Skip to main content

Securing Routing Policy Specification Language (RPSL) Objects with Resource Public Key Infrastructure (RPKI) Signatures
RFC 7909

Revision differences

Document history

Date Rev. By Action
2016-07-07
12 Jean Mahoney Closed request for Early review by GENART with state 'No Response'
2016-06-30
12 (System) RFC published
2016-06-30
12 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2016-06-27
12 (System) RFC Editor state changed to AUTH48 from RFC-EDITOR
2016-06-06
12 (System) RFC Editor state changed to RFC-EDITOR from EDIT
2016-05-23
12 (System) RFC Editor state changed to EDIT
2016-05-23
12 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2016-05-23
12 (System) Announcement was received by RFC Editor
2016-05-23
12 (System) IANA Action state changed to No IC
2016-05-23
12 Amy Vezza IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2016-05-23
12 Amy Vezza IESG has approved the document
2016-05-23
12 Amy Vezza Closed "Approve" ballot
2016-05-23
12 Amy Vezza Ballot approval text was generated
2016-05-19
12 Amy Vezza IESG state changed to Approved-announcement to be sent from IESG Evaluation
2016-05-19
12 Alexey Melnikov [Ballot comment]
Thank you for addressing my DISCUSS points.
2016-05-19
12 Alexey Melnikov [Ballot Position Update] Position for Alexey Melnikov has been changed to Yes from Discuss
2016-05-19
12 Stephen Farrell
[Ballot comment]

Thanks all for chatting about my discuss, I think the
outcome is good.

--- OLD COMMENTS below, I didn't check 'em, feel
free …
[Ballot comment]

Thanks all for chatting about my discuss, I think the
outcome is good.

--- OLD COMMENTS below, I didn't check 'em, feel
free to chat more or not, as you think best.

- If you keep the potential for http(s) URIs then I think
more text is needed in the security considerations but
it looks like you're taking that out for now so I guess
that's ok.

- 2.1, I don't see why it's useful to allow variation in the
fields of the signature attribute e.g. why "MAY" the version
not be 1st?

- 2.1, "t=" and "x=" any limits on precision here?
(Non-)support for fractional seconds can be a source for
non-interop if not. The "All times MUST be converted to" is
also actually a little ambiguous as you don't say to do that
before signing;-)

- 2.1, "a=" did you want a lowercase "must" there?

- Are steps 2 and 3 in 3.1 order-sensitive? I think you
might sometimes need to do 2 after 3, or re-do 2 maybe or
else leading whitspace could be an issue. Maybe say that
sometimes you need to do step 2 >1 time? 

- 3.1, oops, an ambiguity - in "The following steps MUST be
applied in order..." does "in order" mean "in the order
below" or "so as to"? I assume the latter.

- 3.1: In general I think you'd be better if you pointed at
specific bits of text in all the RFCs mentioned in 3.1 -
it's maybe easy to get wrong otherwise, esp. if we don't yet
have >1 implementation.

- 3.1, step 6: names are all ASCII right? just checking

- 3.2, step 1 - given 3.3 step 2, you're missing a step to
"publish the cert" at the c= location as well.
2016-05-19
12 Stephen Farrell [Ballot Position Update] Position for Stephen Farrell has been changed to No Objection from Discuss
2016-05-19
12 Brian Haberman IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2016-05-19
12 Brian Haberman New version available: draft-ietf-sidr-rpsl-sig-12.txt
2016-05-18
11 Joel Jaeggli [Ballot comment]
Al morton performed the opsdir review
2016-05-18
11 Joel Jaeggli [Ballot Position Update] New position, No Objection, has been recorded for Joel Jaeggli
2016-05-18
11 Amanda Baber IANA Review state changed to IANA OK - No Actions Needed from Version Changed - Review Needed
2016-05-18
11 Terry Manderson [Ballot Position Update] Position for Terry Manderson has been changed to No Objection from Discuss
2016-05-18
11 Alia Atlas [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas
2016-05-18
11 Ben Campbell [Ballot comment]
I am also curious about the point in Stephen's discuss.
2016-05-18
11 Ben Campbell [Ballot Position Update] New position, No Objection, has been recorded for Ben Campbell
2016-05-18
11 Stephen Farrell
[Ballot discuss]

I'd like to check one thing - this may be needed for strict
compliance with RPKI thing but it seems kinda weird to …
[Ballot discuss]

I'd like to check one thing - this may be needed for strict
compliance with RPKI thing but it seems kinda weird to also
impose that here, but anyway...

