Subject: Deadline Extended! Call for nominations: IETF Liaison to ICANN Board of Directors

2024-07-12 Thread IAB Executive Administrative Manager
On 2024-06-11, the IAB issued a call for nominations for the IETF 
Liaison to the ICANN Board of Directors. The IAB desires to have a 
diverse pool of candidates for the appointments it makes. Since there 
was only a very small pool of accepted nominations for this 
appointment, the IAB has decided to extend the nominations deadline 
until 23:59 UTC on 2024-07-26.

If you are interested in this position, or know of someone who may be a 
good fit for this position, please send the name and email address to 
iab-ch...@iab.org with a copy to ex...@iab.org by 23:59 UTC on 
2024-07-26.

The liaison normally serves a two-year renewable term. The IAB plans to 
name the liaison to serve for the 2024-2026 period by the end of August 
with the seating of the liaison to be completed by ICANN 81 in 
November. Harald Alvestrand has served as the IETF Liaison to the ICANN 
Board of Directors since 2018, and has indicated that he is willing to 
continue in the role.

The ICANN Mission and the role of the Board of Directors are outlined 
in the Board Governance Guidelines [1]:

  The Mission of ICANN is to ensure the stable and secure operation of 
  the Internet's unique identifier systems. The fundamental 
  responsibility of Directors (as defined below) is to exercise their 
  business judgment to act in what they reasonably believe to be the 
  best interests of ICANN and for the benefit of the Internet community 
  as a whole. Actions of the Board should reflect the Board's 
  collective action after taking due reflection.

  It is the duty of the Board to oversee management's performance to 
  ensure that ICANN in accordance with law efficiency and 
  effectiveness, in a fiscally responsible and accountable manner.  The 
  Board is also responsible for overseeing the development of ICANN's 
  Operating Plan and Strategic Plan (each as defined in the Bylaws).

The position for an IETF liaison to the board is non-voting.

The IETF liaison to the ICANN Board is responsible for staying up-to-
date on ICANN operations and developments and informing the IAB and the 
relevant parts of the IETF community of their potential impact on IETF 
work and Internet protocols. The IETF liaison is also responsible for 
informing ICANN of any IETF matters relevant to ICANN. The IAB expects 
the selected person to effectively communicate between the two 
organizations. The IETF liaison must have a sufficient understanding of 
the Internet protocols, DNS, and assigned number management to identify 
where potential problems might occur or where coordination is needed. 
When needed, the liaison should be able to identify and call on experts 
on specific issues on both sides.

The IAB expects the IETF liaison to:

 • be constructive in framing new approaches, technically or in terms 
   of communication.

 • be willing and able to work well with others.

 • understand the role and purpose of the relationship the IETF has 
   with ICANN.

 • be willing and able to commit the time to work in the board, and 
   follow the related discussions.

 • attend and participate in ICANN meetings as well as any additional 
   board meetings. Generally, there are 3 ICANN meetings and 3 board 
   workshops per year. ICANN typically covers travel costs for board 
   members.

 • attend and participate in IETF meetings, particularly the working 
   group meetings relevant to work at ICANN. Generally, there are 3 
   face-to-face IETF meetings per year.

 • abide by all ICANN Board policies, including confidentiality and 
   conflict of interest policies. The IETF liaison should be unlikely 
   to have conflicts of interest related to typical board discussion 
   topics.

The necessary time commitment varies with the extent of work that the 
liaison is interested in taking on within the board, but just the 
travel and meeting time alone can be substantial. Typically, there are 
three ICANN meetings and three additional board meetings per year.

For context, the governance documents for the ICANN board can be found 
here: https://www.icann.org/resources/pages/governance/governance-en

These include, for instance, overall governance guidelines, the ICANN 
bylaws, conflict of interest policies, and travel support:
https://www.icann.org/resources/pages/governance/guidelines-en
https://www.icann.org/resources/pages/governance/bylaws-en
https://www.icann.org/resources/pages/governance/coi-en
https://www.icann.org/resources/pages/revised-procedure-2008-08-11-en

Note that as per Section 7.22.h of the ICANN Bylaws [2], this position 
may be entitled to receive compensation from ICANN for services as a 
non-voting liaison; however, as per the IAB statement on Liaison 
Compensation [3], the IAB generally believes that the guiding principle 
should be that individuals serve without expectation of direct 
compensation from the bodies to which they are appointed, so as to 
avoid any appearance of conflict of interest. As a result, apart from 
reasonable travel expenses, 

RFC 9493 on Subject Identifiers for Security Event Tokens

2023-12-06 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 9493

Title:  Subject Identifiers for Security Event Tokens 
Author: A. Backman, Ed.,
M. Scurtescu,
P. Jain
Status: Standards Track
Stream: IETF
Date:   December 2023
Mailbox:richa...@amazon.com,
marius.scurte...@coinbase.com,
prachi.jain1...@gmail.com
Pages:  18
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-secevent-subject-identifiers-18.txt

URL:https://www.rfc-editor.org/info/rfc9493

DOI:10.17487/RFC9493

Security events communicated within Security Event Tokens may support
a variety of identifiers to identify subjects related to the event.
This specification formalizes the notion of Subject Identifiers as
structured information that describes a subject and named formats
that define the syntax and semantics for encoding Subject Identifiers
as JSON objects.  It also establishes a registry for defining and
allocating names for such formats as well as the JSON Web Token (JWT)
"sub_id" Claim.

This document is a product of the Security Events Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'Subject Identifiers for Security Event Tokens' to Proposed Standard (draft-ietf-secevent-subject-identifiers-18.txt)

2023-06-26 Thread The IESG
The IESG has approved the following document:
- 'Subject Identifiers for Security Event Tokens'
  (draft-ietf-secevent-subject-identifiers-18.txt) as Proposed Standard

This document is the product of the Security Events Working Group.

