WG Review: Javascript Object Signing and Encryption (jose)

2013-04-16 Thread The IESG
The Javascript Object Signing and Encryption (jose) working group in the
Security Area of the IETF is undergoing rechartering. The IESG has not
made any determination yet. The following draft charter was submitted,
and is provided for informational purposes only. Please send your
comments to the IESG mailing list (iesg at ietf.org) by 2013-04-23.

Javascript Object Signing and Encryption (jose)

Current Status: Active Working Group

Chairs:
  Karen O'Donoghue odonog...@isoc.org
  Jim Schaad i...@augustcellars.com

Assigned Area Director:
  Sean Turner turn...@ieca.com

Mailing list
  Address: j...@ietf.org
  To Subscribe: https://www.ietf.org/mailman/listinfo/jose
  Archive: http://www.ietf.org/mail-archive/web/jose/

Charter of Working Group:

JavaScript Object Notation (JSON) is a text format for the serialization
of structured data described in RFC 4627.  The JSON format is often used
for serializing and transmitting structured data over a network
connection. With the increased usage of JSON in protocols in the IETF
and elsewhere, there is now a desire to offer security services for JSON
with encryption, digital signatures, and message authentication codes
(MACs).

Different proposals for providing such security services have already
been defined and implemented.  This Working Group will standardize the
mechanism for integrity protection (signature and MAC) and encryption as
well as the format for keys and algorithm identifiers to support
interoperability of security services for protocols that use JSON. The
Working Group will base its work on well-known message security
primitives (e.g., CMS), and will solicit input from the rest of the IETF
Security Area to be sure that the security functionality in the JSON
format is sound.  The WG will strive to gather use cases to ensure the
broadest possible applicability of the mechanism.

As JSON adoption expands, the different applications utilizing JSON
security services will grow and this leads to the need to support
different requirements. The WG will develop a generic syntax that can be
used by applications to secure JSON-data, but it will be up to the
application to fully specify the use of the WG's documents much the same
way S/MIME is the application of CMS to MIME-based media types.

This group is chartered to work on the following deliverables:

(1) A Standards Track document or documents representing
integrity-protected data using JSON-based data structures, including
(but not limited to) JSON data structures. Integrity protection
includes public-key digital signatures as well as symmetric-key MACs.

(2) A Standards Track document or documents representing encrypted data
using JSON-based data structures, including (but not limited to) JSON
data structures.

(3) A Standards Track document specifying how to encode public keys as
JSON- structured objects.

(4) A Standards Track document specifying algorithms and algorithm
identifiers for the previous three documents.

(5) A Standards Track document specifying how to encode private and
symmetric keys as JSON-structured objects.  This document will build
upon the concepts and structures in (3).

(6) A Standards Track document specifying a means of protecting private
and symmetric keys via encryption.  This document will build upon the
concepts and structures in (2) and (5).  This document may register
additional algorithms in registries defined by (4).

(7) An Informational document detailing Use Cases and Requirements for
JSON Object Signing and Encryption (JOSE).

(8) An Informational document that tells an application what needs to be
specified in order to implement JOSE.

One or more of these goals may be combined into a single document, in
which case the concrete milestones for these goals will be satisfied by
the consolidated document(s).

Milestones:
  Jan 2012 - Submit JSON object integrity document as a WG item.
  Jan 2012 - Submit JSON object encryption document as a WG item.
  Jan 2012 - Submit JSON key format document as a WG item.
  Jan 2012 - Submit JSON algorithm document as a WG item.
  Jun 2012 - Start Working Group Last Call on JSON object integrity
document.
  Jun 2012 - Start Working Group Last Call on JSON object encryption
document.
  Jun 2012 - Start Working Group Last Call on JSON key format document.
  Jun 2012 - Start Working Group Last Call on JSON algorithm document.
  Jul 2012 - Submit JSON object integrity document to IESG for
consideration as Standards Track document.
  Jul 2012 - Submit JSON object encryption document to IESG for
consideration as Standards Track document.
  Jul 2012 - Submit JSON key format document to IESG for consideration as
Standards Track document.
  Jul 2012 - Submit JSON algorithm document to IESG for consideration as
Standards Track document.




WG Review: IMAP QRESYNC Extension (qresync)

2013-04-16 Thread The IESG
A new IETF working group has been proposed in the Applications Area. The
IESG has not made any determination yet. The following draft charter was
submitted, and is provided for informational purposes only. Please send
your comments to the IESG mailing list (iesg at ietf.org) by 2013-04-23.

