Re: [Ace] I-D Action: draft-ietf-ace-usecases-10.txt

Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> Mon, 26 October 2015 16:34 UTC

Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BD2871B4F1B for <ace@ietfa.amsl.com>; Mon, 26 Oct 2015 09:34:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 33frw5Uw0NPi for <ace@ietfa.amsl.com>; Mon, 26 Oct 2015 09:34:40 -0700 (PDT)
Received: from mail-lf0-x231.google.com (mail-lf0-x231.google.com [IPv6:2a00:1450:4010:c07::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A62781B4F14 for <ace@ietf.org>; Mon, 26 Oct 2015 09:34:39 -0700 (PDT)
Received: by lffv3 with SMTP id v3so155566563lff.0 for <ace@ietf.org>; Mon, 26 Oct 2015 09:34:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type:content-transfer-encoding; bh=pUjqh5M+K1u2nibqPkkCYREHkztlDSvNUAQSevLlaGo=; b=okQjwCtOlAIemhBTABGRr8sQwnf1fptOedI9XUuN8VtfGGzwphmDOUtYbJlG/TAKTl TNgrwBOrXzORSfVkeuCX39WjJKF6ieQgMwF6pO1NKgWEQnm4u64q3qG7PDKj7YWJexXg PPfdbwsiZAudEiK3jf4XvgnRDJIfVDlheMYFAAsNckPRz6X59WwkNxMiA8X37VjqgVzR ez7MiWorLMY3voMF7clXqmTu67AGtA/L5+WiX51GYr0sP9Js+zjEvzpfHxIOvm9FTaNb evLrHP/9+jAZJKyZDWgzwsX8jnnD9ev/WFnrXJUTGaiPYht8sOWFNWGyu53ZBnBfqYKv mkGA==
MIME-Version: 1.0
X-Received: by 10.28.94.194 with SMTP id s185mr2251219wmb.90.1445877277708; Mon, 26 Oct 2015 09:34:37 -0700 (PDT)
Received: by 10.28.214.142 with HTTP; Mon, 26 Oct 2015 09:34:37 -0700 (PDT)
In-Reply-To: <20151026162327.10444.18407.idtracker@ietfa.amsl.com>
References: <20151026162327.10444.18407.idtracker@ietfa.amsl.com>
Date: Mon, 26 Oct 2015 12:34:37 -0400
Message-ID: <CAHbuEH7QKP0106iED3un5GPCPR+_mrQ6o_EqLW5VxTZdCPMnAg@mail.gmail.com>
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
To: "ace@ietf.org" <ace@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <http://mailarchive.ietf.org/arch/msg/ace/vxJnMCwbfQSeQYbkLq9w9CIGeWg>
Subject: Re: [Ace] I-D Action: draft-ietf-ace-usecases-10.txt
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Oct 2015 16:34:41 -0000

Nice job to all who edited and contributed to this use case draft!
The IESG review went very smoothly with many more YES ballots than
normal.  The draft was easy to read and helpful to many.  It will now
move into the RFC editor queue, so there is a little more work to do
before it gets an RFC number.

Thank you,
Kathleen

On Mon, Oct 26, 2015 at 12:23 PM,  <internet-drafts@ietf.org> wrote:
>
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
>  This draft is a work item of the Authentication and Authorization for Constrained Environments Working Group of the IETF.
>
>         Title           : Use Cases for Authentication and Authorization in Constrained Environments
>         Authors         : Ludwig Seitz
>                           Stefanie Gerdes
>                           Göran Selander
>                           Mehdi Mani
>                           Sandeep S. Kumar
>         Filename        : draft-ietf-ace-usecases-10.txt
>         Pages           : 29
>         Date            : 2015-10-26
>
> Abstract:
>    Constrained devices are nodes with limited processing power, storage
>    space and transmission capacities.  These devices in many cases do
>    not provide user interfaces and are often intended to interact
>    without human intervention.
>
>    This document includes a collection of representative use cases for
>    authentication and authorization in constrained environments.  These
>    use cases aim at identifying authorization problems that arise during
>    the lifecycle of a constrained device and are intended to provide a
>    guideline for developing a comprehensive authentication and
>    authorization solution for this class of scenarios.
>
>    Where specific details are relevant, it is assumed that the devices
>    use the Constrained Application Protocol (CoAP) as communication
>    protocol, however most conclusions apply generally.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-ace-usecases/
>
> There's also a htmlized version available at:
> https://tools.ietf.org/html/draft-ietf-ace-usecases-10
>
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-ace-usecases-10
>
>
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> Ace mailing list
> Ace@ietf.org
> https://www.ietf.org/mailman/listinfo/ace



-- 

Best regards,
Kathleen