Session Initiation Protocol (SIP) Call Control - Transfer
draft-ietf-sipping-cc-transfer-12
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2012-08-22
|
12 | (System) | post-migration administrative database adjustment to the Yes position for Cullen Jennings |
2012-08-22
|
12 | (System) | post-migration administrative database adjustment to the No Objection position for Russ Housley |
2009-05-19
|
12 | Cindy Morgan | State Changes to RFC Ed Queue from Approved-announcement sent by Cindy Morgan |
2009-05-19
|
12 | (System) | IANA Action state changed to No IC from In Progress |
2009-05-19
|
12 | (System) | IANA Action state changed to In Progress |
2009-05-19
|
12 | Amy Vezza | IESG state changed to Approved-announcement sent |
2009-05-19
|
12 | Amy Vezza | IESG has approved the document |
2009-05-19
|
12 | Amy Vezza | Closed "Approve" ballot |
2009-05-19
|
12 | Amy Vezza | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza |
2009-05-19
|
12 | Cullen Jennings | [Ballot Position Update] Position for Cullen Jennings has been changed to Yes from Discuss by Cullen Jennings |
2009-05-17
|
12 | Cullen Jennings | Sent request email |
2009-05-17
|
12 | Cullen Jennings | [Ballot discuss] Two things I want to talk about for the AIB in section 8 - they may be fine in the draft but I'm … [Ballot discuss] Two things I want to talk about for the AIB in section 8 - they may be fine in the draft but I'm not sure. 1) It seems to me that having the multipart/signed inside the multipart/mixed is wrong because there are no other bodies in the mixed. It should just be a multipart/signed 2) I seem to recall checking the S/MIME signature long ago but I can't get it to parse any more. I might be extracting the binary representation in the wrong way. How are you doing this and I will try to duplicate. |
2009-05-10
|
12 | Cullen Jennings | [Ballot discuss] Two things I want to talk about for the AIB in section 8 - they may be fine in the draft but I'm … [Ballot discuss] Two things I want to talk about for the AIB in section 8 - they may be fine in the draft but I'm not sure. 1) It seems to me that having the multipart/signed inside the multipart/mixed is wrong because there are no other bodies in the mixed. It should just be a multipart/signed 2) I seem to recall checking the S/MIME signature long ago but I can't get it to parse any more. I might be extracting the binary representation in the wrong way. How are you doing this and I will try to duplicate. Just testing tool. Thanks, Cullen |
2009-04-01
|
12 | Cullen Jennings | Responsible AD has been changed to Cullen Jennings from Jon Peterson |
2009-03-03
|
12 | (System) | New version available: draft-ietf-sipping-cc-transfer-12.txt |
2008-11-07
|
12 | (System) | Removed from agenda for telechat - 2008-11-06 |
2008-11-06
|
12 | Amy Vezza | State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza |
2008-11-06
|
12 | Ross Callon | [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon |
2008-11-06
|
12 | Jari Arkko | [Ballot Position Update] New position, No Objection, has been recorded by Jari Arkko |
2008-11-05
|
12 | Mark Townsley | [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley |
2008-11-05
|
12 | Chris Newman | [Ballot comment] I support Cullen's discuss about multipart wrapping. While a single-part multipart/mixed is legal MIME and in theory equivalent to moving the inner part … [Ballot comment] I support Cullen's discuss about multipart wrapping. While a single-part multipart/mixed is legal MIME and in theory equivalent to moving the inner part up a level; in practice the extra wrapper tends to confound processing agents and UIs. Because both cases are MIME compliant, this falls under the "be liberal in what you accept, conservative in what you send" principle. So it's bad practice to misbehave when receiving a single-part multipart/mixed, but it's also bad practice to send it in the first place. While a "bad sending practice" example may be useful in specs to help receivers get more robust, it needs to be identified as a bad practice. |
2008-11-05
|
12 | Chris Newman | [Ballot Position Update] New position, No Objection, has been recorded by Chris Newman |
2008-11-05
|
12 | Cullen Jennings | [Ballot discuss] Two things I want to talk about for the AIB in section 8 - they may be fine in the draft but I'm … [Ballot discuss] Two things I want to talk about for the AIB in section 8 - they may be fine in the draft but I'm not sure. 1) It seems to me that having the multipart/signed inside the multipart/mixed is wrong because there are no other bodies in the mixed. It should just be a multipart/signed 2) I seem to recall checking the S/MIME signature long ago but I can't get it to parse any more. I might be extracting the binary representation in the wrong way. How are you doing this and I will try to duplicate. Thanks, Cullen |
