Skip to main content

Update to Digital Signatures on Internet-Draft Documents
draft-housley-id-sig-update-03

Revision differences

Document history

Date Rev. By Action
2018-03-07
03 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2018-03-01
03 (System) RFC Editor state changed to AUTH48 from EDIT
2018-01-25
03 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2018-01-24
03 (System) IANA Action state changed to Waiting on RFC Editor from Waiting on Authors
2018-01-24
03 (System) IANA Action state changed to Waiting on Authors from In Progress
2018-01-23
03 (System) IANA Action state changed to In Progress
2018-01-22
03 (System) RFC Editor state changed to EDIT
2018-01-22
03 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2018-01-22
03 (System) Announcement was received by RFC Editor
2018-01-22
03 Cindy Morgan IESG state changed to Approved-announcement sent from Approved-announcement to be sent::Point Raised - writeup needed
2018-01-22
03 Cindy Morgan IESG has approved the document
2018-01-22
03 Cindy Morgan Closed "Approve" ballot
2018-01-22
03 Cindy Morgan Ballot approval text was generated
2018-01-22
03 Cindy Morgan Ballot writeup was changed
2018-01-18
03 Russ Housley New version available: draft-housley-id-sig-update-03.txt
2018-01-18
03 (System) New version approved
2018-01-18
03 (System) Request for posting confirmation emailed to previous authors: Russ Housley
2018-01-18
03 Russ Housley Uploaded new revision
2018-01-11
02 Cindy Morgan IESG state changed to Approved-announcement to be sent::Point Raised - writeup needed from IESG Evaluation
2018-01-11
02 Cindy Morgan Changed consensus to Yes from Unknown
2018-01-10
02 Kathleen Moriarty [Ballot comment]
Thanks for your work on this draft.  Although it may not be perfect, it's the solution we have and this update is needed.
2018-01-10
02 Kathleen Moriarty [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty
2018-01-10
02 Suresh Krishnan [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan
2018-01-10
02 Ben Campbell
[Ballot comment]
I share some of Adam's concerns about compromise of the signing key. But that's an issue with the whole approach, not this document …
[Ballot comment]
I share some of Adam's concerns about compromise of the signing key. But that's an issue with the whole approach, not this document per se. I don't see a reason to hold up publication of this draft.
2018-01-10
02 Ben Campbell [Ballot Position Update] New position, No Objection, has been recorded for Ben Campbell
2018-01-10
02 Alia Atlas [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas
2018-01-10
02 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2018-01-10
02 Warren Kumari
[Ballot comment]
[Update: I've been educated, and am a happy camper ]
For my own education -- I'd like to understand why this is specifically …
[Ballot comment]
[Update: I've been educated, and am a happy camper ]
For my own education -- I'd like to understand why this is specifically about drafts, and doesn't also cover RFCs. I spent some time searching, but "RFC signing" and similar brings up many results, just not relevant to the question. Is there a reason this cannot also be applied to published RFCs? Is there a pointer to what is currently done for RFCs (I feel I should know this, and have some vague recollection of having heard something about it, but cannot find / remember at the moment).

Nit:
The document says: "The IETF Secretariat generates the digital signature shortly after the Internet-Draft is posted in the repository". "shortly" is subjective -- I had to go find Section 3.2.3.3. (Signing-Time Attribute) of RFC 5845 to resolve "shortly" to "several hours or days after the time that the Internet-Draft was actually posted.".
I have no opinion if "several hours or days" is a reasonable time, but isn't what I would have guessed from "shortly".
2018-01-10
02 Warren Kumari Ballot comment text updated for Warren Kumari
2018-01-09
02 Adam Roach
[Ballot comment]
I have the same top-level concerns about the signatures on i-ds over-promising on the guarantees they're providing as I did with potential RFC …
[Ballot comment]
I have the same top-level concerns about the signatures on i-ds over-promising on the guarantees they're providing as I did with potential RFC signatures. I would have preferred to see the i-d signature system deprecated or fixed rather than spending the time to patch a fundamentally broken system to work with the new formats. [A high-level summary: if any signing key (expired or not) is ever compromised, we have no path to recovery. Signatures forged with a compromised key will validate, and we will have no recourse other than a publicity campaign to inform interested parties that no signature can be trusted from that point forward.]

