Hi Authors, This is another friendly reminder that we await your word regarding this document's readiness for publication. Please see our previous messages describing the AUTH48 process and containing our document-specific questions.
We will wait to hear from you before continuing with the publication process. The AUTH48 status page for this document is located here: https://www.rfc-editor.org/auth48/rfc9810 Thank you, RFC Editor/ap > On Jun 27, 2025, at 9:02 AM, Mike Ounsworth <mike.ounswo...@entrust.com> > wrote: > > Sorry, yes. It’s been a busy week and I normally do my IETF work on weekends. > I’ll give a proper response to this before Monday, I promise. > --- > Mike Ounsworth > From: Alanna Paloma <apal...@staff.rfc-editor.org> > Sent: Friday, June 27, 2025 10:57 AM > To: Brockhaus, Hendrik <hendrik.brockh...@siemens.com>; von Oheimb, David > <david.von.ohe...@siemens.com>; Mike Ounsworth <mike.ounswo...@entrust.com>; > John Gray <john.g...@entrust.com> > Cc: rfc-edi...@rfc-editor.org; lamps-...@ietf.org; lamps-cha...@ietf.org; > Russ Housley <hous...@vigilsec.com>; Deb Cooley <debcool...@gmail.com>; > auth48archive <auth48archive@rfc-editor.org> > Subject: [EXTERNAL] Re: AUTH48: RFC-to-be 9810 > <draft-ietf-lamps-rfc4210bis-18> for your review > Greetings, We do not believe we have heard from you regarding this > document's readiness for publication. Please review our previous messages > describing the AUTH48 process and containing any document-specific questions > we may have had. We willGreetings, > > We do not believe we have heard from you regarding this document's readiness > for publication. Please review our previous messages describing the AUTH48 > process and containing any document-specific questions we may have had. > > We will wait to hear from you before continuing with the publication process. > > The AUTH48 status page for this document is located here: > https://urldefense.com/v3/__https://www.rfc-editor.org/auth48/rfc9810__;!!FJ-Y8qCqXTj2!YgYHaVCny7IrpV5_ImlWgyxHPWHaGrB4wfKErGTON5dS2YFX76uOb9dFjBXWlyQAuJ2FmWkA1wdswvSLvIvmTt5YrwGq8A$ > > Thank you, > RFC Editor/ap > > > On Jun 20, 2025, at 5:10 PM, rfc-edi...@rfc-editor.org wrote: > > > > Authors, > > > > While reviewing this document during AUTH48, please resolve (as necessary) > > the following questions, which are also in the XML file. > > > > 1) <!-- [rfced] To keep the abstract succinct, we suggest > > moving some of its content to the Introduction. Perhaps the third > > paragraph could be worked into the Introduction? > > > > As noted in > > Section 4.3 of RFC 7322: > > Every RFC must have an Abstract that provides a concise and > > comprehensive overview of the purpose and contents of the entire > > document, to give a technically knowledgeable reader a general > > overview of the function of the document.... > > A satisfactory Abstract can often be > > constructed in part from material within the Introduction section, > > but an effective Abstract may be shorter, less detailed, and perhaps > > broader in scope than the Introduction. > > > > Please review and let us know how/if the text may be updated. > > --> > > > > > > 2) <!--[rfced] It is unclear to us how "that has a signature algorithm..." > > fits into the sentence below. Please review and let us know it may be > > updated for clarity. > > > > Original: > > * Offer an optional hashAlg field in CertStatus supporting cases > > that a certificate needs to be confirmed that has a signature > > algorithm that does not indicate a specific hash algorithm to use > > for computing the certHash. > > > > > > Perhaps: > > * Offer an optional hashAlg field in CertStatus supporting cases > > where a certificate that has a signature algorithm but doesn't > > specify a hash algorithm to compute the certHash needs to be > > confirmed. > > --> > > > > > > 3) <!