Hi Kaveh, Stavros, and Daniel,

Thank you for your approvals. They have been noted on the AUTH48 status page:
https://www.rfc-editor.org/auth48/rfc9909

We will await Scott’s approval prior to moving this document forward in the 
publication process.

Best regards,
Alanna Paloma
RFC Production Center

> On Dec 12, 2025, at 12:22 AM, Daniel Van Geest 
> <[email protected]> wrote:
> 
> I approve
> On 2025-12-12 5:48 a.m., Stavros Kousidis wrote:
>> Hi Alanna, 
>> 
>> approval from my side. 
>> 
>> @Daniel, Stefan: Thank you for taking care of this. 
>> 
>> Best 
>> Stavros 
>> 
>> On 12/12/25 06:46, Kaveh Bashiri wrote:
>>> Hi Alanna, 
>>> 
>>> I hereby approve the current version of the RFC. Thank you all for your 
>>> efforts. 
>>> Best wishes, 
>>> Kaveh 
>>> 
>>> Am 12.12.2025 um 00:18 schrieb Alanna Paloma 
>>> <[email protected]>: 
>>> 
>>> Hi Stefan and Daniel, 
>>> 
>>> Thank you for your replies. We have updated the title accordingly. 
>>> 
>>> The files have been posted here (please refresh): 
>>> https://www.rfc-editor.org/authors/rfc9909.xml 
>>> https://www.rfc-editor.org/authors/rfc9909.txt 
>>> https://www.rfc-editor.org/authors/rfc9909.html 
>>> https://www.rfc-editor.org/authors/rfc9909.pdf 
>>> 
>>> The relevant diff files have been posted here: 
>>> https://www.rfc-editor.org/authors/rfc9909-diff.html (comprehensive diff) 
>>> https://www.rfc-editor.org/authors/rfc9909-auth48diff.html (AUTH48 changes) 
>>> https://www.rfc-editor.org/authors/rfc9909-auth48rfcdiff.html (AUTH48 
>>> changes side by side) 
>>> 
>>> Additionally, Stefan’s approval has been noted on the AUTH48 status page: 
>>> https://www.rfc-editor.org/auth48/rfc9909 
>>> 
>>> Once we receive approvals from Kaveh, Scott, Daniel, and Stavros, we will 
>>> ask IANA to update their registry accordingly. After the IANA updates are 
>>> complete, we will move forward with the publication process. 
>>> 
>>> Best regards, 
>>> Alanna Paloma 
>>> RFC Production Center 
>>> 
>>> 
>>>> On Dec 11, 2025, at 1:44 PM, [email protected] wrote: 
>>>> 
>>>> Sounds good to me. At least some alignment to an existing RFC would be 
>>>> good so there's not all individual titles out there. Alignment to RFC 9881 
>>>> is perfectly fine. 
>>>> 
>>>> Best, 
>>>> StefanVon: Daniel Van Geest <[email protected]> 
>>>> Gesendet: Donnerstag, 11. Dezember 2025 22:36 
>>>> An: [email protected] <[email protected]>; Alanna Paloma 
>>>> <[email protected]> 
>>>> Cc: [email protected] <[email protected]>; 
>>>> [email protected] <[email protected]>; 
>>>> [email protected] <[email protected]>; [email protected] 
>>>> <[email protected]>; [email protected] <[email protected]>; 
>>>> [email protected] <[email protected]>; [email protected] 
>>>> <[email protected]>; [email protected] <[email protected]>; 
>>>> [email protected] <[email protected]> 
>>>> Betreff: Re: AW: AUTH48: RFC-to-be 9909 <draft-ietf-lamps-x509-slhdsa-09> 
>>>> for your review 
>>>> As a counterpoint, RFC 9881's title is "Internet X.509 Public Key 
>>>> Infrastructure -- Algorithm Identifiers for the Module-Lattice-Based 
>>>> Digital Signature Algorithm (ML-DSA)", which is similar to our current 
>>>> title.  Our current title doesn't have the expanded form of SLH-DSA.  If 
>>>> we wanted to align with RFC 9881 ours could be: 
>>>> 
>>>> "Internet X.509 Public Key Infrastructure -- Algorithm Identifiers for the 
>>>> Stateless Hash-Based Digital Signature Algorithm (SLH-DSA)" 
>>>> 
>>>> Daniel 
>>>> 
>>>> On 2025-12-11 9:26 p.m., [email protected] wrote:
>>>>> Hi Alanna, 
>>>>> hi everyone, 
>>>>> 
>>>>> I wanted to raise a question about the title before final publication: 
>>>>> For RFC 9802 we had changed the title to "Use of the HSS and XMSS 
>>>>> Hash-Based Signature Algorithms in Internet X.509 Public Key 
>>>>> Infrastructure". We could also do so here and call it "Use of the SLH-DSA 
>>>>> Hash-Based Signature Algorithm in Internet X.509 Public Key 
>>>>> Infrastructure" or just keep the current title. I'd be fine with both 
>>>>> options but wanted to hear other opinions. 
