Skip to main content

HTTP Usage in the Registration Data Access Protocol (RDAP)
draft-ietf-weirds-using-http-15

Revision differences

Document history

Date Rev. By Action
2015-03-03
15 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2015-02-23
15 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2015-02-11
15 (System) RFC Editor state changed to RFC-EDITOR from REF
2015-01-30
15 (System) RFC Editor state changed to REF from AUTH
2015-01-30
15 (System) RFC Editor state changed to AUTH from RFC-EDITOR
2015-01-30
15 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2015-01-12
15 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2015-01-12
15 (System) IANA Action state changed to Waiting on RFC Editor from Waiting on Authors
2015-01-12
15 (System) IANA Action state changed to Waiting on Authors
2015-01-02
15 Cindy Morgan IESG state changed to RFC Ed Queue from Approved-announcement sent
2015-01-02
15 (System) RFC Editor state changed to EDIT
2015-01-02
15 (System) Announcement was received by RFC Editor
2015-01-01
15 Cindy Morgan IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2015-01-01
15 Cindy Morgan IESG has approved the document
2015-01-01
15 Cindy Morgan Closed "Approve" ballot
2015-01-01
15 Cindy Morgan Ballot approval text was generated
2014-12-29
15 Pete Resnick IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2014-12-01
15 Alissa Cooper
[Ballot comment]
Thanks for addressing my DISCUSS.

I am curious if someone went through this doc to make sure everything it says is consistent with …
[Ballot comment]
Thanks for addressing my DISCUSS.

I am curious if someone went through this doc to make sure everything it says is consistent with the change to MUST use TLS in rdap-sec.
2014-12-01
15 Alissa Cooper [Ballot Position Update] Position for Alissa Cooper has been changed to No Objection from Discuss
2014-11-28
15 Jean Mahoney Closed request for Last Call review by GENART with state 'No Response'
2014-11-19
15 Andy Newton IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2014-11-19
15 Andy Newton New version available: draft-ietf-weirds-using-http-15.txt
2014-11-11
14 Gunter Van de Velde Closed request for Last Call review by OPSDIR with state 'No Response'
2014-10-30
14 Cindy Morgan IESG state changed to IESG Evaluation::AD Followup from IESG Evaluation
2014-10-30
14 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2014-10-30
14 Stephen Farrell
[Ballot comment]

- As I said on the sec draft, I see no reason why RDAP could
not only be defined for use with https …
[Ballot comment]

- As I said on the sec draft, I see no reason why RDAP could
not only be defined for use with https URIs.

- 5.5 seems to conflict a bit with one of the notices defined
in the json-response draft where you say to do the same thing
in the payload. I don't think it's a big problem but could be
better to say which to use when.

- I'm also not sure the CORS thing is quite right if cookies
might get sent to the wrong places.
2014-10-30
14 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell
2014-10-30
14 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko
2014-10-30
14 Kathleen Moriarty [Ballot comment]
It looks like the SecDir review was considered when provided last year, thanks.
http://www.ietf.org/mail-archive/web/secdir/current/msg04151.html
2014-10-30
14 Kathleen Moriarty [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty
2014-10-29
14 Richard Barnes [Ballot comment]
Might be worth noting in Section 3 that this protocol should be forward compatible with HTTP/2.0.
2014-10-29
14 Richard Barnes [Ballot Position Update] New position, No Objection, has been recorded for Richard Barnes
2014-10-29
14 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK
2014-10-29
14 Ted Lemon [Ballot Position Update] New position, No Objection, has been recorded for Ted Lemon
2014-10-29
14 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2014-10-29
14 Martin Stiemerling [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling
2014-10-28
14 Barry Leiba
[Ballot comment]
-- Section 1 --

  2.  A client issues an HTTP (or HTTPS) query using GET [RFC7231].  As
      …
[Ballot comment]
-- Section 1 --

  2.  A client issues an HTTP (or HTTPS) query using GET [RFC7231].  As
      an example, a query for the network registration 192.0.2.0 might
      be

          http://example.com/rdap/ip/192.0.2.0

A small point, but, strictly speaking, that is not a query: it's a query URL.  The query is the full HTTP GET protocol.  So either put in the HTTP query, or make it "As an example, a query URL for...".  (The rdap-query document actually is careful to call them URLs every time.)

Another small point: in bullet 4 you expand the abbreviation "URL".  Good, but you've used "URL" twice, earlier in the document.  You should expand it the first time it's used.

-- Section 2 --
Yet another small point: I see that someone asked you to expand "SSAC".  Cool, but that now screams out for noting that it's a committee of ICANN (which then raises the question of whether ICANN should be expanded).  I'm going to duck and cover now, and just let you do what you think best here.

-- Section 3 --

  First, each query is meant to require only one path of execution to
  obtain an answer.  A response may contain an answer, no answer, or a
  redirect, and clients are not expected to fork multiple paths of
  execution to satisfy a query.

Do clients "satisfy" queries?  I thought that clients make them, and servers satisfy them.

-- Section 5.2 --

  For example, if the client sends

      http://serv1.example.com/weirds/domain/example.com

Again: strictly speaking, the client doesn't "send" that.  You could say, "if the client uses".

-- Section 5.3 --

  Clients
  MAY retry the query based on the respective response code.

What you probably want to say here is

NEW
  A client
  MAY retry the query if that is appropriate for the
  respective response code.
END

-- Section 9.1 --
Thank you!  It's always been my contention that IRIs are not part of wire protocol, and should never be sent around as IRIs.
2014-10-28
14 Barry Leiba [Ballot Position Update] New position, No Objection, has been recorded for Barry Leiba
2014-10-28
14 Alissa Cooper
[Ballot discuss]
= Section 5.6 =
"When responding to queries, it is RECOMMENDED that servers use the
  Access-Control-Allow-Origin header field, as specified by
  …
[Ballot discuss]
= Section 5.6 =
"When responding to queries, it is RECOMMENDED that servers use the
  Access-Control-Allow-Origin header field, as specified by
  [W3C.CR-cors-20130129].  As the use of RDAP is for public resources,
  a value of "*" is suitable for most cases."

What is the use case for cross-site RDAP queries?

