[Model-t] next steps

Dominique Lazanski <dml@lastpresslabel.com> Tue, 19 November 2019 06:07 UTC

Return-Path: <dml@lastpresslabel.com>
X-Original-To: model-t@ietfa.amsl.com
Delivered-To: model-t@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6CE3212082F for <model-t@ietfa.amsl.com>; Mon, 18 Nov 2019 22:07:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.897
X-Spam-Level:
X-Spam-Status: No, score=-1.897 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=lastpresslabel-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T7k_iyLZWAan for <model-t@ietfa.amsl.com>; Mon, 18 Nov 2019 22:07:15 -0800 (PST)
Received: from mail-io1-xd35.google.com (mail-io1-xd35.google.com [IPv6:2607:f8b0:4864:20::d35]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 22ADA12082E for <model-t@iab.org>; Mon, 18 Nov 2019 22:07:15 -0800 (PST)
Received: by mail-io1-xd35.google.com with SMTP id q83so21881064iod.1 for <model-t@iab.org>; Mon, 18 Nov 2019 22:07:15 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lastpresslabel-com.20150623.gappssmtp.com; s=20150623; h=mime-version:from:date:message-id:subject:to; bh=ZYyIe6RYh2KaCBtsjH0R9WqsG/t4r4zxDJruhfUVuk8=; b=SIWyoHBSRm7MaOaSfQ2yAwwcsMLaxuIeesR6EjYA0gDIgJ9yuDT/Clq74rdk8OBx6n sVfUEvHZnZX2YLAMES6F8tJi5xfEh3JysMVZz5M+XWNZTQWYJ89jOHbA2sTYe1t7QtZZ mNM4KZ/9OsXThXn/urAziNgfmcVLTEvjRpTeWucwUm8RAN0W0sM/guYvyA+jqgpmX0SS W0/v3atH+4WcnhL5XKMpCoyx2qGeShutLGzXR7t1QFKNrxY2isVO/EKdVwWJUSIaIsSs tj66Kqpma9zSo6zIecoOtZVxvlRhlZY0fCQQ8HxgoqLwyM6CFEc26xilh3pIb+DEa8hT K2ow==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=ZYyIe6RYh2KaCBtsjH0R9WqsG/t4r4zxDJruhfUVuk8=; b=tfkLpPSxAA5VICUafYev9Ue4nM44SwkvUZ+w1d06drDq/4Wz99cCB5+xb7WpQxkx42 RYFJRLkfPC97qL0YZ5fpVZE4clCl5ZFvdQdlBb08AuQ3c153IupXBLXUjXG8yM3cQP5w HIBnD6QkZwkQ0LQ+d3ZSGOU0JObqEPxJjRb59PDMfX0VHOn3a+GiZq4/5IcY6/v4m7NQ /R8dHtI+9ZCFH1HG76jgAYAOD5kGa0zXVgk7L87K+SWXdFI4cNw5o53Wu76bDmlIzgJL mkWtMW8xOegxtGD91JHRt6w2YVKK2MSy7mfQ6osk/XaEiFnIxFaIWZN9a3Ji8nNAGhbF iNCQ==
X-Gm-Message-State: APjAAAVCrMEa609mw6jpcaF15tgRzXjvcLkUiwvNa0/LPfMcFcLtK8JB 3JMhZQvyInS1AZi9uV6qIZ5qU2+37WiOJVfIwia4JpU1eVU=
X-Google-Smtp-Source: APXvYqyRJGDhgZaAvCXYai4Odz+8htGmZNg9jtD/R7wi1fd4e0BrOueEBuGrkNpbHSU1YsJHkPDjgHqXRsqZPDAyn0A=
X-Received: by 2002:a6b:4f13:: with SMTP id d19mr6755894iob.181.1574143633844; Mon, 18 Nov 2019 22:07:13 -0800 (PST)
MIME-Version: 1.0
From: Dominique Lazanski <dml@lastpresslabel.com>
Date: Tue, 19 Nov 2019 14:07:03 +0800
Message-ID: <CAJhrR8QgDnExZDcq2UUSLJAFVUhFqu1bX9PKPJOZ4hAQvAJ5iw@mail.gmail.com>
To: model-t@iab.org
Content-Type: multipart/alternative; boundary="0000000000001f02c30597ace008"
Archived-At: <https://mailarchive.ietf.org/arch/msg/model-t/GlbZzt11MSk7PFZnjZddNHj6dXg>
Subject: [Model-t] next steps
X-BeenThere: model-t@iab.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Discussions of changes in Internet deployment patterns and their impact on the Internet threat model <model-t.iab.org>
List-Unsubscribe: <https://www.iab.org/mailman/options/model-t>, <mailto:model-t-request@iab.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/model-t/>
List-Post: <mailto:model-t@iab.org>
List-Help: <mailto:model-t-request@iab.org?subject=help>
List-Subscribe: <https://www.iab.org/mailman/listinfo/model-t>, <mailto:model-t-request@iab.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Nov 2019 06:07:18 -0000

Great that we could meet today in spite of it being so early! The following
is a list of the next steps that we came up with:

   1. Develop Arkko-Farrell draft
   2. Develop Lazanski draft
   3. Christian to develop case studies and details of several attacks
   4. Tommy to look at how CLESS and and the malware lifecycle can feed
   into this threat model work

Did I miss anything?

In thinking about it more after the meeting, it seems that the most
efficient way is to capture all of this work is to have one working draft
that we can work on collaboratively. IMHO.

Dominique