Re: [Rats] Use case -> architecture document

"Diego R. Lopez" <diego.r.lopez@telefonica.com> Thu, 10 October 2019 06:46 UTC

Return-Path: <diego.r.lopez@telefonica.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 52A92120821 for <rats@ietfa.amsl.com>; Wed, 9 Oct 2019 23:46:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=telefonica.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KXeYz_yGAKAq for <rats@ietfa.amsl.com>; Wed, 9 Oct 2019 23:46:04 -0700 (PDT)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-he1eur04on072c.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe0d::72c]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5C886120100 for <rats@ietf.org>; Wed, 9 Oct 2019 23:46:03 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kU/b3EwFr8BNgVIGuC4Sdpf3024JgixWWE2flIFSxTS5RoRV0TeYbPtENipj7wlay8xWixSdUSvQJ8mgGiODM4dO/CiEFRyXvY7kVwPV9T7D26WUhv550VVYkmM+w/8X5ZlRFE/emCCFXKja+uYwXEZS8805KMALclj/ZCVPJYHwQ0dOM50BJ4Cj5fWMKQuhZpkjS1KwhgdYGJAmgzuWSK/27CIdoR/Xlu3HHIseIPIVe4nlBVM0O/ORGp7CtyQWk+7wV9YYGc8xrtcuJdsZn4VYsDZd0M+qIUPXRsPO5Uod3vPQuC4Kg8tMBLTa8b7gEl3A3RT4CypRdaDZNuK0cQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=58jBFZZfGoCrxoDH1z1UTh8NOvUEW9mnqVDKnfvaw/w=; b=UwY1kzhVicFb11hPZpWqiY+D7QWedU5XdTfqCoYM5csrBCA8/0MEbJG4IQexBqqVZKmvoIeDxyae4fz1lrezo1tKg7bJbtUnY7Z4t2WAjwcifdG3zKpDtsP55KnXkXdM7xoHwMXZEtIbLPGL68pSkOwyvhXF8BD13R0jjEnBhJ5jdx3TMxB6WZe5jnZ/Jd3cmUELBpS1U5Boo2a47NhguscbGJaVzjP/qQF8gBOO/TqRA//CWmKqvzZ+WRhOGRlbsQrWafBcclEBh9Cud7XP98DhSTBrY8OYiLJ8NUGW8DFMEnYeQnlmN4p1oswwdFpZ38wlD6scuaysTU1puzn8qQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=telefonica.com; dmarc=pass action=none header.from=telefonica.com; dkim=pass header.d=telefonica.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telefonica.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=58jBFZZfGoCrxoDH1z1UTh8NOvUEW9mnqVDKnfvaw/w=; b=SUFfNaUsVZuis4kAXUC47DyJo7N74mhTHZm5lcz4qyyDn1Vs/c5ca9HYEuO/jW+NETY+Egb9dcCp8OXT7qe5mplUc1TlKL1m/fN8EkfnyjcIdl66ZSg7B0Mr/4YNDANafMhJzZhXFBVSiuq62fW4iYEWSn7olAX6W9guDznZNlo=
Received: from DB3PR0602MB3788.eurprd06.prod.outlook.com (52.134.70.148) by DB3PR0602MB3738.eurprd06.prod.outlook.com (52.134.71.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2305.20; Thu, 10 Oct 2019 06:45:59 +0000
Received: from DB3PR0602MB3788.eurprd06.prod.outlook.com ([fe80::9d2e:16e6:f054:a752]) by DB3PR0602MB3788.eurprd06.prod.outlook.com ([fe80::9d2e:16e6:f054:a752%7]) with mapi id 15.20.2327.026; Thu, 10 Oct 2019 06:45:59 +0000
From: "Diego R. Lopez" <diego.r.lopez@telefonica.com>
To: Guy Fedorkow <gfedorkow=40juniper.net@dmarc.ietf.org>, Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>, "rats@ietf.org" <rats@ietf.org>
Thread-Topic: [Rats] Use case -> architecture document
Thread-Index: AQHVfpUrB+cR3/fhSUi4jZjwJmbP9adSM9uAgAAwqYCAABSIAIAACXkAgAAPgoCAACvHAIAAOxeAgACYMwA=
Date: Thu, 10 Oct 2019 06:45:59 +0000
Message-ID: <3902BBD9-E667-47C7-83F0-5F7612ACDE8C@telefonica.com>
References: <CAHbuEH7f0jjquR=iZDgof4DkgpZKgxEP86NcQ0A1NQ=SP+_FHA@mail.gmail.com> <C02846B1344F344EB4FAA6FA7AF481F13E9560C0@dggemm511-mbx.china.huawei.com> <CAHbuEH7WkqeyUW3sL5bdw5N25B6O7ZEF0Qkx03fE5c42Sd4M5w@mail.gmail.com> <b91baad2-2fc3-a5e4-6898-e2cddcda300d@sit.fraunhofer.de> <20191009145006.r2pjsoo6jxirah64@anna.jacobs.jacobs-university.de> <CAHbuEH6u-6GsJjK8s0eFQPLeSuGjPMgonhyQkmaeA6Q+rp42kA@mail.gmail.com> <9379d880-2b7e-6657-c547-b37bb7a9e466@sit.fraunhofer.de> <CAHbuEH7XfWgPT+=T-Za9Cw-5GRQj0_+WT3L+Kd4aPp6VvU9jAQ@mail.gmail.com> <CAHbuEH5eGQayxUBd8g+T8Zt=q0Wwsg7nk8jj0kvHLWWdtwemzQ@mail.gmail.com> <BYAPR05MB4248D2B30B17B48933EABDECBA950@BYAPR05MB4248.namprd05.prod.outlook.com>
