Re: [Rats] Call for charter consensus

Benjamin Kaduk <kaduk@mit.edu> Sat, 19 January 2019 01:23 UTC

Return-Path: <kaduk@mit.edu>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6BC7D130F20 for <rats@ietfa.amsl.com>; Fri, 18 Jan 2019 17:23:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level:
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mit.edu
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fLidHY9PemUT for <rats@ietfa.amsl.com>; Fri, 18 Jan 2019 17:23:42 -0800 (PST)
Received: from NAM04-BN3-obe.outbound.protection.outlook.com (mail-eopbgr680120.outbound.protection.outlook.com [40.107.68.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 772B6130EFA for <rats@ietf.org>; Fri, 18 Jan 2019 17:23:42 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mit.edu; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=26TxYlkEMAXmdJ/1oWRF5tnmiyQvJrjuyTdu2ppDxjc=; b=bMYsG09bHaHq/HSnznHBMNVivwhy2Ilf1CmENVVmMA8bOATNL5immP1Fh1NF3H/j3/jnrOjqYEk/8FIePA0TwpwWM7M90iKGgKJCYht59jd3x5PzUAEXOllzQluthejMQuNWIkwUhjS2fFcQ6VID5nO7/vypFLeBs6d4tsd1nQI=
Received: from SN2PR01CA0005.prod.exchangelabs.com (2603:10b6:804:2::15) by SN6PR01MB4816.prod.exchangelabs.com (2603:10b6:805:d5::32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1537.27; Sat, 19 Jan 2019 01:23:40 +0000
Received: from DM3NAM03FT033.eop-NAM03.prod.protection.outlook.com (2a01:111:f400:7e49::202) by SN2PR01CA0005.outlook.office365.com (2603:10b6:804:2::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1537.24 via Frontend Transport; Sat, 19 Jan 2019 01:23:40 +0000
Authentication-Results: spf=pass (sender IP is 18.9.28.11) smtp.mailfrom=mit.edu; ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=bestguesspass action=none header.from=mit.edu;
Received-SPF: Pass (protection.outlook.com: domain of mit.edu designates 18.9.28.11 as permitted sender) receiver=protection.outlook.com; client-ip=18.9.28.11; helo=outgoing.mit.edu;
Received: from outgoing.mit.edu (18.9.28.11) by DM3NAM03FT033.mail.protection.outlook.com (10.152.82.204) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1471.13 via Frontend Transport; Sat, 19 Jan 2019 01:23:39 +0000
Received: from kduck.mit.edu (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id x0J1NZgK005783 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 18 Jan 2019 20:23:38 -0500
Date: Fri, 18 Jan 2019 19:23:35 -0600
From: Benjamin Kaduk <kaduk@mit.edu>
To: Carl Wallace <carl@redhoundsoftware.com>
CC: "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>, "rats@ietf.org" <rats@ietf.org>
Message-ID: <20190119012335.GT81907@kduck.mit.edu>
