End-to-End Signing and Object Encryption for the Extensible Messaging and Presence Protocol (XMPP)
draft-ietf-xmpp-e2e-09
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
09 | (System) | post-migration administrative database adjustment to the No Objection position for Steven Bellovin |
2012-08-22
|
09 | (System) | post-migration administrative database adjustment to the No Objection position for Russ Housley |
2004-07-26
|
09 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2004-07-26
|
09 | Amy Vezza | IESG state changed to Approved-announcement sent |
2004-07-26
|
09 | Amy Vezza | IESG has approved the document |
2004-07-26
|
09 | Amy Vezza | Closed "Approve" ballot |
2004-07-25
|
09 | Scott Hollenbeck | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Scott Hollenbeck |
2004-07-23
|
09 | Steven Bellovin | [Ballot Position Update] Position for Steve Bellovin has been changed to No Objection from Discuss by Steve Bellovin |
2004-07-14
|
09 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley |
2004-07-14
|
09 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2004-07-14
|
09 | (System) | New version available: draft-ietf-xmpp-e2e-09.txt |
2004-06-25
|
09 | (System) | Removed from agenda for telechat - 2004-06-24 |
2004-06-24
|
09 | Amy Vezza | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza |
2004-06-24
|
09 | Amy Vezza | [Ballot Position Update] New position, No Objection, has been recorded for Bill Fenner by Amy Vezza |
2004-06-24
|
09 | Thomas Narten | [Ballot Position Update] New position, No Objection, has been recorded for Thomas Narten by Thomas Narten |
2004-06-24
|
09 | Harald Alvestrand | [Ballot comment] Reviewed by Spencer Dawkins, Gen-ART The comments are serious enough to warrant addressing, but I don't think they warrant an extra DISCUSS. |
2004-06-24
|
09 | Harald Alvestrand | [Ballot Position Update] New position, No Objection, has been recorded for Harald Alvestrand by Harald Alvestrand |
2004-06-24
|
09 | Allison Mankin | [Ballot Position Update] New position, No Objection, has been recorded for Allison Mankin by Allison Mankin |
2004-06-24
|
09 | Jon Peterson | [Ballot Position Update] Position for Jon Peterson has been changed to No Objection from Undefined by Jon Peterson |
2004-06-24
|
09 | Jon Peterson | [Ballot Position Update] New position, Undefined, has been recorded for Jon Peterson by Jon Peterson |
2004-06-24
|
09 | Alex Zinin | [Ballot Position Update] New position, No Objection, has been recorded for Alex Zinin by Alex Zinin |
2004-06-24
|
09 | Margaret Cullen | [Ballot Position Update] New position, No Objection, has been recorded for Margaret Wasserman by Margaret Wasserman |
2004-06-23
|
09 | David Kessens | [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens |
2004-06-22
|
09 | Ted Hardie | [Ballot Position Update] New position, No Objection, has been recorded for Ted Hardie by Ted Hardie |
2004-06-21
|
09 | Steven Bellovin | [Ballot comment] Is some mechanism necessary by which a node can ascertain if the remote end supports this mechanism? |
2004-06-21
|
09 | Russ Housley | [Ballot discuss] In section 6.3, says that the subjectAltName in a certificate SHOULD contain a 'im:' URI a 'pres:' URI of the user. This … [Ballot discuss] In section 6.3, says that the subjectAltName in a certificate SHOULD contain a 'im:' URI a 'pres:' URI of the user. This is fine. Then, it says that the 'from' attribute SHOULD match the URI in the certificate. I prefer a MUST statement. Something like: If the certificate contains a URI, then it MUST match the 'from' attribute. Of course, the final document text must include the exception text. In the last paragraph of section 6.3, the certificate syntax does not support the suggested use of otherName. Name forms are identified by object identifiers, not ASCII strings. Section 6.9 does not provide a key management algorithm for EnvelopedData. Also, not all of the algorithms listed are specified in [CMS-ALG]. I propose the following replacement text: 6.9 Mandatory to Implement Cryptographic Algorithms All implementations MUST support the following algorithms. Implementations MAY support other algorithms as well. For CMS SignedData: - the SHA-1 message digest as specified in [CMS-ALG] section 2.1. - the RSA (PKCS #1 v1.5) with SHA-1 signature algorithm, as specified in [CMS-ALG] section 3.2. For CMS EnvelopedData: - the RSA (PKCS #1 v1.5) key transport, as specified in [CMS-ALG] section 4.2.1. - the AES-128 encryption algorithm in CBC mode, as specified in [CMS-AES]. { Note: [CMS-AES] is a new reference to RFC 3565. } I expected section 6 to say something about the correct processing of messages with invalid digital signatures, messages that cannot be decrypted, and messages that appear to be replayed. The only situation that seems to be addressed is when the name in the certificate does not match the name in the message. |
2004-06-21
|
09 | Russ Housley | [Ballot comment] Please change the title of the document to reflect the support of digital signatures as well as encryption. Please delete section … [Ballot comment] Please change the title of the document to reflect the support of digital signatures as well as encryption. Please delete section 1.2 prior to publication as an RFC. The section headings for section 3 and section 4 are misleading. I expected to see discussion of encryption, but the sections are about digital signatures. [CERT] should point to draft-ietf-smime-rfc2632bis-*, which is in the RFC Editor queue. [CMC] is pointing to the wrong document. It should be a reference to RFC 2797. Also, this should be an informative reference, not a normative one. [CMP] should be an informative reference, not a normative one. [CMS] should point to draft-ietf-smime-rfc3369bis-*, which is in the RFC Editor queue. [SMIME] should point to draft-ietf-smime-rfc2633bis-*, which is in the RFC Editor queue. I think [XML] should be an informative reference, not a normative one. |
