Real-time Inter-network Defense (RID)
draft-moriarty-post-inch-rid-12
Revision differences
Document history
| Date | Rev. | By | Action |
|---|---|---|---|
|
2012-08-22
|
12 | (System) | post-migration administrative database adjustment to the No Objection position for Sean Turner |
|
2012-08-22
|
12 | (System) | post-migration administrative database adjustment to the No Objection position for Robert Sparks |
|
2012-08-22
|
12 | (System) | post-migration administrative database adjustment to the No Objection position for Peter Saint-Andre |
|
2012-08-22
|
12 | (System) | post-migration administrative database adjustment to the Yes position for Tim Polk |
|
2012-08-22
|
12 | (System) | post-migration administrative database adjustment to the No Objection position for Lars Eggert |
|
2010-08-23
|
12 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
|
2010-08-23
|
12 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
|
2010-08-23
|
12 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
|
2010-08-23
|
12 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
|
2010-08-23
|
12 | (System) | IANA Action state changed to In Progress |
|
2010-08-17
|
12 | Cindy Morgan | State changed to RFC Ed Queue from Approved-announcement sent by Cindy Morgan |
|
2010-08-17
|
12 | Cindy Morgan | IESG state changed to Approved-announcement sent |
|
2010-08-17
|
12 | Cindy Morgan | IESG has approved the document |
|
2010-08-17
|
12 | Cindy Morgan | IESG state changed to Approved-announcement sent |
|
2010-08-17
|
12 | Cindy Morgan | IESG has approved the document |
|
2010-08-17
|
12 | Cindy Morgan | IESG state changed to Approved-announcement sent |
|
2010-08-17
|
12 | Cindy Morgan | IESG has approved the document |
|
2010-08-17
|
12 | Cindy Morgan | Closed "Approve" ballot |
|
2010-08-17
|
12 | Lars Eggert | [Ballot discuss] Section 1., paragraph 1: > The XML schema [4] and transport requirements contained in this > document are normative, all other … [Ballot discuss] Section 1., paragraph 1: > The XML schema [4] and transport requirements contained in this > document are normative, all other information provided is intended > as informative. More specifically, the following sections of this > document are intended as informative: 1, 2, 3, the subsections of 4 > including the introduction to 4, 4.1, and 4.2. > The following sections of this document are normative: > The sub-sections of 4 including 4.3, 4.4, 4.5, section 5, > and section 6. DISCUSS: With revision -11, this is now targeted to become an Informational RFC, which cannot have any normative parts. This is one symptom of the bigger issues with this document: it tries to publish a specification and a set of operational procedures defined by "another group" as an RFC, but the entire approach and chosen technologies are very different from what an IETF effort would result in. I'd really like to see an IESG Note on this document that makes this very clear. |
|
2010-08-17
|
12 | Lars Eggert | [Ballot Position Update] Position for Lars Eggert has been changed to No Objection from Discuss by Lars Eggert |
|
2010-07-06
|
12 | Sean Turner | [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss by Sean Turner |
|
2010-07-06
|
12 | Peter Saint-Andre | [Ballot comment] |
|
2010-07-06
|
12 | Peter Saint-Andre | [Ballot discuss] [cleared] |
|
2010-07-06
|
12 | Peter Saint-Andre | [Ballot Position Update] Position for Peter Saint-Andre has been changed to No Objection from Discuss by Peter Saint-Andre |
|
2010-07-06
|
12 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
|
2010-07-06
|
12 | (System) | New version available: draft-moriarty-post-inch-rid-12.txt |
|
2010-06-04
|
12 | (System) | Removed from agenda for telechat - 2010-06-03 |
|
2010-06-03
|
12 | Cindy Morgan | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan |
|
2010-06-03
|
12 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded by Gonzalo Camarillo |
|
2010-06-03
|
12 | Robert Sparks | [Ballot Position Update] Position for Robert Sparks has been changed to No Objection from Undefined by Robert Sparks |
|
2010-06-03
|
12 | Lars Eggert | [Ballot discuss] Section 1., paragraph 1: > The XML schema [4] and transport requirements contained in this > document are normative, all other … [Ballot discuss] Section 1., paragraph 1: > The XML schema [4] and transport requirements contained in this > document are normative, all other information provided is intended > as informative. More specifically, the following sections of this > document are intended as informative: 1, 2, 3, the subsections of 4 > including the introduction to 4, 4.1, and 4.2. > The following sections of this document are normative: > The sub-sections of 4 including 4.3, 4.4, 4.5, section 5, > and section 6. DISCUSS: With revision -11, this is now targeted to become an Informational RFC, which cannot have any normative parts. This is one symptom of the bigger issues with this document: it tries to publish a specification and a set of operational procedures defined by "another group" as an RFC, but the entire approach and chosen technologies are very different from what an IETF effort would result in. I'd really like to see an IESG Note on this document that makes this very clear. |
|
2010-06-03
|
12 | Lars Eggert | [Ballot Position Update] New position, Discuss, has been recorded by Lars Eggert |
|
2010-06-03
|
12 | Dan Romascanu | [Ballot comment] 1. Section 1 Note: The documented procedures represent the consensus of another group and are included to further describe … [Ballot comment] 1. Section 1 Note: The documented procedures represent the consensus of another group and are included to further describe environments where this schema can be used. The documented procedures are not required for conformance to this specification. The document refers to ‘another group’ – which other group? as this is an individual submission 2. Section 2: NPs typically manage and monitor their networks through a centralized network management system (NMS). The acronym NMS will be used to generically represent management servers on a network used for the management of network resources. The term ‘management server’ does not really mean anything. Many of the management applications are clients, or a combination of clients and servers using various protocols and interconnecting with various entities. Better use ‘management stations’ or ‘management systems’. |