In-Reply-To: <BYAPR05MB4248D2B30B17B48933EABDECBA950@BYAPR05MB4248.namprd05.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.10.e.190909
authentication-results: spf=none (sender IP is ) smtp.mailfrom=diego.r.lopez@telefonica.com;
x-originating-ip: [88.4.182.129]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0e0d78f6-2f37-476e-116f-08d74d4d82a0
x-ms-office365-filtering-ht: Tenant
x-ms-traffictypediagnostic: DB3PR0602MB3738:
x-ms-exchange-purlcount: 4
x-microsoft-antispam-prvs: <DB3PR0602MB37386D31995B04F6AEE4CCABDF940@DB3PR0602MB3738.eurprd06.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 018632C080
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(4636009)(39860400002)(136003)(346002)(366004)(376002)(396003)(189003)(40134004)(199004)(51444003)(25786009)(486006)(606006)(5660300002)(14454004)(561944003)(8676002)(2906002)(6246003)(33656002)(36756003)(110136005)(476003)(446003)(76116006)(478600001)(66556008)(91956017)(66446008)(64756008)(7736002)(66476007)(966005)(86362001)(66946007)(2616005)(45080400002)(11346002)(186003)(229853002)(256004)(14444005)(5024004)(6436002)(81156014)(71200400001)(71190400001)(3846002)(2501003)(81166006)(6116002)(99286004)(66066001)(76176011)(6306002)(54896002)(316002)(786003)(8936002)(58126008)(102836004)(30864003)(236005)(53546011)(6506007)(66574012)(26005)(6512007)(6486002)(579004); DIR:OUT; SFP:1102; SCL:1; SRVR:DB3PR0602MB3738; H:DB3PR0602MB3788.eurprd06.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: telefonica.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: SjDV8L9n+P5bK0aOAXNg2g9B3DFwbwMSAZCPuefwiu2kifBUU1uFZnNPfrpRwIMr3a1KwWkdq6rXldvwv/jU2gUNEFA69ORearW55AImy0uDnpQVX2s5cOVpeewCClnf9cOgdNROB5DQvvkKszFJgBKAsngeZTzqS+H5sqyni3/fFmjwjJPPwNKrTkNCneP5QHvS0ivDH6aFyZHYVYJwtnSEtrqP+TSO61oTdp+9fO08mxQamkE0uUQcwU/4l12b4KjH51p/ya52Eq82riMAKs1wWC0Rsx9WxJGK3pI63KYQosGjkZkJjZQ7D4xeOOjz0/XtY3TxhcO2oLjKstEITiSW+sSjVaIYQoxB2VcnlilOB8Thh1auAJG7zSBa3ffyfQ2b0OTe1W0SontZXkIqZM/1m95EVQWzcJaRL3o6FzQ9kViS40/YF5Swd0rq1Yjw31zc+itJNTHq/Z/5f0lcYQ==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_3902BBD9E66747C783F05F7612ACDE8Ctelefonicacom_"
MIME-Version: 1.0
X-OriginatorOrg: telefonica.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0e0d78f6-2f37-476e-116f-08d74d4d82a0
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Oct 2019 06:45:59.4824 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 9744600e-3e04-492e-baa1-25ec245c6f10
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: KPYYV+gOxl59+uzL/eqqqCeg2eRe2W9TLJxt7bnGi69TMPNxa+/RKkBWPgWHS7m9dgX8MLQro6N9XSfkQa++d6+lLY1CgzRjP3AUfn3lqiA=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB3PR0602MB3738
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/jZHYznPdGqBWDXPqNPHQvoRC6Dw>
Subject: Re: [Rats] Use case -> architecture document
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote Attestation Procedures <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Oct 2019 06:46:11 -0000