2008-11-05
|
12 | Cullen Jennings | [Ballot Position Update] New position, Discuss, has been recorded by Cullen Jennings |
2008-11-05
|
12 | David Ward | [Ballot Position Update] New position, No Objection, has been recorded by David Ward |
2008-11-05
|
12 | Lars Eggert | [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert |
2008-11-05
|
12 | Pasi Eronen | [Ballot Position Update] New position, No Objection, has been recorded by Pasi Eronen |
2008-11-05
|
12 | Magnus Westerlund | [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund |
2008-11-04
|
12 | Russ Housley | [Ballot comment] Typo at the end of section 11.1: > > If the gateway supports more than one truck group, > … [Ballot comment] Typo at the end of section 11.1: > > If the gateway supports more than one truck group, > s/truck/trunk/ |
2008-11-04
|
12 | Russ Housley | [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley |
2008-11-04
|
12 | Lisa Dusseault | [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault |
2008-11-04
|
12 | Russ Housley | [Ballot discuss] Brian Carpenter provided a Gen-ART Review on 6-Oct-2008, and I have not seen a response. Please respond. I'm especially concerned about … [Ballot discuss] Brian Carpenter provided a Gen-ART Review on 6-Oct-2008, and I have not seen a response. Please respond. I'm especially concerned about this comment: > ... I found it hard in sections 5 through 11 to figure out what was > normative and what was illustrative. Does that "can be" imply that > there may be another method? I found no MUSTs, two SHOULDs, one > NOT RECOMMENDED, and one MAY. There are some lower case "shoulds" > - are they normative? Are the call flows normative? If so, I think > this should be stated explicitly in section 5. |
2008-11-04
|
12 | Russ Housley | [Ballot Position Update] New position, Discuss, has been recorded by Russ Housley |
2008-11-04
|
12 | Tim Polk | [Ballot comment] Section 5 s/he Transferee had initiated/the Transferee had initiated/ Section 7.2 s/different that in current/different than in current/ Section 7.5, Figure 9 I … [Ballot comment] Section 5 s/he Transferee had initiated/the Transferee had initiated/ Section 7.2 s/different that in current/different than in current/ Section 7.5, Figure 9 I believe the Invite associated with dialog4 should be dialog3 Section 7.5, Figure 10 I was confused by the messages associated with dialogs 3 and 4. I thought the final BYE/200 OK should be associated with dialog4 rather than dialog3. It looks like dialog3 never terminates; is a message missing? Section 7.6 s/to a race conditions/to race conditions/ s/In this, case the call flow/In this case, the call flow/ Section 9, Figure 16 The figure omits dialog numbers. |
2008-11-04
|
12 | Tim Polk | [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk |
2008-11-02
|
12 | Dan Romascanu | [Ballot Position Update] New position, No Objection, has been recorded by Dan Romascanu |
2008-10-30
|
12 | Jon Peterson | Placed on agenda for telechat - 2008-11-06 by Jon Peterson |
2008-10-30
|
12 | Jon Peterson | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Jon Peterson |
2008-10-30
|
12 | Jon Peterson | [Ballot Position Update] New position, Yes, has been recorded for Jon Peterson |
2008-10-30
|
12 | Jon Peterson | Ballot has been issued by Jon Peterson |
2008-10-30
|
12 | Jon Peterson | Created "Approve" ballot |
2008-10-15
|
11 | (System) | New version available: draft-ietf-sipping-cc-transfer-11.txt |
2008-10-10
|
12 | Amanda Baber | IANA Last Call comments: As described in the IANA Considerations section, we understand this document to have NO IANA Actions. |
2008-10-10
|
12 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2008-10-03
|
12 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Julien Laganier |
2008-10-03
|
12 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Julien Laganier |
2008-09-26
|
12 | Cindy Morgan | Last call sent |
2008-09-26
|
12 | Cindy Morgan | State Changes to In Last Call from Last Call Requested by Cindy Morgan |
2008-09-26
|
12 | Jon Peterson | State Changes to Last Call Requested from AD Evaluation's state and the current server state, the server SHOULD generate an update to take the … State Changes to Last Call Requested from AD Evaluation's state and the current server state, the server SHOULD generate an update to take the client to an intermediate state, from which the client can continue to call _Foo/changes_ until it is fully up to date. If it is unable to calculate an intermediate state, it MUST return a "cannotCalculateChanges" error response instead. Jenkins & Newman Expires March 14, 2019 [Page 26] Internet-Draft JMAP September 2018 When generating intermediate states, the server may choose how to divide up the changes. For many types it will provide a better user