|
2010-06-03
|
12 | Dan Romascanu | [Ballot discuss] |
|
2010-06-03
|
12 | Dan Romascanu | [Ballot Position Update] Position for Dan Romascanu has been changed to No Objection from Discuss by Dan Romascanu |
|
2010-06-02
|
12 | Sean Turner | [Ballot comment] #1) Header: r/Intended-status: Informational/Intended status: Informational #2) As per IDNits: Update reference to 3281 with 5755 and 3330 with 5735. #3) Sec 4.3.3.1: … [Ballot comment] #1) Header: r/Intended-status: Informational/Intended status: Informational #2) As per IDNits: Update reference to 3281 with 5755 and 3330 with 5735. #3) Sec 4.3.3.1: r/[RFC 5070]/[RFC5070] #4) Sec 4.3.3.1: r/One. Boolean./One. BOOLEAN. #5) Sec 4.3.3.2 & .3: r/IODEF 3.16/IODEF [RFC5070] section 3.16. #6) Sec 4.3.3.3: r/See RFC5070]/See [RFC5070] #7) Sec 6.3: r/Certificate Authority (CA)/Certification Authority (CA) |
|
2010-06-02
|
12 | Sean Turner | [Ballot discuss] #1) As per IDNits: DOWNREF - to 3379 needs to be called out in IETF LC. That's if you want to keep it. … [Ballot discuss] #1) As per IDNits: DOWNREF - to 3379 needs to be called out in IETF LC. That's if you want to keep it. I'm not sure you really need to point to 3379 if you're already pointing to 5280 for path validation. #2) Reference [3], indicates the date is 2002, but the but when you follow the link it's to the '08 version. Is this okay? If you're trying to point to the 2002, then this is a better reference: http://www.w3.org/TR/2002/PR-xmlenc-core-20021003/#sec-Algorithms #3) Reference [5]: 3.1) Indicates that the date is 2002, but when you follow the link it's to the '08 version. Is this okay? There are two additional canonical algorithms. If you're trying to point to the 2002, then this is a better reference: http://www.w3.org/TR/2002/REC-xmldsig-core-20020212/#sec-Algorithms 3.2) Regardless of version you point to, they require SHA-1. It is the only algorithm defined. We've been working hard to provide algorithm agility in our protocols. I think it's worth noting in the security considerations that the use of [5], currently, locks you in to using SHA-1. #4) 4.3.3.1-3 uses "Optional" and "Required" to indicate whether an attribute is included in a class. Shouldn't these be "OPTIONAL" and "REQUIRED"? #5) Sec 6.1: RID systems MUST implement and deploy HTTPS and optionally support other protocols such as BEEP I think you need to add a normative reference to HTTPS (RFC 2818) and an informative one to BEEP (RFC 3080). |
|
2010-06-02
|
12 | Sean Turner | [Ballot comment] #1) Header: r/Intended-status: Informational/Intended status: Informational #2) As per IDNits: Update reference to 3281 with 5755 and 3330 with 5735. #3) Sec 4.3.3.1: … [Ballot comment] #1) Header: r/Intended-status: Informational/Intended status: Informational #2) As per IDNits: Update reference to 3281 with 5755 and 3330 with 5735. #3) Sec 4.3.3.1: r/[RFC 5070]/[RFC5070] #4) Sec 4.3.3.1: r/One. Boolean./One. BOOLEAN. #5) Sec 4.3.3.2 & .3: r/IODEF 3.16/IODEF [RFC5070] section 3.16. #6) Sec 4.3.3.3: r/See RFC5070]/See [RFC5070] #7) Sec 6.3: r/Certificate Authority (CA)/Certification Authority (CA) |
|
2010-06-02
|
12 | Sean Turner | [Ballot discuss] #1) As per IDNits: DOWNREF - to 3379 needs to be called out in IETF LC. That's if you want to keep it. … [Ballot discuss] #1) As per IDNits: DOWNREF - to 3379 needs to be called out in IETF LC. That's if you want to keep it. I'm not sure you really need to point to 3379 if you're already pointing to 5280 for path validation. #2) Reference [3], indicates the date is 2002, but the but when you follow the link it's to the '08 version. Is this okay? If you're trying to point to the 2002, then this is a better reference: http://www.w3.org/TR/2002/PR-xmlenc-core-20021003/#sec-Algorithms #3) Reference [5]: 3.1) Indicates that the date is 2002, but when you follow the link it's to the '08 version. Is this okay? There are two additional canonical algorithms. If you're trying to point to the 2002, then this is a better reference: http://www.w3.org/TR/2002/REC-xmldsig-core-20020212/#sec-Algorithms 3.2) Regardless of version you point to, they require SHA-1. It is the only algorithm defined. We've been working hard to provide algorithm agility in our protocols. I think it's worth noting in the security considerations that the use of [5], currently, locks you in to using SHA-1. #4) 4.3.3.1-3 uses "Optional" and "Required" to indicate whether an attribute is included in a class. Shouldn't these be "OPTIONAL" and "REQUIRED"? #5) Sec 6.1: RID systems MUST implement and deploy HTTPS and optionally support other protocols such as BEEP I think you need to add a normative reference to HTTPS (RFC 2818) and an informative one to BEEP (RFC 3080). |
|
2010-06-02
|
12 | Sean Turner | [Ballot Position Update] New position, Discuss, has been recorded by Sean Turner |
|
2010-06-02
|
12 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded by Stewart Bryant |
|
2010-06-02
|
12 | Peter Saint-Andre | [Ballot comment] 1. In Section 5, the XML schema has an incorrect schemaLocation: I think that should be: 2. Section 6 states: The … [Ballot comment] 1. In Section 5, the XML schema has an incorrect schemaLocation: I think that should be: 2. Section 6 states: The specified transport protocols must use encryption to provide an additional level of security, integrity, and authentication through bi-directional certificate usage. Do you mean "MUST" here? Does "bi-directional certificate usage" mean mutual authentication? If so, let's state that. 3. In Section 3.2, should the "must" be "MUST" here? Trust relationships may also be defined through a bridged or hierarchical PKI in which both peers belong. and here? Systems used to send authenticated RID messages between networks MUST use a secured system and interface to connect to a border Network's RID systems. Each connection to a RID system must meet the security requirements agreed upon through the consortium regulations, peering, or SLAs. The RID system must only listen for and send RID messages on the designated port, which also must be over an encrypted tunnel meeting the minimum requirement of algorithms and key lengths established by the consortium, peering, or SLA. The selected cryptographic algorithms for symmetric encryption, digital signatures, and hash functions must meet minimum security levels of the times. The encryption strength must adhere to import and export regulations of the involved countries for data exchange. (There are similar issues in Section 6.3 regarding "may" and "must", and really throughout the document -- please check your usage of RFC 2119 terms for accuracy and consistency.) 