Re: [Rats] security-level claim (was Re: WGLC for https://datatracker.ietf.org/doc/html/draft-ietf-rats-eat)

"Smith, Ned" <ned.smith@intel.com> Fri, 03 June 2022 19:30 UTC

Return-Path: <ned.smith@intel.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 24647C14F720 for <rats@ietfa.amsl.com>; Fri, 3 Jun 2022 12:30:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.87
X-Spam-Level:
X-Spam-Status: No, score=-2.87 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.745, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=intel.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s6D8QDHJuEyc for <rats@ietfa.amsl.com>; Fri, 3 Jun 2022 12:30:11 -0700 (PDT)
Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 03A6FC14CF00 for <rats@ietf.org>; Fri, 3 Jun 2022 12:30:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1654284611; x=1685820611; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=DoW2EC2bMyAoz/1tDBxzzfj+zVzzWQ5pG2aycAXZpKM=; b=Kge6FZlhx+6Gb1UVeQSXbB8X0e5f3RUN5S23rkBvd1Xtm57oKI6yPXpQ L4o88VMJJOE2bR6bItlrMmKGvgm/MD0I/Src9fGlX48sbFrLtzJ/75R/C eYvoFUb2JIrD/IBwi44e9IXrd4joqeJsc4h+BH6YuVASxDGpqnspM0XUm DPg5HWBpRPmDMx6gN7Dz9rSQm7Y6fbynPZ+Q1Gtf1j5DsP32Ss+36V39V UB5OonHtrjkgoCBHp9+xqxkN5xVbuWNCRMkULJmEYOStDGypR8pVQGoOX TW6nCtzCi1FxTAa0NAoj6ox+ZqLE3DuZxH5afQvCs1DIkP+Y1yUo/2n3J A==;
X-IronPort-AV: E=McAfee;i="6400,9594,10367"; a="276075810"
X-IronPort-AV: E=Sophos;i="5.91,275,1647327600"; d="scan'208,217";a="276075810"
Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 03 Jun 2022 12:30:08 -0700
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.91,275,1647327600"; d="scan'208,217";a="721911679"
Received: from fmsmsx603.amr.corp.intel.com ([10.18.126.83]) by fmsmga001.fm.intel.com with ESMTP; 03 Jun 2022 12:30:07 -0700
Received: from fmsmsx611.amr.corp.intel.com (10.18.126.91) by fmsmsx603.amr.corp.intel.com (10.18.126.83) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Fri, 3 Jun 2022 12:30:07 -0700
Received: from fmsmsx612.amr.corp.intel.com (10.18.126.92) by fmsmsx611.amr.corp.intel.com (10.18.126.91) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27; Fri, 3 Jun 2022 12:30:06 -0700
Received: from fmsedg602.ED.cps.intel.com (10.1.192.136) by fmsmsx612.amr.corp.intel.com (10.18.126.92) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.27 via Frontend Transport; Fri, 3 Jun 2022 12:30:06 -0700
Received: from NAM11-CO1-obe.outbound.protection.outlook.com (104.47.56.173) by edgegateway.intel.com (192.55.55.71) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2308.27; Fri, 3 Jun 2022 12:30:06 -0700
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Ct/eifDgy3kuSVq6xMCjHQcAM/5b/ocQfIrZlQpyctxtrzJ0ua4TqG4fCdijbo4YHfwG4l5s8bc3loMhDcCY+fqyWl0WIT9yrYeLS0mViXKeTNjJQbrD1UrfBOJx7urpKFxwNDSDtEkav54qmAxT/NqLoHv9GVbeScLHCcS4ppVue5R3hRmAlzawpIhP5xMIH8/0xslhwFCn0eYAZ8+PFs1np98aijrYtP6NT8OjoLKBdzaT00d34gFGXM6wcZzEduaZ7lfI6RbXYtTP+Btm9mnb+1Z8c98YrxssWxlsYnYmFc26Abk0HLdsapa5OVwGdsRV8wgrO5vMTk8VvCzxGg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=DoW2EC2bMyAoz/1tDBxzzfj+zVzzWQ5pG2aycAXZpKM=; b=WYnTbyhK/3xhRYnXQpPjf/rOB3U3OJ1qRdbJ6uBt52rC6SFFvDP8QWsErRnizyYWt5IUnwh/pJILmFinPy/Mu5Iz7J3fEGTXL5WoqpZF36TyfVO9bRPrXmwBoL9CCI//NFNLocdI5RQf90FXZAZhAobLXe0FJvaN+CCcMLpgFs1Bgbv168esoacFqadDKSytHr5gL/+pMdrOegbBnX34KpYETAQlybwyXstJeJ9g48BVqUVXw0YFC7vvTCogogmNfOfukLM2ABC39+Yf8XCfcOztzaGQk0bNj/p5jQua/o2FvHjkAq+HR4qWJjDDJX2C/7isuv8abXffgs88W3lsog==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none
Received: from CO1PR11MB5169.namprd11.prod.outlook.com (2603:10b6:303:95::19) by BYAPR11MB2614.namprd11.prod.outlook.com (2603:10b6:a02:cc::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5314.15; Fri, 3 Jun 2022 19:30:05 +0000
