Skip to main content

Registration Data Access Protocol (RDAP) Query Format
draft-ietf-weirds-rdap-query-18

Revision differences

Document history

Date Rev. By Action
2015-03-03
18 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2015-02-23
18 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2015-02-11
18 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2015-01-04
18 (System) IANA Action state changed to No IC
2015-01-02
18 Cindy Morgan IESG state changed to RFC Ed Queue from Approved-announcement sent
2015-01-02
18 (System) RFC Editor state changed to EDIT
2015-01-02
18 (System) Announcement was received by RFC Editor
2015-01-01
18 Cindy Morgan IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2015-01-01
18 Cindy Morgan IESG has approved the document
2015-01-01
18 Cindy Morgan Closed "Approve" ballot
2015-01-01
18 Cindy Morgan Ballot approval text was generated
2014-12-31
18 Pete Resnick IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::Point Raised - writeup needed
2014-12-29
18 Pete Resnick IESG state changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation::AD Followup
2014-12-23
18 Scott Hollenbeck New version available: draft-ietf-weirds-rdap-query-18.txt
2014-12-23
17 Barry Leiba [Ballot comment]
Version -17 addresses my comments; thanks very much.
2014-12-23
17 Barry Leiba [Ballot Position Update] Position for Barry Leiba has been changed to No Objection from Discuss
2014-12-23
17 Alissa Cooper [Ballot comment]
Thanks for addressing my comments.
2014-12-23
17 Alissa Cooper [Ballot Position Update] Position for Alissa Cooper has been changed to No Objection from Discuss
2014-12-23
17 (System) Sub state has been changed to AD Followup from Revised ID Needed
2014-12-23
17 Scott Hollenbeck IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2014-12-23
17 Scott Hollenbeck New version available: draft-ietf-weirds-rdap-query-17.txt
2014-12-12
16 Ted Lemon
[Ballot comment]
Former DISCUSS Points, left as comments as a reminder to Pete.

Quoting Pete:

Point 1 - add explanatory text as discussed
Point 2 …
[Ballot comment]
Former DISCUSS Points, left as comments as a reminder to Pete.

Quoting Pete:

Point 1 - add explanatory text as discussed
Point 2 - unpleasant, but can live with it
Point 3 - Stop talking about Posix and make it clear that asterisk is the only choice.

Point 1:

In section 3.1.1, it's not clear which of three alternative things you may have been specifying: (1) the ASCII representation of the IP address is intended to be converted to binary before use, (2) the ASCII representation is intended to be used directly, or (3) whether the IP address is converted to binary prior to use is an implementation choice.  If (1) is what's intended, you should say so explicitly.  If either (2) or (3) is intended, then the representation that's used needs to be in some canonical form, and the text as written does not ensure that it will be.

So to address this discuss, you should either update the text to say that (1) is what's intended, and it won't work otherwise, or you need to require, not suggest, a canonical representation.  If you go with the second option, your reference to RFC 5952 isn't adequate: you need to specifically reference section 4, and specifically exclude section 5.  I have no preference as to how you resolve this.

Point 2:

In 3.1.3, the instructions as given don't really guide implementations toward interoperability.  Why not just say that servers SHOULD either convert a-labels to u-labels, or u-labels to a-labels, and be done with it?  It's not like it's a difficult conversion, and they have to do the conversion to do the comparison, unless for some reason they store both A- and U-labels as keys in their database, which seems really unlikely.  The recommendations are written are so vague that I would expect interoperability to only be likely in the case of queries that contain no IDN labels.  I wouldn't mind this in an Informational document, but it's pretty sketchy in a standards-track document.

It's particularly weird that in one place you say "An RDAP server that receives a query string with a mixture of A-labels and U-labels MAY convert all the U-labels to A-labels, perform IDNA processing, and proceed with exact-match lookup" and then in the next paragraph you say "The server MAY perform the match using either the A-label or U-label form.  Using one consistent form for matching every label is likely to be more reliable."

I'm not sure how to resolve this.  I think there's some underlying decision the working group has made that led to this language, but the lack of consistency I mention above leads me to wonder if either that decision wasn't very clear, or the document failed to reflect it.  Interestingly, 3.1.4 is written as if 3.1.3 gives clear guidance as to how IDNs are represented.

[point 2', which I forgot to label as a separate point, has been moved moved to a comment]


Point 3:

In 4.1, you don't actually specify the syntax for partial string matches.  I think I can intuit what you mean, but you should be explicit, and you shouldn't suggest using POSIX regex searches unless that's what you really mean; if that's what you really mean, then you need to do a lot more work than you've done.  I _think_ what you intend is to simply say that if one or more asterisks appear in a label, then when the search is done, any label that contains the non-asterisk characters in sequence plus zero or more characters in sequence in place of each asterisk would match.  But you don't actually say that, so I'm not sure what you actually intended.  The text could be read to mean that any arbitrary search mechanism is allowed, but if that's the case then you need to go into a lot more detail about the caveats, such as the '.' character in posix regexps and the start and end markers.