I cannot condone additional work on this signing system until it has some sensible means of dealing with key compromise, and am therefore balloting "ABSTAIN". The foregoing concerns have already been expressed to the document author in the context of RFC signing, so I do not expect this to be surprising.

That said, if we're publishing this anyway, I have a number of comments (as the contents of this document may have bearing on any fixed system we define in the future).

_______
(1) Consider registering id-ct-epub

If we're registering new formats based on RFC 7990 (which seems to be the impetus for this document), it would seem to be far easier to add epub (RFC 7990, section 7.4.1) at this time rather than requiring new epub format work to take care of it when that work is begun.

______
(2) Register HTML under "SMI Security for S/MIME CMS Content Type" or explain use of z39-50 OID

This definition in section 3 sticks out as exceptionally odd:

>      id-ct-htmlWithCRLF OBJECT IDENTIFIER ::= { 1 2 840 10003 5 109 3 }

Given that we don't use (e.g.) 1.2.840.10003.5.109.10 for XML or 1.2.840.10003.5.109.1 for PDF, the appearance of an OID from the 1.2.840.10003.5.109 namespace needs some kind of explanation. Alternately (and... probably preferably?), this document should probably register a value under 1.2.840.113549.1.9.16.1 instead.

_____
(3) Handling of U+FEFF mid-document

Section 4.1 says:

  A byte-order-mark (BOM) used at the beginning of a UTF8 file is not
  considered to be part of the file content.  When present, a leading
  BOM MUST NOT be processed by the digital signature algorithm.

For clarity, this should probably (a) clearly indicate that a zero-width-no-break-space appearing elsewhere in the document is not elided, and (b) indicate exactly what to do if multiple U+FEFF characters appear at the start of a document.

_____
(4) W3C XML document should be normative

Section 4.2 says:

  A robust signature generation process MAY perform canonicalization to
  ensure that the W3C guidance has been followed.

The W3C guidance in question is the document currently cited as [R20060816]. This normative reference to its procedures means the underlying document should be in the "Normative References" section.

_____
(5) Handling of BOMs in HTML

HTML5 has explicit handling regarding BOMs (cf. ), so one might reasonably expect them to be added/removed/etc by HTTP servers and/or clients under certain circumstances. As a consequence, I believe that section 4.2 needs the same BOM considerations as section 4.1 (including the caveats I outline above).

_____
(6) XML reference out of date

In section 9:

  [R20060816] Bray, T., J. Paoli, C. M. Sperberg-McQueen, E. Maler,
              and F. Yergeau, "Extensible Markup Language (XML) 1.0
              (Fourth Edition)", W3C Recommendation, 16 August 2006.
              http://www.w3.org/TR/2006/REC-xml-20060816.

This URL brings up a prominent red-box warning that the document is out of date. I believe you want to reference the 20081126 version instead. Also, all W3C specs now appear at https URLs rather than http URLs.
2018-01-09
02 Adam Roach [Ballot Position Update] Position for Adam Roach has been changed to Abstain from No Objection
2018-01-09
02 Adam Roach
[Ballot comment]
I have the same top-level concerns about the signatures on i-ds over-promising on the guarantees they're providing as I did with potential RFC …
[Ballot comment]
I have the same top-level concerns about the signatures on i-ds over-promising on the guarantees they're providing as I did with potential RFC signatures. I would have preferred to see the i-d signature system deprecated or overhauled rather than spending the time to patch a fundamentally broken system to work with the new formats. [A high-level summary, for anyone who is interested: if any signing key (expired or not) for i-ds is ever compromised, we have no path to recovery. Signatures forged with a compromised key will validate, and we will have no recourse other than a publicity campaign to inform interested parties that no signature can be trusted from that point forward.]

That said, if we're doing this, I have a number of comments on the current document.

_______
(1) Consider registering id-ct-epub

If we're registering new formats based on RFC 7990 (which seems to be the impetus for this document), it would seem to be far easier to add epub (RFC 7990, section 7.4.1) at this time rather than requiring a new document when the corresponding work is undertaken.

______
(2) Register HTML under "SMI Security for S/MIME CMS Content Type" or explain use of z39-50 OID

This definition in section 3 sticks out as exceptionally odd:

>      id-ct-htmlWithCRLF OBJECT IDENTIFIER ::= { 1 2 840 10003 5 109 3 }

Given that we don't use (e.g.) 1.2.840.10003.5.109.10 for XML or 1.2.840.10003.5.109.1 for PDF, the appearance of an OID from the 1.2.840.10003.5.109 namespace needs some kind of explanation. Alternately (and... probably preferably?), this document should probably register a value under 1.2.840.113549.1.9.16.1 instead.

