Re: [Rats] IANA pre-RFC code points

Simon Frost <Simon.Frost@arm.com> Tue, 16 February 2021 16:59 UTC

Return-Path: <Simon.Frost@arm.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 798033A0AAF for <rats@ietfa.amsl.com>; Tue, 16 Feb 2021 08:59:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 1.1
X-Spam-Level: *
X-Spam-Status: No, score=1.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RAND_MKTG_HEADER=2.999, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=D4R34Jkm; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=D4R34Jkm
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 13w2n-C8vXsE for <rats@ietfa.amsl.com>; Tue, 16 Feb 2021 08:59:42 -0800 (PST)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2060.outbound.protection.outlook.com [40.107.20.60]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A9DDF3A0BCC for <rats@ietf.org>; Tue, 16 Feb 2021 08:56:13 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zBQ3g6qHv42EC24lyUMStdzskkvcA6OJB7s+TFN8Mqk=; b=D4R34JkmB39cN7JiCp56bcioCcPBSo5/p5NNFQT/yPO47vp4MiTxWANCrrEr38QyuG5y/toXqVTzxqqoLrYHBpcvfDKxut2l/jTc70LnGk2HsosEk3CApEDPyEL/N62YG5mdRYp6qZ6bTSQcKeW8GWFn44eFRqlBMEub6aMNOsE=
Received: from DB6PR0802CA0047.eurprd08.prod.outlook.com (2603:10a6:4:a3::33) by DB8PR08MB4172.eurprd08.prod.outlook.com (2603:10a6:10:af::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.31; Tue, 16 Feb 2021 16:56:09 +0000
Received: from DB5EUR03FT036.eop-EUR03.prod.protection.outlook.com (2603:10a6:4:a3:cafe::ac) by DB6PR0802CA0047.outlook.office365.com (2603:10a6:4:a3::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.26 via Frontend Transport; Tue, 16 Feb 2021 16:56:09 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT036.mail.protection.outlook.com (10.152.20.185) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.25 via Frontend Transport; Tue, 16 Feb 2021 16:56:09 +0000
Received: ("Tessian outbound fb307b4548b2:v71"); Tue, 16 Feb 2021 16:56:09 +0000
X-CR-MTA-TID: 64aa7808
Received: from 2ea33e41943b.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 02C3A92A-A24B-4DB0-B1CB-33E97F868CBE.1; Tue, 16 Feb 2021 16:56:04 +0000
Received: from EUR04-DB3-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 2ea33e41943b.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Tue, 16 Feb 2021 16:56:04 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=CdJ8597ZkqhkrieK2eomJAWuf2XRIECfRebLkqyV53x7Khw4IQyZYWy+OigygoUgqUdevkHmOxbfErwHW8Jyyofwkp2HZ9OCDBY+7IH3i+TkSJjRFe+r3kTn0cQrMBmAxN1532GYTURtmDBFyQW93jUUQ3PFlhRtkjQqTJYgytW/4nijHtylgNFl176jpOssaDyn5sXdayVq9qUT6NYBNaQjRbWbXz0PbkCZOB6Byr26mJ5elggZXam2kx0o2IOtsaLd90kxGiqyWYPm3B9R1Cnmrr0icI07A2Cjivmzj1POVJfG4l+hGS3iRkNpDphwq1sznegxgPZpvpu3MxJoVA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zBQ3g6qHv42EC24lyUMStdzskkvcA6OJB7s+TFN8Mqk=; b=RgFzd2+bCQUu2mCSwjz1XTkm4FMoOaheQadqiZX5UjlANfcPS+6SoVa49y23ljPgbEveb1BCQhkg6974YqAfUqC4/EwacXkk2oGLfHGnW39aq/Vyx9Gjs4Krku99nqkbyCF/LQ3XW7Ajc4hIhqP19sevLPHxqleY9W/0iiqW+Shi2V8xUI+3enP7+FBYbiM5gY3yRU6b7RbtMWGO0cjMVOL3HBa7p7i+yKWjJc/dq71gWSy7zrMLrPeB5mGdPWlgdxlYov6NAz4GflwKOy4+fPgtv5MC+Vv1QZ2s8DQJNHso5LCqVGjONUbxTn38gMwSvl7ZUAWAimpAHwm8t6J0Hg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zBQ3g6qHv42EC24lyUMStdzskkvcA6OJB7s+TFN8Mqk=; b=D4R34JkmB39cN7JiCp56bcioCcPBSo5/p5NNFQT/yPO47vp4MiTxWANCrrEr38QyuG5y/toXqVTzxqqoLrYHBpcvfDKxut2l/jTc70LnGk2HsosEk3CApEDPyEL/N62YG5mdRYp6qZ6bTSQcKeW8GWFn44eFRqlBMEub6aMNOsE=