The text on partial matches for unicode also seems unnecessarily complicated, and likely not implementable without massive knowledge of all the various unicode character sets, which I would not expect an implementation to bother with.  It seems relatively harmless to allow searches on combining characters, particularly since it would be a lot of work to prevent it.  For example, a search for *ཀ་ would not find all instances of a syllable that starts with the sound "ka" because ka can be either a head letter or subjoined, but a user might search first using the head letter and then the subjoined letter if (as is not unlikely) he or she were unsure of the correct spelling.  It would be a shame if such a search were rendered impossible by an overly-thorough implementation of the current text.

As I say, I don't really know what was intended here, so I can't make a definite suggestion as to what the right thing to do is to fix this; I think we just need to discuss it, hence the discuss point.


Point A:

In 3.1.2:

  For example, the following URL would be used to find information
  describing autonomous system number 12 (a number within a range of
  registered blocks):

  http://example.com/rdap/autnum/12

  The following URL would be used to find information describing 4-byte
  autonomous system number 65538:

  http://example.com/rdap/autnum/65538

The examples don't really seem to illustrate what is said in the text.  The syntax for both examples is the same, and we don't see any return results.  So to say that one example is an example of a number within a range of registered blocks, while the other is a 4-byte number, doesn't make sense because the query formats are identical.  The preceding text is clear, if I understand it correctly: a number in the path element following 'autnum' is an autonomous system number, which references a block of one or more numbers.  If there are additional semantics, e.g., byte size boundaries for AS numbers, that are also encoded in the query, those should be described explicitly.  But IMHO that doesn't make sense: in _this_ context, these are just decimal numbers of arbitrary precision, and how many bytes they are, or whether any particular number references a block or just a single number, is not something that should be mentioned in the examples.

Point B:

Section 6 appears to be confusing presentation and representation.  A client might well present a UI that shows U-labels, but use A-labels on the back end.  The text as written here really doesn't make sense.  What are you trying to say?  I think that you shouldn't confuse what's presented to the user with what's sent on the wire.  Possibly this is related to the confusion over A-labels and U-labels that I called out in Point 2 of the discuss.

Former discuss points:

Point 2' from my initial discuss has been moved here because although I don't know of a mitigation strategy for the privacy concern I raised, I do see the valid use case, and so I don't feel like I have any action item to propose.  It would be great if the authors could address this in the security considerations section, but I won't hold them to it.

Point 2':

In 3.2.1 and 3.2.2, the main use cases I can see for nameserver searches are for spammers to identify related domains, and for eavesdroppers to do the same.  What's the motivation for including these capabilities?  At a minimum, the privacy considerations for this search ought to be discussed in a privacy considerations section or in the security considerations section.
2014-12-12
16 Ted Lemon [Ballot Position Update] Position for Ted Lemon has been changed to No Objection from Discuss
2014-11-06
16 Tero Kivinen Closed request for Last Call review by SECDIR with state 'No Response'
2014-10-30
16 Cindy Morgan IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2014-10-30
16 Alia Atlas [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas
2014-10-30
16 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2014-10-30
16 Stephen Farrell
[Ballot comment]

- Using https schemed URIs in the examples would be better.
Mind you, https://example.com does get you a fairly odd
certificate, so I …
[Ballot comment]

- Using https schemed URIs in the examples would be better.
Mind you, https://example.com does get you a fairly odd
certificate, so I can see why you might push back on that;-)

- I think the privacy considerations from the json response
draft might be better here.
2014-10-30
16 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell
2014-10-30
16 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko
2014-10-30
16 Joel Jaeggli [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli
2014-10-30
16 Richard Barnes
[Ballot comment]
"Servers MUST return an HTTP 501 (Not Implemented) [RFC7231] response to inform clients of unsupported queries."

Shouldn't this go in -using-http? …
[Ballot comment]
"Servers MUST return an HTTP 501 (Not Implemented) [RFC7231] response to inform clients of unsupported queries."

Shouldn't this go in -using-http?

Also, the wording here could use tightening.  It seems like you want to use 501 for query *types* that you don't support, vs. 404 for things where you just don't have an answer.  So sending a query for "bbc.co.uk" to the ".youtube" server would result in 404, but sending it to the ARIN server might result in 501.
2014-10-30
16 Richard Barnes [Ballot Position Update] New position, No Objection, has been recorded for Richard Barnes
2014-10-29
16 Ted Lemon
[Ballot discuss]
Point 1:

In section 3.1.1, it's not clear which of three alternative things you may have been specifying: (1) the ASCII representation of …
[Ballot discuss]
Point 1:

In section 3.1.1, it's not clear which of three alternative things you may have been specifying: (1) the ASCII representation of the IP address is intended to be converted to binary before use, (2) the ASCII representation is intended to be used directly, or (3) whether the IP address is converted to binary prior to use is an implementation choice.  If (1) is what's intended, you should say so explicitly.  If either (2) or (3) is intended, then the representation that's used needs to be in some canonical form, and the text as written does not ensure that it will be.

So to address this discuss, you should either update the text to say that (1) is what's intended, and it won't work otherwise, or you need to require, not suggest, a canonical representation.  If you go with the second option, your reference to RFC 5952 isn't adequate: you need to specifically reference section 4, and specifically exclude section 5.  I have no preference as to how you resolve this.

