissa Cooper |
2014-10-28
|
16 | (System) | IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed |
2014-10-28
|
16 | Brian Haberman | [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman |
2014-10-28
|
16 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel |
2014-10-27
|
16 | Pete Resnick | Ballot has been issued |
2014-10-27
|
16 | Pete Resnick | Ballot writeup was changed |
2014-10-27
|
16 | Pete Resnick | IESG state changed to IESG Evaluation from Waiting for Writeup |
2014-10-27
|
16 | Pete Resnick | Ballot has been issued |
2014-10-27
|
16 | Pete Resnick | [Ballot Position Update] New position, Yes, has been recorded for Pete Resnick |
2014-10-27
|
16 | Pete Resnick | Created "Approve" ballot |
2014-10-27
|
16 | Pete Resnick | Ballot writeup was changed |
2014-10-27
|
16 | Scott Hollenbeck | IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed |
2014-10-27
|
16 | Scott Hollenbeck | New version available: draft-ietf-weirds-rdap-query-16.txt |
2014-10-24
|
15 | Gunter Van de Velde | Request for Last Call review by OPSDIR Completed: Has Nits. Reviewer: Sarah Banks. |
2014-10-24
|
15 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2014-10-23
|
15 | Jean Mahoney | Request for Last Call review by GENART is assigned to Brian Carpenter |
2014-10-23
|
15 | Jean Mahoney | Request for Last Call review by GENART is assigned to Brian Carpenter |
2014-10-22
|
15 | (System) | IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed |
2014-10-22
|
15 | Pearl Liang | IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-weirds-rdap-query-15, which is currently in Last Call, and has the following comments: We understand that, upon approval of this … IESG/Authors/WG Chairs: IANA has reviewed draft-ietf-weirds-rdap-query-15, which is currently in Last Call, and has the following comments: We understand that, upon approval of this document, there are no IANA Actions that need completion. While it is helpful for the IANA Considerations section of the document to remain in place upon publication, if the authors prefer to remove it, IANA doesn't object. If this assessment is not accurate, please respond as soon as possible. |
2014-10-20
|
15 | Brian Carpenter | Request for Last Call review by GENART Completed: Almost Ready. Reviewer: Brian Carpenter. |
2014-10-16
|
15 | Jean Mahoney | Request for Last Call review by GENART is assigned to Brian Carpenter |
2014-10-16
|
15 | Jean Mahoney | Request for Last Call review by GENART is assigned to Brian Carpenter |
2014-10-16
|
15 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Simon Josefsson |
2014-10-16
|
15 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Simon Josefsson |
2014-10-12
|
15 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Sarah Banks |
2014-10-12
|
15 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Sarah Banks |
2014-10-10
|
15 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2014-10-10
|
15 | Cindy Morgan | The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Registration Data Access Protocol Query … The following Last Call announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Registration Data Access Protocol Query Format) to Proposed Standard The IESG has received a request from the Web Extensible Internet Registration Data Service WG (weirds) to consider the following document: - 'Registration Data Access Protocol Query Format' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2014-10-24. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Note that this document refers to draft-ietf-weirds-bootstrap. Last Call for that document is coming soon, but review on this document can be done at this time. Abstract This document describes uniform patterns to construct HTTP URLs that may be used to retrieve registration information from registries (including both Regional Internet Registries (RIRs) and Domain Name Registries (DNRs)) using "RESTful" web access patterns. These uniform patterns define the query syntax for the Registration Data Access Protocol (RDAP). The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-weirds-rdap-query/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-weirds-rdap-query/ballot/ No IPR declarations have been submitted directly on this I-D. |
2014-10-10
|
15 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2014-10-10
|
15 | Pete Resnick | Last call was requested |
2014-10-10
|
15 | Pete Resnick | Ballot approval text was generated |
2014-10-10
|
15 | Pete Resnick | Ballot writeup was generated |
2014-10-10
|
15 | Pete Resnick | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
2014-10-10
|
15 | Pete Resnick | Last call announcement was changed |
2014-10-10
|
15 | Pete Resnick | Last call announcement was generated |
2014-10-10
|
15 | Pete Resnick | Last call announcement was generated |
2014-10-10
|
15 | Pete Resnick | Placed on agenda for telechat - 2014-10-30 |
2014-10-10
|
15 | Pete Resnick | Notification list changed to : weirds-chairs@tools.ietf.org, draft-ietf-weirds-rdap-query@tools.ietf.org, weirds@ietf.org |
2014-10-07
|
15 | Pete Resnick | Ready for Last Call. Waiting on other documents to send them as a set. |
2014-10-07
|
15 | Pete Resnick | IESG state changed to AD Evaluation::AD Followup from AD Evaluation::Point Raised - writeup needed |
2014-10-07
|
15 | Scott Hollenbeck | New version available: draft-ietf-weirds-rdap-query-15.txt |
2014-10-06
|
14 | Pete Resnick | AD Eval sent to WG. They will let me know if they want to do the rev before Last Call. |
