Re: [Rats] challenges of building dependant specifications against Internet-Drafts -- a way forward for EAT

Simon Frost <Simon.Frost@arm.com> Thu, 10 December 2020 18:11 UTC

Return-Path: <Simon.Frost@arm.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C88D63A102A for <rats@ietfa.amsl.com>; Thu, 10 Dec 2020 10:11:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=ZQS7hlB/; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=ZQS7hlB/
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tMul6ma3dQIm for <rats@ietfa.amsl.com>; Thu, 10 Dec 2020 10:11:28 -0800 (PST)
Received: from FRA01-PR2-obe.outbound.protection.outlook.com (mail-eopbgr120077.outbound.protection.outlook.com [40.107.12.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 85F5A3A101E for <rats@ietf.org>; Thu, 10 Dec 2020 10:11:27 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=iWs5Hu7mM7ZL01eTJ6boqYiyP7Xt1dUfd/x0HiXUtJA=; b=ZQS7hlB/sAsySaHKXYXV4M1hujgHOJBlydpU6/+QlylfJmdokQsxewtmQwiMZtXPurLdxdp2tGA0Kn6gRFnZRDZZkgPvosliW59awRLZtzKL4y8vohbbZraa/QL9O711aIKXeCJQa2H1/Bc8qUByZ/XFCiJhieTkCsqGfT4fAeY=
Received: from DB7PR02CA0020.eurprd02.prod.outlook.com (2603:10a6:10:52::33) by PR2PR08MB4793.eurprd08.prod.outlook.com (2603:10a6:101:1f::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.12; Thu, 10 Dec 2020 18:11:24 +0000
Received: from DB5EUR03FT026.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:52:cafe::83) by DB7PR02CA0020.outlook.office365.com (2603:10a6:10:52::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.12 via Frontend Transport; Thu, 10 Dec 2020 18:11:24 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT026.mail.protection.outlook.com (10.152.20.159) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.12 via Frontend Transport; Thu, 10 Dec 2020 18:11:24 +0000
Received: ("Tessian outbound 665ba7fbdfd9:v71"); Thu, 10 Dec 2020 18:11:23 +0000
X-CR-MTA-TID: 64aa7808
Received: from 73a7ff0a8851.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 03239F2D-176E-459A-BE4D-BCA750E9F20A.1; Thu, 10 Dec 2020 18:11:18 +0000
Received: from EUR05-DB8-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 73a7ff0a8851.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 10 Dec 2020 18:11:18 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HbUHcsA6CIVeJ4yJ2E4MV+dETMpnJmbzQUvzRIxBvx9A84oczbSUcFSrWcll3jzO4XTzV2iiY3lDNnY+kZALJhyl/qVpLl9JmNE4VIXDK+jMBrCkTcNg+Xi4NqqKbl3yldNioVjp8W932CqxgLfl1nt9X88UuK4jJxaFiFIw/qix7lmDV8bB8+HrsVwDXO8i4HWSGdZiIEZ6a7tLaycsDhQQPA7CnJ9JKn+4XGB/X56kBi49nDSfdWx4+FKCWYOaOi3rwmWbGGX4GO4Ll0WV/GT0jjlEUwX2c0nP7EXEKE5XCSU5Kp5vj5FbDznelKYlHYDv15XWtJff8of1oSBiDg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=iWs5Hu7mM7ZL01eTJ6boqYiyP7Xt1dUfd/x0HiXUtJA=; b=PmUQ/PnD5LSh+rfE+n9El+yJReHkd45cTje7gihBDdp8izJKnDmwKwmReIlU35FZNMKx5cRyYOPZEVIQjpdvnwL8y191OpzsyMqigp9Kt6s3jfbLzRwjD0TkT5WOWFhpzuCdoKJlXk77G1O7m+bEeekWdfS6nscanyo9cnhac/DkpmIIvtEIyj3UO68k/T7LkZT2yFsDl8gVXCqqJ9IxH94PFQXJC9CI+KFEtYQM1l1/JuwqG6Ws8I8M4arW0oh/4gEDBe69BOwTWG4ZbYYe4oNDamsaBvr+1jbZA39hTpH69V3AqWOiPsk8FqmQUwob2jJDfZFykVk4Cr4xSrhGUA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=iWs5Hu7mM7ZL01eTJ6boqYiyP7Xt1dUfd/x0HiXUtJA=; b=ZQS7hlB/sAsySaHKXYXV4M1hujgHOJBlydpU6/+QlylfJmdokQsxewtmQwiMZtXPurLdxdp2tGA0Kn6gRFnZRDZZkgPvosliW59awRLZtzKL4y8vohbbZraa/QL9O711aIKXeCJQa2H1/Bc8qUByZ/XFCiJhieTkCsqGfT4fAeY=
