iCalendar Message-Based Interoperability Protocol (iMIP)
draft-ietf-calsify-rfc2447bis-11
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
11 | (System) | post-migration administrative database adjustment to the No Objection position for Sean Turner |
2012-08-22
|
11 | (System) | post-migration administrative database adjustment to the No Objection position for Tim Polk |
2012-08-22
|
11 | (System) | post-migration administrative database adjustment to the No Objection position for Ralph Droms |
2012-08-22
|
11 | (System) | post-migration administrative database adjustment to the No Objection position for Adrian Farrel |
2010-09-15
|
11 | Cindy Morgan | State changed to RFC Ed Queue from Approved-announcement sent by Cindy Morgan |
2010-09-15
|
11 | (System) | IANA Action state changed to No IC from In Progress |
2010-09-15
|
11 | (System) | IANA Action state changed to In Progress |
2010-09-15
|
11 | Cindy Morgan | IESG state changed to Approved-announcement sent |
2010-09-15
|
11 | Cindy Morgan | IESG has approved the document |
2010-09-15
|
11 | Cindy Morgan | Closed "Approve" ballot |
2010-09-15
|
11 | Ralph Droms | [Ballot Position Update] Position for Ralph Droms has been changed to No Objection from Discuss by Ralph Droms |
2010-09-14
|
11 | Sean Turner | [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss by Sean Turner |
2010-09-14
|
11 | (System) | New version available: draft-ietf-calsify-rfc2447bis-11.txt |
2010-09-10
|
11 | (System) | Removed from agenda for telechat - 2010-09-09 |
2010-09-09
|
11 | Amy Vezza | State changed to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza |
2010-09-09
|
11 | Tim Polk | [Ballot comment] The Security Considerations text should be updated to reflect any changes that result from the discuss points above. Specifically, this specification will inherit … [Ballot comment] The Security Considerations text should be updated to reflect any changes that result from the discuss points above. Specifically, this specification will inherit many of the security considerations in pkix, s/mime and/or pgp if the changes suggested are accepted and implemented. |
2010-09-09
|
11 | Tim Polk | [Ballot Position Update] Position for Tim Polk has been changed to No Objection from Discuss by Tim Polk |
2010-09-09
|
11 | Gonzalo Camarillo | [Ballot Position Update] New position, No Objection, has been recorded by Gonzalo Camarillo |
2010-09-09
|
11 | Peter Saint-Andre | [Note]: changed to 'Eliot Lear (lear@cisco.com) is the Document Shepherd.' by Peter Saint-Andre |
2010-09-09
|
11 | Peter Saint-Andre | [Note]: 'Note: Eliot Lear (lear@cisco.com) is the Document Shepherd.' added by Peter Saint-Andre |
2010-09-09
|
11 | Adrian Farrel | [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss by Adrian Farrel |
2010-09-09
|
11 | Adrian Farrel | [Ballot comment] Section 1 This binding document provides the transport specific information necessary to convey iCalendar Transport-independent Interoperability Protocol (iTIP) [iTIP] over … [Ballot comment] Section 1 This binding document provides the transport specific information necessary to convey iCalendar Transport-independent Interoperability Protocol (iTIP) [iTIP] over Internet email (using MIME) as defined in [RFC-5322] and [RFC-2045]. What is a "binding document"? I think the document "specifies a binding". But I don't think that the document is itself binding. |
2010-09-09
|
11 | Adrian Farrel | [Ballot discuss] Upgrading Robert's comment to a Discuss. Please add "Obsoletes RFC 2447" to the document header. |
2010-09-09
|
11 | Adrian Farrel | [Ballot Position Update] New position, Discuss, has been recorded by Adrian Farrel |
2010-09-09
|
11 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko |
2010-09-09
|
11 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu |
2010-09-09
|
11 | Dan Romascanu | [Ballot comment] Formatting comment - the Table of Contents does not fully match the document - page numbers are not accurate, Appendices missing, the last … [Ballot comment] Formatting comment - the Table of Contents does not fully match the document - page numbers are not accurate, Appendices missing, the last two sections listed in the table are actually no longer in the document, the capitalization of some of the sections does not correspond to the one in the document. |
