Re: [Cbor] Reminder and call for agenda: CBOR WG Virtual Meeting on 2023-03-08

Christopher Allen <christophera@lifewithalacrity.com> Mon, 06 March 2023 21:14 UTC

Return-Path: <christophera@lifewithalacrity.com>
X-Original-To: cbor@ietfa.amsl.com
Delivered-To: cbor@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65C7BC152EF0 for <cbor@ietfa.amsl.com>; Mon, 6 Mar 2023 13:14:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.895
X-Spam-Level:
X-Spam-Status: No, score=-1.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=lifewithalacrity-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QJE96L21QLhY for <cbor@ietfa.amsl.com>; Mon, 6 Mar 2023 13:14:11 -0800 (PST)
Received: from mail-ed1-x530.google.com (mail-ed1-x530.google.com [IPv6:2a00:1450:4864:20::530]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F0F51C14F726 for <cbor@ietf.org>; Mon, 6 Mar 2023 13:13:44 -0800 (PST)
Received: by mail-ed1-x530.google.com with SMTP id g3so44477392eda.1 for <cbor@ietf.org>; Mon, 06 Mar 2023 13:13:44 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lifewithalacrity-com.20210112.gappssmtp.com; s=20210112; t=1678137223; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=iETw3Qjea/0KdGhncEaxm5Pf8pjtdF7vX/lmhgG27io=; b=COeBPBZWGqt2zG/hsJsYPuYtC6MnucSOANX6qY9U9wCzOBjq1cbKQBNupE6PxeO/Ns FmmQj2kExXomPgGmTnsqGN1FJydDD+GT4ZJNLzufw0ADECoGThVrQ3CiruR5UB+3D7+f Yf7ndg9O+MLj5ZJ7iOhqbKchaqfwRZ7eTwBe0OgogxaiQODFgBSWNQL2EfBiGTvab0J/ XVVG1CQKK3U5WECfl07WRlrCAtVKcaiOBuEAXtKE+Y1drTqUmN121wubVN9p3AADH4wK mvV9OgvU7I+ihb4DFKQ8B+Iond8NxkE4NtUC07rlVgZWCekTtPaKh1Q8M8OgEaqbTG38 tB3Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1678137223; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=iETw3Qjea/0KdGhncEaxm5Pf8pjtdF7vX/lmhgG27io=; b=cXITHV8qAWk+/ITPlVr7Eey5RfebyoihNGEx4lQhRecXxzBr740PnUwzmodr8NYldw iDnKDprZJCtkHPWNqIDKFHFKQIdWH7SKvsweBO9ui7czEAOnoXcEd4uf7c26lHw+a1E5 /7nlBmvPPqjAURm6rzetkuGZLalALlKOGS990N3bvSk0E8aXq765PtKThjtkBHjLxZqu bFMOJcLfzatGzbMc0Na5kFakidT1Fmq7w3uOIwz2IpQIASBpgDomLsmMHBamWGTJv0MY o4sPIDwsmVWhW1NJi1MyCvYmEcEqLD60GIy8PiY/bbwc0ga8BH3+9d3/Ug9KNNn2tZXJ Q9EA==
X-Gm-Message-State: AO0yUKWfaQtysOkSmjs5VRYXcaB+G/NpNaR58Bqq0YXRId7nl5VR9+O7 hECElHjAP3xjVxqnHUVWpvBH8dHUYHBoX2njrwm3fw==
X-Google-Smtp-Source: AK7set/M4uFv9t2NtmMxruGCBhkpFm03gV3YUZoaQjnZ5BFyBRNVVWKwINOBBXJkUfSrzhFwsgt/2L+IWJIyo8ZxlVM=
X-Received: by 2002:a17:906:3090:b0:8ea:a647:ae5d with SMTP id 16-20020a170906309000b008eaa647ae5dmr5606749ejv.13.1678137223358; Mon, 06 Mar 2023 13:13:43 -0800 (PST)
MIME-Version: 1.0
References: <CALaySJJ8kwtR8y9us4Qi49KFAYwus0uBoRi49rMsEO4smwfKSA@mail.gmail.com> <CALaySJJqusJ=6X06Ee4UrhQp236h079Ng3MLbTgEzEd4=9EUhQ@mail.gmail.com> <CALaySJLGk9Ztg_kMmvk=PW+=2SLf1Bkb-kmQyPz=Dbs8=DuXMA@mail.gmail.com> <CAAse2dH3KKmRWmZvg9Nk9iF+CPVXkRDcSh1nUj6j7KmnchPCWQ@mail.gmail.com> <84270959-1304-47F6-BC51-99B8335B885C@tzi.org>
In-Reply-To: <84270959-1304-47F6-BC51-99B8335B885C@tzi.org>
From: Christopher Allen <christophera@lifewithalacrity.com>
Date: Mon, 06 Mar 2023 13:13:32 -0800
Message-ID: <CAAse2dHvo+y38PxXuCLrT4ohm5ySbOZ+gS4JPsBvGuEzwK_-HQ@mail.gmail.com>
To: Carsten Bormann <cabo@tzi.org>
Cc: Barry Leiba <barryleiba@computer.org>, Anders Rundgren <anders.rundgren.net@gmail.com>, Christian Amsüss <christian@amsuess.com>, Shannon.Appelcline@gmail.com, cbor@ietf.org, wolf@wolfmcnally.com, "Pengshuping (Peng Shuping)" <pengshuping@huawei.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/cbor/sY9yAl9_y7oFrL1nJ960U1uJUIQ>
Subject: Re: [Cbor] Reminder and call for agenda: CBOR WG Virtual Meeting on 2023-03-08
X-BeenThere: cbor@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Concise Binary Object Representation \(CBOR\)" <cbor.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cbor>, <mailto:cbor-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cbor/>
List-Post: <mailto:cbor@ietf.org>
List-Help: <mailto:cbor-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cbor>, <mailto:cbor-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 06 Mar 2023 21:14:12 -0000