The IESG contact persons are Paul Wouters and Roman Danyliw.

A URL of this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-secevent-subject-identifiers/





Technical Summary

   Security events communicated within Security Event Tokens may support
   a variety of identifiers to identify subjects related to the event.
   This specification formalizes the notion of subject identifiers as
   structured information that describe a subject, and named formats
   that define the syntax and semantics for encoding subject identifiers
   as JSON objects.  It also defines a registry for defining and
   allocating names for such formats, as well as the sub_id JSON Web
   Token (JWT) claim.

Working Group Summary

There was nothing notable in the WG process beyond the long dormancy this 
document had.

Document Quality

This is a dependency of the GNAP WG, and GNAP participants have been involved 
in the later development stages of this draft.
 
Personnel

- Document Shepherd:  Yaron Sheffer
- Responsible AD: Roman Danyliw

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: (Subject Identifiers for Security Event Tokens) to Proposed Standard

2022-10-27 Thread The IESG


The IESG has received a request from the Security Events WG (secevent) to
consider the following document: - 'Subject Identifiers for Security Event
Tokens'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2022-11-17. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   Security events communicated within Security Event Tokens may support
   a variety of identifiers to identify subjects related to the event.
   This specification formalizes the notion of subject identifiers as
   structured information that describe a subject, and named formats
   that define the syntax and semantics for encoding subject identifiers
   as JSON objects.  It also defines a registry for defining and
   allocating names for such formats, as well as the sub_id JSON Web
   Token (JWT) claim.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-secevent-subject-identifiers/



No IPR declarations have been submitted directly on this I-D.





___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Subject: NomCom 2021-2022: Composition of IETF Nominating Committee

2021-07-18 Thread NomCom Chair 2021
Please welcome NomCom 2021-2022!

The challenge period has ended with no challenges following the update posted 
on July 8, 2021:
https://datatracker.ietf.org/nomcom/ann/326222/

I'd like to thank the following individuals who have prioritized this service 
to the IETF Community.

Voting Members:

  Name   Affiliation
  
  Marc Petit-HugueninImpedance Mismatch LLC
  Christian Huitema  Private Octopus Inc.
  Toerless EckertFuturewei USA
  LucAndré BurdetCisco
  Loganaden Velvindron   cyberstorm.mu
  Martin Thomson Mozilla
  Dhruv DhodyHuawei
  Mary BarnesIndependent
  Shraddha Hegde Juniper Networks
  Chris Box  BT


Non-Voting Members:

  Chair: Gabriel Montenegro
  Past chair: Barbara Stark
  IAB Liaison: Deborah Brungard
  IESG Liaison: Roman Danyliw
  ISOC Board Liaison: Brian Haberman (to be confirmed)
  IETF LLC Liaison: Sean Turner
  IETF Trust Liaison: Stephan Wenger

Details on how we got here are found in Announcements at
https://datatracker.ietf.org/nomcom/ann/#2021

I also wish to inform the community that as of July 12 (last week) my
affiliation is no longer "Independent" as I am now working as a consultant 
for Samsung. Even though affiliation is only tracked for voting members 
(per RFC8713) I am adding this note in the interest of transparency.

Gabriel Montenegro
NomCom Chair 2021-2022
nomcom-chair-2021 at ietf dot org

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 8813 on Clarifications for Elliptic Curve Cryptography Subject Public Key Information

2020-08-12 Thread rfc-editor
A new Request for Comments is now available in online RFC libraries.


RFC 8813

Title:  Clarifications for Elliptic Curve Cryptography 
Subject Public Key Information 
Author: T. Ito,
S. Turner
Status: Standards Track
Stream: IETF
Date:   August 2020
Mailbox:tadahiko.ito.pub...@gmail.com, 
s...@sn3rd.com
Pages:  3
Updates:RFC 5480

I-D Tag:draft-ietf-lamps-5480-ku-clarifications-03.txt

URL:https://www.rfc-editor.org/info/rfc8813

DOI:10.17487/RFC8813

This document updates RFC 5480 to specify semantics for the
keyEncipherment and dataEncipherment key usage bits when used in
certificates that support Elliptic Curve Cryptography.

This document is a product of the Limited Additional Mechanisms for PKIX and 
SMIME Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'Clarifications for Elliptic Curve Cryptogtaphy Subject Public Key Information' to Proposed Standard (draft-ietf-lamps-5480-ku-clarifications-03.txt)

2020-04-28 Thread The IESG
The IESG has approved the following document:
- 'Clarifications for Elliptic Curve Cryptogtaphy Subject Public Key
   Information'
  (draft-ietf-lamps-5480-ku-clarifications-03.txt) as Proposed Standard

This document is the product of the Limited Additional Mechanisms for PKIX
and SMIME Working Group.

The IESG contact persons are Benjamin Kaduk and Roman Danyliw.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-lamps-5480-ku-clarifications/





Technical Summary

This document updates RFC 5480 to specify semantics for the
keyEncipherment and dataEncipherment key usage bits when used
in certificates that support Elliptic Curve Cryptography.

Working Group Summary

There is consensus for this document in the LAMPS WG.

Document Quality

The information in this mail list posting shows that this
guidance is needed:

https://mailarchive.ietf.org/arch/msg/spasm/mSDS2rOYWoX6jb-d9TmXug3OgPo

Personnel

Russ Housley is the document shepherd.
Roman Danyliw is the responsible area director.

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: (Clarifications for Elliptic Curve Cryptogtaphy Subject Public Key Information) to Proposed Standard

2020-02-07 Thread The IESG


The IESG has received a request from the Limited Additional Mechanisms for
PKIX and SMIME WG (lamps) to consider the following document: -
'Clarifications for Elliptic Curve Cryptogtaphy Subject Public Key
   Information'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2020-02-21. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   This document updates RFC 5480 to specify semantics for the
   keyEncipherment and dataEncipherment key usage bits when used in
   certificates that support Elliptic Curve Cryptography.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-lamps-5480-ku-clarifications/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-lamps-5480-ku-clarifications/ballot/


No IPR declarations have been submitted directly on this I-D.




