Skip to main content

A SIP Response Code for Unwanted Calls
draft-ietf-sipcore-status-unwanted-06

Revision differences

Document history

Date Rev. By Action
2017-07-10
06 (System) RFC Editor state changed to AUTH48-DONE from AUTH48
2017-07-05
06 (System) RFC Editor state changed to AUTH48 from EDIT
2017-06-15
06 (System) IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor
2017-06-15
06 (System) IANA Action state changed to Waiting on RFC Editor from Waiting on Authors
2017-06-14
06 (System) IANA Action state changed to Waiting on Authors from In Progress
2017-06-12
06 (System) RFC Editor state changed to EDIT
2017-06-12
06 (System) IESG state changed to RFC Ed Queue from Approved-announcement sent
2017-06-12
06 (System) Announcement was received by RFC Editor
2017-06-12
06 (System) IANA Action state changed to In Progress
2017-06-12
06 Cindy Morgan IESG state changed to Approved-announcement sent from Approved-announcement to be sent
2017-06-12
06 Cindy Morgan IESG has approved the document
2017-06-12
06 Cindy Morgan Closed "Approve" ballot
2017-06-10
06 Ben Campbell IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::AD Followup
2017-06-10
06 Ben Campbell Ballot approval text was generated
2017-05-10
06 (System) Sub state has been changed to AD Followup from Revised ID Needed
2017-05-10
06 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2017-05-10
06 Henning Schulzrinne New version available: draft-ietf-sipcore-status-unwanted-06.txt
2017-05-10
06 (System) New version approved
2017-05-10
06 (System) Request for posting confirmation emailed to previous authors: Henning Schulzrinne
2017-05-10
06 Henning Schulzrinne Uploaded new revision
2017-04-27
05 Cindy Morgan IESG state changed to Approved-announcement to be sent::Revised I-D Needed from IESG Evaluation
2017-04-26
05 Alia Atlas [Ballot Position Update] New position, No Objection, has been recorded for Alia Atlas
2017-04-26
05 Alissa Cooper [Ballot Position Update] New position, No Objection, has been recorded for Alissa Cooper
2017-04-26
05 Spencer Dawkins
[Ballot comment]
I agree with Warren - short, clear, and to the point.

I agree with EKR and Kathleen about requiring authentication.

In this text, …
[Ballot comment]
I agree with Warren - short, clear, and to the point.

I agree with EKR and Kathleen about requiring authentication.

In this text,

  Thus, the call is rejected due to the called party's
  (temporary) disposition.
 
I'm having trouble matching dictionary definitions to the use of "disposition" here. I guess it's an OK use of the word, and I know what's intended based on context clues, but if another word would be clearer, that would be helpful.

This text,

  The particular response code number
  was chosen to reflect the distaste felt by many upon receiving such
  calls.
 
is unchanged from the previous version, where the response code number was 666. Is that intentional?

Just checking - in this text,

  The service
  provider delivering calls or messages to the user issuing the
  response MAY take a range of actions, for example, add the calling
  party to a personal blacklist specific to the called party, use the
  information as input when computing the likelihood that the calling
  party is placing unwanted calls ("crowd sourcing"), initiate a
  traceback request, or report the calling party identity to consumer
  complaint databases operated by government authorities.
 
there's no standardized way for the called party to signal that this action should be reversed, is there? I ask, because the next paragraph says,

  The user experience is envisioned to be somewhat similar to email
  spam buttons where the detailed actions of the email provider remain
  opaque to the user.
 
and I use the "this is not spam" button on email fairly frequently. The security considerations section does talk about the protected party notifying the service provider using unstandardized mechanisms - I see that. Maybe a forward pointer to that discussion would be helpful.
2017-04-26
05 Spencer Dawkins [Ballot Position Update] New position, Yes, has been recorded for Spencer Dawkins
2017-04-26
05 Suresh Krishnan [Ballot Position Update] New position, No Objection, has been recorded for Suresh Krishnan
2017-04-26
05 Benoît Claise [Ballot Position Update] New position, No Objection, has been recorded for Benoit Claise
2017-04-25
05 Kathleen Moriarty
[Ballot comment]
I agree with EKR's comment and would like to see additional security considerations that spell out the dangers of not sending this over …
[Ballot comment]
I agree with EKR's comment and would like to see additional security considerations that spell out the dangers of not sending this over secure network or without mutual authentication (MiTM attack he describes). 