Is 3.2 step 1 needed?  That seems like useless complexity
here.  If it is needed, how does the verifier check that
it's really a single-use? I don't see the point TBH.
2016-05-18
11 Stephen Farrell
[Ballot comment]

- If you keep the potential for http(s) URIs then I think
more text is needed in the security considerations but
it looks …
[Ballot comment]

- If you keep the potential for http(s) URIs then I think
more text is needed in the security considerations but
it looks like you're taking that out for now so I guess
that's ok.

- 2.1, I don't see why it's useful to allow variation in the
fields of the signature attribute e.g. why "MAY" the version
not be 1st?

- 2.1, "t=" and "x=" any limits on precision here?
(Non-)support for fractional seconds can be a source for
non-interop if not. The "All times MUST be converted to" is
also actually a little ambiguous as you don't say to do that
before signing;-)

- 2.1, "a=" did you want a lowercase "must" there?

- Are steps 2 and 3 in 3.1 order-sensitive? I think you
might sometimes need to do 2 after 3, or re-do 2 maybe or
else leading whitspace could be an issue. Maybe say that
sometimes you need to do step 2 >1 time? 

- 3.1, oops, an ambiguity - in "The following steps MUST be
applied in order..." does "in order" mean "in the order
below" or "so as to"? I assume the latter.

- 3.1: In general I think you'd be better if you pointed at
specific bits of text in all the RFCs mentioned in 3.1 -
it's maybe easy to get wrong otherwise, esp. if we don't yet
have >1 implementation.

- 3.1, step 6: names are all ASCII right? just checking

- 3.2, step 1 - given 3.3 step 2, you're missing a step to
"publish the cert" at the c= location as well.
2016-05-18
11 Stephen Farrell [Ballot Position Update] New position, Discuss, has been recorded for Stephen Farrell
2016-05-18
11 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2016-05-17
11 Terry Manderson
[Ballot discuss]
Thank you for putting substantial effort into this document.

I have a few discusses. I hope they can be resolved quickly.

In Section …
[Ballot discuss]
Thank you for putting substantial effort into this document.

I have a few discusses. I hope they can be resolved quickly.

In Section 2.1. The reference to the aligned certificate  which has the same private key that signed the RPSL object is mandatory, and defined by a RSYNC URL or a HTTP(S) URL. My question surrounds the "or". The architecture of RPKI (IIRC) is centered around RSYNC, and thus SIA/AIA values MUST have a RSYNC URL, and MAY have other types. By this are you leaving it to the issuing party to control the RPKI Distribution mechanisms of the Replying Party? I am quite comfortable with "or" personally, however this facet of fetching the RPSL Certificate to validate the private key usage is seemingly orthogonal to the RPKI architecture of RSYNC preferred and should be called out if 'or' is the clear intention. Or, has the consensus of the WG moved on from being wedded to RSYNC?

If it is truely "or", my observation is that the use of the RPKI repository is one of  convenience, and that should be called out, in fact it does appear that any valid certificate bearing RFC3779 extensions could be used to validate the digital signature associated with the RPSL object provided the relying party has trust anchor material that leads to the corresponding EE certificate and therefore private key. Is this observation correct?

The Signature expiration time field ("x") currently has no time constraints, and I'm very surprised that it is optional with the text in s2.5, given that the expiration time, by my reading, could not be beyond the 'not after' time of the corresponding certificate. Can you please instruct me as to what the consensus position on this was? A criticism of many IRRs is that data becomes stale. have the signature expiration time field could aide in data freshness models and reduce load on automated import and validation of these RPSL signatures.

And lastly, IRRs tend to run over the (legacy?) whois port 43 that doesn't provide channel layer security. This means that while signature provide a means of detecting modification it may not stop a a MiTM event where the entire object is omitted. Do you agree? if so that might be appropriate for the Security Considerations section.
2016-05-17
11 Terry Manderson
[Ballot comment]
one nit:

"MUST reject the signature and threat the object as a regular" I think you mean `s/threat/treat`

Misc comments:

* Thank you …
[Ballot comment]
one nit:

"MUST reject the signature and threat the object as a regular" I think you mean `s/threat/treat`

Misc comments:

* Thank you for the very clear canonicalisation requirements!

