Javascript disabled? Like other modern websites, the IETF Datatracker relies on Javascript.
Please enable Javascript for full functionality.
Active IETF working groups
Applications and Real-Time Area (ART)
ART Area Directors (ADs)
ART active WGs (26)
| Group | Responsible AD | Name | Chairs |
|---|---|---|---|
| Andy Newton | Automatic SIP trunking And Peering | Jean Mahoney , Gonzalo Salgueiro | |
| Orie Steele | A Semantic Definition Format for Data and Interactions of Things | Lorenzo Corneo , Michael Richardson | |
| Orie Steele | Calendaring Extensions | Bron Gondwana , Daniel Migault | |
| Andy Newton | Concise Binary Object Representation Maintenance and Extensions | Christian Amsüss , Paul E. Hoffman , Barry Leiba | |
| Orie Steele | Codec Encoding for LossLess Archiving and Realtime transmission | Spencer Dawkins , Robert Sparks | |
| Orie Steele | Domain Connect | Hans-Jörg Happel , Peter Thomassen | |
| Orie Steele | Digital Emblems | Tommy Jensen , Rohan Mahy | |
| Orie Steele | Dispatch | Jim Fenton , Shuping Peng | |
| Andy Newton | Domain Keys Identified Mail | Murray Kucherawy , Pete Resnick | |
| Andy Newton | Domain-based Message Authentication, Reporting & Conformance | Seth Blank , Barry Leiba | |
| Andy Newton | Emergency Context Resolution with Internet Technologies | Brandon Abley , Randall Gellens | |
| Andy Newton | Revision of core Email specifications | Murray Kucherawy , Alexey Melnikov | |
| Orie Steele | JSON Mail Access Protocol | Jim Fenton , Bron Gondwana | |
| Andy Newton | Mail Maintenance | Murray Kucherawy , Kenneth Murchison | |
| Andy Newton | Media Type Maintenance | Harald T. Alvestrand , A.J. Stein | |
| Orie Steele | More Instant Messaging Interoperability | Alissa Cooper , Tim Geoghegan | |
| Orie Steele | Machine Learning for Audio Coding | Greg Maxwell , Mo Zanaty | |
| Andy Newton | Open Cloud Mesh | Lisa M. Dusseault , Thibault Meunier | |
| Orie Steele | Registration Protocols Extensions | Jorge Cano , James Galvin , Antoin Verschuren | |
| Orie Steele | RESTful Provisioning Protocol | Gavin Brown , Marco Davids | |
| Orie Steele | Secure Asset Transfer Protocol | Claire , Wes Hardaker | |
| Andy Newton | Session Initiation Protocol Core | Paul Kyzivat , Brian Rosen | |
| Andy Newton | Structured Email | Arnt Gulbrandsen , Alexey Melnikov | |
| Orie Steele | Secure Telephone Identity Revisited | Ben Campbell , Russ Housley | |
| Andy Newton | Virtualized Conversations | Brian Rosen , Chris Wendt | |
| Orie Steele | Workload Identity in Multi System Environments | Pieter Kasselman , Justin Richer |
General Area (GEN)
GEN Area Director (AD)
GEN active WGs (4)
| Group | Responsible AD | Name | Chairs |
|---|---|---|---|
| Roman Danyliw | General Area Dispatch | Shuping Peng , Martin Vigoureux | |
| Roman Danyliw | Update to IANA Considerations | Ted Hardie , Murray Kucherawy | |
| Roman Danyliw | MODeration PrOceDures | Lisa M. Dusseault , Jon Peterson | |
| Roman Danyliw | Process Document Consolidation | Jari Arkko , Leslie Daigle |
Internet Area (INT)
INT Area Directors (ADs)
INT active WGs (15)
Operations and Management Area (OPS)
OPS Area Directors (ADs)