___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Subject: NomCom 2015-2016 Call for Volunteers

2015-05-19 Thread NomCom Chair 2015



DRAFT - points with XX need to be updated!

Subject: NomCom 2015-2016 Call for Volunteers

The IETF nomcom appoints folks to fill the open slots on the IAOC, the IAB,
and the IESG.

Ten voting members for the nomcom are selected in a verifiably random
way from a pool of volunteers. The more volunteers, the better chance we have
of choosing a random yet representative cross section of the IETF population.

The details of the operation of the nomcom can be found in RFC 7437,
and BCP10/RFC3797 details the selection algorithm.

Volunteers must have attended 3 of the past 5 IETF meetings.  As specified in
RFC 7437, that means three out of the five past meetings up to the time this
email announcement goes out to start the solicitation of volunteers.
The five meetings out of which you must have attended *three*
are:

IETF 88 (Vancouver), \
 89 (London),   \
 90 (Toronto), *** ANY THREE!
 91 (Honolulu), /
 92 (Dallas)/

If you qualify, please volunteer.   However, much as we want this, before you
decide to volunteer, please be sure you are willing to forgo appointment
to any of the positions for which this nomcom is responsible.


255 people volunteered by ticking the box on the IETF 92 registration form.
149 of these have been verified as eligible. I will contact all of these 
shortly.
Thank you for volunteering!

The list of people and posts whose terms end with the March 2016 IETF
meeting, and thus the positions for which this nomcom is responsible, are

IAOC:
No terms expire at this time.

IAB:
Mary Barnes
Joe Hildebrand
Ted Hardie
Erik Nordmark
Brian Trammell
Marc Blanchet

IESG:
Alissa Cooper (ART)
Barry Leiba (ART)
Brian Haberman (Internet)
Benoit Claise (Operations and Management)
Alia Atlas (Routing)
Kathleen Moriarty (Security)
Martin Stiemerling (Transport)

The Applications  and Real-Time (ART) area is the expected new area
resulting from the merge of the APP and RAI areas.
All appointments are for 2 years.
The ART and Routing areas have 3 ADs and the General area has 1; all other 
areas have 2 ADs.
Thus, all areas have at least one continuing AD.


The primary activity for this nomcom will begin in July 2015 and should be
completed in January 2016.   The nomcom will have regularly scheduled
conference calls to ensure progress. (We might dogfood WebRTC)
There will be activities to collect requirements from the community, review
candidate questionnaires, review feedback from community members about
candidates, and talk to candidates.

Thus, being a nomcom member does require some time commitment; but it is also
a very rewarding experience.

It is very important that you be able to attend IETF94 (Yokohama) to conduct 
interviews.
Being at IETF93 (Prague) is useful for orientation.  Being at IETF95 is not 
essential.

Please volunteer by sending me an email before 11:59 pm CET (UTC +2 hours)
June 22, 2015, as follows:

To: nomcom-chair-2...@ietf.org
Subject: Nomcom 2015-16 Volunteer

Please include the following information in the email body:

Your Full Name: __
// as you write it on the IETF registration form
Current Primary Affiliation:
// Typically what goes in the Company field
// in the IETF Registration Form
Emails: ___
   // All email addresses used to register for the past 5 IETF meetings
   // Preferred email address first
Telephone: ___
// For confirmation if selected

You should expect an email response from me within 3 business days stating
whether or not you are qualified.  If you don't receive this response,
please re-send your email with the tag RESEND added to the subject line.

If you are not yet sure if you would like to volunteer, please consider
that nomcom members play a very important role in shaping the leadership
of the IETF.  Questions by email or voice are welcome.
Volunteering for the nomcom is a great way to contribute to the IETF!

You can find a detailed timeline on the nomcom web site at:
https://datatracker.ietf.org/nomcom/2015/

I will be publishing a more detailed target timetable, as well as details
of the randomness seeds to be used for the RFC 3797 selection process,
within the next couple weeks.

Thank you!
Harald Alvestrand
hta+nom...@alvestrand.no
nomcom-chair-2...@ietf.org




SUBJECT: UPDATED I2RS Working Group Interim Meeting April 22-23, 2013

2013-04-01 Thread IESG Secretary
A note from the I2RS Chairs regarding the Interim Meeting being held 
April 22-23, 2013 in Sunnyvale, CA:

  We've put up a registration page for the I2RS interim meeting at:

  http://i2rs-interim.eventbrite.com

  You must register in order to be able to attend.  The cut off date for 
  registration will be on April 17, 2013.

  Cheers all, and hope to see you there.

  best,
-Ed and Alia

On Mar 25, 2013, at 5:30 AM, IESG Secretary wrote:

 I2RS WG Interim Details
 
 Dates/Times: 22-23 April 2013 (9:00 am - 5:00 pm PDT)
 
 Location: Mountainview or Sunnyvale, California (hosted by Google or 
 Juniper)
 
 Registration: For planning purposes only.
 
 Remote Participation: via Webex
 
 Please see the I2RS mailing list for further details and agenda.


Subject: New Non-WG Mailing List: coma -- Management of Constrained Networks and Devices

2012-05-16 Thread IETF Secretariat

A new IETF non-working group email list has been created. 

List address: c...@ietf.org 
Archive:  http://www.ietf.org/mail-archive/web/coma/ 
To subscribe:  https://www.ietf.org/mailman/listinfo/coma 

Purpose: This list is for the discussion related to the management of 
constrained networks and devices. The IETF so far has not developed specific 
technologies for the management of constrained networks. There is a need to
understand the requirements for the management of such a constrained
network and its devices. 

