Re: [OPSAWG] Fw: Re: [ntia-sbom-framing] Fwd: 🔔 WG Adoption Call on draft-lear-opsawg-sbom-access-00

Dick Brooks <dick@reliableenergyanalytics.com> Tue, 05 January 2021 19:04 UTC

Return-Path: <dick@reliableenergyanalytics.com>
X-Original-To: opsawg@ietfa.amsl.com
Delivered-To: opsawg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B9983A1184 for <opsawg@ietfa.amsl.com>; Tue, 5 Jan 2021 11:04:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.918
X-Spam-Level:
X-Spam-Status: No, score=-1.918 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=messagingengine.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MrmpGj4PIB6l for <opsawg@ietfa.amsl.com>; Tue, 5 Jan 2021 11:04:23 -0800 (PST)
Received: from out3-smtp.messagingengine.com (out3-smtp.messagingengine.com [66.111.4.27]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D69C23A1183 for <opsawg@ietf.org>; Tue, 5 Jan 2021 11:04:22 -0800 (PST)
Received: from compute2.internal (compute2.nyi.internal [10.202.2.42]) by mailout.nyi.internal (Postfix) with ESMTP id 1906C5C0091; Tue, 5 Jan 2021 14:04:22 -0500 (EST)
Received: from mailfrontend2 ([10.202.2.163]) by compute2.internal (MEProxy); Tue, 05 Jan 2021 14:04:22 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-proxy:x-me-proxy:x-me-sender:x-me-sender :x-sasl-enc; s=fm1; bh=ghUEYJVxdafPjJHnj4jBQBlw5R/MwgzPkZVgv9ADa VM=; b=nTwVyjAUXgfOy6jQ+vebgqC2W0hjkkZaagCDDbzDZQy0E0/w16LKyd9Oc EzjPJ9bZIAgZzIPHSKZJcNGHp1d4ZlrALxc762RQbfU8PfjcGYQlUyQ7HsrXIJTr 7lpSoXZ+zDsQzaDT4n/8cBgbARScIiNojThojYPlwik8DJdwe3liG5vo0tx3ON2E C4Pudac/+JBRk/g26ELgD4T+iF7xe1+Fj3dzgBKtkjT29WKyPEstkd/boYBncsMG lUOR0fzR1B1zkolT6pblzCDimbm2evIgO8lxuIvDpeccD5hP92sn3Y41WVbStOxK Xh6Hm7sukP2vf4FMJH4UunqABcJjg==
X-ME-Sender: <xms:Nbj0X3m68dsLW1x-g3UKVQqPplU2KvLp808OhTZbm78JNnV9bruxuA> <xme:Nbj0X6039_D7gw8BV4hmfc1eU36ZHklj3den5zaE3W5Fh5BOswhlJ_FKzSy8wZZ-M x_xqW6heHPnu06YXg>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedujedrvdefjedgkeegucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucesvcftvggtihhpihgvnhhtshculddquddttddmne gfrhhlucfvnfffucdlqdehmdenucfjughrpefhvfhfjgfuffhokfggtgfgofhtsehtqhhg tddvtdejnecuhfhrohhmpedfffhitghkuceurhhoohhkshdfuceoughitghksehrvghlih grsghlvggvnhgvrhhghigrnhgrlhihthhitghsrdgtohhmqeenucggtffrrghtthgvrhhn pefhtddvgeegfeejteehgfekhfetjeelffeftdfgueeuudevgfdvieevjeefudekvdenuc ffohhmrghinheprhgvlhhirggslhgvvghnvghrghihrghnrghlhihtihgtshdrtghomhen ucfkphepvdduiedrudelfedrudegvddrvddvnecuvehluhhsthgvrhfuihiivgeptdenuc frrghrrghmpehmrghilhhfrhhomhepughitghksehrvghlihgrsghlvggvnhgvrhhghigr nhgrlhihthhitghsrdgtohhm
X-ME-Proxy: <xmx:Nbj0X9p6JAYuZSJcE51z52x0BNXYmzbtCloDkQA2v4rpF2P8gtnwJQ> <xmx:Nbj0X_mWw_WCI0_ujNSmLMSyVG6lCAncWO9MdkZ4_X4a27rzGI8MDg> <xmx:Nbj0X13CurUy75869TGHf8vGj36aJaxsD6Tp5DKchmSe6x3JCv0ZTQ> <xmx:Nrj0Xy9Z0MK2P83I2M8Nj1wPZP5syFHfwZqTD7VkrWpWUR2WMzrp8w>
Received: from farpoint (unknown [216.193.142.22]) by mail.messagingengine.com (Postfix) with ESMTPA id 18BA61080064; Tue, 5 Jan 2021 14:04:21 -0500 (EST)
From: Dick Brooks <dick@reliableenergyanalytics.com>
To: 'Henk Birkholz' <henk.birkholz@sit.fraunhofer.de>, 'Christopher Gates' <chris.gates@velentium.com>, opsawg@ietf.org
Cc: "'Friedman, Allan'" <AFriedman@ntia.gov>
References: <ema9be735c-1725-4ceb-8ca1-bc90f895f94e@vwdl7400-36262r2> <27fb01d6e37a$b376a220$1a63e660$@reliableenergyanalytics.com> <1e773120-371c-e4e3-77fb-f2591f9b9abb@sit.fraunhofer.de>
In-Reply-To: <1e773120-371c-e4e3-77fb-f2591f9b9abb@sit.fraunhofer.de>
Date: Tue, 05 Jan 2021 14:04:17 -0500
Organization: Reliable Energy Analytics LLC
Message-ID: <2c3201d6e395$9274f8e0$b75eeaa0$@reliableenergyanalytics.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQH8bkPotrER+eOFupHvNH45exmtUQFhtqqOAp/6ER6prjwVAA==
Content-Language: en-us
Archived-At: <https://mailarchive.ietf.org/arch/msg/opsawg/uk9J7MGZL4MvamZgISuoZ8_1Pf4>
Subject: Re: [OPSAWG] Fw: Re: [ntia-sbom-framing] Fwd: 🔔 WG Adoption Call on draft-lear-opsawg-sbom-access-00
X-BeenThere: opsawg@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: OPSA Working Group Mail List <opsawg.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/opsawg>, <mailto:opsawg-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/opsawg/>
List-Post: <mailto:opsawg@ietf.org>
List-Help: <mailto:opsawg-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/opsawg>, <mailto:opsawg-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Jan 2021 19:04:26 -0000