4. In Section 7, we find: It should be noted, there are cases for transport where the RIDPolicy class MUST be presented in clear text as detailed in the transport document [RFCYYYY]. Here I think you want to replace "MUST" with "needs to" or somesuch. |
|
2010-06-02
|
12 | Peter Saint-Andre | [Ballot discuss] 1. The following text in Section 6.3 does not provide enough detail to ensure that any two given implementers can achieve interoperability: … [Ballot discuss] 1. The following text in Section 6.3 does not provide enough detail to ensure that any two given implementers can achieve interoperability: An optional extension to the authentication scheme would be to incorporate the use of attribute certificates to provide authorization capabilities as described in [RFC3281]. This may be useful as messages are sent from network peers to determine authorization levels based on the attribute information in the certificate, which could be used to determine priority of a trace request. The attribute information might be used to determine if a request should be processed automatically or if human intervention is required. If this cannot be specified in the requisite detail, perhaps it deserves to be deleted. |
|
2010-06-02
|
12 | Peter Saint-Andre | [Ballot Position Update] Position for Peter Saint-Andre has been changed to Discuss from No Objection by Peter Saint-Andre |
|
2010-06-02
|
12 | Peter Saint-Andre | [Ballot comment] 1. In Section 5, the XML schema has an incorrect schemaLocation: I think that should be: 2. Section 6 states: The … [Ballot comment] 1. In Section 5, the XML schema has an incorrect schemaLocation: I think that should be: 2. Section 6 states: The specified transport protocols must use encryption to provide an additional level of security, integrity, and authentication through bi-directional certificate usage. Do you mean "MUST" here? Does "bi-directional certificate usage" mean mutual authentication? If so, let's state that. 3. In Section 3.2, should the "must" be "MUST" here? Trust relationships may also be defined through a bridged or hierarchical PKI in which both peers belong. and here? Systems used to send authenticated RID messages between networks MUST use a secured system and interface to connect to a border Network's RID systems. Each connection to a RID system must meet the security requirements agreed upon through the consortium regulations, peering, or SLAs. The RID system must only listen for and send RID messages on the designated port, which also must be over an encrypted tunnel meeting the minimum requirement of algorithms and key lengths established by the consortium, peering, or SLA. The selected cryptographic algorithms for symmetric encryption, digital signatures, and hash functions must meet minimum security levels of the times. The encryption strength must adhere to import and export regulations of the involved countries for data exchange. (There are similar issues in Section 6.3 regarding "may" and "must".) |
|
2010-06-02
|
12 | Peter Saint-Andre | [Ballot Position Update] New position, No Objection, has been recorded by Peter Saint-Andre |
|
2010-06-02
|
12 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica |
|
2010-06-01
|
12 | Robert Sparks | [Ballot Position Update] Position for Robert Sparks has been changed to Undefined from Discuss by Robert Sparks |
|
2010-05-27
|
12 | Tim Polk | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Tim Polk |
|
2010-05-27
|
12 | Tim Polk | Ballot has been issued by Tim Polk |
|
2010-05-20
|
12 | Alexey Melnikov | [Ballot Position Update] Position for Alexey Melnikov has been changed to No Objection from Discuss by Alexey Melnikov |
|
2010-05-20
|
12 | Alexey Melnikov | [Ballot comment] In Section 2, last paragraph: Informative references for SNMP and NetConf are missing. Informative references for HTTPS and BEEP are missing elsewhere. |
|
2010-05-20
|
12 | Alexey Melnikov | [Ballot discuss] |
|
2010-05-13
|
12 | Tim Polk | Placed on agenda for telechat - 2010-06-03 by Tim Polk |
|
2010-05-03
|
12 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
|
2010-04-05
|
12 | Amy Vezza | Last call sent |
|
2010-04-05
|
12 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
|
2010-04-02
|
12 | Tim Polk | Last Call was requested by Tim Polk |
|
2010-04-02
|
12 | Tim Polk | State Changes to Last Call Requested from IESG Evaluation::AD Followup by Tim Polk |
|
2010-04-02
|
12 | Tim Polk | Intended Status has been changed to Informational from Proposed Standard |
|
2010-04-01
|
11 | (System) | New version available: draft-moriarty-post-inch-rid-11.txt |
|
2010-02-10
|
12 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
|
2010-02-10
|
10 | (System) | New version available: draft-moriarty-post-inch-rid-10.txt |
|
2010-01-21
|
12 | Cindy Morgan | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Cindy Morgan |
|
2010-01-21
|
12 | Cullen Jennings | [Ballot discuss] SOAP has many security mechanisms. It is no clear to me which ones need to be implemented by a device implementing this protocol. … [Ballot discuss] SOAP has many security mechanisms. It is no clear to me which ones need to be implemented by a device implementing this protocol. Without specifying this I don't see how we will have interoperability. Things like "you can use" digital signatures is pretty vague. Much of section 6 say that implementation need to do something but no idea of how to implement it. I imagine that informational would resolve most of this. |