-- [rfced] FYI, we have updated the citations in the sentence below > > as follows. [RFC9480] does not have an Appendix C.2, but it does have > > an Appendix A.2. Please review and confirm that these updates retain > > the intended meaning. > > > > Original: > > This document obsoletes [RFC4210] and [RFC9480]. It includes the > > changes specified by Section 2 and Appendix C.2 of [RFC9480] as > > described in Section 1.2. > > > > Current: > > This document obsoletes [RFC4210] and [RFC9480]. It includes the > > changes specified by Section 2 and Appendix A.2 of [RFC9480] as > > described in Section 1.2. > > --> > > > > > > 4) <!-- [rfced] For clarity, we recommend adding citations for ISO/IEC > > 9594-8/ITU-T X.509". May we add a citation to the existing reference to > > [X509.2019]? > > > > Original: > > 1. PKI management must conform to the ISO/IEC 9594-8/ITU-T X.509 > > standards. > > --> > > > > > > 5) <!--[rfced] It is unclear what "off-line file-based" refers to in the > > sentence below. Does it refer to "transport mechanisms"? > > > > Original: > > PKI management protocols must be usable over a variety of > > "transport" mechanisms, specifically including mail, Hypertext > > Transfer Protocol (HTTP), Message Queuing Telemetry Transport > > (MQTT), Constrained Application Protocol (CoAP), and off-line > > file-based. > > > > Perhaps: > > PKI management protocols must be usable over a variety of > > "transport" mechanisms, specifically including mail, Hypertext > > Transfer Protocol (HTTP), Message Queuing Telemetry Transport > > (MQTT), Constrained Application Protocol (CoAP), and off-line > > file-based transport mechanisms. > > --> > > > > > > 6) <!--[rfced] For the nested lists in Section 3.1.3, we have updated the > > numbering to letters and converted "Notes" to a hanging list to help with > > readability. Please review and let us know of any objections. > > > > Original: > > 1. CA establishment: When establishing a new CA, certain steps are > > required (e.g., production of initial CRLs, export of CA public > > key). > > ... > > 1. initial registration/certification: This is the process > > whereby an end entity first makes itself known to a CA or RA, > > prior to the CA issuing a certificate or certificates for > > that end entity. > > ... > > 1. Note 1. The above definition of "cross-certificate" > > aligns with the defined term "CA-certificate" in X.509. > > > > Current: > > 1. CA establishment: When establishing a new CA, certain steps are > > required (e.g., production of initial CRLs, export of CA public > > key). > > ... > > a. initial registration/certification: This is the process > > whereby an end entity first makes itself known to a CA or RA, > > prior to the CA issuing a certificate or certificates for > > that end entity. > > ... > > Note 1. The above definition of "cross-certificate" > > aligns with the defined term "CA-certificate" in X.509. > > --> > > > > > > 7) <!--[rfced] May we update the phrasing of "Rail Automation adopted CMP" > > to improve readability? > > > > Original: > > Also industry standards like [ETSI-3GPP.33.310] for > > mobile networks and [UNISIG.Subset-137] for Rail Automation adopted > > CMP and have specified a set of mandatory schemes for their use case. > > > > > > Perhaps: > > Also industry standards, like [ETSI-3GPP.33.310] for > > mobile networks and [UNISIG.Subset-137] for CMP that has adopted rail > > automation, have specified a set of mandatory schemes for their use cases. > > --> > > > > > > 8) <!