[Iot-onboarding] Hacking MUD at the Hackathon

Eliot Lear <lear@cisco.com> Wed, 19 June 2019 17:41 UTC

Return-Path: <lear@cisco.com>
X-Original-To: iot-onboarding@ietfa.amsl.com
Delivered-To: iot-onboarding@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C2712120390; Wed, 19 Jun 2019 10:41:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.511
X-Spam-Level:
X-Spam-Status: No, score=-14.511 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cNdbSiRUfw7X; Wed, 19 Jun 2019 10:41:55 -0700 (PDT)
Received: from aer-iport-1.cisco.com (aer-iport-1.cisco.com [173.38.203.51]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CB9E91203DE; Wed, 19 Jun 2019 10:41:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=1021; q=dns/txt; s=iport; t=1560966094; x=1562175694; h=from:mime-version:subject:message-id:date:cc:to; bh=nJfcfU78WGhAlhy9T6sChA2U2gsBhpq+R9ncwTA+2r4=; b=SsroC1rd8Ao3f2pD7MLhC835yuHZBSoW4ilXVgPDY9MXXVBglo0/ngLZ l5loRt9xI4NCd6p6s2NCpdP7P6d8Lpvsq581Xb1HIhXpDFvLXXqcu/KS5 rZx5A/GbM5gNZS20QgCmrPi6UA7FEtGiqdXSh3ncT2z2abRl+pfTl29w5 0=;
X-Files: signature.asc : 195
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0BTAADXcgpd/xbLJq1mHAEBAQQBAQcEAQGBVQUBAQsBghaBOwEgEoQ+iHuLYJkJgXsCBwEBAQkDAQEvAQGEQIJ9NgcOAQMBAQQBAQIBBW2KQ4V0Vl0ChBQBggqsKoExiiYQgTQBgVCKJIF/gTgME4gbgj0ygiYElC2HUI1oCYITghuBB5AxG4IXAQ+HBo4HoHyDCAIEBgUCFYFXAy6BWDMaCBsVZQGCQj2QSD0DkAUBAQ
X-IronPort-AV: E=Sophos;i="5.63,393,1557187200"; d="asc'?scan'208";a="13351074"
Received: from aer-iport-nat.cisco.com (HELO aer-core-2.cisco.com) ([173.38.203.22]) by aer-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 19 Jun 2019 17:41:31 +0000
Received: from dhcp-10-61-102-117.cisco.com (dhcp-10-61-102-117.cisco.com [10.61.102.117]) by aer-core-2.cisco.com (8.15.2/8.15.2) with ESMTPS id x5JHfSF4027501 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 19 Jun 2019 17:41:30 GMT
From: Eliot Lear <lear@cisco.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_5AC08B40-EAED-4539-AD1A-D3CE74309B3F"; protocol="application/pgp-signature"; micalg="pgp-sha1"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Message-Id: <BFC8C61F-5596-49AB-BE64-596F8A5E8912@cisco.com>
Date: Wed, 19 Jun 2019 19:41:27 +0200
Cc: mud@ietf.org, iot-onboarding@ietf.org
To: iot-dir@ietf.org
X-Mailer: Apple Mail (2.3445.104.11)
X-Outbound-SMTP-Client: 10.61.102.117, dhcp-10-61-102-117.cisco.com
X-Outbound-Node: aer-core-2.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/iot-onboarding/G76Ff2jh2WRN-wLob6sfHpSzULM>
Subject: [Iot-onboarding] Hacking MUD at the Hackathon
X-BeenThere: iot-onboarding@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussion of IoT onboarding mechanisms <iot-onboarding.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/iot-onboarding>, <mailto:iot-onboarding-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/iot-onboarding/>
List-Post: <mailto:iot-onboarding@ietf.org>
List-Help: <mailto:iot-onboarding-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/iot-onboarding>, <mailto:iot-onboarding-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jun 2019 17:41:57 -0000

Sorry for the blast here, but…

Attention: IoT device folk.  Would you like to try testing your device against MUD network protection?  We’re going to bring some h/w and s/w to the Hackathon so that you can see how the protection actually can be invoked by your device.

Interested?  Unicast back please.

Thanks!

Eliot