Vectors of Trust
draft-richer-vectors-of-trust-15
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2018-10-10
|
15 | (System) | RFC Editor state changed to AUTH48-DONE from AUTH48 |
2018-10-08
|
15 | (System) | RFC Editor state changed to AUTH48 from RFC-EDITOR |
2018-09-24
|
15 | (System) | RFC Editor state changed to RFC-EDITOR from EDIT |
2018-08-31
|
15 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2018-08-28
|
15 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2018-08-28
|
15 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2018-08-23
|
15 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2018-08-20
|
15 | (System) | RFC Editor state changed to EDIT |
2018-08-20
|
15 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2018-08-20
|
15 | (System) | Announcement was received by RFC Editor |
2018-08-17
|
15 | (System) | IANA Action state changed to In Progress |
2018-08-17
|
15 | Amy Vezza | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2018-08-17
|
15 | Amy Vezza | IESG has approved the document |
2018-08-17
|
15 | Amy Vezza | Closed "Approve" ballot |
2018-08-17
|
15 | Amy Vezza | Ballot approval text was generated |
2018-08-17
|
15 | Benjamin Kaduk | IESG state changed to Approved-announcement to be sent from IESG Evaluation::AD Followup |
2018-08-17
|
15 | Justin Richer | New version available: draft-richer-vectors-of-trust-15.txt |
2018-08-17
|
15 | (System) | New version approved |
2018-08-17
|
15 | (System) | Request for posting confirmation emailed to previous authors: Justin Richer , Leif Johansson |
2018-08-17
|
15 | Justin Richer | Uploaded new revision |
2018-08-07
|
14 | Alissa Cooper | [Ballot Position Update] Position for Alissa Cooper has been changed to No Objection from Discuss |
2018-08-06
|
14 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2018-08-06
|
14 | Justin Richer | New version available: draft-richer-vectors-of-trust-14.txt |
2018-08-06
|
14 | (System) | New version approved |
2018-08-06
|
14 | (System) | Request for posting confirmation emailed to previous authors: Justin Richer , Leif Johansson |
2018-08-06
|
14 | Justin Richer | Uploaded new revision |
2018-08-03
|
13 | Ben Campbell | [Ballot Position Update] Position for Ben Campbell has been changed to No Objection from Discuss |
2018-08-03
|
13 | Ben Campbell | [Ballot comment] I am clearing my DISCUSS since the authors have indicated they still see value in the IANA registry as specified. But since my … [Ballot comment] I am clearing my DISCUSS since the authors have indicated they still see value in the IANA registry as specified. But since my opinion has not changed, I am keeping the point (but demoting it to a comment: I am concerned that the IANA considerations may be inappropriate for the purpose of the document, and possibly harmful. I'd like to see some discussion of this; if afterwards people still think it's a good idea, I will clear. If I understand correctly, the interpretation of a component name is entirely contextual to the trust framework. While trust frameworks are encouraged to reuse existing components for similar purposes, there's no real way to enforce that. And given that even if trust frameworks share a component, they may assign entirely different value types, I don't see the value of registering components. Furthermore, since the instructions to the experts asks them to look at things like general applicability vs limited application, I can see registration requests creating a fair amount of discussion (meaning work for people). So, why register components at all? Why not leave them up to trust frameworks to define as they please? Is harm done if different frameworks use the same component name for completely different things? (I could see registering the frameworks themselves, but I leave that to the WG to decide.) This is an interesting document, and I hope it progresses in some form. But I share Ekr's question about whether is is appropriate as a PS when defined in a non-wg document. The shepherd writeup mentions discussion on a non-wg mail list, and existing implementations, so maybe it's okay (this this is a non-blocking comment, not a DISCUSS point). But it seems like the sort of thing we should consider treating as experimental at first. §1.3: "All components of the vector construct MUST be orthogonal such that no aspect of a component overlaps an aspect of another component, as much as is possible." Who does that requirement apply to? Implementers? Writers of trust frameworks? The authors of _this_ document? §6: Does "implementations" in this section refer to software implementations? Trust frameworks? Something else? Appendix A contains normative text. If you want everyone to actually read that, please consider promoting to the body. |
2018-08-03
|