experience to return the more recent changes first, as this is more likely to be what the user is most interested in. The client can then continue to page in the older changes while the user is viewing the newer data. For example, suppose a server went through the following states: A -> B -> C -> D -> E And a client asks for changes from state "B". The server might first get the ids of records created, updated or destroyed between states D and E, returning them with: state: "B-D-E" hasMoreChanges: true The client will then ask for the change from state "B-D-E", and the server can return the changes between states C and D, returning: state: "B-C-E" hasMoreChanges: true Finally the client will request the changes from "B-C-E" and the server can return the changes between states B and C, returning: state: "E" hasMoreChanges: false Should the state on the server be modified in the middle of all this (to "F"), the server still does the same but now when the update to state "E" is returned, it would indicate that it still has more changes for the client to fetch. Where multiple changes to a record are split across different intermediate states, the server MUST NOT return a record as created in a later response than one which gives it as updated or destroyed, and MUST NOT return a record as destroyed before a response that gives it as created or updated. The server may have to coalesce multiple changes to a record to satisfy this requirement. The following additional errors may be returned instead of the _Foo/ changes_ response: "cannotCalculateChanges": The server cannot calculate the changes from the state string given by the client. Usually due to the client's state being too old, or the server being unable to produce Jenkins & Newman Expires March 14, 2019 [Page 27] Internet-Draft JMAP September 2018 an update to an intermediate state when there are too many updates. The client MUST invalidate its Foo cache. Maintaining state to allow calculation of _Foo/changes_ can be expensive for the server, but always returning _cannotCalculateChanges_ severely increases network traffic and resource usage for the client. To allow efficient sync, servers SHOULD be able to calculate changes from any state string that was given to a client within the last 30 days (but of course may support calculating updates from states older than this). 5.3. /set Modifying the state of Foo objects on the server is done via the _Foo/set_ method. This encompasses creating, updating and destroying Foo records. This allows the server to sort out ordering and dependencies that may exist if doing multiple operations at once (for example to ensure there is always a minimum number of a certain record type). The _Foo/set_ method takes the following arguments: o *accountId*: "String" The id of the account to use. o *ifInState*: "String|null" This is a state string as returned by the _Foo/get_ method. If supplied, the string must match the current state, otherwise the method will be aborted and a "stateMismatch" error returned. If "null", any changes will be applied to the current state. o *create*: "String[Foo]|null" A map of _creation id_ (an arbitrary string set by the client) to Foo objects, or "null" if no objects are to be created. The Foo object type definition MAY define default values for properties. Any such property MAY be omitted by the client. The client MUST omit any properties that may only be set by the server (for example, the _id_ property on most object types). o *update*: "String[PatchObject]|null" A map of id to a Patch object to apply to the current Foo object with that id, or "null" if no objects are to be updated. A _PatchObject_ is of type "String[*]", and represents an unordered set of patches. The keys are a path in [RFC6901] JSON pointer format, with an implicit leading "/" (i.e. prefix each key with "/" before applying the JSON pointer evaluation algorithm). All paths MUST also conform to the following restrictions; if there is any violation, the update MUST be rejected with an "invalidPatch" error: Jenkins & Newman Expires March 14, 2019 [Page 28] Internet-Draft JMAP September 2018 * The pointer MUST NOT reference inside an array (i.e. you MUST NOT insert/delete from an array; the array MUST be replaced in its entirety instead). * All parts prior to the last (i.e. the value after the final slash) MUST already exist on the object being patched. * There MUST NOT be two patches in the PatchObject where the pointer of one is the prefix of the pointer of the other, e.g. "alerts/1/offset" and "alerts". The value associated with each pointer determines how to apply that patch: * If "null", set to the default value if specified for this property, otherwise remove the property from the patched object. If the key is not present in the parent, this a no-op. * Anything else: The value to set for this property (this may be a replacement or addition to the object being patched). Any server-set properties MAY be included in the patch if their value is identical to the current server value (before applying the patches to the object). Otherwise, the update MUST be rejected with an _invalidProperties_ SetError. This patch definition is designed such that an entire Foo object is also a valid PatchObject. The client MAY choose to optimise network usage by just sending the diff, or MAY just send the whole object; the server processes it the same either way. o *destroy*: "String[]|null" A list of ids for Foo objects to permanently delete, or "null" if no objects are to be destroyed. Each creation, modification or destruction of an object is considered an atomic unit. It is permissible for the server to commit changes to some objects but not others, however it is not permissible to only commit part of an update to a single record (e.g. update a _name_ property but not a _count_ property, if both are supplied in the update object). The final state MUST be valid after the Foo/set is finished, however the server may have to transition through invalid intermediate states (not exposed to the client) while processing the individual create/update/destroy requests. For example, suppose there is a "name" property that must be unique. A single method call could rename an object A => B, and simultaneously rename another object B => A. If the final state is valid, this is allowed. Otherwise, each creation, modification or destruction of an object should be Jenkins & Newman Expires March 14, 2019 [Page 29] Internet-Draft JMAP September 2018 processed sequentially and accepted/rejected based on the current server state. If a create, update or destroy is rejected, the appropriate error MUST be added to the notCreated/notUpdated/notDestroyed property of the response and the server MUST continue to the next create/update/ destroy. It does not terminate the method. If an id given cannot be found, the update or destroy MUST be rejected with a "notFound" set error. The server MAY skip an update (rejecting it with a "willDestroy" SetError) if that object is destroyed in the same /set request. Some record objects may hold references to others (foreign keys). When records are created or modified, they may reference other records being created _in the same API request_ by using the creation id prefixed with a "#". The order of the method calls in the request by the client MUST be such that the record being referenced is created in the same or an earlier call. The server thus never has to look ahead. Instead, while processing a request (a series of method calls), the server MUST keep a simple map for the duration of the request of creation id to record id for each newly created record, so it can substitute in the correct value if necessary in later method calls. Creation ids are not scoped by type but are a single map for all types. A client SHOULD NOT reuse a creation id anywhere in the same API request. If a creation id is reused, the server MUST map the creation id to the most recently created item with that id. To allow easy proxying of API requests, an initial set of creation id to real id values may be passed with a request (see The Request object specification above). The response has the following arguments: o *accountId*: "String" The id of the account used for the call. o *oldState*: "String|null" The state string that would have been returned by _Foo/get_ before making the requested changes, or "null" if the server doesn't know what the previous state string was. o *newState*: "String" The state string that will now be returned by _Foo/get_. o *created*: "String[Foo]|null" A map of the creation id to an object containing any properties of the created Foo object that Jenkins & Newman Expires March 14, 2019 [Page 30] Internet-Draft JMAP September 2018 were not sent by the client. This includes all server-set properties (such as the _id_ in most object types) and any properties that were omitted by the client and so set to a default by the server. This argument is "null" if no Foo objects were successfully created. o *updated*: "String[Foo|null]|null" The _keys_ in this map are the ids of all Foos that were successfully updated, or "null" if none successful. The _value_ for each id is a Foo object containing any property that changed in a way _not_ explicitly requested by the _PatchObject_ sent to the server, or "null" if none. This lets the client know of any changes to server-set or computed properties. o *destroyed*: "String[]|null" A list of Foo ids for records that were successfully destroyed, or "null" if none successful. o *notCreated*: "String[SetError]|null" A map of creation id to a SetError object for each record that failed to be created, or "null" if all successful. o *notUpdated*: "String[SetError]|null" A map of Foo id to a SetError object for each record that failed to be updated, or "null" if all successful. o *notDestroyed*: "String[SetError]|null" A map of Foo id to a SetError object for each record that failed to be destroyed, or "null" if all successful. A *SetError* object has the following properties: o *type*: "String" The type of error. o *description*: "String|null& by Jon Peterson |
