[Lake] Attestation devroom @ FOSDEM 2025 (CfP)
Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de> Mon, 11 November 2024 12:38 UTC
Return-Path: <muhammad_usama.sardar@tu-dresden.de>
X-Original-To: lake@ietfa.amsl.com
Delivered-To: lake@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 34B77C14F6A8; Mon, 11 Nov 2024 04:38:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.103
X-Spam-Level:
X-Spam-Status: No, score=-2.103 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=tu-dresden.de
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Bc6azYkEf3FD; Mon, 11 Nov 2024 04:38:53 -0800 (PST)
Received: from mailout3.zih.tu-dresden.de (mailout3.zih.tu-dresden.de [141.30.67.74]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-256) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 15FE3C14F699; Mon, 11 Nov 2024 04:38:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=tu-dresden.de; s=dkim2022; h=To:Subject:From:MIME-Version:Date:Message-ID: Content-Type:Sender:Reply-To:Cc:Content-Transfer-Encoding:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=cbikrOMuffhJylM9i/4CCts6SkdlqxM4GKtdJeuv9Tc=; b=SdDuJhm5BmjYckqlMQy+clBnu1 T57VJMi5twHSuEqYNuimlzgoefkI1RW22Q3eKmJvSjnDkaJlT3d2G5hg8kkbIkgZn4Nwr01vXp3RB 0JJS+g6xn3alKPTcKEfr6BelqKt6E7qUjCkntmG4LpR5wjc1u3yJdf+aGdrT1UqU2E6Y9MF+Q3TZW LfUe2uNRYwHSNb1KecbJg6cos1Vr0VKeIw2dO5b+aRnLUyPYksP9N42+Q3M5ZauMkyEue/SsNt6nZ rstmCLvXky2Ezd6vWWGHDjIr+obs4pxZG9KKcpMVexO/D4HoUhza7hDBtOMXiTS9AWtmEdVSFcDat /O5vSREg==;
Received: from [172.26.35.111] (helo=msx.tu-dresden.de) by mailout3.zih.tu-dresden.de with esmtps (TLS1.2) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from <muhammad_usama.sardar@tu-dresden.de>) id 1tATgx-00CFHX-F2; Mon, 11 Nov 2024 13:38:51 +0100
Received: from msx-t422.msx.ad.zih.tu-dresden.de (172.26.35.139) by MSX-T311.msx.ad.zih.tu-dresden.de (172.26.35.111) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.39; Mon, 11 Nov 2024 13:38:47 +0100
Received: from [192.168.1.2] (89.12.235.214) by msx-t422.msx.ad.zih.tu-dresden.de (172.26.35.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.11; Mon, 11 Nov 2024 13:38:46 +0100
Content-Type: multipart/alternative; boundary="------------K00RxZiVqyjpBiB3mHXbpDTZ"
Message-ID: <528f21c9-ad33-44aa-ad80-8e297e7d6120@tu-dresden.de>
Date: Mon, 11 Nov 2024 13:38:46 +0100
MIME-Version: 1.0
User-Agent: Mozilla Thunderbird
Content-Language: en-US
From: Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de>
To: "rats@ietf.org" <rats@ietf.org>, "lake@ietf.org" <lake@ietf.org>
X-ClientProxiedBy: MSX-L313.msx.ad.zih.tu-dresden.de (172.26.34.113) To msx-t422.msx.ad.zih.tu-dresden.de (172.26.35.139)
X-TUD-Virus-Scanned: mailout3.zih.tu-dresden.de
Message-ID-Hash: BE64XQGYQWMEAFBC5MGHDA7JJR6NYZLB
X-Message-ID-Hash: BE64XQGYQWMEAFBC5MGHDA7JJR6NYZLB
X-MailFrom: muhammad_usama.sardar@tu-dresden.de
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Lake] Attestation devroom @ FOSDEM 2025 (CfP)
List-Id: Lightweight Authenticated Key Exchange <lake.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/lake/5HeI9sA9Xt99I7udkyj3tQDJiRI>
List-Archive: <https://mailarchive.ietf.org/arch/browse/lake>
List-Help: <mailto:lake-request@ietf.org?subject=help>
List-Owner: <mailto:lake-owner@ietf.org>
List-Post: <mailto:lake@ietf.org>
List-Subscribe: <mailto:lake-join@ietf.org>
List-Unsubscribe: <mailto:lake-leave@ietf.org>