For additional information, please contact the list administrators.


RFC 6495 on Subject Key Identifier (SKI) SEcure Neighbor Discovery (SEND) Name Type Fields

2012-02-03 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 6495

Title:  Subject Key Identifier (SKI) SEcure 
Neighbor Discovery (SEND) Name Type Fields 
Author: R. Gagliano, S. Krishnan,
A. Kukec
Status: Standards Track
Stream: IETF
Date:   February 2012
Mailbox:rogag...@cisco.com, 
suresh.krish...@ericsson.com, 
ana.ku...@enterprisearchitects.com
Pages:  5
Characters: 10575
Updates:RFC3971

I-D Tag:draft-ietf-csi-send-name-type-registry-06.txt

URL:http://www.rfc-editor.org/rfc/rfc6495.txt

SEcure Neighbor Discovery (SEND) defines the Name Type field in the
ICMPv6 Trust Anchor option.  This document specifies new Name Type
fields based on certificate Subject Key Identifiers (SKIs).  
[STANDARDS-TRACK]

This document is a product of the Cga  Send maIntenance Working Group of the 
IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


[no subject]

2010-09-27 Thread The IESG
rfc-...@rfc-editor.org
Subject: Re: Experimental RFC to be: draft-dzis-nwg-nttdm-04.txt

The IESG has no problem with the publication of 'The Network Trouble
Ticket Data Model' draft-dzis-nwg-nttdm-04.txt as an Experimental RFC.

The IESG would also like the RFC-Editor to review the comments in 
the datatracker 
(https://datatracker.ietf.org/public/pidtracker.cgi?command=view_iddTag=18533rfc_flag=0)
related to this document and determine whether or not they merit 
incorporation into the document. Comments may exist in both the ballot 
and the comment log. 

The IESG contact person is Peter Saint-Andre.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-dzis-nwg-nttdm-04.txt


The process for such documents is described at
http://www.rfc-editor.org/indsubs.html.

Thank you,

The IESG Secretary

Technical Summary

   This document defines an experimental XML format for communication
   of trouble tickets among network operation centers (NOCs).  This 
   format enables NOCs to automate the collection, communication,
   and synchronization of trouble tickets across multiple interconnected
   networks, such as those forming the Grid.  The model was 
   defined and used as part of the networking support activity of 
   the EGEE project (Enabling Grids for E-sciencE).

Working Group Summary

   This document is an independent submission and is not the product
   of (nor has it been reviewed by) any IETF working group.

Document Quality

   The document appears to accurately document the experimental XML 
   format in use.

Personnel

   The responsible Area Director is Peter Saint-Andre.

RFC Editor Note

   This specification documents an XML format that solves a problem
   similar to those addressed by the INCH and MARF working groups.
   However, the format serves a somewhat different purpose and thus
   the IESG has concluded that there is no conflict between this 
   document and IETF work.

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'Subject Key Identifier (SKI) SEND Name Type fields.' to Proposed Standard

2010-06-04 Thread The IESG
The IESG has approved the following document:

- 'Subject Key Identifier (SKI) SEND Name Type fields. '
   draft-ietf-csi-send-name-type-registry-06.txt as a Proposed Standard


This document is the product of the Cga  Send maIntenance Working Group. 

The IESG contact persons are Ralph Droms and Jari Arkko.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-csi-send-name-type-registry-06.txt

Technical Summary

   SEcure Neighbor Discovery (SEND) defines the Name Type field in the
   Trust Anchor option. This document requests to IANA the creation
   and management of a registry for this field. This document also
   specifies a new Name Type field based on a certificate Subject Key
   Identifier (SKI). Working Group Summary 

Working Group Summary

   Nothing special that worth noting. Not a controversial document. 

Document Quality

   The document is the creation of a registry that was missing on
   RFC3971. The need for it was identified as part of the work on SEND
   cert profiles. 

Personnel

Marcelo Bagnulo (marc...@it.uc3m.es) is the document shepherd.   
Ralph Droms (rdroms.i...@gmail.com) is the responsible AD.

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 5480 on Elliptic Curve Cryptography Subject Public Key Information

2009-03-10 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 5480

Title:  Elliptic Curve Cryptography Subject Public 
Key Information 
Author: S. Turner, D. Brown,
K. Yiu, R. Housley,
T. Polk
Status: Standards Track
Date:   March 2009
Mailbox:turn...@ieca.com, 
kelv...@microsoft.com, 
dbr...@certicom.com,
hous...@vigilsec.com, 
wp...@nist.gov
Pages:  20
Characters: 36209
Updates:RFC3279

I-D Tag:draft-ietf-pkix-ecc-subpubkeyinfo-11.txt

URL:http://www.rfc-editor.org/rfc/rfc5480.txt

This document specifies the syntax and semantics for the Subject
Public Key Information field in certificates that support Elliptic
Curve Cryptography.  This document updates Sections 2.3.5 and 5, and
the ASN.1 module of Algorithms and Identifiers for the Internet X.509
Public Key Infrastructure Certificate and Certificate Revocation List
(CRL) Profile, RFC 3279.  [STANDARDS TRACK]

This document is a product of the Public-Key Infrastructure (X.509) Working 
Group of the IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Internet
Official Protocol Standards (STD 1) for the standardization state and
status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  http://www.ietf.org/mailman/listinfo/ietf-announce
  http://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see http://www.rfc-editor.org/rfcsearch.html.
For downloading RFCs, see http://www.rfc-editor.org/rfc.html.

