Re: [Ghost] Proposed Structure for Organizing Standards Information

Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> Tue, 15 September 2015 20:21 UTC

Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: ghost@ietfa.amsl.com
Delivered-To: ghost@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F0D371ACE9F for <ghost@ietfa.amsl.com>; Tue, 15 Sep 2015 13:21:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.101
X-Spam-Level:
X-Spam-Status: No, score=-0.101 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PHCUoxMk_Qh7 for <ghost@ietfa.amsl.com>; Tue, 15 Sep 2015 13:21:11 -0700 (PDT)
Received: from mail-wi0-x235.google.com (mail-wi0-x235.google.com [IPv6:2a00:1450:400c:c05::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E93861ACE9D for <ghost@ietf.org>; Tue, 15 Sep 2015 13:21:10 -0700 (PDT)
Received: by wicfx3 with SMTP id fx3so44890237wic.1 for <ghost@ietf.org>; Tue, 15 Sep 2015 13:21:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type:content-transfer-encoding; bh=XPsBxdU7U1fKTrB1FRjF0TU1dk7UJbh7cNMKYK4aHq4=; b=q6hxLxagaGI6Cw45PixeuEn262/jGobfoS6eBAGO2S1kRFZgW/iS6FJuoduQa6Jt1P bIAtIHmTPLZ3/9ztiklJze3mDEz2rOfATrSKm8+WetgyN9R9+fymStCiFcq5LV6InU3n uMkdLVAJ9tLwnxxn6nX7QupnxGsyvjWOXQHuD+G8axvmzttDIHjVXdQNdniOxqAnmPG0 zGWGG3x1y0UXCWWy1ohuwN2I2Ndb3BldG4Cs6Gj6rWzK9720BUmukbfsTd39AKUC1hpg v377v0iNnu0fhHyq+MB7tZR3FbVFA6nZxf4HSLojK2NdikgYE7NPWvq1A4cngWrdP/Ib +e3A==
MIME-Version: 1.0
X-Received: by 10.194.116.106 with SMTP id jv10mr4377559wjb.0.1442348469441; Tue, 15 Sep 2015 13:21:09 -0700 (PDT)
Received: by 10.28.214.213 with HTTP; Tue, 15 Sep 2015 13:21:09 -0700 (PDT)
In-Reply-To: <E18BF42C3D667642ABC0EF4B6064EB67D1D85E03@MSMR-GH1-UEA02.corp.nsa.gov>
References: <E18BF42C3D667642ABC0EF4B6064EB67D1D69191@MSMR-GH1-UEA02.corp.nsa.gov> <CAHbuEH5oZnucOpX_aivJWh9crMw0JbRYsmWX2p_ngfUjT0j-Gw@mail.gmail.com> <E18BF42C3D667642ABC0EF4B6064EB67D1D85E03@MSMR-GH1-UEA02.corp.nsa.gov>
Date: Tue, 15 Sep 2015 16:21:09 -0400
Message-ID: <CAHbuEH6ub1x8JN7JUU4==_fAy+V6vne914tMkfZGr5kJvAJh4Q@mail.gmail.com>
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
To: "Boyle, Vincent M" <vmboyle@nsa.gov>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <http://mailarchive.ietf.org/arch/msg/ghost/AFwGJgnkdw80lZihioXZfpa-6IY>
Cc: "ghost@ietf.org" <ghost@ietf.org>
Subject: Re: [Ghost] Proposed Structure for Organizing Standards Information
X-BeenThere: ghost@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "Mailing list for GatHering and reOrganizing STandards information \(GHOST\) team" <ghost.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ghost>, <mailto:ghost-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ghost/>
List-Post: <mailto:ghost@ietf.org>
List-Help: <mailto:ghost-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ghost>, <mailto:ghost-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Sep 2015 20:21:13 -0000

Hi Mike,

The intern returned to school and he was going to let me know if he
would have time to do more work, but it appears he does not.  If
anyone can help with an intern, I think that would spur on this work
and could be a very good learning experience with someone who is
motivated.

Is anyone having trouble accessing the Google doc?

Thanks,
Kathleen

On Tue, Sep 15, 2015 at 4:03 PM, Boyle, Vincent M <vmboyle@nsa.gov> wrote:
> Hi Kathleen,
>         I think use cases and device types would be a great starting point. Finding out what the state of the art (or state of practice) for authentication in different types of devices would be really useful. I guess this is just a use case, but I would be interested in what is currently being used for device ID (vs. user authentication) for various types of devices as well.
>
>         Do you still have the services of that intern, or did they leave along with the summer?
>
> Mike
>
> -----Original Message-----
> From: Kathleen Moriarty [mailto:kathleen.moriarty.ietf@gmail.com]
> Sent: Tuesday, September 08, 2015 10:51 AM
> To: Boyle, Vincent M
> Cc: ghost@ietf.org
> Subject: Re: [Ghost] Proposed Structure for Organizing Standards Information
>
> Hi Mike and others,
>
> Thanks for your interest in this project.
>
> I do think it would be helpful to run through an example using authentication as our first target.  I had an intern trying to pull links and organize them in this space over the summer, but what I have back so far isn't enough of a starting point.
>
> Would the reverse direction be more helpful in that this group designs a starting page?  For those that have not looked at the google doc, this would be the use cases and device types for authentication, allowing you to drill down to other links (existing where possible) to learn more about the options.  We will likely need 2 levels before a branch out or to specify what is needed in the landing pages for options available.
>
> Thank you,
> Kathleen
>
> On Tue, Aug 11, 2015 at 2:05 PM, Boyle, Vincent M <vmboyle@nsa.gov> wrote:
>> I read the Google doc again this morning. I like the idea of a short introduction to each topic and then moving on to specific situations (use cases and device types; maybe deployment scenarios as well, such as how big is the set of things that have to authenticate to each other, or how will keys be provisioned). In general, I like the idea of quickly getting to specifics and providing pointers to appropriate standards.
>>
>> I'm wondering if we need to work through the Authentication example a bit. Maybe create a part of the matrix (no attempt to be complete) and then see how we would handle things from there. I think even concentrating on a specific scenario (signed email) could be enlightening, considering the differences when you're all part of an enterprise vs. a community with no central authority.
>>
>>  If it would help, I'd be happy to join a phone call to discuss. Otherwise, maybe somebody more adept than me could create a small example to foster discussion.
>>
>> Mike Boyle
>>
>> _______________________________________________
>> GHOST mailing list
>> GHOST@ietf.org
>> https://www.ietf.org/mailman/listinfo/ghost
>
>
>
> --
>
> Best regards,
> Kathleen



-- 

Best regards,
Kathleen