--[rfced] We have removed the following from the figure in Section > > 4.2.2.2 because it is repetitive with the text introducing the figure. > > However, please review, as it seems like some of the blank space can also > > be removed from the SVG. > > > > Original: > > In terms of message flow, the basic authenticated scheme is as > > follows: > > --> > > > > > > 9) <!--[rfced] As "CMP" is expanded as "Certificate Management Protocol", > > may we update this text to avoid repetition? > > > > Original: > > As the functionality of a > > CA and RA is not specific to any certificate management protocol > > (such as CMC or CMP), these EKUs are reused by CMP. > > > > Perhaps: > > As the functionality of a > > CA and RA is not specific to any CMP (such as CMC), these EKUs are reused > > by CMP. > > --> > > > > > > 10) <!--[rfced] Should "PKIconf" be updated to "pkiconf", "pkiConf", or > > "PKIConf" to reflect usage elsewhere in the document? > > > > Original: > > In response to an ip, cp, kup, krp, or ccp message, an EE will > > send a certConf for all issued certificates and expect a PKIconf > > for each certConf. > > --> > > > > > > 11) <!--[rfced] In the sentence below, does "are typically insufficient..." > > refer to "passwords" or "entropy"? > > > > Original: > > If user-generated passwords are used as > > shared secret information, their entropy cannot be measured and are > > typically insufficient for protected delivery of centrally generated > > keys or trust anchors. > > > > Perhaps A (refers to "passwords"): > > If user-generated passwords are used as > > shared secret information, their entropy cannot be measured and the > > passwords are typically insufficient for protected delivery of centrally > > generated keys or trust anchors. > > > > Perhaps B (refers to "entropy"): > > If user-generated passwords are used as > > shared secret information, their entropy cannot be measured and is > > typically insufficient for protected delivery of centrally generated > > keys or trust anchors. > > --> > > > > > > 12) <!-- [rfced] We are unable to verify these registrations with Entrust. > > Please ensure the descriptions and values are correct. In addition, please > > consider whether it is appropriate for this text to appear in the IANA > > Considerations section, as it seemingly does not provide any information > > for IANA and does not require any IANA actions. > > > > Original: > > The new OID 1.2.840.113533.7.66.16 was registered by Entrust for id- > > KemBasedMac in the arch 1.2.840.113533.7.66. Entrust registered also > > the OIDs for id-PasswordBasedMac and id-DHBasedMac there. > > --> > > > > > > 13) <!-- [rfced] Would you like the references to be alphabetized or left > > in their current order? > > --> > > > > > > 14) <!-- [rfced] Please review. We found the following URL: > > https://urldefense.com/v3/__https://cacr.uwaterloo.ca/hac/index.html__;!!FJ-Y8qCqXTj2!YgYHaVCny7IrpV5_ImlWgyxHPWHaGrB4wfKErGTON5dS2YFX76uOb9dFjBXWlyQAuJ2FmWkA1wdswvSLvIvmTt7LddLIBw$ > > which is provided by authors > > of this handbook and includes open-access PDF files of this > > reference. Would you like to add this URL to the reference? > > > > [MvOV97] Menezes, A., van Oorschot, P., and S. Vanstone, "Handbook > > of Applied Cryptography", CRC Press ISBN 0-8493-8523-7, > > 1996. > > --> > > > > > > 15) <!--[rfced] The following text in Appendices C.3, D.3, and D.6 are not > > complete sentences. Please review and let us know how these may be made > > into complete sentences. > > > > Original: > > POP fields for use (in signature field of pop field of > > ProofOfPossession structure) when proving possession of a private > > signing key that corresponds to a public verification key for which a > > certificate has been requested. > > ... > > Profile of how a certificate structure may be "self-signed". > > ... > > Creation of a single cross-certificate (i.e., not two at once). > > > > Perhaps: > > The table below describes the POP fields for use (in signature field of > > pop field of ProofOfPossession structure) when proving possession of a > > private signing key that corresponds to a public verification key for > > which a certificate has been requested. > > ... > > The table below is a profile of how a certificate structure may be > > "self-signed". > > ... > > This section describes the creation of a single cross-certificate (i.e., > > not two at once). > > --> > > > > > > 16) <!