I just noticed the text called out by the SecDir review and would like to know if the following change could be made since it is just part of a list of examples:
OLD:
  or report the calling party identity to consumer
  complaint databases operated by government authorities.
NEW:
  or report the calling party identity to consumer
  complaint databases.
It doesn't seem necessary to call out government authorities here and there is the potential for abuse with such databases (government or otherwise managed).

I was glad to see the explanation for the existence of this draft in the shepherd report and ballot text, but think the explanation should be in the draft as well.  I was curious about implementations as there is the potential for trouble with this option.  It seems like it should be experimental first, but I guess we could always make it historic later if unforeseen problems arise.
2017-04-25
05 Kathleen Moriarty Ballot comment text updated for Kathleen Moriarty
2017-04-25
05 Kathleen Moriarty
[Ballot comment]
I agree with EKR's comment and would like to see additional security considerations that spell out the dangers of not sending this over …
[Ballot comment]
I agree with EKR's comment and would like to see additional security considerations that spell out the dangers of not sending this over secure network or without mutual authentication (MiTM attack he describes). 

I was glad to see the explanation for this draft in the shepherd report and ballot text, but think the explanation should be in the draft as well.  I was curious about implementations as there is the potential for trouble with this option.  It seems like it should be experimental first, but I guess we could always make it historic later if unforeseen problems arise.
2017-04-25
05 Kathleen Moriarty [Ballot Position Update] New position, No Objection, has been recorded for Kathleen Moriarty
2017-04-25
05 Deborah Brungard [Ballot Position Update] New position, No Objection, has been recorded for Deborah Brungard
2017-04-25
05 Adam Roach [Ballot comment]
See also Brett Tate's comment about which document to reference for call transfer: https://www.ietf.org/mail-archive/web/sipcore/current/msg07898.html
2017-04-25
05 Adam Roach Ballot comment text updated for Adam Roach
2017-04-24
05 Eric Rescorla
[Ballot comment]
It seems like the security considerations here probably need
to cover what's needed to prevent forged 607 responses. This
seems like an issue …
[Ballot comment]
It seems like the security considerations here probably need
to cover what's needed to prevent forged 607 responses. This
seems like an issue for on-path attackers, who could block
the real response and inject a 607. This isn't usually
that great an attack, but if you can use it in a sort of
bounce attack to really gag a sender, that would be bad.

Probably what's needed here is text about only accepting
607s over TLS (and filtering at the other endpoint). It's
also worth mentioning that in a post-STIR world, you could
send the PASSporT object as proof of the existence of
the call (though not of its unwantedness).
2017-04-24
05 Eric Rescorla [Ballot Position Update] New position, No Objection, has been recorded for Eric Rescorla
2017-04-24
05 Alvaro Retana [Ballot Position Update] New position, No Objection, has been recorded for Alvaro Retana
2017-04-24
05 Mirja Kühlewind
[Ballot comment]
I actually have one mostly technical question: It is not fully clear to me if the Unwanted response code always indicates a user …
[Ballot comment]
I actually have one mostly technical question: It is not fully clear to me if the Unwanted response code always indicates a user action or if the same code is used when an automated system declines the call? My understanding is that the idea is that this could also be automated if the user has some kind of control of the system (which is probably hard to verify). Or would it make sense to distinct between the cases where the user actively rejects a call or an automated system is generating the response code (on behalf of the user)?
2017-04-24
05 Mirja Kühlewind [Ballot Position Update] New position, No Objection, has been recorded for Mirja Kühlewind
2017-04-23
05 Terry Manderson [Ballot Position Update] New position, Yes, has been recorded for Terry Manderson
2017-04-23
05 Warren Kumari
[Ballot comment]
Thanks, short, sweet and to the point.

One minor comment:
"These may use call characteristics such as call duration and call volumes for …
[Ballot comment]
Thanks, short, sweet and to the point.

