[Ace] Standardizing Attestation Tokens

Hannes Tschofenig <Hannes.Tschofenig@arm.com> Thu, 21 June 2018 15:11 UTC

Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A9CF0130EC0 for <ace@ietfa.amsl.com>; Thu, 21 Jun 2018 08:11:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MwOr1ACYNXCb for <ace@ietfa.amsl.com>; Thu, 21 Jun 2018 08:11:37 -0700 (PDT)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-ve1eur01on0065.outbound.protection.outlook.com [104.47.1.65]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5EF0A1310BD for <ace@ietf.org>; Thu, 21 Jun 2018 08:11:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=bSE24qi3DacF6+Hw887wPdJNHGas4yHqLjuYABzKqR4=; b=i+ZKWO8QEiFeEbnWaFIYNLu0TeNTKFeFPGOcPNpfKQBu9sqCiea1xP+f/4Ir7mwtRWTtvJzpZ1CXHb+yMU5NpROdA32xb4CFXLSfMgH+ak763W5Zuxdhegpciy0ot5r08DYboxgxioc/tt/307RroG6xM1ZQQwogXisqxGJLBtI=
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com (10.173.75.16) by VI1PR0801MB1438.eurprd08.prod.outlook.com (10.167.210.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.863.19; Thu, 21 Jun 2018 15:11:33 +0000
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::d1df:1498:96ec:6b35]) by VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::d1df:1498:96ec:6b35%4]) with mapi id 15.20.0863.016; Thu, 21 Jun 2018 15:11:33 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: "ace@ietf.org" <ace@ietf.org>
Thread-Topic: Standardizing Attestation Tokens
Thread-Index: AdQJcgoqgXwfLEtqRz6hxwJZ4JJxBQ==
Date: Thu, 21 Jun 2018 15:11:33 +0000
Message-ID: <VI1PR0801MB2112C81D9FA2DA83D4797877FA760@VI1PR0801MB2112.eurprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Hannes.Tschofenig@arm.com;
x-originating-ip: [217.140.96.140]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR0801MB1438; 7:IPKu9KIVImZjDcrbl5T4QokQOe1Rtrm2i9BZAMZtVXAZgvLmhKRxpdtoiHzQtktHU4ALUHOaNnW8QDNbjOCr68ISF3IyxWB6YQIFGQtONkjL834zndWMPJyq5lsjkxKb7Kz51FSDwSQDWpq7dMcBQ65EtKDdEzLFsb42WjJQgfTPpGw1DAhJPfnUeOBnsyrpZ4cU/G9ut17YfZhGzgAksDMPt4CFyWWUf1QGdi747ZLu3pHlsKqxSoDUL44E4w9i
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 2ab16f3b-0879-44ad-5410-08d5d789468b
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(4534165)(4627221)(201703031133081)(201702281549075)(5600026)(711020)(48565401081)(2017052603328)(7153060)(7193020); SRVR:VI1PR0801MB1438;
x-ms-traffictypediagnostic: VI1PR0801MB1438:
x-microsoft-antispam-prvs: <VI1PR0801MB1438F00E0D46FEAC2265E302FA760@VI1PR0801MB1438.eurprd08.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(21748063052155);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(10201501046)(93006095)(93001095)(3231254)(944501410)(52105095)(3002001)(6055026)(149027)(150027)(6041310)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(20161123562045)(20161123560045)(20161123564045)(6072148)(201708071742011)(7699016); SRVR:VI1PR0801MB1438; BCL:0; PCL:0; RULEID:; SRVR:VI1PR0801MB1438;
x-forefront-prvs: 07106EF9B9
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(396003)(376002)(39380400002)(346002)(39860400002)(40434004)(199004)(189003)(53754006)(7116003)(53936002)(2906002)(5660300001)(66066001)(3846002)(8676002)(5630700001)(3660700001)(81166006)(81156014)(6916009)(3280700002)(33656002)(6116002)(790700001)(1730700003)(25786009)(2501003)(6506007)(316002)(59450400001)(26005)(99286004)(5890100001)(7696005)(102836004)(2900100001)(476003)(186003)(5250100002)(86362001)(68736007)(486006)(97736004)(478600001)(14454004)(74316002)(72206003)(8936002)(106356001)(105586002)(7736002)(5640700003)(3480700004)(9686003)(55016002)(6306002)(6436002)(54896002)(966005)(2351001); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR0801MB1438; H:VI1PR0801MB2112.eurprd08.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: CCa+z9ccoEzHuyZglB+LKJXIo7oN14CQKjGOEuz67+6J/BbeNvBwaE7TEPbe2YhERY1ACMTinkU0yLJg0isLnM/vHsIremNRyYMTqrLFd/I8XPaju0b+gksxQxbeKOUZyo8Yy84Pa6tHT/sF97PhHy4R84sPpTF0rHPO5O9KYQagRy7ccwOv2lfEjDcPm77tOhMBdu/LIRDDHc0h5dwIcSCSY/Jrfn8+JxweXX4wSQ2NO/Zj8gmdG2r9oYWeQmzkR4d5tWU6GgN/zv7OcLxny76ZcfQtrNMqDE7F+DamuTgSUN6MJh/uE34KZ6eM7Vf/vFCta0unucpFuxRrRaCijA==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR0801MB2112C81D9FA2DA83D4797877FA760VI1PR0801MB2112_"
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2ab16f3b-0879-44ad-5410-08d5d789468b
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Jun 2018 15:11:33.5499 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB1438
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/P94WvwVhaCzKoOe_0hoA4RoJJAA>
Subject: [Ace] Standardizing Attestation Tokens
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 21 Jun 2018 15:11:41 -0000

Hi all,

I would like to make you aware of work that will be discussed on attestation on the EAT mailing list. Here is the link to the list:
https://www.ietf.org/mailman/listinfo/eat

Here is a document describing the idea:
https://tools.ietf.org/html/draft-mandyam-eat-00

The work is relevant for IoT and non-IoT devices.

Laurence and I are planning to organize a Bar BOF at the Montreal IETF meeting to entertain the idea.

Ciao
Hannes

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.