>>>>> 
>>>>> Either way, please consider my approval of the current version. 
>>>>> 
>>>>> Kind Regards and Thanks, 
>>>>> Stefan 
>>>>> 
>>>>> -- 
>>>>> Stefan-Lukas Gazdag 
>>>>> 
>>>>> 
>>>>> Von: Alanna Paloma <[email protected]> 
>>>>> Gesendet: Donnerstag, 11. Dezember 2025 19:24 
>>>>> An: Daniel Van Geest 
>>>>> <[email protected]> 
>>>>> Cc: [email protected] <[email protected]>; 
>>>>> [email protected]<[email protected]>; 
>>>>> [email protected] <[email protected]>; [email protected] 
>>>>> <[email protected]>; [email protected] <[email protected]>; 
>>>>> [email protected] <[email protected]>; [email protected] 
>>>>> <[email protected]>; [email protected] <[email protected]>; 
>>>>> [email protected]<[email protected]>; [email protected] 
>>>>> <[email protected]> 
>>>>> Betreff: Re: AUTH48: RFC-to-be 9909 <draft-ietf-lamps-x509-slhdsa-09> for 
>>>>> your review 
>>>>> Hi Daniel, 
>>>>> 
>>>>> Thank you for your reply.  We have updated as requested. 
>>>>> 
>>>>>>> 6) <!--[rfced] Regarding the IANA-registered description: 
>>>>>>> 
>>>>>>> 120 id-mod-x509-slh-dsa-2024 
>>>>>>> 
>>>>>>> Please confirm that "2024" should remain, i.e., the year should not be 
>>>>>>> updated 
>>>>>>> to "2025" (or "2026") to match the publication date of the reference 
>>>>>>> (this RFC). 
>>>>>>> -->
>>>>>> It is fine to update the date.  If so, should X509-SLH-DSA-Module-2024 
>>>>>> be updated as well? 
>>>>>> I notice it's already published as 2024 in 
>>>>>> https://www.iana.org/assignments/smi-numbers/smi-numbers.xhtml#smi-numbers-1.3.6.1.5.5.7.0,
>>>>>>  I don't know if that affects whether it can be changed.
>>>>> ) We have updated the year to “2025" in both the description and module; 
>>>>> see Section 10 and Appendix A. Once we have received approvals of the 
>>>>> document from each author, we will ask IANA to update their registry 
>>>>> accordingly. 
>>>>> 
>>>>> 
>>>>> The files have been posted here (please refresh): 
>>>>> https://www.rfc-editor.org/authors/rfc9909.xml 
>>>>> https://www.rfc-editor.org/authors/rfc9909.txt 
>>>>> https://www.rfc-editor.org/authors/rfc9909.html 
>>>>> https://www.rfc-editor.org/authors/rfc9909.pdf 
>>>>> 
>>>>> The relevant diff files have been posted here: 
>>>>> https://www.rfc-editor.org/authors/rfc9909-diff.html (comprehensive diff) 
>>>>> https://www.rfc-editor.org/authors/rfc9909-auth48diff.html (AUTH48 
>>>>> changes) 
>>>>> https://www.rfc-editor.org/authors/rfc9909-auth48rfcdiff.html (AUTH48 
>>>>> changes side by side) 
>>>>> 
>>>>> Please review the document carefully and contact us with any further 
>>>>> updates you may have.  Note that we do not make changes once a document 
>>>>> is published as an RFC. 