Also, I am confused by the claim in the second sentence. The message that I got from draft-ietf-weirds-rdap-sec and draft-ietf-weirds-json-response is that one of the motivations for using HTTP for RDAP was that its authentication features could be leveraged to provide tiered access to data on the server, such that some of the data would not be public but would be restricted to specific users (from draft-ietf-weirds-json-response, Appendix A.1: "In many use cases, it is necessary to hide or obscure the information of a registrant or contact due to policy or other operational matters."). So it seems like if cross-site requests are justified at all, there should be some text here explaining when that might be the case and when not.
2014-10-28
14 Alissa Cooper [Ballot Position Update] New position, Discuss, has been recorded for Alissa Cooper
2014-10-28
14 Brian Haberman [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman
2014-10-28
14 Pete Resnick [Ballot Position Update] New position, Yes, has been recorded for Pete Resnick
2014-10-28
14 Pete Resnick IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead
2014-10-28
14 Naveen Khan New revision available
2014-10-27
13 Alia Atlas [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas
2014-10-26
13 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel
2014-10-26
13 Joel Jaeggli [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli
2014-10-24
13 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2014-10-21
13 (System) IANA Review state changed to IANA - Not OK from Version Changed - Review Needed
2014-10-21
13 Amanda Baber
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-weirds-using-http-13.  Please report any inaccuracies and respond to any questions as soon as possible.

IANA's reviewer has the following comments/questions: …
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-weirds-using-http-13.  Please report any inaccuracies and respond to any questions as soon as possible.

IANA's reviewer has the following comments/questions:

QUESTION: Should we create this registry at a new URL? If so, would "Registration Data Access Protocol (RDAP)" be an appropriate title for the webpage, and for a new category at http://www.iana.org/protocols?

IANA understands that there is a single action that is required to be completed upon approval of this document.

IANA will create a registry called "RDAP Extensions."  The new registry is to be managed via Specification Required, as defined in RFC 5226.

IANA understands that there are no initial registrations in the new registry. The authors have requested that the registry consist of the following information:

Extension Identifier     
Registry Operator             
Reference         
Contact     
Intended Usage

IANA understands that the creation of this new registry is the only action required upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed.
2014-10-16
13 Jean Mahoney Request for Last Call review by GENART is assigned to Joel Halpern
2014-10-16
13 Jean Mahoney Request for Last Call review by GENART is assigned to Joel Halpern
2014-10-12
13 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Melinda Shore
2014-10-12
13 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Melinda Shore
2014-10-10
13 Cindy Morgan Created "Approve" ballot
2014-10-10
13 Cindy Morgan Closed "Approve" ballot
2014-10-10
13 Cindy Morgan
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (HTTP usage in the Registration …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (HTTP usage in the Registration Data Access Protocol (RDAP)) to Proposed Standard


The IESG has received a request from the Web Extensible Internet
Registration Data Service WG (weirds) to consider the following document:
- 'HTTP usage in the Registration Data Access Protocol (RDAP)'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2014-10-24. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Note that this is a second Last Call. During its initial IESG Evaluation,
the IESG had several issues to address. This document has addressed
those issues.

Note also that this document refers to draft-ietf-weirds-bootstrap. Last Call
for that document is coming soon, but review on this document can
be done at this time.

Abstract


  This document is one of a collection that together describe the
  Registration Data Access Protocol (RDAP).  It describes how RDAP is
  transported using the Hypertext Transfer Protocol (HTTP).  RDAP is a
  successor protocol to the very old WHOIS protocol.  The purpose of
  this document is to clarify the use of standard HTTP mechanisms for
  this application.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-weirds-using-http/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-weirds-using-http/ballot/


No IPR declarations have been submitted directly on this I-D.

2014-10-10
13 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2014-10-10
13 Pete Resnick Last call announcement was changed
2014-10-10
13 Pete Resnick Last call was requested
2014-10-10
13 Pete Resnick IESG state changed to Last Call Requested from AD Evaluation::AD Followup
2014-10-10
13 Pete Resnick Last call announcement was changed
2014-10-10
13 Pete Resnick Last call announcement was generated
2014-10-10
13 Pete Resnick Note field has been cleared
2014-10-10
13 Pete Resnick Telechat date has been changed to 2014-10-30 from 2013-08-15
2014-10-10
13 Pete Resnick Notification list changed to : weirds-chairs@tools.ietf.org, draft-ietf-weirds-using-http@tools.ietf.org, weirds@ietf.org
2014-10-10
13 Pete Resnick Ready for Last Call
2014-10-07
13 (System) Sub state has been changed to AD Followup from Revised ID Needed
2014-10-07
13 Andy Newton New version available: draft-ietf-weirds-using-http-13.txt
2014-10-06
12 Pete Resnick IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation
2014-09-28
12 Pete Resnick IESG state changed to AD Evaluation from Publication Requested
2014-09-24
12 Murray Kucherawy
[This document has been through the IESG once before.  It is being resubmitted
since the IESG asked to review this document once the entire document …
[This document has been through the IESG once before.  It is being resubmitted
since the IESG asked to review this document once the entire document set was
ready.  Olaf Kolkman was the previous document shepherd, and used the old writeup rather than the new one.  I have made only minor edits.  -MSK]

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)? Why is
this the proper type of RFC? Is this type of RFC indicated in the
title page header?

This intended to be Standards Track RFC, it is the normative
specification on how to use a Registration Data Access Protocol on top
of HTTP, hence Standards Track.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary:

  This document describes the usage of HTTP for Registration Data
  Directory Services.  The goal of this document is to tie together
  usage patterns of HTTP into a common profile applicable to the
  various types of Directory Services serving Registration Data using
  RESTful practices.  By giving the various Directory Services common
  behavior, a single client is better able to retrieve data from
  Directory Services adhering to this behavior.

Working Group Summary:

During the development of the working group there has been a good
amount of review by multiple WG participants. There are no issues
remaining on the rough side of consensus and the document as a whole is
well carried by consensus.

This document is not contentious, but in the spirit of putting all
cards on the table: there is one point where it touches on an issue
that seems to be potentially create more discussion in the future and
that is the encapsulation format of the reply. The working is clearly
going for JSON although there are some that argue that XML might be
better suited for some deployments. This specification does allow,
just like the charter, a possibility for alternative reply
encapsulations. In other words, I do not see any problems for this
document.


Document Quality:

During the previous IETF there has been a demo of four or more implementations.
There have been explicit statements by others that they believe the
RFC is of sufficient detail to implement against. There is no
indication this document under-specifies any aspects.

There has not been a MIB, Media Type, DNS, or Security expert review
(at least not with those explicit hats).

Personnel:

Chairs: Murray Kucherawy and Olaf Kolkman
Shepherd: Murray Kucherawy
AD: Pete Resnick

(3) Briefly describe the review of this document that was performed by
the Document Shepherd. If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

Olaf Kolkman reviewed version 03, 04 and 05 in detail. (The shepherd review
for 04 concluded that a few fixes where needed before submission.)