Hi,

That was precisely what I was proposing, may be in a not so clear way…

Be goode,

--
"Esta vez no fallaremos, Doctor Infierno"

Dr Diego R. Lopez
Telefonica I+D
https://www.linkedin.com/in/dr2lopez/

e-mail: diego.r.lopez@telefonica.com<mailto:diego.r.lopez@telefonica.com>
Tel:         +34 913 129 041
Mobile:  +34 682 051 091
----------------------------------

On 10/10/2019, 01:41, "RATS on behalf of Guy Fedorkow" <rats-bounces@ietf.org<mailto:rats-bounces@ietf.org> on behalf of gfedorkow=40juniper.net@dmarc.ietf.org<mailto:gfedorkow=40juniper.net@dmarc.ietf.org>> wrote:


Hi Henk,

    Do you think that the ‘readability’ concerns would be addressed if the architecture doc were to adopt a summary of some sort of the use-cases as part of its introductory material?  That would give a definition of the problem to be solved written in common language, so ordinary people could read it, followed by the more-carefully-defined terms, roles and procedures?

    /guy


From: RATS <rats-bounces@ietf.org> On Behalf Of Kathleen Moriarty
Sent: Wednesday, October 9, 2019 4:10 PM
To: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>; rats@ietf.org
Subject: Re: [Rats] Use case -> architecture document

Hello,

Henk expressed concern with my use of the word 'merge'.  By exploring this new structure, I am not suggesting that we drop content.  It's a restructure proposal and hopefully a way to make the document more accessible.  I am not suggesting essential components be dropped, but would like them described more clearly.  This may help reset the readability of the document.  Obviously, the WG is who decides what gets adopted as a WG item.  I'd also like to make sure the end result is something that is easily adoptable by industry that are already moving forward with proprietary solutions.  We should put our best foot forward to try to influence and gain adoption.

Michael offered to look at the structures of the TEEP and SUIT architecture documents and to see what might make sense here and will post to the list.

Best regards,
Kathleen

On Wed, Oct 9, 2019 at 1:33 PM Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com<mailto:kathleen.moriarty.ietf@gmail..com>> wrote:
Hi Henk,

On Wed, Oct 9, 2019 at 12:37 PM Henk Birkholz <henk.birkholz@sit.fraunhofer.de<mailto:henk.birkholz@sit.fraunhofer.de>> wrote:
Hi Kathleen,
hi list,

while I of course understand your point of "the simpler, the better", I
am still a bit of at a loss, what the actual issue is. You are proposing
a solution to a problem that I currently have not seen being described yet.

Maybe we should do things in order and describe the problem better first
and then see how to resolve it inside the existing document?

I tried to provide extensive comments, but they were not considered and I was asked by you to look at the new version again.  I spent over 2 days trying to help, but I think to speed this work up, we need to do a pivot and focus first on the architectural patterns.


