OpenPGP
draft-ietf-openpgp-crypto-refresh-13
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2024-01-29
|
13 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2024-01-29
|
13 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2024-01-29
|
13 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2024-01-26
|
13 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2024-01-26
|
13 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2024-01-26
|
13 | Gunter Van de Velde | Request closed, assignment withdrawn: Nagendra Nainar Last Call OPSDIR review |
2024-01-26
|
13 | Gunter Van de Velde | Closed request for Last Call review by OPSDIR with state 'Overtaken by Events': Cleaning up stale OPSDIR queue |
2024-01-19
|
13 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2024-01-12
|
13 | Tero Kivinen | Closed request for Last Call review by SECDIR with state 'Overtaken by Events' |
2024-01-12
|
13 | Tero Kivinen | Assignment of request for Last Call review by SECDIR to Leif Johansson was marked no-response |
2024-01-11
|
13 | Daniel Gillmor | Changed document external resources from: related_implementations https://github.com/ProtonMail/gopenpgp/tree/v3 related_implementations https://github.com/dkg/PGPy/tree/dkg/crypto-refresh related_implementations https://github.com/openpgpjs/openpgpjs/tree/crypto-refresh related_implementations https://github.com/pgpainless/pgpainless/milestone/6 related_implementations https://gitlab.com/sequoia-pgp/sequoia/-/tree/crypto-refresh to: related_implementations https://github.com/ProtonMail/gopenpgp/tree/v3 (GOpenPGP: implementation in Go) related_implementations https://github.com/dkg/PGPy/tree/dkg/crypto-refresh (PGPy: … Changed document external resources from: related_implementations https://github.com/ProtonMail/gopenpgp/tree/v3 related_implementations https://github.com/dkg/PGPy/tree/dkg/crypto-refresh related_implementations https://github.com/openpgpjs/openpgpjs/tree/crypto-refresh related_implementations https://github.com/pgpainless/pgpainless/milestone/6 related_implementations https://gitlab.com/sequoia-pgp/sequoia/-/tree/crypto-refresh to: related_implementations https://github.com/ProtonMail/gopenpgp/tree/v3 (GOpenPGP: implementation in Go) related_implementations https://github.com/dkg/PGPy/tree/dkg/crypto-refresh (PGPy: implementation in Python) related_implementations https://github.com/openpgpjs/openpgpjs/tree/crypto-refresh (OpenPGP.js: implementation in Javascript) related_implementations https://github.com/pgpainless/pgpainless/milestone/6 (PGPainless: implementation in Java) related_implementations https://gitlab.com/sequoia-pgp/sequoia/-/tree/crypto-refresh (Sequoia: implementation in Rust) |
2024-01-08
|
13 | (System) | RFC Editor state changed to EDIT |
2024-01-08
|
13 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2024-01-08
|
13 | (System) | Announcement was received by RFC Editor |
2024-01-08
|
13 | (System) | IANA Action state changed to In Progress |
2024-01-08
|
13 | (System) | Removed all action holders (IESG state changed) |
2024-01-08
|
13 | Cindy Morgan | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2024-01-08
|
13 | Cindy Morgan | IESG has approved the document |
2024-01-08
|
13 | Cindy Morgan | Closed "Approve" ballot |
2024-01-08
|
13 | Cindy Morgan | Ballot approval text was generated |
2024-01-08
|
13 | Roman Danyliw | IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::AD Followup |
2024-01-04
|
13 | Paul Wouters | New version available: draft-ietf-openpgp-crypto-refresh-13.txt |
2024-01-04
|
13 | Paul Wouters | New version accepted (logged-in submitter: Paul Wouters) |
2024-01-04
|
13 | Paul Wouters | Uploaded new revision |
2023-12-20
|
12 | Barry Leiba | Closed request for Last Call review by ARTART with state 'Overtaken by Events': Document has finished IESG processing |
2023-12-20
|
12 | Barry Leiba | Assignment of request for Last Call review by ARTART to Cullen Jennings was marked no-response |
2023-12-14
|
12 | Cindy Morgan | IESG state changed to Approved-announcement to be sent::AD Followup from IESG Evaluation |
2023-12-14
|
12 | Jim Guichard | [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard |
2023-12-14
|
12 | Andrew Alston | [Ballot Position Update] New position, No Objection, has been recorded for Andrew Alston |
2023-12-14
|
12 | Robert Wilton | [Ballot Position Update] New position, No Objection, has been recorded for Robert Wilton |
2023-12-13
|
12 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
2023-12-13
|
12 | John Scudder | [Ballot comment] Like Éric I am a fan of FCFS, but I don’t know how it would work out in this community and application. |
2023-12-13
|
12 | John Scudder | [Ballot Position Update] New position, No Objection, has been recorded for John Scudder |
2023-12-13
|
12 | Warren Kumari | [Ballot comment] Thank you for writing it, I found it an interesting read... I'd also like to thank David Blacka for the DNSDIR Review (which … [Ballot comment] Thank you for writing it, I found it an interesting read... I'd also like to thank David Blacka for the DNSDIR Review (which raises a bunch of interesting questions that would not have occurred to me). I'd also like to thank DKG for his response -- https://mailarchive.ietf.org/arch/msg/last-call/YQcgcGpgeveTTCqH7Mt_1Jypt4w/ ), and the pointer to https://datatracker.ietf.org/doc/draft-dkg-openpgp-userid-conventions/ which will address some of these. |