One minor comment:
"These may use call characteristics such as call duration and call volumes for a particular caller, as well changes in those metrics over time"
s/as well changes/as well as changes/
(missing a word)

Please also see Al Morton's OpsDir comment at: https://www.ietf.org/mail-archive/web/ops-dir/current/msg02571.html
(for an earlier version)
2017-04-23
05 Warren Kumari [Ballot Position Update] New position, No Objection, has been recorded for Warren Kumari
2017-04-21
05 Adam Roach [Ballot Position Update] New position, Yes, has been recorded for Adam Roach
2017-04-21
05 Amanda Baber IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed
2017-04-21
05 Alexey Melnikov [Ballot Position Update] New position, No Objection, has been recorded for Alexey Melnikov
2017-04-20
05 Ben Campbell Placed on agenda for telechat - 2017-04-27
2017-04-20
05 Ben Campbell IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead::AD Followup
2017-04-20
05 Ben Campbell Ballot has been issued
2017-04-20
05 Ben Campbell [Ballot Position Update] New position, Yes, has been recorded for Ben Campbell
2017-04-20
05 Ben Campbell Created "Approve" ballot
2017-04-20
05 Ben Campbell Ballot writeup was changed
2017-04-20
05 (System) Sub state has been changed to AD Followup from Revised ID Needed
2017-04-20
05 (System) IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed
2017-04-20
05 Henning Schulzrinne New version available: draft-ietf-sipcore-status-unwanted-05.txt
2017-04-20
05 (System) New version approved
2017-04-20
05 (System) Request for posting confirmation emailed to previous authors: Henning Schulzrinne
2017-04-20
05 Henning Schulzrinne Uploaded new revision
2017-04-05
04 Sabrina Tanamal IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK
2017-03-25
04 Ben Campbell IESG state changed to Waiting for AD Go-Ahead::Revised I-D Needed from Waiting for AD Go-Ahead
2017-03-23
04 Jean Mahoney Added to session: IETF-98: sipcore  Thu-1520
2017-03-21
04 Peter Yee Request for Last Call review by GENART Completed: Ready with Nits. Reviewer: Peter Yee. Sent review to list.
2017-03-21
04 (System) IESG state changed to Waiting for AD Go-Ahead from In Last Call
2017-03-18
04 Al Morton Request for Last Call review by OPSDIR Completed: Ready. Reviewer: Al Morton.
2017-03-17
04 (System) IANA Review state changed to IANA - Not OK from IANA - Review Needed
2017-03-17
04 Sabrina Tanamal
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Services Operator has completed its review of draft-ietf-sipcore-status-unwanted-04.txt. If any part of this review is inaccurate, please let …
(Via drafts-lastcall@iana.org): IESG/Authors/WG Chairs:

The IANA Services Operator has completed its review of draft-ietf-sipcore-status-unwanted-04.txt. If any part of this review is inaccurate, please let us know.

The IANA Services Operator understands that, upon approval of this document, there are two actions which we must complete.

First, in the Response Codes subregistry of the Session Initiation Protocol (SIP) Parameters registry located at:

https://www.iana.org/assignments/sip-parameters/

a single, new response code is to be registered as follows:

Response Code: 666
Description: Unwanted
Reference: [ RFC-to-be ]

Second, in the Global Feature-Capability Indicator Registration Tree subregistry also in the Session Initiation Protocol (SIP) Parameters registry located at:

https://www.iana.org/assignments/sip-parameters/

a single, new parameter will be registered as follows:

Name: sip.666
Description: This feature-capability indicator when used in a REGISTER response indicates that the server will process the 666 response code. This does not imply any specific action.
Reference: [ RFC-to-be ]

Because this registry requires Expert Review [RFC5226] for registration, we've contacted the IESG-designated expert in a separate ticket to request approval. Expert review should be completed before your document can be approved for publication as an RFC.

The IANA Services Operator understands that these two actions are the only ones required to be completed upon approval of this document.

Note:  The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is only to confirm what actions will be performed.

Thank you,

Sabrina Tanamal
IANA Services Specialist
PTI
2017-03-15
04 Tero Kivinen Request for Last Call review by SECDIR Completed: Has Issues. Reviewer: Adam Montville.
2017-03-14
04 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Al Morton
2017-03-14
04 Gunter Van de Velde Request for Last Call review by OPSDIR is assigned to Al Morton
2017-03-09
04 Jean Mahoney Request for Last Call review by GENART is assigned to Peter Yee
2017-03-09
04 Jean Mahoney Request for Last Call review by GENART is assigned to Peter Yee
2017-03-09
04 Tero Kivinen Request for Last Call review by SECDIR is assigned to Adam Montville
2017-03-09
04 Tero Kivinen Request for Last Call review by SECDIR is assigned to Adam Montville
2017-03-07
04 Cindy Morgan IANA Review state changed to IANA - Review Needed
2017-03-07
04 Cindy Morgan
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC: ben@nostrum.com, adam@nostrum.com, Adam Roach , sipcore-chairs@ietf.org, sipcore@ietf.org, …
The following Last Call announcement was sent out:

From: The IESG
To: IETF-Announce
CC: ben@nostrum.com, adam@nostrum.com, Adam Roach , sipcore-chairs@ietf.org, sipcore@ietf.org, draft-ietf-sipcore-status-unwanted@ietf.org
Reply-To: ietf@ietf.org
Sender:
Subject: Last Call:  (A SIP Response Code for Unwanted Calls) to Proposed Standard


The IESG has received a request from the Session Initiation Protocol Core
WG (sipcore) to consider the following document:
- 'A SIP Response Code for Unwanted Calls'
  as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2017-03-21. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


  This document defines the 666 (Unwanted) SIP response code, allowing
  called parties to indicate that the call or message was unwanted.
  SIP entities may use this information to adjust how future calls from
  this calling party are handled for the called party or more broadly.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-sipcore-status-unwanted/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-sipcore-status-unwanted/ballot/


No IPR declarations have been submitted directly on this I-D.




2017-03-07
04 Cindy Morgan IESG state changed to In Last Call from Last Call Requested
2017-03-07
04 Ben Campbell Last call was requested
2017-03-07
04 Ben Campbell IESG state changed to Last Call Requested from Publication Requested
2017-03-07
04 Ben Campbell Last call announcement was generated
2017-03-07
04 Ben Campbell Ballot writeup was changed
2017-03-07
04 Ben Campbell Ballot approval text was generated
2017-03-07
04 Ben Campbell
This is my AD evaluation of draft-ietf-sipcore-status-unwanted-04. I have a few substantive and and some editorial comments. I don't think any of these need block …
This is my AD evaluation of draft-ietf-sipcore-status-unwanted-04. I have a few substantive and and some editorial comments. I don't think any of these need block the IETF last call, which I will request shortly. These can be resolved along with any IETF LC comments.
-----------------
- Substantive Comments:

-- section 4, first paragraph:

I'm struggling to understand what a sending a 666 when canceling a branch of a forked call would mean. Are we talking about a scenario where a forking proxy notes that one device responds with a 666, then the proxy sends that to the other branches? If so, some elaboration of the use case might be helpful.

-- Section 4, paragraph 3:
There's some imprecision in whether explicit user action is expected when deciding to send a 666. I think the intent is that explicit user action (e.g. a spam button) is just one of multiple ways a called UA could decide to do so. But the last sentence of the paragraph seems to indicate an expectation for explicit UI action, in spite of the earlier sentences that allowed otherwise. It's not clear to me if those previous sentences describe when to _send_ a 666, or just what one might do when receiving one.

-6, 3rd paragraph from end:
How can one reasonably know that an identity has been reassigned? I can see the case where the callee's service provider is the same as the caller's service provider, but that's a degenerate case. Are we expecting the calling SP to inform the callee SP out of band, and the callee SP to believe them? Given how poorly that seems to work in the context of email, I wonder if there's any useful advice to give here.

- Editorial Comments:

-- There's some general imprecision in the use of "UAC" and "UAS". I think the intent is to speak of the UAC and UAS in the context of the dialog-initiating transaction (at least when a dialog is involved), but it ends up with language of the form of "... when the UAS sends a BYE request...". Perhaps terms like "caller UA" and "callee UA" would be more clear? (Not that I particularly those, when caller and callee or called vary by a single letter.)


-- section 1, first paragraph, sentence starting with "This document addresses only the last mode..."
The sentence is convoluted. Can it be broken into  a few simpler sentences?

-- 4, 2nd paragraph:
Please avoid 2119 keywords (in this case MAY), in a non-exhaustive list of examples, as it implies that additional MAYs exist but are not explicitly mentioned. Consider something along the lines of "...MAY perform some action based on local policy, for example, add the party to a local blacklist, ..."

--4, 4th paragraph: I'm not sure I believe the sentence starting with "In other words" paraphrases any previous words :-)

--6: 2nd to last paragraph: A citation for call transfer might be nice. (Maybe the call flows RFC?)