* For route6 objects, where two resource holder's signatures considered such that it might address the inability to properly sign the RPSL when one holder possesses the ASN and another possesses the prefix? (just a comment, nothing more)
2016-05-17
11 Terry Manderson [Ballot Position Update] New position, Discuss, has been recorded for Terry Manderson
2016-05-17
11 Suresh Krishnan [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan
2016-05-17
11 Alissa Cooper [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper
2016-05-17
11 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2016-05-17
11 Mirja Kühlewind [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind
2016-05-16
11 Gunter Van de Velde Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Al Morton.
2016-05-16
11 Kathleen Moriarty [Ballot comment]
Thanks for a well-written document and addressing the SecDir review:
https://www.ietf.org/mail-archive/web/secdir/current/msg06567.html
2016-05-16
11 Kathleen Moriarty [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty
2016-05-16
11 Alexey Melnikov
[Ballot discuss]
This is a generally a well written document and I don't object to its publication. However I have several minor but important points …
[Ballot discuss]
This is a generally a well written document and I don't object to its publication. However I have several minor but important points which should be easy to address:

In Section 2.1:

  Reference to the certificate corresponding to the private key used to sign this object (field "c"). The value of this field MUST be a URL of type "rsync" or "http(s)"

You need to have Normative references for the corresponding URI RFCs: RFC 5781 for rsync URIs and RFC 7230 for http/https URIs.

  that points to a specific resource certificate in an RPKI repository [RFC6481]. Any non URL-safe characters (including semicolon ";" and plus "+") must be URL encoded.

This really need a Normative reference to RFC 3986.


  The signature itself (field "b"). This MUST be the last field in the list. The signature is the output of the signature algorithm using the appropriate private key and the calculated hash value of the object as inputs. The value of this field is the digital signature in base64 encoding [RFC4648].

As RFC 4648 specifies 2 base64 alphabets, you need to include section number. I think you meant Section 4 (and not Section 5).
2016-05-16
11 Alexey Melnikov
[Ballot comment]
In Section 2.1:

  Time of signing (field "t"). The format of the value of this field MUST be in the Internet Date/Time …
[Ballot comment]
In Section 2.1:

  Time of signing (field "t"). The format of the value of this field MUST be in the Internet Date/Time format [RFC3339]. All times MUST be converted to Universal Coordinated Time (UTC)

To be pedantic, you should clarify that you mean the date-time ABNF production with the timezone always being "Z".

In 3.1, inside numbered list (item 3):

* Converting all line endings to a single blank space.

Please include ASCII code for space, because " " is not very helpful, especially considering that there are other Unicode space characters which are not visually distinguishable. The same issue elsewhere in this section.
2016-05-16
11 Alexey Melnikov [Ballot Position Update] New position, Discuss, has been recorded for Alexey Melnikov
2016-05-16
11 Brian Haberman IANA Review state changed to Version Changed - Review Needed from IANA OK - No Actions Needed
2016-05-16
11 Brian Haberman New version available: draft-ietf-sidr-rpsl-sig-11.txt
2016-05-12
10 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Magnus Nystrom.
2016-05-09
10 Alvaro Retana IESG state changed to IESG Evaluation from Waiting for Writeup
2016-05-09
10 Alvaro Retana Ballot approval text was generated
2016-05-09
10 Alvaro Retana Ballot has been issued
2016-05-09
10 Alvaro Retana [Ballot Position Update] New position, Yes, has been recorded for Alvaro Retana
2016-05-09
10 Alvaro Retana Created "Approve" ballot
2016-05-09
10 Alvaro Retana Ballot writeup was changed
2016-05-09
10 (System) IESG state changed to Waiting for Writeup from In Last Call
2016-04-28
10 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Al Morton
2016-04-28
10 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Al Morton
2016-04-28
10 Tero Kivinen Request for Last Call review by SECDIR is assigned to Magnus Nystrom
2016-04-28
10 Tero Kivinen Request for Last Call review by SECDIR is assigned to Magnus Nystrom
2016-04-28
10 (System) IANA Review state changed to IANA OK - No Actions Needed from IANA - Review Needed
2016-04-28
10 Sabrina Tanamal
(Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-sidr-rpsl-sig-10.txt, which is currently in Last Call, and has the following comments:

We understand that this …
(Via drafts-lastcall-comment@iana.org): IESG/Authors/WG Chairs:

IANA has reviewed draft-ietf-sidr-rpsl-sig-10.txt, which is currently in Last Call, and has the following comments:

We understand that this document doesn't require any IANA actions.

While it's often helpful for a document's IANA Considerations section to remain in place upon publication even if there are no actions, if the authors strongly prefer to remove it, IANA does not object.

If this assessment is not accurate, please respond as soon as possible.