Received: from CO1PR11MB5169.namprd11.prod.outlook.com ([fe80::5dfe:31c7:a62a:d8b8]) by CO1PR11MB5169.namprd11.prod.outlook.com ([fe80::5dfe:31c7:a62a:d8b8%3]) with mapi id 15.20.5314.013; Fri, 3 Jun 2022 19:30:05 +0000
From: "Smith, Ned" <ned.smith@intel.com>
To: Giridhar Mandyam <mandyam@qti.qualcomm.com>, Jeremy O'Donoghue <jodonogh@qti.qualcomm.com>, Laurence Lundblade <lgl@island-resort.com>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
CC: "Eric Voit (evoit)" <evoit@cisco.com>, "Eric Voit (evoit)" <evoit=40cisco.com@dmarc.ietf.org>, "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>, "rats@ietf.org" <rats@ietf.org>
Thread-Topic: [Rats] security-level claim (was Re: WGLC for https://datatracker.ietf.org/doc/html/draft-ietf-rats-eat)
Thread-Index: AQHYdfnjMsjQPZl9n0yWj7/2kWZTJ607CvaAgAAGa4CAAM9WAIAAfG8AgAAJSICAABHNAIAACd8AgAAVYACAAPa0gIAAd9qA//+ZUIA=
Date: Fri, 03 Jun 2022 19:30:04 +0000
Message-ID: <C448C94A-72A2-4C9E-A932-E44EE3E29738@intel.com>
References: <45618431-7329-4F31-941F-A39BBC9D575F@cisco.com> <BYAPR11MB3125EB2DEC4CE5136AC903F9A1DF9@BYAPR11MB3125.namprd11.prod.outlook.com> <7FD4FE54-7A16-4E92-BDDC-878D726095E6@island-resort.com> <900bf8d8-0b00-cc98-fd82-786dc9c18901@sit.fraunhofer.de> <SJ0PR02MB8353B7216358275E4BF3923081DF9@SJ0PR02MB8353.namprd02.prod.outlook.com> <AB42EABD-FE7A-4DF0-8909-A6D304E292C5@intel.com> <BL0PR11MB3122AA0245129AAB021F0E5DA1DE9@BL0PR11MB3122.namprd11.prod.outlook.com> <c98b992b-5efb-d46f-81d5-d3711941dbb9@sit.fraunhofer.de> <B2C05847-4A5C-4179-AE00-A5F9BACC5121@island-resort.com> <PH0PR02MB725621CB633C322367FD4935F2DE9@PH0PR02MB7256.namprd02.prod.outlook.com> <SJ0PR02MB83536AE654BEDBAE653F803381DE9@SJ0PR02MB8353.namprd02.prod.outlook.com> <C0C0C756-214C-43C8-8EE2-AD4CFF71C0A0@intel.com> <SJ0PR02MB8353CC2F1A9D2BC089F6BBBD81A19@SJ0PR02MB8353.namprd02.prod.outlook.com>
In-Reply-To: <SJ0PR02MB8353CC2F1A9D2BC089F6BBBD81A19@SJ0PR02MB8353.namprd02.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.61.22050700
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: c1674b89-9724-4eb3-71b3-08da45977620
x-ms-traffictypediagnostic: BYAPR11MB2614:EE_
x-microsoft-antispam-prvs: <BYAPR11MB26140AEC074901E899520770E5A19@BYAPR11MB2614.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB5169.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(166002)(53546011)(26005)(6512007)(5660300002)(508600001)(33656002)(8936002)(38070700005)(2906002)(6506007)(82960400001)(122000001)(83380400001)(66446008)(15650500001)(2616005)(86362001)(186003)(6486002)(54906003)(110136005)(38100700002)(66946007)(71200400001)(76116006)(36756003)(4326008)(316002)(966005)(8676002)(66476007)(64756008)(66556008)(45980500001)(15398625002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_C448C94A72A24C9EA932E44EE3E29738intelcom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB5169.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c1674b89-9724-4eb3-71b3-08da45977620
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Jun 2022 19:30:04.9937 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: QmA7FKDMG4DBe/TDwjzl8Jwp+26pakNHIka4k1xzEW3Z62Afz6fqmMVfO+3sEXdWzP7rCP+xnolxIsBuvGBrOg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR11MB2614
X-OriginatorOrg: intel.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/cmPCrwsc-B_bhp8m2-4aWt5Qpqw>
Subject: Re: [Rats] security-level claim (was Re: WGLC for https://datatracker.ietf.org/doc/html/draft-ietf-rats-eat)
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 03 Jun 2022 19:30:15 -0000

