Skip to main content

iCalendar Message-Based Interoperability Protocol (iMIP)
draft-ietf-calsify-rfc2447bis-11

Revision differences

Document history

Date Rev. By Action
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Sean Turner
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Tim Polk
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Ralph Droms
2012-08-22
11 (System) post-migration administrative database adjustment to the No Objection position for Adrian Farrel
2010-09-15
11 Cindy Morgan State changed to RFC Ed Queue from Approved-announcement sent by Cindy Morgan
2010-09-15
11 (System) IANA Action state changed to No IC from In Progress
2010-09-15
11 (System) IANA Action state changed to In Progress
2010-09-15
11 Cindy Morgan IESG state changed to Approved-announcement sent
2010-09-15
11 Cindy Morgan IESG has approved the document
2010-09-15
11 Cindy Morgan Closed "Approve" ballot
2010-09-15
11 Ralph Droms [Ballot Position Update] Position for Ralph Droms has been changed to No Objection from Discuss by Ralph Droms
2010-09-14
11 Sean Turner [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss by Sean Turner
2010-09-14
11 (System) New version available: draft-ietf-calsify-rfc2447bis-11.txt
2010-09-10
11 (System) Removed from agenda for telechat - 2010-09-09
2010-09-09
11 Amy Vezza State changed to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza
2010-09-09
11 Tim Polk
[Ballot comment]
The Security Considerations text should be updated to reflect any changes that result from the discuss points
above.  Specifically, this specification will inherit …
[Ballot comment]
The Security Considerations text should be updated to reflect any changes that result from the discuss points
above.  Specifically, this specification will inherit many of the security considerations in pkix, s/mime and/or pgp
if the changes suggested are accepted and implemented.
2010-09-09
11 Tim Polk [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Discuss by Tim Polk
2010-09-09
11 Gonzalo Camarillo [Ballot Position Update] New position, No Objection, has been recorded by Gonzalo Camarillo
2010-09-09
11 Peter Saint-Andre [Note]: changed to 'Eliot Lear (lear@cisco.com) is the Document Shepherd.' by Peter Saint-Andre
2010-09-09
11 Peter Saint-Andre [Note]: 'Note: Eliot Lear (lear@cisco.com) is the Document Shepherd.' added by Peter Saint-Andre
2010-09-09
11 Adrian Farrel [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss by Adrian Farrel
2010-09-09
11 Adrian Farrel
[Ballot comment]
Section 1

  This binding document provides the transport specific information
  necessary to convey iCalendar Transport-independent Interoperability
  Protocol (iTIP) [iTIP] over …
[Ballot comment]
Section 1

  This binding document provides the transport specific information
  necessary to convey iCalendar Transport-independent Interoperability
  Protocol (iTIP) [iTIP] over Internet email (using MIME) as defined in
  [RFC-5322] and [RFC-2045].

What is a "binding document"? I think the document "specifies a
binding". But I don't think that the document is itself binding.
2010-09-09
11 Adrian Farrel [Ballot discuss]
Upgrading Robert's comment to a Discuss. Please add "Obsoletes RFC 2447"
to the document header.
2010-09-09
11 Adrian Farrel [Ballot Position Update] New position, Discuss, has been recorded by Adrian Farrel
2010-09-09
11 Jari Arkko [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko
2010-09-09
11 Dan Romascanu [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu
2010-09-09
11 Dan Romascanu
[Ballot comment]
Formatting comment - the Table of Contents does not fully match the document - page numbers are not accurate, Appendices missing, the last …
[Ballot comment]
Formatting comment - the Table of Contents does not fully match the document - page numbers are not accurate, Appendices missing, the last two sections listed in the table are actually no longer in the document, the capitalization of some of the sections does not correspond to the one in the document.
2010-09-08
11 David Harrington [Ballot Position Update] New position, No Objection, has been recorded by David Harrington
2010-09-08
11 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2010-09-08
11 Stewart Bryant [Ballot Position Update] New position, No Objection, has been recorded by Stewart Bryant
2010-09-08
11 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2010-09-08
11 Ralph Droms
[Ballot discuss]
I'm not quite sure this issue is included in Sean's DISCUSS; if it is, I'll clear.  In section 3:

  If calendar confidentiality …
[Ballot discuss]
I'm not quite sure this issue is included in Sean's DISCUSS; if it is, I'll clear.  In section 3:

  If calendar confidentiality is required by the sender, signed iMIP
  messages SHOULD be encrypted by a mechanism based on Security
  Multiparts for MIME [RFC-1847].

s/SHOULD/MUST/, or give some explanation about the alternatives to providing confidentiality if "a mechanism based on Security Multiparts for MIME" is not used.
2010-09-08
11 Ralph Droms [Ballot Position Update] New position, Discuss, has been recorded by Ralph Droms
2010-09-08
11 Tim Polk
[Ballot comment]
The Security Considerations text should be updated to reflect any changes that result from the discuss points
above.  Specifically, this specification will inherit …
[Ballot comment]
The Security Considerations text should be updated to reflect any changes that result from the discuss points
above.  Specifically, this specification will inherit many of the security considerations in pkix, s/mime and/or pgp
if the changes suggested are accepted and implemented.
2010-09-08
11 Tim Polk
[Ballot discuss]
I know we are updating a rather old document, and we may not be able to apply the same metrics that would
be …
[Ballot discuss]
I know we are updating a rather old document, and we may not be able to apply the same metrics that would
be appropriate for new work.  That said, there are some opportunities to fill in holes here, and I would like the
author to consider which are appropriate to address at this point.

The document points to 1847 to achieve authentication and confidentiality.  However, this is just a framework
document and does not specify specific signature types or encryption mechanisms.  In addition to the algorithms
and key sizes that Sean mentioned in his discuss, there are a few additional features that could be specified to
enhance interoperability.  Given the age of the protocol, I would hope that a de facto standard for each feature
has already emerged; this should definitely be factored in to the selection process.

The first would be signature type.  When RFC 1847 was being published, the application/moss-signature specified
in RFC 1848 was the obvious choice.  More current protocols would specify application/pgp-signature or
application/x-pkcs7-signature.  Could we specify one of these as mandatory to implement?

A similar choice for encryption might be in order.  The application/pgp-encrypted and application/pkcs7-mime
types are two possibilities, I think.

The third feature that I found missing was formats and processing rules for certificates.  Section 2.2.2 explicitly
calls out "public/private key certificates".  Both PGP and PKIX references would seem to be in order here.  (Even
if one is selected as mandatory to implement, the other remains an option.)  Establishing rules for validation and
use of these certificates seems foundational, and since we can do it by reference I think it ought to be added.
2010-09-08
11 Tim Polk [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk
2010-09-07
11 Sean Turner
[Ballot comment]
1) Sec 2.1: Should htere be a pointer to [iCAL] after text/multipart (you don't find out until the IANA section that that's where …
[Ballot comment]
1) Sec 2.1: Should htere be a pointer to [iCAL] after text/multipart (you don't find out until the IANA section that that's where it's from):

OLD:

  A MIME entity containing content information formatted according to
  this document will be referenced as a "text/calendar" content type.

NEW:

  A MIME entity containing content information formatted according to
  this document will be referenced as a "text/calendar" content type [iCAL].

2) Sec 2.1.1: Should the must be MUST in the following:

  That is, the "Organizer"
  must ignore an [iTIP] message from spoof@xyz.example.net that
  declines a meeting invitation for b@example.com.

3) In Sec 2.2.2, the last sentence is confusing to me.  Aren't you really trying to say unauthenticated messages may not be reliable?

OLD:

Authenticating an unsigned message may not be reliable.

NEW:

Unauthenticated messages (i.e., unsigned messages) may not be reliable.