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-edi...@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
USC/Information Sciences Institute


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: draft-ietf-pkix-ecc-subpubkeyinfo (Elliptic Curve Cryptography Subject Public Key Information) to Proposed Standard

2008-11-25 Thread The IESG
The IESG has received a request from the Public-Key Infrastructure 
(X.509) WG (pkix) to consider the following document:

- 'Elliptic Curve Cryptography Subject Public Key Information '
   draft-ietf-pkix-ecc-subpubkeyinfo-10.txt as a Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send substantive comments to the
[EMAIL PROTECTED] mailing lists by 2008-12-09. Exceptionally, 
comments may be sent to [EMAIL PROTECTED] instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-pkix-ecc-subpubkeyinfo-10.txt


IESG discussion can be tracked via
https://datatracker.ietf.org/public/pidtracker.cgi?command=view_iddTag=16782rfc_flag=0

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Subject: interim meeting on the topic of ipv4-ipv6 co-existence

2008-08-29 Thread IESG Secretary
An interim meeting will be organized on October 1 - 2 in Montreal,
Canada to continue discussions about the IPv4 and IPv6 co-existence,
NAT-PT replacement, and new tunneling or translation solutions to
address needs in this space. This is a meeting that affects work
happening in a number of WGs (SOFTWIRE, V6OPS, BEHAVE, INTAREA).

A wiki page containing more information about the meeting has been
set up at http://trac.tools.ietf.org/area/int/trac/wiki/v4v6interim

We are currently working to provide hotel recommendations and other
details.
___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


[no subject]

2008-02-27 Thread The IESG
draft-klensin-rfc2821bis (Simple Mail Transfer 
 Protocol) to Draft Standard 
Reply-to: [EMAIL PROTECTED]

The IESG has received a request from an individual submitter to consider
the following document:

- 'Simple Mail Transfer Protocol '
   draft-klensin-rfc2821bis-08.txt as a Draft Standard

Because of the comments received in the Last Call on the -06 version, we
request a *limited* Last Call on the -08 version.


A diff between -08 and the IETF Last Call version -06 can be
seen by using:

http://tools.ietf.org/rfcdiff?difftype=--hwdiffurl1=http://tools.ietf.org/id/draft-klensin-rfc2821bis-06.txturl2=http://tools.ietf.org/id/draft-klensin-rfc2821bis-08.txt
or
http://tools.ietf.org/rfcdiff?url1=http://tools.ietf.org/id/draft-klensin-rfc2821bis-06.txturl2=http://tools.ietf.org/id/draft-klensin-rfc2821bis-08.txt


The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. But please limit your comments to areas
that have been discussed since the last call was issued for -06. Almost
all of the issues that were raised have been dealt with in some fashion
within -07 and -08. New topics should be avoided.

Please send substantive comments to the
[EMAIL PROTECTED] mailing lists by 2008-03-14. Exceptionally, 
comments may be sent to [EMAIL PROTECTED] instead. In either case, please 
retain the beginning of the Subject line to allow automated sorting.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-klensin-rfc2821bis-08.txt

Implementation Report can be accessed at
http://www.ietf.org/IESG/implementation.html


IESG discussion can be tracked via
https://datatracker.ietf.org/public/pidtracker.cgi?command=view_iddTag=13354rfc_flag=0

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


RFC 4985 on Internet X.509 Public Key Infrastructure Subject Alternative Name for Expression of Service Name

2007-08-29 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 4985

Title:  Internet X.509 Public Key Infrastructure 
Subject Alternative Name for Expression of 
Service Name 
Author: S. Santesson
Status: Standards Track
Date:   August 2007
Mailbox:[EMAIL PROTECTED]
Pages:  10
Characters: 17868
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-pkix-srvsan-05.txt

URL:http://www.rfc-editor.org/rfc/rfc4985.txt

This document defines a new name form for inclusion in the otherName
field of an X.509 Subject Alternative Name extension that allows a
certificate subject to be associated with the service name and domain
name components of a DNS Service Resource Record.  [STANDARDS TRACK]

This document is a product of the Public-Key Infrastructure (X.509)
Working Group of the IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and suggestions
for improvements.Please refer to the current edition of the Internet
 Official Protocol Standards (STD 1) for the standardization state and
 status of this protocol.  Distribution of this memo is unlimited.

This announcement is sent to the IETF list and the RFC-DIST list.
Requests to be added to or deleted from the IETF distribution list
should be sent to [EMAIL PROTECTED]  Requests to be
added to or deleted from the RFC-DIST distribution list should
be sent to [EMAIL PROTECTED]

Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
an EMAIL message to [EMAIL PROTECTED] with the message body 

help: ways_to_get_rfcs. For example:

To: [EMAIL PROTECTED]
Subject: getting rfcs

help: ways_to_get_rfcs

Requests for special distribution should be addressed to either the
author of the RFC in question, or to [EMAIL PROTECTED]  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.

Submissions for Requests for Comments should be sent to
[EMAIL PROTECTED]  Please consult RFC 2223, Instructions to RFC
Authors, for further information.


The RFC Editor Team
USC/Information Sciences Institute

...



___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'Internet X.509 Public Key Infrastructure Subject Alternative Name for expression of service name' to Proposed Standard

2007-05-30 Thread The IESG
The IESG has approved the following document:

- 'Internet X.509 Public Key Infrastructure Subject Alternative Name for 
   expression of service name '
   draft-ietf-pkix-srvsan-05.txt as a Proposed Standard

This document is the product of the Public-Key Infrastructure (X.509) 
Working Group. 

The IESG contact persons are Tim Polk and Sam Hartman.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-pkix-srvsan-05.txt

Technical Summary

  This document specifies how to use the existing X.509 certificate
  Subject Alternative Name extension (with the otherName syntax) to
  carry a reference to a DNS SRV record.  The intent is to link a
  certificate to the service named in the DNS record.

