COSE (CBOR Object Signing and Encryption) Receipts
draft-ietf-cose-merkle-tree-proofs-17
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2025-09-23
|
17 | (System) | RFC Editor state changed to EDIT from AUTH |
2025-09-16
|
17 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2025-09-15
|
17 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2025-09-15
|
17 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2025-09-12
|
17 | (System) | IANA Action state changed to Waiting on Authors |
2025-09-11
|
17 | (System) | RFC Editor state changed to AUTH from EDIT |
2025-09-11
|
17 | (System) | RFC Editor state changed to EDIT |
2025-09-11
|
17 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
2025-09-11
|
17 | (System) | Announcement was received by RFC Editor |
2025-09-10
|
17 | Morgan Condie | Downref to RFC 9162 approved by Last Call for draft-ietf-cose-merkle-tree-proofs-17 |
2025-09-10
|
17 | (System) | Removed all action holders (IESG state changed) |
2025-09-10
|
17 | Morgan Condie | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
2025-09-10
|
17 | Morgan Condie | IESG has approved the document |
2025-09-10
|
17 | Morgan Condie | Closed "Approve" ballot |
2025-09-10
|
17 | Morgan Condie | Ballot approval text was generated |
2025-09-10
|
17 | Paul Wouters | The document is ready to proceed |
2025-09-10
|
17 | Paul Wouters | IESG state changed to Approved-announcement to be sent from Approved-announcement to be sent::AD Followup |
2025-09-10
|
17 | Henk Birkholz | New version available: draft-ietf-cose-merkle-tree-proofs-17.txt |
2025-09-10
|
17 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
2025-09-10
|
17 | Henk Birkholz | Uploaded new revision |
2025-09-02
|
16 | Henk Birkholz | New version available: draft-ietf-cose-merkle-tree-proofs-16.txt |
2025-09-02
|
16 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
2025-09-02
|
16 | Henk Birkholz | Uploaded new revision |
2025-08-07
|
15 | Cindy Morgan | IESG state changed to Approved-announcement to be sent::AD Followup from IESG Evaluation |
2025-08-07
|
15 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
2025-08-07
|
15 | Cedric Fournet | New version available: draft-ietf-cose-merkle-tree-proofs-15.txt |
2025-08-07
|
15 | Cedric Fournet | New version accepted (logged-in submitter: Cedric Fournet) |
2025-08-07
|
15 | Cedric Fournet | Uploaded new revision |
2025-08-05
|
14 | Amanda Baber | IANA Review state changed to IANA OK - Actions Needed from Version Changed - Review Needed |
2025-08-05
|
14 | Andy Newton | [Ballot Position Update] New position, No Objection, has been recorded for Andy Newton |
2025-08-05
|
14 | Orie Steele | [Ballot Position Update] New position, Recuse, has been recorded for Orie Steele |
2025-08-04
|
14 | Mike Bishop | [Ballot comment] In Section 2, I don't understand the "introduces a new Section..." language. This reads as if updating an existing RFC to add new … [Ballot comment] In Section 2, I don't understand the "introduces a new Section..." language. This reads as if updating an existing RFC to add new sections to it, but the links are to sections in this document. Those sections establish new registries; should this say "a new registry (see Section ...) that contains..."? The notation used in Section 4.1 ("EC2 keys (1: 2)") probably warrants a bit more explanation. By parallel with the "(TBD_1 : 1)" below, I presume that it should be read "When COSE header parameter 1 is set to the value 2..."? Section 5.2.1 appears to contain guidance to future VDS definitions, but Section 5 is intended to be a definition of one specific VDS as well as an exemplar of how to do such a definition. That guidance might be better placed elsewhere and let Section 5 focus on this specific VDS. Note also that the recommended behavior (making payloads detatched) is then carried out a few paragraphs later along with a duplicative explanation of why that needs to be done. As Ralph Merkle (inventor of the Merkle tree) is a person, "Merkle" should be capitalized throughout. ===NITS FOLLOW=== Section 1, "proves" => "proofs"? Section 4.2, "merkle tree based" => "Merkle-tree-based" Section 4.3, "this Receipts" should probably be "these Receipts" or simply "Receipts" Section 4.3, "verifiable data structure specific" => "verifiable-data-structure-specific" Section 4.3.1, "an IANA registration must be made for each individually supported algorithm" => "a separate IANA registration must be made for each supported algorithm" |
2025-08-04
|
14 | Mike Bishop | [Ballot Position Update] New position, No Objection, has been recorded for Mike Bishop |
2025-08-03
|
14 | Gorry Fairhurst | [Ballot comment] I have no transport-related observations. Please consider the following comments when revising this document: --- Introduction: COSE Receipts can include proves that … [Ballot comment] I have no transport-related observations. Please consider the following comments when revising this document: --- Introduction: COSE Receipts can include proves that a document is in a database (proof of inclusion) - Is this correct: /proves/ ? is this /proofs/? - or ... /can prove that a.../ --- /increase burden for implementers/ - insert /the/ before /burden/? --- /which corresponds to the log/ - could be /that corresponds to the log/ --- /It is recommended that implementations return a single boolean result for Receipt verification operations.../ - Please check, whether this ought to be a normative RECOMMENDED? --- and does /merkle tree/ have a capital 'M' or 'M' and 'T'? --- |
2025-08-03
|
14 | Gorry Fairhurst | [Ballot Position Update] New position, No Objection, has been recorded for Gorry Fairhurst |
2025-08-02
|