Thanks, Henk, you raise a good question. I guess it depends: 

If the goal is to ensure interoperability of SBOM data communicated via an OPSWAG solution, that only exchanges SBOM's then I would imagine that we would need to define which SBOM payloads are supported, to ensure interoperability. If the intent of OPSWAG is to send any type of payload labelled as "SBOM content" with mutually agreed to payloads, then I would agree with you. I view this "tell them what is in the package", very similar to how S/MIME works. For example, when I worked in RFC 1767, EDI over the Internet, we assigned different S/MIME content types for the different type of EDI payloads that could be exchanged (and parsed),  one of the options is "consent". Maybe OPSWAG should include something similar.  

I refer you to this section in the I-D: 

1.2.  SBOM formats

   There are multiple ways to express an SBOM.  When these are retrieved
   either directly from the device or directly from a web server, "tools
   will need to observe the content-type header to determine precisely
   which format is being transmitted".  Because IoT devices in particular
   have limited capabilities, use of a specific Accept: header in HTTP
   or the Accept Option in CoAP is NOT RECOMMENDED.  Instead, backend
   tooling MUST silently discard SBOM information sent with a media type
   that is not understood.


Thanks,

Dick Brooks

Never trust software, always verify and report! ™
http://www.reliableenergyanalytics.com
Email: dick@reliableenergyanalytics.com
Tel: +1 978-696-1788

-----Original Message-----
From: Henk Birkholz <henk.birkholz@sit.fraunhofer.de> 
Sent: Tuesday, January 05, 2021 1:22 PM
To: Dick Brooks <dick@reliableenergyanalytics.com>; 'Christopher Gates' <chris.gates@velentium.com>; opsawg@ietf.org
Cc: Friedman, Allan <AFriedman@ntia.gov>
Subject: Re: [OPSAWG] Fw: Re: [ntia-sbom-framing] Fwd: 🔔 WG Adoption Call on draft-lear-opsawg-sbom-access-00

Hi Dick,

this is Henk with no hats on.