Received: from AM6PR08MB3429.eurprd08.prod.outlook.com (2603:10a6:20b:49::19) by AM6PR08MB4392.eurprd08.prod.outlook.com (2603:10a6:20b:bf::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.17; Thu, 10 Dec 2020 18:11:17 +0000
Received: from AM6PR08MB3429.eurprd08.prod.outlook.com ([fe80::70aa:dedb:5b80:1d30]) by AM6PR08MB3429.eurprd08.prod.outlook.com ([fe80::70aa:dedb:5b80:1d30%5]) with mapi id 15.20.3654.013; Thu, 10 Dec 2020 18:11:17 +0000
From: Simon Frost <Simon.Frost@arm.com>
To: Laurence Lundblade <lgl@island-resort.com>, Michael Richardson <mcr+ietf@sandelman.ca>, "Nancy Cam-Winget (ncamwing)" <ncamwing=40cisco.com@dmarc.ietf.org>, Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>, "Smith, Ned" <ned.smith@intel.com>
CC: "rats@ietf.org" <rats@ietf.org>
Thread-Topic: [Rats] challenges of building dependant specifications against Internet-Drafts -- a way forward for EAT
Thread-Index: AQHWzx/ZanAguVfCjE2XB+On2ujm3A==
Date: Thu, 10 Dec 2020 18:11:17 +0000
Message-ID: <AM6PR08MB34297B962E5283C5953BE72DEFCB0@AM6PR08MB3429.eurprd08.prod.outlook.com>
References: <24519.1606681083@localhost> <BL0PR11MB312296BEFD428C6D9CE9A5DEA1F50@BL0PR11MB3122.namprd11.prod.outlook.com> <AM0PR08MB371606D3753BED36E71A5754FAF50@AM0PR08MB3716.eurprd08.prod.outlook.com> <BL0PR11MB3122D35683FD909A3C80E4DEA1F50@BL0PR11MB3122.namprd11.prod.outlook.com> <3849.1606759884@localhost> <B9175A1C-C024-463F-B438-36C7DDEBD1A8@island-resort.com> <24158.1606778219@localhost> <AD1F4237-A5AC-4DF5-B48A-D0C5CD1DF9A1@island-resort.com>
In-Reply-To: <AD1F4237-A5AC-4DF5-B48A-D0C5CD1DF9A1@island-resort.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: F2930ECF5589864597A687E2C35F92CC.0
x-checkrecipientchecked: true
Authentication-Results-Original: island-resort.com; dkim=none (message not signed) header.d=none;island-resort.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [212.69.61.73]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: 78314a2e-ded8-487e-eb6f-08d89d37011e
x-ms-traffictypediagnostic: AM6PR08MB4392:|PR2PR08MB4793:
X-Microsoft-Antispam-PRVS: <PR2PR08MB4793606173F1A39DF1F7C79AEFCB0@PR2PR08MB4793.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:3276;OLM:6430;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 97RgAsLNEIwXSlykN9jTHfpP7bNrTb5U0sneA3zDXlX5XUcQsYo7NYHdnd7ui74sKKI1AIz3cnQRPj1X8MVy3be9HBNuV/kTvrKVDn/ubW7HT0ayrtH861qR05PwzQmoLr17CGFSb08zLfgcop0lf9rny2rrHJSu8FFGTs9fp+FHxwqn47awdvy1kawHe46HI6g54r6p2gY7ytCZmW27wzNsgg6tLZu/QUJatP6Am3afUoY8+xRB8vW9lr9QhhW2dKn/hnUafeJJLimaqbhHI3CxVFxGdQkAGJjipa6Nyrxj5Sz4N0aEyyRCleBG29EBweEPqV8GHG4tR5ra6O5p5TagkIdtBouE+2MJlEvSMkMJi8XXLtJioWifI3AkahrvQ6fjJRAQlUVy+PA8/37Hew==
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM6PR08MB3429.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(136003)(366004)(376002)(396003)(39860400002)(346002)(66476007)(110136005)(8676002)(53546011)(186003)(966005)(6506007)(478600001)(71200400001)(76116006)(66556008)(316002)(66946007)(2906002)(66574015)(8936002)(5660300002)(83380400001)(166002)(64756008)(66446008)(4326008)(86362001)(52536014)(55016002)(33656002)(9686003)(26005)(7696005); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: =?utf-8?B?M3ZCeHgzSVZOSktZTitqdFlUd29ETFpNenBEV2lWSVVVQUk4dlczeENmdHVL?= =?utf-8?B?dUdVdklhNlQ2bkVyN3k3SGNrNkF4UXBVYUxwSTZ4N1NseFAzNUMzMFJtbDZE?= =?utf-8?B?LzcxemdHc1FQZnV2ZUZIRmg4SGFIbSs4dEwvalEzeFcyYlF3WG5sbUlVRmNY?