14 | Deb Cooley | [Ballot comment] Thanks to Charlie Kaufman for their secdir review (his nits still exist in the draft, btw). Section 4.1, 8.2.2: I don't love the … [Ballot comment] Thanks to Charlie Kaufman for their secdir review (his nits still exist in the draft, btw). Section 4.1, 8.2.2: I don't love the fact that the registry called 'COSE Verifiable Data Structures' is actually an algorithm registry - super confusing. Moreover, the description in the registration template in Section 8.2.2 says nothing about algorithms. In section 4.1, there is a sentence that calls it 'a registry of verifiable data structure algorithms'. Can we change the name of the registry to that? Section 7: While I think it is probably too early for this, it might be wise to have a post quantum section here warning of an eventual shift in algorithms. Depending on how long the proofs and receipts are expected to be valid will determine how soon an algorithm migration should be considered. I would be happy to help write it if that is helpful. Note: I would expect that this includes both the hash (currently only SHA-2 256 is registered) and the signatures. Authors: A nit... Will Orie change his contact details before publication? Seems like it might be better in the long run. |
2025-08-02
|
14 | Deb Cooley | [Ballot Position Update] New position, No Objection, has been recorded for Deb Cooley |
2025-08-01
|
14 | Éric Vyncke | [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-cose-merkle-tree-proofs-14 CC @evyncke Thank you for the work put into this document. While the introduction is … [Ballot comment] # Éric Vyncke, INT AD, comments for draft-ietf-cose-merkle-tree-proofs-14 CC @evyncke Thank you for the work put into this document. While the introduction is easy to read, the rest of the document is less easy though. Please find below some non-blocking COMMENT points/nits (replies would be appreciated even if only for my own education). Special thanks to Ivaylo Petrov for the shepherd's write-up including the WG consensus *and* the justification of the intended status. I hope that this review helps to improve the document, Regards, -éric ## COMMENTS (non-blocking) ### Section 4.1 For a non-expert reader, ` EC2 keys (1: 2)` is basically meaningless especially `(1: 2)`. ### Section 4.2 `Security analysis SHOULD be conducted` why not a "MUST" and it a "SHOULD", then explain why and when the "SHOULD" can be bypassed. ### Section 4.3 Should it be "TBD_0" in `This document registered a new COSE Header Parameter receipts (394)` ? Also in Figure 1. Is Figure 2 just an example or normative ? If example (as I guess), then clearly label it as 'example' in the caption and in the leading text. ### Section 5.2.1 Please replace 395 & co with TBC_* (not repeating this further). ### Section 6 Sometimes it is better to state the obvious and state that the privacy considerations of the 2 RFCs also apply to this document. ### Section 9 It is obviously up to the authors, but should there be a section about "Contributors" rather than writing `for their contributions (some of which substantial)` ? ## NITS (non-blocking / cosmetic) ### Capitalization of Merkle There is at least one `merkle tree`, i.e., missing the capitalisation... |
2025-08-01
|
14 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
2025-07-31
|
14 | Roman Danyliw | [Ballot comment] Thank you to Linda Dunbar for the GENART review. ** Section 2. Editorial. Correspondingly, this document introduces a … [Ballot comment] Thank you to Linda Dunbar for the GENART review. ** Section 2. Editorial. Correspondingly, this document introduces a new Section 8.2.2 that registers the integers used to identify verifiable data structures. What does it mean to introduce a “new Section 8.2.2” per the write-up of TBD_1? Maybe: NEW Correspondingly, this document introduces a new registry (see Section 8.2.2) that registers the identifiers used to identify verifiable data structures. Same recommendation for TBD_2. ** Section 4.2. Table 2. Shouldn’t the values provided in the reference column also include an RFC in addition to the section numbers? ** Section 4.2 Security analysis SHOULD be conducted prior to migrating to new structures to ensure the new security and privacy assumptions are acceptable for the use case -- The situation where one is migrating between new structures isn’t sufficiently described -- When would security analysis NOT be appropriate (as a SHOULD is used)? Perhaps it might be better to use a lower case “should”. ** Section 5.1 5.1. Verifiable Data Structure The integer identifier for this Verifiable Data Structure is 1. The string identifier for this Verifiable Data Structure is "RFC9162_SHA256". See Table 1. See [RFC9162], 2.1.1. Definition of the Merkle Tree, for a complete description of this verifiable data structure. Should the text explicitly say (what is obvious from string identifier), that RFC9162_SHA256 is a Merkle Tree where SHA256 is used as the hash algorithm? ** Section 5.2. The term leaf-index is used for alignment with the use established in [RFC9162] Note that [RFC9162] defines that verification MUST fail if leaf-index is >= tree-size, and inclusion proofs are defined only for leaf nodes. The identifying index of a leaf node is relative to all nodes in the tree size for which the proof was obtained. Perhaps be clear that the term is “leaf_index” in Section 2.1.3.1 of RFC9162. ** Section 7 See the security considerations section of: * [RFC9162] * [RFC9053] -- Is this text saying that the security considerations of these two RFCs apply? -- The Security Considerations of RFC9162 seems to have significant guidance related to CT. Is there only a particular part of RFC9162’s Security Considerations which applies? ** Section 7.1 A security analysis MUST be performed to ensure that the digital signature algorithm alg has the appropriate strength to secure receipts. Is “MUST” the appropriate guidance here since an interoperable way to do “security analysis” on the appropriate strength isn’t clear? |
2025-07-31
|
14 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
2025-07-31
|
