[hackathon] Hackathon project - Security Alert Standard Protocol (SASP)

Avi Wolicki <aviwolicki@gmail.com> Fri, 09 June 2023 09:38 UTC

Return-Path: <aviwolicki@gmail.com>
X-Original-To: hackathon@ietfa.amsl.com
Delivered-To: hackathon@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 88B73C14CE55 for <hackathon@ietfa.amsl.com>; Fri, 9 Jun 2023 02:38:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.097
X-Spam-Level:
X-Spam-Status: No, score=-2.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zuBvnmTLeZYi for <hackathon@ietfa.amsl.com>; Fri, 9 Jun 2023 02:38:46 -0700 (PDT)
Received: from mail-ed1-x529.google.com (mail-ed1-x529.google.com [IPv6:2a00:1450:4864:20::529]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1EF0CC14CE2C for <hackathon@ietf.org>; Fri, 9 Jun 2023 02:38:46 -0700 (PDT)
Received: by mail-ed1-x529.google.com with SMTP id 4fb4d7f45d1cf-5149b63151aso2769534a12.3 for <hackathon@ietf.org>; Fri, 09 Jun 2023 02:38:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1686303523; x=1688895523; h=to:subject:message-id:date:from:mime-version:from:to:cc:subject :date:message-id:reply-to; bh=WG6bOGfQHgFZhwo5tvNwKA/NLYl+MNnrBUzKAqe8NRk=; b=qrpsJfCJS0rnD/xSgifg5k1EjTgH2r8heEmxVBiQK3x3vnzfNxJnOTZd2M/37k9Gzt Sn5juyjfgsHr2jWLNJKdxMXIDhW+ktwqqOTDewVPCkt7emCjROMNjrHiZZlippf8JnyF eeXA5HlW2wLMn8BFCfOetT3+lUtz0vof+YFwFMCuo60Xa94REUE/2IPue6yEh4R5uGtc cNnvjknJ9YxItq/Kq+Bm6pYlUzsCxmEg+R4hG708n7r/EeRNaLWOpjUPArtV79OIYfFG vNOdsxYWJBjzHnRv1CFR2/isMNMlhAgprAmXsfzOTy5yEI1hbWNwuj+WGfkMkqw55g8L pOaQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1686303523; x=1688895523; h=to:subject:message-id:date:from:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=WG6bOGfQHgFZhwo5tvNwKA/NLYl+MNnrBUzKAqe8NRk=; b=h+SNiyg/F0a/HR1UPmpVjpFHPKD/UVfqh5u5PYePJbWPQqHhislvHelxchEjwQ80lu WiMXzsUD/LHDOaGxi8GGrYmAhsnKbJoq+LhzMrjyQ4+U+YBbqFCsQfqS5E9ugKC2bN5P NEP49jRB35dyfkqxDGZZi/BSIXq0DEeXvpwLzajigZvgZl5VPTlEIontYk2BM9CKARSe uLJMJ3KqRP/NMKy0hLWBiLYI9tZhtDVD8LhJ/91Ev72Rn3RiVMw7k9/1ayGlfaW+MrlI Cegl/aY2+eE9VmgPXdyYbQBhJtYKWZ9hDiNJ4FEHOlQdM859FRKZe6CsL6BekXJiAJRt b64w==
X-Gm-Message-State: AC+VfDyHZc4p+fFUIIQtv7aIKul2twcVYZm7vLRqAc4/LNAqumrujDMk lVQwTljGSoX99md0LsITIgxawh0OWzOw1galWepPNXD1EXjeDQ==
X-Google-Smtp-Source: ACHHUZ7VNK4qO9OdAFCiukbMNPcNHlLQn+lakxGMFgRIZndofmFhoYSyahdI6iAQZtGYTz2A+V+WCiofgqVUxHFxl40=
X-Received: by 2002:aa7:cd6d:0:b0:514:80b9:793b with SMTP id ca13-20020aa7cd6d000000b0051480b9793bmr918082edb.19.1686303523548; Fri, 09 Jun 2023 02:38:43 -0700 (PDT)
MIME-Version: 1.0
From: Avi Wolicki <aviwolicki@gmail.com>
Date: Fri, 09 Jun 2023 12:38:31 +0300
Message-ID: <CAHF10WZ3ByjnVM4=sMBoLj8c0FQ6JTSn8s5QLJ5Et8gynBJv+Q@mail.gmail.com>
To: hackathon@ietf.org
Content-Type: multipart/alternative; boundary="000000000000812ffa05fdaf228f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/hackathon/Wy5xu-GCUMNah0xYdqOjikz1DIQ>
Subject: [hackathon] Hackathon project - Security Alert Standard Protocol (SASP)
X-BeenThere: hackathon@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Discussion regarding past, present, and future IETF hackathons." <hackathon.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/hackathon>, <mailto:hackathon-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/hackathon/>
List-Post: <mailto:hackathon@ietf.org>
List-Help: <mailto:hackathon-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/hackathon>, <mailto:hackathon-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Jun 2023 09:38:46 -0000

Hey everyone,
Just added in my hackathon project I will be working on ,

The initiative of the Security Alert Standard (SASP) protocol is to define
a standard method of communicating discovered security risks to an
aggregated location.
For example, endpoint security vendors may want to communicate to a
ticketing system some discovered security weakness.
To do so, they will be able to use a standard message to communicate the
alert to a different vendor supplying the ticketing system. By allowing a
standard, communication between security vendors can be seamless and expand
their capabilities should they comply with the protocol.

If anyone would like to comment or join me on this, feel free to reach out.

Best regards,
Avi Wolicki

   -