2014-10-06
|
14 | Pete Resnick | IESG state changed to AD Evaluation::Point Raised - writeup needed from AD Evaluation |
2014-09-28
|
14 | Pete Resnick | IESG state changed to AD Evaluation from Publication Requested |
2014-09-22
|
14 | Murray Kucherawy | 1. Summary Murray Kucherawy is the document shepherd. Pete Resnick is the responsible Area Director. 2. Review and Consensus This document received a good amount … 1. Summary Murray Kucherawy is the document shepherd. Pete Resnick is the responsible Area Director. 2. Review and Consensus This document received a good amount of the working group's attention throughout the life of the working group, and has also received some commentary from outside the working group. It, along with the bootstrap document and the JSON response document, form the core of the RDAP protocol. Notably, some of the external reviews included people heavily involved in the HTTP community (Mark Nottingham, Julian Reschke, discussing URI design) and lengthy discussion of such things as internationalized domain names (Andrew Sullivan, John Klensin). There has been no formal review requested on those topics, but given the attention it got already, I am not concerned about a need to do so. Security review is pending, though that will happen through the normal course of IETF Last Call via SECDIR, so it has not been explicitly requested. There has been nothing unusual process-wise. No appeals have been threatened. 3. Intellectual Property The authors have affirmed that there are no known outstanding IPR matters with respect to this document. 4. Other Points There are normative downward references to RFC1166 and RFC4290, which do not currently appear in the downref registry. The RFC Editor should be advised that Appendix A is to be removed before publication. |
2014-09-22
|
14 | Murray Kucherawy | State Change Notice email list changed to weirds-chairs@tools.ietf.org, draft-ietf-weirds-rdap-query@tools.ietf.org |
2014-09-22
|
14 | Murray Kucherawy | Responsible AD changed to Pete Resnick |
2014-09-22
|
14 | Murray Kucherawy | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2014-09-22
|
14 | Murray Kucherawy | IESG state changed to Publication Requested |
2014-09-22
|
14 | Murray Kucherawy | IESG process started in state Publication Requested |
2014-09-22
|
14 | Murray Kucherawy | Changed document writeup |
2014-09-22
|
14 | Murray Kucherawy | Changed document writeup |
2014-09-22
|
14 | Murray Kucherawy | IPR affirmations received from all authors. |
2014-09-22
|
14 | Murray Kucherawy | Tag Doc Shepherd Follow-up Underway cleared. |
2014-09-22
|
14 | Murray Kucherawy | Tag Doc Shepherd Follow-up Underway set. |
2014-09-22
|
14 | Murray Kucherawy | IETF WG state changed to WG Consensus: Waiting for Write-Up from Waiting for WG Chair Go-Ahead |
2014-09-22
|
14 | Scott Hollenbeck | New version available: draft-ietf-weirds-rdap-query-14.txt |
2014-09-19
|
13 | Murray Kucherawy | IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call |
2014-09-04
|
13 | Murray Kucherawy | Working Group Last Call ends September 19, 2014. |
2014-09-04
|
13 | Murray Kucherawy | IETF WG state changed to In WG Last Call from WG Document |
2014-09-04
|
13 | Murray Kucherawy | Document shepherd changed to Murray Kucherawy |
2014-08-25
|
13 | Scott Hollenbeck | New version available: draft-ietf-weirds-rdap-query-13.txt |
2014-08-18
|
12 | Scott Hollenbeck | New version available: draft-ietf-weirds-rdap-query-12.txt |
2014-07-30
|
11 | Scott Hollenbeck | New version available: draft-ietf-weirds-rdap-query-11.txt |
2014-07-27
|
10 | Murray Kucherawy | Document shepherd changed to (None) |
2014-03-03
|
10 | Murray Kucherawy | Changed consensus to Yes from Unknown |
2014-03-03
|
10 | Murray Kucherawy | Intended Status changed to Proposed Standard from None |
2014-02-04
|
10 | Scott Hollenbeck | New version available: draft-ietf-weirds-rdap-query-10.txt |
2013-12-19
|
09 | Scott Hollenbeck | New version available: draft-ietf-weirds-rdap-query-09.txt |
2013-11-18
|
08 | Scott Hollenbeck | New version available: draft-ietf-weirds-rdap-query-08.txt |
2013-10-01
|
07 | Scott Hollenbeck | New version available: draft-ietf-weirds-rdap-query-07.txt |
2013-08-16
|
06 | Scott Hollenbeck | New version available: draft-ietf-weirds-rdap-query-06.txt |
2013-08-01
|
05 | Murray Kucherawy | IETF WG state changed to WG Document from Waiting for WG Chair Go-Ahead |
2013-07-15
|
05 | Murray Kucherawy | IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call |
2013-06-25
|
05 | Murray Kucherawy | IETF WG state changed to In WG Last Call from WG Document |
2013-06-12
|
05 | Murray Kucherawy | WGLC ends July 10, 2013. |
2013-06-12
|
05 | Scott Hollenbeck | New version available: draft-ietf-weirds-rdap-query-05.txt |
2013-05-17
|
04 | Murray Kucherawy | Document shepherd changed to Olaf M. Kolkman |
2013-05-16
|
04 | Murray Kucherawy | Document shepherd changed to Murray Kucherawy |
2013-04-01
|
04 | Scott Hollenbeck | New version available: draft-ietf-weirds-rdap-query-04.txt |
2013-03-14
|
03 | Scott Hollenbeck | New version available: draft-ietf-weirds-rdap-query-03.txt |
2012-12-18
|
02 | Scott Hollenbeck | New version available: draft-ietf-weirds-rdap-query-02.txt |
2012-11-26
|
01 | Scott Hollenbeck | New version available: draft-ietf-weirds-rdap-query-01.txt |
2012-09-19
|
00 | Scott Hollenbeck | New version available: draft-ietf-weirds-rdap-query-00.txt |