14 | Mohamed Boucadair | [Ballot comment] Hi Orie, Henk, Antoine, and Cédric, Thanks for the effort put into this specification. Please find some comments below: # CDDL is normative … [Ballot comment] Hi Orie, Henk, Antoine, and Cédric, Thanks for the effort put into this specification. Please find some comments below: # CDDL is normative Please move to RFC8610 to be listed a normative. # Normative language Overall, the use of the normative language seems inconsistent, especially for the implementation behavior. Examples that triggered my comments are: It is recommended that implementations return a single boolean result for Receipt verification operations, to reduce the chance of accepting a valid signature over an invalid inclusion proof. Or It is recommended to select signature algorithms that share cryptographic components with the verifiable data structure used, And similar ones. Also, some clarity about object construction/verification behaviors vs. those related to actual use would be helpful. # Implementers or users? CURRENT: Implementers should not expect interoperability across "verifiable data structures", but they should expect conceptually similar properties across the different registered proof types. For example, 2 different merkle tree based verifiable data structures might both support proofs of inclusion. The first sentence in particular smells more relevant for actual use rather than design phase/implementers? Maybe I’m missing the point this text tries to make. Also, not sure what are the concrete implications of the interoperability mentioned here. # Why this isn’t a MUST? CURRENT (4.2): Security analysis SHOULD be conducted prior to migrating to new structures to ensure the new security and privacy assumptions are acceptable for the use case. # Check CURRENT (4.3): When the receipts header parameter is present, the associated verifiable data structure and verifiable data structure proofs MUST match entries present in the registries established in this specification. I guess you don’t imply the check should be against the initial values established by this doc, but also future registered values are covered. I suggest to make that more clear and consider this change: NEW: When the receipts header parameter is present, the associated verifiable data structure and verifiable data structure proofs MUST match entries present in the registries [IANA_URL]. BTW, which entity is required to do the analysis? Idem for which entity (user, implementer, verifier, etc.) is targeted by: A privacy analysis MUST be performed for all mandatory fields in profiles based on this specification. And A security analysis MUST be performed to ensure that the digital signature algorithm alg has the appropriate strength to secure receipts. # Each specification? CURRENT: Each specification MUST define how to encode the verifiable data ^^^^^^^^^^^^^^^^^^ structure identifier and its proof types in CBOR. Each specification ^^^^^^^^^^^^^^^^^^ MUST define how to produce and consume the supported proof types. See Section 5 as an example. Not sure to understand what is referred to by “Each specification” here. # Payloads Section 5.2.1 says: Specifications are encouraged to make payloads detached when possible, forcing ^^^^^^^^^^^^^^ validation-time comparison. and then The payload SHOULD be detached. What are the implications if this is not the case? # IANA Registries & Hidden Required IANA Actions CURRENT: IANA established the COSE Verifiable Data Structures and COSE Verifiable Data Structure Proofs registries under a Specification Required policy as described in [RFC8126]. I failed to find these. Can we please have pointers to where those are defined? Also, Section 4.1 says: This document establishes a registry of verifiable data structure algorithms, with the following initial contents: Idem, Section 4.2 states: This document establishes a registry of verifiable data structure algorithms, with the following initial contents: which seems a hidden IANA actions. Not sure, why these contents are not part of the IANA section, though. # Nits ## Title: Please expand COSE in the title. ## Abstract should be self-contained s/RFC 9162/“Certificate Transparency Version 2.0” (RFC 9162) ## Section 2 * s/ore more COSE Receipts/or more COSE Receipts * s/a new Section 8.2.2/ a new registry (Section 8.2.2) * s/a new Section 8.2.3/ a new registry (Section 8.2.3) ## Section 4.1 OLD: +================+=======+===========================+===========+ | Name | Value | Description | Reference | +================+=======+===========================+===========+ | Reserved | 0 | Reserved | Reserved | NEW: +================+=======+===========================+===========+ | Name | Value | Description | Reference | +================+=======+===========================+===========+ | Reserved | 0 | Reserved |THIS_DOCUMENT | ## Section 4.2 Please fix the following CURRENT: as EC2 keys (1: 2) keys ## Section 4.3 * s/This document registered/ This document registers * Which receipt/receipts are we referring to? CURRENT: to enable this Receipts to be conveyed in the protected and ^^^^ ^ ^ unprotected headers of COSE Objects. Also, check the singular/plural use. * OLD: The specific structure of COSE Receipts are dependent NEW: The specific structure of COSE Receipts is dependent ## Section 5.2 (1) CURRENT: Note that [RFC9162] defines that verification MUST fail if leaf-index is >= tree-size, and inclusion proofs are defined only for leaf nodes. May format this as a quote to insist this is not a NEW behavior. (2) s/verifiers applies/verifier applies Cheers, Med |
2025-07-31
|
14 | Mohamed Boucadair | [Ballot Position Update] New position, No Objection, has been recorded for Mohamed Boucadair |
2025-07-30
|
14 | Ketan Talaulikar | [Ballot Position Update] New position, No Objection, has been recorded for Ketan Talaulikar |
2025-07-30
|
14 | Jim Guichard | [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard |
2025-07-28
|
14 | Gunter Van de Velde | [Ballot Position Update] New position, No Objection, has been recorded for Gunter Van de Velde |
2025-07-11
|
14 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
2025-07-10
|
14 | Morgan Condie | Placed on agenda for telechat - 2025-08-07 |
2025-07-10
|
14 | Paul Wouters | Ballot has been issued |
2025-07-10
|