On Mon, Mar 6, 2023 at 3:02 AM Carsten Bormann <cabo@tzi.org> wrote:
> I can’t speak for the whole community, but I am sure interested in any implications your implementation might have on standardization.
> I think the CBOR meeting at IETF 116 will be a bit cramped for the discussion content we should be having, so doing this at an interim probably works better.

We'd be glad to do so when you are ready (and somewhat relieved not to
have to be in best form at 11pm PDT).

> I don’t know what you are trying to achieve at DISPATCH; this group is for finding the right place for starting new work, not contributions to existing work (unless they are substantial enough to actually amount for new work).

We approached them more about Gordian Envelope, which is not clear if
this group is interested in supporting, but other groups might be, or
it could be a new stand-alone group. Though it only has one
cryptographic operation, a hash function, its purpose is privacy
through elision & proofs of inclusion, thus crossing IETF group
boundaries. In our design, the other cryptographic features are in
different layers and thus could use COSE, mDOC, or other emerging
CBOR-based signature methods.

> > Similarly, is there interest in this community about to discuss about our Gordian Envelope draft https://datatracker.ietf.org/doc/draft-mcnally-envelope/ ? We plan to attend in person the San Francisco IETF meeting and hope there will be sufficient interest in Gordian Envelope for a BOF.
>
> A BOF is a very formal thing in the IETF which takes months of preparation.
> I think you mean what we call a “side meeting” (because the term BOF is taken for that formal thing).
> Side meetings have a heavy multi-track problem, but can draw in people who would not otherwise invest time.
> Such a side meeting probably needs to be announced in groups such as secdispatch and saag — this is a security protocol that just happens to use CBOR (kudos for that, of course).

Thanks — this is what we hoped to learn from Dispatch how to do best.
I was not aware of a separate SecDispatch. I had presumed bringing it
up in SAAG was too broad for us until we could demonstrate more IETF
membership support.

Yes, a side meeting would be great if a BOF is too challenging. Any
advice on how to proceed is appreciated.

> Leafing through the draft, there are a lot of things that might require rethinking in the IETF (say, BLAKE3???).

Thank you for taking a look!

We will have an updated draft -01 this week, based on feedback from
many parties, including one of the co-authors of BLAKE, and have
decided we can't fully take advantage of its capabilities, and thus
will be using SHA-256.

> (At some point we should be talking about assigning the tags that are squatted on by this draft, but maybe talking about the content is first.)

As we understand it, the range of numbers that we've suggested
("squatted on" ;-] ) in our draft only has a "specification required"
requirement, which our I-D offers. There are certainly examples of
others in this range that are not even I-D.

We decided not to apply quite yet in case there were questions. Should
we go ahead and apply now? If there is something missing from the
official docs about the requirements for the assignment of CBOR
numbers in this range by IANA, please let us know.

Of course, what I'd really like is for the CBOR community to fall in
love with Gordian Envelope and let us have one of the precious
remaining 1-byte tags (6–15 and 20 are currently unassigned) as
Gordian Envelope is being used in constrained environments (even
possibly as silicon logic), every byte counts, and this specific tag
(currently requesting 200) is used a lot as the structure is very
recursive.

> Have you looked at SCITT?

I have been monitoring that list, and have pointed to Gordian Envelope
in at least one case. We have people in non-IETF communities
interested in using it for various forms of supply chain and
software/ai data validation.

If there are any others that we should reach out to, please let us know.

Thanks again for your time!

-- Christopher Allen