_____
(3) Handling of U+FEFF mid-document

Section 4.1 says:

  A byte-order-mark (BOM) used at the beginning of a UTF8 file is not
  considered to be part of the file content.  When present, a leading
  BOM MUST NOT be processed by the digital signature algorithm.

For clarity, this should probably (a) clearly indicate that a zero-width-no-break-space appearing elsewhere in the document is not elided, and (b) indicate exactly what to do if multiple U+FEFF characters appear at the start of a document.

_____
(4) W3C XML document should be normative

Section 4.2 says:

  A robust signature generation process MAY perform canonicalization to
  ensure that the W3C guidance has been followed.

The W3C guidance in question is the document currently cited as [R20060816]. This normative reference to its contents means the underlying document should be in the "Normative References" section.

_____
(5) Handling of BOMs in HTML

HTML5 has explicit handling regarding BOMs (cf. ), so one might reasonably expect them to be added/removed/etc by HTTP servers and/or clients under certain circumstances. As a consequence, I believe that section 4.2 needs the same BOM considerations as section 4.1 (including the caveats I outline above).

_____
(6) XML reference out of date

In section 9:

  [R20060816] Bray, T., J. Paoli, C. M. Sperberg-McQueen, E. Maler,
              and F. Yergeau, "Extensible Markup Language (XML) 1.0
              (Fourth Edition)", W3C Recommendation, 16 August 2006.
              http://www.w3.org/TR/2006/REC-xml-20060816.

This URL brings up a prominent red-box warning that the document is out of date. I believe you want to reference the 20081126 version instead. Also, all W3C specs now appear at https URLs rather than http URLs.
2018-01-09
02 Adam Roach Ballot comment text updated for Adam Roach
2018-01-09
02 Adam Roach
[Ballot comment]
I have the same top-level concerns about the signatures on i-ds over-promising on the guarantees they're providing as I did with potential RFC …
[Ballot comment]
I have the same top-level concerns about the signatures on i-ds over-promising on the guarantees they're providing as I did with potential RFC signatures. I would have preferred to see the i-d signature system deprecated or overhauled rather than spending the time to patch a fundamentally broken system to work with the new formats. [A high-level summary, for anyone who is interested: if any signing key (expired or not) for i-ds is ever compromised, we have no path to recovery. Signatures forged with a compromised key will validate, and we will have no recourse other than a publicity campaign to inform interested parties that no signature can be trusted from that point forward.]

That said, if we're doing this, I have a number of comments on the current document.

_______
(1) Consider registering id-ct-pub

If we're registering new formats based on RFC 7990 (which seems to be the impetus for this document), it would seem to be far easier to add epub (RFC 7990, section 7.4.1) at this time rather than requiring a new document when the corresponding work is undertaken.

______
(2) Register HTML under "SMI Security for S/MIME CMS Content Type" or explain use of z39-50 OID

This definition in section 3 sticks out as exceptionally odd:

>      id-ct-htmlWithCRLF OBJECT IDENTIFIER ::= { 1 2 840 10003 5 109 3 }

Given that we don't use (e.g.) 1.2.840.10003.5.109.10 for XML or 1.2.840.10003.5.109.1 for PDF, the appearance of an OID from the 1.2.840.10003.5.109 namespace needs some kind of explanation. Alternately (and... probably preferably?), this document should probably register a value under 1.2.840.113549.1.9.16.1 instead.

_____
(3) Handling of U+FEFF mid-document

Section 4.1 says:

  A byte-order-mark (BOM) used at the beginning of a UTF8 file is not
  considered to be part of the file content.  When present, a leading
  BOM MUST NOT be processed by the digital signature algorithm.

For clarity, this should probably (a) clearly indicate that a zero-width-no-break-space appearing elsewhere in the document is not elided, and (b) indicate exactly what to do if multiple U+FEFF characters appear at the start of a document.

_____
(4) W3C XML document should be normative

Section 4.2 says:

  A robust signature generation process MAY perform canonicalization to
  ensure that the W3C guidance has been followed.

The W3C guidance in question is the document currently cited as [R20060816]. This normative reference to its contents means the underlying document should be in the "Normative References" section.

_____
(5) Handling of BOMs in HTML

HTML5 has explicit handling regarding BOMs (cf. ), so one might reasonably expect them to be added/removed/etc by HTTP servers and/or clients under certain circumstances. As a consequence, I believe that section 4.2 needs the same BOM considerations as section 4.1 (including the caveats I outline above).

_____
(6) XML reference out of date

In section 9:

  [R20060816] Bray, T., J. Paoli, C. M. Sperberg-McQueen, E. Maler,
              and F. Yergeau, "Extensible Markup Language (XML) 1.0
              (Fourth Edition)", W3C Recommendation, 16 August 2006.
              http://www.w3.org/TR/2006/REC-xml-20060816.

This URL brings up a prominent red-box warning that the document is out of date. I believe you want to reference the 20081126 version instead. Also, all W3C specs now appear at https URLs rather than http URLs.
2018-01-09
02 Adam Roach Ballot comment text updated for Adam Roach
2018-01-09
02 Adam Roach
[Ballot comment]
I have the same top-level concerns about the signatures on i-ds over-promising on the guarantees they're providing as I did with potential RFC …
[Ballot comment]
I have the same top-level concerns about the signatures on i-ds over-promising on the guarantees they're providing as I did with potential RFC signatures. I would have preferred to see the i-d signature system deprecated or overhauled rather than spending the time to patch a fundamentally broken system to work with the new formats. [A high-level summary, for anyone who is interested: if any signing key (expired or not) for i-ds is ever compromised, we have no path to recovery. Signatures forged with a compromised key will validate, and we will have no recourse other than a publicity campaign to inform interested parties that no signature can be trusted from that point forward.]

That said, if we're doing this, I have a number of comments on the current document.
_______
(1) Consider registering id-ct-pub

If we're registering new formats based on RFC 7990 (which seems to be the impetus for this document), it would seem to be far easier to add epub (RFC 7990, section 7.4.1) at this time rather than requiring a new document when the corresponding work is undertaken.

______
(2) Register HTML under "SMI Security for S/MIME CMS Content Type" or explain use of z39-50 OID

This definition in section 3 sticks out as exceptionally odd:

>      id-ct-htmlWithCRLF OBJECT IDENTIFIER ::= { 1 2 840 10003 5 109 3 }

Given that we don't use (e.g.) 1.2.840.10003.5.109.10 for XML or 1.2.840.10003.5.109.1 for PDF, the appearance of an OID from the 1.2.840.10003.5.109 namespace needs some kind of explanation. Alternately (and... probably preferably?), this document should probably register a value under 1.2.840.113549.1.9.16.1 instead.

_____
(3) Handling of U+FEFF mid-document

Section 4.1 says:

  A byte-order-mark (BOM) used at the beginning of a UTF8 file is not
  considered to be part of the file content.  When present, a leading
  BOM MUST NOT be processed by the digital signature algorithm.

For clarity, this should probably (a) clearly indicate that a zero-width-no-break-space appearing elsewhere in the document is not elided, and (b) indicate exactly what to do if multiple U+FEFF characters appear at the start of a document.

_____
(4) W3C XML document should be normative

Section 4.2 says:

  A robust signature generation process MAY perform canonicalization to
  ensure that the W3C guidance has been followed.

The W3C guidance in question is the document currently cited as [R20060816]. This normative reference to its contents means the underlying document should be in the "Normative References" section.

_____
(5) Handling of BOMs in HTML

HTML5 has explicit handling regarding BOMs (cf. ), so one might reasonably expect them to be added/removed/etc by HTTP servers and/or clients under certain circumstances. As a consequence, I believe that section 4.2 needs the same BOM considerations as section 4.1 (including the caveats I outline above).

_____
(6) XML reference out of date

In section 9:

  [R20060816] Bray, T., J. Paoli, C. M. Sperberg-McQueen, E. Maler,
              and F. Yergeau, "Extensible Markup Language (XML) 1.0
              (Fourth Edition)", W3C Recommendation, 16 August 2006.
              http://www.w3.org/TR/2006/REC-xml-20060816.