It was observed in [1] that a security-level claim is reasonably suitable as an Endorsement. The thread in [1] explored the possibility that security-level wasn’t reasonable as Evidence which would equate to self-assertion. What seemed to be suggested as the way to address the issue was an argument that self-asserted security-level was reasonable. While that may be true (or not), it didn’t address the main point that often an independent entity (other than the Attester) has the authority to assert a security level. The example used in the FDO specification suggests as an example that common criteria could be used as a security level. But CC relies on an independent certifying entity.

[1] Adrian:
"Why would a verifier choose to rely on this instead of some information that comes directly from an Endorser? Without an example, it just seems a better fit for an endorsement."
https://mailarchive.ietf.org/arch/msg/rats/KRVoK0ITFnKhhKUz2sgkg7qhl1c/

The RIV draft (AFAIK) is not making a statement about whether Evidence signed by a TPM is self-asserted, nor does it try to define a security-level claim. The TPM is described as being a root-of-trust for reporting (i.e., it signs claims). A TPM depends on a root-of-trust for measurement (RTM) which is the principal entity responsible for collecting / asserting claims. AFAIK the TCG has not tried to standardize a security-level claim structure that is measured into a PCR. The TCG standardized a security level structure (e.g., CommonCriteriaMeasures) as an Endorsement in https://trustedcomputinggroup.org/wp-content/uploads/IWG_Platform_Certificate_Profile_v1p1_r19_pub_fixed.pdf.  While it may be possible for a RTM to assert the CommonCriteriaMeasures claim as Evidence, that isn’t a reasonable interpretation of the TCG spec.

Hence, it is an incorrect conclusion that a double standard is being applied to the RIV draft vs. the EAT draft.

The line of reasoning in the last paragraph below [2] is suggesting that if a security-level claim is asserted in Evidence that Verifiers will have policy that accepts / rejects it. AND if an application doesn’t see a use for security-level claims then they can just ignore using it. (To which I agree.)

