So are we back to "Revised I-D Needed" here, or is it ready?

On Wed, Jul 29, 2020 at 12:27 PM Benjamin Kaduk <[email protected]> wrote:

> Hi Jim,
>
> Perhaps I should be feeling slightly stupid, but was the -07 intended to do
> anything other than update the version of some references (which is what it
> looks like from here)?
>
> Thanks,
>
> Ben
>
> On Wed, Jul 29, 2020 at 12:12:58PM -0700, Jim Schaad wrote:
> > Murray,
> >
> > I am feeling slightly stupid at the moment.  I was sure that I had
> uploaded
> > this version of the document to the Datatracker and after the meeting
> today
> > I looked and found out that I hadn't.  I think this version addresses
> all of
> > the IESG comments along with anything else that was floating around.
> >
> > And of course as soon as I had posted the last version I remembered that
> I
> > had not made an edit that was highlighted by Russ.
> >
> > Jim
> >
> >
> >
> > -----Original Message-----
> > From: COSE <[email protected]> On Behalf Of [email protected]
> > Sent: Wednesday, July 29, 2020 12:11 PM
> > To: [email protected]
> > Cc: [email protected]
> > Subject: [COSE] I-D Action: draft-ietf-cose-hash-algs-08.txt
> >
> >
> > A New Internet-Draft is available from the on-line Internet-Drafts
> > directories.
> > This draft is a work item of the CBOR Object Signing and Encryption WG of
> > the IETF.
> >
> >         Title           : CBOR Object Signing and Encryption (COSE): Hash
> > Algorithms
> >         Author          : Jim Schaad
> >       Filename        : draft-ietf-cose-hash-algs-08.txt
> >       Pages           : 12
> >       Date            : 2020-07-29
> >
> > Abstract:
> >    The CBOR Object Signing and Encryption (COSE) syntax
> >    [I-D.ietf-cose-rfc8152bis-struct] does not define any direct methods
> >    for using hash algorithms.  There are, however, circumstances where
> >    hash algorithms are used, such as indirect signatures where the hash
> >    of one or more contents are signed, and X.509 certificate or other
> >    object identification by the use of a fingerprint.  This document
> >    defines a set of hash algorithms that are identified by COSE
> >    Algorithm Identifiers.
> >
> >
> > The IETF datatracker status page for this draft is:
> > https://datatracker.ietf.org/doc/draft-ietf-cose-hash-algs/
> >
> > There are also htmlized versions available at:
> > https://tools.ietf.org/html/draft-ietf-cose-hash-algs-08
> > https://datatracker.ietf.org/doc/html/draft-ietf-cose-hash-algs-08
> >
> > A diff from the previous version is available at:
> > https://www.ietf.org/rfcdiff?url2=draft-ietf-cose-hash-algs-08
> >
> >
> > Please note that it may take a couple of minutes from the time of
> submission
> > until the htmlized version and diff are available at tools.ietf.org.
> >
> > Internet-Drafts are also available by anonymous FTP at:
> > ftp://ftp.ietf.org/internet-drafts/
> >
> >
> > _______________________________________________
> > COSE mailing list
> > [email protected]
> > https://www.ietf.org/mailman/listinfo/cose
> >
> > _______________________________________________
> > COSE mailing list
> > [email protected]
> > https://www.ietf.org/mailman/listinfo/cose
>
_______________________________________________
COSE mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/cose

Reply via email to