This URL brings up a prominent red-box warning that the document is out of date. I believe you want to reference the 20081126 version instead. Also, all W3C specs now appear at https URLs rather than http URLs.
2018-01-09
02 Adam Roach [Ballot Position Update] New position, No Objection, has been recorded for Adam Roach
2018-01-08
02 Warren Kumari
[Ballot comment]
For my own education -- I'd like to understand why this is specifically about drafts, and doesn't also cover RFCs. I spent some …
[Ballot comment]
For my own education -- I'd like to understand why this is specifically about drafts, and doesn't also cover RFCs. I spent some time searching, but "RFC signing" and similar brings up many results, just not relevant to the question. Is there a reason this cannot also be applied to published RFCs? Is there a pointer to what is currently done for RFCs (I feel I should know this, and have some vague recollection of having heard something about it, but cannot find / remember at the moment).

Nit:
The document says: "The IETF Secretariat generates the digital signature shortly after the Internet-Draft is posted in the repository". "shortly" is subjective -- I had to go find Section 3.2.3.3. (Signing-Time Attribute) of RFC 5845 to resolve "shortly" to "several hours or days after the time that the Internet-Draft was actually posted.".
I have no opinion if "several hours or days" is a reasonable time, but isn't what I would have guessed from "shortly".
2018-01-08
02 Warren Kumari [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari
2018-01-08
02 Alexey Melnikov [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov
2018-01-08
02 Eric Rescorla
[Ballot comment]
This whole canonicalization things seems pretty unfortunate. I feel like we're rapidly leaving the era where we have to worry about transformations in …
[Ballot comment]
This whole canonicalization things seems pretty unfortunate. I feel like we're rapidly leaving the era where we have to worry about transformations in FTP. However, given that it's in the predecessor document, I won't object.
2018-01-08
02 Eric Rescorla [Ballot Position Update] New position, No Objection, has been recorded for Eric Rescorla
2018-01-08
02 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2018-01-04
02 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2018-01-04
02 Mirja Kühlewind [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind
2018-01-03
02 Spencer Dawkins [Ballot Position Update] New position, No Objection, has been recorded for Spencer Dawkins
2018-01-03
02 Alissa Cooper IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead
2018-01-03
02 Alissa Cooper Ballot has been issued
2018-01-03
02 Alissa Cooper [Ballot Position Update] New position, Yes, has been recorded for Alissa Cooper
2018-01-03
02 Alissa Cooper Created "Approve" ballot
2018-01-02
02 Francis Dupont Request for Last Call review by GENART Completed: Ready. Reviewer: Francis Dupont.
2018-01-02
02 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2018-01-01
02 Tianran Zhou Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Tianran Zhou. Sent review to list.
2017-12-27
02 Rifaat Shekh-Yusef Request for Last Call review by SECDIR Completed: Ready. Reviewer: Rifaat Shekh-Yusef. Sent review to list.
2017-12-15
02 (System) IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed
2017-12-15
02 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Services Operator has completed its review of draft-housley-id-sig-update-02. If any part of this review is inaccurate, please let …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Services Operator has completed its review of draft-housley-id-sig-update-02. If any part of this review is inaccurate, please let us know.

The IANA Services Operator understands that, upon approval of this document, there is a single action which we must complete.

In the current draft, the author requests the following:

"Please assign and object identifiers for id-ct-utf8TextWithCRLF in the SMI Security for S/MIME CMS Content Type registry (1.2.840.113549.1.9.16.1)."

In discussions with the author, IANA understands that a single action is requested.

In the SMI Security for S/MIME CMS Content Type (1.2.840.113549.1.9.16.1) registry on the Structure of Management Information (SMI) Numbers (MIB Module Registrations) registry page located at:

https://www.iana.org/assignments/smi-numbers/

the existing registration for decimal value 37 will have its reference changed to [ RFC-to-be ].

The IANA Services Operator understands that this is the only action required to be completed upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm the list of actions that will be performed.