13 | Ben Campbell | Ballot comment text updated for Ben Campbell |
2018-08-03
|
13 | Sabrina Tanamal | IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK |
2018-08-02
|
13 | Cindy Morgan | IESG state changed to IESG Evaluation::AD Followup from IESG Evaluation |
2018-08-02
|
13 | Alissa Cooper | [Ballot discuss] Is it really appropriate for this document to put normative requirements on OpenID Connect? The reverse would typically not be true, which is … [Ballot discuss] Is it really appropriate for this document to put normative requirements on OpenID Connect? The reverse would typically not be true, which is why I wanted to check. |
2018-08-02
|
13 | Alissa Cooper | [Ballot Position Update] New position, Discuss, has been recorded for Alissa Cooper |
2018-08-02
|
13 | Amanda Baber | IANA Review state changed to IANA - Not OK from Version Changed - Review Needed |
2018-08-01
|
13 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA - Not OK |
2018-08-01
|
13 | Justin Richer | New version available: draft-richer-vectors-of-trust-13.txt |
2018-08-01
|
13 | (System) | New version approved |
2018-08-01
|
13 | (System) | Request for posting confirmation emailed to previous authors: Justin Richer , Leif Johansson |
2018-08-01
|
13 | Justin Richer | Uploaded new revision |
2018-08-01
|
12 | Ben Campbell | [Ballot discuss] I am concerned that the IANA considerations may be inappropriate for the purpose of the document, and possibly harmful. I'd like to see … [Ballot discuss] I am concerned that the IANA considerations may be inappropriate for the purpose of the document, and possibly harmful. I'd like to see some discussion of this; if afterwards people still think it's a good idea, I will clear. If I understand correctly, the interpretation of a component name is entirely contextual to the trust framework. While trust frameworks are encouraged to reuse existing components for similar purposes, there's no real way to enforce that. And given that even if trust frameworks share a component, they may assign entirely different value types, I don't see the value of registering components. Furthermore, since the instructions to the experts asks them to look at things like general applicability vs limited application, I can see registration requests creating a fair amount of discussion (meaning work for people). So, why register components at all? Why not leave them up to trust frameworks to define as they please? Is harm done if different frameworks use the same component name for completely different things? (I could see registering the frameworks themselves, but I leave that to the WG to decide.) |
2018-08-01
|
12 | Ben Campbell | [Ballot comment] This is an interesting document, and I hope it progresses in some form. But I share Ekr's question about whether is is appropriate … [Ballot comment] This is an interesting document, and I hope it progresses in some form. But I share Ekr's question about whether is is appropriate as a PS when defined in a non-wg document. The shepherd writeup mentions discussion on a non-wg mail list, and existing implementations, so maybe it's okay (this this is a non-blocking comment, not a DISCUSS point). But it seems like the sort of thing we should consider treating as experimental at first. §1.3: "All components of the vector construct MUST be orthogonal such that no aspect of a component overlaps an aspect of another component, as much as is possible." Who does that requirement apply to? Implementers? Writers of trust frameworks? The authors of _this_ document? §6: Does "implementations" in this section refer to software implementations? Trust frameworks? Something else? Appendix A contains normative text. If you want everyone to actually read that, please consider promoting to the body. |
2018-08-01
|
12 | Ben Campbell | [Ballot Position Update] New position, Discuss, has been recorded for Ben Campbell |
2018-08-01
|
12 | Suresh Krishnan | [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan |
2018-07-31
|
12 | Adam Roach | [Ballot comment] Thanks for the work everyone did on this document. I have one substantive comment and some very minor editorial suggestions. --------------------------------------------------------------------------- §8.1 establishes … [Ballot comment] Thanks for the work everyone did on this document. I have one substantive comment and some very minor editorial suggestions. --------------------------------------------------------------------------- §8.1 establishes a registry for vector of trust components. Ordinarily, IANA ensures that duplicate values are not registered in a table; however, it would appear that the intention with these demarcators is that duplicate letters with different meanings is *discouraged*, it is not outright prohibited. e.g., §2: > Different trust frameworks SHOULD use > the same component for similar information, but since the processing > for all vector values is contextual to a trust framework, the exact > semantics of interpreting a component will vary based on the trust > framework in use. Since this is somewhat different than IANA's normal mode of operation, this section really needs to call out the fact that duplicate entries are explicitly allowed, and that it is the role of the expert(s) to help make informed decisions about when including duplicates would be acceptable. --------------------------------------------------------------------------- All of my remaining comments are minor editorial nits. §1: > It is anticipated that > VoT can be used alongside more detailed attribute metadata systems as > has that proposed by NISITIR 8112 [NISTIR-8112]. This sentence doesn't parse. Perhaps "...systems, such as the one proposed by..." --------------------------------------------------------------------------- §3.2: > For example, assume that for the given trustmark, the body of an ID > token claiming "pseudonymous, proof of shared key, signed back- > channel verified token, and no claim made toward credential > management" could look like this JSON object payload of the ID token. Please cite RFC 8259 (which is already in the reference section) here. --------------------------------------------------------------------------- §4.1: > In OpenID Connect [OpenID], the client MAY request a partial set of > acceptable VoT values with the "vtr" (vector of trust request) claim > request as part of the Request Object. The value of this field is an > array of JSON strings, each string identifying an acceptable set of Please cite RFC 8259 here. --------------------------------------------------------------------------- §6: > Trust frameworks that implement specification SHOULD choose either a Nit: "...that implement this specification..." --------------------------------------------------------------------------- §9: > fulfil this requirement by carrying both the vector value and the Nit: "...fulfill..." (see RFC 7322 §3.1) |
2018-07-31
|
12 | Adam Roach | [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach |
2018-07-31
|
12 | Terry Manderson | [Ballot Position Update] New position, No Objection, has been recorded for Terry Manderson |
2018-07-31
|
12 | Eric Rescorla | [Ballot comment] Rich version of this review at: https://mozphab-ietf.devsvcdev.mozaws.net/D4378 Question for the AD. Should this really be a PS RFC? It doesn't seem like there … [Ballot comment] Rich version of this review at: https://mozphab-ietf.devsvcdev.mozaws.net/D4378 Question for the AD. Should this really be a PS RFC? It doesn't seem like there was much feedback in IETF LC (there wasn't a WG) and so the evidence of consensus/support is pretty weak. I'm not going to DISCUSS here, but I thought it was worth raising. IMPORTANT S 1.3. > expressiveness. As such, this vector construct is designed to be > composable and extensible. > > All components of the vector construct MUST be orthogonal such that > no aspect of a component overlaps an aspect of another component, as > much as is possible. "MUST" and "as much as is possible" don't really work together. S 5. > values represent within the trust framework. The contents of the > trustmark URL MUST be reachable by the operators or implementors of > the RP. The URL SHOULD be stable over time for a given trust > framework to allow RPs to process incoming vectors in a consistent > fashion. New versions of a trust framework that require different > processing rules SHOULD use a different trustmark URL. don't these both need to be a MUST? Otherwise you have a serious interop problem. S 9. > transit between parties, such as by using TLS as described in > [BCP195]. The vector of trust value must be associated with a > trustmark by the RP processing the vector. A signed OpenID Connect > ID Token or a similarly signed assertion from another protocol would > fulfil this requirement by carrying both the vector value and the > trustmark URL as claims. You should require that the Trustmark URL be HTTPS. COMMENTS S 1.1. > > Trust Framework A document containing business rules and legal > clauses that defines how different parties in an identity > transaction may act. > > Trustmark A URL referencing a specific Trust Framework and its Are you aware that "Trustmark" is a large US company (https://en.wikipedia.org/wiki/Trustmark)? S 11.2. > category MAY be used in a single transaction. > > C0 No credential is used / anonymous public service > Ca Simple session HTTP cookies (with nothing else) > > Cb Known device What is "known device"? S 11.2. > > Ce Cryptographic proof of key possession using asymmetric key > > Cf Sealed hardware token / keys stored in a trusted platform module > > Cg Locally verified biometric This seems like it might want to include token binding. |