Murray Kucherawy did a detailed review of -11, resulting in -12.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

No.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

The document has an internationalization section (section 9). I know
that some of the folk in the working group have a background in
Internationalization issues and have reviewed the document. That said
the document identifies the issues only to be addressed in future
document that specify the rules for replies.

I am not an HTTP expert myself but I do not think that the
specification touched areas that are beyond the HTTP knowledge within
the working group.

(6) Describe any specific concerns or issues that the Document
Shepherd has with this document that the Responsible Area Director
and/or the IESG should be aware of? For example, perhaps he or she is
uncomfortable with certain parts of the document, or has concerns
whether there really is a need for it. In any event, if the WG has
discussed those issues and has indicated that it still wishes to
advance the document, detail those concerns here.

There are no specific concerns.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP
78
and BCP 79 have already been filed. If not, explain why?

I have contacted all authors and they confirmed that there were no
disclosures that needed to be filed.

(8) Has an IPR disclosure been filed that references this document? If
so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

No IPR disclosures.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

The WG Consensus is solid and carried by the whole group.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarize the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

I have not heard discontent about this document.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See http://www.ietf.org/tools/idnits/ and the
Internet-Drafts Checklist). Boilerplate checks are not enough; this
check needs to be thorough.

ID nits reports a downref. See further below.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

The specification registers the "application/rdap+json" media type.
(section 8.2)

Review of the media type has been performed through the
media-types@iana.org list.

(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready
for advancement or are otherwise in an unclear state? If such
normative references exist, what is the plan for their completion?

This document refers to other WEIRDS documents.  We expect they will be
processed as a cluster.

(15) Are there downward normative references references (see RFC
3967
)? If so, list these downward references to support the Area
Director in the Last Call procedure.

[RFC6839] is a downward reference.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are
not listed in the Abstract and Introduction, explain why, and point to
the part of the document where the relationship of this document to
the other RFCs is discussed. If this information is not in the
document, explain why the WG considers it unnecessary.

No, this document will neither obsolete nor update other documents.

(17) Describe the Document Shepherd's review of the IANA
considerations section, especially with regard to its consistency with
the body of the document. Confirm that all protocol extensions that
the document makes are associated with the appropriate reservations in
IANA registries. Confirm that any referenced IANA registries have been
clearly identified. Confirm that newly created IANA registries include
a detailed specification of the initial contents for the registry,
that allocations procedures for future registrations are defined, and
a reasonable name for the new registry has been suggested (see RFC
5226
).

Consistency with Body: Confirm
Consistency extensions/Registries: Confirm (in 8.2)
Detailed spec for new registries: Confirm (in 8.1)
Procedure for future registration: Confirm (in 8.1)
Reasonable name: Confirm

(18) List any new IANA registries that require Expert Review for
future allocations. Provide any public guidance that the IESG would
find useful in selecting the IANA Experts for these new registries.

There are no such registries. Only 'Specification Required'.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

There is one trivial ABNF specification in the document. It has been
checked using http://www.anfdata.cz/bnfparser2/

          ---------------RESULT---------------
          name = ALPHA *( ALPHA / DIGIT / "_" )

          [1] passed
2014-09-24
12 Murray Kucherawy IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2014-09-24
12 Murray Kucherawy IESG state changed to Publication Requested from AD is watching
2014-09-24
12 Murray Kucherawy
[This document has been through the IESG once before.  It is being resubmitted
since the IESG asked to review this document once the entire document …
[This document has been through the IESG once before.  It is being resubmitted
since the IESG asked to review this document once the entire document set was
ready.  Olaf Kolkman was the previous document shepherd, and used the old writeup rather than the new one.  I have made only minor edits.  -MSK]

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)? Why is
this the proper type of RFC? Is this type of RFC indicated in the
title page header?

This intended to be Standards Track RFC, it is the normative
specification on how to use a Registration Data Access Protocol on top
of HTTP, hence Standards Track.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary:

  This document describes the usage of HTTP for Registration Data
  Directory Services.  The goal of this document is to tie together
  usage patterns of HTTP into a common profile applicable to the
  various types of Directory Services serving Registration Data using
  RESTful practices.  By giving the various Directory Services common
  behavior, a single client is better able to retrieve data from
  Directory Services adhering to this behavior.

Working Group Summary:

During the development of the working group there has been a good
amount of review by multiple WG participants. There are no issues
remaining on the rough side of consensus and the document as a whole is
well carried by consensus.

This document is not contentious, but in the spirit of putting all
cards on the table: there is one point where it touches on an issue
that seems to be potentially create more discussion in the future and
that is the encapsulation format of the reply. The working is clearly
going for JSON although there are some that argue that XML might be
better suited for some deployments. This specification does allow,
just like the charter, a possibility for alternative reply
encapsulations. In other words, I do not see any problems for this
document.


Document Quality:

During the previous IETF there has been a demo of four or more implementations.
There have been explicit statements by others that they believe the
RFC is of sufficient detail to implement against. There is no
indication this document under-specifies any aspects.

There has not been a MIB, Media Type, DNS, or Security expert review
(at least not with those explicit hats).

Personnel:

Chairs: Murray Kucherawy and Olaf Kolkman
Shepherd: Murray Kucherawy
AD: Pete Resnick

(3) Briefly describe the review of this document that was performed by
the Document Shepherd. If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

Olaf Kolkman reviewed version 03, 04 and 05 in detail. (The shepherd review
for 04 concluded that a few fixes where needed before submission.)

Murray Kucherawy did a detailed review of -11, resulting in -12.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

No.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

The document has an internationalization section (section 9). I know
that some of the folk in the working group have a background in
Internationalization issues and have reviewed the document. That said
the document identifies the issues only to be addressed in future
document that specify the rules for replies.

I am not an HTTP expert myself but I do not think that the
specification touched areas that are beyond the HTTP knowledge within
the working group.

(6) Describe any specific concerns or issues that the Document
Shepherd has with this document that the Responsible Area Director
and/or the IESG should be aware of? For example, perhaps he or she is
uncomfortable with certain parts of the document, or has concerns
whether there really is a need for it. In any event, if the WG has
discussed those issues and has indicated that it still wishes to
advance the document, detail those concerns here.

There are no specific concerns.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP
78
and BCP 79 have already been filed. If not, explain why?

I have contacted all authors and they confirmed that there were no
disclosures that needed to be filed.

(8) Has an IPR disclosure been filed that references this document? If
so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

No IPR disclosures.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

The WG Consensus is solid and carried by the whole group.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarize the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

I have not heard discontent about this document.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See http://www.ietf.org/tools/idnits/ and the
Internet-Drafts Checklist). Boilerplate checks are not enough; this
check needs to be thorough.