= =?utf-8?B?aE1zcVpCS1lXek5UQUgzbUJzMXVwZTZNK1V2UkVOSnU5VHF2RkE5YmhvWEVa?= =?utf-8?B?T3NockVYNkxWQ0dQRHQzZG9uTlN2V21pUFZaSElOeWVLMEpyTTdKQTkwcFZY?= =?utf-8?B?SXhJYkRCaXBiaVJrdmlqYmd3U1RVYi9IWlFDNGowMUhEV1E4cktLdUZwU0Nk?= =?utf-8?B?ZW00UnNmeWVWc25xM3R4VmFldDVjOHNRMGsxaytXd3RBNXNiaGs3WHNacWQ4?= =?utf-8?B?RkpXYWM0dU5iNjhrNHpiWDZyWmJDMXhMUGE4OFBEYk5HQ0IvWmR6S1hMWCtv?= =?utf-8?B?NnlUZVRHUXZDaUpHMHYzTURMYW9ON1lzU0t1TEN6dkgwdUZCUGhVUnZWaE1B?= =?utf-8?B?MjgydFYrVFRqU1cxRDRBYVNyaG5OMWdrMHVCWlFpZGpiQklROUx6VE1VTEov?= =?utf-8?B?Nmx2MkZEUUJJbnlPVmVnaU5xMXpxUTgyamd5ZjcySmtHSVovZlVNcmJqRjM4?= =?utf-8?B?aU8xVkk0R1JUclRqMGdyZitrRkNsUWw2NW91NEJqekp0ZDB0TTVPbmN4OXBM?= =?utf-8?B?R2NOcFI1TTBPSFlRQWdLRjA1bDlVYTZXN0o2d3BQdjl4Vy9SVzlyR2FyeUVX?= =?utf-8?B?THZFNDBwTkdOU0xaN2ttZ2ZHWXZGMDlkMmVDdmQyU0lCV3ZUR0JHT000Kzkz?= =?utf-8?B?bFNBT3Radm9admpBdWVKSGphY1RZQUpuMFR0Q2JadHFaWHlYczBtWFkwbXA3?= =?utf-8?B?SW9qZjVyK2x0YnFrMU12UHhiZUE4b1FEalNiaklIY3ljSTNaWTE4NWh4Wkdu?= =?utf-8?B?Wk40bXRsNHphZ3BmSG1wSnQvc1g3TTlJR3pvaDlSa0dtQkhFYmcvWisxcjFZ?= =?utf-8?B?TU1sR2hxUml2bnhlTTFyb3Y2bmVWY0FmVDJvMDdkVHN3RWpiNkV4VXlTM0xP?= =?utf-8?B?bDBmRjB5dWtPTmo4V29tNWlLM3JET2dsL0tlOUUyRmFyYUorK1lVZ3dHc1BL?= =?utf-8?B?ckRuQmR4MDZBS0ZpeFp1dklORHlMdkkxaXB5THlibWV2Sm5ka2I1VC9WdW5q?= =?utf-8?B?UEJBdWszZ0lhc3BwZC8xNmZCcWZLRDZsRTQ1eEVQWm9RWHMzVlZtZlByTFRk?= =?utf-8?B?VG5DdmUzRVFaOUx4cVpKckNIRjNVTkxha0pGbzQwQ1ZmT1YxdXRGVU1PSmxT?= =?utf-8?Q?Bcgg71fr+koB0=3D?=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_AM6PR08MB34297B962E5283C5953BE72DEFCB0AM6PR08MB3429eurp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR08MB4392
Original-Authentication-Results: island-resort.com; dkim=none (message not signed) header.d=none;island-resort.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT026.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs: 12071f81-b800-4781-31c9-08d89d36fd75
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: cnz/SMdvkYhZWA4aV09totvvi5S3RcDAFtIMyZxDcIDNG5eP4qscyt0iuE/J3dOUKRat6oo7Q/A4pWPjgMwSqjzTOVuEmcKCWdDFPrEl3COIyrFGwbvzXPRldtTcXjTZ+jaUnxIAi82YeLKQjo1+a3/IXYUOsoVZzQjC0AwBl1CM/TSmNBJZ9DHONpXpwLfA16bqxrnZaW89VksKwsr0/MgwPzQzYfcEu9QsVT6/oe+/D34kUq96jEw6GfIdgTslZwzcF9222we/oRhqICDXRn9qzIQ2Gogf9Sr1RMUxvhje7Cnu19bjfiTwAcCO8xnYk4kMDDHGsvBvQR0JRuRKdtjMZfdTHUpRMjz3HOAOI3J1ndaOqHeKLblYjDKwzUw9MsUZv6Ksa7AVU/nbWc0TKA78nJcbKwuflOEk3L2t5WtVRoIU5nbvQTeoVYcCvJx1Htl7dTgpiQ/aFzTMawvaxDtYZ+fhiwQOFvOtAhe8he4=
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(346002)(396003)(376002)(39860400002)(136003)(46966005)(4326008)(336012)(53546011)(6506007)(70206006)(478600001)(8936002)(52536014)(70586007)(166002)(110136005)(356005)(7696005)(966005)(81166007)(66574015)(83380400001)(26005)(33964004)(316002)(33656002)(5660300002)(82310400003)(82740400003)(47076004)(186003)(55016002)(8676002)(9686003)(2906002)(86362001); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Dec 2020 18:11:24.0420 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 78314a2e-ded8-487e-eb6f-08d89d37011e
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT026.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PR2PR08MB4793
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/5KUPmBNY7jTDiEJP9m6_mUgTcxk>
Subject: Re: [Rats] challenges of building dependant specifications against Internet-Drafts -- a way forward for EAT
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Dec 2020 18:11:31 -0000