That is basically the reason for my request to you on actual issues in
my last comment. I understand the category of the problem "readability"
and I assume analogously "comprehensibility", of course, but I think
that is too vague to actually act on.

I tried to help...

What you are describing with respect to workflow diagrams that is using
the roles - Dave did already provided those and walked us through them
for example at the first interim, and we are doing ASCII art on them
currently.

As a reminder, we don't need ASCII art anymore, version 3 was released for publishing.  If Dave contributes his pictures, we can use them.

In terms of how roles are discussed, I think that can be improved further.  Can we just wait and give Dave a chance to write up the text he has said he would help with on this rather than trying to all do the same thing?


In fact, that very first action item wrt what we are working on (well,
we paralleled some other items, too) back in early September was:

> * to elaborate on the use of RATS Principals, including more exemplary diagrams of RATS Role composition and interaction between RATS Principals based on the use case document (and by that address a unified mapping to TEEP, RIV, and models that use EAT)

So what am I hearing now is that Dave is now starting to do the exact
same thing, with the exception of not using the terms defined in the
architecture. Is that correct? I am still not sure what issues we are
trying to address here.

Not necessarily..  His work used terms in TEEP and SUIT.  Some of these terms are defined int he current architecture document.  Once he has this written, then merging again makes sense so that we can then get language consistent and using what's been agreed upon to date. I think this will actually speed up the work and adoption.  It will also lower the learning curve.  You've done really good work and I would like the barrier to entry lowered.  I would really like to see all of this be successful and don't think this exercise will take much time, but do think it will be very worthwhile.

I'd like to see this happen in a few steps as described in my last message.

Best regards,
Kathleen


Viele Grüße,

Henk

p.s. with respect to pair programming, I really hope that solutions
drafts simplify that process the same way the first RATS YANG module
does it today, already.