ID nits reports a downref. See further below.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

The specification registers the "application/rdap+json" media type.
(section 8.2)

Review of the media type has been performed through the
media-types@iana.org list.

(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready
for advancement or are otherwise in an unclear state? If such
normative references exist, what is the plan for their completion?

This document refers to other WEIRDS documents.  We expect they will be
processed as a cluster.

(15) Are there downward normative references references (see RFC
3967
)? If so, list these downward references to support the Area
Director in the Last Call procedure.

[RFC6839] is a downward reference.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are
not listed in the Abstract and Introduction, explain why, and point to
the part of the document where the relationship of this document to
the other RFCs is discussed. If this information is not in the
document, explain why the WG considers it unnecessary.

No, this document will neither obsolete nor update other documents.

(17) Describe the Document Shepherd's review of the IANA
considerations section, especially with regard to its consistency with
the body of the document. Confirm that all protocol extensions that
the document makes are associated with the appropriate reservations in
IANA registries. Confirm that any referenced IANA registries have been
clearly identified. Confirm that newly created IANA registries include
a detailed specification of the initial contents for the registry,
that allocations procedures for future registrations are defined, and
a reasonable name for the new registry has been suggested (see RFC
5226
).

Consistency with Body: Confirm
Consistency extensions/Registries: Confirm (in 8.2)
Detailed spec for new registries: Confirm (in 8.1)
Procedure for future registration: Confirm (in 8.1)
Reasonable name: Confirm

(18) List any new IANA registries that require Expert Review for
future allocations. Provide any public guidance that the IESG would
find useful in selecting the IANA Experts for these new registries.

There are no such registries. Only 'Specification Required'.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

There is one trivial ABNF specification in the document. It has been
checked using http://www.anfdata.cz/bnfparser2/

          ---------------RESULT---------------
          name = ALPHA *( ALPHA / DIGIT / "_" )

          [1] passed
2014-09-24
12 Murray Kucherawy
[This document has been through the IESG once before.  It is being resubmitted
since the IESG asked to review this document once the entire document …
[This document has been through the IESG once before.  It is being resubmitted
since the IESG asked to review this document once the entire document set was
ready.  Olaf Kolkman was the previous document shepherd, and used the old writeup rather than the new one.  I have made only minor edits.  -MSK]

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)? Why is
this the proper type of RFC? Is this type of RFC indicated in the
title page header?

This intended to be Standards Track RFC, it is the normative
specification on how to use a Registration Data Access Protocol on top
of HTTP, hence Standards Track.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary:

  This document describes the usage of HTTP for Registration Data
  Directory Services.  The goal of this document is to tie together
  usage patterns of HTTP into a common profile applicable to the
  various types of Directory Services serving Registration Data using
  RESTful practices.  By giving the various Directory Services common
  behavior, a single client is better able to retrieve data from
  Directory Services adhering to this behavior.

Working Group Summary:

During the development of the working group there has been a good
amount of review by multiple WG participants. There are no issues
remaining on the rough side of consensus and the document as a whole is
well carried by consensus.

This document is not contentious, but in the spirit of putting all
cards on the table: there is one point where it touches on an issue
that seems to be potentially create more discussion in the future and
that is the encapsulation format of the reply. The working is clearly
going for JSON although there are some that argue that XML might be
better suited for some deployments. This specification does allow,
just like the charter, a possibility for alternative reply
encapsulations. In other words, I do not see any problems for this
document.


Document Quality:

During the previous IETF there has been a demo of four or more implementations.
There have been explicit statements by others that they believe the
RFC is of sufficient detail to implement against. There is no
indication this document under-specifies any aspects.

There has not been a MIB, Media Type, DNS, or Security expert review
(at least not with those explicit hats).

Personnel:

Chairs: Murray Kucherawy and Olaf Kolkman
Shepherd: Murray Kucherawy
AD: Pete Resnick

(3) Briefly describe the review of this document that was performed by
the Document Shepherd. If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

Olaf Kolkman reviewed version 03, 04 and 05 in detail. (The shepherd review
for 04 concluded that a few fixes where needed before submission.)

Murray Kucherawy did a detailed review of -11, resulting in -12.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

No.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

The document has an internationalization section (section 9). I know
that some of the folk in the working group have a background in
Internationalization issues and have reviewed the document. That said
the document identifies the issues only to be addressed in future
document that specify the rules for replies.

I am not an HTTP expert myself but I do not think that the
specification touched areas that are beyond the HTTP knowledge within
the working group.

(6) Describe any specific concerns or issues that the Document
Shepherd has with this document that the Responsible Area Director
and/or the IESG should be aware of? For example, perhaps he or she is
uncomfortable with certain parts of the document, or has concerns
whether there really is a need for it. In any event, if the WG has
discussed those issues and has indicated that it still wishes to
advance the document, detail those concerns here.

There are no specific concerns.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP
78
and BCP 79 have already been filed. If not, explain why?

I have contacted all authors and they confirmed that there were no
disclosures that needed to be filed.

(8) Has an IPR disclosure been filed that references this document? If
so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

No IPR disclosures.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

The WG Consensus is solid and carried by the whole group.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarize the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

I have not heard discontent about this document.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See http://www.ietf.org/tools/idnits/ and the
Internet-Drafts Checklist). Boilerplate checks are not enough; this
check needs to be thorough.

ID nits reports a downref. See further below.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

The specification registers the "application/rdap+json" media type.
(section 8.2)

Review of the media type has been performed through the
media-types@iana.org list.

(13) Have all references within this document been identified as
either normative or informative?

Yes.

(14) Are there normative references to documents that are not ready
for advancement or are otherwise in an unclear state? If such
normative references exist, what is the plan for their completion?

This document refers to other WEIRDS documents.  We expect they will be
processed as a cluster.

(15) Are there downward normative references references (see RFC
3967
)? If so, list these downward references to support the Area
Director in the Last Call procedure.

[RFC6839] is a downward reference.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are
not listed in the Abstract and Introduction, explain why, and point to
the part of the document where the relationship of this document to
the other RFCs is discussed. If this information is not in the
document, explain why the WG considers it unnecessary.

No, this document will neither obsolete nor update other documents.

(17) Describe the Document Shepherd's review of the IANA
considerations section, especially with regard to its consistency with
the body of the document. Confirm that all protocol extensions that
the document makes are associated with the appropriate reservations in
IANA registries. Confirm that any referenced IANA registries have been
clearly identified. Confirm that newly created IANA registries include
a detailed specification of the initial contents for the registry,
that allocations procedures for future registrations are defined, and
a reasonable name for the new registry has been suggested (see RFC
5226
).

