Skip to main content

A Framework for DNSSEC Policies and DNSSEC Practice Statements
draft-ietf-dnsop-dnssec-dps-framework-11

Revision differences

Document history

Date Rev. By Action
2012-11-14
11 Amy Vezza State changed to RFC Ed Queue from Approved-announcement sent
2012-11-13
11 (System) IANA Action state changed to No IC
2012-11-13
11 Amy Vezza State changed to Approved-announcement sent from Approved-announcement to be sent
2012-11-13
11 Amy Vezza IESG has approved the document
2012-11-13
11 Amy Vezza Closed "Approve" ballot
2012-11-13
11 Amy Vezza Ballot approval text was generated
2012-11-13
11 Amy Vezza Ballot writeup was changed
2012-11-12
11 Ron Bonica State changed to Approved-announcement to be sent from Approved-announcement to be sent::Point Raised - writeup needed
2012-11-06
11 Ron Bonica State changed to Approved-announcement to be sent::Point Raised - writeup needed from Approved-announcement to be sent
2012-11-06
11 Ron Bonica State changed to Approved-announcement to be sent from IESG Evaluation::AD Followup
2012-11-05
11 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss
2012-11-05
11 Fredrik Ljunggren New version available: draft-ietf-dnsop-dnssec-dps-framework-11.txt
2012-10-02
10 Sean Turner [Ballot comment]
Thanks for addressing my discuss/comment positions.
2012-10-02
10 Sean Turner [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss
2012-09-29
10 Fredrik Ljunggren New version available: draft-ietf-dnsop-dnssec-dps-framework-10.txt
2012-09-29
09 (System) Sub state has been changed to AD Followup from Revised ID Needed
2012-09-29
09 Fredrik Ljunggren New version available: draft-ietf-dnsop-dnssec-dps-framework-09.txt
2012-07-28
08 Tero Kivinen Request for Telechat review by SECDIR Completed: Not Ready. Reviewer: Stephen Kent.
2012-07-19
08 (System) Requested Telechat review by SECDIR
2012-07-19
08 Cindy Morgan State changed to IESG Evaluation::Revised ID Needed from Waiting for AD Go-Ahead
2012-07-19
08 Barry Leiba
[Ballot comment]
From the shepherd writeup:
> There was a concern about a possible copyright issue, but only in
> respect to a pre-RFC5378 RFC.  …
[Ballot comment]
From the shepherd writeup:
> There was a concern about a possible copyright issue, but only in
> respect to a pre-RFC5378 RFC.  Parts of RFC 3647 have been used in the
> draft, so the authors have contacted the authors of RFC 3647 requesting
> permission to use text from it.  All who have replied (four out of five)
> have given that permission.

Response from Tomofumi Okubo:
"We received the permission from the 5th author of RFC3647 shortly after
the writeup was submitted."
So this former DISCUSS is now cleared.
2012-07-19
08 Barry Leiba [Ballot Position Update] Position for Barry Leiba has been changed to No Objection from Discuss
2012-07-19
08 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded for Gonzalo Camarillo
2012-07-19
08 Barry Leiba
[Ballot discuss]
From the shepherd writeup:
> There was a concern about a possible copyright issue, but only in
> respect to a pre-RFC5378 RFC.  …
[Ballot discuss]
From the shepherd writeup:
> There was a concern about a possible copyright issue, but only in
> respect to a pre-RFC5378 RFC.  Parts of RFC 3647 have been used in the
> draft, so the authors have contacted the authors of RFC 3647 requesting
> permission to use text from it.  All who have replied (four out of five)
> have given that permission.

The document doesn't have the pre-5378 boilerplate and, unless the fifth 3647 author replies, it needs it.  This DISCUSS is a reminder to make that change.
2012-07-19
08 Barry Leiba [Ballot Position Update] New position, Discuss, has been recorded for Barry Leiba
2012-07-19
08 Sean Turner
[Ballot discuss]
Having written a couple of CPs and CPSs (and depending on how you look at it that's either ;) or :( )

1) …
[Ballot discuss]
Having written a couple of CPs and CPSs (and depending on how you look at it that's either ;) or :( )

1) Is it purely political that you're including the following "There are no agreements with the relying parties."

Is the "yet" coming once a DPS is written?  It can be pretty easily argued that publishing a DPS is a form of agreement.  Those that use the signatures are relying on them to do x and y but not z.  Or are you simply trying to telling people to not write RP agreements?

2) So I hope I'm not stepping in it here, but there's a couple of places where the draft discusses TA distribution. Isn't that already addressed with adequate documentation - and can't you just point to that?  I.e.: https://data.iana.org/root-anchors/draft-icann-dnssec-trust-anchor.txt.

Further, I thought the goal of DNSSEC was to encourage IANA as *the* TA.  Some of the wording seems to not entirely support that.  Was this done purposely?

3) This ought to be easy to clear up but I wanted to check on this:

s4.6.1: Are the changes to the algorithms performed according to IETF process?  Should this section explicitly call that out?
2012-07-19
08 Sean Turner
[Ballot comment]
This so short for a policy document! :)  I also saw that Russ had a lengthy set of comments, and I apologize for …
[Ballot comment]
This so short for a policy document! :)  I also saw that Russ had a lengthy set of comments, and I apologize for not having time to skim through them and look for duplicates.  These are primarily based on a review by Steve Kent.

1) s1: Do you want to also be able to check that the data hasn't been verified while in the cache:
      r/that it has not been modified in transit/
        /that it has not been modified in transit or in storage (e.g., caching).

      r/comprising statements of critical
        /comprising statements describing critical

2) About the differences between a PKI and DNSSEC:

2a) There is also no central control of assurance or trust levels in a PKI either ;)

2b) You could argue that in PKIX each CPS defines their own way of managing keys - i.e., the same PKIs.

2c) Weakest link the certification path is akin to the weakest link in the DNS link.

I'm not sure you need the whole justification for why we're different bit.  Just say you borrowed from it and move on -that way you'll avoid all the but this is the same arguments/confusion.  How about:

This document is heavily inspired by the Internet X.509
Public Key Infrastructure Certificate Policy and Certification
Practices Framework [RFC3647].

and r/Consequently, a/A

3) s1.2: You will do it ;)
      r/aims to explain/explains
      r/aims to present/presents

4) s2, Compromise: I guess you can define this however you want, but normally wouldn't include loss, modification, or unauthorized use in key compromise.  I mean the result revocation is the same as key compromise.

5) s2, DNSSEC: I guess it could hurt to repeat the suite of RFCs here:
    r/IETF specifications that
      /IETF specifications [RFC4033][RFC4034][RFC4035] that

6) s2, key rollover: Need to be more precise about which keys you're rolling over (both KSKs (which sign keys, not zones) and ZSKs?).

7) s2, PKI: I'd just copy the definition from RFC 5280 to avoid comments :)
 
    the hardware, software, people, policies, and procedures needed to
    create, manage, distribute, use, store, and revoke public key
    certificates [RFC5280].

8) s2, PA:

8a) Is there a PA for every DP or is this an optional element of this architecture?

8b) Later you use the term formal and informal PA.  These should be explained here.

9) s2, repository (boarding on discuss) if you don't keep the TA public how is this supposed to work?
    r/should be kept public/must be made publicly available

10) s2: I think you're also missing a definition for multi-party.  It's one step farther than separation of duties - and you do use the term later ;)

11) s2: Now that I'm thinking about it should you also have a definition for assurance, DNSSEC participants (does this include both RPs and signers?), DNSSEC stateholders?

12) s3.1: r/The DNSSEC/A DNSSEC - there will be more than one right
          r/determined/specified
          r/levels/levels of assurance
          r/The DPs constitue/A DP also constitues
          r/it is recognized as implementing/it claims to implement

13) s3.2: Assume participant is signer?
          r/participant/signer

14) s3.3: Unclear what "interoperation of a level of trust between zones" means.  Does it mean a DP may serve as a basis for establishing a common basis of trusted operation throughout a set of zones, or something like that?