  The document notes that the problem being solved here is not the
  typical server authentication problem.  Instead, an authorization
  problem is being solved.  The question being answered here is whether
  the server that holds the private key is authorized to provide a
  particular service.  This mechanism fills a gap that otherwise would
  exist if the server is provisioned with typical server certificate
  that attests just to the name of the server.  A server holding a
  certificate with this extension has been certified by the issuer of
  the certificate to offer the service expressed in the corresponding
  SRV RR record.  The cited example in the document is that of a
  Kerberos server (e.g., a KDC).

  When DNSSEC is fully deployed, this extension may not be needed, as
  signed DNS records (SRV RR and others) should be able to provide the
  same form of authentic authorization information.  (This extension
  does not represent competition with DNSSEC as the only binding
  provided is to SRV RR records, a subset of overall DNSSEC
  functionality.)

Working Group Summary

  The PKIX WG expressed consensus to advance the draft to Proposed
  Standard.

Protocol Quality

  This document was reviewed by Russ Housley for the IESG.


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


RFC 4683 on Internet X.509 Public Key Infrastructure Subject Identification Method (SIM)

2006-10-05 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 4683

Title:  Internet X.509 Public Key Infrastructure 
Subject Identification Method (SIM) 
Author: J. Park, J. Lee,
H.. Lee, S. Park,
T. Polk
Status: Standards Track
Date:   October 2006
Mailbox:[EMAIL PROTECTED], 
[EMAIL PROTECTED], 
[EMAIL PROTECTED], [EMAIL PROTECTED], 
[EMAIL PROTECTED]
Pages:  20
Characters: 41285
Updates/Obsoletes/SeeAlso:   None

I-D Tag:draft-ietf-pkix-sim-08.txt

URL:http://www.rfc-editor.org/rfc/rfc4683.txt

This document defines the Subject Identification Method (SIM) for
including a privacy-sensitive identifier in the subjectAltName
extension of a certificate.

The SIM is an optional feature that may be used by relying parties to
determine whether the subject of a particular certificate is also the
person corresponding to a particular sensitive identifier.  [STANDARDS 
TRACK]

This document is a product of the Public-Key Infrastructure (X.509)
Working Group of the IETF.

This is now a Proposed Standard Protocol.

STANDARDS TRACK: This document specifies an Internet standards track
protocol for the Internet community,and requests discussion and 
suggestions for improvements.Please refer to the current edition of the 
Internet Official Protocol Standards (STD 1) for the standardization 
state and status of this protocol.  Distribution of this memo is 
unlimited.

This announcement is sent to the IETF list and the RFC-DIST list.
Requests to be added to or deleted from the IETF distribution list
should be sent to [EMAIL PROTECTED]  Requests to be
added to or deleted from the RFC-DIST distribution list should
be sent to [EMAIL PROTECTED]

Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
an EMAIL message to [EMAIL PROTECTED] with the message body 

help: ways_to_get_rfcs. For example:

To: [EMAIL PROTECTED]
Subject: getting rfcs

help: ways_to_get_rfcs

Requests for special distribution should be addressed to either the
author of the RFC in question, or to [EMAIL PROTECTED]  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.

Submissions for Requests for Comments should be sent to
[EMAIL PROTECTED]  Please consult RFC 2223, Instructions to RFC
Authors, for further information.


Joyce K. Reynolds and Sandy Ginoza
USC/Information Sciences Institute

...



___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Protocol Action: 'Internet X.509 Public Key Infrastructure Subject Identification Method (SIM)' to Proposed Standard

2006-07-20 Thread The IESG
The IESG has approved the following document:

- 'Internet X.509 Public Key Infrastructure Subject Identification Method (SIM) 
'
   draft-ietf-pkix-sim-08.txt as a Proposed Standard

This document is the product of the Public-Key Infrastructure (X.509) Working 
Group. 

The IESG contact persons are Russ Housley and Sam Hartman.

A URL of this Internet-Draft is:
http://www.ietf.org/internet-drafts/draft-ietf-pkix-sim-08.txt

Technical Summary

  To distinguish among multiple individuals with the same name, it may
  be necessary to include in a certificate some personal data that may
  be considered sensitive.  Examples of such personal ID data are U.S.
  social security numbers and similar national ID numbers in other
  countries.  A certificate subject may be willing to disclose this data
  to some relying parties (RPs), but not to everyone who may have access
  to his/her certificate.  Recall that certificates are often passed
  over the Internet without encryption, stored in repositories that may
  allow public access, and so on.  Thus a wide range of possible
  adversaries will have an opportunity to conduct offline attacks that
  seek to reveal sensitive ID data if it is part of a certificate.

  SIM is a technique for managing this problem of selective disclosure
  of such sensitive (though not secret) ID data in the context of X.509
  certificates.  The SIM data is carried as a subject alternative name
  (SAN) using the Privacy-Enhanced Personal Identifier (PEPSI) format,
  also defined in this document.  Because this data is carried in the
  SAN, the subject name must itself be unique without the further
  qualification provided by this other data, consistent with X.509 and
  PKIX certificate requirements.

  The PEPSI value is the result of applying a two-pass hash function to
  the SIM data, employing a user-supplied password and a Registration
  Authority supplied random number.  An attacker trying to confirm a
  guessed SIM value cannot employ a pre-computed dictionary attack, due
  to the use of the random number.  Nonetheless, selection of a poor
  password by a user does allow an attacker to mount a focused, offline
  guessing attack on a PEPSI value.

  Three scenarios for use of SIM are described:
  
-  If a relying party knows the user's SIM value, and uses
   it to uniquely identify the user, the RP can confirm the
   user's identify through processing of the certificate and
   user disclosure of the password to the RP via a secure
   channel.

-  If the RP does not know the SIM value, it can be disclosed
   to the RP via secure transfer of the password, and processing
   of the certificate by the RP, e.g., so that the RP can
   acquire the SIM value for future use.

-  Finally, knowledge of the password by the user can be
   employed as a secondary authentication mechanism, in
   addition to the user's knowledge of his private key,
   without exposing the SIM data to an RP.
 
