WG Review: Open Cloud Mesh (ocm)

The IESG <iesg-secretary@ietf.org> Fri, 10 October 2025 16:22 UTC

Return-Path: <iesg-secretary@ietf.org>
X-Original-To: ietf-announce@ietf.org
Delivered-To: ietf-announce@mail2.ietf.org
Received: from [10.244.8.144] (unknown [4.156.85.76]) by mail2.ietf.org (Postfix) with ESMTP id 2E7F970D21C4; Fri, 10 Oct 2025 09:22:13 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>
Subject: WG Review: Open Cloud Mesh (ocm)
X-Test-IDTracker: no
X-IETF-IDTracker: 12.50.0
Auto-Submitted: auto-generated
Precedence: bulk
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Message-ID: <176011333312.146822.9809922450720719766@dt-datatracker-84f8f646b-tg6mn>
Date: Fri, 10 Oct 2025 09:22:13 -0700
Message-ID-Hash: CVNKDQHQFKXFM6XWQYTZW4NCATXH43AM
X-Message-ID-Hash: CVNKDQHQFKXFM6XWQYTZW4NCATXH43AM
X-MailFrom: iesg-secretary@ietf.org
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-ietf-announce.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: ocm@ietf.org
X-Mailman-Version: 3.3.9rc6
Reply-To: iesg@ietf.org
List-Id: "IETF announcement list. No discussions." <ietf-announce.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/ietf-announce/r2qmXwC0nDvAfvKCyedAD1cCylQ>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ietf-announce>
List-Help: <mailto:ietf-announce-request@ietf.org?subject=help>
List-Owner: <mailto:ietf-announce-owner@ietf.org>
List-Post: <mailto:ietf-announce@ietf.org>
List-Subscribe: <mailto:ietf-announce-join@ietf.org>
List-Unsubscribe: <mailto:ietf-announce-leave@ietf.org>

A new IETF WG has been proposed in the Applications and Real-Time Area. The
IESG has not made any determination yet. The following draft charter was
submitted, and is provided for informational purposes only. Please send your
comments to the IESG mailing list (iesg@ietf.org) by 2025-10-20.

Open Cloud Mesh (ocm)
-----------------------------------------------------------------------
Current status: Proposed WG

Chairs:
  Lisa Dusseault <lisa.dusseault@gmail.com>

Assigned Area Director:
  Andy Newton <andy@hxr.us>

Applications and Real-Time Area Directors:
  Orie Steele <orie@or13.io>
  Andy Newton <andy@hxr.us>

Mailing list:
  Address: ocm@ietf.org
  To subscribe: https://www.ietf.org/mailman/listinfo/ocm
  Archive: https://mailarchive.ietf.org/arch/browse/ocm/

Group page: https://datatracker.ietf.org/group/ocm/

Charter: https://datatracker.ietf.org/doc/charter-ietf-ocm/

# Introduction & Background

Open Cloud Mesh (OCM) is a server-to-server protocol designed to enable
federation between Enterprise File Sync and Share (EFSS) platforms.
Initially conceived of in 2015 and deployed since 2016, OCM has been
implemented by several platforms. This working group seeks to formally
specify OCM.

A core use case of OCM is when a user with file-sharing functionality
within one administrative domain wishes to provide file access to a
user in another administrative domain without transferring the resource
itself. When many administrative domains are involved (e.g., many
universities and research centers with cross-collaboration) it becomes hard
to allow users to log into each others' administrative domains. Instead, a
federated system has been built to allow servers in one domain to connect to
trusted servers in other domains and make shared data available to their own
logged-in users.

OCM defines the exchange up to the point where other established
protocols such as WebDAV or JMAP can take over. This layered design
makes OCM agnostic to the underlying data exchange
mechanisms, enabling seamless integration between diverse systems.

The OCM specification has now grown
to a level of maturity where it will be useful to converge on a set of
features in a stable specification for vendors to build to or update to.

The architectural context for OCM is therefore federated servers already
providing an interoperable interface within their individual contexts,
but requiring share mechanisms that cross administative boundaries, using
pre-existing trust mechanisms.

# Scope

The OCM WG will produce Standards Track specification(s)
for OCM's share/invite functionality. With these
specifications the WG will:

* Cover general flows and structure of the protocol,
* Define extensible data models for objects conveyed in the protocol,
* Explain trust decisions and how trust can be established before
resources can be securely shared,
* Describe server-to-server invitations,
* Describe requirements around sending and receiving shares
* Describe requirements for managing active shares
* Consider whether operations, management or scaling of OCM servers
requires any requirements or recommenations,
* Consider extensibility in the protocol, data model and discovery
mechanisms
* Develop security considerations

The working group will **not** define new data transfer protocols or
mechanisms unrelated to server-to-server federation and metadata
exchange. Instead, established protocols such as WebDAV will be used
for actual data transfer.

OCM does not aim to address identity federation (e.g., OIDC or SAML);
rather, it leverages existing protocols for identity and authentication
where appropriate.  OCM also does not propose to create interoperable
protocol flows to establish trust relationships where there are none
before; instead the WG will explain how trust relationships set up
out-of-band (e.g., configuration of server settings or allow lists)
are required for secure sharing.

OCM is not a user-oriented messaging or social media
protocol like ActivityPub or Matrix federation, but addresses
different use cases focused on content federation and metadata
exchange.

# Deliverables

* One specification or family of specifications, that describe
OCM Invite/Share functionality and associated considerations such as
operational and security considerations.

Milestones:

  Dec 2026 - Request publication of the specification(s) for OCM.