Re: [saag] [Secret] Secure Credential Transfer (secret) BOF Virtual Meeting: 2022-02-10

Francesca Palombini <francesca.palombini@ericsson.com> Thu, 10 February 2022 17:13 UTC

Return-Path: <francesca.palombini@ericsson.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BFBFE3A0E37; Thu, 10 Feb 2022 09:13:29 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.677
X-Spam-Level:
X-Spam-Status: No, score=-7.677 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.576, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NoKZCtvPskFD; Thu, 10 Feb 2022 09:13:25 -0800 (PST)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-eopbgr40063.outbound.protection.outlook.com [40.107.4.63]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 603C33A0F42; Thu, 10 Feb 2022 09:13:01 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=g89yVsMF1T8pgG6eahHsO0bevGFyQcsiMWSyrDRBwJtsTNBaFzT1ku75eJUdY0UNSySLkIxQokw82rEQZN1mRhGquA+uIvdqAKBPvvwWhmro482BiNIqPZNqO99+O4FhfM+8lxtrdrNrMHM8f9iZg3Sdh/enJBUhW58OtuLVisRYUYdybs2lgMS5GSJBNoPQMtj3erWsgIyC5pz2if0j1Z5Zc4GFh4y7ADrYbO8CCLIlaQtrb5+FhyH7BiomOnv72GF+GqGwJBZ/YRCZ+BYE+ov9XlQb+gb9O1cYGlgk4qFyBfk4M5MqBrdvHRo+i7jXobu7JvLVHMelmqCarMX6yg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Ow8RHGbSChg0A7qhwQeRfYlsYMugvoOcQ9DvYJf4vLY=; b=XqyJaaUxnjLTeQzGoBQAQpu1dFQCk/FgQ0AB2kiLNV+/LWxHrSd0NDCgSVBrqKeoeIb0ffZdvrIIFAd0ZFXL+zwtMKKaK7s+xwMDxC2olcBGjch7T3lrfl9QCU9yAlxjH4DfGkerTu9K935BXGxZ8Oa/KLUgJh6c6nucMqdLIAmPpq0W0sxmlfZyNqPYcs6lDzsrKYZe6joIn+iNLq6mnln/wKCiilGPiRdtb6yrQz3FXtMQhC9RjiPYtZFRkvJQid+yjdo0ckizazw4xr8XxokZ/1kKQKt/mCLOszkXBeRypUH4OzdZ1bBaL5X9zP39B3kLxkE+NjFoKhlCxLqPCQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Ow8RHGbSChg0A7qhwQeRfYlsYMugvoOcQ9DvYJf4vLY=; b=E8cArHBWHBMAnDnSi1nsTOVy53OL8Uvhk8qkYZKZHfyPsGR5WdA/N1JbY5Qw1mXRFkl88vOS1JzkQ+mq1Kd+54v36uzYE74+ngcgoqteCQCar/hjZl3wzvS9fQEa7jwEUl4Uj/X0oniBm9qNA6WEYfwN92603o2LSxbP9ezFNDs=
Received: from HE1PR07MB4217.eurprd07.prod.outlook.com (2603:10a6:7:96::33) by DB7PR07MB6012.eurprd07.prod.outlook.com (2603:10a6:10:37::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4975.10; Thu, 10 Feb 2022 17:12:52 +0000
Received: from HE1PR07MB4217.eurprd07.prod.outlook.com ([fe80::b1e2:6c17:3ba8:9fdc]) by HE1PR07MB4217.eurprd07.prod.outlook.com ([fe80::b1e2:6c17:3ba8:9fdc%5]) with mapi id 15.20.4995.006; Thu, 10 Feb 2022 17:12:52 +0000
From: Francesca Palombini <francesca.palombini@ericsson.com>
To: "dispatch@ietf.org" <dispatch@ietf.org>, "saag@ietf.org" <saag@ietf.org>, "secdispatch@ietf.org" <secdispatch@ietf.org>
Thread-Topic: [Secret] Secure Credential Transfer (secret) BOF Virtual Meeting: 2022-02-10
Thread-Index: AQHYEttrGDmcw5z0QkCuZIEBWQK9xayNHCMw
Date: Thu, 10 Feb 2022 17:12:52 +0000
Message-ID: <HE1PR07MB421725F4BC460ED0873AF5FA982F9@HE1PR07MB4217.eurprd07.prod.outlook.com>
References: <164321863329.27385.6340387845625300575@ietfa.amsl.com>
In-Reply-To: <164321863329.27385.6340387845625300575@ietfa.amsl.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ericsson.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0b0aadd1-bb1d-46c0-1e05-08d9ecb89289
x-ms-traffictypediagnostic: DB7PR07MB6012:EE_
x-microsoft-antispam-prvs: <DB7PR07MB601202073CC8E266476A533D982F9@DB7PR07MB6012.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:HE1PR07MB4217.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(55016003)(38070700005)(966005)(186003)(5660300002)(122000001)(82960400001)(110136005)(316002)(53546011)(450100002)(71200400001)(33656002)(83380400001)(2906002)(166002)(38100700002)(64756008)(76116006)(8676002)(8936002)(86362001)(508600001)(66946007)(6506007)(52536014)(7696005)(44832011)(9686003)(66556008)(66446008)(66476007)(91956017)(219293001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 2
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-antispam-messagedata-1: Uumxkk9gMlZv2xSmsQD0CveSZS3tAmrSLmw=
Content-Type: multipart/alternative; boundary="_000_HE1PR07MB421725F4BC460ED0873AF5FA982F9HE1PR07MB4217eurp_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: HE1PR07MB4217.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0b0aadd1-bb1d-46c0-1e05-08d9ecb89289
X-MS-Exchange-CrossTenant-originalarrivaltime: 10 Feb 2022 17:12:52.5139 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Da0xs91QgzV622T0GpTbrmKgLQLqh4PFvzmTA2MdPNVoMk0rP0gkObhpsyDzoQ8mUFGOj9GOF9Kb19lWd55pBfEoB0BdkTYInbNcB4KPo/CNvRt2NQSuo22chjOR7cF9
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB7PR07MB6012
Archived-At: <https://mailarchive.ietf.org/arch/msg/saag/MTg1MQl1Qi2ftPh0X7nDCQ2S3Cw>
Subject: Re: [saag] [Secret] Secure Credential Transfer (secret) BOF Virtual Meeting: 2022-02-10
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Feb 2022 17:13:30 -0000