4) To align with 2.2.2, change 2.2.3 to explicitly call out multipart/encrypted:

OLD:

To ensure confidentiality using iMIP implementations should utilize encryption compliant with [RFC-1847].

NEW:

To ensure confidentiality using iMIP implementations should utilize "multipart/signed" from [RFC-1847].

Note that if DISCUSS #1 is agreed then the r/should/MUST.

5) Sec 2.2.3 (for clarity):

OLD:

The protocol does not restrict ...

NEW:

iMIP does not restrict ...

6) Sec 2.4 bullet #1:  Shouldn't we add a reference after multipart/mixed to RFC 2046:

OLD:

  Note 1: A MIME message containing multiple iCalendar objects with
  different method values MUST be further encapsulated with a
  "multipart/mixed" MIME entity.

NEW:

  Note 1: A MIME message containing multiple iCalendar objects with
  different method values MUST be further encapsulated with a
  "multipart/mixed" MIME entity [RFC-2046].

7) Sec 2.4: Add reference to RFC 2046:

OLD:

...  scheduling message (i.e., "multipart/alternative").

NEW:

...  scheduling message (i.e., "multipart/alternative" [RFC-2046]).

8) Sec 3: Provide pointer back to 2.2.2 and 2.2.3:

OLD:

  Compliant applications
  MUST support signing and encrypting text/calendar body parts using a
  mechanism based on Security Multiparts for MIME [RFC-1847] to
  facilitate the authentication of the originator of the iCalendar
  object.

NEW:

  Compliant applications
  MUST support signing and encrypting text/calendar body parts using a
  mechanism based on Security Multiparts for MIME [RFC-1847] to
  facilitate the authentication of the originator of the iCalendar
  object (see Section 2.2.2 and 2.2.3).

9) Sec 3 bullet 1 (for clarity): replace:

who signed the email message

with

who signed the text/calendar body part
2010-09-07
11 Sean Turner
[Ballot discuss]
1) Section 2.2.2 and 2.2.3 say that authentication "can" be applied with multipart/signed and confidentiality "should" utilize mutlipart/encrypted.  Shouldn't these be MUSTs?  It's …
[Ballot discuss]
1) Section 2.2.2 and 2.2.3 say that authentication "can" be applied with multipart/signed and confidentiality "should" utilize mutlipart/encrypted.  Shouldn't these be MUSTs?  It's MUST in the security considerations section, but I think it ought to be MUST here too (i.e., r/can/MUST and r/shoud/MUST).

2) Specify MUST support multipart/signed and multipart/encrypted is not sufficient to ensure interoperability.  You need to pick an algorithm for message digest, digital signatures, and encryption.  Might I suggest: SHA-256, RSA 2048 (for both sig and enc).

3) Sec 3 Step 3:  How is this done: If the signer cannot be correlated to an "ATTENDEE"/"ORGANIZER" property?  If you're using the email address in the certificate then you need to say whether the email address is required in the certificate and where it should be located.  Also, shouldn't there be a reference to RFC 5280 for certificate path processing?
2010-09-07
11 Sean Turner [Ballot Position Update] New position, Discuss, has been recorded by Sean Turner
2010-09-07
11 Robert Sparks
[Ballot comment]
From the writeup, this is intended to Obsolete 2447 - please add the Obsoletes: line in the header.

There's some text in the …
[Ballot comment]
From the writeup, this is intended to Obsolete 2447 - please add the Obsoletes: line in the header.