Working Group Summary
 
  The PKIX working group expressed consensus to advance the document to
  Proposed Standard.
 
Protocol Quality
 
  This document has been reviewed by PKIX working group and by the PKIX
  working group chairs.

  This document was reviewed by Russ Housley for the IESG.

Note to RFC Editor

  Please expand the first use of RA.

  OLD:

   R  The random number value generated by an RA.

  NEW:

   R  The random number value generated by a Registration
  Authority (RA).


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Last Call: 'Internet X.509 Public Key Infrastructure Subject Identification Method (SIM)' to Proposed Standard

2006-03-06 Thread The IESG
The IESG has received a request from the Public-Key Infrastructure (X.509) WG 
to consider the following document:

- 'Internet X.509 Public Key Infrastructure Subject Identification Method
(SIM)'
   draft-ietf-pkix-sim-07.txt as a Proposed Standard

To distinguish among multiple individuals with the same name, it may
be necessary to include in a certificate some personal data that may
be considered sensitive.  Examples of such personal ID data are U.S.
social security numbers and similar national ID numbers in other
countries.  A certificate subject may be willing to disclose this data
to some relying parties (RPs), but not to everyone who may have access
to his/her certificate.  Recall that certificates are often passed
over the Internet without encryption, stored in repositories that may
allow public access, and so on.  Thus a wide range of possible
adversaries will have an opportunity to conduct offline attacks that
seek to reveal sensitive ID data if it is part of a certificate.

SIM is a technique for managing this problem of selective disclosure
of such sensitive (though not secret) ID data in the context of X.509
certificates.  The SIM data is carried as a subject alternative name
(SAN) using the Privacy-Enhanced Personal Identifier (PEPSI) format,
also defined in this document.  Because this data is carried in the
SAN, the subject name must itself be unique without the further
qualification provided by this other data, consistent with X.509 and
PKIX certificate requirements.

The PEPSI value is the result of applying a two-pass hash function to
the SIM data, employing a user-supplied password and a Registration
Authority supplied random number.  An attacker trying to confirm a
guessed SIM value cannot employ a pre-computed dictionary attack, due
to the use of the random number.  Nonetheless, selection of a poor
password by a user does allow an attacker to mount a focused, offline
guessing attack on a PEPSI value.

Three scenarios for use of SIM are described:
  
-  If a relying party knows the user's SIM value, and uses
   it to uniquely identify the user, the RP can confirm the
   user's identify through processing of the certificate and
   user disclosure of the password to the RP via a secure
   channel.

-  If the RP does not know the SIM value, it can be disclosed
   to the RP via secure transfer of the password, and processing
   of the certificate by the RP, e.g., so that the RP can
   acquire the SIM value for future use.

-  Finally, knowledge of the password by the user can be
   employed as a secondary authentication mechanism, in
   addition to the user's knowledge of his private key,
   without exposing the SIM data to an RP.

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send any comments to the
iesg@ietf.org or ietf@ietf.org mailing lists by 2006-03-20.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-ietf-pkix-sim-07.txt


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Subject: IETF Last Call under RFC 3683 concerning Dean Anderson (reissued)

2005-10-18 Thread David Kessens
[NOTE:
It has come to the attention of the IESG that the original Last Call
message was posted to the IETF announcements mail list while RFC 3683
specifies that it should have been posted to the general IETF discussion list.

To correct for this oversight, this Last Call message is reissued with a new
expiry date and posted to the correct mail list as prescribed by RFC 3683.]
---
The IESG received a request from Dave Crocker to take action under RFC
3683 against Dean Anderson. Mr Crocker alleged disruption of the IETF
and DNSEXT lists and provided sample emails [4]. In addition, Dean
Anderson was recently warned by David Kessens [2], Operations 
Management Area Director, that a recent posting on the DNSOP working
group mail list was not acceptable after which he responded to the
DNSOP list by sending a brief message but with a similar accusation as
the one he was warned not to repeat.

While these messages alone might not suffice to justify action, Mr
Anderson has repeatedly posted, before and since, on these and other
IETF lists, messages that refer offensively to individuals or
organizations [1]. For a small sample of such messages, we refer to
the urls provided at the bottom of this Last Call message.

Many of them are off topic for the IETF, since the IETF can only
produce general technical recommendations for operators; it may not
criticise individual operators or tell them how to conduct their
business. We wish to make it clear that quarrels and disagreements
between software suppliers, operators and the like have no place in
the IETF and must be discussed and settled elsewhere.

Although sometimes Mr Anderson's messages address technical topics,
this is not enough to excuse the frequent offensiveness. He has been
warned to desist from offensive postings multiple times and has often
ignored such warnings [2,3].

The IESG therefore proposes to ban Dean Anderson from posting to the
main IETF list and to authorize all WG chairs to ban him from posting
to their working group lists. This message calls for comments on this
proposed action from the IETF, which should be sent to iesg@ietf.org
(or ietf@ietf.org) by 12 November 2005.

