Centralized Conferencing Manipulation Protocol
draft-ietf-xcon-ccmp-15
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2015-10-14
|
15 | (System) | Notify list changed from xcon-chairs@ietf.org, draft-ietf-xcon-ccmp@ietf.org to (None) |
2012-08-22
|
15 | (System) | post-migration administrative database adjustment to the No Objection position for Pete Resnick |
2012-08-22
|
15 | (System) | post-migration administrative database adjustment to the No Objection position for Peter Saint-Andre |
2012-08-22
|
15 | (System) | post-migration administrative database adjustment to the No Objection position for Stephen Farrell |
2012-08-22
|
15 | (System) | post-migration administrative database adjustment to the No Objection position for Adrian Farrel |
2012-03-25
|
15 | (System) | RFC published |
2012-03-13
|
15 | Robert Sparks | This comment is added to demonstrate a bug in the datatracker code. Auth48 status: http://www.rfc-editor.org/queue2.html#draft-ietf-xcon-ccmp still shows one author providing comments |
2011-12-02
|
15 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2011-12-02
|
15 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2011-12-02
|
15 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2011-10-07
|
15 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2011-10-07
|
15 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2011-10-03
|
15 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2011-09-26
|
15 | Amy Vezza | State changed to RFC Ed Queue from Approved-announcement sent. |
2011-09-23
|
15 | (System) | IANA Action state changed to In Progress |
2011-09-23
|
15 | Amy Vezza | IESG state changed to Approved-announcement sent |
2011-09-23
|
15 | Amy Vezza | IESG has approved the document |
2011-09-23
|
15 | Amy Vezza | Closed "Approve" ballot |
2011-09-23
|
15 | Amy Vezza | Approval announcement text regenerated |
2011-09-23
|
15 | Amy Vezza | State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup. |
2011-08-09
|
15 | Stephen Farrell | [Ballot comment] --- -15 fixed the last thing - mention of HTTP proxy auth (thanks) --- original discuss on -13, addressed by -14 (1) Not … [Ballot comment] --- -15 fixed the last thing - mention of HTTP proxy auth (thanks) --- original discuss on -13, addressed by -14 (1) Not requiring HTTP or TLS client-authentication mechanism seems to me to be a mistake. Its more likely that HTTP authentication will be maintained in future (e.g. extended for oauth, saml, etc) than that CCMP will be. I would suggest getting rid of the "not required" in section 9 on that. (2) The response codes in 5.4 seem to be a subset of those from rfc 2616. I think it'd be better to not replicate the descriptive text about those, nor the codes themselves - how is the combination of HTTP response codes and CCMP response codes supposed to work? E.g. if I get a HTTP 200 but a CCMP 404 in one response then what? I could imagine coders getting this wrong, or having difficulty doing the right thing with libraries. --- original comments on -13 (1) This could do with being rephrased. "Their identifiers, respectively the conference XCON-URI and the conferencing client XCON-USERID, and their XML representations compliant with the XML Schema defined in the XCON data model are widely used for creating the CCMP requests and responses." (2) The AUTO_GENERATE_X stuff on p12 seems complex - I don't think I really followed the description and I wondered if it'd be easy to write code for this. I'd suggest maybe looking at that text again to see if there's a way to make it clearer for an implementer who hasn't been involved in the WG. (3) In 4.4, if a client's timer expires and it closes the connection, then what, if anything, is the server supposed to do? E.g. if the request was ok and the server has done an update but not yet sent the 200 response for some reason. I think the server doesn't have to do anything (e.g. try to unwind the update), but that'd be good to say. (4) What is the limit of the xPathFilter mechanism? Could I use it to select all the users or conferences with the password foo? Maybe there's some security considerations text needed for that? |
2011-08-09
|
15 | Stephen Farrell | [Ballot discuss] The remaining discuss point emerged from discussion of the original discuss on -13, but doesn't seem to be reflected in -14. >> [MB3] … [Ballot discuss] The remaining discuss point emerged from discussion of the original discuss on -13, but doesn't seem to be reflected in -14. >> [MB3] I asked coders that are also co-authors and they do agree we >> should add some text on the use of proxy authentication. >> [/MB3] I think the fix is to say somewhere that: "clients [MUST|SHOULD|MAY] include support for HTTP proxy authentication" I'd be happier with MUST|SHOULD will also clear with a MAY since I reckon that everyone will include it anyway once they're alerted to it. |
2011-08-09
|
15 | Stephen Farrell | [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss |
2011-08-03
|
15 | Adrian Farrel | [Ballot comment] Thanks for addressing my Discuss |
2011-08-03
|
15 | Adrian Farrel | [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss |
2011-08-02
|
15 | Sean Turner | [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss |
2011-08-02
|
15 | (System) | New version available: draft-ietf-xcon-ccmp-15.txt |
2011-07-28
|
15 | Pete Resnick | [Ballot comment] As with draft-ietf-xcon-common-data-model, section 3 of this document repeats things from RFC 5239. I think this introduces a danger that the … [Ballot comment] As with draft-ietf-xcon-common-data-model, section 3 of this document repeats things from RFC 5239. I think this introduces a danger that the documents will "get out of sync": If the normative text happens to differ between the documents, it's unclear which is authoritative. If there's disagreement in even non-normative text, it introduces the potential for confusion. Strike all of section 3. Completely redundant with RFC 5239, which is a normative reference anyway. Intro to section 4 [fixed] 4.2 [fixed] 4.3 [fixed] 4.4 [fixed] 5.2 [fixed] 5.3 Overall - I wouldn't mind seeing all of the XML *not* repeated here. It's already in section 11. 5.3 [fixed] 5.3.1 [fixed] 6 - I think this should either be in an appendix or in draft-ietf-xcon-examples. |
2011-07-28
|
15 | Pete Resnick | [Ballot Position Update] Position for Pete Resnick has been changed to No Objection from Discuss |
2011-07-27
|
15 | Sean Turner | [Ballot comment] #1) addressed #2) addressed #3) addressed #4) addressed #5) Sec 10.1 - A reference to RFC 6125 is needed to ensure the server's … [Ballot comment] #1) addressed #2) addressed #3) addressed #4) addressed #5) Sec 10.1 - A reference to RFC 6125 is needed to ensure the server's ID is properly checked. [MB] Are you suggesting that we change the following sentence to something like the following? OLD: Note that in order for the presented certificate to be valid at the client, the client must be able to validate the certificate. NEW: Note that in order for the presented certificate to be valid at the client, the client must be able to validate the certificate, using a mechansim such as that specified in RFC 6125. [/MB] [spt] this or a pointer to 2818. |
2011-07-27
|
15 | Sean Turner | [Ballot discuss] This is an updated discuss based on -14: This is an updated discuss. 1-4 and 6 were addressed in -14. asking if I … [Ballot discuss] This is an updated discuss based on -14: This is an updated discuss. 1-4 and 6 were addressed in -14. asking if I missed the fix for #5. #1) cleared #2) cleared #3) cleared #4) cleared #5) I couldn't find an explicit statement that clients and server MUST support both the request and response. Do we need that or is it assumed? [MB2] It's really assumed, but we can add a statement in either section 4.4 or section 5. [/MB2] [spt] Can you point me to the text? I think I'm missing it. #6) cleared |
2011-07-18
|