Hi all, Thomas Fossati and I are organizing attestation devroom at FOSDEM 2025 [1]. All work being done in RATS as well as attestation over EDHOC are well in scope of this devroom. Submission deadline is 30th October. Please note that FOSDEM requires free and open source code, latest until the meeting time (2nd February). We look forward to your proposals and see you in Brussels. If your project is not yet open source, you are still welcome to present your work in a CCC Attestation SIG meetup on Friday afternoon (31st January). Details will follow. A web version of this CFP is available at: https://hackmd.io/@po26cgI8T7u_FLuVujBdrQ/r1w2pK1-kl Please feel free to forward this to your contacts who may be interested in this devroom. Regards, Usama and Thomas [1] https://fosdem.org/2025/ ------------------------------------------------- # FOSDEM 2025 Attestation Devroom Call for Proposals (CfP) Remote attestation, as defined in [NIST IR 7904](https://nvlpubs.nist.gov/nistpubs/ir/2015/NIST.IR.7904.pdf <https://nvlpubs.nist.gov/nistpubs/ir/2015/NIST.IR.7904.pdf>), is an essential component of systems security for all classes of devices, from small IoT devices to server platforms. It is increasingly being integrated across the whole lifecycle of software, from packaging, to deployment, to production use. Its role in providing transparency and authenticating workloads and devices makes it particularly appealing, especially in scenarios where existing authentication methods could benefit from more robust assertions about the security status of endpoints. ## Formats Options for presentation time (excluding discussion) - 10 minutes - 20 minutes - 30 minutes Each talk (irrespective of duration) will be allowed (at least) 5 minutes for discussion. ## Desirable Topics Topics of interest include, but are not limited to: - Attestation and secure channel establishment - Attested TLS: pre-handshake attestation (e.g., Intel's RA-TLS, Veraison, Attested Certificate Signing Request) - Attested TLS: intra-handshake attestation (e.g., TLS attest) - Attested TLS: post-handshake attestation (e.g., TLS exporters, exported authenticators, post-handshake exchange) - Network protocols including attestation such as SPDM - Attestation at HTTP layer, such as HTTP attestable - Attestation over HTTP, such as Key Broker Service (KBS) - Attestation in other protocols - Attestation and credential issuance - Attestation and access control - Attestation in IoT - Attestation in complex systems - Composite attester (disaggregated RoT) representation - Secure device attachment - REST APIs for attestation - Attestation standardisation (formats, conveyance protocols) - Attestation APIs/ABIs/frameworks in open-source OS - Formal analysis of attestation protocols ## Important Dates Submission open: 30th October 2024 Submission deadline: 1st December 2024 Acceptance notifications: 10th December 2024 Final schedule announcement: 15th December 2024 Devroom: 2nd February 2025, 9am-1pm ## Submission of Proposals To submit a talk, please visit the [FOSDEM 2025 Pretalx website](https://pretalx.fosdem.org/fosdem-2025/cfp <https://pretalx.fosdem.org/fosdem-2025/cfp>). Please select "Attestation" as the *track* and ensure you include all the requested information when submitting a proposal. Please be descriptive, as the audience will have to choose to attend your talk out of a listing with ~500 talks from other projects at FOSDEM. Please mention the talk duration (10/20/30 minutes) in the submission notes. ## Code of Conduct We'd like to remind all speakers and attendees that all of the presentations and discussions in our devroom are held under the guidelines set forth in the [FOSDEM Code of Conduct](https://fosdem.org/2025/practical/conduct/ <https://fosdem.org/2025/practical/conduct/>) and we expect everyone attending to follow it. ## Organizers If you have any questions, feel free to reach out to us: - Muhammad Usama Sardar (muhammad_usama.sardar attu-dresden.de <http://tu-dresden.de/>) - Thomas Fossati (thomas.fossati atlinaro.org <http://linaro.org/>)
- [Lake] Attestation devroom @ FOSDEM 2025 (CfP) Muhammad Usama Sardar
- [Lake] Re: [Rats] Attestation devroom @ FOSDEM 20… Muhammad Usama Sardar