2023-12-13
|
12 | Warren Kumari | [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari |
2023-12-13
|
12 | Francesca Palombini | [Ballot Position Update] New position, No Objection, has been recorded for Francesca Palombini |
2023-12-13
|
12 | Éric Vyncke | [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-openpgp-crypto-refresh-12 Thank you for the work put into this document. The content is above my expertise, … [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-openpgp-crypto-refresh-12 Thank you for the work put into this document. The content is above my expertise, hence I only did a quick review (else I would have balloted YES). The reviewed content is usually easy to read. Please find below some non-blocking COMMENT points (but replies would be appreciated even if only for my own education). I hope that this review helps to improve the document, Regards, -éric # COMMENTS (non-blocking) ## The most concise shepherd's write-up The justification for the intended status is just "PS"... not even expanded... ## Abstract Isn't the 2nd paragraph (especially the first sentence) applicable to all standards track document? I.e., why not removing it ? (and I have noted the very rough consensus about this I-D based on the shepherd write-up). ## Section 3.5 Should another time epoch be specified ? Using the 1970 Unix epoch will cause a problem in 2038, a not too distant future. Why didn't this revised OpenPGP propose alternative epoch ? ## IANA registries Should this I-D be an opportunity to reserve some registry values for a FCFS allocation ? |
2023-12-13
|
12 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
2023-12-12
|
12 | Martin Duke | [Ballot comment] In S2.4, the Base64 section talks about "seven-bit, printable text". Do you mean "six-bit"? |
2023-12-12
|
12 | Martin Duke | [Ballot Position Update] New position, No Objection, has been recorded for Martin Duke |
2023-12-12
|
12 | Zaheduzzaman Sarker | [Ballot comment] I have given a good read of this specification, as this is outside my core expertise, I kept my perspective only related to … [Ballot comment] I have given a good read of this specification, as this is outside my core expertise, I kept my perspective only related to the transport protocols and from that point of view I have no objection. One comment though, in section 6.2.2 it says - Note that some transport methods are sensitive to line length I believe examples of such "transport methods" would be great here as transport methods are not mentioned or explained anywhere else in this specification. |
2023-12-12
|
12 | Zaheduzzaman Sarker | [Ballot Position Update] New position, No Objection, has been recorded for Zaheduzzaman Sarker |
2023-12-07
|
12 | Paul Wouters | [Ballot comment] I’m an author |
2023-12-07
|
12 | Paul Wouters | [Ballot Position Update] New position, Recuse, has been recorded for Paul Wouters |
2023-12-07
|
12 | Roman Danyliw | Placed on agenda for telechat - 2023-12-14 |
2023-12-07
|
12 | Roman Danyliw | Ballot has been issued |
2023-12-07
|
12 | Roman Danyliw | [Ballot Position Update] New position, Yes, has been recorded for Roman Danyliw |
2023-12-07
|
12 | Roman Danyliw | Created "Approve" ballot |
2023-12-07
|
12 | Roman Danyliw | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
2023-12-07
|
12 | Roman Danyliw | Ballot writeup was changed |
2023-11-29
|
12 | Linda Dunbar | Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Linda Dunbar. Sent review to list. |
2023-11-19
|
12 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
2023-11-17
|
12 | (System) | IANA Review state changed to IANA OK - Actions Needed from IANA - Review Needed |
2023-11-17
|
12 | David Dong | (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-openpgp-crypto-refresh-12. If any part of this review is inaccurate, please let us know. IANA … (Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-openpgp-crypto-refresh-12. If any part of this review is inaccurate, please let us know. IANA understands that, upon approval of this document, there are thirty-three actions which we must complete. IANA has a question about the first action requested in the IANA Considerations section of this document. First, the Pretty Good Privacy (PGP) registry group located at: https://www.iana.org/assignments/pgp-parameters/ will be renamed to: OpenPGP This change will also be reflected on the IANA Matrix at: https://www.iana/org/assignments/ IANA Question -> Should we update the URL to this registry group? If you would like us to change the URL, we will have the old URL redirect to the new one. Second, in the newly renamed OpenPGP registry group, the PGP String-to-Key (S2K) registry will be renamed to String-to-Key (S2K) Types and the contents will be changed to the contents of Table 1 in Section 3.7.1 of the current draft. Third, in the newly renamed OpenPGP registry group, the PGP Packet Types/Tags registry will be renamed to Packet Types and the contents will be changed to the contents of Table 3 in section 5 of the current draft. Fourth, in the newly renamed OpenPGP registry group, the PGP User Attribute Types registry will be renamed to the User Attribute Subpacket Types registry and the contents changed to the contents of Table 13 in section 5.12 of the current draft. Fifth, in the newly renamed OpenPGP registry group, the