Received: from AM6PR08MB3429.eurprd08.prod.outlook.com (2603:10a6:20b:49::19) by AM7PR08MB5512.eurprd08.prod.outlook.com (2603:10a6:20b:de::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3846.27; Tue, 16 Feb 2021 16:56:03 +0000
Received: from AM6PR08MB3429.eurprd08.prod.outlook.com ([fe80::7c29:67ae:c69b:e903]) by AM6PR08MB3429.eurprd08.prod.outlook.com ([fe80::7c29:67ae:c69b:e903%5]) with mapi id 15.20.3846.031; Tue, 16 Feb 2021 16:56:03 +0000
From: Simon Frost <Simon.Frost@arm.com>
To: "Smith, Ned" <ned.smith@intel.com>, Laurence Lundblade <lgl@island-resort.com>
CC: Thomas Fossati <Thomas.Fossati@arm.com>, "rats@ietf.org" <rats@ietf.org>, Adrian Shaw <Adrian.Shaw@arm.com>, Hannes Tschofenig <Hannes.Tschofenig@arm.com>
Thread-Topic: [Rats] IANA pre-RFC code points
Thread-Index: AQHXAWrWyNnr+LVu0EK5OV1/nqdTzapWtVMAgALqwl2AABGTgIAAy2mAgACIMEA=
Date: Tue, 16 Feb 2021 16:56:03 +0000
Message-ID: <AM6PR08MB3429846E519C19082B05C03EEF879@AM6PR08MB3429.eurprd08.prod.outlook.com>
References: <80F4DFAD-8A5D-44DC-BEDF-BA96B7F21991@arm.com> <D7AFAA80-B8EE-4657-8A81-71FE4F79E23B@island-resort.com> <CO1PR11MB51690D5D3D7EA17153C83EBAE5889@CO1PR11MB5169.namprd11.prod.outlook.com> <B549435F-1896-4A8D-A1FB-CE57567E824D@island-resort.com> <0CF448FE-B249-496E-B1A8-528B189DA16C@intel.com>
In-Reply-To: <0CF448FE-B249-496E-B1A8-528B189DA16C@intel.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 8715744F62DEDE48932F72DE9CCFD7CB.0
x-checkrecipientchecked: true
Authentication-Results-Original: intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [212.69.61.73]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: 895d351f-c0c9-473a-fd11-08d8d29bc278
x-ms-traffictypediagnostic: AM7PR08MB5512:|DB8PR08MB4172:
x-ms-exchange-transport-forked: True
X-Microsoft-Antispam-PRVS: <DB8PR08MB41723EEA595152201AEA1441EF879@DB8PR08MB4172.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:7219;OLM:8273;
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM6PR08MB3429.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(39860400002)(136003)(366004)(376002)(396003)(346002)(8936002)(4326008)(478600001)(83380400001)(76116006)(316002)(33656002)(66556008)(66476007)(66446008)(64756008)(166002)(8676002)(5660300002)(66946007)(52536014)(86362001)(9686003)(186003)(71200400001)(7696005)(53546011)(55016002)(26005)(2906002)(110136005)(6506007)(54906003); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: =?utf-8?B?VzZpZG9qNnY1djdoOVJyVmxING5WY056VVNXTGg1SVdvZkc3YzNUdGxXRHFS?= =?utf-8?B?OXV3Ky9NWnViWGJLb2dHSVdIbFhKZmFneFVIUGEwL3ZobWk5WWNoRGxZVFRk?= =?utf-8?B?bzhwMEtlOWsydERBdnZ0bEZ1aWtjcUFsZEwyQWxaRERpMzAycGlyb3JMRExR?= =?utf-8?B?ZVpIN2RLbXNiREgra05hUFNTVFY0RzVFby8rSjRHYWpWZmhDL2JtUk1nWmNV?= =?utf-8?B?RStlQytvZnp5WURub1ZnWk9LUTArYnJ0SFhkYW9FU1ZrNU9kSWJ4NjlWaExl?