2010-09-08
|
11 | David Harrington | [Ballot Position Update] New position, No Objection, has been recorded by David Harrington |
2010-09-08
|
11 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica |
2010-09-08
|
11 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded by Stewart Bryant |
2010-09-08
|
11 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert |
2010-09-08
|
11 | Ralph Droms | [Ballot discuss] I'm not quite sure this issue is included in Sean's DISCUSS; if it is, I'll clear. In section 3: If calendar confidentiality … [Ballot discuss] I'm not quite sure this issue is included in Sean's DISCUSS; if it is, I'll clear. In section 3: If calendar confidentiality is required by the sender, signed iMIP messages SHOULD be encrypted by a mechanism based on Security Multiparts for MIME [RFC-1847]. s/SHOULD/MUST/, or give some explanation about the alternatives to providing confidentiality if "a mechanism based on Security Multiparts for MIME" is not used. |
2010-09-08
|
11 | Ralph Droms | [Ballot Position Update] New position, Discuss, has been recorded by Ralph Droms |
2010-09-08
|
11 | Tim Polk | [Ballot comment] The Security Considerations text should be updated to reflect any changes that result from the discuss points above. Specifically, this specification will inherit … [Ballot comment] The Security Considerations text should be updated to reflect any changes that result from the discuss points above. Specifically, this specification will inherit many of the security considerations in pkix, s/mime and/or pgp if the changes suggested are accepted and implemented. |
2010-09-08
|
11 | Tim Polk | [Ballot discuss] I know we are updating a rather old document, and we may not be able to apply the same metrics that would be … [Ballot discuss] I know we are updating a rather old document, and we may not be able to apply the same metrics that would be appropriate for new work. That said, there are some opportunities to fill in holes here, and I would like the author to consider which are appropriate to address at this point. The document points to 1847 to achieve authentication and confidentiality. However, this is just a framework document and does not specify specific signature types or encryption mechanisms. In addition to the algorithms and key sizes that Sean mentioned in his discuss, there are a few additional features that could be specified to enhance interoperability. Given the age of the protocol, I would hope that a de facto standard for each feature has already emerged; this should definitely be factored in to the selection process. The first would be signature type. When RFC 1847 was being published, the application/moss-signature specified in RFC 1848 was the obvious choice. More current protocols would specify application/pgp-signature or application/x-pkcs7-signature. Could we specify one of these as mandatory to implement? A similar choice for encryption might be in order. The application/pgp-encrypted and application/pkcs7-mime types are two possibilities, I think. The third feature that I found missing was formats and processing rules for certificates. Section 2.2.2 explicitly calls out "public/private key certificates". Both PGP and PKIX references would seem to be in order here. (Even if one is selected as mandatory to implement, the other remains an option.) Establishing rules for validation and use of these certificates seems foundational, and since we can do it by reference I think it ought to be added. |
2010-09-08
|
11 | Tim Polk | [Ballot Position Update] New position, Discuss, has been recorded by Tim Polk |
2010-09-07
|