15 | Stephen Farrell | [Ballot comment] --- original discuss on -13, addressed by -14 (1) Not requiring HTTP or TLS client-authentication mechanism seems to me to be a mistake. … [Ballot comment] --- original discuss on -13, addressed by -14 (1) Not requiring HTTP or TLS client-authentication mechanism seems to me to be a mistake. Its more likely that HTTP authentication will be maintained in future (e.g. extended for oauth, saml, etc) than that CCMP will be. I would suggest getting rid of the "not required" in section 9 on that. (2) The response codes in 5.4 seem to be a subset of those from rfc 2616. I think it'd be better to not replicate the descriptive text about those, nor the codes themselves - how is the combination of HTTP response codes and CCMP response codes supposed to work? E.g. if I get a HTTP 200 but a CCMP 404 in one response then what? I could imagine coders getting this wrong, or having difficulty doing the right thing with libraries. --- original comments on -13 (1) This could do with being rephrased. "Their identifiers, respectively the conference XCON-URI and the conferencing client XCON-USERID, and their XML representations compliant with the XML Schema defined in the XCON data model are widely used for creating the CCMP requests and responses." (2) The AUTO_GENERATE_X stuff on p12 seems complex - I don't think I really followed the description and I wondered if it'd be easy to write code for this. I'd suggest maybe looking at that text again to see if there's a way to make it clearer for an implementer who hasn't been involved in the WG. (3) In 4.4, if a client's timer expires and it closes the connection, then what, if anything, is the server supposed to do? E.g. if the request was ok and the server has done an update but not yet sent the 200 response for some reason. I think the server doesn't have to do anything (e.g. try to unwind the update), but that'd be good to say. (4) What is the limit of the xPathFilter mechanism? Could I use it to select all the users or conferences with the password foo? Maybe there's some security considerations text needed for that? |
2011-07-18
|
15 | Stephen Farrell | [Ballot discuss] The remaining discuss point emerged from discussion of the original discuss on -13, but doesn't seem to be reflected in -14. >> [MB3] … [Ballot discuss] The remaining discuss point emerged from discussion of the original discuss on -13, but doesn't seem to be reflected in -14. >> [MB3] I asked coders that are also co-authors and they do agree we >> should add some text on the use of proxy authentication. >> [/MB3] I think the fix is to say somewhere that: "clients [MUST|SHOULD|MAY] include support for HTTP proxy authentication" I'd be happier with MUST|SHOULD will also clear with a MAY since I reckon that everyone will include it anyway once they're alerted to it. |
2011-07-13
|
15 | Peter Saint-Andre | [Ballot comment] All of my feedback has been addressed in -14. Thank you. |
2011-07-13
|
15 | Peter Saint-Andre | [Ballot Position Update] Position for Peter Saint-Andre has been changed to No Objection from Discuss |
2011-07-11
|
15 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2011-07-11
|
14 | (System) | New version available: draft-ietf-xcon-ccmp-14.txt |
2011-05-31
|
15 | Samuel Weiler | Request for Telechat review by SECDIR Completed. Reviewer: Stephen Kent. |
2011-05-26
|
15 | Cindy Morgan | Removed from agenda for telechat |
2011-05-26
|
15 | Cindy Morgan | State changed to IESG Evaluation::Revised ID Needed from IESG Evaluation. |
2011-05-26
|
15 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded |
2011-05-26
|
15 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded |
2011-05-26
|
15 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded |
2011-05-26
|
15 | Dan Romascanu | [Ballot comment] The OPS-DIR review performed by Juergen Quittek raised a few issues and made a number of suggestions. None of them are critical, but … [Ballot comment] The OPS-DIR review performed by Juergen Quittek raised a few issues and made a number of suggestions. None of them are critical, but in case the document is open to fix other issues I suggest to consider these ones as well: 1) Section 2: Terminology > First-Party: A request issued by the client to manipulate their own > conferencing data. > > Third-Party: A request issued by a client to manipulate the > conference data of another client. "First-Party" and "Third-Party" alone are not requests. At least the term is not used this way in the draft. Rather "third-party request" is used in the text for Referring to requests. I would suggest: NEW First-Party request: A request issued by the client to manipulate their own conferencing data. Third-Party request: A request issued by a client to manipulate the conference data of another client. 2) Section 3, third paragraph, 1st line: OLD Conference object and conference users do represent key elements NEW Conference object and conference user objects do represent key elements Implementation and operation of the protocol would become drastically simpler if the CCMP server would not be required anymore to create users. Just creating user objects would probably be sufficient already 3) Section 3.2, 1st paragraph, lines 7-8 OLD or a common administrator. The Conference Control Server creates individual users, assigning them a unique Conference User Identifier NEW or a common administrator. The Conference Control Server creates individual user objects, assigning them a unique Conference User Identifier 4) Section 4.1, 2nd paragraph OLD create: for the creation of a conference, a conference user, a sidebar, or a blueprint. NEW create: for the creation of a conference object, a conference user object, a sidebar, or a blueprint. 5) Section 4.3, item (b), line 2: OLD in the request has (have) been replaced by the newly created NEW in the request have been replaced by the newly created 6) Section 5.3.4, paragraph after Figure 8, line 7: What is "the referenced conference document"? Is it the conference object? 7) Section 5.3.5, 1st paragraph, Last two lines: Again "conference document", see issue 6) 8) Section 5.2.12, first bullet item, line two: "ten standard message names" It would be helpful to add a reference to Table 1. 9) Section 7, first lines: > If a conference control client is not pre-configured to use a > specific conference control server for the requests, the client MUST > first discover the conference control server before it can send any > requests. Is this really a capital "MUST"? Would the client be able to send any request before discovering the server? |
2011-05-26
|
15 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded |
2011-05-25
|
15 | Stephen Farrell | [Ballot comment] (1) This could do with being rephrased. "Their identifiers, respectively the conference XCON-URI and the conferencing client XCON-USERID, and their XML representations compliant … [Ballot comment] (1) This could do with being rephrased. "Their identifiers, respectively the conference XCON-URI and the conferencing client XCON-USERID, and their XML representations compliant with the XML Schema defined in the XCON data model are widely used for creating the CCMP requests and responses." (2) The AUTO_GENERATE_X stuff on p12 seems complex - I don't think I really followed the description and I wondered if it'd be easy to write code for this. I'd suggest maybe looking at that text again to see if there's a way to make it clearer for an implementer who hasn't been involved in the WG. (3) In 4.4, if a client's timer expires and it closes the connection, then what, if anything, is the server supposed to do? E.g. if the request was ok and the server has done an update but not yet sent the 200 response for some reason. I think the server doesn't have to do anything (e.g. try to unwind the update), but that'd be good to say. (4) What is the limit of the xPathFilter mechanism? Could I use it to select all the users or conferences with the password foo? Maybe there's some security considerations text needed for that? |
2011-05-25
|
15 | Stephen Farrell | [Ballot discuss] (1) Not requiring HTTP or TLS client-authentication mechanism seems to me to be a mistake. Its more likely that HTTP authentication will be … [Ballot discuss] (1) Not requiring HTTP or TLS client-authentication mechanism seems to me to be a mistake. Its more likely that HTTP authentication will be maintained in future (e.g. extended for oauth, saml, etc) than that CCMP will be. I would suggest getting rid of the "not required" in section 9 on that. (2) The response codes in 5.4 seem to be a subset of those from rfc 2616. I think it'd be better to not replicate the descriptive text about those, nor the codes themselves - how is the combination of HTTP response codes and CCMP response codes supposed to work? E.g. if I get a HTTP 200 but a CCMP 404 in one response then what? I could imagine coders getting this wrong, or having difficulty doing the right thing with libraries. |
2011-05-25
|
15 | Stephen Farrell | [Ballot Position Update] New position, Discuss, has been recorded |
2011-05-25
|
15 | Pete Resnick | [Ballot comment] Intro to section 4: CCMP is a client-server, XML-based protocol, which has been specifically conceived to provide users with the necessary … [Ballot comment] Intro to section 4: CCMP is a client-server, XML-based protocol, which has been specifically conceived to provide users with the necessary means for the creation, retrieval, modification and deletion of conference objects. CCMP is also state-less, which means implementations can safely handle transactions independently from each other. Conference-related information is encapsulated into CCMP messages in the form of XML documents or XML document fragments compliant with the XCON data model representation. That's a bit fluffy. How about instead: CCMP is a client-server, XML-based protocol for user creation, retrieval, modification and deletion of conference objects. CCMP is a stateless protocol, such that implementations can safely handle transactions independently from each other. CCMP messages are XML documents or XML document fragments compliant with the XCON data model representation. [REF?] See also use of the word "conceived" in the intro to 4 and in 5.3.1. Could tighten up the language there. 4.2 would be much easier to read if you stated the requirement (that responses with documents MUST have a version) first and then gave the explanation. Implementers don't need dramatic build-up. Get to the point. Then most of the explanation can be reduced. 4.4 first paragraph (or two; I can't tell if what spans the page break is 1 paragraph or two) can be reduced to: CCMP is implemented using HTTP, placing the CCMP request messages into the body of an HTTP POST operation and placing the CCMP responses into the body of the HTTP response messages. For information as to why this implementation method was chosen, refer to Appendix A. Then trim the second to last paragraph of 4.4 to get rid of redundancies. 5.3 Overall - I wouldn't mind seeing all of the XML *not* repeated here. It's already in section 11. 5.3 Intro - Move the discussion of optionsRequest/optionsResponse down to 5.3.12. No need to distinguish it here. 6 - I think this should either be in an appendix or in draft-ietf-xcon-examples. |
2011-05-25
|
15 | Pete Resnick | [Ballot discuss] As with draft-ietf-xcon-common-data-model, section 3 of this document repeats things from RFC 5239. I think this introduces a danger that the … [Ballot discuss] As with draft-ietf-xcon-common-data-model, section 3 of this document repeats things from RFC 5239. I think this introduces a danger that the documents will "get out of sync": If the normative text happens to differ between the documents, it's unclear which is authoritative. If there's disagreement in even non-normative text, it introduces the potential for confusion. Strike all of section 3. Completely redundant with RFC 5239, which is a normative reference anyway. The intro to section 4 gives an implementation requirement without using 2119 language: Each operation in the protocol model, as summarized in Section 4.1 is atomic and either succeeds or fails as a whole. The conference server must ensure that the operations are atomic in that the operation invoked by a specific conference client completes prior to another client's operation on the same conference object. 4.3 needs a reference to the data model document. 5.2 defines the "version" parameter as optional. However, there are clearly instances (specified in 4.2) where it is required. 5.2 should probably indicate that. 5.3.1 - "A blueprintsRequest message REQUIRES no "confObjID" and "operation" parameters". Do you mean that they are OPTIONAL or that they MUST NOT be present? "REQUIRES no" is not appropriate. |
2011-05-25
|
15 | Pete Resnick | [Ballot Position Update] New position, Discuss, has been recorded |
2011-05-25
|
15 | Adrian Farrel | [Ballot comment] BTW, I appreciated the many examples, although they might have been moved to an appendix to clear the floor for the main meat … [Ballot comment] BTW, I appreciated the many examples, although they might have been moved to an appendix to clear the floor for the main meat of text (is that metaphor too horribly mixed?). I also wasn't convinced by including all of the schema fragments in-line as well as in Section 11, but this is probably a stlistic choice that is not important. --- Nit 5.4. All CCMP response messages MUST include a ""response-code"". The You probably don't need the quad-quotes. |
2011-05-25
|
15 | Adrian Farrel | [Ballot discuss] A very weighty tome that I cannot pretend to have read in full detail. I am relying on the WG and responsible ADs … [Ballot discuss] A very weighty tome that I cannot pretend to have read in full detail. I am relying on the WG and responsible ADs for assurance of quality, but I noticed a few smaller issues that I believe need to be resolved before publication. --- Section 4 The specification recommends the use of HTTP as a transport solution, including CCMP requests in HTTP POST messages and CCMP responses in HTTP 200 OK replies. This implementation approach is further described in Section 4.4. Section 9 This section describes the use of HTTP [RFC2616] and HTTP Over TLS [RFC2818] as transport mechanisms for the CCMP protocol, which a conforming conference Server and Conferencing client MUST support. Section 10 3. The protocol MUST support a confidentiality and integrity mechanism. As described in Section 9, implementations of CCMP MUST implement the HTTP transport over TLS [RFC2818]. So it looks like Section 4 is under-egging the situation and you need s/recommends/requires/ It is probable that Seciton 4.4 needs to be tightened in this regard as well. --- I think the 2119 language needs to be tightened up. As a completely random example: Section 5.1 operation: An optional parameter refining the type of specialized request message. The "operation" parameter is REQUIRED in all requests except for the "blueprintsRequest" and "confsRequest" specialized messages. Why "optional" in lowercase but "REQUIRED" in uppercase? I think the only sure way to sort this will be to grep all the lowercase versions of the 2119 words and think about them carefully. --- Section 5.1 conference-password: An optional parameter that MUST be inserted in all requests whose target conference object is password-protected (as per the element in [I-D.ietf-xcon-common-data-model]). This "MUST" implies that ommission would be treated as a malformed message, not a password failure (i.e. 400 not 401). Does it matter? But later I see you have defined 424 which is probably what you would use. Add some clarity? --- Shouldn't the sample phone number (uri="tel:+390817683823") be taken from one of the set of "unreal" phone numbers? --- Section 7 This document proposes the use of DNS to locate the conferencing server. What is the upshot of this proposal? Does a conformant implementation get to choose? Is this language you can tighten as s/propose/specifies/ |
2011-05-25
|
15 | Adrian Farrel | [Ballot Position Update] New position, Discuss, has been recorded |
2011-05-25
|
15 | Pete Resnick | [Ballot comment] [In progress - Will likely become DISCUSS] Strike all of section 3. Completely redundant with RFC 5239. Intro to section 4: … [Ballot comment] [In progress - Will likely become DISCUSS] Strike all of section 3. Completely redundant with RFC 5239. Intro to section 4: CCMP is a client-server, XML-based protocol, which has been specifically conceived to provide users with the necessary means for the creation, retrieval, modification and deletion of conference objects. CCMP is also state-less, which means implementations can safely handle transactions independently from each other. Conference-related information is encapsulated into CCMP messages in the form of XML documents or XML document fragments compliant with the XCON data model representation. That's a bit fluffy. How about instead: CCMP is a client-server, XML-based protocol for user creation, retrieval, modification and deletion of conference objects. CCMP is a stateless protocol, such that implementations can safely handle transactions independently from each other. CCMP messages are XML documents or XML document fragments compliant with the XCON data model representation. [REF?] Might I suggest that anywhere you find the word "conceived" in this document (see elsewhere in the intro to 4, 5.3.1, and 6.9) there is an opportunity to do some shortening and clarification. The intro to section 4 gives an implementation requirement without using 2119 language: Each operation in the protocol model, as summarized in Section 4.1 is atomic and either succeeds or fails as a whole. The conference server must ensure that the operations are atomic in that the operation invoked by a specific conference client completes prior to another client's operation on the same conference object. 4.2 would be much easier to read if you stated the requirement (that responses with documents MUST have a version) first and then gave the explanation. Implementers don't need dramatic build-up. Get to the point. Then most of the explanation can be reduced. 4.3 needs a reference to the data model document. 4.4 first paragraph (or two; I can't tell if what spans the page break is 1 paragraph or two) can be reduced to: CCMP is implemented using HTTP, placing the CCMP request messages into the body of an HTTP POST operation and placing the CCMP responses into the body of the HTTP response messages. For information as to why this implementation method was chosen, refer to Appendix A. Then trim the second to last paragraph of 4.4 to get rid of redundancies. 5.2 defines the "version" parameter as optional. However, there are clearly instances (specified) where it is required. 5.2 should probably indicate that. 5.3 - Move the discussion of optionsRequest/optionsResponse down to 5.3.12. No need to distinguish it here. 5.3.1 - "A blueprintsRequest message REQUIRES no "confObjID" and "operation" parameters". Do you mean that they are OPTIONAL or that they MUST NOT be present? "REQUIRES no" is not appropriate. |
2011-05-25
|
15 | Peter Saint-Andre | [Ballot comment] 1. Section 4 states: The conference server must ensure that the operations are atomic in that the operation invoked by … [Ballot comment] 1. Section 4 states: The conference server must ensure that the operations are atomic in that the operation invoked by a specific conference client completes prior to another client's operation on the same conference object. Change "must" to "MUST"? 2. Also in Section 4: The specification recommends the use of HTTP as a transport solution... Change to the following? Implementations SHOULD use HTTP as the transport... 3. In Section 4.2: The "version" parameter is not REQUIRED for requests... There is no "not REQUIRED" in RFC 2119. I suggest: The "version" parameter is OPTIONAL for requests... 4. In Section 5, the terms "mandatory" and "optional" are used for the various parameters. Using RFC 2119 language, are these really "REQUIRED" and "OPTIONAL"? 5. The table in Section 5.4 has bad line breaks. I suggest changing this: +---------------+------------+------------+------------+------------+ | Response code | Create | Retrieve | Update | Delete | +---------------+------------+------------+------------+------------+ to this: +----------+-------------+-------------+-------------+-------------+ | Response | Create | Retrieve | Update | Delete | | Code | | | | | +----------+-------------+-------------+-------------+-------------+ or even to this: +------+--------------+--------------+--------------+--------------+ | Code | Create | Retrieve | Update | Delete | +------+--------------+--------------+--------------+--------------+ That will give you more room in each column. 6. Various examples have "form the server" instead of "from the server". 7. In schema snippet from Section 6.9, the example extension does not specify an XML namespace, implying that the extension is qualified by the base namespace. This would be wrong. The examples are right, here. 8. Section 9 states: A conferencing client that conforms to this specification is not required to support HTTP authentication [RFC2617] or cookies [RFC6265]. There is no "not required" in RFC 2119. Do you mean that it is OPTIONAL for a conferencing server to support RFC 2617 and RFC 6265? 9. In Section 10.4, please add an informational reference to RFC 4732. |
2011-05-25
|
15 | Peter Saint-Andre | [Ballot discuss] 1. Section 4.2 appears to assume that HTTP is the transport; for example: If the modifications are all successfully applied, the … [Ballot discuss] 1. Section 4.2 appears to assume that HTTP is the transport; for example: If the modifications are all successfully applied, the server sends back to the client a "200" response which also carries information about the current server-side version of the modified object. If that is so, please either change SHOULD to MUST (i.e., make HTTP mandatory-to-implement as a baseline data transfer protocol) or at least add a note to the effect that HTTP is a SHOULD but all the examples use HTTP. This would also be consistent with Section 9, which states: This section describes the use of HTTP [RFC2616] and HTTP Over TLS [RFC2818] as transport mechanisms for the CCMP protocol, which a conforming conference Server and Conferencing client MUST support. 2. In Section 4.3: The XCON data model identifies some elements/attributes as mandatory. Since the XML documents carried in the CCMP need to be compliant with the XCON data model, there can be a problem in cases of client- initiated operations, like the creation/update of conference objects. In such cases, not all of the mandatory data can be known in advance to the client issuing a CCMP request. As an example, a client has no means to know, at the time it issues a conference creation request, the XCON-URI that the server will assign to the yet-to-be-created conference and hence it is not able to appropriately fill with that value the mandatory "entity" attribute of the conference document contained in the request. To solve this issue, the CCMP client fills all mandatory data model fields, for which no value is available at the time the request is constructed, with fake values in the form of a wildcard string, AUTO_GENERATE_X (all uppercase), with X being a unique numeric index for each data model field for which the value is unknown. Instead of sending fake values, how about fixing the data model so that these elements and attributes are not mandatory? 3. The CCMP namespace is "urn:ietf:params:xml:ns:xcon:ccmp". Why is it not "urn:ietf:params:xml:ns:xcon-ccmp"? On the meaning of ":" here please see Section 3 of RFC 3553... Declaration of structure: The namespace is primarily opaque. The IANA, as operator of the registry, may take suggestions for names to assign but they reserve the right to assign whatever name they desire, within guidelines set by the IESG. The colon character (":") is used to denote a very limited concept of hierarchy. If a colon is present then the items on both sides of it are valid names. In general, if a name has a colon then the item on the left hand side represents a class of those items that would contain other items of that class. For example, a name can be assigned to the entire list of DNS resource record type codes as well as for each individual code. The URN for the list might look like this: urn:ietf:params:dns:rr-type-codes while the URN for the SOA records type code might look like this: urn:ietf:params:dns:rr-type-codes:soa It appears that "urn:ietf:params:xml:ns:xcon" is not a valid name. Thus "urn:ietf:params:xml:ns:xcon-ccmp" seems better. Notice also that the XCON conference info URN is "urn:ietf:params:xml:ns:xcon-conference-info" not "urn:ietf:params:xml:ns:xcon:conference-info". 4. Section 9 states: a conferencing server may not be a fully compliant HTTP server Do you mean "might" or "MAY"? I.e., is it OPTIONAL for a conferencing server to fully comply with HTTP? |
2011-05-25
|
15 | Peter Saint-Andre | [Ballot Position Update] New position, Discuss, has been recorded |
2011-05-25
|
15 | Sean Turner | [Ballot comment] #1) Section 5.1 subject references AAA, a reference is needed - it kind of came out of the blue. [MB] Okay. [/MB] #2) … [Ballot comment] #1) Section 5.1 subject references AAA, a reference is needed - it kind of came out of the blue. [MB] Okay. [/MB] #2) Sec 6 message 1 has: xcon-userid:alice@example.com shouldn't it be: xcon-userid:Alice@example.com [MB] Yes, this needs to be corrected. [/MB] #3) Sec 9 - "REQUIRED" is not 2119 language. [MB] "REQUIRED" is in the 2119 template that we used and is specified in RFC 2119 in the following context: 1. MUST This word, or the terms "REQUIRED" or "SHALL", mean that the definition is an absolute requirement of the specification. [/MB] [spt] duh - homer simpson moment. [/spt] #4) Sec 10.1: r/the client must be able to validate the certificate./the client MUST be able to validate the certificate. [MB] Okay. [/MB] #5) Sec 10.1 - A reference to RFC 6125 is needed to ensure the server's ID is properly checked. [MB] Are you suggesting that we change the following sentence to something like the following? OLD: Note that in order for the presented certificate to be valid at the client, the client must be able to validate the certificate. NEW: Note that in order for the presented certificate to be valid at the client, the client must be able to validate the certificate, using a mechansim such as that specified in RFC 6125. [/MB] [spt] this or a pointer to 2818. |