14 | Paul Wouters | [Ballot Position Update] New position, Yes, has been recorded for Paul Wouters |
2025-07-10
|
14 | Paul Wouters | Created "Approve" ballot |
2025-07-10
|
14 | Paul Wouters | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead |
2025-07-10
|
14 | Paul Wouters | Ballot writeup was changed |
2025-05-22
|
14 | Tero Kivinen | Request for IETF Last Call review by SECDIR Completed: Has Nits. Reviewer: Charlie Kaufman. Submission of review completed at an earlier date. |
2025-05-21
|
14 | David Dong | IANA Experts State changed to Expert Reviews OK from Issues identified |
2025-05-21
|
14 | David Dong | The COSE Header Parameters registrations have been approved and allocated as early allocations. |
2025-05-15
|
14 | Paul Wouters | waiting on the recharter before creating the IESG ballot |
2025-05-13
|
14 | Linda Dunbar | Request for IETF Last Call review by GENART Completed: Almost Ready. Reviewer: Linda Dunbar. Sent review to list. |
2025-05-13
|
14 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
2025-05-11
|
14 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA - Not OK |
2025-05-11
|
14 | Henk Birkholz | New version available: draft-ietf-cose-merkle-tree-proofs-14.txt |
2025-05-11
|
14 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
2025-05-11
|
14 | Henk Birkholz | Uploaded new revision |
2025-05-11
|
14 | Tero Kivinen | Request for IETF Last Call review by SECDIR Completed: Has Nits. Reviewer: Charlie Kaufman. |
2025-05-09
|
13 | David Dong | Small fix suggested in https://github.com/cose-wg/draft-ietf-cose-merkle-tree-proofs/pull/53 (I realize maybe the last bullet point in my last mail was not clear): this reverts a change that was … Small fix suggested in https://github.com/cose-wg/draft-ietf-cose-merkle-tree-proofs/pull/53 (I realize maybe the last bullet point in my last mail was not clear): this reverts a change that was not necessary IMO, but adds the Value Registry field in the table as previously requested. Everything else is good. |
2025-05-09
|
13 | David Dong | IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-cose-merkle-tree-proofs-13. If any part of this review is inaccurate, please let us know. IANA understands that, upon … IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-cose-merkle-tree-proofs-13. If any part of this review is inaccurate, please let us know. IANA understands that, upon approval of this document, there are three actions which we must complete. First, in the COSE Header Parameters registry in the CBOR Object Signing and Encryption (COSE) registry group located at: https://www.iana.org/assignments/cose/ three new registrations are to be made as follows: Name: receipts Label: [ TBD-at-Registration ] Value Type: array Description: Priority ordered sequence of CBOR encoded Receipts Reference: [ RFC-to-be; Section 2] Name: vds Label: [ TBD-at-Registration ] Value Type: int Description: Algorithm identifier for COSE Verifiable Data Structures, used to produce COSE Verifiable Data Structure Proofs Reference: [ RFC-to-be; Section 2] Name: vdp Label: [ TBD-at-Registration ] Value Type: map Description: Map key for COSE Verifiable Data Structure Proofs in COSE Header Parameters Reference: [ RFC-to-be; Section ] IANA notes that the authors have suggested values for the labels for these registrations (394, 395, 396). As this document requests registrations in an Expert Review or Specification Required (see RFC 8126) registry, we have initiated the required Expert Review via a separate request (we also note that these registrations are pending early allocation). This review must be completed before the document's IANA state can be changed to "IANA OK." Second, a new registry is to be created called the COSE Verifiable Data Structures registry. The new registry will be located in the CBOR Object Signing and Encryption (COSE) registry group located at: https://www.iana.org/assignments/cose/ The registration policy for the new registry is Specification Required as defined in [RFC8126]. There are initial registrations in the new registry as follows: Name Value Description Reference ------+----+-----------+---------- Reserved 0 Reserved RFC9162_SHA256 1 SHA256 Binary Merkle Tree [RFC9162] Third, a new registry is to be created called the COSE Verifiable Data Structure Proofs registry. The new registry will be located in the CBOR Object Signing and Encryption (COSE) registry group located at: https://www.iana.org/assignments/cose/ The registration policy for the new registry is Specification Required as defined in [RFC8126]. There are initial registrations in the new registry as follows: Verifiable Data Structure Name Label CBOR Type Description Reference -------------------------+-----+----+------------+----------+----------- 1 inclusion proofs -1 array (of bstr) Proof of inclusion [ RFC-to-be; Section 5.2] 1 consistency proofs -2 array (of bstr) Proof of append only property [ RFC-to-be; Section 5.3] We understand that these are the only actions required to be completed upon approval of this document. NOTE: The actions requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the list of actions that will be performed. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, David Dong IANA Services Sr. Specialist |
2025-05-09
|
13 | David Dong | IANA Experts State changed to Issues identified |
2025-05-09
|
13 | (System) | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
2025-05-06
|
13 | Henk Birkholz | New version available: draft-ietf-cose-merkle-tree-proofs-13.txt |
2025-05-06
|
13 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
2025-05-06
|
13 | Henk Birkholz | Uploaded new revision |
2025-05-06
|
12 | Henk Birkholz | New version available: draft-ietf-cose-merkle-tree-proofs-12.txt |
2025-05-06
|
12 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
2025-05-06
|
12 | Henk Birkholz | Uploaded new revision |
2025-05-02
|
11 | Tero Kivinen | Request for IETF Last Call review by SECDIR is assigned to Charlie Kaufman |
2025-04-30
|
11 | Jean Mahoney | Request for IETF Last Call review by GENART is assigned to Linda Dunbar |