--[rfced] As "OPTIONALLY" is not a key word in BCP14, may we update > > this sentence to rephrase to use the key word "OPTIONAL"? > > > > Original: > > This transaction established the shared secret, the referenceNumber and > > OPTIONALLY the distinguished name used for both sender and subject > > name in the certificate template. > > > > Perhaps: > > This transaction established the shared secret, the referenceNumber, and > > an OPTIONAL distinguished name used for both the sender and subject > > name in the certificate template. > > --> > > > > > > 17) <!--[rfced] May we update the numbered listed in Appendix C.6 to be a > > bulleted list? This would reflect the bulleted list in Appendix C.5. > > > > Appendix C.5: > > * sender name SHOULD be present > > > > * protectionAlg of MSG_SIG_ALG MUST be supported (MSG_MAC_ALG MAY > > also be supported) in request, response, certConfirm, and > > PKIConfirm messages; > > ... > > > > Appendix C.6: > > 1. sender name SHOULD be present > > > > 2. protectionAlg of MSG_SIG_ALG MUST be supported (MSG_MAC_ALG MAY > > also be supported) in request, response, certConfirm, and > > PKIConfirm messages; > > ... > > --> > > > > > > 18) <!--[rfced] As the text preceding these figures and the titles of the > > figures are very similar, may we remove the preceding text to avoid > > redundancy? > > > > Original: > > Message Flow when the PKI entity has a KEM key pair and certificate: > > ... > > Figure 3: Message Flow when PKI entity has a KEM key pair > > > > > > Message Flow when the PKI entity knows that the PKI management entity > > uses a KEM key pair and has the authentic public key: > > ... > > Figure 4: Message Flow when the PKI entity knows that the PKI > > management entity uses a KEM key pair and has the authentic > > public key > > > > > > Message Flow when the PKI entity does not know that the PKI > > management entity uses a KEM key pair: > > ... > > Figure 5: Message Flow when the PKI entity does not know that the PKI > > management entity uses a KEM key pair > > --> > > > > > > 19) <!--[rfced] We note that the following references have citations only > > in the ASN.1 module in Appendix F. In order to have a 1:1 matchup between > > the references section and the text, please review the text and let us know > > where a citation for each of the following may be included. > > > > Alternatively, a sentence can be added before the module stating that it > > refers to the following (and then list the citations). > > > > [RFC3629] > > [RFC6268] > > --> > > > > > > 20) <!-- [rfced] Please review each artwork element and let us know if any > > should be marked as sourcecode (or another element) instead. > > > > We updated some artwork to sourcecode throughout the document. Please > > confirm that these are correct. > > > > In addition, please consider whether the "type" attribute of any sourcecode > > element should be set and/or has been set correctly. > > > > The current list of preferred values for "type" is available at > > <https://urldefense.com/v3/__https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-types__;!!FJ-Y8qCqXTj2!YgYHaVCny7IrpV5_ImlWgyxHPWHaGrB4wfKErGTON5dS2YFX76uOb9dFjBXWlyQAuJ2FmWkA1wdswvSLvIvmTt701q0dRA$>. > > If the current list does not contain an applicable type, feel free to > > suggest additions for consideration. Note that it is also acceptable > > to leave the "type" attribute not set. > > --> > > > > > > 21) <!