2018-07-31
|
12 | Eric Rescorla | [Ballot Position Update] New position, No Objection, has been recorded for Eric Rescorla |
2018-07-30
|
12 | Deborah Brungard | [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard |
2018-07-30
|
12 | Alexey Melnikov | [Ballot comment] Interesting idea! |
2018-07-30
|
12 | Alexey Melnikov | [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov |
2018-07-29
|
12 | Spencer Dawkins | [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins |
2018-07-24
|
12 | (System) | IANA Review state changed to IANA - Not OK from Version Changed - Review Needed |
2018-07-24
|
12 | Mirja Kühlewind | [Ballot comment] It's probably not ideal that there is normative language in appendix A. Maybe move the intro part of the appendix to the body … [Ballot comment] It's probably not ideal that there is normative language in appendix A. Maybe move the intro part of the appendix to the body of the document...? |
2018-07-24
|
12 | Mirja Kühlewind | [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind |
2018-07-22
|
12 | Dale Worley | Request for Telechat review by GENART Completed: Ready. Reviewer: Dale Worley. Sent review to list. |
2018-07-19
|
12 | Jean Mahoney | Request for Telechat review by GENART is assigned to Dale Worley |
2018-07-19
|
12 | Jean Mahoney | Request for Telechat review by GENART is assigned to Dale Worley |
2018-07-14
|
12 | Benjamin Kaduk | IESG state changed to IESG Evaluation from Waiting for Writeup |
2018-07-14
|
12 | Amy Vezza | Placed on agenda for telechat - 2018-08-02 |
2018-07-14
|
12 | Benjamin Kaduk | Ballot has been issued |
2018-07-14
|
12 | Benjamin Kaduk | [Ballot Position Update] New position, Yes, has been recorded for Benjamin Kaduk |
2018-07-14
|
12 | Benjamin Kaduk | Created "Approve" ballot |
2018-07-14
|
12 | Benjamin Kaduk | Ballot writeup was changed |
2018-06-29
|
12 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA - Not OK |
2018-06-29
|
12 | Justin Richer | New version available: draft-richer-vectors-of-trust-12.txt |
2018-06-29
|
12 | (System) | New version approved |
2018-06-29
|
12 | (System) | Request for posting confirmation emailed to previous authors: Justin Richer , Leif Johansson |
2018-06-29
|
12 | Justin Richer | Uploaded new revision |
2018-06-26
|
11 | (System) | IESG state changed to Waiting for Writeup from In Last Call |
2018-06-25
|
11 | (System) | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
2018-06-25
|
11 | Sabrina Tanamal | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-richer-vectors-of-trust-11. If any part of this review is inaccurate, please let … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: The IANA Functions Operator has completed its review of draft-richer-vectors-of-trust-11. If any part of this review is inaccurate, please let us know. The IANA Functions Operator has a question about one of the actions requested in the IANA Considerations section of this document. The IANA Functions Operator understands that, upon approval of this document, there are four actions which we must complete. First, a new registry is to be created called the Vectors of Trust Components Registry. The new registry will be managed via Specification required as defined by RFC 8126. IANA Question --> Where should this new registry be located? Should it be added to an existing registry page? If not, does it belong in an existing category at http://www.iana.org/protocols? We understand that there are initial registrations in this new registry as follows: Demarcator Description Change Symbol Controller Reference +-----------------------------------+-----------+------------ P Identity proofing IESG [ RFC-to-be ] C Primary credential usage IESG [ RFC-to-be ] M Primary credential IESG [ RFC-to-be ] management A Assertion presentation IESG [ RFC-to-be ] Second, in the OAuth Parameters registry on the OAuth Parameters registry page located at: https://www.iana.org/assignments/oauth-parameters/ a single, new registration will be added to the registry as follows: Name: vtr Description: Vector of Trust request Parameter usage location: authorization request, token request Change Controller: IESG Document: [ RFC-to-be ] As this document requests registrations in a Specification Required (see RFC 8126) registry, we will initiate the required Expert Review via a separate request. Expert review will need to be completed before your document can be approved for publication as an RFC. Third, in the JSON Web Token Claims Registry on the JSON Web Token regsitry page located at: https://www.iana.org/assignments/jwt/ two new registrations are to be made as follows: Claim name: vot Claim Description: Vector of Trust value Change Controller: IESG Document: [ RFC-to-be ] Claim name: vtm Claim Description: Vector of Trust trustmark URI Change Controller: IESG Document: [ RFC-to-be ] As this section also requests registrations in a Specification Required (see RFC 8126) registry, the IESG-designated experts for the JSON Web Token Claims have asked that you send a review request to the mailing list jwt-reg-review@ietf.org. Expert review will need to be completed before your document can be approved for publication as an RFC. Fourth, in the OAuth Token Introspection Response registry also on the OAuth Parameters registry page located at: https://www.iana.org/assignments/oauth-parameters/ two new registrations are to be made as follows: Metadata Name: vot Metadata Description: Vector of Trust value Change Controller: IESG Document: [ RFC-to-be ] Metadata Name: vtm Metadata Description: Vector of Trust trustmark URI Change Controller: IESG Document: [ RFC-to-be ] As this section also requests registrations in a Specification Required (see RFC 8126) registry, we will initiate the required Expert Review via a separate request. Expert review will need to be completed before your document can be approved for publication as an RFC. The IANA Services Operator understands that these are the only actions required to be completed upon approval of this document. Note: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. Thank you, Sabrina Tanamal Senior IANA Services Specialist |
2018-06-21
|
11 | Tero Kivinen | Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Klaas Wierenga. |
2018-06-12
|
11 | Dale Worley | Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Dale Worley. |
2018-06-05
|
11 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Éric Vyncke |
2018-06-05
|
11 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Éric Vyncke |
2018-05-31
|
11 | Jean Mahoney | Request for Last Call review by GENART is assigned to Dale Worley |
2018-05-31
|
11 | Jean Mahoney | Request for Last Call review by GENART is assigned to Dale Worley |
2018-05-31
|
11 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Klaas Wierenga |
2018-05-31
|
11 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Klaas Wierenga |
2018-05-29
|
11 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2018-05-29
|
11 | Cindy Morgan | The following Last Call announcement was sent out (ends 2018-06-26): From: The IESG To: IETF-Announce CC: draft-richer-vectors-of-trust@ietf.org, kaduk@mit.edu, sean@sn3rd.com Reply-To: ietf@ietf.org Sender: Subject: … The following Last Call announcement was sent out (ends 2018-06-26): From: The IESG To: IETF-Announce CC: draft-richer-vectors-of-trust@ietf.org, kaduk@mit.edu, sean@sn3rd.com Reply-To: ietf@ietf.org Sender: Subject: Last Call: (Vectors of Trust) to Proposed Standard The IESG has received a request from an individual submitter to consider the following document: - 'Vectors of Trust' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2018-06-26. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document defines a mechanism for describing and signaling several aspects of a digital identity transaction and its participants. These aspects are used to determine the amount of trust to be placed in that transaction. The file can be obtained via https://datatracker.ietf.org/doc/draft-richer-vectors-of-trust/ IESG discussion can be tracked via https://datatracker.ietf.org/doc/draft-richer-vectors-of-trust/ballot/ No IPR declarations have been submitted directly on this I-D. |
2018-05-29
|
11 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2018-05-29
|
11 | Benjamin Kaduk | Last call was requested |
2018-05-29
|
11 | Benjamin Kaduk | Last call announcement was generated |
2018-05-29
|
11 | Benjamin Kaduk | Ballot approval text was generated |
2018-05-29
|
11 | Benjamin Kaduk | Ballot writeup was generated |
2018-05-29
|
11 | Benjamin Kaduk | IESG state changed to Last Call Requested from Publication Requested |
2018-05-29
|
11 | Benjamin Kaduk | Assigned to Security Area |
2018-05-29
|
11 | Benjamin Kaduk | IESG process started in state Publication Requested |
2018-05-29
|
11 | Benjamin Kaduk | Intended Status changed to Proposed Standard from None |
2018-05-29
|
11 | Benjamin Kaduk | Changed consensus to Yes from Unknown |
2018-05-18
|
11 | Justin Richer | New version available: draft-richer-vectors-of-trust-11.txt |
2018-05-18
|
11 | (System) | New version approved |
2018-05-18
|
11 | (System) | Request for posting confirmation emailed to previous authors: Justin Richer , Leif Johansson |
2018-05-18
|
11 | Justin Richer | Uploaded new revision |
2018-05-09
|
10 | Justin Richer | New version available: draft-richer-vectors-of-trust-10.txt |
2018-05-09
|
10 | (System) | New version approved |