FYI, happening now.

Francesca

From: Secret <secret-bounces@ietf.org> on behalf of IESG Secretary <iesg-secretary@ietf.org>
Date: Wednesday, 26 January 2022 at 18:37
To: IETF-Announce <ietf-announce@ietf.org>
Cc: secret@ietf.org <secret@ietf.org>
Subject: [Secret] Secure Credential Transfer (secret) BOF Virtual Meeting: 2022-02-10
The Secure Credential Transfer (secret) BOF will hold a virtual interim meeting on 2022-02-10 from 09:00 to 11:00 America/Los_Angeles (17:00 to 19:00 UTC).

Agenda:

    Intro
    Use cases
    Requirements
    WG charter discussion: https://github.com/dimmyvi/secure-credential-transfer/blob/main/charter.md
    Conclusion

Draft: https://datatracker.ietf.org/doc/html/draft-secure-credential-transfer-03

Information about remote participation:
https://ws.conf.meetecho.com/conference/?short=d1a67502-8fe8-4fc2-bb9b-f2e2f4594bb4

The meeting will happen over Meetecho. To join the session, you will need to use your IETF Datatracker (https://datatracker.ietf.org/) login, which you should create ahead of time if you don't already have one. If you have forgotten your IETF Datatracker password, you can request a reset (https://datatracker.ietf.org/accounts/reset/). For more information, see the Meetecho guide for participants (https://www.ietf.org/how/meetings/technology/meetecho-guide-participant/).

BOF Request: https://datatracker.ietf.org/doc/bofreq-secure-credential-transfer-bof-request/

Description:

We presented the secure credential draft to Dispatch on Monday of IETF week (2021). There was a lot of interest, but folks asked for additional detail on the problem statement, requirements, and use cases. It was decided that we weren’t ready to form a WG right away and instead endeavored to schedule a BoF to review the above items prior to forming a WG. The goal is to allow users with secure credentials on their mobile devices to be able to shares entitlements that these credentials grant to other users. This would be achieved by defining and standardizing a protocol that will facilitate such credential transfers from individual to individual. The protocol will leverage a “relay server” to transfer data from sender to recipient. The scope of the transfer is limited to a single origin device and a single destination device. This system does not exist today in a standards-based, cross-platform and cross-channel capacity. The goal of this BoF is to answer some of the questions that came up during the Dispatch meeting (such as, why can’t these credentials simply be lifted and cloned and then sent to the recipient?). We also want to provide additional detail into the applicable use cases, and some of the security and privacy requirements for the solution. The ultimate goal is to form a WG to discuss the initiative in an ongoing capacity.

--
Secret mailing list
Secret@ietf.org
https://www.ietf.org/mailman/listinfo/secret