References: <D86754B8.D099E%carl@redhoundsoftware.com> <C79C7D38-3544-4CDB-94C5-2F49FF0D7BE2@cisco.com> <AD9A3A3C-42FD-48A0-8B5B-A1F6644573DB@redhoundsoftware.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
In-Reply-To: <AD9A3A3C-42FD-48A0-8B5B-A1F6644573DB@redhoundsoftware.com>
User-Agent: Mutt/1.10.1 (2018-07-13)
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:18.9.28.11; IPV:CAL; SCL:-1; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(39860400002)(376002)(136003)(346002)(396003)(2980300002)(189003)(199004)(7696005)(23676004)(11346002)(2870700001)(88552002)(336012)(5660300001)(58126008)(446003)(26826003)(36906005)(54906003)(2486003)(486006)(76176011)(6246003)(426003)(476003)(246002)(966005)(126002)(4326008)(75432002)(106002)(229853002)(786003)(316002)(6916009)(14444005)(33656002)(956004)(106466001)(305945005)(86362001)(8936002)(53416004)(356004)(6666004)(53546011)(478600001)(1076003)(6306002)(8676002)(47776003)(26005)(2906002)(186003)(104016004)(55016002)(50466002)(18370500001); DIR:OUT; SFP:1102; SCL:1; SRVR:SN6PR01MB4816; H:outgoing.mit.edu; FPR:; SPF:Pass; LANG:en; PTR:outgoing-auth-1.mit.edu; MX:1; A:1;
X-Microsoft-Exchange-Diagnostics: 1; DM3NAM03FT033; 1:d4Ko935UOnzCW5+YNaLTiFva7CDpTyh0CEv+wEb3+27j3csb8jKhQ9I10MZeqszJS29KCWuH1Kgt9j96/zCGsNf4Ga/02KBLT/iAHYTCZjjVdKoQ9Xl0PYpxxm5MRAHn
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 45601e36-af9e-44fc-700f-08d67dacbe23
X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600109)(711020)(4608076)(4709027)(2017052603328)(7153060); SRVR:SN6PR01MB4816;
X-Microsoft-Exchange-Diagnostics: 1; SN6PR01MB4816; 3:wx7IMUhBFuUZaHNFJWLDhbUWw8fCKwSMtebBCApTW+WUujPxCAXn1KEVuVrmGMgWcomXSWq78f43rKmvSm5IYGIJHSL/qEuny+LcJ6CezOTz5E5WSlEC23USWWnavQuZtrG0piGnl7YUU5IriUKX5oySvxDiBkD8ecg4cqQmv9QlPtsomEpKbPp8BdE2PFMHhd7O5OnuEv61pBqXGasXwiFazOvSnX21+/Uqg8V/rAblb2NEmkowxEIL0BBK6S7/pGwNrfh15aqT1+WM+IDh3Ou6ttjJ2W/HKjEnYzTtopArHB6b9rbWRDiCZ8rtwv2CTVoXO4cygmME+gBjhZmQP/aBq974+oOix248OOaPv0rvN20q8UQJgae0YFjmCwiY; 25:GNZPJXAB7DB0qtkhMCQW9iJACs/brZFJ3qhyKtvCYxKrAjeRcimZwhKYNPLHsWnTF5HImFDzDmfNFRHCbK/83ctNJ2TVTZ0Znn/zyjyrfrOCkL0XiTqtl2lMPADRlCnmbIl8TrGZboyL0Hn817N4EMzFcsURrBcu6rMCStbNoKxj4O8CL+V7XyLtYuKnoi3xPWtqyD9FJo/mKpLhOz9A4T8lwo5NMhDAWBMhz6uF6Rz0y/+pcSrOjs+0Mtvqdqt+TsKIJeUjeuPgczy6WcUzEll1ZKpriUq6KEzD/tANRjVjGzEutFZv7x2S1waI2CU21dFDwOwKBbKJlA8N+E1zdg==
X-MS-TrafficTypeDiagnostic: SN6PR01MB4816:
X-Microsoft-Exchange-Diagnostics: 1; SN6PR01MB4816; 31:NCwI4vTlx4c7RAc8CkL3DbYORKN+uUR0CW3uENhoe/7Y/3cWSYAsvf9VbwawyASjpwPxKyrmackq1k9ZlhkSdUcLNIJKOXZ8MVFK31odX4C71hMvNYIf42n/I6Ulx6hGUKZcv4CqfQt7jEZ9SW34cjNBuMAI7zzSLEK+SJvbYMAybLnudqF1q0mU+Crsq6x2b5v+rqLw2FN9qPRHXz+SiZyFW9CbLIIFqQVY6N9IjYw=; 20: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