-- [rfced] Please review whether any of the notes in this document > > should be in the <aside> element. It is defined as "a container for > > content that is semantically less important or tangential to the > > content that surrounds it" > > (https://urldefense.com/v3/__https://authors.ietf.org/en/rfcxml-vocabulary*aside__;Iw!!FJ-Y8qCqXTj2!YgYHaVCny7IrpV5_ImlWgyxHPWHaGrB4wfKErGTON5dS2YFX76uOb9dFjBXWlyQAuJ2FmWkA1wdswvSLvIvmTt5_Q1jgZQ$). > > --> > > > > > > 22) <!--[rfced] Acronyms > > > > a) Both the expansion and the acronym for the following terms are used > > throughout the document. Would you like to update to using the expansion > > upon first usage and the acronym for the rest of the document? > > > > Certification Authority (CA) > > Certificate Management Protocol (CMP) > > Certificate Transparency (CT) > > Diffie-Hellman (DH) > > Distinguished Name (DN) > > End Entity (EE) > > extended key usage (EKU) > > Key Encapsulation Mechansim (KEM) > > Key Generation Authority (KGA) > > Local Registration Authority (LRA) > > Message Authentication Code (MAC) > > one-way function (OWF) > > Public Key Infrastructure (PKI) > > Proof-of-Possession (POP) > > Personal Security Environment (PSE) > > protocol version number (pvno) > > Registration Authority (RA) > > Trusted Execution Environment (TEE) > > > > b) FYI - We have added expansions for the following abbreviations > > per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please review each > > expansion in the document carefully to ensure correctness. > > > > Initial Device Identifier (IDevID) > > Internet Key Exchange Protocol (IKE) > > Internet of Things (IoT) > > Lightweight Directory Access Protocol (LDAP) > > Organizational Unit (OU) > > --> > > > > > > 23) <!--[rfced] Terminology > > > > a) May we update the following terms to the form on the right for > > consistency? > > > > certification authority > Certification Authority > > registration authority > Registration Authority > > boot-strapping > bootstrapping > > key encapsulation mechanism > Key Encapsulation Mechanism > > off-line > offline > > on-line > online > > > > b) We note that the following terms are used inconsistently throughout the > > document. Please review and let us know if/how these terms may be made > > consistent. > > > > Protocol Encryption Key vs. protocl encryption key > > X.509v1 vs. X.509 v1 > > X.509v3 vs. X.509 v3 > > X.509v3 certificate vs. X.509v3 Certificate > > cross-cert* vs. cross cert* > > --> > > > > > > 24) <!-- [rfced] Please review the "Inclusive Language" portion of the > > online Style Guide > > <https://urldefense.com/v3/__https://www.rfc-editor.org/styleguide/part2/*inclusive_language__;Iw!!FJ-Y8qCqXTj2!YgYHaVCny7IrpV5_ImlWgyxHPWHaGrB4wfKErGTON5dS2YFX76uOb9dFjBXWlyQAuJ2FmWkA1wdswvSLvIvmTt74G6GJFg$> > > and let us know if any changes are needed. Updates of this nature > > typically result in more precise language, which is helpful for readers. > > > > Note that our script did not flag any words in particular, but this should > > still be reviewed as a best practice. > > --> > > > > > > Thank you. > > > > RFC Editor > > > > > > On Jun 20, 2025, at 5:06 PM, rfc-edi...