Re: [Mathmesh] FW: mathmesh materials

Phillip Hallam-Baker <phill@hallambaker.com> Fri, 08 November 2019 22:43 UTC

Return-Path: <hallam@gmail.com>
X-Original-To: mathmesh@ietfa.amsl.com
Delivered-To: mathmesh@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CAA73120072 for <mathmesh@ietfa.amsl.com>; Fri, 8 Nov 2019 14:43:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.564
X-Spam-Level:
X-Spam-Status: No, score=-1.564 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FORGED_FROMDOMAIN=0.082, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.25, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id R0ylmdTkj0qW for <mathmesh@ietfa.amsl.com>; Fri, 8 Nov 2019 14:43:32 -0800 (PST)
Received: from mail-ot1-f41.google.com (mail-ot1-f41.google.com [209.85.210.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DA6E5120025 for <mathmesh@ietf.org>; Fri, 8 Nov 2019 14:43:31 -0800 (PST)
Received: by mail-ot1-f41.google.com with SMTP id u13so6601150ote.0 for <mathmesh@ietf.org>; Fri, 08 Nov 2019 14:43:31 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=eI4EJuyfuLKF9HA1Go4hSoq/EkwHaqMbjuJgT4+MiBI=; b=T2UMggvbXlvDIfgZQ4OuL9mN+aObllQemj7Fn7DwRAIsf6r7jiWJ1rHax5AJzOgPtL QGkEfwSiy8FwvDvJnbuSYo13vhPYFLC2nuqEBoycOfu7Ng6C9+YlaBdnSeAcz7JNYQe8 aBS0ZULm+qwxsTLP4v57uibSyL6zCTox3o5DsMki0pYkEwDXLHml6KNgyA18JlbHa7B7 LzkaWUk1zKY9wKavwRVK5nGiRapjKZ8hV6qCrsRdlfspUl315V0pJ+d7tx0F5w9C2e8O GRopnA8IxxaCThVoVyZ8aI8FE2csdZb75g4cHuPBYiAEHc+xIABt7ew9V8pSD1lHBEvc MDdQ==
X-Gm-Message-State: APjAAAWDD+909XPg2nLHLhkE+f0S5L28tBbC4ZCt5gCVv/r0QdJmteDS l/iFc2TD7x9M7I4vWKWCUqMvzw8O1+egUw2ww3I=
X-Google-Smtp-Source: APXvYqwzHIAL8o3Ly5CZRmlCW7uonkwWzlylDJ+qs+vZKKHnWtxzkZDUpbDnjXNhAuSRtKlCXekrlzrLJA92vLlKk5s=
X-Received: by 2002:a05:6830:2001:: with SMTP id e1mr3984886otp.48.1573253010988; Fri, 08 Nov 2019 14:43:30 -0800 (PST)
MIME-Version: 1.0
References: <494F3DEE-D8CF-4877-8FA0-6334702CA616@akamai.com> <CAMm+Lwh0UYjW=pJBgxwCX5_Ho+PiziUprJyzrJCMVSLYL5UdpQ@mail.gmail.com> <1443C140-5968-4805-B0C2-4630E329449C@akamai.com> <CAMm+LwgMDXFE6V5B4q4fXxu0Mp5K39MwWvg0S99cELimugDzJA@mail.gmail.com> <E98C2CBB-04B3-4145-891F-6F909C4D7FC5@akamai.com>
In-Reply-To: <E98C2CBB-04B3-4145-891F-6F909C4D7FC5@akamai.com>
From: Phillip Hallam-Baker <phill@hallambaker.com>
Date: Fri, 08 Nov 2019 17:43:21 -0500
Message-ID: <CAMm+LwjphRCSpRVz9mxnq75N5NrSDJcRJ1mOTbqWWmjT2Mtafw@mail.gmail.com>
To: "Salz, Rich" <rsalz@akamai.com>
Cc: "mathmesh@ietf.org" <mathmesh@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000dca5220596dd826b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/mathmesh/ltT6F-0BgljCnaVw9pQjwuuns8g>
Subject: Re: [Mathmesh] FW: mathmesh materials
X-BeenThere: mathmesh@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <mathmesh.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/mathmesh>, <mailto:mathmesh-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/mathmesh/>
List-Post: <mailto:mathmesh@ietf.org>
List-Help: <mailto:mathmesh-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/mathmesh>, <mailto:mathmesh-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Nov 2019 22:43:34 -0000

So just to explain the constraints here, the mesh consists of three
technology components and the Mesh itself built on top. The technology
components are:

UDF (part 2)
DARE (part 3)
Meta-Cryptography (part 6)

The Mesh itself is described in parts 1, 4 & 5. Part 1 is the high level
overview and parts 4 and 5 are essentially reference.

So we can do any of UDF, DARE, Meta-Cryptography without doing the Mesh.
But the Mesh is built on top of the three tech components. It is not
possible to do the Mesh without the dependencies.

The Mesh is designed as a platform, it can be used to configure any
application and provision keys for pretty much anything. But I suggest that
we initially focus on just the one application, preferably one that
provides good 'test coverage'.

My preferred test application would be maintaining a password catalog
across connected Mesh devices. This tests out the full Mesh functionality
without requiring consideration of any external specifications. But if we
can do passwords, then the additional work required for SSH, OpenPGP,
S/MIME, etc. will be focused on the issues that are created by those
applications.



On Fri, Nov 8, 2019 at 3:33 PM Salz, Rich <rsalz@akamai.com> wrote:

> Greetings!
>
>
>
> Wes Hardaker and I are co-chairs of the Mathematical Mesh BoF which is
> meeting Monday, first session.
>
>
>
> We are still working out the agenda – the biggest goal will be what parts
> of the problem to address – but here is a list of drafts, from Phillip.
> Thoughts on the agenda and process should be posted here.
>
>
>
> 1. Architecture [draft-hallambaker-mesh-architecture.html]
>
> Provides an overview of the Mesh as a system and the relationship between
> its
>
> constituent parts.
>
>
>
> 2. Uniform Data Fingerprint [draft-hallambaker-mesh-udf].
>
> Describes the UDF format used to represent cryptographic nonces, keys and
>
> content digests in the Mesh and the use of Encrypted Authenticated Resource
>
> Locators (EARLs) and Strong Internet Names (SINs) that build on the UDF
>
> platform.
>
>
>
> 3 Data at Rest Encryption [draft-hallambaker-mesh-dare].
>
> Describes the cryptographic message and append-only sequence formats used
> in
>
> Mesh applications and the Mesh Service protocol.
>
>
>
> 4 Schema Reference [draft-hallambaker-mesh-schema].
>
> Describes the syntax and semantics of Mesh Profiles, Container Entries and
>
> Mesh Messages and their use in Mesh Applications.
>
>
>
> 5 Protocol Reference [draft-hallambaker-mesh-protocol].
>
> Describes the Mesh Service Protocol.
>
>
>
> 6 Cryptographic Algorithms [draft-hallambaker-mesh-cryptography].
>
> Describes the recommended and required algorithm suites for Mesh
> applications
>
> and the implementation of the multi-party cryptography techniques used in
> the
>
> Mesh.
>
>
> --
> Mathmesh mailing list
> Mathmesh@ietf.org
> https://www.ietf.org/mailman/listinfo/mathmesh
>