2011-05-25
|
15 | Sean Turner | [Ballot comment] #1) Section 5.1 subject references AAA, a reference is needed - it kind of came out of the blue. [MB] Okay. [/MB] #2) … [Ballot comment] #1) Section 5.1 subject references AAA, a reference is needed - it kind of came out of the blue. [MB] Okay. [/MB] #2) Sec 6 message 1 has: xcon-userid:alice@example.com shouldn't it be: xcon-userid:Alice@example.com [MB] Yes, this needs to be corrected. [/MB] #3) Sec 9 - "REQUIRED" is not 2119 language. [MB] "REQUIRED" is in the 2119 template that we used and is specified in RFC 2119 in the following context: 1. MUST This word, or the terms "REQUIRED" or "SHALL", mean that the definition is an absolute requirement of the specification. [/MB] [spt] duh - homer simpson moment. [/spt] #4) Sec 10.1: r/the client must be able to validate the certificate./the client MUST be able to validate the certificate. [MB] Okay. [/MB] #5) Sec 10.1 - A reference to RFC 6125 is needed to ensure the server's ID is properly checked. [MB] Are you suggesting that we change the following sentence to something like the following? OLD: Note that in order for the presented certificate to be valid at the client, the client must be able to validate the certificate. NEW: Note that in order for the presented certificate to be valid at the client, the client must be able to validate the certificate, using a mechansim such as that specified in RFC 6125. [/MB] [spt] this would work for me. |
2011-05-25
|
15 | Sean Turner | [Ballot discuss] This is an updated discuss. I've included the authors responses to the first 4 between [MB] and [/MB]. #5 and #6 are new. … [Ballot discuss] This is an updated discuss. I've included the authors responses to the first 4 between [MB] and [/MB]. #5 and #6 are new. #1) This document sometimes uses optional and mandatory to indicate support requirements. These should be changed to use 2119 language. E.g., in 5.1, 5.2, and 5.3.12. [MB] Agreed. [/MB] #2) Sec 4 includes the following: The specification recommends the use of HTTP as a transport solution, including CCMP requests in HTTP POST messages and CCMP responses in HTTP 200 OK replies. Should it be "RECOMMEND"? There were musts earlier but I think they were specified in other RFCs. [MB] Definitely yes. [/MB] #3) Sec 4.4 includes the following: In addition, to mitigate the situation clients MUST NOT wait indefinitely for a response and MUST implement a timer (in the range of seconds) such that when it expires, the client MUST close the connection Is there some recommendation you could give about how long to wait? 1 minute, 5 minutes? [MB] It should be in 10s of seconds. I think 60 secs would be an upper range. I'm inclined to suggest 30 secs as the default. [/MB] #4) Sec 5.3.5 includes the following: Through a "usersRequest" message the CCMP client manipulates the XML element of the conference document associated with the conference identified by the "confObjID" parameter complusory included in the request. Is "complusory" supposed to mean it's mandatory? It would be better to just use the 2119 language. [MB] Yes. [/MB] #5) I couldn't find an explicit statement that clients and server MUST support both the request and response. Do we need that or is it assumed? #6) In the CCMP Request there are 5 fields defined. All are optional. Doesn't at least one field need to be a MUST? If there's no required field - can an implementation that sends no fields in a CCMP Request considered compliant? I had the same kind of comment against the xcom-common-data-model: It seems odd to me that the protocol would specify sub-elements all of which are optional. Maybe this is done all the time in XML land and I'm just picking on this draft? In ASN.1-land, where I'm from, it's like having a CHOICE and not explaining which one of the choices is a MUST. |
2011-05-25
|
15 | Pete Resnick | [Ballot comment] [In progress - Will likely become DISCUSS] This document is too long. Much of it can be attributed to importing text from other … [Ballot comment] [In progress - Will likely become DISCUSS] This document is too long. Much of it can be attributed to importing text from other normatively referenced documents. Some of it can be attributed to being too verbose and just a poor writing style. I think this needs to be fixed. Strike all of section 3. Completely redundant with RFC 5239. Intro to section 4: CCMP is a client-server, XML-based protocol, which has been specifically conceived to provide users with the necessary means for the creation, retrieval, modification and deletion of conference objects. CCMP is also state-less, which means implementations can safely handle transactions independently from each other. Conference-related information is encapsulated into CCMP messages in the form of XML documents or XML document fragments compliant with the XCON data model representation. That's a bit fluffy. How about instead: CCMP is a client-server, XML-based protocol for user creation, retrieval, modification and deletion of conference objects. CCMP is a stateless protocol, such that implementations can safely handle transactions independently from each other. CCMP messages are XML documents or XML document fragments compliant with the XCON data model representation. [REF?] Might I suggest that anywhere you find the word "conceived" in this document (see elsewhere in the intro to 4, 5.3.1, and 6.9) there is an opportunity to do some shortening and clarification. The intro to section 4 gives an implementation requirement without using 2119 language: Each operation in the protocol model, as summarized in Section 4.1 is atomic and either succeeds or fails as a whole. The conference server must ensure that the operations are atomic in that the operation invoked by a specific conference client completes prior to another client's operation on the same conference object. 4.2 would be much easier to read if you stated the requirement (that responses with documents MUST have a version) first and then gave the explanation. Implementers don't need dramatic build-up. Get to the point. Then most of the explanation can be reduced. 4.3 needs a reference to the data model document. 4.4 first paragraph (or two; I can't tell if what spans the page break is 1 paragraph or two) can be reduced to: CCMP is implemented using HTTP, placing the CCMP request messages into the body of an HTTP POST operation and placing the CCMP responses into the body of the HTTP response messages. For information as to why this implementation method was chosen, refer to Appendix A. Then trim the second to last paragraph of 4.4 to get rid of redundancies. 5.2 defines the "version" parameter as optional. However, there are clearly instances (specified) where it is required. 5.2 should probably indicate that. |
2011-05-25
|
15 | Pete Resnick | [Ballot comment] [In progress] This document is too long. Much of it can be attributed to importing text from other normatively referenced documents. Some of … [Ballot comment] [In progress] This document is too long. Much of it can be attributed to importing text from other normatively referenced documents. Some of it can be attributed to being too verbose and just a poor writing style. I think this needs to be fixed. Strike all of section 3. Completely redundant with RFC 5239. Intro to section 4: CCMP is a client-server, XML-based protocol, which has been specifically conceived to provide users with the necessary means for the creation, retrieval, modification and deletion of conference objects. CCMP is also state-less, which means implementations can safely handle transactions independently from each other. Conference-related information is encapsulated into CCMP messages in the form of XML documents or XML document fragments compliant with the XCON data model representation. That's a bit fluffy. How about instead: CCMP is a client-server, XML-based protocol for user creation, retrieval, modification and deletion of conference objects. CCMP is a stateless protocol, such that implementations can safely handle transactions independently from each other. CCMP messages are XML documents or XML document fragments compliant with the XCON data model representation. [REF?] Might I suggest that anywhere you find the word "conceived" in this document (see elsewhere in the intro to 4, 5.3.1, and 6.9) there is an opportunity to do some shortening and clarification. The intro to section 4 gives an implementation requirement without using 2119 language: Each operation in the protocol model, as summarized in Section 4.1 is atomic and either succeeds or fails as a whole. The conference server must ensure that the operations are atomic in that the operation invoked by a specific conference client completes prior to another client's operation on the same conference object. 4.2 would be much easier to read if you stated the requirement (that responses with documents MUST have a version) first and then gave the explanation. Implementers don't need dramatic build-up. Get to the point. Then most of the explanation can be reduced. 4.3 needs a reference to the data model document. 4.4 first paragraph (or two; I can't tell if what spans the page break is 1 paragraph or two) can be reduced to: CCMP is implemented using HTTP, placing the CCMP request messages into the body of an HTTP POST operation and placing the CCMP responses into the body of the HTTP response messages. For information as to why this implementation method was chosen, refer to Appendix A. Then trim the second to last paragraph of 4.4 to get rid of redundancies. 5.2 defines the "version" parameter as optional. However, there are clearly instances (specified) where it is required. 5.2 should probably indicate that. |