Image Format Subpacket Types registry will be renamed to the Image Attribute Encoding Format registry and the contents will be changed to the contents of Table 15 in section 5.12.1 of the current draft. Sixth, in the newly renamed OpenPGP registry group, the Key Server Preference Extensions registry will be renamed to the Key Server Preference Flags registry and the contents will be changed to the contents of Table 8 in section 5.2.3.25 of the current draft. Seventh, in the newly renamed OpenPGP registry group, the Reason for Revocation Extensions registry will be renamed to the Reason for Revocation Code registry and the contents changed to the contents of Table 10 in section 5.2.3.31 of the current draft. Eighth, in the newly renamed OpenPGP registry group, the Key Flags Extensions registry will be renamed to the Key Flags registry and the contents will be changed to the contents of Table 9 in section 5.2.3.29 of the current draft. Ninth, in the newly renamed OpenPGP registry group, the Implementation Features registry will be renamed to the Features Flags registry and the contents will be changed to the contents of Table 11 in section 5.2.3.32 of the current draft. Tenth, in the newly renamed OpenPGP registry group, the existing Public Key Algorithms registry is to have its contents entirely replaced by the contents of Table 18 in section 9.1 of the current draft. Eleventh, in the newly renamed OpenPGP registry group, the existing Symmetric Key Algorithms registry is to have its contents entirely replaced by the contents of Table 21 in section 9.3 of the current draft. Twelveth, in the newly renamed OpenPGP registry group, the existing Compression Algorithms registry is to have its contents entirely replaced by the contents of Table 22 in section 9.4 of the current draft. Thirteenth, in the newly renamed OpenPGP registry group, the existing Hash Algorithms registry is to have its contents entirely replaced by the contents of Table 23 in section 9.5 of the current draft. Fourteenth, in the newly renamed OpenPGP registry group, the existing Signature Subpacket Types registry is to have its contents entirely replaced by the contents of Table 5 in section 5.2.3.7 of the current draft. Fifteenth, in the newly renamed OpenPGP registry group, the existing New Packet Versions registry is to be removed entirely. In its place will be a note with the following content: Those wishing to use the removed "New Packet Versions" registry should instead register new versions of the relevant packets in the "Key and Signature Versions", "Key ID and Fingerprint" and "Encrypted Message Packet Versions" registries. Sixteenth, in the newly renamed OpenPGP registry group, located at: https://www.iana.org/assignments/pgp-parameters/ a new registry is to be created called the Secret Key Encryption (S2K Usage Octet) registry. The new registry will be maintained via Specification Required as defined in RFC8126. There are initial registrations in the new registry. The new registry will be populated by the contents of Table 2 in Section 3.7.2.1 of the current draft with the reference for each new registration set to [ RFC-to-be ]. Seventeenth, in the newly renamed OpenPGP registry group, located at: https://www.iana.org/assignments/pgp-parameters/ a new registry is to be created called the Signature Types registry. The new registry will be maintained via Specification Required as defined in RFC8126. There are initial registrations in the new registry. The new registry will be populated by the contents of Table 4 in Section 5.2.1 of the current draft with the reference for each new registration set to [ RFC-to-be ]. Eighteenth, in the newly renamed OpenPGP registry group, located at: https://www.iana.org/assignments/pgp-parameters/ a new registry is to be created called the Signature Notation Data Subpacket Notation Flags registry. The new registry will be maintained via Specification Required as defined in RFC8126. There are initial registrations in the new registry. The new registry will be populated by the contents of Table 6 in Section 5.2.3.24 of the current draft with the reference for each new registration set to [ RFC-to-be ]. Nineteenth, in the newly renamed OpenPGP registry group, located at: https://www.iana.org/assignments/pgp-parameters/ a new registry is to be created called the Signature Notation Data Subpacket Types registry. The new registry will be maintained via Specification Required as defined in RFC8126. There are initial registrations in the new registry. The new registry will be populated by the contents of Table 7 in Section 5.2.3.24 of the current draft with the reference for each new registration set to [ RFC-to-be ]. Twentieth, in the newly renamed OpenPGP registry group, located at: https://www.iana.org/assignments/pgp-parameters/ a new registry is to be created called the Key ID and Fingerprint registry. The new registry will be maintained via Specification Required as defined in RFC8126. There are initial registrations in the new registry. The new registry will be populated by the contents of Table 12 in Section 5.5.4 of the current draft with the reference for each new registration set to [ RFC-to-be ]. Twenty-first, in the newly renamed OpenPGP registry group, located at: https://www.iana.org/assignments/pgp-parameters/ a new registry is to be created called the Image Attribute Version