Re: [Danish] DANISH BOF introductory email

"Olle E. Johansson" <oej@edvina.net> Tue, 16 February 2021 06:44 UTC

Return-Path: <oej@edvina.net>
X-Original-To: danish@ietfa.amsl.com
Delivered-To: danish@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D309F3A0E81 for <danish@ietfa.amsl.com>; Mon, 15 Feb 2021 22:44:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.899
X-Spam-Level:
X-Spam-Status: No, score=-6.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yELEx_Ur2OBv for <danish@ietfa.amsl.com>; Mon, 15 Feb 2021 22:44:27 -0800 (PST)
Received: from smtp7.webway.se (smtp7.webway.se [IPv6:2a02:920:212e::205]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A63693A0E4A for <danish@ietf.org>; Mon, 15 Feb 2021 22:44:26 -0800 (PST)
Received: from macbook-pro.webway.org (h-205-16.A165.corp.bahnhof.se [176.10.205.16]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp7.webway.se (Postfix) with ESMTPSA id 04E1C217B; Tue, 16 Feb 2021 07:44:23 +0100 (CET)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.4\))
From: "Olle E. Johansson" <oej@edvina.net>
In-Reply-To: <0e23c867-400e-3e47-3a65-33e12d874215@sandelman.ca>
Date: Tue, 16 Feb 2021 07:44:23 +0100
Cc: danish@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <71CE3F61-1959-43C1-915D-53A9D00735E2@edvina.net>
References: <16827.1611948402@localhost> <ybl4kiz8m8h.fsf@w7.hardakers.net> <8243.1612384217@localhost> <yblzh0imo9n.fsf@w7.hardakers.net> <13345.1612653678@localhost> <yblczx6jg2t.fsf@w7.hardakers.net> <22126.1613091105@localhost> <17AAD333-9985-4B98-A7C4-8BF9FD446E51@edvina.net> <0e23c867-400e-3e47-3a65-33e12d874215@sandelman.ca>
To: Michael Richardson <mcr+ietf@sandelman.ca>
X-Mailer: Apple Mail (2.3608.120.23.2.4)
Archived-At: <https://mailarchive.ietf.org/arch/msg/danish/-Ok61TGxKzHXa570MEyrmKQmqMw>
Subject: Re: [Danish] DANISH BOF introductory email
X-BeenThere: danish@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <danish.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/danish>, <mailto:danish-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/danish/>
List-Post: <mailto:danish@ietf.org>
List-Help: <mailto:danish-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/danish>, <mailto:danish-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Feb 2021 06:44:30 -0000


> On 15 Feb 2021, at 17:06, Michael Richardson <mcr+ietf@sandelman.ca> wrote:
> 
> On 2021-02-12 4:41 a.m., Olle E. Johansson wrote:
>>> On 12 Feb 2021, at 01:51, Michael Richardson <mcr+ietf@sandelman.ca> wrote:
>>> Two areas of problem statement were mentioned in the secdispatch and
>>> in draft-huque-dane-client-cert, namely:
>>>  a) IoT device authentication.
>>>  b) SMTP client authentication.
>> I have some ideas for realtime communication - SIP and possibly some
>> WebRTC implementations as well. Just loose ideas, based on my earlier
>> draft on SIP and DANE. Would be great if a vendor of SIP devices hooked on :-)
> 
> Perhaps you want to explain more, either in the form of an Internet-Draft, slides, or emails?
I just need to collect my thoughts on this, but I will certainly come up with slides
if that’s needed.
> 
>> Also work with IoT device auth, so it’s my main interest here.
> 
> Please tell us more.
> m2m?
> device to cloud?
> within an ecosystem/vertical?
> cross-vertical?
> Home? Industrial? Automotive? Building?

It’s a project with device2gateway and gateway@cloud involved. Not for homes.

We have the usual issues - establishing trust in multiple CAs, rollover of everything
from device keys to CAs. I’m a contractor and came in late, so a lot of decisions
was made early and a lot of decisions was not made in time, so it’s a bit of a 
clean up mission :-)

/O