15) s3.3: r/one or more zones/one or more zones subordinate to that TLD

          r/ A zone operator may be required to write its own
  Practice Statement to support the Policy by explaining how it meets
  the requirements of the Policy.
          / A zone operator may be required to write its own
  Practice Statement to support the Policy, explaining how the operator meets
  the requirements of the Policy.

          r/Alternatively, a zone operator that
  is also the manager of that zone and not governed by any external
  Policy may still choose to disclose operational practices by
  publishing a DPS for the purpose of providing transparency and to
  gain community trust in the operations.
            /Alternatively, a zone operator that
  is also the manager of that zone, and not governed by any external
  DP, may choose to disclose operational practices by
  publishing a DPS. The zone operator might do so to provide transparency
  and to gain community trust in its operations.
       
          r/level of detail in their provisions
            /level of detail each expresses

        r/processes and controls
          /processes and controls, absent a controlling Policy.
 
16) s3.4: In b and c, when you say contains do you mean the
   
        r/implemetor/implementer
        r/regardless/independent
        r/generally must not conflict with the
          /generally they must not conflict with the stipulations

17) s3.4/4: So many people got confused by whether they had to include the sections in the CPS (and presumably in the DPS) that it is a really good idea to specify whether "no stipulation" and clause title should be included instead of omitting the clause.  It stops people from asking: did you mean to say something about X.

18) s4.1.4: /administration Specification/Administration Specification

19) s4.4:

  r/the DNSSEC related functions such as physical access, key
  management, disaster recovery, auditing, and archiving.
    /DNSSEC related functions. Such controls include physical access, key
  management, disaster recovery, auditing, and archiving.

  r/These non-technical security controls are critical for trusting
  DNSSEC signatures, since lack of security may compromise DNSSEC operations.
  For example, it could result in the creation of signatures with
  erroneous information or in the compromise of a Signing Key.
  Within each subcomponent, each type of control will usually need to
  be described separately.
    /These non-technical security controls are critical for trusting the
  signatures since lack of security may compromise DNSSEC operations.
  For example, it could result in the creation of signatures with
  erroneous information or in the compromise of the Signing Key.
  Within each subcomponent, separate consideration will usually need to
  be given to each entity type.

20) s4.4.1: Includes the term "entity system".  I understand that it's from 3647 and that might refer to the RA or CA or whatever, but what's it refer to here?

21) s4.4.4: r/and provide/and to provide

22) s4.4.4: The phrase "access the systems" is from 3647 and it refers to a CA/RA, what's it refer to here? Is it the entire DNS?

23) s4.5: r/to the DNSSEC/to DNSSEC

24) s4.5: 1st mention of secret keys.  Ought it be defined earlier?

25) s4.5.1: For question 3, if the entity is not a TA, isn’t there just one answer for the RP part of this question?

26) s4.5.1: For question 5, Isn’t this subsumed by DNSSEC documents?

27) s4.5.2: Bullet 2, r/n out of m/"n of m"

28) s4.5.5: Point to ISO 15408:2009?

29) s4.6.1: r/and the key length used to create the keys/and key lengths

30) s4.8: r/liability assummed/liability asserted/

31) s7: r/The sensitivity of the information protected by DNSSEC on all levels
  in the DNS tree will vary significantly.
    /The sensitivity of the information protected by DNSSEC at different tiers
  in the DNS tree varies significantly. 

  r/information/information (i.e., DNS records)

r/Entities must evaluate their own environment and the
  chain of trust originating from their Trust Anchor, the associated
  threats and vulnerabilities, to determine the level of risk they are
  willing to accept.
  /Each relying party must evaluate its own environment and the
  chain of trust originating from a Trust Anchor, the associated
  threats and vulnerabilities, to determine the level of risk it is
  willing to accept when relying on DNSSEC-protected objects.
2012-07-19
08 Sean Turner [Ballot Position Update] New position, Discuss, has been recorded for Sean Turner
2012-07-19
08 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2012-07-19
08 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded for Stewart Bryant
2012-07-19
08 Adrian Farrel [Ballot Position Update] New position, No Objection, has been recorded for Adrian Farrel
2012-07-18
08 Pete Resnick [Ballot Position Update] New position, No Objection, has been recorded for Pete Resnick
2012-07-18
08 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded for Robert Sparks
2012-07-18
08 Russ Housley
[Ballot discuss]