2008-09-26
|
12 | Jon Peterson | Last Call was requested by Jon Peterson |
2008-09-26
|
12 | (System) | Ballot writeup text was added |
2008-09-26
|
12 | (System) | Last call text was added |
2008-09-26
|
12 | (System) | Ballot approval text was added |
2008-09-03
|
10 | (System) | New version available: draft-ietf-sipping-cc-transfer-10.txt |
2008-06-02
|
12 | Cullen Jennings | State Change Notice email list have been change to sipping-chairs@tools.ietf.org, draft-ietf-sipping-cc-transfer@tools.ietf.org, alan@sipstation.com from sipping-chairs@tools.ietf.org, draft-ietf-sipping-cc-transfer@tools.ietf.org |
2008-04-29
|
12 | Jon Peterson | State Changes to AD Evaluation from Publication Requested by Jon Petersonquot;, with a positive integer value representing a length of time in seconds, … State Changes to AD Evaluation from Publication Requested by Jon Petersonquot;, with a positive integer value representing a length of time in seconds, e.g. "ping=300". If set, the server MUST send an event called *ping* whenever this time elapses since the previous event was sent. This MUST NOT set a new event id. The server MAY modify the interval given as a query parameter to be subject to a minimum and/or maximum value. For interoperability, servers MUST NOT have a minimum allowed value higher than 30 or a maximum allowed value less than 300. The data for the ping event MUST be a JSON object containing an _interval_ property, the value (type "PositiveInt") being the interval in seconds the server is using to send pings (this may be different to the requested value if the server clamped it to be within a min/max value). Jenkins & Newman Expires March 14, 2019 [Page 57] Internet-Draft JMAP September 2018 Clients can monitor for the _ping_ event to help determine when the closeafter mode may be required. Refer to the JMAP Session resource section of this spec for details on how to get the URL for the event-source resource. Requests to the resource MUST be authenticated. A client MAY hold open multiple connections to the event-source resource, although it SHOULD try to use a single connection for efficiency. 8. Security considerations 8.1. Transport confidentiality All HTTP requests MUST use [RFC5246] TLS (https) transport to ensure the confidentiality of data sent and received via JMAP. Clients MUST validate TLS certificate chains to protect against man-in-the-middle attacks. 8.2. Authentication scheme A number of HTTP authentication schemes have been standardised (<https://www.iana.org/assignments/http-authschemes/http- authschemes.xhtml>). Servers should take care to assess the security characteristics of different schemes in relation to their needs when deciding what to implement. If offering the Basic authentication scheme, services are strongly recommended to not allow a user's regular password but require generation of a unique "app password" via some external mechanism for each client they wish to connect. This allows connections from different devices to be differentiated by the server, and access to be individually revoked. 8.3. Service autodiscovery Unless secured by something like DNSSEC, autodiscovery of server details is vulnerable to a DNS poisoning attack leading to the client talking to an attacker's server instead of the real JMAP server. The attacker may then man-in-the-middle requests and depending on the authentication scheme, steal credentials to generate its own requests. Clients that do not support SRV lookups are likely to try just using the "/.well-known/jmap" path directly against the domain of the username over HTTPS. Servers SHOULD ensure this path resolves or redirects to the correct JMAP Session resource to allow this to work. Jenkins & Newman Expires March 14, 2019 [Page 58] Internet-Draft JMAP September 2018 If this is not feasible, servers MUST ensure this path cannot be controlled by an attacker, as again it may be used to steal credentials. 8.4. JSON parsing The security considerations of [RFC7159] apply to the use of JSON as the data interchange format. 8.5. Denial of service A small request may result in a very large response, and require considerable work on the server if resource limits are not enforced. JMAP provides mechanisms for advertising and enforcing a wide variety of limits for mitigating this threat, including limits on number of objects fetched in a single method call, number of methods in a single request, number of concurrent requests, etc. JMAP servers MUST implement sensible limits to mitigate against resource exhaustion attacks. 