Point 2:

In 3.1.3, the instructions as given don't really guide implementations toward interoperability.  Why not just say that servers SHOULD either convert a-labels to u-labels, or u-labels to a-labels, and be done with it?  It's not like it's a difficult conversion, and they have to do the conversion to do the comparison, unless for some reason they store both A- and U-labels as keys in their database, which seems really unlikely.  The recommendations are written are so vague that I would expect interoperability to only be likely in the case of queries that contain no IDN labels.  I wouldn't mind this in an Informational document, but it's pretty sketchy in a standards-track document.

It's particularly weird that in one place you say "An RDAP server that receives a query string with a mixture of A-labels and U-labels MAY convert all the U-labels to A-labels, perform IDNA processing, and proceed with exact-match lookup" and then in the next paragraph you say "The server MAY perform the match using either the A-label or U-label form.  Using one consistent form for matching every label is likely to be more reliable."

I'm not sure how to resolve this.  I think there's some underlying decision the working group has made that led to this language, but the lack of consistency I mention above leads me to wonder if either that decision wasn't very clear, or the document failed to reflect it.  Interestingly, 3.1.4 is written as if 3.1.3 gives clear guidance as to how IDNs are represented.

[point 2', which I forgot to label as a separate point, has been moved moved to a comment]


Point 3:

In 4.1, you don't actually specify the syntax for partial string matches.  I think I can intuit what you mean, but you should be explicit, and you shouldn't suggest using POSIX regex searches unless that's what you really mean; if that's what you really mean, then you need to do a lot more work than you've done.  I _think_ what you intend is to simply say that if one or more asterisks appear in a label, then when the search is done, any label that contains the non-asterisk characters in sequence plus zero or more characters in sequence in place of each asterisk would match.  But you don't actually say that, so I'm not sure what you actually intended.  The text could be read to mean that any arbitrary search mechanism is allowed, but if that's the case then you need to go into a lot more detail about the caveats, such as the '.' character in posix regexps and the start and end markers.

The text on partial matches for unicode also seems unnecessarily complicated, and likely not implementable without massive knowledge of all the various unicode character sets, which I would not expect an implementation to bother with.  It seems relatively harmless to allow searches on combining characters, particularly since it would be a lot of work to prevent it.  For example, a search for *ཀ་ would not find all instances of a syllable that starts with the sound "ka" because ka can be either a head letter or subjoined, but a user might search first using the head letter and then the subjoined letter if (as is not unlikely) he or she were unsure of the correct spelling.  It would be a shame if such a search were rendered impossible by an overly-thorough implementation of the current text.

As I say, I don't really know what was intended here, so I can't make a definite suggestion as to what the right thing to do is to fix this; I think we just need to discuss it, hence the discuss point.
2014-10-29
16 Ted Lemon
[Ballot comment]
Point A:

In 3.1.2:

  For example, the following URL would be used to find information
  describing autonomous system number 12 (a …
[Ballot comment]
Point A:

In 3.1.2:

  For example, the following URL would be used to find information
  describing autonomous system number 12 (a number within a range of
  registered blocks):

  http://example.com/rdap/autnum/12

  The following URL would be used to find information describing 4-byte
  autonomous system number 65538:

  http://example.com/rdap/autnum/65538

The examples don't really seem to illustrate what is said in the text.  The syntax for both examples is the same, and we don't see any return results.  So to say that one example is an example of a number within a range of registered blocks, while the other is a 4-byte number, doesn't make sense because the query formats are identical.  The preceding text is clear, if I understand it correctly: a number in the path element following 'autnum' is an autonomous system number, which references a block of one or more numbers.  If there are additional semantics, e.g., byte size boundaries for AS numbers, that are also encoded in the query, those should be described explicitly.  But IMHO that doesn't make sense: in _this_ context, these are just decimal numbers of arbitrary precision, and how many bytes they are, or whether any particular number references a block or just a single number, is not something that should be mentioned in the examples.

Point B:

Section 6 appears to be confusing presentation and representation.  A client might well present a UI that shows U-labels, but use A-labels on the back end.  The text as written here really doesn't make sense.  What are you trying to say?  I think that you shouldn't confuse what's presented to the user with what's sent on the wire.  Possibly this is related to the confusion over A-labels and U-labels that I called out in Point 2 of the discuss.

Former discuss points:

Point 2' from my initial discuss has been moved here because although I don't know of a mitigation strategy for the privacy concern I raised, I do see the valid use case, and so I don't feel like I have any action item to propose.  It would be great if the authors could address this in the security considerations section, but I won't hold them to it.

Point 2':

In 3.2.1 and 3.2.2, the main use cases I can see for nameserver searches are for spammers to identify related domains, and for eavesdroppers to do the same.  What's the motivation for including these capabilities?  At a minimum, the privacy considerations for this search ought to be discussed in a privacy considerations section or in the security considerations section.
2014-10-29
16 Ted Lemon Ballot comment and discuss text updated for Ted Lemon
2014-10-29
16 Ted Lemon
[Ballot discuss]
Point 1:

In section 3.1.1, it's not clear which of three alternative things you may have been specifying: (1) the ASCII representation of …
[Ballot discuss]
Point 1:

In section 3.1.1, it's not clear which of three alternative things you may have been specifying: (1) the ASCII representation of the IP address is intended to be converted to binary before use, (2) the ASCII representation is intended to be used directly, or (3) whether the IP address is converted to binary prior to use is an implementation choice.  If (1) is what's intended, you should say so explicitly.  If either (2) or (3) is intended, then the representation that's used needs to be in some canonical form, and the text as written does not ensure that it will be.