2018-05-09
|
10 | (System) | Request for posting confirmation emailed to previous authors: Justin Richer , Leif Johansson |
2018-05-09
|
10 | Justin Richer | Uploaded new revision |
2018-03-26
|
09 | Benjamin Kaduk | Shepherding AD changed to Benjamin Kaduk |
2018-03-19
|
09 | Justin Richer | New version available: draft-richer-vectors-of-trust-09.txt |
2018-03-19
|
09 | (System) | New version approved |
2018-03-19
|
09 | (System) | Request for posting confirmation emailed to previous authors: Justin Richer , Leif Johansson |
2018-03-19
|
09 | Justin Richer | Uploaded new revision |
2018-03-18
|
08 | Sean Turner | Changed document writeup |
2018-03-18
|
08 | Justin Richer | New version available: draft-richer-vectors-of-trust-08.txt |
2018-03-18
|
08 | (System) | New version approved |
2018-03-18
|
08 | (System) | Request for posting confirmation emailed to previous authors: Justin Richer , Leif Johansson |
2018-03-18
|
08 | Justin Richer | Uploaded new revision |
2018-03-12
|
07 | Sean Turner | Notification list changed to "Karen O'Donoghue" <odonoghue@isoc.org>, John Bradley <ietf@ve7jtb.com>, Sean Turner <sean@sn3rd.com>, from "Karen O'Donoghue" <odonoghue@isoc.org>, … Notification list changed to "Karen O'Donoghue" <odonoghue@isoc.org>, John Bradley <ietf@ve7jtb.com>, Sean Turner <sean@sn3rd.com>, from "Karen O'Donoghue" <odonoghue@isoc.org>, John Bradley <ietf@ve7jtb.com, Sean Turner <sean@sn3rd.com> |
2018-01-30
|
07 | Kathleen Moriarty | Notification list changed to "Karen O'Donoghue" <odonoghue@isoc.org>, John Bradley <ietf@ve7jtb.com, Sean Turner <sean@sn3rd.com> from "Karen O'Donoghue" <odonoghue@isoc.org>, … Notification list changed to "Karen O'Donoghue" <odonoghue@isoc.org>, John Bradley <ietf@ve7jtb.com, Sean Turner <sean@sn3rd.com> from "Karen O'Donoghue" <odonoghue@isoc.org>, John Bradley <ietf@ve7jtb.com |
2018-01-30
|
07 | Kathleen Moriarty | Document shepherd changed to Sean Turner |
2017-12-08
|
07 | Justin Richer | New version available: draft-richer-vectors-of-trust-07.txt |
2017-12-08
|
07 | (System) | New version approved |
2017-12-08
|
07 | (System) | Request for posting confirmation emailed to previous authors: Justin Richer , Leif Johansson |
2017-12-08
|
07 | Justin Richer | Uploaded new revision |
2017-11-23
|
06 | John Bradley | Document shepherd email changed |
2017-11-23
|
06 | John Bradley | Notification list changed to "Karen O'Donoghue" <odonoghue@isoc.org>, John Bradley <ietf@ve7jtb.com from "Karen O'Donoghue" <odonoghue@isoc.org>, John Bradley <ve7jtb@ve7jtb.com |
2017-11-23
|
06 | John Bradley | Notification list changed to "Karen O'Donoghue" <odonoghue@isoc.org>, John Bradley <ve7jtb@ve7jtb.com from "Karen O'Donoghue" <odonoghue@isoc.org>, John Bradley <jbradley@pingidentity.com> |
2017-09-12
|
06 | Justin Richer | New version available: draft-richer-vectors-of-trust-06.txt |
2017-09-12
|
06 | (System) | New version approved |
2017-09-12
|
06 | (System) | Request for posting confirmation emailed to previous authors: Justin Richer , Leif Johansson |
2017-09-12
|
06 | Justin Richer | Uploaded new revision |
2017-05-03
|
05 | Kathleen Moriarty | Notification list changed to "Karen O'Donoghue" <odonoghue@isoc.org>, John Bradley <jbradley@pingidentity.com> from "Karen O'Donoghue" <odonoghue@isoc.org> |
2017-05-03
|
05 | Kathleen Moriarty | Document shepherd changed to John Bradley |
2017-04-03
|
05 | Justin Richer | New version available: draft-richer-vectors-of-trust-05.txt |
2017-04-03
|
05 | (System) | New version approved |
2017-04-03
|
05 | (System) | Request for posting confirmation emailed to previous authors: Justin Richer , Leif Johansson |
2017-04-03
|
05 | Justin Richer | Uploaded new revision |
2017-02-17
|
04 | Kathleen Moriarty | Shepherding AD changed to Kathleen Moriarty |
2017-02-17
|
04 | Kathleen Moriarty | Notification list changed to "Karen O'Donoghue" <odonoghue@isoc.org> |
2017-02-17
|
04 | Kathleen Moriarty | Document shepherd changed to Karen O'Donoghue |
2017-02-17
|
04 | Kathleen Moriarty | Stream changed to IETF from None |
2017-01-16
|
04 | Justin Richer | New version available: draft-richer-vectors-of-trust-04.txt |
2017-01-16
|
04 | (System) | New version approved |
2017-01-16
|
04 | (System) | Request for posting confirmation emailed to previous authors: "Justin Richer" , "Leif Johansson" |
2017-01-16
|
04 | Justin Richer | Uploaded new revision |
2016-07-21
|
03 | Justin Richer | New version available: draft-richer-vectors-of-trust-03.txt |
2015-11-12
|
02 | Justin Richer | New version available: draft-richer-vectors-of-trust-02.txt |
2015-09-04
|
01 | Justin Richer | New version available: draft-richer-vectors-of-trust-01.txt |
2015-06-26
|
00 | Justin Richer | New version available: draft-richer-vectors-of-trust-00.txt |