  It seems that a DNSSEC signer can start out under one set of policy
  documents, and then for whatever reason the …
[Ballot discuss]

  It seems that a DNSSEC signer can start out under one set of policy
  documents, and then for whatever reason the policy changes and the
  DNSSEC signer starts using a revised policy.  In this situation, the
  parties validating the signature have no means to determine that the
  signer is following a different policy.  Please explain the value of
  the policy to the parties that rely on these signatures.  At a minimum
  this possibility needs to be explained in the Security Considerations.
2012-07-18
08 Russ Housley
[Ballot comment]

  These comments come from a discussion with one of the authors of
  RFC 3647:

  DNSSEC Policy definition seems off …
[Ballot comment]

  These comments come from a discussion with one of the authors of
  RFC 3647:

  DNSSEC Policy definition seems off target to me.  Are these all of the
  requirements or just the security requirements?

  The definition of PKI is not wrong, but it misses an important element
  that is important in the DNSSEC context too.  That is, the system
  depends on trusted distribution of public keys.

  The definition of Signing Key is incomplete.  The private key is used
  to sign.  The corresponding public key is used to validate the
  signature.  This is especially important when this definition is
  used in conjunction with the definition of Trust Anchor.  A Trust
  Anchor only includes the public key.  One way to resolve this is
  to define Key Pair or Asymmetric Key Pair.

  I think that Page 7 and 8 could be more clear.  A DP is a statement of
  security requirements (not principles).  The DP is best used to
  communicate requirements that must be met by complying parties; as
  such it may also be used to determine or establish equivalency between
  policies associated with different DNS zones.  A DPS describes the
  actual controls employed to meet the requirements of applicable DP.

  In Section 4.4.2, please consider the addition of a crypto officer
  that controls the private keys.  Also, which of the listed admin
  roles is responsible for the DNS and the network?

  In Section 4.4.4, please consider other records that may need to be
  kept for a period of time, such as records of key roll over, the
  personnel assigned to various roles, child zone manager verification,
  and so on.

  On Page 18, two person control is a special case of n out of m, where
  n = 2 and m is >= 2.

  In Section 4.5.2, please consider moving items 3 and 5 to another
  section.  The points are not about the signing environment; they are
  about the recovery of the signing private key after a failure of some
  sort.

  *****

  These comments are a portion of the Gen-ART Review by Peter Yee:

  Section 4.4.5 discusses how to handle key compromise.  It might be
  useful to discuss here or somewhere else in the document how the
  compromise is prevented from recurring if there were no attenuating
  measures in place beforehand.  That might well lead to a revision of
  the DP or DPS.  The draft doesn't really discuss under what
  circumstances a document should be iterated or amended.
2012-07-18
08 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded for Russ Housley
2012-07-18
08 Brian Haberman [Ballot Position Update] New position, No Objection, has been recorded for Brian Haberman
2012-07-17
08 Wesley Eddy [Ballot Position Update] New position, No Objection, has been recorded for Wesley Eddy
2012-07-17
08 Stephen Farrell
[Ballot comment]

- 1.1: Is this really for "users" to evaluate the strength of
DNSSEC? I don't know any users who'd do that.  Maybe admins …
[Ballot comment]

- 1.1: Is this really for "users" to evaluate the strength of
DNSSEC? I don't know any users who'd do that.  Maybe admins
of some sort.