Thank you,

Sabrina Tanamal
IANA Specialist
ICANN
2016-04-27
10 Jean Mahoney Request for Early review by GENART is assigned to Wassim Haddad
2016-04-27
10 Jean Mahoney Request for Early review by GENART is assigned to Wassim Haddad
2016-04-25
10 Cindy Morgan IANA Review state changed to IANA - Review Needed
2016-04-25
10 Cindy Morgan
The following Last Call announcement was sent out:

From: The IESG
To: "IETF-Announce"
CC: draft-ietf-sidr-rpsl-sig@ietf.org, sidr@ietf.org, "Sandra L. Murphy" , sidr-chairs@ietf.org, sandy@tislabs.com …
The following Last Call announcement was sent out:

From: The IESG
To: "IETF-Announce"
CC: draft-ietf-sidr-rpsl-sig@ietf.org, sidr@ietf.org, "Sandra L. Murphy" , sidr-chairs@ietf.org, sandy@tislabs.com, aretana@cisco.com
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (Securing RPSL Objects with RPKI Signatures) to Proposed Standard


The IESG has received a request from the Secure Inter-Domain Routing WG
(sidr) to consider the following document:
- 'Securing RPSL Objects with RPKI Signatures'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2016-05-09. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  This document describes a method to allow parties to electronically
  sign Routing Policy Specification Language objects and validate such
  electronic signatures.  This allows relying parties to detect
  accidental or malicious modifications on such objects.  It also
  allows parties who run Internet Routing Registries or similar
  databases, but do not yet have Routing Policy System Security-based
  authentication of the maintainers of certain objects, to verify that
  the additions or modifications of such database objects are done by
  the legitimate holder(s) of the Internet resources mentioned in those
  objects.  This document updates RFC 2622 and RFC 4012 to add the
  signature attribute to supported RPSL objects.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-sidr-rpsl-sig/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-sidr-rpsl-sig/ballot/


No IPR declarations have been submitted directly on this I-D.


2016-04-25
10 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2016-04-25
10 Alvaro Retana Placed on agenda for telechat - 2016-05-19
2016-04-25
10 Alvaro Retana Last call was requested
2016-04-25
10 Alvaro Retana Ballot approval text was generated
2016-04-25
10 Alvaro Retana Ballot writeup was generated
2016-04-25
10 Alvaro Retana IESG state changed to Last Call Requested from AD Evaluation
2016-04-25
10 Alvaro Retana Last call announcement was generated
2016-04-25
10 Alvaro Retana Intended Status changed to Proposed Standard from Internet Standard
2016-04-25
10 Alvaro Retana Last call announcement was generated
2016-04-25
10 Alvaro Retana Last call announcement was generated
2016-04-22
10 Alvaro Retana IESG state changed to AD Evaluation from Publication Requested
2016-04-22
10 Alvaro Retana Notification list changed to "Sandra L. Murphy" <sandy@tislabs.com>, aretana@cisco.com from "Sandra L. Murphy" <sandy@tislabs.com>
2016-03-10
10 Sandra Murphy
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated …
As required by RFC 4858, this is the current template for the Document
Shepherd Write-Up.

Changes are expected over time. This version is dated 24 February 2012.

(1) What type of RFC is being requested (BCP, Proposed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

  The draft requested status is Standard, as indicated on the title
  page.  This is appropriate as it is defining a security protection
  for database objects that are vital to Internet operations, where the
  protection must be implemented in multiple databases and is used
  by diverse users of the multiple databases.

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  This document describes a method to allow parties to electronically
  sign Routing Policy Specification Language objects and validate such
  electronic signatures.  This allows relying parties to detect
  accidental or malicious modifications on such objects.  It also
  allows parties who run Internet Routing Registries or similar
  databases, but do not yet have Routing Policy System Security-based
  authentication of the maintainers of certain objects, to verify that
  the additions or modifications of such database objects are done by
  the legitimate holder(s) of the Internet resources mentioned in those
  objects.  This document updates RFC 2622 and RFC 4012 to add the
  signature attribute to supported RPSL objects.

Working Group Summary

  This document has been in the working group for a long time, and has
  been presented at IETF75, IETF77, IETF78, and IETF92.  The wg
  has been asked periodically to confirm continued interest, and has
  each time indicated that the work is valuable and should continue.

Document Quality

  Are there existing implementations of the protocol? Have a
  significant number of vendors indicated their plan to
  implement the specification? Are there any reviewers that
  merit special mention as having done a thorough review,
  e.g., one that resulted in important changes or a
  conclusion that the document had no substantive issues? If
  there was a MIB Doctor, Media Type or other expert review,
  what was its course (briefly)? In the case of a Media Type
  review, on what date was the request posted?

  The work mentioned here is applicable to routing registries
  that use the Routing Policy Specification Language (RPSL).
  Most, if not all, routing registries use RPSL.  This new
  attribute has been implemented in IRRd, a commonly used
  implementation of RPSL.