2004-06-21
|
09 | Russ Housley | [Ballot Position Update] New position, Discuss, has been recorded for Russ Housley by Russ Housley |
2004-06-18
|
09 | Steven Bellovin | [Ballot discuss] What is the proper error reply when a node receives a message it can't decrypt? Are there standard error replies for the error … [Ballot discuss] What is the proper error reply when a node receives a message it can't decrypt? Are there standard error replies for the error conditions (i.e., timestamp failure) described in this document? |
2004-06-18
|
09 | Steven Bellovin | [Ballot Position Update] Position for Steve Bellovin has been changed to Discuss from Undefined by Steve Bellovin |
2004-06-18
|
09 | Steven Bellovin | [Ballot comment] Is some mechanism necessary by which a node can ascertain if the remote end supports this mechanism? What is the proper reply by … [Ballot comment] Is some mechanism necessary by which a node can ascertain if the remote end supports this mechanism? What is the proper reply by a node that receives a |
2004-06-18
|
09 | Steven Bellovin | [Ballot Position Update] New position, Undefined, has been recorded for Steve Bellovin by Steve Bellovin |
2004-06-11
|
09 | Scott Hollenbeck | [Ballot Position Update] New position, Yes, has been recorded for Scott Hollenbeck |
2004-06-11
|
09 | Scott Hollenbeck | Ballot has been issued by Scott Hollenbeck |
2004-06-11
|
09 | Scott Hollenbeck | Created "Approve" ballot |
2004-06-09
|
09 | Scott Hollenbeck | Placed on agenda for telechat - 2004-06-24 by Scott Hollenbeck |
2004-06-09
|
09 | Scott Hollenbeck | State Changes to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup by Scott Hollenbeck |
2004-06-09
|
09 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2004-06-09
|
08 | (System) | New version available: draft-ietf-xmpp-e2e-08.txt |
2004-06-08
|
09 | Scott Hollenbeck | State Changes to Waiting for AD Go-Ahead::Revised ID Needed from Waiting for AD Go-Ahead by Scott Hollenbeck |
2004-04-23
|
09 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2004-04-09
|
09 | Amy Vezza | Last call sent |
2004-04-09
|
09 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2004-04-08
|
09 | Scott Hollenbeck | Last Call was requested by Scott Hollenbeck |
2004-04-08
|
09 | Scott Hollenbeck | State Changes to Last Call Requested from Last Call Requested by Scott Hollenbeck |
2004-04-08
|
09 | (System) | Ballot writeup text was added |
2004-04-08
|
09 | (System) | Last call text was added |
2004-04-08
|
09 | (System) | Ballot approval text was added |
2004-04-08
|
09 | Scott Hollenbeck | State Changes to Last Call Requested from AD is watching by Scott Hollenbeck |
2004-04-08
|
09 | Scott Hollenbeck | Section 1.3 (Intellectual Property Notice) of this document should be removed and instead sent to the IETF for inclusion on the IPR notice page: http://www.ietf.org/ipr.html … Section 1.3 (Intellectual Property Notice) of this document should be removed and instead sent to the IETF for inclusion on the IPR notice page: http://www.ietf.org/ipr.html The [XML-REG] reference is now RFC 3688. Section 9.1: has the media type description been sent to the IETF-types list for review and comment? I would also refer to section 8 in the "security considerations" portion of the template. Section 9.2: the registrant must be something more stable than an IETF working group. RFC 3688 says "In the case of IETF developed standards, the Registrant will be the IESG". Section 9.2: how will revisions to the elements in the namespace be supported over time? I've been bugging document authors lately about a lack of text describing how versioning will be addressed; this document is also missing detail describing what happens in the future if something needs to change. Will a new namespace be needed? How will backwards compatibility be addressed if/when the namespace changes? |
2004-04-08
|
09 | Scott Hollenbeck | Intended Status has been changed to Proposed Standard from None |
2004-04-07
|
09 | Scott Hollenbeck | State Change Notice email list have been change to presnick@qualcomm.com, lisa@osafoundation.org, stpeter@jabber.org from , |
2004-03-10
|
09 | Scott Hollenbeck | Shepherding AD has been changed to Scott Hollenbeck from Ted Hardie |
2004-01-09
|
07 | (System) | New version available: draft-ietf-xmpp-e2e-07.txt |
2004-01-06
|
(System) | Posted related IPR disclosure: Jabber, Inc. and Jabber Software Foundation's Joint Statement About IPR Claimed in Specifications Produced by the XMPP WG | |
2003-11-21
|
06 | (System) | New version available: draft-ietf-xmpp-e2e-06.txt |
2003-08-25
|
05 | (System) | New version available: draft-ietf-xmpp-e2e-05.txt |
2003-07-02
|
04 | (System) | New version available: draft-ietf-xmpp-e2e-04.txt |
2003-05-21
|
03 | (System) | New version available: draft-ietf-xmpp-e2e-03.txt |
2003-04-22
|
02 | (System) | New version available: draft-ietf-xmpp-e2e-02.txt |
2003-04-08
|
01 | (System) | New version available: draft-ietf-xmpp-e2e-01.txt |
2003-03-17
|
09 | Ted Hardie | Draft Added by Hardie, Ted |
2003-02-06
|
00 | (System) | New version available: draft-ietf-xmpp-e2e-00.txt |