registry. The new registry will be maintained via Specification Required as defined in RFC8126. There are initial registrations in the new registry. The new registry will be populated by the contents of Table 14 in Section 5.12.1 of the current draft with the reference for each new registration set to [ RFC-to-be ]. Twenty-second, in the newly renamed OpenPGP registry group, located at: https://www.iana.org/assignments/pgp-parameters/ a new registry is to be created called the Armor Header Line registry. The new registry will be maintained via Specification Required as defined in RFC8126. There are initial registrations in the new registry. The new registry will be populated by the contents of Table 16 in Section 6.2.1 of the current draft with the reference for each new registration set to [ RFC-to-be ]. Twenty-third, in the newly renamed OpenPGP registry group, located at: https://www.iana.org/assignments/pgp-parameters/ a new registry is to be created called the Armor Header Key registry. The new registry will be maintained via Specification Required as defined in RFC8126. There are initial registrations in the new registry. The new registry will be populated by the contents of Table 17 in Section 6.2.2 of the current draft with the reference for each new registration set to [ RFC-to-be ]. Twenty-fourth, in the newly renamed OpenPGP registry group, located at: https://www.iana.org/assignments/pgp-parameters/ a new registry is to be created called the ECC Curve OID and Usage registry. The new registry will be maintained via Specification Required as defined in RFC8126. There are initial registrations in the new registry. The new registry will be populated by the contents of Table 19 in Section 9.2 of the current draft with the reference for each new registration set to [ RFC-to-be ]. Twenty fifth, in the newly renamed OpenPGP registry group, located at: https://www.iana.org/assignments/pgp-parameters/ a new registry is to be created called the ECC Curve-specific Wire Formats registry. The new registry will be maintained via Specification Required as defined in RFC8126. There are initial registrations in the new registry. The new registry will be populated by the contents of Table 20 in Section 9.2.1 of the current draft with the reference for each new registration set to [ RFC-to-be ]. Twenty-sixth, in the newly renamed OpenPGP registry group, located at: https://www.iana.org/assignments/pgp-parameters/ a new registry is to be created called the Hash Algorithm Identifiers for RSA Signatures use of EMSA-PKCS1-v1_5 Padding registry. The new registry will be maintained via Specification Required as defined in RFC8126. There are initial registrations in the new registry. The new registry will be populated by the contents of Table 24 in Section 9.5 of the current draft with the reference for each new registration set to [ RFC-to-be ]. Twenty-seventh, in the newly renamed OpenPGP registry group, located at: https://www.iana.org/assignments/pgp-parameters/ a new registry is to be created called the AEAD Algorithms registry. The new registry will be maintained via Specification Required as defined in RFC8126. There are initial registrations in the new registry. The new registry will be populated by the contents of Table 25 in Section 9.6 of the current draft with the reference for each new registration set to [ RFC-to-be ]. Twenty-eighth, in the newly renamed OpenPGP registry group, located at: https://www.iana.org/assignments/pgp-parameters/ a new registry is to be created called the Encrypted Message Packet Versions registry. The new registry will be maintained via Specification Required as defined in RFC8126. There are initial registrations in the new registry. The new registry will be populated by the contents of Table 26 in Section 10.3.2.1 of the current draft with the reference for each new registration set to [ RFC-to-be ]. Twenty-ninth, in the newly renamed OpenPGP registry group, located at: https://www.iana.org/assignments/pgp-parameters/ a new registry is to be created called the Key and Signature Versions registry. The new registry will be maintained via Specification Required as defined in RFC8126. There are initial registrations in the new registry. The new registry will be populated by the contents of Table 27 in Section 10.3.2.2 of the current draft with the reference for each new registration set to [ RFC-to-be ]. Thirtieth, in the newly renamed OpenPGP registry group, located at: https://www.iana.org/assignments/pgp-parameters/ a new registry is to be created called the Elliptic Curve Point Wire Formats registry. The new registry will be maintained via Specification Required as defined in RFC8126. There are initial registrations in the new registry. The new registry will be populated by the contents of Table 28 in Section 11.2 of the current draft with the reference for each new registration set to [ RFC-to-be ]. Thirty-first, in the newly renamed OpenPGP registry group, located at: https://www.iana.org/assignments/pgp-parameters/ a new registry is to be created called the Elliptic Curve Scalar Encodings registry. The new registry will be maintained via Specification Required as defined in RFC8126. There are initial registrations in the new registry. The new registry will be populated by the contents of Table 29 in Section 11.3 of the current draft with the reference for