So to address this discuss, you should either update the text to say that (1) is what's intended, and it won't work otherwise, or you need to require, not suggest, a canonical representation.  If you go with the second option, your reference to RFC 5952 isn't adequate: you need to specifically reference section 4, and specifically exclude section 5.  I have no preference as to how you resolve this.

[point 2 moved to comment]

Point 3:

In 4.1, you don't actually specify the syntax for partial string matches.  I think I can intuit what you mean, but you should be explicit, and you shouldn't suggest using POSIX regex searches unless that's what you really mean; if that's what you really mean, then you need to do a lot more work than you've done.  I _think_ what you intend is to simply say that if one or more asterisks appear in a label, then when the search is done, any label that contains the non-asterisk characters in sequence plus zero or more characters in sequence in place of each asterisk would match.  But you don't actually say that, so I'm not sure what you actually intended.  The text could be read to mean that any arbitrary search mechanism is allowed, but if that's the case then you need to go into a lot more detail about the caveats, such as the '.' character in posix regexps and the start and end markers.

The text on partial matches for unicode also seems unnecessarily complicated, and likely not implementable without massive knowledge of all the various unicode character sets, which I would not expect an implementation to bother with.  It seems relatively harmless to allow searches on combining characters, particularly since it would be a lot of work to prevent it.  For example, a search for *ཀ་ would not find all instances of a syllable that starts with the sound "ka" because ka can be either a head letter or subjoined, but a user might search first using the head letter and then the subjoined letter if (as is not unlikely) he or she were unsure of the correct spelling.  It would be a shame if such a search were rendered impossible by an overly-thorough implementation of the current text.

As I say, I don't really know what was intended here, so I can't make a definite suggestion as to what the right thing to do is to fix this; I think we just need to discuss it, hence the discuss point.
2014-10-29
16 Ted Lemon
[Ballot comment]
Point A:

In 3.1.2:

  For example, the following URL would be used to find information
  describing autonomous system number 12 (a …
[Ballot comment]
Point A:

In 3.1.2:

  For example, the following URL would be used to find information
  describing autonomous system number 12 (a number within a range of
  registered blocks):

  http://example.com/rdap/autnum/12

  The following URL would be used to find information describing 4-byte
  autonomous system number 65538:

  http://example.com/rdap/autnum/65538

The examples don't really seem to illustrate what is said in the text.  The syntax for both examples is the same, and we don't see any return results.  So to say that one example is an example of a number within a range of registered blocks, while the other is a 4-byte number, doesn't make sense because the query formats are identical.  The preceding text is clear, if I understand it correctly: a number in the path element following 'autnum' is an autonomous system number, which references a block of one or more numbers.  If there are additional semantics, e.g., byte size boundaries for AS numbers, that are also encoded in the query, those should be described explicitly.  But IMHO that doesn't make sense: in _this_ context, these are just decimal numbers of arbitrary precision, and how many bytes they are, or whether any particular number references a block or just a single number, is not something that should be mentioned in the examples.

Point B:

Section 6 appears to be confusing presentation and representation.  A client might well present a UI that shows U-labels, but use A-labels on the back end.  The text as written here really doesn't make sense.  What are you trying to say?  I think that you shouldn't confuse what's presented to the user with what's sent on the wire.  Possibly this is related to the confusion over A-labels and U-labels that I called out in Point 2 of the discuss.

Former discuss points:

Point 2 from my initial discuss has been moved here because although I don't know of a mitigation strategy for the privacy concern I raised, I do see the valid use case, and so I don't feel like I have any action item to propose.  It would be great if the authors could address this in the security considerations section, but I won't hold them to it.

Point 2:

In 3.1.3, the instructions as given don't really guide implementations toward interoperability.  Why not just say that servers SHOULD either convert a-labels to u-labels, or u-labels to a-labels, and be done with it?  It's not like it's a difficult conversion, and they have to do the conversion to do the comparison, unless for some reason they store both A- and U-labels as keys in their database, which seems really unlikely.  The recommendations are written are so vague that I would expect interoperability to only be likely in the case of queries that contain no IDN labels.  I wouldn't mind this in an Informational document, but it's pretty sketchy in a standards-track document.

It's particularly weird that in one place you say "An RDAP server that receives a query string with a mixture of A-labels and U-labels MAY convert all the U-labels to A-labels, perform IDNA processing, and proceed with exact-match lookup" and then in the next paragraph you say "The server MAY perform the match using either the A-label or U-label form.  Using one consistent form for matching every label is likely to be more reliable."

I'm not sure how to resolve this.  I think there's some underlying decision the working group has made that led to this language, but the lack of consistency I mention above leads me to wonder if either that decision wasn't very clear, or the document failed to reflect it.  Interestingly, 3.1.4 is written as if 3.1.3 gives clear guidance as to how IDNs are represented.