11 | Sean Turner | [Ballot comment] 1) Sec 2.1: Should htere be a pointer to [iCAL] after text/multipart (you don't find out until the IANA section that that's where … [Ballot comment] 1) Sec 2.1: Should htere be a pointer to [iCAL] after text/multipart (you don't find out until the IANA section that that's where it's from): OLD: A MIME entity containing content information formatted according to this document will be referenced as a "text/calendar" content type. NEW: A MIME entity containing content information formatted according to this document will be referenced as a "text/calendar" content type [iCAL]. 2) Sec 2.1.1: Should the must be MUST in the following: That is, the "Organizer" must ignore an [iTIP] message from spoof@xyz.example.net that declines a meeting invitation for b@example.com. 3) In Sec 2.2.2, the last sentence is confusing to me. Aren't you really trying to say unauthenticated messages may not be reliable? OLD: Authenticating an unsigned message may not be reliable. NEW: Unauthenticated messages (i.e., unsigned messages) may not be reliable. 4) To align with 2.2.2, change 2.2.3 to explicitly call out multipart/encrypted: OLD: To ensure confidentiality using iMIP implementations should utilize encryption compliant with [RFC-1847]. NEW: To ensure confidentiality using iMIP implementations should utilize "multipart/signed" from [RFC-1847]. Note that if DISCUSS #1 is agreed then the r/should/MUST. 5) Sec 2.2.3 (for clarity): OLD: The protocol does not restrict ... NEW: iMIP does not restrict ... 6) Sec 2.4 bullet #1: Shouldn't we add a reference after multipart/mixed to RFC 2046: OLD: Note 1: A MIME message containing multiple iCalendar objects with different method values MUST be further encapsulated with a "multipart/mixed" MIME entity. NEW: Note 1: A MIME message containing multiple iCalendar objects with different method values MUST be further encapsulated with a "multipart/mixed" MIME entity [RFC-2046]. 7) Sec 2.4: Add reference to RFC 2046: OLD: ... scheduling message (i.e., "multipart/alternative"). NEW: ... scheduling message (i.e., "multipart/alternative" [RFC-2046]). 8) Sec 3: Provide pointer back to 2.2.2 and 2.2.3: OLD: Compliant applications MUST support signing and encrypting text/calendar body parts using a mechanism based on Security Multiparts for MIME [RFC-1847] to facilitate the authentication of the originator of the iCalendar object. NEW: Compliant applications MUST support signing and encrypting text/calendar body parts using a mechanism based on Security Multiparts for MIME [RFC-1847] to facilitate the authentication of the originator of the iCalendar object (see Section 2.2.2 and 2.2.3). 9) Sec 3 bullet 1 (for clarity): replace: who signed the email message with who signed the text/calendar body part |
2010-09-07
|
11 | Sean Turner | [Ballot discuss] 1) Section 2.2.2 and 2.2.3 say that authentication "can" be applied with multipart/signed and confidentiality "should" utilize mutlipart/encrypted. Shouldn't these be MUSTs? It's … [Ballot discuss] 1) Section 2.2.2 and 2.2.3 say that authentication "can" be applied with multipart/signed and confidentiality "should" utilize mutlipart/encrypted. Shouldn't these be MUSTs? It's MUST in the security considerations section, but I think it ought to be MUST here too (i.e., r/can/MUST and r/shoud/MUST). 2) Specify MUST support multipart/signed and multipart/encrypted is not sufficient to ensure interoperability. You need to pick an algorithm for message digest, digital signatures, and encryption. Might I suggest: SHA-256, RSA 2048 (for both sig and enc). 3) Sec 3 Step 3: How is this done: If the signer cannot be correlated to an "ATTENDEE"/"ORGANIZER" property? If you're using the email address in the certificate then you need to say whether the email address is required in the certificate and where it should be located. Also, shouldn't there be a reference to RFC 5280 for certificate path processing? |
2010-09-07
|
11 | Sean Turner | [Ballot Position Update] New position, Discuss, has been recorded by Sean Turner |
2010-09-07
|
11 | Robert Sparks | [Ballot comment] From the writeup, this is intended to Obsolete 2447 - please add the Obsoletes: line in the header. There's some text in the … [Ballot comment] From the writeup, this is intended to Obsolete 2447 - please add the Obsoletes: line in the header. There's some text in the "Status of this Memo" section indicating the intent at one point was to take iMIP to Draft with this document (" A revised version of this draft document will be submitted to the RFC editor as a Draft Standard for the Internet Community. ") Just to double-check - it's being process for recycling at Proposed Standard at the moment, not for moving to Draft. |