each new registration set to [ RFC-to-be ]. Thirty-second, in the newly renamed OpenPGP registry group, located at: https://www.iana.org/assignments/pgp-parameters/ a new registry is to be created called the ECDH KDF and KEK Parameters registry. The new registry will be maintained via Specification Required as defined in RFC8126. There are initial registrations in the new registry. The new registry will be populated by the contents of Table 30 in Section 11.5.1 of the current draft with the reference for each new registration set to [ RFC-to-be ]. Thirty-third, in the newly renamed OpenPGP registry group, located at: https://www.iana.org/assignments/pgp-parameters/ all of the registries will have their registration policy set to Specification Required as defined in RFC8126. The only exceptions will be the following four registries - which will have the registration policy RFC Required as defined in RFC 8126: 1] Packet Types registry (please see the third action above) 2] Key and Signature Versions registry (please see the twenty-ninth action above) 3] Key ID and Fingerprint registry (please see the twentieth action above) 4] Encrypted Message Packet Versions registry (please see the twenty-eighth action above) We understand that these are the only actions required to be completed upon approval of this document. NOTE: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, David Dong IANA Services Sr. Specialist |
2023-11-16
|
12 | David Blacka | Request for Last Call review by DNSDIR Completed: Ready. Reviewer: David Blacka. Sent review to list. |
2023-11-15
|
12 | Gunter Van de Velde | Request for Last Call review by OPSDIR is assigned to Nagendra Nainar |
2023-11-05
|
12 | Daniel Gillmor | Added to session: IETF-118: openpgp Thu-1200 |
2023-11-02
|
12 | Jean Mahoney | Request for Last Call review by GENART is assigned to Linda Dunbar |
2023-11-02
|
12 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Leif Johansson |
2023-11-01
|
12 | Barry Leiba | Request for Last Call review by ARTART is assigned to Cullen Jennings |
2023-10-30
|
12 | Jim Reid | Request for Last Call review by DNSDIR is assigned to David Blacka |
2023-10-29
|
12 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
2023-10-29
|
12 | Cindy Morgan | The following Last Call announcement was sent out (ends 2023-11-19): From: The IESG To: IETF-Announce CC: draft-ietf-openpgp-crypto-refresh@ietf.org, openpgp-chairs@ietf.org, openpgp@ietf.org, rdd@cert.org, stephen.farrell@cs.tcd.ie … The following Last Call announcement was sent out (ends 2023-11-19): From: The IESG To: IETF-Announce CC: draft-ietf-openpgp-crypto-refresh@ietf.org, openpgp-chairs@ietf.org, openpgp@ietf.org, rdd@cert.org, stephen.farrell@cs.tcd.ie Reply-To: last-call@ietf.org Sender: Subject: Last Call: (OpenPGP) to Proposed Standard The IESG has received a request from the Open Specification for Pretty Good Privacy WG (openpgp) to consider the following document: - 'OpenPGP' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2023-11-19. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract This document specifies the message formats used in OpenPGP. OpenPGP provides encryption with public-key or symmetric cryptographic algorithms, digital signatures, compression and key management. This document is maintained in order to publish all necessary information needed to develop interoperable applications based on the OpenPGP format. It is not a step-by-step cookbook for writing an application. It describes only the format and methods needed to read, check, generate, and write conforming packets crossing any network. It does not deal with storage and implementation questions. It does, however, discuss implementation issues necessary to avoid security flaws. This document obsoletes: RFC 4880 (OpenPGP), RFC 5581 (Camellia in OpenPGP) and RFC 6637 (Elliptic Curves in OpenPGP). The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-openpgp-crypto-refresh/ No IPR declarations have been submitted directly on this I-D. The document contains these normative downward references. See RFC 3967 for additional information: rfc7253: The OCB Authenticated-Encryption Algorithm (Informational - Internet Research Task Force (IRTF)) rfc9106: Argon2 Memory-Hard Function for Password Hashing and Proof-of-Work Applications (Informational - Internet Research Task Force (IRTF)) |
2023-10-29
|
12 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
2023-10-29
|
12 | Cindy Morgan | Last call announcement was changed |
2023-10-29
|
12 | Cindy Morgan | Last call announcement was generated |
2023-10-28
|
12 | Roman Danyliw | Last call was requested |
2023-10-28
|
12 | Roman Danyliw | Last call announcement was generated |
2023-10-28
|
12 | Roman Danyliw | Ballot approval text was generated |
2023-10-28
|
12 | Roman Danyliw | Ballot writeup was generated |
2023-10-28
|
12 | Roman Danyliw | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
2023-10-28
|
12 | Roman Danyliw | Residual AD Review on -12: https://mailarchive.ietf.org/arch/msg/openpgp/FyONvjPnQ2_G_dhmsXw0aiMNrSY/ |
2023-10-17
|
12 | Paul Wouters | New version available: draft-ietf-openpgp-crypto-refresh-12.txt |
2023-10-17
|
12 | Paul Wouters | New version accepted (logged-in submitter: Paul Wouters) |
2023-10-17
|
12 | Paul Wouters | Uploaded new revision |
2023-10-09
|
11 | (System) | Changed action holders to Roman Danyliw (IESG state changed) |