In 3.2.1 and 3.2.2, the main use cases I can see for nameserver searches are for spammers to identify related domains, and for eavesdroppers to do the same.  What's the motivation for including these capabilities?  At a minimum, the privacy considerations for this search ought to be discussed in a privacy considerations section or in the security considerations section.
2014-10-29
16 Ted Lemon Ballot comment and discuss text updated for Ted Lemon
2014-10-29
16 Martin Stiemerling [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling
2014-10-29
16 Kathleen Moriarty [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty
2014-10-29
16 Ted Lemon
[Ballot discuss]
Point 1:

In section 3.1.1, it's not clear which of three alternative things you may have been specifying: (1) the ASCII representation of …
[Ballot discuss]
Point 1:

In section 3.1.1, it's not clear which of three alternative things you may have been specifying: (1) the ASCII representation of the IP address is intended to be converted to binary before use, (2) the ASCII representation is intended to be used directly, or (3) whether the IP address is converted to binary prior to use is an implementation choice.  If (1) is what's intended, you should say so explicitly.  If either (2) or (3) is intended, then the representation that's used needs to be in some canonical form, and the text as written does not ensure that it will be.

So to address this discuss, you should either update the text to say that (1) is what's intended, and it won't work otherwise, or you need to require, not suggest, a canonical representation.  If you go with the second option, your reference to RFC 5952 isn't adequate: you need to specifically reference section 4, and specifically exclude section 5.  I have no preference as to how you resolve this.

Point 2:

In 3.1.3, the instructions as given don't really guide implementations toward interoperability.  Why not just say that servers SHOULD either convert a-labels to u-labels, or u-labels to a-labels, and be done with it?  It's not like it's a difficult conversion, and they have to do the conversion to do the comparison, unless for some reason they store both A- and U-labels as keys in their database, which seems really unlikely.  The recommendations are written are so vague that I would expect interoperability to only be likely in the case of queries that contain no IDN labels.  I wouldn't mind this in an Informational document, but it's pretty sketchy in a standards-track document.

It's particularly weird that in one place you say "An RDAP server that receives a query string with a mixture of A-labels and U-labels MAY convert all the U-labels to A-labels, perform IDNA processing, and proceed with exact-match lookup" and then in the next paragraph you say "The server MAY perform the match using either the A-label or U-label form.  Using one consistent form for matching every label is likely to be more reliable."

I'm not sure how to resolve this.  I think there's some underlying decision the working group has made that led to this language, but the lack of consistency I mention above leads me to wonder if either that decision wasn't very clear, or the document failed to reflect it.  Interestingly, 3.1.4 is written as if 3.1.3 gives clear guidance as to how IDNs are represented.

In 3.2.1 and 3.2.2, the main use cases I can see for nameserver searches are for spammers to identify related domains, and for eavesdroppers to do the same.  What's the motivation for including these capabilities?  At a minimum, the privacy considerations for this search ought to be discussed in a privacy considerations section or in the security considerations section.

Point 3:

In 4.1, you don't actually specify the syntax for partial string matches.  I think I can intuit what you mean, but you should be explicit, and you shouldn't suggest using POSIX regex searches unless that's what you really mean; if that's what you really mean, then you need to do a lot more work than you've done.  I _think_ what you intend is to simply say that if one or more asterisks appear in a label, then when the search is done, any label that contains the non-asterisk characters in sequence plus zero or more characters in sequence in place of each asterisk would match.  But you don't actually say that, so I'm not sure what you actually intended.  The text could be read to mean that any arbitrary search mechanism is allowed, but if that's the case then you need to go into a lot more detail about the caveats, such as the '.' character in posix regexps and the start and end markers.

The text on partial matches for unicode also seems unnecessarily complicated, and likely not implementable without massive knowledge of all the various unicode character sets, which I would not expect an implementation to bother with.  It seems relatively harmless to allow searches on combining characters, particularly since it would be a lot of work to prevent it.  For example, a search for *ཀ་ would not find all instances of a syllable that starts with the sound "ka" because ka can be either a head letter or subjoined, but a user might search first using the head letter and then the subjoined letter if (as is not unlikely) he or she were unsure of the correct spelling.  It would be a shame if such a search were rendered impossible by an overly-thorough implementation of the current text.

As I say, I don't really know what was intended here, so I can't make a definite suggestion as to what the right thing to do is to fix this; I think we just need to discuss it, hence the discuss point.
2014-10-29
16 Ted Lemon
[Ballot comment]
Point A:

In 3.1.2:

  For example, the following URL would be used to find information
  describing autonomous system number 12 (a …
[Ballot comment]
Point A:

In 3.1.2:

  For example, the following URL would be used to find information
  describing autonomous system number 12 (a number within a range of
  registered blocks):

  http://example.com/rdap/autnum/12

  The following URL would be used to find information describing 4-byte
  autonomous system number 65538:

  http://example.com/rdap/autnum/65538

The examples don't really seem to illustrate what is said in the text.  The syntax for both examples is the same, and we don't see any return results.  So to say that one example is an example of a number within a range of registered blocks, while the other is a 4-byte number, doesn't make sense because the query formats are identical.  The preceding text is clear, if I understand it correctly: a number in the path element following 'autnum' is an autonomous system number, which references a block of one or more numbers.  If there are additional semantics, e.g., byte size boundaries for AS numbers, that are also encoded in the query, those should be described explicitly.  But IMHO that doesn't make sense: in _this_ context, these are just decimal numbers of arbitrary precision, and how many bytes they are, or whether any particular number references a block or just a single number, is not something that should be mentioned in the examples.

