Re: [Rats] IETF 102 Remote Attestation Procedures (RATS) Bar BoF Invite

Hannes Tschofenig <Hannes.Tschofenig@arm.com> Fri, 06 July 2018 05:17 UTC

Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0217F130E2B for <rats@ietfa.amsl.com>; Thu, 5 Jul 2018 22:17:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level:
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7lb5xTeIE6ch for <rats@ietfa.amsl.com>; Thu, 5 Jul 2018 22:17:46 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-vi1eur04on0614.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe0e::614]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EB70E130DEB for <rats@ietf.org>; Thu, 5 Jul 2018 22:17:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=oXFXEOLeOH4TTk6Cs4njblSA6DhbEtgqMIk8+jlEMVE=; b=kvTo8sNMXiF6zvkofhTKEI72trkhJcrteUQKktyyI2Qw8lzMmQF1KuwBeR/zlCxlwAg8ck2CRK/7rAE5P3C+KY94pq+EmTNg8OOMn/jq5ShYz9Jj7RB7K2hS0OvoEnQVcAjrLHDJ6lxNACFA19g3LkXf59EUuq5RU1IH4zxzl/U=
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com (10.173.75.16) by VI1PR0801MB1615.eurprd08.prod.outlook.com (10.167.211.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.906.26; Fri, 6 Jul 2018 05:17:42 +0000
Received: from VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::3549:bcde:85fc:e3db]) by VI1PR0801MB2112.eurprd08.prod.outlook.com ([fe80::3549:bcde:85fc:e3db%10]) with mapi id 15.20.0906.026; Fri, 6 Jul 2018 05:17:42 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>, DIEGO LOPEZ GARCIA <diego.r.lopez@telefonica.com>, "Xialiang (Frank)" <Frank.xialiang@huawei.com>, Jessica Fitzgerald-McKay <jmfmckay@gmail.com>, Dave Waltermire <davewaltermire@gmail.com>, "Banghart, Stephen A. (Fed)" <stephen.banghart@nist.gov>, "Shwetha Bhandari (shwethab)" <shwethab@cisco.com>, "Bill Sulzen (bsulzen)" <bsulzen@cisco.com>, "Eric Voit (evoit)" <evoit@cisco.com>, Giridhar Mandyam <mandyam@qti.qualcomm.com>, Laurence Lundblade <llundbla@qti.qualcomm.com>, ANTONIO AGUSTIN PASTOR PERALES <antonio.pastorperales@telefonica.com>, "Mr. Ned Smith" <ned.smith@intel.com>
CC: "Laffey, Tom (HPE Networking ATG)" <tom.laffey@hpe.com>, Guy Fedorkow <gfedorkow@juniper.net>, "'Wiseman, Monty (GE Global Research, US)'" <monty.wiseman@ge.com>, "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>, Michael Eckel <Michael.Eckel@huawei.com>, "rats@ietf.org" <rats@ietf.org>
Thread-Topic: IETF 102 Remote Attestation Procedures (RATS) Bar BoF Invite
Thread-Index: AQHUFKszI2xJpYRPekei5aY9ixVVhqSBp7oA
Date: Fri, 06 Jul 2018 05:17:41 +0000
Message-ID: <VI1PR0801MB211276C5B2CFC1273A092601FA470@VI1PR0801MB2112.eurprd08.prod.outlook.com>
References: <37d72cc8-6497-2449-163e-2404d10a856a@sit.fraunhofer.de>
In-Reply-To: <37d72cc8-6497-2449-163e-2404d10a856a@sit.fraunhofer.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Hannes.Tschofenig@arm.com;
x-originating-ip: [80.92.122.252]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR0801MB1615; 7:CagHMWhg9APnqD1L6A1JRh/sRH6TFKs2vBcXakeUR+hNBtnb9/SeRRvQQ8ZVYEtrND2xNSFVG+Ifxs+cUxWM7AzbAcDxqj6CvBhqxIQxhaTHa98YV5aFwgNN+94usKkxCDN+SQevQgiMH3O73/87woG7UWSGwfQ/0+EMBMonbd/7bP5Gihq1cazHlss9nVshPeYvziGq8O5zjMI4wSvxMv0RVKnXg+QmUwav7b/MmracpjxWAHqQIcIRJwLnj6FT
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-correlation-id: 330acf04-d2e7-4e20-5544-08d5e2ffcca0
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652040)(8989117)(5600053)(711020)(48565401081)(4534165)(4627221)(201703031133081)(201702281549075)(8990107)(2017052603328)(7153060)(7193020); SRVR:VI1PR0801MB1615;
x-ms-traffictypediagnostic: VI1PR0801MB1615:
x-microsoft-antispam-prvs: <VI1PR0801MB161587D503AA228C0EA8BD07FA470@VI1PR0801MB1615.eurprd08.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(120809045254105)(166708455590820)(35073007944872)(223705240517415)(17755550239193);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040522)(2401047)(5005006)(8121501046)(93006095)(93001095)(3002001)(10201501046)(3231254)(944501410)(52105095)(6055026)(149027)(150027)(6041310)(20161123564045)(20161123558120)(20161123562045)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011)(7699016); SRVR:VI1PR0801MB1615; BCL:0; PCL:0; RULEID:; SRVR:VI1PR0801MB1615;
x-forefront-prvs: 0725D9E8D0
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(39860400002)(396003)(366004)(376002)(346002)(13464003)(189003)(40434004)(199004)(74316002)(3846002)(6246003)(14454004)(8676002)(6116002)(53936002)(26005)(476003)(81166006)(81156014)(561944003)(8936002)(33656002)(9686003)(11346002)(478600001)(6306002)(39060400002)(55016002)(102836004)(66066001)(486006)(2900100001)(53546011)(6506007)(76176011)(7736002)(966005)(6436002)(186003)(229853002)(72206003)(106356001)(305945005)(105586002)(446003)(7696005)(97736004)(2906002)(7416002)(316002)(110136005)(54906003)(5250100002)(25786009)(4326008)(86362001)(99286004)(5024004)(256004)(68736007)(14444005)(5660300001)(921003)(1121003); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR0801MB1615; H:VI1PR0801MB2112.eurprd08.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: Ngvy9f6kPI5DD/ZAPlCtD5r/It2yTfoZPz8ij3VnUMbIh9xd7cdoprdV7gIPSDFoElr0n/kXR2CDyrWy1W29kpNM6TmdAgQMwGms+I6nNGeLdO+i933EF1T4uAX5vsLjoZemIrykfsmVprtHa50OG/HVc0UhUWYr/RM7/SiRKHcmJXQddpsKZPYo/SGGv/W8gW2OxdozjzMdAd+2lazjBnwEaFrYd3oHmysjXGd+JyVy4ukuZ5gvxb8AwkMFx0xo2BfEsB6/paT7zV2r2vUcNMzHmZ/bgULsjTv2IKXa8+k4z2BMOKA6i9oDyZRSJXzuu4I8Yz0YuFyiAjFq4QJgWpmsRJOwQl9QjfE/HipOL2Y=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 330acf04-d2e7-4e20-5544-08d5e2ffcca0
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Jul 2018 05:17:41.9039 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB1615
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/zRxjCs2fW0coBHLveEmqh8pfyt0>
X-Mailman-Approved-At: Fri, 06 Jul 2018 06:04:16 -0700
Subject: Re: [Rats] IETF 102 Remote Attestation Procedures (RATS) Bar BoF Invite
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Remote Attestation Procedures <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 06 Jul 2018 05:17:49 -0000