|
2010-01-21
|
12 | Cullen Jennings | [Ballot Position Update] Position for Cullen Jennings has been changed to Discuss from Undefined by Cullen Jennings |
|
2010-01-21
|
12 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Undefined by Russ Housley |
|
2010-01-21
|
12 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon |
|
2010-01-21
|
12 | Dan Romascanu | [Ballot comment] 1. Section 1 Note: The documented procedures represent the consensus of another group and are included to further describe … [Ballot comment] 1. Section 1 Note: The documented procedures represent the consensus of another group and are included to further describe environments where this schema can be used. The documented procedures are not required for conformance to this specification. The document refers to ‘another group’ – which other group? as this is an individual submission 2. Section 2: NPs typically manage and monitor their networks through a centralized network management system (NMS). The acronym NMS will be used to generically represent management servers on a network used for the management of network resources. The term ‘management server’ does not really mean anything. Many of the management applications are clients, or a combination of clients and servers using various protocols and interconnecting with various entities. Better use ‘management stations’ or ‘management systems’. 3. SNMP and NETCONF should be informative references. |
|
2010-01-21
|
12 | Dan Romascanu | [Ballot discuss] The document has a normative reference to RFCYYYY which is http://tools.ietf.org/html/draft-moriarty-post-inch-rid-transport-00 - i.e. a 00 draft now expired. This concerns me and I … [Ballot discuss] The document has a normative reference to RFCYYYY which is http://tools.ietf.org/html/draft-moriarty-post-inch-rid-transport-00 - i.e. a 00 draft now expired. This concerns me and I cannot judge whether RFCYYYY is complete enough and stable enough rpo provide together with this document a complete interoperable and functional solution. |
|
2010-01-21
|
12 | Dan Romascanu | [Ballot Position Update] New position, Discuss, has been recorded by Dan Romascanu |
|
2010-01-21
|
12 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to Yes from Discuss by Tim Polk |
|
2010-01-21
|
12 | Adrian Farrel | [Ballot comment] Abstract doesn't talk about "this document" which is a little unusal and means that care has to be taken to understand the purpose … [Ballot comment] Abstract doesn't talk about "this document" which is a little unusal and means that care has to be taken to understand the purpose of the I-D. This could be fixed pretty easily. --- It is usual for the first section (and therefor the first text) in the body of the I-D to tbe Introduction --- Section 1 Note: The documented procedures represent the consensus of another group and are included to further describe environments where this schema can be used. The documented procedures are not required for conformance to this specification. This is a little mysterious. You have to get to Section 4 to find out what "other group" is meant. Note that it might be helpful to clarify that the "procedures" you refer to are not protocol procedures (which is the type of procedure we are used to seeing in IETF documents), but "incident handling procedures." It would be nice if Section 4 included references to other documents, not just to the groups. |
|
2010-01-21
|
12 | Adrian Farrel | [Ballot comment] Abstract doesn't talk about "this document" which is a little unusal and means that care has to be taken to understand the purpose … [Ballot comment] Abstract doesn't talk about "this document" which is a little unusal and means that care has to be taken to understand the purpose of the I-D. This could be fixed pretty easily. --- It is usual for the first section (and therefor the first text) in the body of the I-D to tbe Introduction --- Section 1 Note: The documented procedures represent the consensus of another group and are included to further describe environments where this schema can be used. The documented procedures are not required for conformance to this specification. This is a little mysterious. You have to get to Section 4 to find out what "other group" is meant. Note that it might be helpful to clarify that the "procedures" you refer to are not protocol procedures (which is the type of procedure we are used to seeing in IETF documents), but "incident handling procedures." It would be nice if Section 4 included references to other documents, not just to the groups. |
|
2010-01-21
|
12 | Adrian Farrel | [Ballot Position Update] New position, No Objection, has been recorded by Adrian Farrel |
|
2010-01-19
|
12 | Ralph Droms | [Ballot Position Update] New position, No Objection, has been recorded by Ralph Droms |
|
2010-01-19
|
12 | Robert Sparks | [Ballot discuss] I may be missing some context, but this looks like a substantial set of changes since the SOAP based document that was LCed … [Ballot discuss] I may be missing some context, but this looks like a substantial set of changes since the SOAP based document that was LCed in early 2008. Should the current document be IETF LCed? |
|
2010-01-19
|
12 | Robert Sparks | [Ballot Position Update] New position, Discuss, has been recorded by Robert Sparks |
|
2010-01-17
|
12 | Alexey Melnikov | [Ballot comment] In Section 2, last paragraph: Informative references for SNMP and NetConf are missing. Informative references for HTTPS and BEEP are missing elsewhere. 4.3.3.1 … [Ballot comment] In Section 2, last paragraph: Informative references for SNMP and NetConf are missing. Informative references for HTTPS and BEEP are missing elsewhere. 4.3.3.1 RequestStatus Class AuthorizationStatus 4. ext-value. An escape value used to extend this attribute. See IODEF Section 5.1. This needs a proper reference to RFC 5070. Justification 6. ext-value. An escape value used to extend this attribute. See IODEF Section 5.1. As above. 4.4.1 TraceRequest Time Stamps (DectectTime, StartTime, EndTime, ReportTime) Here and in several other sections: typo: DetectTime 10. Normative References [RFC3280] "Internet X.509 Public Key Infrastructure: Certificate and Certificate Revocation List (CRL) Profile." R. Housley, W. Ford, W. Polk, and D. Solo. April 2002. RFC3280 --> RFC5280 |