Point B:

Section 6 appears to be confusing presentation and representation.  A client might well present a UI that shows U-labels, but use A-labels on the back end.  The text as written here really doesn't make sense.  What are you trying to say?  I think that you shouldn't confuse what's presented to the user with what's sent on the wire.  Possibly this is related to the confusion over A-labels and U-labels that I called out in Point 2 of the discuss.
2014-10-29
16 Ted Lemon [Ballot Position Update] New position, Discuss, has been recorded for Ted Lemon
2014-10-29
16 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2014-10-28
16 Barry Leiba
[Ballot discuss]
-- Section 3.2.1 --
None of the syntaxes begin with "/", and then you have a examples that do.  Probably should take the …
[Ballot discuss]
-- Section 3.2.1 --
None of the syntaxes begin with "/", and then you have a examples that do.  Probably should take the "/" off the examples, no?  But I see that the json-response document also uses the leading slash.  But but, the bootstrapping document says that the URLs MUST end with slashes, because query specifications are appended to them (therefore the query specifications don't begin with slashes).  This all seems somewhat inconsistent.
2014-10-28
16 Barry Leiba
[Ballot comment]
-- Section 1.1 --
You have some repetition repetition in the definition of REST.

I suggest adding a little to the definition of …
[Ballot comment]
-- Section 1.1 --
You have some repetition repetition in the definition of REST.

I suggest adding a little to the definition of IDNA, to make it clear that it's not just a handy abbreviation, but a pointer to something specific: "Internationalized Domain Names in Applications, a protocol for the handling of IDNs."

Also, some of these terms (such as NFC and NFKC) have references where they're used down below.  It wouldn't be a bad idea to cite those references up here as well.

-- Section 3 --

  Queries are
  formed by retrieving the appropriate base URL from the registry

This may seem picayune, but I think it should be "an appropriate base URL", not "the".  There may be more than one, and the bootstrap doc says that if one doesn't work, try another.  It also doesn't give any guidance on selecting from among multiple https URLs, or multiple http ones.

-- Section 3.1.3 --

  IDNs SHOULD NOT be represented as a mixture of A-labels and U-labels;
  that is, all internationalized labels in an IDN SHOULD be either
  A-labels or U-labels.

You think the bit after the "that is" clarifies, but I don't.  I suggest that this does:
NEW
  IDNs SHOULD NOT be represented as a mixture of A-labels and U-labels;
  that is, internationalized labels in an IDN SHOULD be either all
  A-labels or all U-labels.
END

-- Section 4.1 --

  Partial matching is not feasible across combinations of Unicode
  characters because Unicode characters can be combined with another
  Unicode character or characters.  Servers SHOULD NOT partially match
  combinations of Unicode characters where a Unicode character may be
  legally combined with another Unicode character or characters.  It
  should be noted, though, that it may not always be possible to detect
  possible cases where a character could have been combined with
  another character, but was not, because of the way combining
  characters can be combined with many other characters.

I'm not going to try to re-write that myself (don't try this at home!), and I did understand it... but I have to say that it's a truly convoluted paragraph.  Please see if you can say this and the subsequent paragraph in a different way without the "combined combining character characters with combined character combinations" feel to it.
2014-10-28
16 Barry Leiba [Ballot Position Update] New position, Discuss, has been recorded for Barry Leiba
2014-10-28
16 Brian Carpenter Request for Last Call review by GENART Completed: Ready. Reviewer: Brian Carpenter.
2014-10-28
16 Alissa Cooper
[Ballot discuss]
= Section 3.2.3 =
If I'm reading the document correctly, when searching for an entity, the search pattern is expected to represent an …
[Ballot discuss]
= Section 3.2.3 =
If I'm reading the document correctly, when searching for an entity, the search pattern is expected to represent an entity using the syntax specified in Section 6.1 of draft-ietf-weirds-json-response. But when the path segment is provided, rather than a search, Section 3.1.5 says this:

  The  parameter represents an entity (such as a contact,
  registrant, or registrar) identifier whose syntax is specific to the
  registration provider.  For example, for some DNRs contact
  identifiers are specified in RFC 5730 [RFC5730] and RFC 5733
  [RFC5733].

This makes it seem as if an entity in a path segment uses different syntax (actually, non-standard syntax that is up to the registration provider) than an entity that someone might search for. Is there some specific field in the entity definition in draft-ietf-weirds-json-response that  is supposed to correspond to? Aren't HTTP GETs for both path segments and searches meant to provide responses based on the same underlying data? If so, I don't understand why there is a specified syntax for entities in one but not the other. This also seems inconsistent with the following text in Section 6.1 of draft-ietf-weirds-json-response:

  The entity object class appears throughout this document and is an
  appropriate response for the /entity/XXXX query defined in
  Registration Data Access Protocol Lookup Format
  [I-D.ietf-weirds-rdap-query]
2014-10-28
16 Alissa Cooper
[Ballot comment]
= Section 3 =
"The query URL is
  constructed by concatenating the base URL to the help path segment
  specified in …
[Ballot comment]
= Section 3 =
"The query URL is
  constructed by concatenating the base URL to the help path segment
  specified in either Section 3.1.6."