8.6. Push encryption When data changes, a small object is pushed with the new state strings for the types that have changed. While the data here is minimal, a passive man-in-the-middle attacker may be able to gain useful information. To ensure confidentiality, if the push is sent via a third party outside of the control of the client and JMAP server the client MUST specify encryption keys when establishing the PushSubscription. The privacy and security considerations of [RFC8030] and [RFC8291] also all apply to the use of the PushSubscription mechanism. 9. IANA considerations 9.1. Assignment of jmap service name IANA will assign the 'jmap' service name in the 'Service Name and Transport Protocol Port Number Registry' [RFC6335]. Service Name: jmap Transport Protocol(s): tcp Assignee: IESG Contact: IETF Chair Jenkins & Newman Expires March 14, 2019 [Page 59] Internet-Draft JMAP September 2018 Description: JSON Meta Application Protocol Reference: this document Assignment Notes: this service name was previously assigned under the name _JSON Mail Access Protocol_. This will be de-assigned and re- assigned with the approval of the previous assignee. 9.2. Registration of well-known URI suffix for JMAP IANA will register the following well-known URI suffix for JMAP as described in [RFC5785]: URI Suffix: jmap Change Controller: IETF Specification Document: this document, section 2.2. 9.3. Registration of the jmap URN sub-namespace IANA will register the following URN sub-namespace in the "IETF URN Sub-namespace for Registered Protocol Parameter Identifiers" registry as described in [RFC3553]. Registered Parameter Identifier: jmap Reference: this document, next section IANA Registry Reference: {insert IANA registry URL for registry in next section, upon approval} 9.4. Creation of "JMAP Capabilities" registry IANA will create a registry for JMAP capabilities as described in section 2. JMAP capabilities are advertised in the _capabilities_ property of the _JMAP Session_ resource. They are used to extend the functionality of a JMAP server. A capability is referenced by a URI. The JMAP capability URI can be a URN starting with "urn:ietf:params:jmap:" plus a unique suffix which is the index value in the jmap URN sub-namespace. Registration of a JMAP capability with another form of URI has no impact on the jmap URN sub-namespace. This registry follows the expert review process unless the "intended use" field is _common_ or _placeholder_ in which case registration follows the specification required process. Jenkins & Newman Expires March 14, 2019 [Page 60] Internet-Draft JMAP September 2018 A JMAP capability registration can have an intended use of _common_, _placeholder_, _limited_, or _obsolete_. IANA will list common use registrations prominently and separately from those with other intended use values. The JMAP capability registration procedure is not a formal standards process, but rather an administrative procedure intended to allow community comment and sanity checking without excessive time delay. A _placeholder_ registration reserves part of the jmap urn namespace for another purpose but is typically not included in the _capabilities_ property of the _JMAP Session_ resource. 9.4.1. Preliminary community review Notice of a potential JMAP common use registration SHOULD be sent to the jmap@ietf.org mailing list for review. This mailing list is appropriate to solicit community feedback on a proposed JMAP capability. Registrations that are not intended for common use MAY be sent to the list for review as well; doing so is entirely OPTIONAL, but is encouraged. The intent of the public posting to this list is to solicit comments and feedback on the choice of capability name, the unambiguity of the specification document, and a review of any interoperability or security considerations. The submitter may submit a revised registration proposal or abandon the registration completely and at any time. 9.4.2. Submit request to IANA Registration requests can be sent to iana@iana.org. 9.4.3. Designated expert review For a limited use registration, the designated expert's (DE) primary concern is preventing name collisions and encouraging the submitter to document security and privacy considerations; a published specification is not required. For a common use registration, the DE is expected to confirm that suitable documentation as described in [RFC8126], Section 4.6, is available. The DE should also verify the capability does not conflict with work that is active or already published within the IETF. Before a period of 30 days has passed, the DE will either approve or deny the registration request and publish a notice of the decision to the JMAP WG mailing list or its successor, as well as informing IANA. A denial notice must be justified by an explanation, and in the cases |
