[sacm] Upcoming Prague Hackathon

Bill Munyan <bill.munyan.ietf@gmail.com> Fri, 15 February 2019 17:19 UTC

Return-Path: <bill.munyan.ietf@gmail.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 11DD5130FE2 for <sacm@ietfa.amsl.com>; Fri, 15 Feb 2019 09:19:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TPu5GG5VmQdv for <sacm@ietfa.amsl.com>; Fri, 15 Feb 2019 09:19:57 -0800 (PST)
Received: from mail-ot1-x336.google.com (mail-ot1-x336.google.com [IPv6:2607:f8b0:4864:20::336]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D186E130FDA for <sacm@ietf.org>; Fri, 15 Feb 2019 09:19:56 -0800 (PST)
Received: by mail-ot1-x336.google.com with SMTP id w25so17661530otm.13 for <sacm@ietf.org>; Fri, 15 Feb 2019 09:19:56 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=wLrAuR2mIlVHZe9J2VRPak5OhdrB7wlzJ7uTmmoMXnE=; b=D438CCoOuHS2MPe5nueIz/ijIDMnOZ3tE8jsERhnDKsrGFTUJex/UO6VhMfz3S6pE9 uFORkoRkyf44SjaeE5CsBwuF3w/5EkGUu+RO+ZpnUfx80PEMo3DY+I8D7j/O4t8SogmQ b2XScTwuyzpCtlGAo58Ynlcbo24RmZ7dhX7xayYP1sPLPEfJARJOtWtau7/nZ//7h47x 4dMH7voj2UeuSpkQKrlU5C/9t21+Z3f1ikXCWe7NddrU4gvyKTSiU8vdt/OZSu/dYk+P bjsQDs3aPy6LtJSOyhlWQAFXaG1z34D028lsqhIpfwjfVqWtYkE/Z2mh0488PojJaJ/q tKIw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=wLrAuR2mIlVHZe9J2VRPak5OhdrB7wlzJ7uTmmoMXnE=; b=X71zoKgPXtHGNeg7khsUds6wbugUArd7lFjal91ybprWr6N9yFNfrYJCcLyyqqNec+ Q74f8DvCuasPhPheDylkBSAdHnDky1pwYZKKsl/SW2xikHKDGScu8Vi1DPw7F4rz/mQI xxc3qkuyDEvdQjA3SPzZXoBENPcvR8NKpqpxW9u9dR7Xx8EeRM7X9rMooAiGhWoGeH0a BBl2btmu7DOmaTp3zvZefz66wtS/6dR0AVMOeM7aUWAmxUxx4U9jZKM/4UMPORfvaUgX k6bz7iEN5elFZ44kMqsrT6zR78wh2fv9ZBnQrzfYz7woERLOccP78ZIcuOzBUbiPeMX6 KDpw==
X-Gm-Message-State: AHQUAua6XxwQcmgIvHjyR6KFj/Re+n28ziR6QpiKMA61FBTvlRVCua3v /lVAglt1S2lTb/YlClBI+i4+rJnkB3Eyn5rxD4q00Fwl
X-Google-Smtp-Source: AHgI3IZGJvswYoE5z3uD0S+CMlRYce0FCDmP8c0jp5XvkxtK3wyqMxWykh61WTmjRcoJ+vzOhgcLKuuMoam1KVTehN0=
X-Received: by 2002:a9d:4ac:: with SMTP id 41mr6165128otm.344.1550251195813; Fri, 15 Feb 2019 09:19:55 -0800 (PST)
MIME-Version: 1.0
From: Bill Munyan <bill.munyan.ietf@gmail.com>
Date: Fri, 15 Feb 2019 12:19:44 -0500
Message-ID: <CAKUOEQzJonc9AradpOgp4QYct5Xmi-GN_D9d+SzrbKJUr207QA@mail.gmail.com>
To: "<sacm@ietf.org>" <sacm@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000d6d9db0581f1fbaf"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/0jWxLmlU6ih-fRP3jpbiyG9ro-U>
Subject: [sacm] Upcoming Prague Hackathon
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 15 Feb 2019 17:19:59 -0000

As mentioned on the Virtual Interim this morning, we'll be doing some
hackathon-ing during the week in Prague.  The intent was to continue
focusing on using the hackathon to discover more about the SACM
architecture; what a collector may or may not be able to do, such as
advertise its collection capabilities, perform collection, and publish
collection results.  I am also looking to gain some more knowledge on what
an orchestration component would look like.

The SACM "project" has been created on the Hackathon wiki with the
following bullets:
- Develop an XMPP extension/component and client to allow for an
orchestration of posture attribute collection
- Expand data model development to help define posture attributes to collect

As folks can tell, I am focusing on continuing the discovery using XMPP as
the "message transfer system" as noted in the architecture.  I think this
effort will be a great continuation of previous hackathons, and I hope
folks will be able to participate.

Please get in touch with me regarding participation!

Cheers,
- Bill M

Wiki Entry:  https://trac.ietf.org/trac/ietf/meeting/wiki/104hackathon
GitHub Repo:  https://github.com/CISecurity/IETF104-Client