Consitency with Body: Confirm
Consistency extentions/Registries: Confirm (in 8.2)
Detailed spec for new registries: Confirm (in 8.1)
Procedure for future registration: Confirm (in 8.1)
Reasonable name: Confifm

(18) List any new IANA registries that require Expert Review for
future allocations. Provide any public guidance that the IESG would
find useful in selecting the IANA Experts for these new registries.

There are no such registries. Only 'Specification Required'.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

There is one trivial ABNF specification in the document. It has been
checked using http://www.anfdata.cz/bnfparser2/

          ---------------RESULT---------------
          name = ALPHA *( ALPHA / DIGIT / "_" )

          [1] passed
2014-09-24
12 Murray Kucherawy Tag Revised I-D Needed - Issue raised by WGLC cleared.
2014-09-24
12 Murray Kucherawy IETF WG state changed to WG Consensus: Waiting for Write-Up from Waiting for WG Chair Go-Ahead
2014-09-24
12 Andy Newton New version available: draft-ietf-weirds-using-http-12.txt
2014-09-22
11 Murray Kucherawy Tag Revised I-D Needed - Issue raised by WGLC set.
2014-09-19
11 Murray Kucherawy IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call
2014-09-04
11 Murray Kucherawy Working Group Last Call ends September 19, 2014.
2014-09-04
11 Murray Kucherawy IETF WG state changed to In WG Last Call from WG Document
2014-09-04
11 Murray Kucherawy Document shepherd changed to Murray Kucherawy
2014-09-04
11 Murray Kucherawy IETF WG state changed to WG Document from Waiting for WG Chair Go-Ahead
2014-09-04
11 Andy Newton New version available: draft-ietf-weirds-using-http-11.txt
2014-08-22
10 Andy Newton New version available: draft-ietf-weirds-using-http-10.txt
2014-08-07
09 Andy Newton New version available: draft-ietf-weirds-using-http-09.txt
2014-02-04
08 Pete Resnick IESG state changed to AD is watching from Dead
2014-02-04
08 Andy Newton IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2014-02-04
08 Andy Newton New version available: draft-ietf-weirds-using-http-08.txt
2014-01-31
07 (System) Document has expired
2014-01-31
07 (System) State changed to I-D Exists (IESG: Dead) from AD is watching
2014-01-30
07 Murray Kucherawy Changed consensus to Yes from Unknown
2014-01-30
07 Murray Kucherawy IETF WG state changed to Waiting for WG Chair Go-Ahead from Submitted to IESG for Publication
2014-01-30
07 Pete Resnick This was really sent back to the WG, awaiting other documents. Fixing status to make that clear.
2014-01-30
07 Pete Resnick State changed to AD is watching from Waiting for AD Go-Ahead
2013-09-23
07 Pete Resnick
IESG comments on this indicated that it would be better to wait until other WEIRDS documents before making the final call on this. Will put …
IESG comments on this indicated that it would be better to wait until other WEIRDS documents before making the final call on this. Will put it back on the telechat at a later date.
2013-09-23
07 Pete Resnick State changed to Waiting for AD Go-Ahead from IESG Evaluation::Revised I-D Needed
2013-08-16
07 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Sandra Murphy.
2013-08-15
07 Cindy Morgan State changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation
2013-08-15
07 Barry Leiba
[Ballot discuss]
I am satisfied with the response about the 404 status code, so I'm removing that from my DISCUSS position.

1. This point still …
[Ballot discuss]
I am satisfied with the response about the 404 status code, so I'm removing that from my DISCUSS position.

1. This point still has no response:

The registration of the application/rdap+json media type was removed in version -07, presumably to move it to the json-response document (which makes sense).  But there are examples here in Appendix A that still use that media type, with no definition in sight.  I'm not happy with that.

I would be happy with an informative reference to the document where that media type is defined, and, of course, and update to that draft, including it (the latest posted version, json-response-04, predates this change).  (An informative reference is OK, I think, because this is in an example.)

2. And discussion has highlighted that there's a serious issue with *not* having a normative reference from this document to the rdap-query document.  I can't see how it's possible for this document to make any sense at all and to have any use at all without rdap-query, and I don't see how we can reasonably evaluate this piece of the solution without understanding that piece along with it.
2013-08-15
07 Barry Leiba Ballot comment and discuss text updated for Barry Leiba
2013-08-15
07 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK
2013-08-14
07 Ted Lemon
[Ballot discuss]
This document doesn't talk about security, which sort of makes sense considering the other weirds document we're reviewing in the same telechat.  However, …
[Ballot discuss]
This document doesn't talk about security, which sort of makes sense considering the other weirds document we're reviewing in the same telechat.  However, I am concerned that there is a gap between the two documents that leaves open the possibility of password leakage.

Suppose I go to an RDAP server wanting some information that is confidential, and requires authentication.  Further suppose my request is to an http URL, not an https URL.

Presumably the RDAP server would tell me I need to authenticate, by sending an HTTP 401 response.  Suppose basic authentication is being used.  The server must first redirect me to an https server, which _then_ would send the 401 response.  If the response to the http query is 401, the client may send the password over the network in the clear, since this is allowed by the HTTP protocol.

In practice, I would expect that anything that needs to be authenticated is going to have to go over TLS anyway, so this should be straightforward to specify.

Possible responses to clear this DISCUSS would be (a) to point out that I am an idiot and this isn't a problem because I don't understand HTTP authentication properly (I know only enough to be dangerous, so this is a real possibility); (b) to argue that this needs to be fixed but should be addressed in the weirds-rdap-sec document and not in this document, or (c) to add some text to this document specifying how this should be done.  Currently neither document explicitly discusses the 401 response code.
2013-08-14
07 Ted Lemon Ballot discuss text updated for Ted Lemon
2013-08-14
07 Ted Lemon
[Ballot discuss]
This document doesn't talk about security, which sort of makes sense considering the other weirds document we're reviewing in the same telechat.  However, …
[Ballot discuss]
This document doesn't talk about security, which sort of makes sense considering the other weirds document we're reviewing in the same telechat.  However, I am concerned that there is a gap between the two documents that leaves open the possibility of key leakage.

Suppose I go to an RDAP server wanting some information that is confidential, and requires authentication.  Further suppose my request is to an http URL, not an https URL.

Presumably the RDAP server would tell me I need to authenticate, by sending an HTTP 401 response.  Suppose basic authentication is being used.  The server must first redirect me to an https server, which _then_ would send the 401 response.  If the response to the http query is 401, the client may send the password over the network in the clear, since this is allowed by the HTTP protocol.