For the IESG,

David Kessens
Operations  Management Area Director
---

Please see below for a sample of abusive behavior on maillists:

[1] Personal attack on Bill Strahm and alleges that Rob Austein
defames av8 Internet:

http://www1.ietf.org/mail-archive/web/ietf/current/msg37889.html

IETF management is accused of harassment and it is stated that
Stephen Sprunk is untrustworthy (end of message). In addition, the
message implies that David Kessens is the responsible Area
Director for dnsext, while this working group is part of the INT area:

http://www1.ietf.org/mail-archive/web/ietf/current/msg37931.html

Dean uses a very unpleasant tone to make it clear to David Kessens
that he doesn't agree with him and adds another attack by twisting
Steven Bellovin's own words and smearing Steven Bellovin's
reputation:

http://www1.ietf.org/mail-archive/web/ietf/current/msg37873.html

(Dean apperently referred to:
http://www1.ietf.org/mail-archive/web/ietf/current/msg37557.html)

Please see below for a sample of messages that ignore requests to Dean
Anderson to stop his disruptive behavior:

[2] Example of an attack on a well known organization on the dnsop list:

Dean Anderson attacks a well known root name server operator and
talks about uncontrolled corruption in the IETF:

http://darkwing.uoregon.edu/~llynch/dnsop/msg03551.html

Message by David Kessens to Dean Anderson that warns him not to
bring up any issues he apparently has with a well known root name
server operator:

http://darkwing.uoregon.edu/~llynch/dnsop/msg03552.html

Dean's response in which he reaffirms his accusations towards the
well known root name server operator:

http://darkwing.uoregon.edu/~llynch/dnsop/msg03553.html

[3] Dean alleges that some IETF participants are liars
http://www1.ietf.org/mail-archive/web/ietf/current/msg36027.html

Brian Carpenter warns not to continue allegations about liars
http://www1.ietf.org/mail-archive/web/ietf/current/msg36034.html

Dean continues discussion on the list
http://www1.ietf.org/mail-archive/web/ietf/current/msg36087.html

[4] Materials provided by Dave Crocker to support his request (IETF and
dnsext list):

Dean continues to discuss topic that was declared off-topic by
working group chair:

http://www1.ietf.org/mail-archive/web/ietf/current/msg37550.html

Dave's response on part of Dean's mail:

http://www1.ietf.org/mail-archive/web/ietf/current/msg37554.html

Two messages by other participants who continue to discuss Dean's
point:

http://www1.ietf.org/mail-archive/web/ietf/current/msg37555.html
http://www1.ietf.org/mail-archive/web/ietf/current/msg37557.html

Personal attack on Dave Crocker (and attack on Paul Vixie) by
Dean. In addition his message does not substantiate his earlier
claims about 

RFC 4096 on Policy-Mandated Labels Such as Adv: in Email Subject Headers Considered Ineffective At Best

2005-05-27 Thread rfc-editor

A new Request for Comments is now available in online RFC libraries.


RFC 4096

Title:  Policy-Mandated Labels Such as Adv: in Email
Subject Headers Considered Ineffective At Best
Author(s):  C. Malamud
Status: Informational
Date:   May 2005
Mailbox:[EMAIL PROTECTED]
Pages:  14
Characters: 31618
Updates/Obsoletes/SeeAlso:None

I-D Tag:draft-draft-malamud-subject-line-05.txt

URL:ftp://ftp.rfc-editor.org/in-notes/rfc4096.txt


This memo discusses policies that require certain labels to be
inserted in the Subject: header of a mail message.  Such policies
are difficult to specify accurately while remaining compliant with
key RFCs and are likely to be ineffective at best.  This memo
discusses an alternate, standards-compliant approach that is
significantly simpler to specify and is somewhat less likely to be
ineffective.

This memo provides information for the Internet community.  It does
not specify an Internet standard of any kind.  Distribution of this
memo is unlimited.

This announcement is sent to the IETF list and the RFC-DIST list.
Requests to be added to or deleted from the IETF distribution list
should be sent to [EMAIL PROTECTED]  Requests to be
added to or deleted from the RFC-DIST distribution list should
be sent to [EMAIL PROTECTED]

Details on obtaining RFCs via FTP or EMAIL may be obtained by sending
an EMAIL message to [EMAIL PROTECTED] with the message body 
help: ways_to_get_rfcs.  For example:

To: [EMAIL PROTECTED]
Subject: getting rfcs

help: ways_to_get_rfcs

Requests for special distribution should be addressed to either the
author of the RFC in question, or to [EMAIL PROTECTED]  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.

Submissions for Requests for Comments should be sent to
[EMAIL PROTECTED]  Please consult RFC 2223, Instructions to RFC
Authors, for further information.


Joyce K. Reynolds and Sandy Ginoza
USC/Information Sciences Institute

...

Below is the data which will enable a MIME compliant Mail Reader 
implementation to automatically retrieve the ASCII version
of the RFCs.
ftp://ftp.isi.edu/in-notes/rfc4096.txt

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Document Action: 'Policy-Mandated Labels Such as Adv: in Email Subject Headers Considered Ineffective At Best' to Informational RFC

2005-04-06 Thread The IESG
The IESG has approved the following document:

- 'Policy-Mandated Labels Such as Adv: in Email Subject Headers Considered 
   Ineffective At Best '
   draft-malamud-subject-line-05.txt as an Informational RFC

This document has been reviewed in the IETF but is not the product of an
IETF Working Group. 

The IESG contact person is Scott Hollenbeck.

Technical Summary
 
This memo discusses policies that require certain labels to be
inserted in the Subject: header of a mail message.  Such policies
are difficult to specify accurately while remaining compliant with
key RFCs and are likely to be ineffective at best.  This memo
discusses an alternate, standards-compliant approach that is
significantly simpler to specify and is somewhat less likely to be
ineffective.

 
Working Group Summary
 
This document is the work of an individual submitter.  It has not
been reviewed by an IETF working group.
 
Protocol Quality
 
Scott Hollenbeck has reviewed this document for the IESG.


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce


Last Call: 'Labels in Subject Headers Considered Ineffective At Best' to Informational RFC

2005-02-23 Thread The IESG
The IESG has received a request from an individual submitter to consider the 
following document:

- 'Labels in Subject Headers Considered Ineffective At Best '
   draft-malamud-subject-line-02.txt as an Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action.  Please send any comments to the
iesg@ietf.org or ietf@ietf.org mailing lists by 2005-03-22.

The file can be obtained via
http://www.ietf.org/internet-drafts/draft-malamud-subject-line-02.txt


___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www1.ietf.org/mailman/listinfo/ietf-announce