2017-03-02
04 Adam Roach Changed consensus to Yes from Unknown
2017-03-02
04 Adam Roach Intended Status changed to Proposed Standard from None
2017-03-02
04 Adam Roach
(1) What type of RFC is being requested (BCP, Propothsed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  …
(1) What type of RFC is being requested (BCP, Propothsed Standard,
Internet Standard, Informational, Experimental, or Historic)?  Why
is this the proper type of RFC?  Is this type of RFC indicated in the
title page header?

  Standards Track

(2) The IESG approval announcement includes a Document Announcement
Write-Up. Please provide such a Document Announcement Write-Up. Recent
examples can be found in the "Action" announcements for approved
documents. The approval announcement contains the following sections:

Technical Summary

  This document defines the 666 (Unwanted) SIP response code, allowing
  called parties to indicate that the call or message was unwanted.
  SIP entities may use this information to adjust how future calls from
  this calling party are handled for the called party or more broadly.
  This is part of the larger toolkit of SIP tools being developed to
  help mitigate the issue of large-scale unwanted phone calls.

Working Group Summary

  The period of discussion for this draft was uncharacteristically short and
  vigorous for the SIPCORE working group, with over 150 messages spanning a
  three-month period. Support for the mechanism was universal, with the only
  real point of contention being how far the document should go in prescribing
  specific behaviors by network elements upon receipt of the response code. The
  current version reflects carefully crafted wording that reflects the intention
  of the code while avoiding the concerns of those parties that did not want to
  see future call-rejection behavior normatively defined.

Document Quality

  The document has been well reviewed within the SIP working group. While no
  implementations are known to yet exist, the need for this new response code
  has been brought to the IETF by the United States FCC and major US
  telecommunications carriers as a necessary tool for fighting unwanted phone
  calls. There is a strong implication that these parties plan to ensure a
  wide-scale roll-out of the response code, at least within the United States,
  and likely elsewhere.

Personnel

  Adam Roach is the document shepherd. Ben Campbell is the responsible
  area director.

(3) Briefly describe the review of this document that was performed by
the Document Shepherd.  If this version of the document is not ready
for publication, please explain why the document is being forwarded to
the IESG.

  This is a short document. The shepherd has read every version in their
  entirety as they were published.

(4) Does the document Shepherd have any concerns about the depth or
breadth of the reviews that have been performed?

  The scope of reviews performed seems adequate and approrpriate.


(5) Do portions of the document need review from a particular or from
broader perspective, e.g., security, operational complexity, AAA, DNS,
DHCP, XML, or internationalization? If so, describe the review that
took place.

  The document requires no specialized expertise beyond that possessed by
  regular participants in the SIPCORE working group.

(6) Describe any specific concerns or issues that the Document Shepherd
has with this document that the Responsible Area Director and/or the
IESG should be aware of? For example, perhaps he or she is uncomfortable
with certain parts of the document, or has concerns whether there really
is a need for it. In any event, if the WG has discussed those issues and
has indicated that it still wishes to advance the document, detail those
concerns here.

  The shepherd has no such concerns.

(7) Has each author confirmed that any and all appropriate IPR
disclosures required for full conformance with the provisions of BCP 78
and BCP 79 have already been filed. If not, explain why.

  The author has confirmed that no such declaration is necessary.

(8) Has an IPR disclosure been filed that references this document?
If so, summarize any WG discussion and conclusion regarding the IPR
disclosures.

  There has been no IPR disclosure filed.

(9) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with others
being silent, or does the WG as a whole understand and agree with it?

  Discussion on the document has involved a substantial percentage of those
  participants in SIPCORE who can be readily identified as "active." Based on
  mailing list discussions, agreement on the -03 version of the document is
  universal.

(10) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in separate
email messages to the Responsible Area Director. (It should be in a
separate email because this questionnaire is publicly available.)

  No appeal or discontent has been expressed.

(11) Identify any ID nits the Document Shepherd has found in this
document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts
Checklist). Boilerplate checks are not enough; this check needs to be
thorough.

  The document passes the automated nits check and a manual examination
  against the checklist.

(12) Describe how the document meets any required formal review
criteria, such as the MIB Doctor, media type, and URI type reviews.

  No formal review requirements are triggered by this document, aside from any
  required by IANA process.

(13) Have all references within this document been identified as
either normative or informative?

  They have.