In practice, I would expect that anything that needs to be authenticated is going to have to go over TLS anyway, so this should be straightforward to specify.

Possible responses to clear this DISCUSS would be (a) to point out that I am an idiot and this isn't a problem because I don't understand HTTP authentication properly (I know only enough to be dangerous, so this is a real possibility); (b) to argue that this needs to be fixed but should be addressed in the weirds-rdap-sec document and not in this document, or (c) to add some text to this document specifying how this should be done.  Currently neither document explicitly discusses the 401 response code.
2013-08-14
07 Ted Lemon [Ballot Position Update] New position, Discuss, has been recorded for Ted Lemon
2013-08-14
07 Richard Barnes
[Ballot comment]
(1) It seems like Section 4.1 could be made bit tighter.  There's not really a reason for clients not to send the specific …
[Ballot comment]
(1) It seems like Section 4.1 could be made bit tighter.  There's not really a reason for clients not to send the specific RDAP JSON type in their Accept header.  So you could say that clients must send the RDAP-specific type (when requesting RDAP JSON); servers MAY accept others (e.g., application/json).

(2) In Section 5.2, do you want to recommend that the targets of redirects conform to the query syntax?  If not, it might be helpful to warn implementations that redirect targets might not have the standard query format.

(3) In Section 5.6, it would be helpful to provide some guidance on how the Access-Control-Allow-Origin header should be set.  It seems like most RDAP servers are going to be public resources, so the value "*" would be appropriate, at least as an example.

(4) The Security Considerations should point to draft-ietf-weirds-rdap-sec, since that provides the security mechanism for RDAP
2013-08-14
07 Richard Barnes [Ballot Position Update] New position, Yes, has been recorded for Richard Barnes
2013-08-14
07 Sean Turner
[Ballot discuss]
updated ...

On .well-known point raised by Stephen ....  when EST came through the authors were told  by the appsdir reviewer that:

IETF …
[Ballot discuss]
updated ...

On .well-known point raised by Stephen ....  when EST came through the authors were told  by the appsdir reviewer that:

IETF standards should not define URIs or patterns of URIs, because servers may wish to provide other services (implying the possibility of collision), or deploy resources in an alternate way, for implementation or operational reasons.

This is a fundamental concept in the Web architecture; see .

Possible remedies include:

1) Specifying a "home document" format that links (in the RFC5988 sense) to the various resources as appropriate.
2) Specifying a well-known URI to root the interaction. Note that this is suboptimal; while it avoids collisions, it does not allow alternate deployments, or multiple deployments on the same host.

Why doesn't the same recommendation apply here?
2013-08-14
07 Sean Turner [Ballot Position Update] Position for Sean Turner has been changed to Discuss from No Objection
2013-08-14
07 Sean Turner [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss
2013-08-14
07 Sean Turner
[Ballot discuss]
I am not an international character set expert ...

This draft references RFC 3986 and RFC 3987 which in turn point to RFC …
[Ballot discuss]
I am not an international character set expert ...

This draft references RFC 3986 and RFC 3987 which in turn point to RFC 3490 (IDNA 2003) - what if anything needs to be said about RFC 5981 (IDNA 2008) (obsoletes RFC 3490)?
2013-08-14
07 Sean Turner
[Ballot comment]
Just checking but does a policy reason include unauthorized access?  draft-ietf-weirds-rdap-sec talks about anonymous access as well as authenticated access so I just …
[Ballot comment]
Just checking but does a policy reason include unauthorized access?  draft-ietf-weirds-rdap-sec talks about anonymous access as well as authenticated access so I just want to make sure that's covered in all the Ifs in s1.

please expand: SSAC
2013-08-14
07 Sean Turner [Ballot Position Update] New position, Discuss, has been recorded for Sean Turner
2013-08-14
07 Stephen Farrell
[Ballot comment]
- The abstract and 1st two sentences (particularly the
2nd which I just don't get) of the intro are pretty
thoroughly confusing. I …
[Ballot comment]
- The abstract and 1st two sentences (particularly the
2nd which I just don't get) of the intro are pretty
thoroughly confusing. I was so puzzled that I read the
abstracts of all 6 wg drafts and they are uniformly
uninformative. That doesn't seem like a useful feature
for abstracts. Sorry to be negative but its quite easy to
slip into "we all know what this is about" mode, and
forget that most readers will not have been active wg
participants, which may be the case here. I think
putting a bit of effort into improving the abstracts of the
weirds drafts would be a fine thing to do generally.
(The 2nd para of the intro however is just fine and does
tell me weirds is about.)

- intro: I wondered why you're not using ".well-known/ip"
in the first example but yet you don't say that a client
has to known the base URL from which to start.  How is a
client supposed to know to use a path of "/ip/192.0.2.0"
or "/weirds/ip/192.0.2.0"?

- Section 2: "Described in other documents" seems to
scream for references.

- 5.6: I don't get why CORS is needed here? Can you
explain? (Not sure if that needs to be in the doc, but
its not obvious to me.)

- section 7: Are there any security properties that ought
be checked in the event of a 3xx response? For example,
if https is used for the initial query, should it also be
used for the subsequent one? 

- overall: I was left wondering if this would not have
been better as a part of some other document with more
normative text, but I guess as long as the full set of
RFCs do the job that's ok.
2013-08-14
07 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell
2013-08-13
07 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel
2013-08-12
07 Joel Jaeggli [Ballot comment]
I read the apsdir/review comments with interest, I have  no  serious objections.
2013-08-12
07 Joel Jaeggli [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli
2013-08-12
07 Barry Leiba
[Ballot discuss]
Two small points, which shouldn't hold things up much:

1. Larry Masinter's AppsDir review notes an issue with using the HTTP 404 status …
[Ballot discuss]
Two small points, which shouldn't hold things up much:

1. Larry Masinter's AppsDir review notes an issue with using the HTTP 404 status code.  404 is meant to say that the URL you're asking for doesn't exist (or the server isn't willing to disclose that it exists).  The question is whether there's a useful distinction in RDAP between "you're querying about something that doesn't exist" and "you're querying about something that exists, but there's no information available about it."  If not, then 404 might be OK (it's altering the sense of 404 a little, though).  If so, though, there should be different status codes, and 404 belongs to the former.  Please discuss.

2. The registration of the application/rdap+json media type was removed in version -07, presumably to move it to the json-response document (which makes sense).  But there are examples here in Appendix A that still use that media type, with no definition in sight.  I'm not happy with that.