>>>>> 
>>>>> We will await approvals from each party listed on the AUTH48 status page 
>>>>> below prior to moving this document forward in the publication process. 
>>>>> 
>>>>> For the AUTH48 status of this document, please see: 
>>>>> https://www.rfc-editor.org/auth48/rfc9909 
>>>>> 
>>>>> Thank you, 
>>>>> Alanna Paloma 
>>>>> RFC Production Center 
>>>>> 
>>>>>> On Dec 11, 2025, at 3:52 AM, Daniel Van Geest 
>>>>>> <[email protected]> wrote: 
>>>>>> 
>>>>>> Comments inline 
>>>>>> On 2025-12-09 10:40 p.m., [email protected] wrote:
>>>>>>> Authors, 
>>>>>>> 
>>>>>>> While reviewing this document during AUTH48, please resolve (as 
>>>>>>> necessary) the following questions, which are also in the source file. 
>>>>>>> 
>>>>>>> 1) <!--[rfced] For clarity, may we update this sentence? 
>>>>>>> 
>>>>>>> Original: 
>>>>>>> Digital signatures are used within X.509 Public Key Infrastructure 
>>>>>>> such as X.509 certificates, Certificate Revocation Lists (CRLs), and 
>>>>>>> to sign messages. 
>>>>>>> 
>>>>>>> Perhaps: 
>>>>>>> Digital signatures are used within the X.509 Public Key Infrastructure, 
>>>>>>> such as X.509 certificates and Certificate Revocation Lists (CRLs), as 
>>>>>>> well as 
>>>>>>> to sign messages. 
>>>>>>> -->
>>>>>> Yes
>>>>>>> 
>>>>>>> 2) <!--[rfced] To clarify that the first "parameters" refers to the 
>>>>>>> field rather 
>>>>>>> than parameters in general, may we clarify this text as follows> 
>>>>>>> 
>>>>>>> Original: 
>>>>>>> * parameters, which are optional, are the associated parameters for 
>>>>>>> the algorithm identifier in the algorithm field. 
>>>>>>> 
>>>>>>> Perhaps: 
>>>>>>> * parameters, which is optional, identifies the associated parameters 
>>>>>>> for 
>>>>>>> the algorithm identifier in the algorithm field. 
>>>>>>> -->
>>>>>> Yes
>>>>>>> 
>>>>>>> 3) <!--[rfced] May we update this sentence for clarity? 
>>>>>>> 
>>>>>>> Original: 
>>>>>>> The same algorithm identifiers are used for signatures as are used 
>>>>>>> for public keys. 
>>>>>>> 
>>>>>>> Perhaps: 
>>>>>>> The algorithm identifiers used for signatures are the same as those 
>>>>>>> used 
>>>>>>> for public keys. 
>>>>>>> -->
>>>>>> Yes
>>>>>>> 
>>>>>>> 4) <!--[rfced] Is "M'" part of the expansion of "PH_M"? Should the 
>>>>>>> abbreviation 
>>>>>>> be moved after "M'"? 
>>>>>>> 
>>>>>>> Original: 
>>>>>>> In the case of HashSLH-DSA, there is a pre-hash component (PH_M) of 
>>>>>>> M'. 
>>>>>>> 
>>>>>>> Perhaps: 
>>>>>>> In the case of HashSLH-DSA, there is a pre-hash component of 
>>>>>>> M' (PH_M). 
>>>>>>> 
>>>>>>> Or: 
>>>>>>> In the case of HashSLH-DSA, there is a pre-hash component of 
>>>>>>> M' referred to as PH_M. 
>>>>>>> -->
>>>>>> The second
>>>>>>> 
>>>>>>> 5) <!--[rfced] Is "new" accurate in this sentence, as RFC 5958 was 
>>>>>>> published in August 2010? If not, may it be removed? 
>>>>>>> 
>>>>>>> Original: 
>>>>>>> NOTE: There exist some private key import functions that have not 
>>>>>>> picked up the new ASN.1 structure OneAsymmetricKey that is defined in 
>>>>>>> [RFC5958]. 