The "either" is extraneous, or there is some other section missing at the end of this sentence.

= Section 4.2 and Section 8:
I think it would be helpful here to point out that the identity/authorization of the searcher may be a relevant factor in determining how broad the response set should be for any particular query (and not just a single static policy that applies to all searchers equally).
2014-10-28
16 Alissa Cooper [Ballot Position Update] New position, Discuss, has been recorded for Alissa Cooper
2014-10-28
16 (System) IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2014-10-28
16 Brian Haberman [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman
2014-10-28
16 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel
2014-10-27
16 Pete Resnick Ballot has been issued
2014-10-27
16 Pete Resnick Ballot writeup was changed
2014-10-27
16 Pete Resnick IESG state changed to IESG Evaluation from Waiting for Writeup
2014-10-27
16 Pete Resnick Ballot has been issued
2014-10-27
16 Pete Resnick [Ballot Position Update] New position, Yes, has been recorded for Pete Resnick
2014-10-27
16 Pete Resnick Created "Approve" ballot
2014-10-27
16 Pete Resnick Ballot writeup was changed
2014-10-27
16 Scott Hollenbeck IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2014-10-27
16 Scott Hollenbeck New version available: draft-ietf-weirds-rdap-query-16.txt
2014-10-24
15 Gunter Van de Velde Request for Last Call review by OPSDIR Completed: Has Nits. Reviewer: Sarah Banks.
2014-10-24
15 (System) IESG state changed to Waiting for Writeup from In Last Call
2014-10-23
15 Jean Mahoney Request for Last Call review by GENART is assigned to Brian Carpenter
2014-10-23
15 Jean Mahoney Request for Last Call review by GENART is assigned to Brian Carpenter
2014-10-22
15 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2014-10-22
15 Pearl Liang
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-weirds-rdap-query-15, which is currently in Last Call, and has the following comments:

We understand that, upon approval of this …
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-weirds-rdap-query-15, which is currently in Last Call, and has the following comments:

We understand that, upon approval of this document, there are no IANA Actions that need completion.

While it is helpful for the IANA Considerations section of the document to remain in place upon publication, if the authors prefer to remove it, IANA doesn't object.

If this assessment is not accurate, please respond as soon as possible.
2014-10-20
15 Brian Carpenter Request for Last Call review by GENART Completed: Almost Ready. Reviewer: Brian Carpenter.
2014-10-16
15 Jean Mahoney Request for Last Call review by GENART is assigned to Brian Carpenter
2014-10-16
15 Jean Mahoney Request for Last Call review by GENART is assigned to Brian Carpenter
2014-10-16
15 Tero Kivinen Request for Last Call review by SECDIR is assigned to Simon Josefsson
2014-10-16
15 Tero Kivinen Request for Last Call review by SECDIR is assigned to Simon Josefsson
2014-10-12
15 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Sarah Banks
2014-10-12
15 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Sarah Banks
2014-10-10
15 Cindy Morgan IANA Review state changed to IANA - Review Needed
2014-10-10
15 Cindy Morgan
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (Registration Data Access Protocol Query …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (Registration Data Access Protocol Query Format) to Proposed Standard


The IESG has received a request from the Web Extensible Internet
Registration Data Service WG (weirds) to consider the following document:
- 'Registration Data Access Protocol Query Format'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2014-10-24. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Note that this document refers to draft-ietf-weirds-bootstrap. Last Call
for that document is coming soon, but review on this document can
be done at this time.

Abstract


  This document describes uniform patterns to construct HTTP URLs that
  may be used to retrieve registration information from registries
  (including both Regional Internet Registries (RIRs) and Domain Name
  Registries (DNRs)) using "RESTful" web access patterns.  These
  uniform patterns define the query syntax for the Registration Data
  Access Protocol (RDAP).




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-weirds-rdap-query/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-weirds-rdap-query/ballot/


No IPR declarations have been submitted directly on this I-D.


2014-10-10
15 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2014-10-10
15 Pete Resnick Last call was requested
2014-10-10
15 Pete Resnick Ballot approval text was generated
2014-10-10
15 Pete Resnick Ballot writeup was generated
2014-10-10
15 Pete Resnick IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2014-10-10
15 Pete Resnick Last call announcement was changed
2014-10-10
15 Pete Resnick Last call announcement was generated
2014-10-10
15 Pete Resnick Last call announcement was generated
2014-10-10
15 Pete Resnick Placed on agenda for telechat - 2014-10-30
2014-10-10
15 Pete Resnick Notification list changed to : weirds-chairs@tools.ietf.org, draft-ietf-weirds-rdap-query@tools.ietf.org, weirds@ietf.org
2014-10-07
15 Pete Resnick Ready for Last Call. Waiting on other documents to send them as a set.
2014-10-07
15 Pete Resnick IESG state changed to AD Evaluation::AD Followup from AD Evaluation::Point Raised - writeup needed
2014-10-07
15 Scott Hollenbeck New version available: draft-ietf-weirds-rdap-query-15.txt
2014-10-06
14 Pete Resnick AD Eval sent to WG. They will let me know if they want to do the rev before Last Call.
2014-10-06
14 Pete Resnick IESG state changed to AD Evaluation::Point Raised - writeup needed from AD Evaluation
2014-09-28
14 Pete Resnick IESG state changed to AD Evaluation from Publication Requested
2014-09-22
14 Murray Kucherawy
1. Summary

Murray Kucherawy is the document shepherd.
Pete Resnick is the responsible Area Director.