I would be happy with an informative reference to the document where that media type is defined, and, of course, and update to that draft, including it (the latest posted version, json-response-04, predates this change).  (An informative reference is OK, I think, because this is in an example.)
2013-08-12
07 Barry Leiba
[Ballot comment]
It appears that Olaf is having a conversation about the rest of Larry's review, and I have every confidence that Good Stuff (tm) …
[Ballot comment]
It appears that Olaf is having a conversation about the rest of Larry's review, and I have every confidence that Good Stuff (tm) will come from that.
2013-08-12
07 Barry Leiba [Ballot Position Update] New position, Discuss, has been recorded for Barry Leiba
2013-08-12
07 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded for Jari Arkko
2013-08-12
07 Brian Haberman [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman
2013-08-10
07 Spencer Dawkins
[Ballot comment]
I'm not completely comfortable about the use of 404 flagged in Larry Masinter's Applications Area Directorate review, but whatever you do to resolve …
[Ballot comment]
I'm not completely comfortable about the use of 404 flagged in Larry Masinter's Applications Area Directorate review, but whatever you do to resolve Larry's comment will work for me, too.
2013-08-10
07 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2013-08-09
07 Pete Resnick State changed to IESG Evaluation from Waiting for AD Go-Ahead
2013-08-09
07 Pete Resnick Ballot has been issued
2013-08-09
07 Pete Resnick [Ballot Position Update] New position, Yes, has been recorded for Pete Resnick
2013-08-09
07 Pete Resnick Created "Approve" ballot
2013-07-29
07 (System) State changed to Waiting for AD Go-Ahead from In Last Call
2013-07-23
07 (System) IANA Review state changed to IANA - Not OK from IANA - Review Needed
2013-07-23
07 Pearl Liang
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-weirds-using-http-07.  Authors should review the comments and/or questions below.  Please report any inaccuracies and respond to any questions as soon …
IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-weirds-using-http-07.  Authors should review the comments and/or questions below.  Please report any inaccuracies and respond to any questions as soon as possible.

We received the following comments/questions from the IANA's reviewer:

IANA has questions about the IANA action requested by the authors in this document.

IANA understands that, upon approval of this document, there is a single action which IANA must complete.

IANA understands that it is requested to create a new registry, the "RDAP Extensions Registry" and that the maintenance rule for this new registry will be Specification Required as defined in RFC 5226. However, IANA has some questions about the new registry.

Is the new registry a stand-alone registry on the IANA Matrix, or should it be a sub-registry of an existing registry?

The current document proposes a template for RDAP extension registration. Will the newly created registry capture all of the fields on the template, a subset, or different fields?

Are there initial registrations in the new RDAP Extensions Registry?

IANA understands that creation of the new RDAP Extensions Registry is the only action required of IANA upon approval of this document.

---
Note:  The actions requested in this document will not be completed
until the document has been approved for publication as an RFC.
This message is only to confirm what actions will be performed.
2013-07-18
07 Jean Mahoney Request for Last Call review by GENART is assigned to Joel Halpern
2013-07-18
07 Jean Mahoney Request for Last Call review by GENART is assigned to Joel Halpern
2013-07-18
07 Tero Kivinen Request for Last Call review by SECDIR is assigned to Sandra Murphy
2013-07-18
07 Tero Kivinen Request for Last Call review by SECDIR is assigned to Sandra Murphy
2013-07-15
07 Cindy Morgan IANA Review state changed to IANA - Review Needed
2013-07-15
07 Cindy Morgan
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (HTTP usage in the Registration …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (HTTP usage in the Registration Data Access Protocol (RDAP)) to Proposed Standard


The IESG has received a request from the Web Extensible Internet
Registration Data Service WG (weirds) to consider the following document:
- 'HTTP usage in the Registration Data Access Protocol (RDAP)'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2013-07-29. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  This document is one of a collection that together describe the
  Registration Data Access Protocol (RDAP).  It describes how RDAP is
  transported using the Hypertext Transfer Protocol (HTTP).




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-weirds-using-http/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-weirds-using-http/ballot/


No IPR declarations have been submitted directly on this I-D.


2013-07-15
07 Cindy Morgan State changed to In Last Call from Last Call Requested
2013-07-15
07 Pete Resnick Placed on agenda for telechat - 2013-08-15
2013-07-15
07 Pete Resnick Last call was requested
2013-07-15
07 Pete Resnick Ballot approval text was generated
2013-07-15
07 Pete Resnick State changed to Last Call Requested from AD Evaluation::AD Followup
2013-07-15
07 Pete Resnick Ballot writeup was changed
2013-07-15
07 Pete Resnick Ballot writeup was generated
2013-07-15
07 Pete Resnick Last call announcement was generated
2013-07-03
07 Andy Newton New version available: draft-ietf-weirds-using-http-07.txt
2013-06-18
06 (System) Sub state has been changed to AD Followup from Revised ID Needed
2013-06-18
06 Ning Kong New version available: draft-ietf-weirds-using-http-06.txt
2013-06-14
05 Pete Resnick State changed to AD Evaluation::Revised I-D Needed from AD Evaluation
2013-05-29
05 Pete Resnick Changed document writeup
2013-05-29
05 Pete Resnick State changed to AD Evaluation from Publication Requested
2013-05-20
05 Amy Vezza
Shepherd writeup for draft-ietf-weirds-using-http-05.txt
Shepherd: Olaf Kolkman
$Id: draft-ietf-weirds-using-http-shepherd.txt,v 1.3 2013/05/20 13:01:38 olaf Exp $
--------------------------------------------------------------------------------


(1) What type of RFC is being requested (BCP, …
Shepherd writeup for draft-ietf-weirds-using-http-05.txt
Shepherd: Olaf Kolkman
$Id: draft-ietf-weirds-using-http-shepherd.txt,v 1.3 2013/05/20 13:01:38 olaf Exp $
--------------------------------------------------------------------------------


(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)? Why is
this the proper type of RFC? Is this type of RFC indicated in the
title page header?

This intended to be Standards Track RFC, it is the normative
specification on how to use a Registration Data Access Protocol on top
of HTTP, hence Standards Track.


(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary:

[From the Introduction, the Abstract is a bit denser, but OK IMHO]

  This document describes the usage of HTTP for Registration Data
  Directory Services.  The goal of this document is to tie together
  usage patterns of HTTP into a common profile applicable to the
  various types of Directory Services serving Registration Data using
  RESTful practices.  By giving the various Directory Services common
  behavior, a single client is better able to retrieve data from
  Directory Services adhering to this behavior.