I am not sure how useful it is to make "formats" an exclusive list here. 
Following the evolution of SBOM work in NTIA (and in extension in CISQ), it seems to me that the focus starts to move into the direction of information models first and that actual
format(/serializations/encodings) are starting to be step two.

Certainly, SWID semantics are only in the scope of the artifact domain and don't cover the defects domain and only some of the chains of provenance domain. That is why stand-alone SWID are rather minimal SBOM (just a list of (intended) artifacts).

In any case, I was under the impression that the I-D is format agnostic and that the references are expositional. Is that maybe an underlying point to discuss here?

Viele Grüße,

Henk


On 05.01.21 16:51, Dick Brooks wrote:
> I concur with Chris. I’ve heard reports of people trying to use SWID 
> to communicate SBOM information and they are having to make some “brave”
> assumptions in the process.  SPDX and CycloneDX seem  to be the only 
> viable SBOM formats, based on my testing experience with both formats.
> 
> There remain several issues on naming and identification conventions. 
> A lot of the challenges I’ve experienced could be addressed if NIST 
> NVD and NTIA SBOM parties could reach an agreement on how 
> names/identifiers will be represented in their respective domains. It 
> would only require a few elements to be agreed to, like Publisher 
> name, Product name and Version identifier to make an impactful 
> improvement in vulnerability search results, using SBOM data as inputs.
> 
> Thanks,
> 
> Dick Brooks
> 
> */Never trust software, always verify and report! 
> <https://reliableenergyanalytics.com/products>/* ™
> 
> http://www.reliableenergyanalytics.com
> <http://www.reliableenergyanalytics.com/>
> 
> Email: dick@reliableenergyanalytics.com 
> <mailto:dick@reliableenergyanalytics.com>
> 
> Tel: +1 978-696-1788
> 
> *From:* OPSAWG <opsawg-bounces@ietf.org> *On Behalf Of *Christopher 
> Gates
> *Sent:* Tuesday, January 05, 2021 10:27 AM
> *To:* opsawg@ietf.org
> *Subject:* [OPSAWG] Fw: Re: [ntia-sbom-framing] Fwd: 🔔 WG Adoption 
> Call on draft-lear-opsawg-sbom-access-00
> 
> ------ Forwarded Message ------
> 
> From: "Christopher Gates" <chris.gates@velentium.com 
> <mailto:chris.gates@velentium.com>>
> 
> To: "Eliot Lear" <lear@cisco.com <mailto:lear@cisco.com>>; 
> "ntia-sbom-framing@cert.org <mailto:ntia-sbom-framing@cert.org>"
> <ntia-sbom-framing@cert.org <mailto:ntia-sbom-framing@cert.org>>
> 
> Sent: 1/4/2021 2:48:51 PM
> 
> Subject: Re: [ntia-sbom-framing] Fwd: [OPSAWG] 🔔WG Adoption Call on
> draft-lear-opsawg-sbom-access-00
> 
>     Eliot,
> 
>     I joined the IETF WG, and I have some feedback....
> 
>     A "SWID tag" isn't an SBOM format, as stated here. It is an element
>     inside of an SBOM.
> 
>     Since we have removed SWID as a format we in the "NTIA SBOM WG are
>     supporting for SBOM use, shouldn't this reference be removed from
>     the IETF draft as well?
> 
>     Also, I still think that creating a Bluetooth Low Energy SBOM
>     Adopted Profile (via the Bluetooth SIG) that is harmonized with
>     this would be a good thing:
> 
>     Due the the low bandwidth of BLE we wouldn't attempt to provide the
>     SBOM via BLE, just the link to a URI that can deliver the SBOM.
> 
>     It would create a standardized UUID (16 bit) for the SBOM Adopted
>     Profile, and have a consistent set of characteristics being exposed
>     via BLE.
> 
>     This is exactly how an Adopted Profile is supposed to be defined and
>     utilized.
> 
>     Christopher Gates
> 
>     --------------------------------
> 
>     Director of Product Security
> 
>     www.velentium.com <http://www.velentium.com/>
> 
>     (805)750-0171
> 
>     520 Courtney Way Suite 110
> 
>     Lafayette CO. 80026
> 
>     (GMT-7)
> 
>     Our new book is now shipping:
> 
>     /Medical Device Cybersecurity for Engineers and Manufacturers/
> 
>     U.S.
>     <https://us.artechhouse.com/Medical-Device-Cybersecurity-A-Guide-for-Engineers-and-Manufacturers-P2128.aspx> |
>     Worldwide
>     
> <https://uk.artechhouse.com/Medical-Device-Cybersecurity-A-Guide-for-E
> ngineers-and-Manufacturers-P2073.aspx>
> 
>     Amazon
>     <https://www.amazon.com/Medical-Device-Cybersecurity-Engineers-Manufacturers/dp/1630818151/ref=sr_1_1?dchild=1&keywords=Axel+Wirth&qid=1592335625&sr=8-1>&
>     Digital
>     
> <https://us.artechhouse.com/Medical-Device-Cybersecurity-for-Engineers
> -and-Manufacturers-P2174.aspx>
> 
>     Security Book Of The Year!
>     
> <https://engineering.tapad.com/the-best-information-security-books-of-
> 2020-e7430444fbd4>
> 
>     “If everyone is thinking alike, then somebody isn't thinking.”
>     -George S. Patton
> 
>     "Facts are stubborn things."  -John Adams, 1770
> 
>     ------ Original Message ------
> 
>     From: "Eliot Lear via ntia-sbom-framing" <ntia-sbom-framing@cert.org
>     <mailto:ntia-sbom-framing@cert.org>>
> 
>     To: ntia-sbom-framing@cert.org <mailto:ntia-sbom-framing@cert.org>
> 
>     Sent: 1/4/2021 9:57:22 AM
> 
>     Subject: [ntia-sbom-framing] Fwd: [OPSAWG] 🔔WG Adoption Call on
>     draft-lear-opsawg-sbom-access-00
> 
>         FYI- this is your opportunity to contribute to the IETF.  If you
>         think sharing of SBOMs is important, this is a *starting
>         point* for the IETF to begin work on that aspect, not an end
>         point.  Please feel free to contribute by joining the opsawg
>         IETF list at https://www.ietf.org/mailman/listinfo/opsawg.
> 
>         Eliot
> 
> 
> 
>             Begin forwarded message:
> 
>             *From: *Henk Birkholz <henk.birkholz@sit.fraunhofer.de
>             <mailto:henk.birkholz@sit.fraunhofer.de>>
> 
>             *Subject: [OPSAWG] **🔔**WG Adoption Call on
>             draft-lear-opsawg-sbom-access-00*
> 
>             *Date: *4 January 2021 at 17:10:19 CET
> 
>             *To: *opsawg <opsawg@ietf.org <mailto:opsawg@ietf.org>>
> 
>             Dear OPSAWG members,
> 
>             this starts a call for Working Group Adoption on
>             https://tools.ietf.org/html/draft-lear-opsawg-sbom-access-00
>             ending on Monday, January 25.
> 
>             As a reminder, this I-D describes different ways to acquire
>             Software Bills of Material (SBOM) about distinguishable
>             managed entities. The work was updated by the authors on
>             October 13th and now elaborates on three ways SBOM can be
>             found, including a MUD URI as one of the options.
> 
>             Please reply with your support and especially any
>             substantive comments you may have.
> 
> 
>             For the OPSAWG co-chairs,
> 
>             Henk
> 
>             _______________________________________________
>             OPSAWG mailing list
>             OPSAWG@ietf.org <mailto:OPSAWG@ietf.org>
>             https://www.ietf.org/mailman/listinfo/opsawg
> 
> 
> Disclaimer: The information and attachments transmitted by this e-mail 
> are proprietary to Velentium, LLC and the information and attachments 
> may be confidential and legally protected under applicable law and are 
> intended for use only by the individual or entity to whom it was 
> addressed. If you are not the intended recipient, you are hereby 
> notified that any use, forwarding, dissemination, or reproduction of 
> this message and attachments is strictly prohibited and may be unlawful.
> If you are not the intended recipient, please contact the sender by 
> return e-mail and delete this message from your system immediately 
> hereafter.
> 
> 
> _______________________________________________
> OPSAWG mailing list
> OPSAWG@ietf.org
> https://www.ietf.org/mailman/listinfo/opsawg
>