IMAP QRESYNC Extension (qresync)

Current Status: Proposed Working Group

Assigned Area Director:
  Barry Leiba barryle...@computer.org

Mailing list
  Address: imap...@ietf.org
  To Subscribe: https://www.ietf.org/mailman/listinfo/imapext
  Archive: http://www.ietf.org/mail-archive/web/imapext/

Charter of Working Group:

The Internet Message Access Protocol (IMAP), defined in RFC 3501,
specifies a protocol for accessing email messages on a server that
implements a message store from a client. It also includes commands for
manipulating the message store -- creating, deleting, and renaming
mailboxes, adding a message to a mailbox, and copying messages from one
mailbox to another.

Base IMAP as described in RFC 3501 requires that in order to discover
flag changes and expunged messages in a mailbox, the client has to fetch
flags for all messages it knows in the mailbox and compare returned
results with its own state.

This can generate a significant amount of traffic for big mailboxes. The
IMAP CONDSTORE extension (RFC 4551) provides a facility for IMAP clients
to quickly resynchronize mailbox flag changes in a mailbox. The IMAP
QRESYNC extension (RFC 5162) extends CONDSTORE to also cover expunged
messages, and reduces the number of round trips needed to resynchronize
by extending the SELECT/EXAMINE command.

The CONDSTORE and QRESYNC extensions are deployed in both clients and
servers.  These deployments have exposed errors and clarity issues in
the specifications, and they need correcting.  The IMAP QRESYNC
Extension working group has the task of updating CONDSTORE and QRESYNC
extensions on the Standards Track.

The working group might produce one (combined) or two separate documents
(as now) updating these extensions. The working group will review errata
and update the documents as needed to incorporate those, and will
correct significant errors and inconsistencies, but will keep changes at
this stage to a minimum and avoid incompatible changes.

No other IMAP extension work is in scope for this working group.

Milestones:

TBD


Last Call: draft-ietf-oauth-revocation-07.txt (Token Revocation) to Proposed Standard

2013-04-16 Thread The IESG

The IESG has received a request from the Web Authorization Protocol WG
(oauth) to consider the following document:
- 'Token Revocation'
  draft-ietf-oauth-revocation-07.txt as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2013-04-30. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This document proposes an additional endpoint for OAuth authorization
   servers, which allows clients to notify the authorization server that
   a previously obtained refresh or access token is no longer needed.
   This allows the authorization server to cleanup security credentials.
   A revocation request will invalidate the actual token and, if
   applicable, other tokens based on the same authorization grant.



The file can be obtained via
http://datatracker.ietf.org/doc/draft-ietf-oauth-revocation/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-ietf-oauth-revocation/ballot/


No IPR declarations have been submitted directly on this I-D.


The draft has a normative reference to RFC2246 (as well as
5346) as it follows the same approach to TLS as the base
oauth spec. (RFC6749, section 1.2). 




RFC 6912 on Principles for Unicode Code Point Inclusion in Labels in the DNS

2013-04-16 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 6912

Title:  Principles for Unicode Code Point 
Inclusion in Labels in the DNS 
Author: A. Sullivan, D. Thaler,
J. Klensin, O. Kolkman
Status: Informational
Stream: IAB
Date:   April 2013
Mailbox:asulli...@dyn.com, 
dtha...@microsoft.com, 
john-i...@jck.com,
o...@nlnetlabs.nl
Pages:  12
Characters: 27078
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-iab-dns-zone-codepoint-pples-02.txt

URL:http://www.rfc-editor.org/rfc/rfc6912.txt

Internationalized Domain Names in Applications (IDNA) makes available
to DNS zone administrators a very wide range of Unicode code points.
Most operators of zones should probably not permit registration of
U-labels using the entire range.  This is especially true of zones
that accept registrations across organizational boundaries, such as
top-level domains and, most importantly, the root.  It is
unfortunately not possible to generate algorithms to determine
whether permitting a code point presents a low risk.  This memo
presents a set of principles that can be used to guide the decision
of whether a Unicode code point may be wisely included in the
repertoire of permissible code points in a U-label in a zone.

This document is a product of the Internet Architecture Board.


INFORMATIONAL: This memo provides information for the Internet community.
It does not specify an Internet standard of any kind. Distribution of
this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC




Last Call: draft-saintandre-impp-call-info-02.txt (Instant Messaging and Presence Purpose for the Call-Info Header Field in the Session Initiation Protocol (SIP)) to Proposed Standard

2013-04-16 Thread The IESG

The IESG has received a request from an individual submitter to consider
the following document:
- 'Instant Messaging and Presence Purpose for the Call-Info Header Field
   in the Session Initiation Protocol (SIP)'
  draft-saintandre-impp-call-info-02.txt as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2013-05-14. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This document defines and registers a value of impp (instant
   messaging and presence protocol) for the purpose header field
   parameter of the Call-Info header field in the Session Initiation
   Protocol (SIP).




The file can be obtained via
http://datatracker.ietf.org/doc/draft-saintandre-impp-call-info/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-saintandre-impp-call-info/ballot/


No IPR declarations have been submitted directly on this I-D.




