[sacm] SACM Vulnerability Assessment Scenario Informal Working Session

Adam Montville <adam.w.montville@gmail.com> Fri, 13 January 2017 13:14 UTC

Return-Path: <adam.w.montville@gmail.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3A4841295DB for <sacm@ietfa.amsl.com>; Fri, 13 Jan 2017 05:14:10 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level:
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B0riijFzPTLS for <sacm@ietfa.amsl.com>; Fri, 13 Jan 2017 05:14:07 -0800 (PST)
Received: from mail-oi0-x22e.google.com (mail-oi0-x22e.google.com [IPv6:2607:f8b0:4003:c06::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3774412947A for <sacm@ietf.org>; Fri, 13 Jan 2017 05:14:07 -0800 (PST)
Received: by mail-oi0-x22e.google.com with SMTP id m124so19839304oif.1 for <sacm@ietf.org>; Fri, 13 Jan 2017 05:14:07 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:from:date:message-id:subject:to; bh=kmQkOEvkvH++QRfA5k2ONogFHi9kYjA52aFrEOmTjys=; b=GaoqYyDs/Ddx1z+UVgolQAbpXEQAtVgdocGsTVDIJg8mEgcySFR4BDXQ8PMNDd3xK/ Zwm1PA00xeyQqnHUNGDautYSznDYSflAjwUTyky2AkDQDPKEU1EaMFDRPSmIhTCzZeMi /VLdKHLCxTzUlSN4gEHOj0lubiLEZXEewSjYgVPBB6KlnNNLr5PNSw2ptYVOTkbXpkKT ibn+PuDznHzgbqo3RQV1YTsibv2IQIimyEC4RYuGcS3uSlSaOoGjsmY+OrAoP5mb/8bJ zS6HKDHZUvlMvXNJenr4ylEPcxUkmiiimwCP9qaxXDbG+i7EbnARmjq3wnhdC+RKpEeQ 7aLA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=kmQkOEvkvH++QRfA5k2ONogFHi9kYjA52aFrEOmTjys=; b=qlIyqFY7d3y8wai8h/JX7gb/dz3p4372x/SM+anZQ9yV6TfM4YQ1luxz+eEW33AutX 05M2sEsuyBVQq82OyA9sVy0yBNDG8ftyqjuM1wl/sprol9G9N7DAvsq1XaiwCJ+/hcsl FLCyxc9dk0j8tXvaQSUgYIITWq06N0/E8qVu+Re/nhbkBFmRXu/E5F8E1wWizqNVM+1Q VVnz/nWJdOhAYS/kBxlOY/BEbIniiBeFpg8gWXiYSYCZKaqD9izjYMbnSsv6BrfnZZZX oQnBDKRmHeaFXhFW+Dw9KUUfdqhnohfw9FywCg5Fz0Z0PVVYtnYnFClfgNmc1xS7zae7 x65Q==
X-Gm-Message-State: AIkVDXJqoec5eszDM0gD+6sXEkYeja4wefJE/hEp+O01gSEMya1eI017vLnJy1L+62m2O2BIR+j734mvw92tjg==
X-Received: by 10.202.220.139 with SMTP id t133mr9863936oig.82.1484313246346; Fri, 13 Jan 2017 05:14:06 -0800 (PST)
MIME-Version: 1.0
From: Adam Montville <adam.w.montville@gmail.com>
Date: Fri, 13 Jan 2017 13:13:56 +0000
Message-ID: <CACknUNXTo6AztScBPEverE+hvYiUbgQU=zuAPbAf878ne600uQ@mail.gmail.com>
To: "sacm@ietf.org" <sacm@ietf.org>
Content-Type: multipart/alternative; boundary="001a113d5d5cc8b3c60545f99be7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/Y-aTNK-ek6qbyYYwt30C2V2Jj9A>
Subject: [sacm] SACM Vulnerability Assessment Scenario Informal Working Session
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 13 Jan 2017 13:14:10 -0000

Hi.

On Thursday, January 19th, at 10am Eastern (3pm UTC) for one hour a few of
us are going to begin diving into the vulnerability assessment scenario as
has been proposed on the list and discussed in our most recent virtual
interim.

This session is intended to be a working session, and is open to those who
may be able to attend.  If you do attend and plan to contribute, please
read in detail the vulnerability scenario draft (
https://datatracker.ietf.org/doc/draft-ietf-sacm-vuln-scenario/), so that
you are familiar with the terminology and concepts presented therein.

We'll use SACM's WebEx room for the session.  Navigate to
https://ietf.webex.com/meet/sacm for the details.

Once more, we'll be meeting on 1/19 @ 10am Eastern (3pm UTC) for one hour
using WebEx.

Kind regards,

Adam