Thank you,

Sabrina Tanamal
IANA Services Specialist
2017-12-09
02 Tero Kivinen Request for Last Call review by SECDIR is assigned to Rifaat Shekh-Yusef
2017-12-09
02 Tero Kivinen Request for Last Call review by SECDIR is assigned to Rifaat Shekh-Yusef
2017-12-07
02 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Tianran Zhou
2017-12-07
02 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Tianran Zhou
2017-12-07
02 Jean Mahoney Request for Last Call review by GENART is assigned to Francis Dupont
2017-12-07
02 Jean Mahoney Request for Last Call review by GENART is assigned to Francis Dupont
2017-12-05
02 Amy Vezza IANA Review state changed to IANA - Review Needed
2017-12-05
02 Amy Vezza
The following Last Call announcement was sent out (ends 2018-01-02):

From: The IESG
To: IETF-Announce
CC: alissa@cooperw.in, jimsch@augustcellars.com, draft-housley-id-sig-update@ietf.org
Reply-To: ietf@ietf.org
Sender:
Subject: …
The following Last Call announcement was sent out (ends 2018-01-02):

From: The IESG
To: IETF-Announce
CC: alissa@cooperw.in, jimsch@augustcellars.com, draft-housley-id-sig-update@ietf.org
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (Update to Digital Signatures on Internet-Draft Documents) to Informational RFC


The IESG has received a request from an individual submitter to consider the
following document: - 'Update to Digital Signatures on Internet-Draft
Documents'
  as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2018-01-02. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


  RFC 5485 specifies the conventions for digital signatures on
  Internet-Draft documents.  The Cryptographic Message Syntax (CMS) is
  used to create a detached signature, which is stored in a separate
  companion file so that no existing utilities are impacted by the
  addition of the digital signature.

  The RFC Editor recently published the first RFC that includes non-
  ASCII characters in a "text" file.  The conventions specified in RFC
  7997
were followed.  We assume that non-ASCII characters will soon
  start appearing in Internet-Drafts as well.  This document updates
  the handling of digital signatures on Internet-Draft document for
  non-ASCII characters in a "text" file.

  This document (once approved) updates RFC 5485.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-housley-id-sig-update/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-housley-id-sig-update/ballot/


No IPR declarations have been submitted directly on this I-D.




2017-12-05
02 Amy Vezza IESG state changed to In Last Call from Last Call Requested
2017-12-05
02 Amy Vezza Last call announcement was changed
2017-12-04
02 Alissa Cooper Ballot writeup was changed
2017-12-04
02 Alissa Cooper Placed on agenda for telechat - 2018-01-11
2017-12-04
02 Alissa Cooper Last call was requested
2017-12-04
02 Alissa Cooper Ballot approval text was generated
2017-12-04
02 Alissa Cooper Ballot writeup was generated
2017-12-04
02 Alissa Cooper IESG state changed to Last Call Requested from AD Evaluation
2017-12-04
02 Alissa Cooper Last call announcement was generated
2017-12-04
02 Russ Housley New version available: draft-housley-id-sig-update-02.txt
2017-12-04
02 (System) New version approved
2017-12-04
02 (System) Request for posting confirmation emailed to previous authors: Russ Housley
2017-12-04
02 Russ Housley Uploaded new revision
2017-12-04
01 Alissa Cooper IESG state changed to AD Evaluation from Publication Requested
2017-12-04
01 Alissa Cooper Assigned to General Area
2017-12-04
01 Alissa Cooper IESG process started in state Publication Requested
2017-11-21
01 Alissa Cooper IETF WG state changed to Submitted to IESG for Publication
2017-11-13
01 Jim Schaad Changed document writeup
2017-11-13
01 Jim Schaad Changed document writeup
2017-11-13
01 Russ Housley New version available: draft-housley-id-sig-update-01.txt
2017-11-13
01 (System) New version approved
2017-11-13
01 (System) Request for posting confirmation emailed to previous authors: Russ Housley
2017-11-13
01 Russ Housley Uploaded new revision
2017-11-01
00 Jim Schaad Changed document writeup
2017-10-05
00 Alissa Cooper Notification list changed to Jim Schaad <jimsch@augustcellars.com>
2017-10-05
00 Alissa Cooper Document shepherd changed to Jim Schaad
2017-10-05
00 Alissa Cooper Intended Status changed to Informational from None
2017-10-05
00 Alissa Cooper Stream changed to IETF from None
2017-10-05
00 Alissa Cooper Shepherding AD changed to Alissa Cooper
2017-10-04
00 Russ Housley New version available: draft-housley-id-sig-update-00.txt
2017-10-04
00 (System) New version approved
2017-10-04
00 Russ Housley Request for posting confirmation emailed  to submitter and authors: Russ Housley
2017-10-04
00 Russ Housley Uploaded new revision