2025-04-29
|
11 | Liz Flynn | IANA Review state changed to IANA - Review Needed |
2025-04-29
|
11 | Liz Flynn | The following Last Call announcement was sent out (ends 2025-05-13): From: The IESG To: IETF-Announce CC: cose-chairs@ietf.org, cose@ietf.org, draft-ietf-cose-merkle-tree-proofs@ietf.org, ivaylopetrov@google.com, paul.wouters@aiven.io … The following Last Call announcement was sent out (ends 2025-05-13): From: The IESG To: IETF-Announce CC: cose-chairs@ietf.org, cose@ietf.org, draft-ietf-cose-merkle-tree-proofs@ietf.org, ivaylopetrov@google.com, paul.wouters@aiven.io Reply-To: last-call@ietf.org Sender: Subject: Last Call: (COSE Receipts) to Proposed Standard The IESG has received a request from the CBOR Object Signing and Encryption WG (cose) to consider the following document: - 'COSE Receipts' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2025-05-13. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract COSE (CBOR Object Signing and Encryption) Receipts prove properties of a verifiable data structure to a verifier. Verifiable data structures and associated proof types enable security properties, such as minimal disclosure, transparency and non-equivocation. Transparency helps maintain trust over time, and has been applied to certificates, end to end encrypted messaging systems, and supply chain security. This specification enables concise transparency oriented systems, by building on CBOR (Concise Binary Object Representation) and COSE. The extensibility of the approach is demonstrated by providing CBOR encodings for RFC9162. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-cose-merkle-tree-proofs/ The following IPR Declarations may be related to this I-D: https://datatracker.ietf.org/ipr/6609/ The document contains these normative downward references. See RFC 3967 for additional information: rfc9162: Certificate Transparency Version 2.0 (Experimental - Internet Engineering Task Force (IETF) stream) |
2025-04-29
|
11 | Liz Flynn | IESG state changed to In Last Call from Last Call Requested |
2025-04-29
|
11 | Liz Flynn | Last call announcement was generated |
2025-04-29
|
11 | Paul Wouters | Last call was requested |
2025-04-29
|
11 | Paul Wouters | Ballot approval text was generated |
2025-04-29
|
11 | Paul Wouters | Ballot writeup was generated |
2025-04-29
|
11 | Paul Wouters | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
2025-04-29
|
11 | Paul Wouters | Last call announcement was changed |
2025-04-29
|
11 | Paul Wouters | Last call announcement was generated |
2025-04-29
|
11 | Paul Wouters | Last call announcement was generated |
2025-04-28
|
11 | Henk Birkholz | New version available: draft-ietf-cose-merkle-tree-proofs-11.txt |
2025-04-28
|
11 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
2025-04-28
|
11 | Henk Birkholz | Uploaded new revision |
2025-04-03
|
10 | Orie Steele | New version available: draft-ietf-cose-merkle-tree-proofs-10.txt |
2025-04-03
|
10 | (System) | New version approved |
2025-04-03
|
10 | (System) | Request for posting confirmation emailed to previous authors: Antoine Delignat-Lavaud , Cedric Fournet , Henk Birkholz , Orie Steele |
2025-04-03
|
10 | Orie Steele | Uploaded new revision |
2025-03-25
|
09 | (System) | Changed action holders to Paul Wouters (IESG state changed) |
2025-03-25
|
09 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
2025-03-25
|
09 | Orie Steele | New version available: draft-ietf-cose-merkle-tree-proofs-09.txt |
2025-03-25
|
09 | (System) | New version approved |
2025-03-25
|
09 | (System) | Request for posting confirmation emailed to previous authors: Antoine Delignat-Lavaud , Cedric Fournet , Henk Birkholz , Orie Steele |
2025-03-25
|
09 | Orie Steele | Uploaded new revision |
2025-03-25
|
08 | Paul Wouters | Pending merging of https://github.com/cose-wg/draft-ietf-cose-merkle-tree-proofs/pull/43 after Designated Expert feedback |
2025-03-25
|
08 | (System) | Changed action holders to Antoine Delignat-Lavaud, Henk Birkholz, Orie Steele, Cedric Fournet (IESG state changed) |
2025-03-25
|
08 | Paul Wouters | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation::AD Followup |
2025-03-11
|
08 | Paul Wouters | IESG state changed to AD Evaluation::AD Followup from Publication Requested |
2025-02-20
|
08 | Henk Birkholz | New version available: draft-ietf-cose-merkle-tree-proofs-08.txt |
2025-02-20
|
08 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
2025-02-20
|
08 | Henk Birkholz | Uploaded new revision |
2025-02-12
|
07 | Ivaylo Petrov | # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* Thank you for your service as a document shepherd. Among the … # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* Thank you for your service as a document shepherd. Among the responsibilities is answering the questions in this write-up to give helpful context to Last Call and Internet Engineering Steering Group ([IESG][1]) reviewers, and your diligence in completing it is appreciated. The full role of the shepherd is further described in [RFC 4858][2]. You will need the cooperation of the authors and editors to complete these checks. Note that some numbered items contain multiple related questions; please be sure to answer all of them. ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? It reached broad agreement. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? There was nothing particularly controversial. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? Yes, there are at least 3 implementations as far as I am aware. It was reported that on -05 some of them have successfully tested interoperability, but I do not know if that has been done for -07. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. This document is relevant for SCITT and people from the SCITT working group have reviewed it. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. IANA reviews have not yet taken place and I don’t believe any other type of review is necessary. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? The document does not contain a YANG module. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. CDDL has been checked in a previous version. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? Yes. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? I am unaware of such issues in this document. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Proposed Standard is being requested. The specification normatively describes how to convey verifiable data structure and associated verifiable data structure proofs types in unified COSE envelopes. Therefore, I believe this is the correct document type. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. One of the authors have initially indicated that the IPR disclosed in https://datatracker.ietf.org/ipr/6609/ should be relevant for this draft. Later they updated their statement and filed https://datatracker.ietf.org/ipr/6621/ stating that it should not apply based on further discussions with their lawyer: https://mailarchive.ietf.org/arch/msg/cose/uaXAo7zsnFg1XHOq1xoIKUR6ah8/. 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) I'm not aware of nits. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. All the references are appropriately categorized. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? None. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. - There are (appropriate and necessary) normative references to an informational RFC: "CBOR Object Signing and Encryption (COSE): Initial Algorithms" [RFC 9053]. - RFC 9162 has experimental status and therefore also constitutes a downref. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? No 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. No 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). The IANA actions are clearly described and appropriate. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. New IANA registries: - COSE Verifiable Data Structures - COSE Verifiable Data Structure Parameters I believe that the instructions for the Designated Expert are clear. [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
2025-02-12
|
07 | Ivaylo Petrov | IETF WG state changed to Submitted to IESG for Publication from WG Document |
2025-02-12
|
07 | Ivaylo Petrov | IESG state changed to Publication Requested from I-D Exists |
2025-02-12
|
07 | (System) | Changed action holders to Paul Wouters (IESG state changed) |
2025-02-12
|
07 | Ivaylo Petrov | Responsible AD changed to Paul Wouters |
2025-02-12
|
07 | Ivaylo Petrov | Document is now in IESG state Publication Requested |
2025-02-12
|
07 | Ivaylo Petrov | # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* Thank you for your service as a document shepherd. Among the … # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* Thank you for your service as a document shepherd. Among the responsibilities is answering the questions in this write-up to give helpful context to Last Call and Internet Engineering Steering Group ([IESG][1]) reviewers, and your diligence in completing it is appreciated. The full role of the shepherd is further described in [RFC 4858][2]. You will need the cooperation of the authors and editors to complete these checks. Note that some numbered items contain multiple related questions; please be sure to answer all of them. ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? It reached broad agreement. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? There was nothing particularly controversial. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? Yes, there are at least 3 implementations as far as I am aware. It was reported that on -05 some of them have successfully tested interoperability, but I do not know if that has been done for -07. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. This document is relevant for SCITT and people from the SCITT working group have reviewed it. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. IANA reviews have not yet taken place and I don’t believe any other type of review is necessary. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? The document does not contain a YANG module. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. CDDL has been checked in a previous version. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? Yes. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? I am unaware of such issues in this document. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Proposed Standard is being requested. The specification normatively describes how to convey verifiable data structure and associated verifiable data structure proofs types in unified COSE envelopes. Therefore, I believe this is the correct document type. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. One of the authors have initially indicated that the IPR disclosed in https://datatracker.ietf.org/ipr/6609/ should be relevant for this draft. Later they updated their statement and filed https://datatracker.ietf.org/ipr/6621/ stating that it should not apply based on further discussions with their lawyer: https://mailarchive.ietf.org/arch/msg/cose/uaXAo7zsnFg1XHOq1xoIKUR6ah8/. 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) I'm not aware of nits. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. All the references are appropriately categorized. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? None. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. - There are (appropriate and necessary) normative references to an informational RFC: "CBOR Object Signing and Encryption (COSE): Initial Algorithms" [RFC 9053]. - RFC 9162 has experimental status and therefore also constitutes a downref. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? No 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. No 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). The IANA actions are clearly described and appropriate. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. New IANA registries: - COSE Verifiable Data Structures - COSE Verifiable Data Structure Parameters I believe that the instructions for the Designated Expert are clear. [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