- PKI definition: I'd love if you deleted non-repudiation
since a PKI, and DNSSEC in particular, doesn't get you that.
(By itself.)
2012-07-17
08 Stephen Farrell [Ballot Position Update] New position, No Objection, has been recorded for Stephen Farrell
2012-07-17
08 Martin Stiemerling [Ballot Position Update] New position, No Objection, has been recorded for Martin Stiemerling
2012-07-17
08 (System) State changed to Waiting for AD Go-Ahead from In Last Call
2012-07-15
08 Peter Yee Request for Last Call review by GENART Completed. Reviewer: Peter Yee.
2012-07-13
08 Ron Bonica Placed on agenda for telechat - 2012-07-19
2012-07-11
08 Ron Bonica Ballot has been issued
2012-07-11
08 Ron Bonica [Ballot Position Update] New position, Yes, has been recorded for Ronald Bonica
2012-07-11
08 Ron Bonica Created "Approve" ballot
2012-07-10
08 Pearl Liang
IANA has reviewed draft-ietf-dnsop-dnssec-dps-framework-08, which is
currently in Last Call, and has the following comments:

IANA understands that, upon approval of this document, there …
IANA has reviewed draft-ietf-dnsop-dnssec-dps-framework-08, which is
currently in Last Call, and has the following comments:

IANA understands that, upon approval of this document, there are no
IANA Actions that need completion.
2012-07-05
08 Samuel Weiler Request for Last Call review by SECDIR is assigned to Radia Perlman
2012-07-05
08 Samuel Weiler Request for Last Call review by SECDIR is assigned to Radia Perlman
2012-07-05
08 Jean Mahoney Request for Last Call review by GENART is assigned to Peter Yee
2012-07-05
08 Jean Mahoney Request for Last Call review by GENART is assigned to Peter Yee
2012-07-03
08 Amy Vezza
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (A Framework for DNSSEC Policies and …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC:
Reply-To: ietf@ietf.org
Subject: Last Call:  (A Framework for DNSSEC Policies and DNSSEC Practice Statements) to Informational RFC


The IESG has received a request from the Domain Name System Operations WG
(dnsop) to consider the following document:
- 'A Framework for DNSSEC Policies and DNSSEC Practice Statements'
  as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2012-07-17. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  This document presents a framework to assist writers of DNSSEC
  Policies and DNSSEC Practice Statements, such as Domain Managers and
  Zone Operators on both the top-level and secondary level, who are
  managing and operating a DNS zone with Security Extensions (DNSSEC)
  implemented.

  In particular, the framework provides a comprehensive list of topics
  that should be considered for inclusion into a DNSSEC Policy
  definition and Practice Statement.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-dnsop-dnssec-dps-framework/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-dnsop-dnssec-dps-framework/ballot/


No IPR declarations have been submitted directly on this I-D.


2012-07-03
08 Amy Vezza State changed to In Last Call from Last Call Requested
2012-07-03
08 Ron Bonica Last call was requested
2012-07-03
08 Ron Bonica Last call announcement was generated
2012-07-03
08 Ron Bonica Ballot approval text was generated
2012-07-03
08 Ron Bonica State changed to Last Call Requested from AD Evaluation
2012-07-03
08 Ron Bonica State changed to AD Evaluation from Publication Requested
2012-07-03
08 Ron Bonica Ballot writeup was changed
2012-07-03
08 Ron Bonica Ballot writeup was generated
2012-06-25
08 Cindy Morgan
PROTO write-up for draft-ietf-dnsop-dnssec-dps-framework-08.txt
===============================================================

> (1) What type of RFC is being requested (BCP, Proposed Standard,
> Internet Standard, Informational, Experimental, or Historic)?  Why …
PROTO write-up for draft-ietf-dnsop-dnssec-dps-framework-08.txt
===============================================================

> (1) What type of RFC is being requested (BCP, Proposed Standard,
> Internet Standard, Informational, Experimental, or Historic)?  Why
> is this the proper type of RFC?  Is this type of RFC indicated in
> the title page header?

This document is being proposed as an Informational RFC as it provides
a list of suggestions that zone operators may choose into include in
their DNSSEC Policy and/or DNSSEC Practice statement.

The type of RFC is stated in the document header.


> (2) The IESG approval announcement includes a Document Announcement
> Write-Up. Please provide such a Document Announcement Write-Up.
> Recent examples can be found in the "Action" announcements for
> approved documents. The approval announcement contains the
> following sections:
>
> Technical Summary
>
> Relevant content can frequently be found in the abstract and/or
> introduction of the document. If not, this may be an indication
> that there are deficiencies in the abstract or introduction.

This document presents a framework to assist writers of DNSSEC
Policies and DNSSEC Practice Statements, such as Domain Managers and
Zone Operators on both the top-level and secondary level, who are
managing and operating a DNS zone with Security Extensions (DNSSEC)
implemented.

In particular, the framework provides a comprehensive list of topics
that should be considered for inclusion into a DNSSEC Policy
definition and Practice Statement.

> Working Group Summary
>
> Was there anything in WG process that is worth noting? For
> example, was there controversy about particular points or were
> there decisions where the consensus was particularly rough?

No.  The discussions were relatively low-key.

> Document Quality
>
> Are there existing implementations of the protocol? Have a
> significant number of vendors indicated their plan to implement
> the specification? Are there any reviewers that merit special
> mention as having done a thorough review, e.g., one that resulted
> in important changes or a conclusion that the document had no
> substantive issues? If there was a MIB Doctor, Media Type or other
> expert review, what was its course (briefly)? In the case of a
> Media Type review, on what date was the request posted?

To assess the applicability and usefulness of the document, a survey
about DNSSEC policy and practice statements was conducted by the authors
amongst members of CENTR (Council of European National  Top Level Domain
Registries). Among the questions were some asking whether they had heard
about draft-ietf-dnsop-dnssec-dps-framework (then at version -03).

Of the 19 respondents, 17 had heard about the draft and 13 had used it
as a check list of DNSSEC readiness and/or an outline to create such a
document.

> Personnel
>
> Who is the Document Shepherd? Who is the Responsible Area
> Director?

Stephen Morris is the document shepherd.
Ron Bonica is the responsible Area Director.


> (3) Briefly describe the review of this document that was
> performed by the Document Shepherd.  If this version of the
> document is not ready for publication, please explain why the
> document is being forwarded to the IESG.

The content of the document has been reviewed a number of times by the
document shepherd during its development.


> (4) Does the document Shepherd have any concerns about the depth or
> breadth of the reviews that have been performed?

No.

> (5) Do portions of the document need review from a particular or
> from broader perspective, e.g., security, operational complexity,
> AAA, DNS, DHCP, XML, or internationalization? If so, describe the
> review that took place.

No


> (6) Describe any specific concerns or issues that the Document
> Shepherd has with this document that the Responsible Area Director
> and/or the IESG should be aware of? For example, perhaps he or she
> is uncomfortable with certain parts of the document, or has
> concerns whether there really is a need for it. In any event, if
> the WG has discussed those issues and has indicated that it still
> wishes to advance the document, detail those concerns here.

There was a concern about a possible copyright issue, but only in
respect to a pre-RFC5378 RFC.  Parts of RFC 3647 have been used in the
draft, so the authors have contacted the authors of RFC 3647 requesting
permission to use text from it.  All who have replied (four out of five)
have given that permission.


> (7) Has each author confirmed that any and all appropriate IPR
> disclosures required for full conformance with the provisions of
> BCP 78 and BCP 79 have already been filed. If not, explain why.

All authors have confirmed that there are no IPR issues.


> (8) Has an IPR disclosure been filed that references this document?
> If so, summarize any WG discussion and conclusion regarding the IPR
> disclosures.

N/A


> (9) How solid is the WG consensus behind this document? Does it
> represent the strong concurrence of a few individuals, with others
> being silent, or does the WG as a whole understand and agree with
> it?

The discussions took place between a limited number of individuals, with
seven people at WGLC formally supporting the document and believing it
should proceed.


> (10) Has anyone threatened an appeal or otherwise indicated extreme
> discontent? If so, please summarise the areas of conflict in
> separate email messages to the Responsible Area Director. (It
> should be in a separate email because this questionnaire is
> publicly available.)

No.


> (11) Identify any ID nits the Document Shepherd has found in this
> document. (See http://www.ietf.org/tools/idnits/ and the
> Internet-Drafts Checklist). Boilerplate checks are not enough;
> this check needs to be thorough.

No nits have been found in the document.