|
2010-01-17
|
12 | Alexey Melnikov | [Ballot discuss] AuthorizationStatus-ext Optional. STRING. A means by which to extend the AuthorizationStatus attribute. See IODEF Section 5.1. Justification-ext … [Ballot discuss] AuthorizationStatus-ext Optional. STRING. A means by which to extend the AuthorizationStatus attribute. See IODEF Section 5.1. Justification-ext Optional. STRING. A means by which to extend the Justification attribute. See IODEF Section 5.1. My reading of section 5.1 of RFC 5070 is that the two attributes must be named ext-AuthorizationStatus/ext-Justification, i.e. that "ext-" must be a prefix, not a suffix. Note that the schema section (section 5) has the correct names. MsgType-ext Optional. STRING. A means by which to extend the MsgType attribute. See IODEF Section 5.1. MsgDestination-ext Optional. STRING. A means by which to extend the MsgDestination attribute. See IODEF Section 5.1. As above. 4.5.1.1 RID TraceRequest Example 192.0.2.3/iodef:Address> Typo in the closing tag: missing "<" before "/". |
|
2010-01-17
|
12 | Alexey Melnikov | [Ballot comment] In Section 2, last paragraph: Informative references for SNMP and NetConf are missing. 4.3.3.1 RequestStatus Class AuthorizationStatus 4. ext-value. An … [Ballot comment] In Section 2, last paragraph: Informative references for SNMP and NetConf are missing. 4.3.3.1 RequestStatus Class AuthorizationStatus 4. ext-value. An escape value used to extend this attribute. See IODEF Section 5.1. This needs a proper reference to RFC 5070. Justification 6. ext-value. An escape value used to extend this attribute. See IODEF Section 5.1. As above. 4.4.1 TraceRequest Time Stamps (DectectTime, StartTime, EndTime, ReportTime) Here and in several other sections: typo: DetectTime 10. Normative References [RFC3280] "Internet X.509 Public Key Infrastructure: Certificate and Certificate Revocation List (CRL) Profile." R. Housley, W. Ford, W. Polk, and D. Solo. April 2002. RFC3280 --> RFC5280 |
|
2010-01-17
|
12 | Alexey Melnikov | [Ballot discuss] AuthorizationStatus-ext Optional. STRING. A means by which to extend the AuthorizationStatus attribute. See IODEF Section 5.1. Justification-ext … [Ballot discuss] AuthorizationStatus-ext Optional. STRING. A means by which to extend the AuthorizationStatus attribute. See IODEF Section 5.1. Justification-ext Optional. STRING. A means by which to extend the Justification attribute. See IODEF Section 5.1. My reading of section 5.1 of RFC 5070 is that the two attributes must be named ext-AuthorizationStatus/ext-Justification, i.e. that "ext-" must be a prefix, not a suffix. Note that the schema section (section 5) has the correct names. MsgType-ext Optional. STRING. A means by which to extend the MsgType attribute. See IODEF Section 5.1. MsgDestination-ext Optional. STRING. A means by which to extend the MsgDestination attribute. See IODEF Section 5.1. As above. 4.5.1.1 RID TraceRequest Example 192.0.2.3/iodef:Address> Typo in the closing tag: missing "<" before "/". |
|
2010-01-17
|
12 | Alexey Melnikov | [Ballot Position Update] New position, Discuss, has been recorded by Alexey Melnikov |
|
2010-01-17
|
12 | Alexey Melnikov | [Ballot comment] In Section 2, last paragraph: Informative references for SNMP and NetConf are missing. 4.3.3.1 RequestStatus Class AuthorizationStatus 4. ext-value. An … [Ballot comment] In Section 2, last paragraph: Informative references for SNMP and NetConf are missing. 4.3.3.1 RequestStatus Class AuthorizationStatus 4. ext-value. An escape value used to extend this attribute. See IODEF Section 5.1. This needs a proper reference to RFC 5070. Justification 6. ext-value. An escape value used to extend this attribute. See IODEF Section 5.1. As above. 4.4.1 TraceRequest Time Stamps (DectectTime, StartTime, EndTime, ReportTime) Here and in several other sections: typo: DetectTime 10. Normative References [RFC3280] "Internet X.509 Public Key Infrastructure: Certificate and Certificate Revocation List (CRL) Profile." R. Housley, W. Ford, W. Polk, and D. Solo. April 2002. RFC3280 --> RFC5280 |
|
2010-01-17
|
12 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to Undefined from No Objection by Russ Housley |
|
2010-01-07
|
12 | Amy Vezza | State Changes to IESG Evaluation from IESG Evaluation - Defer by Amy Vezza |
|
2009-12-18
|
12 | Sam Weiler | Request for Telechat review by SECDIR is assigned to Larry Zhu |
|
2009-12-18
|
12 | Sam Weiler | Request for Telechat review by SECDIR is assigned to Larry Zhu |
|
2009-12-17
|
12 | Tim Polk | Placed on agenda for telechat - 2010-01-21 by Tim Polk |
|
2009-07-13
|
09 | (System) | New version available: draft-moriarty-post-inch-rid-09.txt |
|
2008-11-24
|
08 | (System) | New version available: draft-moriarty-post-inch-rid-08.txt |
|
2008-10-21
|
07 | (System) | New version available: draft-moriarty-post-inch-rid-07.txt |
|
2008-10-08
|
12 | Tim Polk | State Change Notice email list have been change to from Moriarty@ll.mit.edu, bht@cert.org |
|
2008-04-15
|
06 | (System) | New version available: draft-moriarty-post-inch-rid-06.txt |
|
2008-03-27
|
12 | Sam Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Larry Zhu. |
|
2008-03-18
|
12 | Tim Polk | Removed from agenda for telechat - 2008-03-27 by Tim Polk |
|
2008-03-17
|
12 | Cullen Jennings | [Ballot Position Update] Position for Cullen Jennings has been changed to Undefined from Discuss by Cullen Jennings |
|
2008-03-06
|
12 | Cullen Jennings | [Ballot discuss] I don't see support for publishing these as PS. |
|
2008-03-06
|
12 | Cullen Jennings | [Ballot discuss] This is discuss discuss that I will clear or clarify after the call. I am very worried about setting precedent of publishing documents … [Ballot discuss] This is discuss discuss that I will clear or clarify after the call. I am very worried about setting precedent of publishing documents from WG that did not achieve consensus. I don't see support for publishing these as PS. |
|
2008-03-06
|
12 | Cullen Jennings | [Ballot Position Update] New position, Discuss, has been recorded by Cullen Jennings |