2025-01-16
|
07 | Ivaylo Petrov | # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* Thank you for your service as a document shepherd. Among the … # Document Shepherd Write-Up for Group Documents *This version is dated 4 July 2022.* Thank you for your service as a document shepherd. Among the responsibilities is answering the questions in this write-up to give helpful context to Last Call and Internet Engineering Steering Group ([IESG][1]) reviewers, and your diligence in completing it is appreciated. The full role of the shepherd is further described in [RFC 4858][2]. You will need the cooperation of the authors and editors to complete these checks. Note that some numbered items contain multiple related questions; please be sure to answer all of them. ## Document History 1. Does the working group (WG) consensus represent the strong concurrence of a few individuals, with others being silent, or did it reach broad agreement? It reached broad agreement. 2. Was there controversy about particular points, or were there decisions where the consensus was particularly rough? There was nothing particularly controversial. 3. Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarize the areas of conflict in separate email messages to the responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No. 4. For protocol documents, are there existing implementations of the contents of the document? Have a significant number of potential implementers indicated plans to implement? Are any existing implementations reported somewhere, either in the document itself (as [RFC 7942][3] recommends) or elsewhere (where)? Yes, there are at least 3 implementations as far as I am aware. It was reported that on -05 some of them have successfully tested interoperability, but I do not know if that has been done for -07. ## Additional Reviews 5. Do the contents of this document closely interact with technologies in other IETF working groups or external organizations, and would it therefore benefit from their review? Have those reviews occurred? If yes, describe which reviews took place. This document is relevant for SCITT and people from the SCITT working group have reviewed it. 6. Describe how the document meets any required formal expert review criteria, such as the MIB Doctor, YANG Doctor, media type, and URI type reviews. IANA reviews have not yet taken place and I don’t believe any other type of review is necessary. 7. If the document contains a YANG module, has the final version of the module been checked with any of the [recommended validation tools][4] for syntax and formatting validation? If there are any resulting errors or warnings, what is the justification for not fixing them at this time? Does the YANG module comply with the Network Management Datastore Architecture (NMDA) as specified in [RFC 8342][5]? The document does not contain a YANG module. 8. Describe reviews and automated checks performed to validate sections of the final version of the document written in a formal language, such as XML code, BNF rules, MIB definitions, CBOR's CDDL, etc. CDDL has been checked in a previous version. ## Document Shepherd Checks 9. Based on the shepherd's review of the document, is it their opinion that this document is needed, clearly written, complete, correctly designed, and ready to be handed off to the responsible Area Director? Yes. 10. Several IETF Areas have assembled [lists of common issues that their reviewers encounter][6]. For which areas have such issues been identified and addressed? For which does this still need to happen in subsequent reviews? I am unaware of such issues in this document. 11. What type of RFC publication is being requested on the IETF stream ([Best Current Practice][12], [Proposed Standard, Internet Standard][13], [Informational, Experimental or Historic][14])? Why is this the proper type of RFC? Do all Datatracker state attributes correctly reflect this intent? Proposed Standard is being requested. The specification normatively describes how to convey verifiable data structure and associated verifiable data structure proofs types in unified COSE envelopes. Therefore, I believe this is the correct document type. 12. Have reasonable efforts been made to remind all authors of the intellectual property rights (IPR) disclosure obligations described in [BCP 79][7]? To the best of your knowledge, have all required disclosures been filed? If not, explain why. If yes, summarize any relevant discussion, including links to publicly-available messages when applicable. The authors were aware of one IPR that might be relevant and have disclosed the relevant information in https://datatracker.ietf.org/ipr/6609/. 13. Has each author, editor, and contributor shown their willingness to be listed as such? If the total number of authors and editors on the front page is greater than five, please provide a justification. Yes. 14. Document any remaining I-D nits in this document. Simply running the [idnits tool][8] is not enough; please review the ["Content Guidelines" on authors.ietf.org][15]. (Also note that the current idnits tool generates some incorrect warnings; a rewrite is underway.) I'm not aware of nits. 15. Should any informative references be normative or vice-versa? See the [IESG Statement on Normative and Informative References][16]. All the references are appropriately categorized. 16. List any normative references that are not freely available to anyone. Did the community have sufficient access to review any such normative references? None. 17. Are there any normative downward references (see [RFC 3967][9] and [BCP 97][10]) that are not already listed in the [DOWNREF registry][17]? If so, list them. - There are (appropriate and necessary) normative references to an informational RFC: "CBOR Object Signing and Encryption (COSE): Initial Algorithms" [RFC 9053]. - RFC 9162 has experimental status and therefore also constitutes a downref. 