[saag] Encryption trends slides

Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com> Fri, 24 July 2015 08:32 UTC

Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 805B61A1AA2 for <saag@ietfa.amsl.com>; Fri, 24 Jul 2015 01:32:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.779
X-Spam-Level:
X-Spam-Status: No, score=-1.779 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_DKIM_INVALID=0.01, T_FREEMAIL_DOC_PDF=0.01] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rqKf3NKs8oRx for <saag@ietfa.amsl.com>; Fri, 24 Jul 2015 01:32:23 -0700 (PDT)
Received: from mail-wi0-x22a.google.com (mail-wi0-x22a.google.com [IPv6:2a00:1450:400c:c05::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DBB3D1A0AF7 for <saag@ietf.org>; Fri, 24 Jul 2015 01:32:14 -0700 (PDT)
Received: by wibud3 with SMTP id ud3so17545581wib.0 for <saag@ietf.org>; Fri, 24 Jul 2015 01:32:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:date:message-id:subject:from:to:content-type; bh=AnombmwvtiW4NubyPcJjG3PmKxJi9CAqU+WPRPAZHrA=; b=kWni8aBb/sAC+fpfYYH3bxlZGy85Mn9jr8GH2MzJ7eLQucXibf5lgfg5RdqR/jAOXI hGR1un+9SNVlWI2wUlEjlYL8IvA3QhFzqB6hu68Wq39hEs0zy8hd80JjC7V0RdAUZblH ZF0VfxasCo3Ifj0+ZeyQQMb35/XAR3XevAyQnRKJ6qr/zFAmgSdvfN+xwTWq8J1/G4co FN5WkTY0jtf7RGDKZIPFXENX6sA/E9Xq+SWdtxBXVGuezffxbkYVWJdYX5QS5mDGsmkn XnLVC1tH0zZOwyGMigBJ76QH3V/WObqFS2S4lcH3Fm+BY/bHV3Eutnt2AvB3YF4eqbH1 2/kw==
MIME-Version: 1.0
X-Received: by 10.180.37.133 with SMTP id y5mr5029277wij.34.1437726733232; Fri, 24 Jul 2015 01:32:13 -0700 (PDT)
Received: by 10.28.34.139 with HTTP; Fri, 24 Jul 2015 01:32:12 -0700 (PDT)
Date: Fri, 24 Jul 2015 04:32:12 -0400
Message-ID: <CAHbuEH7wVXWcaZRcuMTscsnBh9nqryX656oZP4Dq2J2H7LROwA@mail.gmail.com>
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
To: "saag@ietf.org" <saag@ietf.org>
Content-Type: multipart/mixed; boundary="e89a8f50335a39cb71051b9ad74c"
Archived-At: <http://mailarchive.ietf.org/arch/msg/saag/gAWt7tTs_VcpG1slVKKaoYAaRMs>
Subject: [saag] Encryption trends slides
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/saag/>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 Jul 2015 08:32:26 -0000

Hello,

I gave the attached presentation for product development teams at my
employer last month and thought it might be helpful for others to use at
their companies.  Obviously, the slides are for a point in time.  If this
is useful, I can occasionally update the slides and share them.  I may
record a version of the presentation as it went over really well with our
product teams, making them aware of changes in the IETF and industry that
they don't necessarily have time to follow.  This type of thing may help
part of our target audience for security standards and better promote the
work of the IETF.

Because of the target audience, the slides have links to detailed
information (drafts/RFCs).  When I gave this, while I did get into some
details, there was more emphasis on high-level points that hopefully stuck
(paying attention to the audience).  One such point was that SSLv3 support
needs to be removed from products.  The teams were concerned on browser
support and that was addressed in the slides as well to give them an
assurance that it is okay to deprecate SSLv3 where it had not been done
already.

I included notes for talking points in case someone finds it helpful.
These are in my PPT version, but didn't seem to make it into the PDF.  Let
me know if you want the notes.

If a recording would be useful for the target audience, let me know and I
may bump it up on my priority list to help other product development teams
understand trends of encryption in the IETF.  EMC shows up on the slides as
I gave this as an internal presentation with no hat on as stated on the
first slide.

-- 

Best regards,
Kathleen