X-Microsoft-Antispam-PRVS: <SN6PR01MB48169EF8B92DC23BFF9D7F82A09D0@SN6PR01MB4816.prod.exchangelabs.com>
X-Microsoft-Exchange-Diagnostics: 1; SN6PR01MB4816; 4:uy4v1yDKaYbZNkvb7wMHFiKLXMvHCZC4A1fbhmKCbbAEJewqpxIWYYxsi9zQ8iAirQson+QG6yLTFe8fA94RAkvB0QUi31XBrXf9KABDVJ0HQIrZllQvJbUFC3IFnGsG9ZUcbT8GiJkEb9gpdyQQs8JiH/ptn+m4VEhCiyJndNulCoVcUBVkRT0eJ6abgG4SLkIdqyCeXYH+SQcXyie9a5AE5E3DoRlAT7W0dgb28j8HD5iRrTLVSWKoPvSznRt7YXwC8WAf2zVg2AvQ9wZ/o0XyQUwv7HbI8L3M7+68LP4=
X-Forefront-PRVS: 09222B39F5
X-Microsoft-Exchange-Diagnostics: 1;SN6PR01MB4816;23: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
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Message-Info: CiIbD8PLqtOkI5SVRcywnsxTGYI/rPe0TXpX7kitil8KZh+2PhysuUp1CS4tTdahjM8DeJ5JKYrAO/p0dNmHQqqMaefcF9wSRcWzBo8+H9HiiTOLfTpIo6KutbNIGQSB32LuXKvm+2Gi2ceItjzzu2mubdOHkGE08vseWh6rfLr04YrQovzIG+wI9W7R1LTSQL9pgQTkCtEZK6wqrea3pLmTYTvbBQwtiw5E38D3pvsC7wYV/E69cqj7T4kRxIDHgdvYbngnq0zH+JZUjO0f/mygtCdww+3F9rqiwRUnQuJoV39fXm4ocY7+8UVklbv3Yllw4RoT0KT3/KRcx9gRFqlFjAsQvCtIMd0sNs5Ua4MHxXhaonmplSHZYCLiOQ9WtFwCXHvx/UxGDPhbUCYYmlpIrKlrNxeOZHwcaL3/ocA=
X-Microsoft-Exchange-Diagnostics: 1; SN6PR01MB4816; 6:SKMy+OPdcyZsghK335HdGaJnI+41lvTKo1uwo8XodX6+/NT/5Rg+RqtzDcC/qTzr6IME+ZtlSMiMBXccgOIblbwA4i5R6PbEMz4JSndJimXaK3QEHNmLft2FOXhhA/KPePDDlQoO/9ulh5cwVUtGx511FuyDiT8lo4P4Z2PjKJjXiOBMdjvthmbhOZR9PDWgi5q47CEMbo0iGwFb4MAsO5wDQ7fod04l+Qohvnw4VciK0cy9AcRFSnpOt8qa3/5cCHL7H5FJyNFAlbAnWQH57Ac8O4GtIFRmglK9ZjZtXhowWy3FwEAFRYzH9fOGTwWpIiGYb+U2HoZuRmumCHy7ReiuT1W9gV+7lqAcrYdk8SxAoNi6zpduX4kJ1B09qyHUU5A5JJCpPdyrk1cy/X/8YDgwY8gt75L3mUiZiZGw8oBtJ07GL49es/qmxyOP+ClBNVldzAhLxkewEC8zw8+bnw==; 5:VwuvgJIWRg35M4IY4FRDbikp+dIHPH28vuGw6ug/qjY5x25Nn5PquCXTGfriZrtSlDn+gRMa+AkTdDG5TVTYd72nnpWNT+hMXuzzi+ecPOpL9f/q12taAOYp4opNXV/9DgHBE1AhTi5SiALtE7lctuNVeCjc4s12yNeecK/LfJ0Usomb9xzXuUzme68pCGs4vO22bOmWuZ6GC0IAiICQ7w==; 7:qhzYHDjf0Y/s0lFHRJfNfdNg6Dr9/lxedNAnBSx4c1mLAMZ7sDfY5HZyd8pBXhlwjQCbZFL7Fy63PZ+IFvI1tN6Q/tFRXjiCW0et4ywgPcofE8Jyr6KWmtu9prPHRaplE5hQZGV90kFhg67MJ9ozlg==
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: mit.edu
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Jan 2019 01:23:39.4219 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 45601e36-af9e-44fc-700f-08d67dacbe23
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=64afd9ba-0ecf-4acf-bc36-935f6235ba8b; Ip=[18.9.28.11]; Helo=[outgoing.mit.edu]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR01MB4816
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/spKabIQsuC9AxxLEMVl6BH3OVFs>
Subject: Re: [Rats] Call for charter consensus
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote Attestation Procedures <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 19 Jan 2019 01:23:47 -0000