18. Are there normative references to documents that are not ready to be submitted to the IESG for publication or are otherwise in an unclear state? If so, what is the plan for their completion? No 19. Will publication of this document change the status of any existing RFCs? If so, does the Datatracker metadata correctly reflect this and are those RFCs listed on the title page, in the abstract, and discussed in the introduction? If not, explain why and point to the part of the document where the relationship of this document to these other RFCs is discussed. No 20. Describe the document shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all aspects of the document requiring IANA assignments are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that each newly created IANA registry specifies its initial contents, allocations procedures, and a reasonable name (see [RFC 8126][11]). The IANA actions are clearly described and appropriate. 21. List any new IANA registries that require Designated Expert Review for future allocations. Are the instructions to the Designated Expert clear? Please include suggestions of designated experts, if appropriate. New IANA registries: - COSE Verifiable Data Structures - COSE Verifiable Data Structure Parameters I believe that the instructions for the Designated Expert are clear. [1]: https://www.ietf.org/about/groups/iesg/ [2]: https://www.rfc-editor.org/rfc/rfc4858.html [3]: https://www.rfc-editor.org/rfc/rfc7942.html [4]: https://wiki.ietf.org/group/ops/yang-review-tools [5]: https://www.rfc-editor.org/rfc/rfc8342.html [6]: https://wiki.ietf.org/group/iesg/ExpertTopics [7]: https://www.rfc-editor.org/info/bcp79 [8]: https://www.ietf.org/tools/idnits/ [9]: https://www.rfc-editor.org/rfc/rfc3967.html [10]: https://www.rfc-editor.org/info/bcp97 [11]: https://www.rfc-editor.org/rfc/rfc8126.html [12]: https://www.rfc-editor.org/rfc/rfc2026.html#section-5 [13]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.1 [14]: https://www.rfc-editor.org/rfc/rfc2026.html#section-4.2 [15]: https://authors.ietf.org/en/content-guidelines-overview [16]: https://www.ietf.org/about/groups/iesg/statements/normative-informative-references/ [17]: https://datatracker.ietf.org/doc/downref/ |
2025-01-06
|
Tess Chapeta | Posted related IPR disclosure Antoine Delignat-Lavaud's Statement about IPR related to draft-ietf-cose-merkle-tree-proofs and draft-birkholz-cose-receipts-ccf-profile | |
2024-11-08
|
07 | Ivaylo Petrov | Changed consensus to Yes from Unknown |
2024-11-08
|
07 | Ivaylo Petrov | Intended Status changed to Proposed Standard from None |
2024-11-08
|
07 | Ivaylo Petrov | Notification list changed to ivaylopetrov@google.com because the document shepherd was set |
2024-11-08
|
07 | Ivaylo Petrov | Document shepherd changed to Ivaylo Petrov |
2024-10-17
|
07 | Orie Steele | New version available: draft-ietf-cose-merkle-tree-proofs-07.txt |
2024-10-17
|
07 | Henk Birkholz | New version approved |
2024-10-17
|
07 | (System) | Request for posting confirmation emailed to previous authors: Antoine Delignat-Lavaud , Cedric Fournet , Henk Birkholz , Orie Steele |
2024-10-17
|
07 | Orie Steele | Uploaded new revision |
2024-10-09
|
06 | Henk Birkholz | New version available: draft-ietf-cose-merkle-tree-proofs-06.txt |
2024-10-09
|
06 | Henk Birkholz | New version accepted (logged-in submitter: Henk Birkholz) |
2024-10-09
|
06 | Henk Birkholz | Uploaded new revision |
2024-06-18
|
05 | Orie Steele | New version available: draft-ietf-cose-merkle-tree-proofs-05.txt |
2024-06-18
|
05 | Orie Steele | New version approved |
2024-06-18
|
05 | (System) | Request for posting confirmation emailed to previous authors: Antoine Delignat-Lavaud , Cedric Fournet , Henk Birkholz , Orie Steele |
2024-06-18
|
05 | Orie Steele | Uploaded new revision |
2024-03-02
|
04 | Orie Steele | New version available: draft-ietf-cose-merkle-tree-proofs-04.txt |
2024-03-02
|
04 | Orie Steele | New version approved |
2024-03-02
|
04 | (System) | Request for posting confirmation emailed to previous authors: Antoine Delignat-Lavaud , Cedric Fournet , Henk Birkholz , Orie Steele |
2024-03-02
|
04 | Orie Steele | Uploaded new revision |
2024-01-30
|
03 | Orie Steele | Changed document external resources from: None to: github_repo https://github.com/cose-wg/draft-ietf-cose-merkle-tree-proofs |
2023-12-11
|
03 | Orie Steele | New version available: draft-ietf-cose-merkle-tree-proofs-03.txt |
2023-12-11
|
03 | Orie Steele | New version approved |
2023-12-11
|
03 | (System) | Request for posting confirmation emailed to previous authors: Antoine Delignat-Lavaud , Cedric Fournet , Henk Birkholz , Orie Steele |
2023-12-11
|
03 | Orie Steele | Uploaded new revision |
2023-11-17
|
02 | Orie Steele | New version available: draft-ietf-cose-merkle-tree-proofs-02.txt |
2023-11-17
|
02 | Orie Steele | New version approved |
2023-11-17
|
02 | (System) | Request for posting confirmation emailed to previous authors: Antoine Delignat-Lavaud , Cedric Fournet , Henk Birkholz , Orie Steele |
2023-11-17
|
02 | Orie Steele | Uploaded new revision |
2023-10-20
|
01 | Orie Steele | This document now replaces draft-steele-cose-merkle-tree-proofs instead of draft-steele-cose-merkle-tree-proofs |
2023-10-20
|
01 | Orie Steele | New version available: draft-ietf-cose-merkle-tree-proofs-01.txt |
2023-10-20
|
01 | Orie Steele | New version approved |
2023-10-20
|
01 | (System) | Request for posting confirmation emailed to previous authors: Antoine Delignat-Lavaud , Cedric Fournet , Henk Birkholz , Orie Steele |
2023-10-20
|
01 | Orie Steele | Uploaded new revision |
2023-08-17
|
00 | Michael Jones | This document now replaces draft-steele-cose-merkle-tree-proofs instead of None |
2023-08-17
|
00 | Orie Steele | New version available: draft-ietf-cose-merkle-tree-proofs-00.txt |
2023-08-17
|
00 | Michael Jones | WG -00 approved |
2023-08-17
|
00 | Orie Steele | Set submitter to "Orie Steele ", replaces to draft-steele-cose-merkle-tree-proofs and sent approval email to group chairs: cose-chairs@ietf.org |
2023-08-17
|
00 | Orie Steele | Uploaded new revision |