On 09.10.19 18:03, Kathleen Moriarty wrote:
>
> I would rather see the architectural patterns come before the specific
> terminology.  If you look through the slides from Dave's presentation at
> our previous interim meeting, he laid out several architectural patterns
> using the same language that is used in SUIT and TEEP.  It is desirable,
> IMO, to begin with architectural patterns that can be used in necessary
> use cases.  Additional architectural patterns may arise, but we have a
> nice starting point.
>
> See:
> https://datatracker.ietf.org/meeting/interim-2019-rats-02/materials/slides-interim-2019-rats-02-sessa-teep-and-rats-alignment<https://urldefense.com/v3/__https:/datatracker.ietf.org/meeting/interim-2019-rats-02/materials/slides-interim-2019-rats-02-sessa-teep-and-rats-alignment__;!8WoA6RjC81c!Xz1GeTjlra7rsEhGZBIFjXbzUMZsT36gMEFiL-d44MZXsNi-luOg0-LeFo4qWKJ61OI$>
> It defines the passport, background check, and verifying relying party
> architectural patterns for RATS.
> It also provides an illustration of how the OTrP model for device state
> can fold into each of those 3 RATS architectural patterns.
>
> What Dave is planning to do is to write text describing these
> architectural patterns.  It will likely be in the language similar to
> what's been used in SUIT and TEEP as his slides match the terminology.
>
> Attestation has countless use cases, and several known architectural
> patterns to date.  The document would first define these patterns..
> Then, like SUIT, a high-level description of use cases could be included
> with pointers to other future WG drafts that more fully define the use
> cases.  Any additional terminology that is necessary could then be
> added, but keeping in mind that we do not want unnecessary terms.  If we
> start from the models, it will be easier to maintain the scope and set
> of terms.  The terms would come from the current document, but language
> may be adjusted as needed.
>
> The specific use case details that map claims could be in a later
> section with the IANA section defining claims for use cases to be added
> to the CWT and JWT registry.
>
> I work for Dell and would like to be able to bring this work forward for
> PoCs.  However, our teams (like many others) use pair programming..  This
> means the 2 coders work as a team and in our model, they rotate to a new
> project every 2 weeks.  This helps with innovation and other benefits.
> If each pairing team has a significant learning curve, a lot of time
> will be wasted and the PoC would not make progress.
>
> If the goal for service providers and others is to use this technology
> (as is my goal), we need to make it something that is accessible to
> many.  The developers at many organizations will use crypto libraries,
> but will not necessarily be security people.  They will be starting from
> a point where they do not have security specific language nor this very
> specific set of terms that is being defined.  The simpler we can keep
> it, the better to gain wider adoption.
>
> I think if we step back and see what Dave does with the document to
> define the architectural patterns, then we can decide how we merge
> content with readability as a goal.
>
> Best regards,
> Kathleen
>
> On Wed, Oct 9, 2019 at 10:50 AM Schönwälder, Jürgen
> <J.Schoenwaelder@jacobs-university.de<mailto:J.Schoenwaelder@jacobs-university.de>
> <mailto:J.Schoenwaelder@jacobs-university.de<mailto:J.Schoenwaelder@jacobs-university.de>>> wrote:
>
>     Hi,
>
>     I did also look at the use cases document (I think -04) after going
>     through the architecture document and I must admit that I did not find
>     it too helpful to understand things better. I did not see anything
>     architectural in there either. I guess I will read the teep
>     architecture next and perhaps that helps me to get a better clue.
>
>     For people like me who are not deep into this technology yet, getting
>     used to the rather specific terminology and concepts is a certainly a
>     learning effort and I think the architecture document was on its way
>     to get terms well defined and sorted out. Some more examples or
>     explanations may help the reader further and I believe this can be
>     achieved.
>
>     /js
>
>     On Wed, Oct 09, 2019 at 01:55:57PM +0200, Henk Birkholz wrote:
>      > Hi Kathleen,
>      > hi list,
>      >
>      > it would help everybody, if you could explicitly highlight what
>     the exact
>      > issues wrt readability in the current architecture I-D are -
>     always in
>      > comparison with the use-case I-D, if it is doing a better job in
>     that part?
>      >
>      > Jürgen provided a good example of what he found confusing as a
>     first time
>      > reader - and that was really helpful and is resulting in ongoing
>     work.
>      >
>      > Please mind, not everything is fleshed out in the architecture
>     (e.g. the
>      > workflows derived from the use-cases). The plan was to aim for a
>     stable
>      > nucleus, address the issues raised by the list, go through
>     adoption, and
>      > finish the document via the issue tracker in a structured process.
>      >
>      > In summary, without an actual understanding why you (or others!)
>     think the
>      > document is still hard to read, there is no way of compare
>     readability later
>      > on also. It would be really good to get more precise feedback on
>     that.
>      >
>      > Viele Grüße,
>      >
>      > Henk
>      >
>      >
>      >
>      >
>      > On 09.10.19 13:31, Kathleen Moriarty wrote:
>      > > Hi Frank,
>      > >
>      > > Thank you for voicing your concern.  I think some may hold off
>     until the
>      > > updates are provided, but please do voice your opinions.  I
>     agree that
>      > > this work is too important and as such, readability is a
>     high priority.
>      > > If you read through the TEEP and SUIT architecture drafts, they are
>      > > quite easy to follow and understand.  That is critical for wide
>     spread
>      > > adoption.  We may be able to find a balance, but I think this
>     exercise
>      > > may speed progress as we have not decided to adopt this draft
>     yet as a
>      > > working group item.
>      > >
>      > > As it stands, the use case document is not an architecture
>     document, but
>      > > it could be shaped as such and I'd really like to see if we can
>     do that
>      > > in short order to have a comparison prior to an adoption call.
>      > >
>      > > Best regards,
>      > > Kathleen
>      > >
>      > > On Wed, Oct 9, 2019 at 6:53 AM Xialiang (Frank, Network Standard &
>      > > Patent Dept) <frank.xialiang@huawei.com<mailto:frank..xialiang@huawei.com>
>     <mailto:frank.xialiang@huawei.com<mailto:frank.xialiang@huawei.com>>
>      > > <mailto:frank.xialiang@huawei.com<mailto:frank.xialiang@huawei.com>