On Fri, Jan 18, 2019 at 06:54:44PM -0500, Carl Wallace wrote:
> Inline...
> 
> > On Jan 18, 2019, at 6:27 PM, Nancy Cam-Winget (ncamwing) <ncamwing@cisco.com> wrote:
> > 
> > Hi Carl,
> > <Chair hat-off>
> > It is my experience in the IETF that we focus more in the definition of data models and transfer/transport mechanisms for information (e.g. yang, netconf, radius, nea) but how the information is applied is typically out of scope.
> 
> Many verifiable data models (e.g., X509, CMS, JOSE, COSE, etc.) include verification rules. 

I attempted (probably poorly) on the call to make a point that in some
sense there are two different types of thing in the RATS workflow we're
thinking about, that could be called "verification".  On the one hand,
there's the raw crypto bits of "this is what signature validation/MIC
verification/etc. you have to do in order to get the cryptographic
validation that key X generated data Y [at time Z]", but once you've done
that, the decision of verifying that Y and Z are something you find
trustworthy to perform action W is not really something we can standardize.

My understanding is that we plan to talk about the crypto but not, at least
at first, what you do after confirming that the crypto has not been
tampered with.

> >  
> > <Chair hat-on>
> > As to the consensus of the group and the charter during the call, there was no consensus to the last item (the assessment of claims).  Additionally,
> > I don’t believe we have permanently omitted the “assessment” portion. 
> > The understanding is that we need to charter to a scope that we can achieve and if and when in that process we need to recharter to include other work items we can certainly do so.
> >  
> OK. 

Yup, we want to bite off a manageable chunk for the initial round, and add
on later as needed.

-Ben

> > Warm regards, Nancy
> > 
> > From: Carl Wallace <carl@redhoundsoftware.com>
> > Date: Friday, January 18, 2019 at 07:12
> > To: "Nancy (ncamwing)" <ncamwing@cisco.com>, "rats@ietf.org" <rats@ietf.org>
> > Subject: Re: [Rats] Call for charter consensus
> >  
> >  
> >  
> > From: RATS <rats-bounces@ietf.org> on behalf of "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>
> > Date: Thursday, January 17, 2019 at 10:38 PM
> > To: "rats@ietf.org" <rats@ietf.org>
> > Subject: [Rats] Call for charter consensus
> >  
> > Hello RATS participants:
> >  
> > At the virtual meeting on 1/16/2019, there was consensus [1] that we should pursue chartering a Working Group with the text reflected in [2].
> >  
> > We need to continue this discussion on the email list as well as gauge continued interest in participating in this work.  Please do so by responding to the following questions:
> >  
> > Do you support this charter text (full text also provided at the end of email or at [1])?  Or do you have objections or blocking concerns?
> > [CW] I dislike that the goals do not include verifying or using attestations. Verification was cast as "mundane" during the meeting earlier this week, but historically interop pain often arises at the verification/usage point. This is independent of comparing values extracted from an attestation to a reference value, which is deemed out of scope. Perhaps: "This WG will standardize formats for describing assertions/claims about system components and associated evidence; procedures and protocols to convey these assertions/claims to the relying parties; and procedures to establish trust in attestations/claims. Assessment of assertions/claims, such as via reference values, is outside the scope for this WG."
> >  
> > Are you willing to author or participate in the development of the drafts of this WG?
> > [CW] Possibly, though limited to defining some conveyance mechanisms most likely.
> >  
> > Are you willing to help review the drafts of this WG?
> > [CW] Yes
> >  
> > Are you interested in implementing drafts of this WG?
> > [CW] As a relying party, yes.
> >  
> > Please provide comments including proposed text changes ASAP to provide ample time for discussion.  This call for consensus ends on February 1, 2019. 
> >  
> > Thanks, Roman and Nancy
> >  
> > [1] Minutes sent: https://mailarchive.ietf.org/arch/msg/rats/xEwczqnoNgyBYlRTKg35Yo4ccWY
> > [2] Updated charter sent: https://mailarchive.ietf.org/arch/msg/rats/MQLZIkIK23ZlSBMB5wJjo71bOr0
> >  
> > _______________________________________________ RATS mailing list RATS@ietf.org https://www.ietf.org/mailman/listinfo/rats

> _______________________________________________
> RATS mailing list
> RATS@ietf.org
> https://www.ietf.org/mailman/listinfo/rats