I can confirm approval from the Arm team to register these standard claims.

Thanks
Simon

From: Laurence Lundblade <lgl@island-resort.com>
Sent: 04 December 2020 19:57
To: Michael Richardson <mcr+ietf@sandelman.ca>ca>; Nancy Cam-Winget (ncamwing) <ncamwing=40cisco.com@dmarc.ietf.org>rg>; Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>om>; Smith, Ned <ned.smith@intel.com>
Cc: rats@ietf.org
Subject: Re: [Rats] challenges of building dependant specifications against Internet-Drafts -- a way forward for EAT

So I read RFC 7120 which is super clear and exactly what is needed. It lines up with my third proposal. We will ask IANA to pre-register claims in the Standards Action space of the CWT registry and also in the JWT registry. Or rather per the 7120, the WG chairs determine consensus here, then will ask the AD(s) and then ask IANA.

Is there consensus on pre-registration of these?

Name      Description         CWT     JWT                     Type
nonce     Nonce               10      <already registered>    byte string
ueid      Universal Entity ID 11      ueid                    byte string
oemid     OEM ID              13      oemid                   byte string
seclevel  Security Level      14      seclevel                integer
secboot   Secure boot         15      secboot                 integer
dbgstat   Debug status        16      dbgstat                 integer
location  Location            17      location                map
submods   Submodules Section  20      submods                 map

These have all been in the EAT document for a long time and are described well in draft-ietf-rats-eat-06. They are fairly well understood and have either no open issues or only small open issues in GitHub against them. They include the most essential claims (nonce, ueid, oemid & submods) to implement an EAT.

I have chosen not to ask for the others because I don’t think they are as essential or as well understood yet and thus don’t meet the criteria in RFC 7120.

CWT numbers aren’t contiguous so as to line up with examples that have been in the EAT draft for a while. I’ve shortened the JWT claims keys to less than 8 per RFC 7519.

If approved and registered, we’ll quickly publish a new EAT draft.

LL






On Nov 30, 2020, at 3:16 PM, Michael Richardson <mcr+ietf@sandelman.ca<mailto:mcr+ietf@sandelman.ca>> wrote:


Laurence Lundblade <lgl@island-resort.com<mailto:lgl@island-resort.com>> wrote:

The trouble is that I think many claims should be in the Standards
Action range (-255 to 255).  For example, nonce, ueid, submods section,
location, CoSWID and probably a few others should be in the standard
space. If I were IANA I would hesitate to register these in the
Standards Action range until the EAT document is further along.

The WG can ask for Early Allocation.
It should do it immediately, so that the Expert will provided feedback immediately.


It also seems poor practice to unilaterally pre-assign Standards Action
range claims in an EAT draft and then use them in a bunch of
implementations. Those numbers could be assigned to some one else
before EAT is an RFC.

You can do that if a registry you are just creating.
But, yes, you can't do that if you are using CWT.


Register them in the Specification Required space (255 to 65535) once
and for all. That will result in 3-byte map labels rather than 1-byte
map labels, but there’s no transition.


Finally, a third proposal:


Maybe we can convince IANA to pre-register a small clear set in the
standard space? Perhaps just nonce and UEID.

Please go read RFC7120.

--
]               Never tell me the odds!                 | ipv6 mesh networks [
]   Michael Richardson, Sandelman Software Works        |    IoT architect   [
]     mcr@sandelman.ca<mailto:mcr@sandelman.ca>  http://www.sandelman.ca/        |   ruby on rails    [

_______________________________________________
RATS mailing list
RATS@ietf.org<mailto:RATS@ietf.org>
https://www.ietf.org/mailman/listinfo/rats

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.