@rfc-editor.org wrote: > > > > *****IMPORTANT***** > > > > Updated 2025/06/20 > > > > RFC Author(s): > > -------------- > > > > Instructions for Completing AUTH48 > > > > Your document has now entered AUTH48. Once it has been reviewed and > > approved by you and all coauthors, it will be published as an RFC. > > If an author is no longer available, there are several remedies > > available as listed in the FAQ > > (https://urldefense.com/v3/__https://www.rfc-editor.org/faq/__;!!FJ-Y8qCqXTj2!YgYHaVCny7IrpV5_ImlWgyxHPWHaGrB4wfKErGTON5dS2YFX76uOb9dFjBXWlyQAuJ2FmWkA1wdswvSLvIvmTt4Z36Slcw$). > > > > You and you coauthors are responsible for engaging other parties > > (e.g., Contributors or Working Group) as necessary before providing > > your approval. > > > > Planning your review > > --------------------- > > > > Please review the following aspects of your document: > > > > * RFC Editor questions > > > > Please review and resolve any questions raised by the RFC Editor > > that have been included in the XML file as comments marked as > > follows: > > > > <!-- [rfced] ... --> > > > > These questions will also be sent in a subsequent email. > > > > * Changes submitted by coauthors > > > > Please ensure that you review any changes submitted by your > > coauthors. We assume that if you do not speak up that you > > agree to changes submitted by your coauthors. > > > > * Content > > > > Please review the full content of the document, as this cannot > > change once the RFC is published. Please pay particular attention to: > > - IANA considerations updates (if applicable) > > - contact information > > - references > > > > * Copyright notices and legends > > > > Please review the copyright notice and legends as defined in > > RFC 5378 and the Trust Legal Provisions > > (TLP – > > https://urldefense.com/v3/__https://trustee.ietf.org/license-info__;!!FJ-Y8qCqXTj2!YgYHaVCny7IrpV5_ImlWgyxHPWHaGrB4wfKErGTON5dS2YFX76uOb9dFjBXWlyQAuJ2FmWkA1wdswvSLvIvmTt4z8EOJWg$). > > > > * Semantic markup > > > > Please review the markup in the XML file to ensure that elements of > > content are correctly tagged. For example, ensure that <sourcecode> > > and <artwork> are set correctly. See details at > > > > <https://urldefense.com/v3/__https://authors.ietf.org/rfcxml-vocabulary__;!!FJ-Y8qCqXTj2!YgYHaVCny7IrpV5_ImlWgyxHPWHaGrB4wfKErGTON5dS2YFX76uOb9dFjBXWlyQAuJ2FmWkA1wdswvSLvIvmTt537dv_3g$>. > > > > * Formatted output > > > > Please review the PDF, HTML, and TXT files to ensure that the > > formatted output, as generated from the markup in the XML file, is > > reasonable. Please note that the TXT will have formatting > > limitations compared to the PDF and HTML. > > > > > > Submitting changes > > ------------------ > > > > To submit changes, please reply to this email using ‘REPLY ALL’ as all > > the parties CCed on this message need to see your changes. The parties > > include: > > > > * your coauthors > > > > * rfc-edi...@rfc-editor.org (the RPC team) > > > > * other document participants, depending on the stream (e.g., > > IETF Stream participants are your working group chairs, the > > responsible ADs, and the document shepherd). > > > > * auth48archive@rfc-editor.org, which is a new archival mailing list > > to preserve AUTH48 conversations; it is not an active discussion > > list: > > > > * More info: > > > > https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc__;!!FJ-Y8qCqXTj2!YgYHaVCny7IrpV5_ImlWgyxHPWHaGrB4wfKErGTON5dS2YFX76uOb9dFjBXWlyQAuJ2FmWkA1wdswvSLvIvmTt4WZcR4QA$ > > > > * The archive itself: > > > > https://urldefense.com/v3/__https://mailarchive.ietf.org/arch/browse/auth48archive/__;!!FJ-Y8qCqXTj2!YgYHaVCny7IrpV5_ImlWgyxHPWHaGrB4wfKErGTON5dS2YFX76uOb9dFjBXWlyQAuJ2FmWkA1wdswvSLvIvmTt4AXB6B-w$ > > > > * Note: If only absolutely necessary, you may temporarily opt out > > of the archiving of messages (e.g., to discuss a sensitive matter). > > If needed, please add a note at the top of the message that you > > have dropped the address. When the discussion is concluded, > > auth48archive@rfc-editor.org will be re-added to the CC list and > > its addition will be noted at