2007-12-17
|
12 | Dinara Suleymanova | PROTO Write-up > 1.a) Have the chairs personally reviewed this version of the Internet > Draft (ID), and in particular, do they believe this ID … PROTO Write-up > 1.a) Have the chairs personally reviewed this version of the Internet > Draft (ID), and in particular, do they believe this ID is ready > to forward to the IESG for publication? > >The SIPPING WG chairs have reviewed the document and believe it is >ready for publication. Gonzalo Camarillo is its PROTO shepherd. > > 1.b) Has the document had adequate review from both key WG members > and key non-WG members? Do you have any concerns about the > depth or breadth of the reviews that have been performed? > >The draft has been thoroughly reviewed by a number of SIPPING members. > > 1.c) Do you have concerns that the document needs more review from a > particular (broader) perspective (e.g., security, operational > complexity, someone familiar with AAA, etc.)? > >We do not have any particular concern in that respect. > > 1.d) Do you have any specific concerns/issues with this document that > you believe the ADs and/or IESG should be aware of? For > example, perhaps you are uncomfortable with certain parts of the > document, or have concerns whether there really is a need for > it. In any event, if your issues have been discussed in the WG > and the WG has indicated it that it still wishes to advance the > document, detail those concerns in the write-up. > >We feel comfortable with the document. > > 1.e) How solid is the WG consensus behind this document? Does it > represent the strong concurrence of a few individuals, with > others being silent, or does the WG as a whole understand and > agree with it? > >There is strong consensus within the WG that call transfer is a very >important service and that this is the best way to implement such a service. > > 1.f) Has anyone threatened an appeal or otherwise indicated extreme > discontent? If so, please summarise the areas of conflict in > separate email to the Responsible Area Director. > >Nobody has done anything to stop this document. > > 1.g) Have the chairs verified that the document adheres to all of the > ID nits? (see http://www.ietf.org/ID-Checklist.html). > >Yes, it does. > > 1.h) Is the document split into normative and informative references? > Are there normative references to IDs, where the IDs are not > also ready for advancement or are otherwise in an unclear state? > (note here that the RFC editor will not publish an RFC with > normative references to IDs, it will delay publication until all > such IDs are also ready for publication as RFCs.) > >All the normative references are RFCs. xxx GRUU is still a draft. > > 1.i) For Standards Track and BCP documents, the IESG approval > announcement includes a write-up section with the following > sections: > > * Technical Summary > > This document describes providing Call Transfer capabilities in the > Session Initiation Protocol (SIP). SIP extensions such as REFER and > Replaces are used to provide a number of transfer services including > blind transfer, consultative transfer, and attended transfer. This > work is part of the SIP multiparty call control framework. > > * Working Group Summary > >This draft progressed slowly because it uses mechanisms defined in other >documents. The document had to wait until those mechanisms were ready. >Otherwise, folks in the WG agreed with the direction of the draft from >the beginning. > > * Protocol Quality > >Jon Peterson is the Responsible Area Director. The WG chair shepherd >for the document is Gonzalo Camarillo. > |
2007-12-17
|
12 | Dinara Suleymanova | Draft Added by Dinara Suleymanova in state Publication Requested |
2007-12-14
|
09 | (System) | New version available: draft-ietf-sipping-cc-transfer-09.txt |
2007-07-24
|
08 | (System) | New version available: draft-ietf-sipping-cc-transfer-08.txt |
2006-10-19
|
07 | (System) | New version available: draft-ietf-sipping-cc-transfer-07.txt |
2006-03-07
|
06 | (System) | New version available: draft-ietf-sipping-cc-transfer-06.txt |
2005-07-19
|
05 | (System) | New version available: draft-ietf-sipping-cc-transfer-05.txt |
2005-04-12
|
04 | (System) | New version available: draft-ietf-sipping-cc-transfer-04.txt |
2004-10-22
|
03 | (System) | New version available: draft-ietf-sipping-cc-transfer-03.txt |
2004-02-16
|
02 | (System) | New version available: draft-ietf-sipping-cc-transfer-02.txt |
2003-02-12
|
01 | (System) | New version available: draft-ietf-sipping-cc-transfer-01.txt |
2002-10-28
|
00 | (System) | New version available: draft-ietf-sipping-cc-transfer-00.txt |