= =?utf-8?B?WHBrTXZMdHFIeHVlMFJJL2F6MFd4bFY0TSsybkt3UFpVYzdZNHVuRzBEK01a?= =?utf-8?B?dDR4YnM5M1JmbzkrL05OSFB1ZW9LcDNaem9pZk5WUWtNcnloQ3V4WHBub2Fn?= =?utf-8?B?NlRMOUtqQ0FUU2ZDK2RNRXVJWGhVM0dpVWxVTXpYUUgrN1pRMDNXaFJEUVdq?= =?utf-8?B?eGt2aEtpa2txMEMvZm5HbUlpZTRxQjN0T29QVTRvMkdJTmZEN1Z3N3dLa0ZM?= =?utf-8?B?NnBpbk5lR0gwa1NXM2NYa0hIUXpoUGJlTFFqMUdDcVVqdTZoWDBxM2xzc3Bp?= =?utf-8?B?WWFHN3dZM2QrU0ZNNDZkNjFSUGswVkFQWDV5WWFEVnpRQnNtMTBFSGpxZVJh?= =?utf-8?B?ME5tMUpHWWg0dE5BbFJzb0xBQWxJSmdHUGlHS3Zaa05wWG15K3U4dnA5dmJn?= =?utf-8?B?WmZrMm1udkR1dm5wOUVSaEdmcjVidUZRTm90ZkdvamNhbWFtNGtINXB2R1g5?= =?utf-8?B?Slk5bFRPSEptVzhIbDV1eFFoNmVFazlTendJWVFaUHp2RjdvcElxSURFOTYx?= =?utf-8?B?U0RwRUI5cy93bXlLMjFWMy9SOHhiNUNTQmx0MEJNWjZzUHRVa08wNXNNUjZi?= =?utf-8?B?L0FYdFVBSGJHRE50K2NXSUpjY2QvSWZBb0Q4bmlUakpMVHdJdm5rNzZ0YnhP?= =?utf-8?B?cnJOVEN3Z0RKUzZTS2ZaMGRSektmNVJ1aVR4MXA4TlpObVhaa1BZbnJKemVY?= =?utf-8?B?SE5QZ29aVVJBWnFoUXU5MUJ4eFFFYzBKYmxpSVRvOVFJU0ZSb0cwdnJhb01m?= =?utf-8?B?c0tGRXZaNjdXZm1lNWFlbXN5RFp6eFlUWHhSODMrbHFrSDdDcEhOMFJmT201?= =?utf-8?B?MmF2US9NbGp4aGJjY1VmSFVKVXg4V3RTeFJTQmk2YjRucmIrV3FmSlBKdVZI?= =?utf-8?B?WUFubmFQZDZFZk5DT1IvNDNzM1lSRlZXNDg3eU1KQjc2SGJWWDBPRGpEdVhy?= =?utf-8?B?MVVVSVRXRjRnY0pIbU1MLzJwczN4Nm9CS3Z2QktFWVJ5VTNnVjVkSlBoSUJD?= =?utf-8?B?cE1ET0FqRWtWUVk3WWp0Y0tVcDl5S2xva1BTdTUwaDgvekQ0eWhJcUgvQXNU?= =?utf-8?B?aFgyVmFXK2NIUjVsTEttOWJWcUd6N1BDWitiMTgvakVoenlyNzhaRmQ4QmZH?= =?utf-8?B?S0Y3MUlqZHBQZE1jWUNIbjI4cFZpSnZmdnlKYllVbkhUZmZydlR1WkRMNzVa?= =?utf-8?B?a2hwcFp5R2J4Z3d4aGlNSmcyR3UxZ1ZJOHh3cXhpVGJTeHhZVmV5N29samRZ?= =?utf-8?B?M0dDMWd3UUUzTFN6N0diZzBFbHZDTXZyT1BuTGpWZWNyUmFGbHorWkd3VTZ0?= =?utf-8?B?T2tBNmxCYmxKMlJab2JBZkNVQ3h4Nmt1TUM4VGt1VkN1T3NhdHZ6RldiaGVo?= =?utf-8?B?TmpjbFZXK3JXS09xZy9TRDduWFh5UG16OHU2SGZCVmpSLzdiS1RBc1B6Q0NY?= =?utf-8?Q?bwUppwTJM1zsInRhoA=3D?=
Content-Type: multipart/alternative; boundary="_000_AM6PR08MB3429846E519C19082B05C03EEF879AM6PR08MB3429eurp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM7PR08MB5512
Original-Authentication-Results: intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT036.eop-EUR03.prod.protection.outlook.com
X-MS-Office365-Filtering-Correlation-Id-Prvs: ee46f349-bd3f-4776-b776-08d8d29bbecd
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(396003)(376002)(346002)(39860400002)(136003)(36840700001)(46966006)(26005)(53546011)(6506007)(316002)(4326008)(33656002)(54906003)(110136005)(33964004)(2906002)(7696005)(47076005)(336012)(8676002)(55016002)(478600001)(9686003)(186003)(8936002)(36860700001)(82740400003)(83380400001)(52536014)(356005)(5660300002)(81166007)(86362001)(82310400003)(70586007)(166002)(70206006); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 16 Feb 2021 16:56:09.7268 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 895d351f-c0c9-473a-fd11-08d8d29bc278
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT036.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB4172
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/uTt-XDjsW1Rez9US6bN_BJ_ImOs>
Subject: Re: [Rats] IANA pre-RFC code points
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Feb 2021 16:59:46 -0000