2023-10-09
|
11 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
2023-10-09
|
11 | Paul Wouters | New version available: draft-ietf-openpgp-crypto-refresh-11.txt |
2023-10-09
|
11 | Paul Wouters | New version accepted (logged-in submitter: Paul Wouters) |
2023-10-09
|
11 | Paul Wouters | Uploaded new revision |
2023-08-25
|
10 | Roman Danyliw | AD Review: https://mailarchive.ietf.org/arch/msg/openpgp/CrM3cITZF1hh4wIoyzh3rh74_0k/ |
2023-08-25
|
10 | (System) | Changed action holders to Roman Danyliw, Paul Wouters, Daniel Huigens, Justus Winter, Niibe Yutaka (IESG state changed) |
2023-08-25
|
10 | Roman Danyliw | IESG state changed to AD Evaluation::Revised I-D Needed from Publication Requested |
2023-07-23
|
10 | Daniel Gillmor | Changed document external resources from: related_implementations https://github.com/ProtonMail/gopenpgp/tree/v3 related_implementations https://github.com/dkg/PGPy/tree/dkg/crypto-refresh to: related_implementations https://github.com/ProtonMail/gopenpgp/tree/v3 related_implementations https://github.com/dkg/PGPy/tree/dkg/crypto-refresh related_implementations https://github.com/openpgpjs/openpgpjs/tree/crypto-refresh related_implementations https://github.com/pgpainless/pgpainless/milestone/6 related_implementations https://gitlab.com/sequoia-pgp/sequoia/-/tree/crypto-refresh |
2023-07-23
|
10 | Daniel Gillmor | Changed document external resources from: None to: related_implementations https://github.com/ProtonMail/gopenpgp/tree/v3 related_implementations https://github.com/dkg/PGPy/tree/dkg/crypto-refresh |
2023-07-22
|
10 | Daniel Gillmor | Added to session: IETF-117: openpgp Fri-1900 |
2023-06-23
|
10 | Stephen Farrell | # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* ## Document History 1. Does the working group (WG) consensus represent … # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The draft is the result of a multi-year effort to udpate RFC4880 that stumbled at points, but in the end has broad agreement. The shepherd/chairs consider it important to get this document out of the WG so it gets finished - if we processed all nits first then there's a significant danger that people will start to want to make changes again that could result in not finishing the work. WG participants are explicitly ok with that apporach as they also recognise the risk of not finishing (again;-). 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? The main (recent) controversy was when an important implemention decided they no longer supported some of the changes incorporated in the draft. Others however continued to support the draft. There was a specific poll of the WG to establish that we had consensus to continue with this draft in October 2022. That poll had significant engagement from WG participants and concluded that we did have consensus for finishing this draft. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No appeal has been threatened. The people associated with the implemention mentioned above continue to be unhappy with aspects of the draft. (That's all public on the WG list.) 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? There are multiple implementations that were used to produce the examples in the draft. The OpenPGP interoperability test suite is coordinated by the Sequoia project at: https://tests.sequoia-pgp.org/ ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. Not needed. The OpenPGP community are engaged. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. N/A. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? N/A. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. N/A. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? This is ready. It's a complex spec with a lot of history so it'll be no surprise if AD review/IETF LC or IESG review throw up some issues related to clarity etc. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? N/A. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? PS 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. Mail to check sent to authors. All authors reponded and none have IPR to declare. 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. All good afaik. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) There are nits. We'll correct 'em as processing continues. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. All good. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All good. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. All good I think. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? N/A 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. Yes, but all good. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). IANA changes (vs. RFC4880) were discussed by the WG and agreed. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. There are new registries but we think the DE instructions are clear. We'll work with our AD on suggested DE folk later. |
2023-06-22
|