Hi Henk,

I fear you missed that Lawrence and I already reserved a room for a meeting about the attestation work we proposed. Here is the mail:
https://www.ietf.org/mail-archive/web/eat/current/msg00005.html

Ciao
Hannes


-----Original Message-----
From: Henk Birkholz [mailto:henk.birkholz@sit.fraunhofer.de]
Sent: 05 July 2018 23:52
To: DIEGO LOPEZ GARCIA; Xialiang (Frank); Hannes Tschofenig; Jessica Fitzgerald-McKay; Dave Waltermire; Banghart, Stephen A. (Fed); Shwetha Bhandari (shwethab); Bill Sulzen (bsulzen); Eric Voit (evoit); Giridhar Mandyam; Laurence Lundblade; ANTONIO AGUSTIN PASTOR PERALES; Mr. Ned Smith
Cc: Laffey, Tom (HPE Networking ATG); Guy Fedorkow; 'Wiseman, Monty (GE Global Research, US)'; Nancy Cam-Winget (ncamwing); Michael Eckel; rats@ietf.org
Subject: IETF 102 Remote Attestation Procedures (RATS) Bar BoF Invite

Hi *,

Diego and I are planning to find (or create) an appropriate place for
remote attestation related work in the IETF with a Bar BoF as a first step.


Some context:

In essence, remote attestation procedures are a tool-set that is
intended to increase the confidence that an entity other entities
interact with is a trusted system.

Remote attestation typically is tied to a type of trust anchor or
shielded secret, which is - in a sense - a tad bit exotic in the scope
of protocols developed in the IETF as those exist and operate "inside
the box". In contrast, most IETF solutions operate "between boxes".
While remote attestation procedures require both parts in order to
provide a value, appropriate network protocols to convey corresponding
information between boxes are still very much work in progress.


The Plan:

To create appropriate protocols and architectures, unfortunately, is not
a trivial task. In order to find out how this "non-trivial" thing can be
talked about and how to do that constructively in the IETF, we would
like to invite you to a Bar BoF.

The minimum goal is to talk about what remote attestation means
(semantic), what parts of it would belong in the IETF (scope), how to
align existing work and how to provide a basis for future work
(solution). Even better, if we would be able to agree in some of these
areas and flock together.

As a first proposal, we are planning the Bar BoF for:

*Thursday July 17th, in the evening*
(exact time TBD, but we think at or after dinner)

There is a fine Bar at the Venue. So, the current plan is to meet there,
in order to make it easier to attend. But we will also scout for an
appropriate bar when we are on-site. Also, we would like to encourage
you to "bring a +1" in case you know other individuals, who would be
interested in this topic.


Some references of the work in this space that is scattered all over the
IETF:

> https://datatracker.ietf.org/doc/draft-pastor-i2nsf-nsf-remote-attestation/
> https://datatracker.ietf.org/doc/draft-birkholz-i2nsf-tuda/
> https://datatracker.ietf.org/doc/draft-mandyam-eat/
> https://datatracker.ietf.org/doc/draft-mandyam-tokbind-attest/
> https://datatracker.ietf.org/doc/draft-birkholz-reference-ra-interaction-model/
> https://datatracker.ietf.org/doc/draft-birkholz-yang-basic-remote-attestation/
> https://datatracker.ietf.org/doc/draft-birkholz-attestation-terminology/

There also is the rats@ietf.org list (as you can see in the email
header) and a place at github (https://github.com/ietf-rats).


All that said, we would welcome you to drop by and are looking forward
to a lively discussion.


Best regards,

Diego & Henk
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.