>>>>>>> 
>>>>>>> Perhaps: 
>>>>>>> NOTE: There exist some private key import functions that have not 
>>>>>>> picked up the ASN.1 structure OneAsymmetricKey that is defined in 
>>>>>>> [RFC5958]. 
>>>>>>> -->
>>>>>> It may be removed
>>>>>>> 
>>>>>>> 6) <!--[rfced] Regarding the IANA-registered description: 
>>>>>>> 
>>>>>>> 120 id-mod-x509-slh-dsa-2024 
>>>>>>> 
>>>>>>> Please confirm that "2024" should remain, i.e., the year should not be 
>>>>>>> updated 
>>>>>>> to "2025" (or "2026") to match the publication date of the reference 
>>>>>>> (this RFC). 
>>>>>>> -->
>>>>>> It is fine to update the date.  If so, should X509-SLH-DSA-Module-2024 
>>>>>> be updated as well? 
>>>>>> I notice it's already published as 2024 in 
>>>>>> https://www.iana.org/assignments/smi-numbers/smi-numbers.xhtml#smi-numbers-1.3.6.1.5.5.7.0,
>>>>>>  I don't know if that affects whether it can be changed.
>>>>>>> 7) <!--[rfced] FYI - To improve readability, we have changed this list 
>>>>>>> to 
>>>>>>> a bulleted list. Please review and let us know if you prefer otherwise. 
>>>>>>> 
>>>>>>> Original: 
>>>>>>> These categories describe any attack that breaks the 
>>>>>>> relevant security definition that must require computational 
>>>>>>> resources comparable to or greater than those required for: Level 1 - 
>>>>>>> key search on a block cipher with a 128-bit key (e.g., AES128), Level 
>>>>>>> 2 - collision search on a 256-bit hash function (e.g., SHA256/ 
>>>>>>> SHA3-256), Level 3 - key search on a block cipher with a 192-bit key 
>>>>>>> (e.g., AES192), Level 4 - collision search on a 384-bit hash function 
>>>>>>> (e.g. SHA384/SHA3-384), Level 5 - key search on a block cipher with 
>>>>>>> a 256-bit key (e.g., AES 256). 
>>>>>>> 
>>>>>>> Current: 
>>>>>>> These categories describe any attack that breaks the 
>>>>>>> relevant security definition that must require computational 
>>>>>>> resources comparable to or greater than those required for: 
>>>>>>> 
>>>>>>> * Level 1 - key search on a block cipher with a 128-bit key (e.g., 
>>>>>>> AES128), 
>>>>>>> 
>>>>>>> * Level 2 - collision search on a 256-bit hash function (e.g., 
>>>>>>> SHA256/ SHA3-256), 
>>>>>>> 
>>>>>>> * Level 3 - key search on a block cipher with a 192-bit key (e.g., 
>>>>>>> AES192), 
>>>>>>> 
>>>>>>> * Level 4 - collision search on a 384-bit hash function (e.g. 
>>>>>>> SHA384/SHA3-384), and 
>>>>>>> 
>>>>>>> * Level 5 - key search on a block cipher with a 256-bit key (e.g., 
>>>>>>> AES 256). 
>>>>>>> -->
>>>>>> This is fine
>>>>>>> 
>>>>>>> 
>>>>>>> 8) <!--[rfced] FYI, in Table 1, we added "Size (in bytes)" to the 
>>>>>>> column title. 
>>>>>>> If you prefer the original, please let us know. 
>>>>>>> 
>>>>>>> Original: 
>>>>>>> +==============================+============+=======+======+=======+ 
>>>>>>> | OID | NIST Level | Sig. | Pub. | Priv. | 
>>>>>>> | | | | Key | Key | 
>>>>>>> +==============================+============+=======+======+=======+ 
>>>>>>> | id-(hash-)slh-dsa-sha2-128s | 1 | 7856 | 32 | 64 | 
>>>>>>> [...] 