2010-09-07
|
11 | Robert Sparks | [Ballot Position Update] New position, No Objection, has been recorded by Robert Sparks |
2010-09-06
|
11 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley |
2010-09-05
|
11 | Alexey Melnikov | [Ballot Position Update] New position, Recuse, has been recorded by Alexey Melnikov |
2010-09-05
|
11 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Hilarie Orman. |
2010-09-03
|
11 | Peter Saint-Andre | State changed to IESG Evaluation from Waiting for AD Go-Ahead by Peter Saint-Andre |
2010-09-03
|
11 | Peter Saint-Andre | [Ballot Position Update] New position, Yes, has been recorded for Peter Saint-Andre |
2010-09-03
|
11 | Peter Saint-Andre | Ballot has been issued by Peter Saint-Andre |
2010-09-03
|
11 | Peter Saint-Andre | Created "Approve" ballot |
2010-08-19
|
11 | Peter Saint-Andre | Placed on agenda for telechat - 2010-09-09 by Peter Saint-Andre |
2010-08-17
|
11 | Amy Vezza | State changed to Waiting for AD Go-Ahead from In Last Call by Amy Vezza |
2010-08-13
|
11 | Cindy Morgan | Last call sent |
2010-08-13
|
11 | Cindy Morgan | State changed to In Last Call from Last Call Requested by Cindy Morgan |
2010-08-13
|
11 | Cindy Morgan | Last Call began 2010-08-02, and is scheduled to end 2010-08-16. See http://www.ietf.org/mail-archive/web/ietf-announce/current/msg07737.html |
2010-08-11
|
11 | Michelle Cotton | IANA Last Call Comments: IANA understands that, upon approval of this document, there no IANA Actions that need to be completed. In particular, IANA notes … IANA Last Call Comments: IANA understands that, upon approval of this document, there no IANA Actions that need to be completed. In particular, IANA notes that the text/calendar media type is already registered in the Media Types registry. |
2010-08-07
|
11 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Hilarie Orman |
2010-08-07
|
11 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Hilarie Orman |
2010-08-02
|
11 | Peter Saint-Andre | Last Call was requested by Peter Saint-Andre |
2010-08-02
|
11 | (System) | Ballot writeup text was added |
2010-08-02
|
11 | (System) | Last call text was added |
2010-08-02
|
11 | (System) | Ballot approval text was added |
2010-08-02
|
11 | Peter Saint-Andre | State changed to Last Call Requested from AD is watching::AD Followup by Peter Saint-Andre |
2010-07-28
|
10 | (System) | New version available: draft-ietf-calsify-rfc2447bis-10.txt |
2010-06-21
|
11 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2010-06-21
|
09 | (System) | New version available: draft-ietf-calsify-rfc2447bis-09.txt |
2010-06-08
|
11 | Peter Saint-Andre | State Changes to AD is watching::Revised ID Needed from AD Evaluation by Peter Saint-Andre |
2010-06-08
|
11 | Alexey Melnikov | Intended Status has been changed to Proposed Standard from None |
2010-05-09
|
11 | Peter Saint-Andre | State Changes to AD Evaluation from AD is watching by Peter Saint-Andre |
2010-05-09
|
11 | Peter Saint-Andre | Note field has been cleared by Peter Saint-Andre |
2010-05-09
|
11 | Peter Saint-Andre | Draft Added by Peter Saint-Andre in state AD is watching |
2010-02-01
|
08 | (System) | New version available: draft-ietf-calsify-rfc2447bis-08.txt |
2009-10-09
|
07 | (System) | New version available: draft-ietf-calsify-rfc2447bis-07.txt |
2009-09-08
|
06 | (System) | New version available: draft-ietf-calsify-rfc2447bis-06.txt |
2008-06-09
|
05 | (System) | New version available: draft-ietf-calsify-rfc2447bis-05.txt |
2008-05-12
|
04 | (System) | New version available: draft-ietf-calsify-rfc2447bis-04.txt |
2007-02-21
|
03 | (System) | New version available: draft-ietf-calsify-rfc2447bis-03.txt |
2006-06-12
|
02 | (System) | New version available: draft-ietf-calsify-rfc2447bis-02.txt |
2006-03-01
|
01 | (System) | New version available: draft-ietf-calsify-rfc2447bis-01.txt |
2005-08-17
|
00 | (System) | New version available: draft-ietf-calsify-rfc2447bis-00.txt |