|
2008-03-06
|
12 | Magnus Westerlund | State Changes to IESG Evaluation - Defer from IESG Evaluation by Magnus Westerlund |
|
2008-03-05
|
12 | Lisa Dusseault | [Ballot discuss] The use of SOAP in IETF protocols is an interoperability risk that isn't appropriate for an individual submission on Standards Track. The framing … [Ballot discuss] The use of SOAP in IETF protocols is an interoperability risk that isn't appropriate for an individual submission on Standards Track. The framing that SOAP provides isn't necessary if something is to be a standard and therefore well-understood. The draft doesn't motivate the use of SOAP despite declarations to the contrary. Both HTTP and BEEP would allow messages in an INCH schema to be sent without the SOAP envelope. The use of SOAP isn't sufficiently specified. There's all kinds of options and flexibility. Are headers required? What about message paths? When is fault signalling desired or required or not allowed, and which faults? Are multiple header blocks allowed or forbidden? Why are responses in plain HTTP and not SOAP? That doesn't seem to be SOAP-compliant. Support for chunked transfer-encoding is a MUST in HTTP, not a SHOULD. I am unaware of any review by the XML Directorate or the Apps review team. It's not that we require that for any doc with XML Schemas, but this proposal goes where IETF proposals don't usually go, and the XML Directorate has more experience with SOAP than the average IETFer. |
|
2008-03-05
|
12 | Lisa Dusseault | [Ballot discuss] The use of SOAP in IETF protocols is an interoperability risk that isn't appropriate for an individual submission on Standards Track. The framing … [Ballot discuss] The use of SOAP in IETF protocols is an interoperability risk that isn't appropriate for an individual submission on Standards Track. The framing that SOAP provides isn't necessary if something is to be a standard and therefore well-understood. The draft doesn't motivate the use of SOAP despite declarations to the contrary. Both HTTP and BEEP would allow messages in an INCH schema to be sent without the SOAP envelope. The use of SOAP isn't sufficiently specified. There's all kinds of options and flexibility. Are headers required? What about message paths? Why are responses in plain HTTP and not SOAP? That doesn't seem to be SOAP-compliant. Support for chunked transfer-encoding is a MUST in HTTP, not a SHOULD. |
|
2008-03-05
|
12 | Lisa Dusseault | [Ballot Position Update] New position, Discuss, has been recorded by Lisa Dusseault |
|
2008-03-05
|
12 | Tim Polk | [Ballot discuss] This discuss applies soley to draft-moriarty-post-inch-rid-soap. The author has proposed resolution for issues Gen-ART and Security Directorate reviews, which will require a new … [Ballot discuss] This discuss applies soley to draft-moriarty-post-inch-rid-soap. The author has proposed resolution for issues Gen-ART and Security Directorate reviews, which will require a new draft. This discuss is a placeholder for resolution of those issues. I will move back to YES once those issues have been resolved. The reviews are appended below for completeness. (BTW, I do not believe the reference issues noted in the Gen-ART Review constitue a downref.) Gen-ART Review Document: draft-moriarty-post-inch-rid-soap-05 Reviewer: Ben Campbell Review Date: 2008-03-03 IESG Telechat date: 06 March 2008 Summary: This document is almost ready for publication as a standards RFC, but there are some nits that should be considered first. Comments: Disclaimers: I am not an expert in SOAP wrapper specifications, and cannot offer an informed opinion about whether this document is sufficiently specified for that purpose. (I also note that there is controversy about whether SOAP is appropriate for this sort of thing at all, but again, hold no informed opinion.) Additionally, the security considerations in this draft refer heavily to the other RID documents. I am making the assumption that the referenced documents sufficiently describe the security requirements and potential attacks for RID in general. If that turns out not to be the case, then the security consideration section of this document might need some more meat. Details: I performed a Gen-ART review of version 3 of this draft. Most of my specific comments have been resolved, but a few remain: 1) Since this document specifies SOAP over HTTP, I would like to see at least one of the examples show the SOAP exchange in the context of actual HTTP messages. 2) I am still not sure the reference for HTTP/TLS in section 1 is correct. The original draft referenced RFC 4346 for HTTP/TLS, and I commented that 4346 defines TLS, but not HTTP/TLS. The author changed the wording to "HTTP over TLS V1.1 [RFC4346]", which technically solves the problem, but we are then left with no normative reference for HTTP/TLS at all. It may be that this is the best we can do, as the only reference I could dig up for this is 2818, which is informational--but it seems unsatisfying to not be able to come up with _some_ normative reference for HTTP/TLS. 3) There are still IDNIT warnings, quoted below. There is something in the reference formating that seems to confuse IDNits. I removed warnings that were clearly [to me] false. Miscellaneous warnings: ---------------------------------------------------------------------------- == The copyright year in the IETF Trust Copyright Line does not match the current year == Outdated reference: A later version (-05) exists of draft-moriarty-post-inch-rid-02 -- Possible downref: Non-RFC (?) normative reference: ref. '2' -- Possible downref: Non-RFC (?) normative reference: ref. '3' -- Possible downref: Non-RFC (?) normative reference: ref. '4' -- Possible downref: Non-RFC (?) normative reference: ref. '5' --- Security Directorate Review (Glen Zorn) -------- I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. Security-related comments: * I find it difficult to reconcile the statement in the Introduction that "The Transport Layer Security (TLS) Protocol [RFC4346] MUST be followed for the implementation and deployment of this protocol." with the one in section 5.1 that