>>>>>>> 
>>>>>>> Current: 
>>>>>>> +==============================+============+======================+ 
>>>>>>> | OID | NIST Level | Size (in bytes) | 
>>>>>>> | | +=======+======+=======+ 
>>>>>>> | | | Sig. | Pub. | Priv. | 
>>>>>>> | | | | Key | Key | 
>>>>>>> +==============================+============+=======+======+=======+ 
>>>>>>> | id-(hash-)slh-dsa-sha2-128s | 1 | 7856 | 32 | 64 | 
>>>>>>> [...] 
>>>>>>> -->
>>>>>> Very nice, wish I knew how to do that in kramdown.
>>>>>>> 
>>>>>>> 
>>>>>>> 9) <!-- [rfced] Please review the "type" attribute of each sourcecode 
>>>>>>> element 
>>>>>>> in the XML file to ensure correctness. If the current list of preferred 
>>>>>>> values for "type" 
>>>>>>> (https://www.rfc-editor.org/rpc/wiki/doku.php?id=sourcecode-types) 
>>>>>>> does not contain an applicable type, then feel free to let us know. 
>>>>>>> Also, it is acceptable to leave the "type" attribute not set. 
>>>>>>> 
>>>>>>> In addition, review each artwork element. Specifically, should any 
>>>>>>> artwork 
>>>>>>> element be tagged as sourcecode or another element? 
>>>>>>> -->
>>>>>> They are fine
>>>>>>> 
>>>>>>> 10) <!--[rfced] Abbreviations 
>>>>>>> 
>>>>>>> a) FYI - We have added expansions for the following abbreviations 
>>>>>>> per Section 3.6 of RFC 7322 ("RFC Style Guide"). Please review each 
>>>>>>> expansion in the document carefully to ensure correctness. 
>>>>>>> 
>>>>>>> certification authority (CA) 
>>>>>>> End Entity (EE) 
>>>>>>> extendable-output function (XOF) 
>>>>>>> Hardware Security Module (HSM) 
>>>>>>> Post-Quantum Cryptography (PQC) 
>>>>>>> subject alternative name (SAN) 
>>>>>>> 
>>>>>>> b) Both the expansion and the acronym for the following terms are used 
>>>>>>> throughout the document. Would you like to update to using the 
>>>>>>> expansion upon 
>>>>>>> first usage and the acronym for the rest of the document? 
>>>>>>> 
>>>>>>> Object Identifier (OID) 
>>>>>>> -->
>>>>>> Each expansion is only used once, so there are no other places to use 
>>>>>> the acronym.
>>>>>>> 
>>>>>>> 11) <!-- [rfced] Please review the "Inclusive Language" portion of the 
>>>>>>> online 
>>>>>>> Style Guide 
>>>>>>> <https://www.rfc-editor.org/styleguide/part2/#inclusive_language> 
>>>>>>> and let us know if any changes are needed. Updates of this nature 
>>>>>>> typically 
>>>>>>> result in more precise language, which is helpful for readers. 
>>>>>>> 
>>>>>>> In addition, please consider whether "traditional" should be updated 
>>>>>>> for clarity. 
>>>>>>> While the NIST website 
>>>>>>> <https://web.archive.org/web/20250214092458/https://www.nist.gov/ 
>>>>>>> nist-research-library/nist-technical-series-publications-author-instructions#table1>
>>>>>>>  
>>>>>>> indicates that this term is potentially biased, it is also ambiguous. 
>>>>>>> 
>>>>>>> Original: 
>>>>>>> Instead of defining the strength of a quantum algorithm in a 
>>>>>>> traditional manner using precise estimates ... 
>>>>>>> -->
>>>>>> The phrase "in a traditional manner" can be removed, and "precise 
>>>>>> estimates" is contradictory phrase. 
>>>>>> Perhaps this sentence could instead be: 
>>>>>>     Instead of defining the strength of a quantum algorithm using the 
>>>>>> number of bits of security, NIST defined a collection of broad security 
>>>>>> strength categories.
>>>>>>> Thank you. 