(14) Are there normative references to documents that are not ready for
advancement or are otherwise in an unclear state? If such normative
references exist, what is the plan for their completion?

  All normative references are to published RFCs.


(15) Are there downward normative references references (see RFC 3967)?
If so, list these downward references to support the Area Director in
the Last Call procedure.

  Thre are no downward normative references.


(16) Will publication of this document change the status of any
existing RFCs? Are those RFCs listed on the title page header, listed
in the abstract, and discussed in the introduction? If the RFCs are not
listed in the Abstract and Introduction, explain why, and point to the
part of the document where the relationship of this document to the
other RFCs is discussed. If this information is not in the document,
explain why the WG considers it unnecessary.

  This document does not change the status of any published RFCs.

(17) Describe the Document Shepherd's review of the IANA considerations
section, especially with regard to its consistency with the body of the
document. Confirm that all protocol extensions that the document makes
are associated with the appropriate reservations in IANA registries.
Confirm that any referenced IANA registries have been clearly
identified. Confirm that newly created IANA registries include a
detailed specification of the initial contents for the registry, that
allocations procedures for future registrations are defined, and a
reasonable name for the new registry has been suggested (see RFC 5226).

  The names of the tables are precise; the registrations include all fields
  named in the tables; and the registration of values by this document are in
  accordance with registration policies for the associated tables. The values
  being registered are consistent with the document text.

(18) List any new IANA registries that require Expert Review for future
allocations. Provide any public guidance that the IESG would find
useful in selecting the IANA Experts for these new registries.

  This document does not add any IANA registries.

(19) Describe reviews and automated checks performed by the Document
Shepherd to validate sections of the document written in a formal
language, such as XML code, BNF rules, MIB definitions, etc.

  There is no formal language defined in this document.
2017-03-02
04 Adam Roach Responsible AD changed to Ben Campbell
2017-03-02
04 Adam Roach IETF WG state changed to Submitted to IESG for Publication from WG Document
2017-03-02
04 Adam Roach IESG state changed to Publication Requested
2017-03-02
04 Adam Roach IESG process started in state Publication Requested
2017-03-02
04 Adam Roach Changed document writeup
2017-03-02
04 Henning Schulzrinne New version available: draft-ietf-sipcore-status-unwanted-04.txt
2017-03-02
04 (System) New version approved
2017-03-02
04 (System) Request for posting confirmation emailed to previous authors: Henning Schulzrinne
2017-03-02
04 Henning Schulzrinne Uploaded new revision
2017-03-01
03 Adam Roach Changed document writeup
2017-02-15
03 Henning Schulzrinne New version available: draft-ietf-sipcore-status-unwanted-03.txt
2017-02-15
03 (System) New version approved
2017-02-15
03 (System) Request for posting confirmation emailed to previous authors: "Henning Schulzrinne"
2017-02-15
03 Henning Schulzrinne Uploaded new revision
2017-01-12
02 Henning Schulzrinne New version available: draft-ietf-sipcore-status-unwanted-02.txt
2017-01-12
02 (System) New version approved
2017-01-12
02 (System) Request for posting confirmation emailed to previous authors: "Henning Schulzrinne"
2017-01-12
02 Henning Schulzrinne Uploaded new revision
2017-01-09
01 Adam Roach Notification list changed to "Adam Roach" <adam@nostrum.com>
2017-01-09
01 Adam Roach Document shepherd changed to Adam Roach
2017-01-04
01 Henning Schulzrinne New version available: draft-ietf-sipcore-status-unwanted-01.txt
2017-01-04
01 (System) New version approved
2017-01-04
01 (System) Request for posting confirmation emailed to previous authors: "Henning Schulzrinne"
2017-01-04
01 Henning Schulzrinne Uploaded new revision
2016-12-12
00 Adam Roach This document now replaces draft-schulzrinne-dispatch-status-unwanted instead of None
2016-12-12
00 Henning Schulzrinne New version available: draft-ietf-sipcore-status-unwanted-00.txt
2016-12-12
00 (System) WG -00 approved
2016-12-12
00 Henning Schulzrinne Set submitter to "Henning Schulzrinne ", replaces to draft-schulzrinne-dispatch-status-unwanted and sent approval email to group chairs: sipcore-chairs@ietf.org
2016-12-12
00 Henning Schulzrinne Uploaded new revision