>     <mailto:frank.xialiang@huawei.com<mailto:frank.xialiang@huawei.com>>>> wrote:
>      > >
>      > >     Hi Kathleen,____
>      > >
>      > >     __ __
>      > >
>      > >     I am very concerned with this new direction and I strongly
>     object.____
>      > >
>      > >     __ __
>      > >
>      > >     Current architecture draft goes through a lot discussions and
>      > >     reaches many consensus. Right now, it really helps IETF
>     (Teep for
>      > >     example), FIDO, TCG and many others. The only issues are on
>      > >     readability, the standards track and the completeness (e.g.,
>      > >     passport and background check are still missing). It is an
>     very good
>      > >     document and correct terminology is very important for remote
>      > >     attestation.____
>      > >
>      > >     __ __
>      > >
>      > >     About use cases document, Its goal is just to clarify a
>     sample list
>      > >     of scenarios that remote attestation can apply to and then
>     deduce
>      > >     the requirements and the following concrete protocol
>     drafts. It is
>      > >     not fit to be an architecture.____
>      > >
>      > >     __ __
>      > >
>      > >     The current architecture is too important for telecom and
>     network
>      > >     equipment vendors and service providers. I have strong
>     doubts that
>      > >     current EAT and OTrPv2 alone is suitable for the (virtualized)
>      > >     network infrastructure situation.____
>      > >
>      > >     __ __
>      > >
>      > >     B.R.____
>      > >
>      > >     Frank____
>      > >
>      > >     ____
>      > >
>      > >     __ __
>      > >
>      > >     This e-mail and its attachments contain confidential
>     information
>      > >     from HUAWEI, which is intended only for the person or
>     entity whose
>      > >     address is listed above. Any use of the information
>     contained herein
>      > >     in any way (including, but not limited to, total or partial
>      > >     disclosure, reproduction, or dissemination) by persons
>     other than
>      > >     the intended recipient(s) is prohibited. If you receive
>     this e-mail
>      > >     in error, please notify the sender by phone or email
>     immediately and
>      > >     delete it!____
>      > >
>      > >     __ __
>      > >
>      > >     *发件人:*RATS [mailto:rats-bounces@ietf.org<mailto:rats-bounces@ietf.org>
>     <mailto:rats-bounces@ietf.org<mailto:rats-bounces@ietf.org>>
>      > >     <mailto:rats-bounces@ietf.org<mailto:rats-bounces@ietf.org>
>     <mailto:rats-bounces@ietf.org<mailto:rats-bounces@ietf.org>>>] *代表 *Kathleen Moriarty
>      > >     *发送时间:*2019年10月8日19:25
>      > >     *收件人:*rats@ietf.org<mailto:rats@ietf.org> <mailto:rats@ietf.org<mailto:rats@ietf.org>>
>     <mailto:rats@ietf.org<mailto:rats@ietf.org> <mailto:rats@ietf.org<mailto:rats@ietf.org>>>
>      > >     *主题:*[Rats] Use case -> architecture document____
>      > >
>      > >     __ __
>      > >
>      > >     Hello!
>      > >
>      > >     I read through the latest version of the ‘use case’ document
>      > >     yesterday and found it very easy to read and understand,
>     meaning I
>      > >     think it is written well and could be easily understood by many
>      > >     without having to climb up a learning curve. ____
>      > >
>      > >     __ __
>      > >
>      > >     First, this could be a very useful document to register
>     claims for
>      > >     the use cases.
>      > >
>      > >     Second, if the workflow for the passport and background
>     check were
>      > >     added and put in terms of the open trust protocol v2 from
>     TEEP, we
>      > >     have a fairly nice architecture document that’s easy to
>     read and may
>      > >     gain adoption.  The workflows cover the various
>     interactions between
>      > >     roles and TEEP has actively broken up OTrP in v2 to
>      > >     accommodate using EAT tokens, this would help create that
>     link and
>      > >     make it very clear.
>      > >
>      > >     The other thing I like about the use case document and think we
>      > >     should expand on is the references to other work items.
>     This makes
>      > >     it an architecture document that maps out the full plan of
>     the WG.
>      > > One like that was extremely well received by all the ADs that don’t
>      > >     like informational/helpful documents.
>      > >
>      > >     I’m a bit nervous with the terminology being defined and
>     would love
>      > >     to see something like this that’s simplified and more easily
>      > >     adoptable. ____
>      > >
>      > >     __ __
>      > >
>      > >     I appreciate the work done to improve the architecture
>     document, but
>      > >     I do think the structure changes to the use case document as
>      > >     suggested could result in an easier to understand (and
>     therefore
>      > >     easier to adopt) document.____
>      > >
>      > >     __ __
>      > >
>      > >     While the architecture document is more readable, I think
>     we can do
>      > >     better.  Adoption is important and our timeliness matters a
>     lot for
>      > >     this work.  EATs can be used for may use cases with OTrPv2,
>     so let's
>      > >     keep it as simple as we can.
>      > >
>      > >     Thoughts are appreciated.
>      > >
>      > >     Best regards,
>      > >     Kathleen-- ____
>      > >
>      > >     __ __
>      > >
>      > >     Best regards,____
>      > >
>      > >     Kathleen____
>      > >
>      > >
>      > >
>      > > --
>      > >
>      > > Best regards,
>      > > Kathleen
>      > >
>      > > _______________________________________________
>      > > RATS mailing list
>      > > RATS@ietf.org<mailto:RATS@ietf.org> <mailto:RATS@ietf.org<mailto:RATS@ietf.org>>
>      > > https://www.ietf.org/mailman/listinfo/rats<https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/rats__;!8WoA6RjC81c!Xz1GeTjlra7rsEhGZBIFjXbzUMZsT36gMEFiL-d44MZXsNi-luOg0-LeFo4qdJAAYPI$>
>      > >
>      >
>      > _______________________________________________
>      > RATS mailing list
>      > RATS@ietf.org<mailto:RATS@ietf.org> <mailto:RATS@ietf.org<mailto:RATS@ietf.org>>
>      > https://www.ietf.org/mailman/listinfo/rats<https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/rats__;!8WoA6RjC81c!Xz1GeTjlra7rsEhGZBIFjXbzUMZsT36gMEFiL-d44MZXsNi-luOg0-LeFo4qdJAAYPI$>
>
>     --
>     Juergen Schoenwaelder           Jacobs University Bremen gGmbH
>     Phone: +49 421 200 3587         Campus Ring 1 | 28759 Bremen | Germany
>     Fax:   +49 421 200 3103         <https://www.jacobs-university.de/<https://urldefense.com/v3/__https:/www.jacobs-university.de/__;!8WoA6RjC81c!Xz1GeTjlra7rsEhGZBIFjXbzUMZsT36gMEFiL-d44MZXsNi-luOg0-LeFo4qb0VL94k$>>
>
>
>
> --
>
> Best regards,
> Kathleen