2011-05-25
|
15 | Ralph Droms | [Ballot comment] What is the scope of the uniqueness for an XCON-USERID? Is XCON-USERID intended to be used across multiple conferences or is it specific … [Ballot comment] What is the scope of the uniqueness for an XCON-USERID? Is XCON-USERID intended to be used across multiple conferences or is it specific to a conference? |
2011-05-25
|
15 | Ralph Droms | [Ballot Position Update] New position, No Objection, has been recorded |
2011-05-24
|
15 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded |
2011-05-23
|
15 | Sean Turner | [Ballot comment] #1) Section 5.1 subject references AAA, a reference is needed - it kind of came out of the blue. #2) Sec 6 message … [Ballot comment] #1) Section 5.1 subject references AAA, a reference is needed - it kind of came out of the blue. #2) Sec 6 message 1 has: xcon-userid:alice@example.com shouldn't it be: xcon-userid:Alice@example.com #3) Sec 9 - "REQUIRED" is not 2119 language. #4) Sec 10.1: r/the client must be able to validate the certificate./the client MUST be able to validate the certificate. #5) Sec 10.1 - A reference to RFC 6125 is needed to ensure the server's ID is properly checked. |
2011-05-23
|
15 | Sean Turner | [Ballot comment] #1) Section 5.1 subject references AAA, a reference is needed - it kind of came out of the blue. #2) Sec 6 message … [Ballot comment] #1) Section 5.1 subject references AAA, a reference is needed - it kind of came out of the blue. #2) Sec 6 message 1 has: xcon-userid:alice@example.com shouldn't it be: xcon-userid:Alice@example.com #3) Sec 9 - "REQUIRED" is not 2119 language. #4) Sec 10.1: r/the client must be able to validate the certificate./the client MUST be able to validate the certificate. |
2011-05-23
|
15 | Sean Turner | [Ballot discuss] #1) This document sometimes uses optional and mandatory to indicate support requirements. These should be changed to use 2119 language. E.g., in 5.1, … [Ballot discuss] #1) This document sometimes uses optional and mandatory to indicate support requirements. These should be changed to use 2119 language. E.g., in 5.1, 5.2, and 5.3.12. #2) Sec 4 includes the following: The specification recommends the use of HTTP as a transport solution, including CCMP requests in HTTP POST messages and CCMP responses in HTTP 200 OK replies. Should it be "RECOMMEND"? There were musts earlier but I think they were specified in other RFCs. #3) Sec 4.4 includes the following: In addition, to mitigate the situation clients MUST NOT wait indefinitely for a response and MUST implement a timer (in the range of seconds) such that when it expires, the client MUST close the connection Is there some recommendation you could give about how long to wait? 1 minute, 5 minutes? #4) Sec 5.3.5 includes the following: Through a "usersRequest" message the CCMP client manipulates the XML element of the conference document associated with the conference identified by the "confObjID" parameter complusory included in the request. Is "complusory" supposed to mean it's mandatory? It would be better to just use the 2119 language. |
2011-05-23
|
15 | Sean Turner | [Ballot Position Update] New position, Discuss, has been recorded |
2011-05-23
|
15 | Stewart Bryant | [Ballot comment] On the basis of trusting that others who have greater knowledge of this subject matter have reviewed this document I am voting no-objection. |
2011-05-23
|
15 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded |
2011-05-19
|
15 | Samuel Weiler | Request for Telechat review by SECDIR is assigned to Stephen Kent |
2011-05-19
|
15 | Samuel Weiler | Request for Telechat review by SECDIR is assigned to Stephen Kent |
2011-05-18
|
15 | Wesley Eddy | [Ballot Position Update] New position, No Objection, has been recorded |
2011-05-12
|
15 | Amy Vezza | Placed on agenda for telechat - 2011-05-26 by Amy Vezza |
2011-05-12
|
15 | Robert Sparks | State changed to IESG Evaluation from Waiting for AD Go-Ahead. |
2011-05-12
|
15 | Robert Sparks | [Ballot Position Update] New position, Yes, has been recorded for Robert Sparks |
2011-05-12
|
15 | Robert Sparks | Ballot has been issued |
2011-05-12
|
15 | Robert Sparks | Created "Approve" ballot |
2011-05-09
|
13 | (System) | New version available: draft-ietf-xcon-ccmp-13.txt |
2011-03-04
|
15 | Amanda Baber | IANA understands that, upon approval of this document, there are seven IANA Actions that need to be completed. First, in the Namespace registry of the … IANA understands that, upon approval of this document, there are seven IANA Actions that need to be completed. First, in the Namespace registry of the IETF XML registry located at: http://www.iana.org/assignments/xml-registry/ns.html a new XML namespace is to be registered as follows: ID: ccmp URI: urn:ietf:params:xml:ns:xcon:ccmp Registration template: [ as provided section 12.1 of the approved document ] Reference: [ RFC-to-be ] Second, in the Schema registry of the IETF XML registry located at: http://www.iana.org/assignments/xml-registry/schema.html a new XML schema is to be registered as follows: ID: ccmp URI: urn:ietf:params:xml:schema:xcon:ccmp Filename: [ as provided in section 11 of the approved document ] Reference: [ RFC-to-be ] Third, in the Application Media Types registry located at: http://www.iana.org/assignments/media-types/application/index.html a new media type is to be registered as follows: MIME media type name: application MIME subtype name: ccmp+xml Reference: [ RFC-to-be ] Fourth, in the S-NAPTR Application Service Tags registry in the Straightforward-NAPTR (S-NAPTR) Parameters registry located at: http://www.iana.org/assignments/s-naptr-parameters/s-naptr-parameters.xml a new Application Service Tag will be registered as: Tag: XCON Reference: [ RFC-to-be ] Fifth, in the S-NAPTR Application Protocol Tags registry in the Straightforward-NAPTR (S-NAPTR) Parameters registry located at: http://www.iana.org/assignments/s-naptr-parameters/s-naptr-parameters.xml a new Application Protocol Tag will be registered as: Tag: CCMP Reference: [ RFC-to-be ] Sixth, IANA is to create a new registry called the "CCMP Message Type" registry. The reference for the new registry is [ RFC-to-be ]. The registration procedure for the new registry is: specification required. There are a set of initial registrations in the new registry. They are as follows: Message Type: optionsRequest Description: Used by a conference control client to query a conferencing system for its capabilities, in terms of supported messages (both standard and non-standard). Reference: [ RFC-to-be ] Message Type: optionsResponse Description: The optionsResponse returns a list of CCMP messages (both standard and non-standard) supported by the specific conference server. Reference: [ RFC-to-be ] Message Type: blueprintsRequest Description: Used by a conference control client to query a conferencing system for its capabilities, in terms of available conference blueprints. Reference: [ RFC-to-be ] Message Type: blueprintsResponse Description: The blueprintsResponse returns a list of blueprints supported by the specific conference server. Reference: [ RFC-to-be ] Message Type: confsRequest Description: Used by a conference control client to query a conferencing system for its scheduled/active conferences. Reference: [ RFC-to-be ] Message Type: confsResponse Description: The "confsResponse" returns the list of the currently activated/scheduled conferences at the server. Reference: [ RFC-to-be ] Message Type: confRequest Description: The "confRequest" is