IETF Nominations Committee Chair

2013-04-16 Thread Lynn St.Amour
IETF community,

One of the roles you entrusted to the Internet Society (ISOC) President  CEO, 
to be fulfilled through consultation with the IETF community, is the 
appointment of the IETF Nominations Committee chair.  

It gives me great pleasure to announce that Allison Mankin has agreed to serve 
as the 2013 - 2014 IETF Nominations Committee chair.  Allison served a total 10 
years as a TSV AD, most recently 2000-2006.  She currently serves on the 
Transport Directorate and is the liaison to ISO JTC1/SC6.  Allison has 
co-chaired several Working Groups including RMT and Geopriv, and going back 
even further she co-directed the IPng Selection process.

The NomComm process is central to the IETF's success, and it is important that 
it have robust support.  A Call for Nominations for this committee will be sent 
to the IETF Announcement list; and a list of the IESG, IAB and IAOC/IETF Trust 
seats to be filled will be published shortly.   Please give serious 
consideration to volunteering for the Nominations Committee as well as to 
possible candidates for the open positions. 

 In the interim, feel free to make your suggestions known to Allison, who will 
share them with the committee once it is seated.   Allison can be reached at: 
Allison Mankin aman...@verisign.com.

Thank you in advance for your support and a sincere thank you to Allison for 
agreeing to take on this very significant responsibility.

Regards,

Lynn St. Amour

President  CEO, Internet Society (ISOC)

Last Call: draft-housley-rfc2050bis-01.txt (The Internet Numbers Registry System) to Informational RFC

2013-04-16 Thread The IESG

The IESG has received a request from an individual submitter to consider
the following document:
- 'The Internet Numbers Registry System'
  draft-housley-rfc2050bis-01.txt as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
i...@ietf.org mailing lists by 2013-05-14. Exceptionally, comments may be
sent to i...@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   This document provides information about the current Internet Numbers
   Registry System used in the distribution of globally unique Internet
   Protocol (IP) address space and autonomous system (AS) numbers.

   This document also provides information about the processes for
   further evolution of the Internet Numbers Registry System.

   This document replaces RFC 2050.

   This document does not propose any changes to the Internet Numbers
   Registry System.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-housley-rfc2050bis/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-housley-rfc2050bis/ballot/


No IPR declarations have been submitted directly on this I-D.




STD 75, RFC 6891 on Extension Mechanisms for DNS (EDNS(0))

2013-04-16 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.

STD 75
RFC 6891

Title:  Extension Mechanisms for DNS (EDNS(0)) 
Author: J. Damas,
M. Graff,
P. Vixie
Status: Standards Track
Stream: IETF
Date:   April 2013
Mailbox:j...@bondis.org, 
explo...@flame.org, 
vi...@isc.org
Pages:  16
Characters: 32856
Obsoletes:  RFC 2671, RFC 2673
See Also:   STD 75

I-D Tag:draft-ietf-dnsext-rfc2671bis-edns0-10.txt

URL:http://www.rfc-editor.org/rfc/rfc6891.txt

The Domain Name System's wire protocol includes a number of fixed
fields whose range has been or soon will be exhausted and does not
allow requestors to advertise their capabilities to responders.  This
document describes backward-compatible mechanisms for allowing the
protocol to grow.

This document updates the Extension Mechanisms for DNS (EDNS(0))
specification (and obsoletes RFC 2671) based on feedback from
deployment experience in several implementations.  It also obsoletes
RFC 2673 (Binary Labels in the Domain Name System) and adds
considerations on the use of extended labels in the DNS.

This document is a product of the DNS Extensions Working Group of the IETF.

This is now an Internet Standard.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


BCP 42, RFC 6895 on Domain Name System (DNS) IANA Considerations

2013-04-16 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.

BCP 42
RFC 6895

Title:  Domain Name System (DNS) 
IANA Considerations 
Author: D. Eastlake 3rd
Status: Best Current Practice
Stream: IETF
Date:   April 2013
Mailbox:d3e...@gmail.com
Pages:  19
Characters: 38979
Obsoletes:  RFC 6195
Updates:RFC 1183, RFC 2845, RFC 2930, RFC 3597
See Also:   BCP 42

I-D Tag:draft-ietf-dnsext-rfc6195bis-05.txt

URL:http://www.rfc-editor.org/rfc/rfc6895.txt

This document specifies Internet Assigned Numbers Authority (IANA)
parameter assignment considerations for the allocation of Domain Name
System (DNS) resource record types, CLASSes, operation codes, error
codes, DNS protocol message header bits, and AFSDB resource record
subtypes.  It obsoletes RFC 6195 and updates RFCs 1183, 2845, 2930,
and 3597.

This document is a product of the DNS Extensions Working Group of the IETF.


BCP: This document specifies an Internet Best Current Practices for the
Internet Community, and requests discussion and suggestions for 
improvements. Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC