Re: [hackathon] GNAP Interoperability Hackathon

"Charles Eckel (eckelcu)" <eckelcu@cisco.com> Fri, 14 January 2022 18:06 UTC

Return-Path: <eckelcu@cisco.com>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 963853A2DD0 for <hackathon@ietfa.amsl.com>; Fri, 14 Jan 2022 10:06:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.595
X-Spam-Level:
X-Spam-Status: No, score=-9.595 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=FnrpDxMb; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=h1XiV37Z
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id POcFR4nb2nXA for <hackathon@ietfa.amsl.com>; Fri, 14 Jan 2022 10:06:22 -0800 (PST)
Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4BEFB3A2DCE for <hackathon@ietf.org>; Fri, 14 Jan 2022 10:06:22 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2180; q=dns/txt; s=iport; t=1642183582; x=1643393182; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=hXrLkW8CaE6UUdZQC0MQ1MSuyb75dNxvbUSaidT8NMk=; b=FnrpDxMbhKbYbk3w9byqPsTxHrQWONlM7lMRO3Hitk+fAlX9QB+T1UmL Pv7bo/pUxrZfw8iNPbzZVKMsjJdzN3yUs57PC4C6IvTR+5W6qjnUTK9kv PnV1bWLqh1IVBmhamZF2XbV9FUq36VRDoWvgZ/6I/iIPHvpibE2RrvRe8 o=;
IronPort-PHdr: A9a23:0Zr9WRCyjcfOsX/rbjcwUyQVaBdPi9zP1kY95pkmjudIdaKut9TnMVfE7PpgxFnOQc3A6v1ChuaX1sKoWWEJ7Zub9nxXdptKWkwJjMwMlFkmB8iIQUTwMP/taXk8G8JPHF9o9n22Kw5bAsH7MlbTuXa1qzUVH0aXCA==
IronPort-Data: A9a23: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
IronPort-HdrOrdr: A9a23:3Rw2Sa+qtmmXIkbi7eFuk+GIdr1zdoMgy1knxilNoENuE/BwxvrBoB1E73DJYW4qKQ4dcdDpAtjmfZtFnaQFobX5To3SIjUO31HYb72KjLGSggEIfhefygcz79YaT0ETMqyUMbE+t7eH3ODaKadj/DDkytHTuQ629R4EJmsGB9ACnmVE40SgYzBLrWJ9dPwE/e+nl7J6Tk2bCA0qh6qAdx04dtmGg+eOuIPtYBYACRJiwhKJlymU5LnzFAXd9gsCUhtUqI1StFTtokjc3OGOovu7whjT2yv49JJNgubszdNFGYilltUVEDPxkQylDb4RH4Fq/QpF591H2mxayeUkkC1QZ/ibLEmhJV1dlCGdnTUIFgxesUMKh2Xo3EcL6vaJNQ7SQ/Ax9b6xNCGpt3bJeLpHofx2N6XzjesJMfqIplWO2/HYEx5tjUa6unwkjKoaiGFeS5IXbPtLoZUY5149KuZNIMprgLpXY9WGIfusrsq+S2nqIkwxf1MftuCETzA2BFOLU0ICssua33xfm2141VIRwIgakm0b/JwwRpFY76CcW54Y2o1mX4sTd+ZwFe0BScy4BijERg/NKnubJRDiGLscM3zAppbr6PE+5f2sepYP0Jwu8a6xH29wpCo3YQbjGMeO1JpE/lTER3i8Ry3kzoVE651wqtTHNfHW2O24ORgTeueb0oEi6/zgKr+O0chtcorexEPVaPF04zE=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0BPAAAIu+Fh/49dJa1aDg4BAQEBAQEHAQESAQEEBAEBQIFFBwEBCwGBUVYHEgFkWjcxhEeDRwOEWWCFDoMFln+EH4EugSUDVAsBAQENAQEqCwwEAQGEQEUCF4MzAiU0CQ4BAgQBAQESAQEFAQEBAgEGBIEJE4VoDYZCAQEBAQIBAQEQEREMAQEMIAsBBAsCAQgOCgICIwMCAgIlCgEUARACBA4BBAEcBAGCYgGCZQMNIQEOn2IBgToCih96gTGBAYIIAQEGBASCUoI5GII2AwaBECoBgw2EDw+HByccgg2BFSccgmc+gmMBAQIYgUUBgxg3gi6SUQFbdXiVeqoJCoNEn00FLqdulkGhSEsBhB8CBAIEBQIOAQEGgWE7gVlwFTsqAYI+PhMZD44gCxeDT4UUhQVFdBEnAgYBCgEBAwmQLQEB
X-IronPort-AV: E=Sophos;i="5.88,289,1635206400"; d="scan'208";a="890938860"
Received: from rcdn-core-7.cisco.com ([173.37.93.143]) by rcdn-iport-9.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 14 Jan 2022 18:06:21 +0000
Received: from mail.cisco.com (xbe-rcd-002.cisco.com [173.37.102.17]) by rcdn-core-7.cisco.com (8.15.2/8.15.2) with ESMTPS id 20EI6Kg2027222 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK); Fri, 14 Jan 2022 18:06:21 GMT
Received: from xfe-aln-005.cisco.com (173.37.135.125) by xbe-rcd-002.cisco.com (173.37.102.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Fri, 14 Jan 2022 12:06:20 -0600
Received: from xfe-rcd-004.cisco.com (173.37.227.252) by xfe-aln-005.cisco.com (173.37.135.125) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Fri, 14 Jan 2022 12:06:20 -0600
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (72.163.14.9) by xfe-rcd-004.cisco.com (173.37.227.252) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Fri, 14 Jan 2022 12:06:20 -0600
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=MaUYVRjJBArLdnCP7P7tIJZF1si/3qc+/rVJa8/dA0nvSCdR2Rq5J+HBpXvS8C/H+79aQw8b3hCsUgNt8/oZpbQ6AkwrrCNsAbjKp5QP8HJjsKy+Z58fyn+V4UGJxOcYdrbyAcIL3ctgDRjseWfywVliuNog12vZWUwg82Nq+cUy/s+JGWUZdyFfLZdnFOMa+Xpy6Zh52JhrLnUMwpthsW9PnbFcDrqaHCnYsdb0paRAlTzmVzt8baqQBhHP+pOB6AXlMSX6AUohqymZM5iQvY1HCr6tKbvh4a4SMrOheYz1ALlbjH7/jX0jTBfVA56sl1cBOnSiYpnRDfRdshq52g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=hXrLkW8CaE6UUdZQC0MQ1MSuyb75dNxvbUSaidT8NMk=; b=VLCS3t/otvZOnTpRk5ed9nUL2OtV39mJV50FMaXz4HJ87q/zGVubmaqzj1sxu19xcQcS+TJhxmUgtUrlNI71VIAfe8xZFZ/QTAFQQQB01J37SUcSnyM8l2zSgewHJkjB2+cE8iIdXlkYqFMfPUESbml+I0DtVyVyqMDLFXu2W2npgVQ82N1hna77i1ytru5GqDMoaoizXbZhKqti8emyuAsIyFn5cjhgDUyFphij4N6LMrhgzrPmuGCmRMBlQQHAz3voixKr8k/ZgOChhGAFSGvKwZymSVMaM4BnQWaQUuJc6bhsFHfw2EWwbCCKILjErUuQDfVgdNe+lmfV6rStgA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hXrLkW8CaE6UUdZQC0MQ1MSuyb75dNxvbUSaidT8NMk=; b=h1XiV37ZGD+KsjWEQstyrw06zvea+z+chszcK27rkb4XruPWFmM4RgZth4yZUcFkaqrVa2g6XvKEIUQuhC/CVvN44BEjl+4mtK1SekyO6TYDI06VeAADw+ulu4yR7WmTpJn5eb/F2rS4ixw6RxkP4Yw+isVlvfWcXio3FNjj5Xg=
Received: from SJ0PR11MB5053.namprd11.prod.outlook.com (2603:10b6:a03:2af::17) by SN6PR11MB3261.namprd11.prod.outlook.com (2603:10b6:805:c1::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4888.11; Fri, 14 Jan 2022 18:06:18 +0000
Received: from SJ0PR11MB5053.namprd11.prod.outlook.com ([fe80::4071:7411:6a4d:8449]) by SJ0PR11MB5053.namprd11.prod.outlook.com ([fe80::4071:7411:6a4d:8449%4]) with mapi id 15.20.4888.012; Fri, 14 Jan 2022 18:06:18 +0000
From: "Charles Eckel (eckelcu)" <eckelcu@cisco.com>
To: Justin Richer <jricher@mit.edu>
CC: "hackathon@ietf.org" <hackathon@ietf.org>
Thread-Topic: [hackathon] GNAP Interoperability Hackathon
Thread-Index: AQHYCWXWu1tMvE6gEEOIOePW1Ne2a6xi0A6A
Date: Fri, 14 Jan 2022 18:06:18 +0000
Message-ID: <B47889F9-94FE-494B-85EE-DA745E47C9CC@cisco.com>
References: <21B2B434-0136-448E-A955-55CC88FD6416@mit.edu>
In-Reply-To: <21B2B434-0136-448E-A955-55CC88FD6416@mit.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3654.120.0.1.13)
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 69493de3-ec50-4664-cdb4-08d9d7889041
x-ms-traffictypediagnostic: SN6PR11MB3261:EE_
x-microsoft-antispam-prvs: <SN6PR11MB326180379E85D19173BC8C70B2549@SN6PR11MB3261.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:1284;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR11MB5053.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(71200400001)(86362001)(8676002)(8936002)(38070700005)(2616005)(5660300002)(33656002)(966005)(6486002)(38100700002)(36756003)(316002)(122000001)(6512007)(508600001)(4326008)(6506007)(53546011)(76116006)(66476007)(66446008)(6916009)(83380400001)(66556008)(2906002)(64756008)(186003)(66946007)(45980500001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: text/plain; charset="utf-8"
Content-ID: <213F62BDCE516240A761669A52786608@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR11MB5053.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 69493de3-ec50-4664-cdb4-08d9d7889041
X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Jan 2022 18:06:18.4298 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: 3WmSSMh9hv+AwV4bZ89MNSFmtZpX1yTzTWd/DUgr2M+7mrVGr5w++wZb27eAKzeUuTB516vqnu1LNqTLqSMy8w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR11MB3261
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.17, xbe-rcd-002.cisco.com
X-Outbound-Node: rcdn-core-7.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/GZiOvzep-P7K8STlHjUBfRJIujc>
Subject: Re: [hackathon] GNAP Interoperability Hackathon
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Jan 2022 18:06:26 -0000

Hi Justin,

Thanks for bringing this project to the Hackathon and making it the first project added to the wiki!
Are there IETF drafts associated with the GNAP specification? If so, it would be helpful to add those to the project description in the wiki as well.

Cheers,
Charles

> On Jan 14, 2022, at 8:42 AM, Justin Richer <jricher@mit.edu> wrote:
> 
> For the IETF113 hackathon, the editors of the GNAP specification are proposing a project to get several different implementations of GNAP built and working with each other:
> 
> '''GNAP: Grant Negotiation and Authorization Protocol'''
>   * Champion(s)
>     * Justin Richer, Aaron Parecki, Fabien Imbault
>   * Project(s)
>     * Build and connect implementations of GNAP across different platforms. We plan to have implementations of the AS, Client, and RS available for people to extend and use, and to deploy against with other components.
>     * Interop profile for the hackathon consists of the "redirect" interaction start method, the "redirect" interaction finish method, and key proofing provided by the combination of HTTP Signatures with RSA-PSS-SHA512 and a Content-Digest with SHA-512 hash (for requests with bodies).
>     * Other modes (user-code, push) and signature methods (JWS) will be partially supported by some libraries and are encouraged.
> 
> 
> 
> — Justin
> 
> _______________________________________________
> hackathon mailing list
> hackathon@ietf.org
> https://www.ietf.org/mailman/listinfo/hackathon
> Unsubscribe: mailto:hackathon-request@ietf.org?subject=unsubscribe