says "For transport confidentiality, TLS (whether HTTP/TLS or the BEEP TLS profile) MUST be supported and SHOULD be used."; they seem at least somewhat contradictory. * In the Security Considerations section, to say that "All security considerations of related documents MUST be considered, including those in the following documents: the Incident Object Description Exchange (IODEF), [RFCXXXX] and Real-time Inter-network Defense (RID) [RFCYYYY]." seems simultaneously redundant (If considerations aren't considered then what is done with them?) and non-specific (Are the security considerations in the referenced documents especially important? If so, why?). * The fact that "HTTP/TLS is not ideally suited for IODEF/RID transport" is acknowledged in section 3.1 suggests that special attention should have been paid to security threats against this transport, since the re-use of protocols for purposes which they were not designed can often expose previously undiscovered weaknesses. However, it's not clear to be that this analysis has been conducted. A few general comments: * Since the inch WG has concluded, it would be better to replace "Extended Incident Handling Working Group" with "Network Working Group" in the first page header. * Section 3, last sentence says "Other protocol bindings may be defined in separate documents." However, the authors define another binding one section later (not in a separate document. Suggest changing to "This does not preclude the definition of other protocol bindings (for example, see Section 3.2)." or some such, or possibly just removing the sentence. * Some of the references are out of date: draft-ietf-inch-iodef-14.txt was published as a Proposed Standard, RFC 5070 (http://www.ietf.org/rfc/rfc5070.txt), on 2007-12-17 & draft-moriarty-post-inch-rid is now a -05. * idnits generates a raft of other complaint, the most serious of which are about lines that are too long. |
|
2008-03-05
|
12 | Tim Polk | [Ballot discuss] This discuss applies soley to draft-moriarty-post-inch-rid-soap. The author has proposed resolution for issues Gen-ART and Security Directorate reviews, which will require a new … [Ballot discuss] This discuss applies soley to draft-moriarty-post-inch-rid-soap. The author has proposed resolution for issues Gen-ART and Security Directorate reviews, which will require a new draft. This discuss is a placeholder for resolution of those issues. I will move back to YES once those issues have been resolved. The reviews are appended below for completeness. (BTW, I do not believe the reference issues noted in the Gen-ART Review constitue a downref.) Gen-ART Review Document: draft-moriarty-post-inch-rid-soap-05 Reviewer: Ben Campbell Review Date: 2008-03-03 IESG Telechat date: 06 March 2008 Summary: This document is almost ready for publication as a standards RFC, but there are some nits that should be considered first. Comments: Disclaimers: I am not an expert in SOAP wrapper specifications, and cannot offer an informed opinion about whether this document is sufficiently specified for that purpose. (I also note that there is controversy about whether SOAP is appropriate for this sort of thing at all, but again, hold no informed opinion.) Additionally, the security considerations in this draft refer heavily to the other RID documents. I am making the assumption that the referenced documents sufficiently describe the security requirements and potential attacks for RID in general. If that turns out not to be the case, then the security consideration section of this document might need some more meat. Details: I performed a Gen-ART review of version 3 of this draft. Most of my specific comments have been resolved, but a few remain: 1) Since this document specifies SOAP over HTTP, I would like to see at least one of the examples show the SOAP exchange in the context of actual HTTP messages. 2) I am still not sure the reference for HTTP/TLS in section 1 is correct. The original draft referenced RFC 4346 for HTTP/TLS, and I commented that 4346 defines TLS, but not HTTP/TLS. The author changed the wording to "HTTP over TLS V1.1 [RFC4346]", which technically solves the problem, but we are then left with no normative reference for HTTP/TLS at all. It may be that this is the best we can do, as the only reference I could dig up for this is 2818, which is informational--but it seems unsatisfying to not be able to come up with _some_ normative reference for HTTP/TLS. 3) There are still IDNIT warnings, quoted below. There is something in the reference formating that seems to confuse IDNits. I removed warnings that were clearly [to me] false. Miscellaneous warnings: ---------------------------------------------------------------------------- == The copyright year in the IETF Trust Copyright Line does not match the current year == Outdated reference: A later version (-05) exists of draft-moriarty-post-inch-rid-02 -- Possible downref: Non-RFC (?) normative reference: ref. '2' -- Possible downref: Non-RFC (?) normative reference: ref. '3' -- Possible downref: Non-RFC (?) normative reference: ref. '4' -- Possible downref: Non-RFC (?) normative reference: ref. '5' --- Security Directorate Review (Glen Zorn) -------- I have reviewed this document as part of the security directorate's ongoing effort to review all IETF documents being processed by the IESG. These comments were written primarily for the benefit of the security area directors. Document editors and WG chairs should treat these comments just like any other last call comments. Security-related comments: * I find it difficult to reconcile the statement in the Introduction that "The Transport Layer Security (TLS) Protocol [RFC4346] MUST be followed for the implementation and deployment of this protocol." with the one in section 5.1 that says "For transport confidentiality, TLS (whether HTTP/TLS or the BEEP TLS profile) MUST be supported and SHOULD be used."; they seem at least somewhat contradictory. * In the Security Considerations section, to say that "All security considerations of related documents MUST be considered, including those in the following documents: the Incident Object Description Exchange (IODEF), [RFCXXXX] and Real-time Inter-network Defense (RID) [RFCYYYY]." seems simultaneously redundant (If considerations aren't considered then what is done with them?) and non-specific (Are the security considerations in the referenced documents especially important? If so, why?). * The fact that "HTTP/TLS is not ideally suited for IODEF/RID transport" is acknowledged in section 3.1 suggests that special attention should have been paid to security threats against this transport, since the re-use of protocols for purposes which they were not designed can often expose previously undiscovered weaknesses. However, it's not clear to be that this analysis has been conducted. A few general comments: * Since the inch WG has concluded, it would be better to replace "Extended Incident Handling Working Group" with "Network Working Group" in the first page header. * Section 3, last sentence says "Other protocol bindings may be defined in separate documents." However, the authors define another binding one section later (not in a separate document. Suggest changing to "This does not preclude the definition of other protocol bindings (for example, see Section 3.2)." or some such, or possibly just removing the sentence. * Some of the references are out of date: draft-ietf-inch-iodef-14.txt was published as a Proposed Standard, RFC 5070 (http://www.ietf.org/rfc/rfc5070.txt), on 2007-12-17 & draft-moriarty-post-inch-rid is now a -05. * idnits generates a raft of other complaint, the most serious of which are about lines that are too long. |
|
2008-03-05
|
12 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to Discuss from Yes by Tim Polk |
|
2008-03-05
|
12 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko |
|
2008-03-05
|
12 | Jari Arkko | [Ballot comment] XXXX = 5070 |
|
2008-03-03
|
12 | Russ Housley | [Ballot comment] From Ben Campbell's Gen-ART Review of draft-moriarty-post-inch-rid-soap-05.txt: Since this document specifies SOAP over HTTP, I would like to see … [Ballot comment] From Ben Campbell's Gen-ART Review of draft-moriarty-post-inch-rid-soap-05.txt: Since this document specifies SOAP over HTTP, I would like to see at least one of the examples show the SOAP exchange in the context of actual HTTP messages. I am still not sure the reference for HTTP/TLS in section 1 is correct. The original draft referenced RFC 4346 for HTTP/TLS, and I commented that 4346 defines TLS, but not HTTP/TLS. The author changed the wording to "HTTP over TLS V1.1 [RFC4346]", which technically solves the problem, but we are then left with no normative reference for HTTP/TLS at all. It may be that this is the best we can do, as the only reference I could dig up for this is 2818, which is informational--but it seems unsatisfying to not be able to come up with _some_ normative reference for HTTP/TLS. |
|
2008-03-03
|
12 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley |
|
2008-03-03
|
12 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund |
|
2008-02-29
|
12 | Tim Polk | [Note]: 'corrected area' added by Tim Polk |
|
2008-02-29
|
12 | Tim Polk | Area acronymn has been changed to sec from gen |
|
2008-02-29
|
12 | Tim Polk | [Ballot Position Update] New position, Yes, has been recorded for Tim Polk |
|
2008-02-29
|
12 | Tim Polk | Ballot has been issued by Tim Polk |
|
2008-02-29
|
12 | Tim Polk | Created "Approve" ballot |
|
2008-02-27
|
12 | Tim Polk | State Changes to IESG Evaluation from In Last Call by Tim Polk |
|
2008-02-27
|
12 | Tim Polk | Placed on agenda for telechat - 2008-03-06 by Tim Polk |
|
2008-02-25
|
05 | (System) | New version available: draft-moriarty-post-inch-rid-05.txt |
|
2008-02-22
|
12 | Amanda Baber | IANA Last Call comments: Action 1: Upon approval of this document, the IANA will make the following assignments in the "ns" registry located at http://www.iana.org/assignments/xml-registry/ns.html … IANA Last Call comments: Action 1: Upon approval of this document, the IANA will make the following assignments in the "ns" registry located at http://www.iana.org/assignments/xml-registry/ns.html Registration ID URI template Reference ------ ------------------------- ------------ -------- iodef-rid-1.0 urn:ietf:params:xml:ns:iodef-rid-1.0 iodef-rid-1.0 [RFC-moriarty-post-inch-rid-02] Action 2: Upon approval of this document, the IANA will make the following assignments in the "schema" registry located at http://www.iana.org/assignments/xml-registry/schema.html ID URI Filename Reference ------ ------------------------- ------------ -------- iodef-rid-1.0 urn:ietf:params:xml:schema:iodef-rid-1.0 iodef-rid-1.0 [RFC-moriarty-post-inch-rid-02] We understand the above to be the only IANA Actions for this document. |
|
2008-02-22
|
04 | (System) | New version available: draft-moriarty-post-inch-rid-04.txt |
|
2008-02-19
|
03 | (System) | New version available: draft-moriarty-post-inch-rid-03.txt |
|
2008-01-30
|
12 | Sam Weiler | Request for Last Call review by SECDIR is assigned to Larry Zhu |
|
2008-01-30
|
12 | Sam Weiler | Request for Last Call review by SECDIR is assigned to Larry Zhu |
|
2008-01-30
|
12 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
|
2008-01-30
|
12 | Tim Polk | State Changes to Last Call Requested from AD Evaluation::AD Followup by Tim Polk |
|
2008-01-30
|
12 | Tim Polk | Last Call was requested by Tim Polk |
|
2008-01-30
|
12 | (System) | Ballot writeup text was added |
|
2008-01-30
|
12 | (System) | Last call text was added |
|
2008-01-30
|
12 | (System) | Ballot approval text was added |
|
2007-12-27
|
12 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
|
2007-12-27
|
02 | (System) | New version available: draft-moriarty-post-inch-rid-02.txt |
|
2007-12-21
|
12 | Tim Polk | State Changes to AD Evaluation::Revised ID Needed from Publication Requested by Tim Polk |
|
2007-10-26
|
12 | Tim Polk | Responsible AD has been changed to Tim Polk from Sam Hartman |
|
2007-04-16
|
12 | Dinara Suleymanova | Draft Added by Dinara Suleymanova in state Publication Requested |
|
2007-04-11
|
01 | (System) | New version available: draft-moriarty-post-inch-rid-01.txt |
|
2006-11-15
|
00 | (System) | New version available: draft-moriarty-post-inch-rid-00.txt |