OPS active WGs (17)
Routing Area (RTG)
RTG Area Directors (ADs)
RTG active WGs (22)
Security Area (SEC)
SEC Area Directors (ADs)
SEC active WGs (32)
| Group | Responsible AD | Name | Chairs |
|---|---|---|---|
| Paul Wouters | Authentication and Authorization for Constrained Environments | Tim Hollebeek , Loganaden Velvindron | |
| Deb Cooley | Automated Certificate Management Environment | Yoav Nir , Mike Ounsworth | |
| Paul Wouters | CBOR Object Signing and Encryption | Michael B. Jones , Ivaylo Petrov | |
| Paul Wouters | DANE Authentication for Network Clients Everywhere | Wes Hardaker , Joey Salazar | |
| Deb Cooley | Detecting Unwanted Location Trackers | Erica Olsen , Sean Turner | |
| Paul Wouters | EAP Method Update | Joseph A. Salowey , Peter E. Yee | |
| Deb Cooley | HPKE Publication, Kept Efficient | Yaroslav Rosomakho , Martin Thomson | |
| Deb Cooley | IP Security Maintenance and Extensions | Tero Kivinen , Yoav Nir | |
| Deb Cooley | Javascript Object Signing and Encryption | John Bradley , John Preuß Mattsson , Karen O'Donoghue | |
| Deb Cooley | Key Transparency | Prachi Jain , Shivan Kaul Sahib | |
| Paul Wouters | Common Authentication Technology Next Generation | Benjamin Kaduk , Alexey Melnikov | |
| Paul Wouters | Lightweight Authenticated Key Exchange | Renzo Navas , Mališa Vučinić | |
| Deb Cooley | Limited Additional Mechanisms for PKIX and SMIME | Tim Hollebeek , Russ Housley | |
| Paul Wouters | Messaging Layer Security | Nick Sullivan , Sean Turner | |
| Deb Cooley | Web Authorization Protocol | Rifaat Shekh-Yusef , Hannes Tschofenig | |
| Mike Bishop | Oblivious HTTP Application Intermediation | Richard Barnes , Shivan Kaul Sahib (Assigned AD: Mike Bishop ) | |
| Paul Wouters | Open Specification for Pretty Good Privacy | Stephen Farrell , Daniel Kahn Gillmor | |
| Deb Cooley | Privacy Preserving Measurement | Benjamin M. Schwartz , Sam Weiler | |
| Paul Wouters | Post-Quantum Use In Protocols | Sofia Celi , Paul E. Hoffman | |
| Paul Wouters | Privacy Pass | Joseph A. Salowey , Benjamin M. Schwartz | |
| Paul Wouters | RADIUS EXTensions | Margaret Cullen , Valery Smyslov | |
| Deb Cooley | Remote ATtestation ProcedureS | Kathleen Moriarty , Ned Smith | |
| Deb Cooley | System for Cross-domain Identity Management | Nancy Cam-Winget , Aaron Parecki | |
| Deb Cooley | Supply Chain Integrity, Transparency, and Trust | Jon Geater , Christopher Inacio | |
| Paul Wouters | Secure Evidence and Attestation Transport | Nancy Cam-Winget , Yaroslav Rosomakho | |
| Paul Wouters | Security Dispatch | Daniel Kahn Gillmor , Rifaat Shekh-Yusef | |
| Paul Wouters | Secure Patterns for Internet CrEdentials | Heather Flanagan , Martin Thomson | |
| Deb Cooley | Secure Shell Maintenance | Stephen Farrell , Job Snijders | |
| Deb Cooley | Software Updates for Internet of Things | Jacqueline McCall , Akira Tsukamoto | |
| Paul Wouters | Trusted Execution Environment Provisioning | Nancy Cam-Winget , Tirumaleswar Reddy.K | |
| Paul Wouters | Transport Layer Security | Deirdre Connolly , Joseph A. Salowey , Sean Turner | |
| Paul Wouters | Using TLS in Applications | Alan DeKok , Valery Smyslov |