10 | Stephen Farrell | # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* ## Document History 1. Does the working group (WG) consensus represent … # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The draft is the result of a multi-year effort to udpate RFC4880 that stumbled at points, but in the end has broad agreement. The shepherd/chairs consider it important to get this document out of the WG so it gets finished - if we processed all nits first then there's a significant danger that people will start to want to make changes again that could result in not finishing the work. WG participants are explicitly ok with that apporach as they also recognise the risk of not finishing (again;-). 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? The main (recent) controversy was when an important implemention decided they no longer supported some of the changes incorporated in the draft. Others however continued to support the draft. There was a specific poll of the WG to establish that we had consensus to continue with this draft in October 2022. That poll had significant engagement from WG participants and concluded that we did have consensus for finishing this draft. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No appeal has been threatened. The people associated with the implemention mentioned above continue to be unhappy with aspects of the draft. (That's all public on the WG list.) 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? There are multiple implementations that were used to produce the examples in the draft. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. Not needed. The OpenPGP community are engaged. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. N/A. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? N/A. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. N/A. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? This is ready. It's a complex spec with a lot of history so it'll be no surprise if AD review/IETF LC or IESG review throw up some issues related to clarity etc. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? N/A. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? PS 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. Mail to check sent to authors. 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. All good afaik. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) There are nits. We'll correct 'em as processing continues. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. All good. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All good. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. All good I think. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? N/A 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. Yes, but all good. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). IANA changes (vs. RFC4880) were discussed by the WG and agreed. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. There are new registries but we think the DE instructions are clear. We'll work with our AD on suggested DE folk later. |
2023-06-22
|
10 | Stephen Farrell | Responsible AD changed to Roman Danyliw |
2023-06-22
|
10 | Stephen Farrell | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
2023-06-22
|
10 | Stephen Farrell | IESG state changed to Publication Requested from I-D Exists |
2023-06-22
|
10 | Stephen Farrell | Document is now in IESG state Publication Requested |
2023-06-22
|
10 | Stephen Farrell | # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* ## Document History 1. Does the working group (WG) consensus represent … # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? The draft is the result of a multi-year effort to udpate RFC4880 that stumbled at points, but in the end has broad agreement. The shepherd/chairs consider it important to get this document out of the WG so it gets finished - if we processed all nits first then there's a significant danger that people will start to want to make changes again that could result in not finishing the work. WG participants are explicitly ok with that apporach as they also recognise the risk of not finishing (again;-). 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? The main (recent) controversy was when an important implemention decided they no longer supported some of the changes incorporated in the draft. Others however continued to support the draft. There was a specific poll of the WG to establish that we had consensus to continue with this draft in October 2022. That poll had significant engagement from WG participants and concluded that we did have consensus for finishing this draft. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No appeal has been threatened. The people associated with the implemention mentioned above continue to be unhappy with aspects of the draft. (That's all public on the WG list.) 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? There are multiple implementations that were used to produce the examples in the draft. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. Not needed. The OpenPGP community are engaged. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. N/A. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? N/A. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. N/A. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? This is ready. It's a complex spec with a lot of history so it'll be no surprise if AD review/IETF LC or IESG review throw up some issues related to clarity etc. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? N/A. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? PS 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. Mail to check sent to authors. 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. All good afaik. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) There are nits. We'll correct 'em as processing continues. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. All good. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? All good. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. All good I think. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? N/A 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. Yes, but all good. 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). IANA changes (vs. RFC4880) were discussed by the WG and agreed. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. There are new registries but we think the DE instructions are clear. We'll work with our AD on suggested DE folk later. |