However, it is possible that if there isn’t strong justification for a claim (i.e., backed by use cases etc…) that the WG wants to error on the side of exclusion.

-Ned
From: Giridhar Mandyam <mandyam@qti.qualcomm.com>
Date: Friday, June 3, 2022 at 11:37 AM
To: "Smith, Ned" <ned.smith@intel.com>, Jeremy O'Donoghue <jodonogh@qti.qualcomm.com>, Laurence Lundblade <lgl@island-resort.com>, Henk Berkholz <henk.birkholz@sit.fraunhofer.de>
Cc: "Eric Voit (evoit)" <evoit@cisco.com>, "Eric Voit (evoit)" <evoit=40cisco.com@dmarc.ietf.org>, Nancy Cam-Winget <ncamwing@cisco.com>, "rats@ietf.org" <rats@ietf.org>
Subject: RE: [Rats] security-level claim (was Re: WGLC for https://datatracker.ietf.org/doc/html/draft-ietf-rats-eat)

My impression with the concerns being raised on security level is that there is not a clear delineation between whether it is attestation evidence and attestation results.  I was hoping to get guidance from the RIV doc, which the group has approved for advancement beyond LC, for guidance.  In this doc, all PCR entries are represented as attestation evidence.  As I have shown below, several of the PCR values as defined could be interpreted to be self-assessments or results.  I do think this is relevant -  other drafts that have successfully advanced beyond WGLC can be used for guidance in the context of EAT.
[2]
I have also highlighted that the group seems to have been comfortable with guidance such as “Verifiers typically need to know which log entries are consequential and which are not (possibly controlled by local policies)” in WG drafts that have been forwarded that have made it past LC.  Why can’t such guidelines apply to sec level?  If a verifier based on its local policy has determined sec level is not consequential they are free to ignore it.

-Giri

From: Smith, Ned <ned.smith@intel.com>
Sent: Friday, June 3, 2022 11:29 AM
To: Giridhar Mandyam <mandyam@qti.qualcomm.com>; Jeremy O'Donoghue <jodonogh@qti.qualcomm.com>; Laurence Lundblade <lgl@island-resort.com>; Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Cc: Eric Voit (evoit) <evoit@cisco.com>; Eric Voit (evoit) <evoit=40cisco.com@dmarc.ietf.org>; Nancy Cam-Winget (ncamwing) <ncamwing@cisco.com>; rats@ietf.org
Subject: Re: [Rats] security-level claim (was Re: WGLC for https://datatracker.ietf.org/doc/html/draft-ietf-rats-eat)


WARNING: This email originated from outside of Qualcomm. Please be wary of any links or attachments, and do not enable macros.
I’m not sure how observations about a different draft / legacy technology addresses the issues raised related to the EAT draft security-level claim.
There might be issues with another draft, but those issues should be raised in the context of the draft to which they pertain.
-Ned

From: Giridhar Mandyam <mandyam@qti.qualcomm.com<mailto:mandyam@qti.qualcomm.com>>
Date: Thursday, June 2, 2022 at 1:45 PM
To: Jeremy O'Donoghue <jodonogh@qti.qualcomm.com<mailto:jodonogh@qti.qualcomm.com>>, Laurence Lundblade <lgl@island-resort.com<mailto:lgl@island-resort.com>>, Henk Berkholz <henk.birkholz@sit.fraunhofer.de<mailto:henk.birkholz@sit.fraunhofer.de>>
Cc: "Eric Voit (evoit)" <evoit@cisco.com<mailto:evoit@cisco.com>>, "Smith, Ned" <ned.smith@intel.com<mailto:ned.smith@intel.com>>, "Eric Voit (evoit)" <evoit=40cisco.com@dmarc.ietf.org<mailto:evoit=40cisco.com@dmarc.ietf.org>>, Nancy Cam-Winget <ncamwing@cisco.com<mailto:ncamwing@cisco.com>>, "rats@ietf.org<mailto:rats@ietf.org>" <rats@ietf.org<mailto:rats@ietf.org>>
Subject: RE: [Rats] security-level claim (was Re: WGLC for https://datatracker.ietf.org/doc/html/draft-ietf-rats-eat)

I also make an observation that some of the persons who are claiming confusion about whether security level is attestation evidence, attestation results or some form of self-declaration seem to be quite comfortable with comparable (maybe greater) ambiguity with TPM’s.