used to create a conference object and/or to request an operation on the conference object as a whole. Reference: [ RFC-to-be ] Message Type: confResponse Description: The "confResponse" indicates the result of the operation on the conference object as a whole. Reference: [ RFC-to-be ] Message Type: userRequest Description: The "userRequest" is used to request an operation on the "user" element in the conference object. Reference: [ RFC-to-be ] Message Type: userResponse Description: The "userResponse" indicates the result of the requested operation on the "user" element in the conference object. Reference: [ RFC-to-be ] Message Type: usersRequest Description: This "usersRequest" is used to manipulate the "users" element in the conference object, including parameters such as the "allowed-users-list", "join-handling", etc. Reference: [ RFC-to-be ] Message Type: usersResponse Description: This "usersResponse" indicates the result of the request to manipulate the "users" element in the conference object. Reference: [ RFC-to-be ] Message Type: sidebarRequest Description: This "sidebarRequest" is used to retrieve the information related to a sidebar or to create, change or delete a specific sidebar. Reference: [ RFC-to-be ] Message Type: sidebarResponse Description: This "sidebarResponse" indicates the result of the sidebarRequest. Reference: [ RFC-to-be ] Seventh, IANA is to create a new registry called the "CCMP Response Code" registry. The reference for the new registry is [ RFC-to-be ].The registration procedure for the new registry is: specification required. There are a set of initial registrations in the new registry. They are as follows: Response code: 200 Description: This code indicates that the request was successfully processed. Reference: [ RFC-to-be ] Response code: 409 Description: This code indicates that a requested "update" cannot be successfully completed by the server. An example of such situation is when the modification of an object cannot be applied due to conflicts arising at the server's side (e.g. because the client version of the object is an obsolete one and the requested modifications collide with the up-to-date state of the object stored at the server). Reference: [ RFC-to-be ] Response code: 400 Description: This code indicates that the request was badly formed in some fashion. Reference: [ RFC-to-be ] Response code: 401 Description: This code indicates that the user was not authorized for the specific operation on the conference object. Reference: [ RFC-to-be ] Response code: 403 Description: This code indicates that the specific operation is not valid for the target conference object. Reference: [ RFC-to-be ] Response code: 404 Description: This code indicates that the specific conference object was not found. Reference: [ RFC-to-be ] Response code: 420 Description: This code is returned in answer to a "userRequest/create" operation, in the case of a third-party invite, when the "confUserID" (contained in the "entity" attribute of the "userInfo" parameter) of the user to be added is unknown. Reference: [ RFC-to-be ] Response code: 421 Description: This code is returned in the case of requests in which the "confUserID" of the sender is invalid. Reference: [ RFC-to-be ] Response code: 422 Description: This code is returned in response to all requests wishing to access/manipulate a password-protected conference object, when the "conference-password" parameter contained in the request is wrong. Reference: [ RFC-to-be ] Response code: 423 Description: This code is returned in response to all requests wishing to access/manipulate a password-protected conference object, when the "conference-password" parameter is missing in the request. Reference: [ RFC-to-be ] Response code: 424 Description: This code is returned in response whenever the server wants to authenticate the requestor through the "subject" parameter and such a parameter is not provided in the request. Reference: [ RFC-to-be ] Response code: 425 Description: This code indicates that the conferencing system cannot delete the specific conference object because it is a parent for another conference object. Reference: [ RFC-to-be ] Response code: 426 Description: This code indicates that the target conference object cannot be changed (e.g., due to policies, roles, privileges, etc.). Reference: [ RFC-to-be ] Response code: 510 Description: This code indicates that the request could not be processed within a reasonable time, with the time specific to a conferencing system implementation. Reference: [ RFC-to-be ] Response code: 500 Description: This code indicates that the conferencing system experienced some sort of internal error. Reference: [ RFC-to-be ] Response code: 501 Description: This code indicates that the specific operation is not implemented on that conferencing system. Reference: [ RFC-to-be ] IANA understands that these seven actions are the only IANA Actions required upon approval of this document. |
2011-03-04
|
15 | (System) | State changed to Waiting for AD Go-Ahead from In Last Call. |
2011-02-26
|
15 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Stephen Kent. |
2011-02-22
|
15 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Stephen Kent |
2011-02-22
|
15 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Stephen Kent |
2011-02-18
|
15 | Cindy Morgan | Last call sent |
2011-02-18
|
15 | Cindy Morgan | State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: … State changed to In Last Call from Last Call Requested. The following Last Call Announcement was sent out: From: The IESG To: IETF-Announce CC: Reply-To: ietf@ietf.org Subject: Last Call: (Centralized Conferencing Manipulation Protocol) to Proposed Standard The IESG has received a request from the Centralized Conferencing WG (xcon) to consider the following document: - 'Centralized Conferencing Manipulation Protocol' as a Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2011-03-04. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. The file can be obtained via http://datatracker.ietf.org/doc/draft-ietf-xcon-ccmp/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-ietf-xcon-ccmp/ |
2011-02-18
|
15 | Robert Sparks | Last Call was requested |
2011-02-18
|
15 | Robert Sparks | State changed to Last Call Requested from AD Evaluation::AD Followup. |
2011-02-18
|
15 | Robert Sparks | Last Call text changed |
2011-02-18
|
15 | (System) | Ballot writeup text was added |
2011-02-18
|
15 | (System) | Last call text was added |
2011-02-18
|
15 | (System) | Ballot approval text was added |
2011-02-18
|
15 | Robert Sparks | Ballot writeup text changed |
2011-02-16
|
12 | (System) | New version available: draft-ietf-xcon-ccmp-12.txt |
2010-10-25
|
15 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2010-10-25
|
11 | (System) | New version available: draft-ietf-xcon-ccmp-11.txt |
2010-09-14
|
15 | Robert Sparks | State changed to AD Evaluation::Revised ID Needed from AD Evaluation by Robert Sparks |
2010-09-02
|
15 | Robert Sparks | State changed to AD Evaluation from Publication Requested by Robert Sparks |
2010-08-16
|
15 | Cindy Morgan | (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he … (1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Alan Johnston is the Document Shepherd. I have personally reviewed the draft-ietf-xcon-ccmp-10.txt version of this document and believe it is ready for forwarding to the IESG for publication. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? This document has had good review both within and outside the working group. I have no concerns about the reviews that have been performed. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? No. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. No known issues. No known IPR. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The XCON Working Group has a relatively small, but committed group of about a dozen individuals who have participated over many years and contributed large amounts of effort and text. We have developed our consensus around this document slowly. As such, I believe it is a strong consensus. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See the Internet-Drafts Checklist and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? Yes. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? The document does have normative and informative references. If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? Yes. If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Yes. Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC5226]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? This document registers a new XML namespace, a new XML schema, and the MIME type for the schema, the "XCON" Application Service tag, the "CCMP" Application Protocol tag. This document also defines registries for the CCMP operation types and response codes. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? Yes. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? The IESG has approved the following document: - 'Centralized Conferencing Manipulation Protocol' as a Proposed Standard This document is the product of the Centralized Conferencing Working Group. The IESG contact persons are Robert Sparks and Gonzalo Camarillo. A URL of this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-xcon-ccmp-10.txt Technical Summary The Centralized Conferencing Manipulation Protocol (CCMP) allows a multimedia conferencing system client to create, retrieve, change, and delete objects that describe a centralized conference. CCMP is a means to control basic and advanced conference features such as conference state and capabilities, participants, relative roles, and details. CCMP is a stateless, XML-based, client server protocol. Working Group Summary This document is a product of the XCON working group. Its contents have been uncontroversial in working group discussions. Document Quality There are multiple implementations of CCMP. Personnel Alan Johnston is the Document Shepherd for this document. Robert Sparks is the responsible Area Director. |
2010-08-16
|
15 | Cindy Morgan | [Note]: changed to 'Alan Johnston (alan.b.johnston@gmail.com) is the Document Shepherd.' by Cindy Morgan |
2010-08-16
|
15 | Cindy Morgan | Draft added in state Publication Requested by Cindy Morgan |
2010-08-16
|
15 | Cindy Morgan | Removed from agenda for telechat by Cindy Morgan |
2010-08-16
|
15 | Cindy Morgan | [Note]: '(1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does … [Note]: '(1.a) Who is the Document Shepherd for this document? Has the Document Shepherd personally reviewed this version of the document and, in particular, does he or she believe this version is ready for forwarding to the IESG for publication? Alan Johnston is the Document Shepherd. I have personally reviewed the draft-ietf-xcon-ccmp-10.txt version of this document and believe it is ready for forwarding to the IESG for publication. (1.b) Has the document had adequate review both from key WG members and from key non-WG members? Does the Document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? This document has had good review both within and outside the working group. I have no concerns about the reviews that have been performed. (1.c) Does the Document Shepherd have concerns that the document needs more review from a particular or broader perspective, e.g., security, operational complexity, someone familiar with AAA, internationalization or XML? No. (1.d) Does the Document Shepherd have any specific concerns or issues with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. Has an IPR disclosure related to this document been filed? If so, please include a reference to the disclosure and summarize the WG discussion and conclusion on this issue. No known issues. No known IPR. (1.e) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The XCON Working Group has a relatively small, but committed group of about a dozen individuals who have participated over many years and contributed large amounts of effort and text. We have developed our consensus around this document slowly. As such, I believe it is a strong consensus. (1.f) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is entered into the ID Tracker.) No. (1.g) Has the Document Shepherd personally verified that the document satisfies all ID nits? (See the Internet-Drafts Checklist and http://tools.ietf.org/tools/idnits/). Boilerplate checks are not enough; this check needs to be thorough. Has the document met all formal review criteria it needs to, such as the MIB Doctor, media type and URI type reviews? Yes. (1.h) Has the document split its references into normative and informative? Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? The document does have normative and informative references. If such normative references exist, what is the strategy for their completion? Are there normative references that are downward references, as described in [RFC3967]? If so, list these downward references to support the Area Director in the Last Call procedure for them [RFC3967]. (1.i) Has the Document Shepherd verified that the document IANA consideration section exists and is consistent with the body of the document? Yes. If the document specifies protocol extensions, are reservations requested in appropriate IANA registries? Yes. Are the IANA registries clearly identified? If the document creates a new registry, does it define the proposed initial contents of the registry and an allocation procedure for future registrations? Does it suggest a reasonable name for the new registry? See [RFC5226]. If the document describes an Expert Review process has Shepherd conferred with the Responsible Area Director so that the IESG can appoint the needed Expert during the IESG Evaluation? This document registers a new XML namespace, a new XML schema, and the MIME type for the schema, the "XCON" Application Service tag, the "CCMP" Application Protocol tag. This document also defines registries for the CCMP operation types and response codes. (1.j) Has the Document Shepherd verified that sections of the document that are written in a formal language, such as XML code, BNF rules, MIB definitions, etc., validate correctly in an automated checker? Yes. (1.k) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up? Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary Relevant content can frequently be found in the abstract and/or introduction of the document. If not, this may be an indication that there are deficiencies in the abstract or introduction. Working Group Summary Was there anything in WG process that is worth noting? For example, was there controversy about particular points or were there decisions where the consensus was particularly rough? Document Quality Are there existing implementations of the protocol? Have a significant number of vendors indicated their plan to implement the specification? Are there any reviewers that merit special mention as having done a thorough review, e.g., one that resulted in important changes or a conclusion that the document had no substantive issues? If there was a MIB Doctor, Media Type or other expert review, what was its course (briefly)? In the case of a Media Type review, on what date was the request posted? The IESG has approved the following document: - 'Centralized Conferencing Manipulation Protocol' as a Proposed Standard This document is the product of the Centralized Conferencing Working Group. The IESG contact persons are Robert Sparks and Gonzalo Camarillo. A URL of this Internet-Draft is: http://www.ietf.org/internet-drafts/draft-ietf-xcon-ccmp-10.txt Technical Summary The Centralized Conferencing Manipulation Protocol (CCMP) allows a multimedia conferencing system client to create, retrieve, change, and delete objects that describe a centralized conference. CCMP is a means to control basic and advanced conference features such as conference state and capabilities, participants, relative roles, and details. CCMP is a stateless, XML-based, client server protocol. Working Group Summary This document is a product of the XCON working group. Its contents have been uncontroversial in working group discussions. Document Quality There are multiple implementations of CCMP. Personnel Alan Johnston is the Document Shepherd for this document. Robert Sparks is the responsible Area Director.' added by Cindy Morgan |
2010-07-12
|
10 | (System) | New version available: draft-ietf-xcon-ccmp-10.txt |
2010-07-02
|
09 | (System) | New version available: draft-ietf-xcon-ccmp-09.txt |
2010-06-18
|
08 | (System) | New version available: draft-ietf-xcon-ccmp-08.txt |
2010-04-26
|
07 | (System) | New version available: draft-ietf-xcon-ccmp-07.txt |
2010-02-17
|
06 | (System) | New version available: draft-ietf-xcon-ccmp-06.txt |
2009-12-24
|
05 | (System) | New version available: draft-ietf-xcon-ccmp-05.txt |
2009-11-12
|
04 | (System) | New version available: draft-ietf-xcon-ccmp-04.txt |
2009-07-13
|
03 | (System) | New version available: draft-ietf-xcon-ccmp-03.txt |
2009-03-09
|
02 | (System) | New version available: draft-ietf-xcon-ccmp-02.txt |
2008-11-03
|
01 | (System) | New version available: draft-ietf-xcon-ccmp-01.txt |
2008-06-17
|
00 | (System) | New version available: draft-ietf-xcon-ccmp-00.txt |