2023-06-22
|
10 | Stephen Farrell | Notification list changed to stephen.farrell@cs.tcd.ie because the document shepherd was set |
2023-06-22
|
10 | Stephen Farrell | Document shepherd changed to Stephen Farrell |
2023-06-21
|
10 | Paul Wouters | New version available: draft-ietf-openpgp-crypto-refresh-10.txt |
2023-06-21
|
10 | Paul Wouters | New version accepted (logged-in submitter: Paul Wouters) |
2023-06-21
|
10 | Paul Wouters | Uploaded new revision |
2023-06-21
|
09 | Stephen Farrell | IETF WG state changed to WG Consensus: Waiting for Write-Up from In WG Last Call |
2023-06-05
|
09 | Paul Wouters | New version available: draft-ietf-openpgp-crypto-refresh-09.txt |
2023-06-05
|
09 | Paul Wouters | New version accepted (logged-in submitter: Paul Wouters) |
2023-06-05
|
09 | Paul Wouters | Uploaded new revision |
2023-03-28
|
08 | Stephen Farrell | Added to session: IETF-116: openpgp Wed-0630 |
2023-03-13
|
08 | Paul Wouters | New version available: draft-ietf-openpgp-crypto-refresh-08.txt |
2023-03-13
|
08 | Paul Wouters | New version accepted (logged-in submitter: Paul Wouters) |
2023-03-13
|
08 | Paul Wouters | Uploaded new revision |
2022-11-08
|
07 | Daniel Gillmor | Added to session: IETF-115: openpgp Tue-1300 |
2022-10-23
|
07 | Paul Wouters | New version available: draft-ietf-openpgp-crypto-refresh-07.txt |
2022-10-23
|
07 | Paul Wouters | New version accepted (logged-in submitter: Paul Wouters) |
2022-10-23
|
07 | Paul Wouters | Uploaded new revision |
2022-07-28
|
06 | Stephen Farrell | Added to session: IETF-114: openpgp Fri-1000 |
2022-07-04
|
06 | Stephen Farrell | Changed consensus to Yes from Unknown |
2022-07-04
|
06 | Stephen Farrell | Intended Status changed to Proposed Standard from None |
2022-06-07
|
06 | Stephen Farrell | We'd like WGLC comments by July 3rd 2022 to allow for possible changes before IETF-114 |
2022-06-07
|
06 | Stephen Farrell | IETF WG state changed to In WG Last Call from WG Document |
2022-06-06
|
06 | Paul Wouters | New version available: draft-ietf-openpgp-crypto-refresh-06.txt |
2022-06-06
|
06 | (System) | New version approved |
2022-06-06
|
06 | (System) | Request for posting confirmation emailed to previous authors: Paul Wouters , Werner Koch , openpgp-chairs@ietf.org |
2022-06-06
|
06 | Paul Wouters | Uploaded new revision |
2022-03-19
|
05 | Stephen Farrell | Added to session: IETF-113: openpgp Mon-1000 |
2022-03-07
|
05 | Paul Wouters | New version available: draft-ietf-openpgp-crypto-refresh-05.txt |
2022-03-07
|
05 | (System) | New version accepted (logged-in submitter: Paul Wouters) |
2022-03-07
|
05 | Paul Wouters | Uploaded new revision |
2021-10-25
|
04 | Daniel Gillmor | Added to session: IETF-112: openpgp Wed-1200 |
2021-10-18
|
04 | Paul Wouters | New version available: draft-ietf-openpgp-crypto-refresh-04.txt |
2021-10-18
|
04 | (System) | New version approved |
2021-10-18
|
04 | (System) | Request for posting confirmation emailed to previous authors: Paul Wouters , Werner Koch , openpgp-chairs@ietf.org |
2021-10-18
|
04 | Paul Wouters | Uploaded new revision |
2021-05-02
|
03 | Paul Wouters | New version available: draft-ietf-openpgp-crypto-refresh-03.txt |
2021-05-02
|
03 | (System) | New version accepted (logged-in submitter: Paul Wouters) |
2021-05-02
|
03 | Paul Wouters | Uploaded new revision |
2021-03-10
|
02 | Daniel Gillmor | Added to session: IETF-110: openpgp Thu-1530 |
2021-02-25
|
02 | Daniel Gillmor | Added to session: interim-2021-openpgp-01 |
2021-02-22
|
02 | Paul Wouters | New version available: draft-ietf-openpgp-crypto-refresh-02.txt |
2021-02-22
|
02 | (System) | New version approved |
2021-02-22
|
02 | (System) | Request for posting confirmation emailed to previous authors: Paul Wouters , Werner Koch |
2021-02-22
|
02 | Paul Wouters | Uploaded new revision |
2021-02-05
|
01 | Paul Wouters | New version available: draft-ietf-openpgp-crypto-refresh-01.txt |
2021-02-05
|
01 | (System) | New version accepted (logged-in submitter: Paul Wouters) |
2021-02-05
|
01 | Paul Wouters | Uploaded new revision |
2021-01-29
|
00 | Stephen Farrell | This document now replaces draft-ietf-openpgp-rfc4880bis instead of None |
2021-01-29
|
00 | Stephen Farrell | Reviewed suggested replacement relationships: draft-ietf-openpgp-rfc4880bis |
2021-01-29
|
00 | Paul Wouters | Added suggested replacement relationships: draft-ietf-openpgp-rfc4880bis |
2021-01-29
|
00 | Paul Wouters | This document now replaces None instead of None |
2021-01-29
|
00 | Paul Wouters | New version available: draft-ietf-openpgp-crypto-refresh-00.txt |
2021-01-29
|
00 | (System) | New version accepted (logged-in submitter: Paul Wouters) |
2021-01-29
|
00 | Paul Wouters | Uploaded new revision |