> (12) Describe how the document meets any required formal review
> criteria, such as the MIB Doctor, media type, and URI type
> reviews.

N/A


> (13) Have all references within this document been identified as
> either normative or informative?

Yes.


> (14) Are there normative references to documents that are not
> ready for advancement or are otherwise in an unclear state? If
> such normative references exist, what is the plan for their
> completion?

No.


> (15) Are there downward normative references references (see RFC
> 3967)? If so, list these downward references to support the Area
> Director in the Last Call procedure.

No.


> (16) Will publication of this document change the status of any
> existing RFCs? Are those RFCs listed on the title page header,
> listed in the abstract, and discussed in the introduction? If the
> RFCs are not listed in the Abstract and Introduction, explain why,
> and point to the part of the document where the relationship of
> this document to the other RFCs is discussed. If this information
> is not in the document, explain why the WG considers it
> unnecessary.

No.


> (17) Describe the Document Shepherd's review of the IANA
> considerations section, especially with regard to its consistency
> with the body of the document. Confirm that all protocol
> extensions that the document makes are associated with the
> appropriate reservations in IANA registries. Confirm that any
> referenced IANA registries have been clearly identified. Confirm
> that newly created IANA registries include a detailed specification
> of the initial contents for the registry, that allocations
> procedures for future registrations are defined, and a reasonable
> name for the new registry has been suggested (see RFC 5226).

N/A - no IANA actions are required.


> (18) List any new IANA registries that require Expert Review for
> future allocations. Provide any public guidance that the IESG
> would find useful in selecting the IANA Experts for these new
> registries.

N/A


> (19) Describe reviews and automated checks performed by the
> Document Shepherd to validate sections of the document written in
> a formal language, such as XML code, BNF rules, MIB definitions,
> etc.

N/A

2012-06-25
08 Cindy Morgan Note added 'Stephen Morris (sa.morris7@googlemail.com) is the document shepherd.'
2012-06-25
08 Cindy Morgan Intended Status changed to Informational
2012-06-25
08 Cindy Morgan IESG process started in state Publication Requested
2012-06-25
08 (System) Earlier history may be found in the Comment Log for draft-ljunggren-dps-framework
2012-06-25
08 Stephen Morris IETF state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up
2012-06-25
08 Stephen Morris Annotation tag Doc Shepherd Follow-up Underway cleared.
2012-06-05
08 Stephen Morris Write-up complete, now submitted to the IESG.
2012-06-05
08 Fredrik Ljunggren New version available: draft-ietf-dnsop-dnssec-dps-framework-08.txt
2012-05-24
07 Stephen Morris IETF state changed to WG Consensus: Waiting for Write-Up from WG Document
2012-03-08
07 Stephen Morris Awaiting new draft to correct a few nits
2012-03-08
07 Fredrik Ljunggren New version available: draft-ietf-dnsop-dnssec-dps-framework-07.txt
2012-02-29
06 Fredrik Ljunggren New version available: draft-ietf-dnsop-dnssec-dps-framework-06.txt
2011-12-05
05 Stephen Morris Awaiting specific comments.
2011-12-05
05 Stephen Morris Annotation tag Doc Shepherd Follow-Up Underway set.
2011-09-02
05 (System) New version available: draft-ietf-dnsop-dnssec-dps-framework-05.txt
2011-06-27
05 Stephen Morris Initial datatracker status update; initiated three week WGLC on 2011-06-13 (ending 2011-07-04)
2011-06-27
05 Stephen Morris IETF state changed to In WG Last Call from WG Document
2011-03-14
04 (System) New version available: draft-ietf-dnsop-dnssec-dps-framework-04.txt
2010-11-09
03 (System) New version available: draft-ietf-dnsop-dnssec-dps-framework-03.txt
2010-07-31
02 (System) New version available: draft-ietf-dnsop-dnssec-dps-framework-02.txt
2010-03-23
01 (System) New version available: draft-ietf-dnsop-dnssec-dps-framework-01.txt
2009-11-25
00 (System) New version available: draft-ietf-dnsop-dnssec-dps-framework-00.txt