the top of the message. > > > > You may submit your changes in one of two ways: > > > > An update to the provided XML file > > — OR — > > An explicit list of changes in this format > > > > Section # (or indicate Global) > > > > OLD: > > old text > > > > NEW: > > new text > > > > You do not need to reply with both an updated XML file and an explicit > > list of changes, as either form is sufficient. > > > > We will ask a stream manager to review and approve any changes that seem > > beyond editorial in nature, e.g., addition of new text, deletion of text, > > and technical changes. Information about stream managers can be found in > > the FAQ. Editorial changes do not require approval from a stream manager. > > > > > > Approving for publication > > -------------------------- > > > > To approve your RFC for publication, please reply to this email stating > > that you approve this RFC for publication. Please use ‘REPLY ALL’, > > as all the parties CCed on this message need to see your approval. > > > > > > Files > > ----- > > > > The files are available here: > > > > https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9810.xml__;!!FJ-Y8qCqXTj2!YgYHaVCny7IrpV5_ImlWgyxHPWHaGrB4wfKErGTON5dS2YFX76uOb9dFjBXWlyQAuJ2FmWkA1wdswvSLvIvmTt56I9pXAA$ > > > > https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9810.html__;!!FJ-Y8qCqXTj2!YgYHaVCny7IrpV5_ImlWgyxHPWHaGrB4wfKErGTON5dS2YFX76uOb9dFjBXWlyQAuJ2FmWkA1wdswvSLvIvmTt4F9wsmDA$ > > > > https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9810.pdf__;!!FJ-Y8qCqXTj2!YgYHaVCny7IrpV5_ImlWgyxHPWHaGrB4wfKErGTON5dS2YFX76uOb9dFjBXWlyQAuJ2FmWkA1wdswvSLvIvmTt6TRwlVog$ > > > > https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9810.txt__;!!FJ-Y8qCqXTj2!YgYHaVCny7IrpV5_ImlWgyxHPWHaGrB4wfKErGTON5dS2YFX76uOb9dFjBXWlyQAuJ2FmWkA1wdswvSLvIvmTt7sUxacRw$ > > > > Diff file of the text: > > > > https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9810-diff.html__;!!FJ-Y8qCqXTj2!YgYHaVCny7IrpV5_ImlWgyxHPWHaGrB4wfKErGTON5dS2YFX76uOb9dFjBXWlyQAuJ2FmWkA1wdswvSLvIvmTt5eeAb4Ww$ > > > > https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9810-rfcdiff.html__;!!FJ-Y8qCqXTj2!YgYHaVCny7IrpV5_ImlWgyxHPWHaGrB4wfKErGTON5dS2YFX76uOb9dFjBXWlyQAuJ2FmWkA1wdswvSLvIvmTt5jpMbh5g$ > > (side by side) > > > > Diff of the XML: > > > > https://urldefense.com/v3/__https://www.rfc-editor.org/authors/rfc9810-xmldiff1.html__;!!FJ-Y8qCqXTj2!YgYHaVCny7IrpV5_ImlWgyxHPWHaGrB4wfKErGTON5dS2YFX76uOb9dFjBXWlyQAuJ2FmWkA1wdswvSLvIvmTt7LOTrphA$ > > > > > > Tracking progress > > ----------------- > > > > The details of the AUTH48 status of your document are here: > > > > https://urldefense.com/v3/__https://www.rfc-editor.org/auth48/rfc9810__;!!FJ-Y8qCqXTj2!YgYHaVCny7IrpV5_ImlWgyxHPWHaGrB4wfKErGTON5dS2YFX76uOb9dFjBXWlyQAuJ2FmWkA1wdswvSLvIvmTt5YrwGq8A$ > > > > Please let us know if you have any questions. > > > > Thank you for your cooperation, > > > > RFC Editor > > > > -------------------------------------- > > RFC 9810 (draft-ietf-lamps-rfc4210bis-18) > > > > Title : Internet X.509 Public Key Infrastructure -- Certificate > > Management Protocol (CMP) > > Author(s) : H. Brockhaus, D. von Oheimb, M. Ounsworth, J. Gray > > WG Chair(s) : Russ Housley, Tim Hollebeek > > Area Director(s) : Deb Cooley, Paul Wouters > > > > > > Any email and files/attachments transmitted with it are intended solely for > the use of the individual or entity to whom they are addressed. If this > message has been sent to you in error, you must not copy, distribute or > disclose of the information it contains.Please notify Entrust immediately and > delete the message from your system. -- auth48archive mailing list -- auth48archive@rfc-editor.org To unsubscribe send an email to auth48archive-le...@rfc-editor.org