2. Review and Consensus

This document received a good amount …
1. Summary

Murray Kucherawy is the document shepherd.
Pete Resnick is the responsible Area Director.

2. Review and Consensus

This document received a good amount of the working group's attention throughout the life of the working group, and has also received some commentary from outside the working group.

It, along with the bootstrap document and the JSON response document, form the core of the RDAP protocol.  Notably, some of the external reviews included people heavily involved in the HTTP community (Mark Nottingham, Julian Reschke, discussing URI design) and lengthy discussion of such things as internationalized domain names (Andrew Sullivan, John Klensin).  There has been no formal review requested on those topics, but given the attention it got already, I am not concerned about a need to do so.

Security review is pending, though that will happen through the normal course of IETF Last Call via SECDIR, so it has not been explicitly requested.

There has been nothing unusual process-wise.  No appeals have been threatened.

3. Intellectual Property

The authors have affirmed that there are no known outstanding IPR matters with respect to this document.

4. Other Points

There are normative downward references to RFC1166 and RFC4290, which do not currently appear in the downref registry.

The RFC Editor should be advised that Appendix A is to be removed before publication.
2014-09-22
14 Murray Kucherawy State Change Notice email list changed to weirds-chairs@tools.ietf.org, draft-ietf-weirds-rdap-query@tools.ietf.org
2014-09-22
14 Murray Kucherawy Responsible AD changed to Pete Resnick
2014-09-22
14 Murray Kucherawy IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2014-09-22
14 Murray Kucherawy IESG state changed to Publication Requested
2014-09-22
14 Murray Kucherawy IESG process started in state Publication Requested
2014-09-22
14 Murray Kucherawy Changed document writeup
2014-09-22
14 Murray Kucherawy Changed document writeup
2014-09-22
14 Murray Kucherawy IPR affirmations received from all authors.
2014-09-22
14 Murray Kucherawy Tag Doc Shepherd Follow-up Underway cleared.
2014-09-22
14 Murray Kucherawy Tag Doc Shepherd Follow-up Underway set.
2014-09-22
14 Murray Kucherawy IETF WG state changed to WG Consensus: Waiting for Write-Up from Waiting for WG Chair Go-Ahead
2014-09-22
14 Scott Hollenbeck New version available: draft-ietf-weirds-rdap-query-14.txt
2014-09-19
13 Murray Kucherawy IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call
2014-09-04
13 Murray Kucherawy Working Group Last Call ends September 19, 2014.
2014-09-04
13 Murray Kucherawy IETF WG state changed to In WG Last Call from WG Document
2014-09-04
13 Murray Kucherawy Document shepherd changed to Murray Kucherawy
2014-08-25
13 Scott Hollenbeck New version available: draft-ietf-weirds-rdap-query-13.txt
2014-08-18
12 Scott Hollenbeck New version available: draft-ietf-weirds-rdap-query-12.txt
2014-07-30
11 Scott Hollenbeck New version available: draft-ietf-weirds-rdap-query-11.txt
2014-07-27
10 Murray Kucherawy Document shepherd changed to (None)
2014-03-03
10 Murray Kucherawy Changed consensus to Yes from Unknown
2014-03-03
10 Murray Kucherawy Intended Status changed to Proposed Standard from None
2014-02-04
10 Scott Hollenbeck New version available: draft-ietf-weirds-rdap-query-10.txt
2013-12-19
09 Scott Hollenbeck New version available: draft-ietf-weirds-rdap-query-09.txt
2013-11-18
08 Scott Hollenbeck New version available: draft-ietf-weirds-rdap-query-08.txt
2013-10-01
07 Scott Hollenbeck New version available: draft-ietf-weirds-rdap-query-07.txt
2013-08-16
06 Scott Hollenbeck New version available: draft-ietf-weirds-rdap-query-06.txt
2013-08-01
05 Murray Kucherawy IETF WG state changed to WG Document from Waiting for WG Chair Go-Ahead
2013-07-15
05 Murray Kucherawy IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call
2013-06-25
05 Murray Kucherawy IETF WG state changed to In WG Last Call from WG Document
2013-06-12
05 Murray Kucherawy WGLC ends July 10, 2013.
2013-06-12
05 Scott Hollenbeck New version available: draft-ietf-weirds-rdap-query-05.txt
2013-05-17
04 Murray Kucherawy Document shepherd changed to Olaf M. Kolkman
2013-05-16
04 Murray Kucherawy Document shepherd changed to Murray Kucherawy
2013-04-01
04 Scott Hollenbeck New version available: draft-ietf-weirds-rdap-query-04.txt
2013-03-14
03 Scott Hollenbeck New version available: draft-ietf-weirds-rdap-query-03.txt
2012-12-18
02 Scott Hollenbeck New version available: draft-ietf-weirds-rdap-query-02.txt
2012-11-26
01 Scott Hollenbeck New version available: draft-ietf-weirds-rdap-query-01.txt
2012-09-19
00 Scott Hollenbeck New version available: draft-ietf-weirds-rdap-query-00.txt