[Ace] Fwd: New Version Notification for draft-ietf-ace-actors-06.txt

Carsten Bormann <cabo@tzi.org> Tue, 14 November 2017 00:12 UTC

Return-Path: <cabo@tzi.org>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4619D1200CF for <ace@ietfa.amsl.com>; Mon, 13 Nov 2017 16:12:39 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.198
X-Spam-Level:
X-Spam-Status: No, score=-4.198 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HD3ub-BYUeJF for <ace@ietfa.amsl.com>; Mon, 13 Nov 2017 16:12:37 -0800 (PST)
Received: from mailhost.informatik.uni-bremen.de (mailhost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9802112421A for <ace@ietf.org>; Mon, 13 Nov 2017 16:12:37 -0800 (PST)
X-Virus-Scanned: amavisd-new at informatik.uni-bremen.de
Received: from submithost.informatik.uni-bremen.de (submithost.informatik.uni-bremen.de [134.102.201.11]) by mailhost.informatik.uni-bremen.de (8.14.5/8.14.5) with ESMTP id vAE0CXTb016193 for <ace@ietf.org>; Tue, 14 Nov 2017 01:12:33 +0100 (CET)
Received: from dhcp-9924.meeting.ietf.org (dhcp-9924.meeting.ietf.org [31.133.153.36]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by submithost.informatik.uni-bremen.de (Postfix) with ESMTPSA id 3ybScv67NMzDXFS; Tue, 14 Nov 2017 01:12:31 +0100 (CET)
From: Carsten Bormann <cabo@tzi.org>
Content-Type: multipart/alternative; boundary="Apple-Mail=_8DD79E1E-3B50-4D55-B093-3B715751BC17"
X-Mao-Original-Outgoing-Id: 532311148.54357-0af0da3d1b16e8629a4b2e4f6593b295
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Date: Tue, 14 Nov 2017 08:12:28 +0800
Message-Id: <C9B6EAA9-BEE7-47C3-B7A9-C7BEC3561442@tzi.org>
References: <151061792877.6045.899077932098408506.idtracker@ietfa.amsl.com>
To: ace <ace@ietf.org>
X-Mailer: Apple Mail (2.3273)
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/YvE9S4T-Ew8eAVdwAojM5SNm5Bk>
Subject: [Ace] Fwd: New Version Notification for draft-ietf-ace-actors-06.txt
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 14 Nov 2017 00:12:39 -0000

I have submitted an update to the actors draft, now addressing all outstanding (in both senses of the word!) comments from Robin Wilton.

I have not been able to coordinate this with all the authors, so I expect one more editing round before WGLC.
One thing we could do in that next round is to remove material that really is about security considerations of IoT in general (and not about security considerations of the actors model); we now have draft-irtf-t2trg-core-security to point to.

Ceterum censeo: I renew my plea to return to sane terminology.

See (many of) you in 80 minutes...

Grüße, Carsten


> Begin forwarded message:
> 
> From: internet-drafts@ietf.org <mailto:internet-drafts@ietf.org>
> Subject: New Version Notification for draft-ietf-ace-actors-06.txt
> Date: November 14, 2017 at 08:05:28 GMT+8
> To: "Ludwig Seitz" <ludwig.seitz@ri.se <mailto:ludwig.seitz@ri.se>>, "Carsten Bormann" <cabo@tzi.org <mailto:cabo@tzi.org>>, "Goeran Selander" <goran.selander@ericsson.com <mailto:goran.selander@ericsson.com>>, "Stefanie Gerdes" <gerdes@tzi.org <mailto:gerdes@tzi.org>>
> 
> 
> A new version of I-D, draft-ietf-ace-actors-06.txt
> has been successfully submitted by Carsten Bormann and posted to the
> IETF repository.
> 
> Name:		draft-ietf-ace-actors
> Revision:	06
> Title:		An architecture for authorization in constrained environments
> Document date:	2017-11-14
> Group:		ace
> Pages:		33
> URL:            https://www.ietf.org/internet-drafts/draft-ietf-ace-actors-06.txt <https://www.ietf.org/internet-drafts/draft-ietf-ace-actors-06.txt>
> Status:         https://datatracker.ietf.org/doc/draft-ietf-ace-actors/ <https://datatracker.ietf.org/doc/draft-ietf-ace-actors/>
> Htmlized:       https://tools.ietf.org/html/draft-ietf-ace-actors-06 <https://tools.ietf.org/html/draft-ietf-ace-actors-06>
> Htmlized:       https://datatracker.ietf.org/doc/html/draft-ietf-ace-actors-06 <https://datatracker.ietf.org/doc/html/draft-ietf-ace-actors-06>
> Diff:           https://www.ietf.org/rfcdiff?url2=draft-ietf-ace-actors-06 <https://www.ietf.org/rfcdiff?url2=draft-ietf-ace-actors-06>
> 
> Abstract:
>   Constrained-node networks are networks where some nodes have severe
>   constraints on code size, state memory, processing capabilities, user
>   interface, power and communication bandwidth (RFC 7228).
> 
>   This document provides terminology, and identifies the elements that
>   an architecture needs to address, providing a problem statement, for
>   authentication and authorization in these networks.