  Geoff Huston and Stephen Kent both performed thorough
  reviews, resulting in important changes.

  No expert review was required.

Personnel

  Who is the Document Shepherd? Who is the Responsible Area
  Director?

  Shepherd: Sandra Murphy
  Responsible AD: Alvaro Retana

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

  The document shepherd has reviewed the document, identified a few
  ambiguities which have been resolved with the authors.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

  No.  This document has been reviewed by the wg multiple times.

(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

  There is no need for a broader review.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

  The document shepherd has no concerns.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

  The document authors have all confirmed they know of no needed
  IPR disclosures.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  There is no IPR disclosure filed for this document.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

  The wg has confirmed more than once that they are interested
  in this work and have reviewed it multiple times. 

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

  There has been neither threat of an appeal nor extreme discontent.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

  The idnits tool reports no errors.
   
(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

  The document has no content that requires formal review.

(13) Have all references within this document been identified as
either normative or informative?

  Yes, the references are all identified as normative.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

  No, all references are published RFCs.

(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

  The idnits tool reports no downward normative references.

(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

  This document updates RFC2622 and RFC4012 with a new attribute type.
  That is indicated in the abstract and discussed in the introduction.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

  The IANA considerations section reports no need for IANA actions.
  That is consistent with the body of the document.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

  This document creates no new IANA registries.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

  There are no sections of the document written in a formal language.
2016-03-10
10 Sandra Murphy Responsible AD changed to Alvaro Retana
2016-03-10
10 Sandra Murphy IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2016-03-10
10 Sandra Murphy IESG state changed to Publication Requested
2016-03-10
10 Sandra Murphy IESG process started in state Publication Requested
2016-03-10
10 Sandra Murphy Changed consensus to Yes from Unknown
2016-03-10
10 Sandra Murphy Intended Status changed to Internet Standard from None
2016-03-10
10 Sandra Murphy Changed document writeup
2016-03-10
10 Sandra Murphy Changed document writeup
2016-03-10
10 Brian Haberman New version available: draft-ietf-sidr-rpsl-sig-10.txt
2016-03-03
09 Brian Haberman New version available: draft-ietf-sidr-rpsl-sig-09.txt
2016-03-03
08 Sandra Murphy Notification list changed to "Sandra L. Murphy" <sandy@tislabs.com>
2016-03-03
08 Sandra Murphy Document shepherd changed to Sandra L. Murphy
2016-03-03
08 Sandra Murphy
Requests were made for previous commenters to confirm the latest version addresses the comments, but no one replied.  The chairs have reviewed the comments and …
Requests were made for previous commenters to confirm the latest version addresses the comments, but no one replied.  The chairs have reviewed the comments and the latest version and are satisfied that all comments were addressed.  The authors have discussed the future of this draft with the chairs.
2016-03-03
08 Sandra Murphy Tag Revised I-D Needed - Issue raised by WGLC cleared.
2016-03-03
08 Sandra Murphy IETF WG state changed to WG Consensus: Waiting for Write-Up from Waiting for WG Chair Go-Ahead
2015-10-09
08 Brian Haberman New version available: draft-ietf-sidr-rpsl-sig-08.txt
2015-05-11
07 Brian Haberman New version available: draft-ietf-sidr-rpsl-sig-07.txt
2014-11-26
06 Brian Haberman New version available: draft-ietf-sidr-rpsl-sig-06.txt
2012-07-30
05 Alexey Melnikov IETF state changed to Waiting for WG Chair Go-Ahead from In WG Last Call
2012-07-30
05 Alexey Melnikov Annotation tag Revised I-D Needed - Issue raised by WGLC set.
2012-05-24
05 Sandra Murphy IETF state changed to In WG Last Call from WG Document
2012-05-10
05 Alexey Melnikov Comments raised in WGLC need addressing.
2012-05-10
05 Sandra Murphy WGLC requested by authors.  15 days rather than standard 2 weeks timeframe as interim sidr is in the middle.
2012-05-10
05 Brian Haberman New version available: draft-ietf-sidr-rpsl-sig-05.txt
2012-04-06
04 Brian Haberman New version available: draft-ietf-sidr-rpsl-sig-04.txt
2011-01-11
03 (System) Document has expired
2010-07-10
03 (System) New version available: draft-ietf-sidr-rpsl-sig-03.txt
2010-03-08
02 (System) New version available: draft-ietf-sidr-rpsl-sig-02.txt
2009-07-11
01 (System) New version available: draft-ietf-sidr-rpsl-sig-01.txt
2008-12-18
00 (System) New version available: draft-ietf-sidr-rpsl-sig-00.txt