>>>>>>> 
>>>>>>> Alanna Paloma and Alice Russo 
>>>>>>> RFC Production Center 
>>>>>>> 
>>>>>>> 
>>>>>>> On Dec 9, 2025, [email protected] wrote: 
>>>>>>> 
>>>>>>> *****IMPORTANT***** 
>>>>>>> 
>>>>>>> Updated 2025/12/09 
>>>>>>> 
>>>>>>> RFC Author(s): 
>>>>>>> -------------- 
>>>>>>> 
>>>>>>> Instructions for Completing AUTH48 
>>>>>>> 
>>>>>>> Your document has now entered AUTH48. Once it has been reviewed and 
>>>>>>> approved by you and all coauthors, it will be published as an RFC. 
>>>>>>> If an author is no longer available, there are several remedies 
>>>>>>> available as listed in the FAQ (https://www.rfc-editor.org/faq/). 
>>>>>>> 
>>>>>>> You and you coauthors are responsible for engaging other parties 
>>>>>>> (e.g., Contributors or Working Group) as necessary before providing 
>>>>>>> your approval. 
>>>>>>> 
>>>>>>> Planning your review 
>>>>>>> --------------------- 
>>>>>>> 
>>>>>>> Please review the following aspects of your document: 
>>>>>>> 
>>>>>>> * RFC Editor questions 
>>>>>>> 
>>>>>>> Please review and resolve any questions raised by the RFC Editor 
>>>>>>> that have been included in the XML file as comments marked as 
>>>>>>> follows: 
>>>>>>> 
>>>>>>> <!-- [rfced] ... --> 
>>>>>>> 
>>>>>>> These questions will also be sent in a subsequent email. 
>>>>>>> 
>>>>>>> * Changes submitted by coauthors 
>>>>>>> 
>>>>>>> Please ensure that you review any changes submitted by your 
>>>>>>> coauthors. We assume that if you do not speak up that you 
>>>>>>> agree to changes submitted by your coauthors. 
>>>>>>> 
>>>>>>> * Content 
>>>>>>> 
>>>>>>> Please review the full content of the document, as this cannot 
>>>>>>> change once the RFC is published. Please pay particular attention to: 
>>>>>>> - IANA considerations updates (if applicable) 
>>>>>>> - contact information 
>>>>>>> - references 
>>>>>>> 
>>>>>>> * Copyright notices and legends 
>>>>>>> 
>>>>>>> Please review the copyright notice and legends as defined in 
>>>>>>> RFC 5378 and the Trust Legal Provisions 
>>>>>>> (TLP – https://trustee.ietf.org/license-info). 
>>>>>>> 
>>>>>>> * Semantic markup 
>>>>>>> 
>>>>>>> Please review the markup in the XML file to ensure that elements of 
>>>>>>> content are correctly tagged. For example, ensure that <sourcecode> 
>>>>>>> and <artwork> are set correctly. See details at 
>>>>>>> <https://authors.ietf.org/rfcxml-vocabulary>. 
>>>>>>> 
>>>>>>> * Formatted output 
>>>>>>> 
>>>>>>> Please review the PDF, HTML, and TXT files to ensure that the 
>>>>>>> formatted output, as generated from the markup in the XML file, is 
>>>>>>> reasonable. Please note that the TXT will have formatting 
>>>>>>> limitations compared to the PDF and HTML. 
>>>>>>> 
>>>>>>> 
>>>>>>> Submitting changes 
>>>>>>> ------------------ 
>>>>>>> 
>>>>>>> To submit changes, please reply to this email using ‘REPLY ALL’ as all 
>>>>>>> the parties CCed on this message need to see your changes. The parties 
>>>>>>> include: 
>>>>>>> 
>>>>>>> * your coauthors 
>>>>>>> 
>>>>>>> * [email protected] (the RPC team) 
>>>>>>> 
>>>>>>> * other document participants, depending on the stream (e.g., 
>>>>>>> IETF Stream participants are your working group chairs, the 
>>>>>>> responsible ADs, and the document shepherd). 
>>>>>>> 
>>>>>>> * [email protected], which is a new archival mailing list 
>>>>>>> to preserve AUTH48 conversations; it is not an active discussion 
>>>>>>> list: 
>>>>>>> 
>>>>>>> * More info: 
>>>>>>> https://mailarchive.ietf.org/arch/msg/ietf-announce/yb6lpIGh-4Q9l2USxIAe6P8O4Zc
>>>>>>>  
>>>>>>> 
>>>>>>> * The archive itself: 
>>>>>>> https://mailarchive.ietf.org/arch/browse/auth48archive/ 
>>>>>>> 
>>>>>>> * Note: If only absolutely necessary, you may temporarily opt out 
>>>>>>> of the archiving of messages (e.g., to discuss a sensitive matter). 