The original intent for the spec was to be human readable rather than machine readable, with the main audience being a developer of a relying party or verifier. I agree it would be useful to establish a convention for the values to prevent interoperability problems (eg. vendor-product-version), not sure how strict such a convention would need to be.

Thanks
Simon

From: Smith, Ned <ned.smith@intel.com>
Sent: 16 February 2021 16:45
To: Laurence Lundblade <lgl@island-resort.com>
Cc: Thomas Fossati <Thomas.Fossati@arm.com>om>; rats@ietf.org; Adrian Shaw <Adrian.Shaw@arm.com>om>; Hannes Tschofenig <Hannes.Tschofenig@arm.com>om>; Simon Frost <Simon.Frost@arm.com>
Subject: Re: [Rats] IANA pre-RFC code points

Is it the intent of this spec to define a machine readable format for stating the 12 ‘things’ the profile should specify?
What if any convention addresses profile name collisions? If vendor-A uses profile name is “A” and vendor-B also uses “A”, is that considered either a security problem or an interoperability problem?
-Ned

From: Laurence Lundblade <lgl@island-resort.com<mailto:lgl@island-resort.com>>
Date: Monday, February 15, 2021 at 12:36 PM
To: "Smith, Ned" <ned.smith@intel.com<mailto:ned.smith@intel.com>>
Cc: Thomas Fossati <Thomas.Fossati@arm.com<mailto:Thomas.Fossati@arm.com>>, "rats@ietf.org<mailto:rats@ietf.org>" <rats@ietf.org<mailto:rats@ietf.org>>, Adrian Shaw <Adrian.Shaw@arm.com<mailto:Adrian.Shaw@arm.com>>, Hannes Tschofenig <Hannes.Tschofenig@arm.com<mailto:Hannes.Tschofenig@arm.com>>, Simon Frost <Simon.Frost@arm.com<mailto:Simon.Frost@arm.com>>
Subject: Re: [Rats] IANA pre-RFC code points

They are largely complementary mechanisms.  Maybe you could call the IANA claims registry the palette of colors and a profile the painting.

The IANA claims registry describes lots of different claims. Some implementations will use one set of them, other implementations will use others. Some will use proprietary claims that are not in the registry. This however doesn’t give much guarantee of interoperability between an Attester and Verifier.

A profile says which claims are in use for a give use case. It says which claims are prohibited, which are required and which are optional. It should be complete enough to give full interoperability for a use case.

A profile also says which crypto, which serialization format and such to use so that interoperability can be achieved.  There are 12 separate things that a profile should specify (e.g., required claims, prohibited claims, JSON/CBOR, algorithms, CBOR serialization, endorsement identification…). Take a look at the text here<https://tools.ietf.org/html/draft-ietf-rats-eat-08#section-5>-5>.

LL



On Feb 15, 2021, at 12:36 PM, Smith, Ned <ned.smith@intel.com<mailto:ned.smith@intel.com>> wrote:

The topic of how vendor specific data should be handled has been brought up in the past. The conversation seemed to reach consensus by using the CWT/JWT existing mechanisms for vendor specific tags. Maybe someone should summarize how the profile mechanism compares to CWT/JWT vendor specific mechanisms?

Ned Smith - Intel - ned.smith@intel.com<mailto:ned.smith@intel.com>

________________________________________
From: Laurence Lundblade <lgl@island-resort.com<mailto:lgl@island-resort.com>>
Sent: Saturday, February 13, 2021 3:00 PM
To: Thomas Fossati
Cc: Smith, Ned; rats@ietf.org<mailto:rats@ietf.org>; Adrian Shaw; Hannes Tschofenig; Simon Frost
Subject: Re: [Rats] IANA pre-RFC code points

Profiles and are only in EAT drafts from the last month so they haven’t had much review or discussion. That makes them different from the other claims for which pre-assignment is requested.  I don’t think I have even presented them in detail in any meetings. So personally I am kind of on the fence about this.

A thorough reading and commenting by folks other than Arm would get me off the fence.

Happy to hear what the chairs think too.

LL


On Feb 12, 2021, at 11:14 AM, Thomas Fossati <Thomas.Fossati@arm.com<mailto:Thomas.Fossati@arm.com><mailto:Thomas.Fossati@arm.com>> wrote:

It'd be extremely useful to us if the "profile" claim could be added to
the list early assignments.

That way the PSA token would just use the standard code point assigned
to "profile" to create the context to interpret the rest of the private
PSA claims - which means we would not need to make any further request
to IANA.

Hopefully it is not too late to ask :-)

Cheers!

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.