For instance in https://www.ietf.org/archive/id/draft-ietf-rats-tpm-based-network-device-attest-14.html#name-notes-on-pcr-allocations:


  1.  “PCR[0] typically represents a consistent view of rarely-changed Host Platform boot components, allowing Attestation policies to be defined using the less changeable components of the transitive trust chain. “

How is a “rarely-changed” boot component identified?  Is this the “result” of a rules engine within the attester?



  1.  “PCR[4] is intended to represent the software that manages the transition between the platform's Pre-Operating System start and the state of a system with the Operating System present. ”



What if there are multiple OS’s in the system?  Which entity determines what constitutes the specific operating system that corresponds to this PCR?  Isn’t this an attestation result as opposed to just evidence, as this value cannot be in the quote without a preliminary determination (result) identifying which SW is responsible for the transition to the target OS?



  1.  The text goes on to state “Although the TCG PC Client document specifies the use of the first eight PCRs very carefully to ensure interoperability among multiple UEFI BIOS vendors, *it should be noted that embedded software vendors may have considerably more flexibility*. Verifiers typically need to know which log entries are consequential and which are not (*possibly controlled by local policies*)”



So why is it OK for a RIV-compliant implementation (embedded software vendor) to assign arbitrary values to a PCR (which could conceivably span both evidence and results) with the expectation that a relying party/verifier to be able to apply the appropriate policy to interpret it, but it is unacceptable to expect a verifier to interpret sec level in the context of its own appraisal policy?

-Giri

From: Jeremy O'Donoghue <jodonogh@qti.qualcomm.com<mailto:jodonogh@qti.qualcomm.com>>
Sent: Thursday, June 2, 2022 12:29 PM
To: Laurence Lundblade <lgl@island-resort.com<mailto:lgl@island-resort.com>>; Henk Birkholz <henk.birkholz@sit.fraunhofer.de<mailto:henk.birkholz@sit.fraunhofer.de>>
Cc: Eric Voit (evoit) <evoit@cisco.com<mailto:evoit@cisco.com>>; Smith, Ned <ned.smith@intel.com<mailto:ned.smith@intel.com>>; Giridhar Mandyam <mandyam@qti.qualcomm.com<mailto:mandyam@qti.qualcomm.com>>; Eric Voit (evoit) <evoit=40cisco.com@dmarc.ietf.org<mailto:evoit=40cisco.com@dmarc.ietf.org>>; Nancy Cam-Winget (ncamwing) <ncamwing@cisco.com<mailto:ncamwing@cisco.com>>; rats@ietf.org<mailto:rats@ietf.org>
Subject: Re: [Rats] security-level claim (was Re: WGLC for https://datatracker.ietf.org/doc/html/draft-ietf-rats-eat)

I’m pretty happy with the latest text. It’s a considerable improvement on what we had previously.

On 02/06/2022, 11:54, "RATS" <rats-bounces@ietf.org<mailto:rats-bounces@ietf.org>> wrote:


WARNING: This email originated from outside of Qualcomm. Please be wary of any links or attachments, and do not enable macros.

On Jun 2, 2022, at 10:50 AM, Henk Birkholz <henk.birkholz@sit.fraunhofer.de<mailto:henk.birkholz@sit.fraunhofer.de>> wrote:

Hi Ned,

this also reflects my perception of group consensus.

Maybe be little careful about concluding what consensus is here?

There are an equal number of people expressing support of security level as there are questioning it.

Isn’t consensus based on number of people, not on how long the list of questions is or how strong the view is?

LL