Working Group Summary:

During the development of the working group there has been a good
amount of review by multiple wg participants. There are no issues
arrived on the rough side of consensus and the document as a whole is
well carried by consensus.

This document is not contentious, but in the spirit of putting all
cards on the table: there is one point where it touches on an issue
that seems to be potentially create more discussion in the future and
that is the encapsulation format of the reply. The working is clearly
going for JSON although there are some that argue that XML might be
better suited for some deployments. This specification does allow,
just like the charter, a possiblilty for alternative reply
encapsulations. In other words, I do not see any problems for this
document.


Document Quality:

During the previous IETF there has been a demo of 4 implementations.
There have been explicit statements by others that they believe the
RFC is of sufficient detail to implement against. There is no
indication this document underspecifies aspects.

There has not been a MIB, Media Type, DNS, or Sucurity expert review
(at least not with those explicit hats)



Personnel:

Chairs: Murray Kuchewary and Olaf Kolkman
Shepherd: Olaf Kolkman
AD: Pete Resnick


(3) Briefly describe the review of this document that was performed by
the Document Shepherd. If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

I have reviewed version 03, 04 and 05 in detail. (The shepherd review
for 04 concluded that a few fixes where needed before submission)


(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

No.



(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

The document has an internationalisation section (section 9). I know
that some of the folk in the working group have a background in
Internationalisation issues and have reviewed the document. That said
the document identifies the issues only to be addressed in future
document that specify the rules for replies.

I am not an HTTP expert myself but I do not think that the
specification touched areas that are beyond the HTTP knowledge within
the working group.


(6) Describe any specific concerns or issues that the Document
Shepherd has with this document that the Responsible Area Director
and/or the IESG should be aware of? For example, perhaps he or she is
uncomfortable with certain parts of the document, or has concerns
whether there really is a need for it. In any event, if the WG has
discussed those issues and has indicated that it still wishes to
advance the document, detail those concerns here.

There are no specific concerns.


(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP
78
and BCP 79 have already been filed. If not, explain why?


I have contacted all authors and they confirmed that there were no
disclosures that needed to be filed.


(8) Has an IPR disclosure been filed that references this document? If
so, summarize any WG discussion and conclusion regarding the IPR
disclosures.


No IPR disclosures (reviewed Mon May 20 12:42:12 UTC 2013)


(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

The WG Consensus is solid and carried by the whole group.


(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)


I have not heard discontent about this document.


(11) Identify any ID nits the Document Shepherd has found in this
document. (See http://www.ietf.org/tools/idnits/ and the
Internet-Drafts Checklist). Boilerplate checks are not enough; this
check needs to be thorough.

ID nits reports a downref. See further below.


(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.


The specification registers the "application/rdap+json" media type.
(section 8.2)

Review of the media type has been performec through the
media-types@iana.org list.


(13) Have all references within this document been identified as
either normative or informative?

Yes.


(14) Are there normative references to documents that are not ready
for advancement or are otherwise in an unclear state? If such
normative references exist, what is the plan for their completion?




(15) Are there downward normative references references (see RFC
3967
)? If so, list these downward references to support the Area
Director in the Last Call procedure.

[RFC6839] is a downward reference.




(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are
not listed in the Abstract and Introduction, explain why, and point to
the part of the document where the relationship of this document to
the other RFCs is discussed. If this information is not in the
document, explain why the WG considers it unnecessary.

No, this document will obsolete nor update other documents.



(17) Describe the Document Shepherd's review of the IANA
considerations section, especially with regard to its consistency with
the body of the document. Confirm that all protocol extensions that
the document makes are associated with the appropriate reservations in
IANA registries. Confirm that any referenced IANA registries have been
clearly identified. Confirm that newly created IANA registries include
a detailed specification of the initial contents for the registry,
that allocations procedures for future registrations are defined, and
a reasonable name for the new registry has been suggested (see RFC
5226
).

Consitency with Body: Confirm
Consistency extentions/Registries: Confirm (in 8.2)
Detailed spec for new registries: Confirm (in 8.1)
Procedure for future registration: Confirm (in 8.1)
Reasonable name: Confifm



(18) List any new IANA registries that require Expert Review for
future allocations. Provide any public guidance that the IESG would
find useful in selecting the IANA Experts for these new registries.

There are no such registries. Only 'Specification Required'


(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

There is one trivial ABNF specification in the document. It has been
checked using http://www.anfdata.cz/bnfparser2/

          ---------------RESULT---------------
          name = ALPHA *( ALPHA / DIGIT / "_" )

          [1] passed
2013-05-20
05 Amy Vezza Note added 'Document Shepherd: Olaf Kolkman (olaf@NLnetLabs.nl)'
2013-05-20
05 Amy Vezza IESG process started in state Publication Requested
2013-05-20
05 (System) Earlier history may be found in the Comment Log for draft-designteam-weirds-using-http
2013-05-20
05 Murray Kucherawy IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2013-05-20
05 Murray Kucherawy Annotation tags Awaiting Expert Review/Resolution of Issues Raised, Doc Shepherd Follow-up Underway cleared.
2013-05-13
05 Andy Newton New version available: draft-ietf-weirds-using-http-05.txt
2013-04-29
04 Murray Kucherawy IETF WG state changed to WG Consensus: Waiting for Write-Up from Waiting for WG Chair Go-Ahead
2013-04-29
04 Murray Kucherawy Annotation tag Awaiting Expert Review/Resolution of Issues Raised set. Annotation tag Revised I-D Needed - Issue raised by WGLC cleared.
2013-04-16
04 Byron Ellacott New version available: draft-ietf-weirds-using-http-04.txt
2013-04-10
03 Murray Kucherawy IETF WG state changed to Waiting for WG Chair Go-Ahead from In WG Last Call
2013-04-10
03 Murray Kucherawy Annotation tags Revised I-D Needed - Issue raised by WGLC, Doc Shepherd Follow-up Underway set.
2013-03-27
03 Murray Kucherawy Changed shepherd to Olaf Kolkman
2013-03-27
03 Murray Kucherawy IETF WG state changed to In WG Last Call from WG Document
2013-03-27
03 Murray Kucherawy Working Group Last Call ends April 10, 2013.
2013-03-27
03 Murray Kucherawy Intended Status changed to Proposed Standard from None
2013-03-27
03 Andy Newton New version available: draft-ietf-weirds-using-http-03.txt
2013-03-25
02 Andy Newton New version available: draft-ietf-weirds-using-http-02.txt
2012-12-05
01 Andy Newton New version available: draft-ietf-weirds-using-http-01.txt
2012-09-21
00 Andy Newton New version available: draft-ietf-weirds-using-http-00.txt