>>>>>>> If needed, please add a note at the top of the message that you 
>>>>>>> have dropped the address. When the discussion is concluded, 
>>>>>>> [email protected] will be re-added to the CC list and 
>>>>>>> its addition will be noted at the top of the message. 
>>>>>>> 
>>>>>>> You may submit your changes in one of two ways: 
>>>>>>> 
>>>>>>> An update to the provided XML file 
>>>>>>> — OR — 
>>>>>>> An explicit list of changes in this format 
>>>>>>> 
>>>>>>> Section # (or indicate Global) 
>>>>>>> 
>>>>>>> OLD: 
>>>>>>> old text 
>>>>>>> 
>>>>>>> NEW: 
>>>>>>> new text 
>>>>>>> 
>>>>>>> You do not need to reply with both an updated XML file and an explicit 
>>>>>>> list of changes, as either form is sufficient. 
>>>>>>> 
>>>>>>> We will ask a stream manager to review and approve any changes that 
>>>>>>> seem 
>>>>>>> beyond editorial in nature, e.g., addition of new text, deletion of 
>>>>>>> text, 
>>>>>>> and technical changes. Information about stream managers can be found 
>>>>>>> in 
>>>>>>> the FAQ. Editorial changes do not require approval from a stream 
>>>>>>> manager. 
>>>>>>> 
>>>>>>> 
>>>>>>> Approving for publication 
>>>>>>> -------------------------- 
>>>>>>> 
>>>>>>> To approve your RFC for publication, please reply to this email stating 
>>>>>>> that you approve this RFC for publication. Please use ‘REPLY ALL’, 
>>>>>>> as all the parties CCed on this message need to see your approval. 
>>>>>>> 
>>>>>>> 
>>>>>>> Files 
>>>>>>> ----- 
>>>>>>> 
>>>>>>> The files are available here: 
>>>>>>> https://www.rfc-editor.org/authors/rfc9909.xml 
>>>>>>> https://www.rfc-editor.org/authors/rfc9909.html 
>>>>>>> https://www.rfc-editor.org/authors/rfc9909.pdf 
>>>>>>> https://www.rfc-editor.org/authors/rfc9909.txt 
>>>>>>> 
>>>>>>> Diff file of the text: 
>>>>>>> https://www.rfc-editor.org/authors/rfc9909-diff.html 
>>>>>>> https://www.rfc-editor.org/authors/rfc9909-rfcdiff.html (side by side) 
>>>>>>> 
>>>>>>> Diff of the XML: 
>>>>>>> https://www.rfc-editor.org/authors/rfc9909-xmldiff1.html 
>>>>>>> 
>>>>>>> 
>>>>>>> Tracking progress 
>>>>>>> ----------------- 
>>>>>>> 
>>>>>>> The details of the AUTH48 status of your document are here: 
>>>>>>> https://www.rfc-editor.org/auth48/rfc9909 
>>>>>>> 
>>>>>>> Please let us know if you have any questions. 
>>>>>>> 
>>>>>>> Thank you for your cooperation, 
>>>>>>> 
>>>>>>> RFC Editor 
>>>>>>> 
>>>>>>> -------------------------------------- 
>>>>>>> RFC9909 (draft-ietf-lamps-x509-slhdsa-09) 
>>>>>>> 
>>>>>>> Title : Internet X.509 Public Key Infrastructure: Algorithm Identifiers 
>>>>>>> for SLH-DSA 
>>>>>>> Author(s) : K. Bashiri, S. Fluhrer, S. Gazdag, D. Van Geest, S. 
>>>>>>> Kousidis 
>>>>>>> WG Chair(s) : Russ Housley, Tim Hollebeek 
>>>>>>> Area Director(s) : Deb Cooley, Paul Wouters 
>>>>>>> 

-- 
auth48archive mailing list -- [email protected]
To unsubscribe send an email to [email protected]

Reply via email to