--

Best regards,
Kathleen


--

Best regards,
Kathleen


Juniper Business Use Only

________________________________

Este mensaje y sus adjuntos se dirigen exclusivamente a su destinatario, puede contener información privilegiada o confidencial y es para uso exclusivo de la persona o entidad de destino. Si no es usted. el destinatario indicado, queda notificado de que la lectura, utilización, divulgación y/o copia sin autorización puede estar prohibida en virtud de la legislación vigente. Si ha recibido este mensaje por error, le rogamos que nos lo comunique inmediatamente por esta misma vía y proceda a su destrucción.

The information contained in this transmission is privileged and confidential information intended only for the use of the individual or entity named above. If the reader of this message is not the intended recipient, you are hereby notified that any dissemination, distribution or copying of this communication is strictly prohibited. If you have received this transmission in error, do not read it. Please immediately reply to the sender that you have received this communication in error and then delete it.

Esta mensagem e seus anexos se dirigem exclusivamente ao seu destinatário, pode conter informação privilegiada ou confidencial e é para uso exclusivo da pessoa ou entidade de destino. Se não é vossa senhoria o destinatário indicado, fica notificado de que a leitura, utilização, divulgação e/ou cópia sem autorização pode estar proibida em virtude da legislação vigente. Se recebeu esta mensagem por erro, rogamos-lhe que nos o comunique imediatamente por esta mesma via e proceda a sua destruição