There's some text in the "Status of this Memo" section indicating the intent at one point was to
take iMIP to Draft with this document (" A revised version of this draft document will be submitted to the RFC editor as a Draft Standard for the Internet Community. ") Just to double-check - it's being process for recycling at Proposed Standard at the moment, not for moving to Draft.
2010-09-07
11 Robert Sparks [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks
2010-09-06
11 Russ Housley [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley
2010-09-05
11 Alexey Melnikov [Ballot Position Update] New position, Recuse, has been recorded by Alexey Melnikov
2010-09-05
11 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Hilarie Orman.
2010-09-03
11 Peter Saint-Andre State changed to IESG Evaluation from Waiting for AD Go-Ahead by Peter Saint-Andre
2010-09-03
11 Peter Saint-Andre [Ballot Position Update] New position, Yes, has been recorded for Peter Saint-Andre
2010-09-03
11 Peter Saint-Andre Ballot has been issued by Peter Saint-Andre
2010-09-03
11 Peter Saint-Andre Created "Approve" ballot
2010-08-19
11 Peter Saint-Andre Placed on agenda for telechat - 2010-09-09 by Peter Saint-Andre
2010-08-17
11 Amy Vezza State changed to Waiting for AD Go-Ahead from In Last Call by Amy Vezza
2010-08-13
11 Cindy Morgan Last call sent
2010-08-13
11 Cindy Morgan State changed to In Last Call from Last Call Requested by Cindy Morgan
2010-08-13
11 Cindy Morgan Last Call began 2010-08-02, and is scheduled to end 2010-08-16.  See http://www.ietf.org/mail-archive/web/ietf-announce/current/msg07737.html
2010-08-11
11 Michelle Cotton
IANA Last Call Comments:

IANA understands that, upon approval of this document, there no IANA
Actions that need to be completed. In particular, IANA notes …
IANA Last Call Comments:

IANA understands that, upon approval of this document, there no IANA
Actions that need to be completed. In particular, IANA notes that the
text/calendar media type is already registered in the Media Types registry.
2010-08-07
11 Samuel Weiler Request for Last Call review by SECDIR is assigned to Hilarie Orman
2010-08-07
11 Samuel Weiler Request for Last Call review by SECDIR is assigned to Hilarie Orman
2010-08-02
11 Peter Saint-Andre Last Call was requested by Peter Saint-Andre
2010-08-02
11 (System) Ballot writeup text was added
2010-08-02
11 (System) Last call text was added
2010-08-02
11 (System) Ballot approval text was added
2010-08-02
11 Peter Saint-Andre State changed to Last Call Requested from AD is watching::AD Followup by Peter Saint-Andre
2010-07-28
10 (System) New version available: draft-ietf-calsify-rfc2447bis-10.txt
2010-06-21
11 (System) Sub state has been changed to AD Follow up from New Id Needed
2010-06-21
09 (System) New version available: draft-ietf-calsify-rfc2447bis-09.txt
2010-06-08
11 Peter Saint-Andre State Changes to AD is watching::Revised ID Needed from AD Evaluation by Peter Saint-Andre
2010-06-08
11 Alexey Melnikov Intended Status has been changed to Proposed Standard from None
2010-05-09
11 Peter Saint-Andre State Changes to AD Evaluation from AD is watching by Peter Saint-Andre
2010-05-09
11 Peter Saint-Andre Note field has been cleared by Peter Saint-Andre
2010-05-09
11 Peter Saint-Andre Draft Added by Peter Saint-Andre in state AD is watching
2010-02-01
08 (System) New version available: draft-ietf-calsify-rfc2447bis-08.txt
2009-10-09
07 (System) New version available: draft-ietf-calsify-rfc2447bis-07.txt
2009-09-08
06 (System) New version available: draft-ietf-calsify-rfc2447bis-06.txt
2008-06-09
05 (System) New version available: draft-ietf-calsify-rfc2447bis-05.txt
2008-05-12
04 (System) New version available: draft-ietf-calsify-rfc2447bis-04.txt
2007-02-21
03 (System) New version available: draft-ietf-calsify-rfc2447bis-03.txt
2006-06-12
02 (System) New version available: draft-ietf-calsify-rfc2447bis-02.txt
2006-03-01
01 (System) New version available: draft-ietf-calsify-rfc2447bis-01.txt
2005-08-17
00 (System) New version available: draft-ietf-calsify-rfc2447bis-00.txt