[SCITT] IDevID and draft-ietf-netconf-keystore

Orie Steele <orie@transmute.industries> Mon, 29 January 2024 20:09 UTC

Return-Path: <orie@transmute.industries>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 275A8C151542 for <scitt@ietfa.amsl.com>; Mon, 29 Jan 2024 12:09:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.319
X-Spam-Level:
X-Spam-Status: No, score=-0.319 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_IMAGE_ONLY_24=1.618, HTML_MESSAGE=0.001, HTML_SHORT_LINK_IMG_3=0.148, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, T_REMOTE_IMAGE=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=transmute.industries
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Yjl46xVt5Okv for <scitt@ietfa.amsl.com>; Mon, 29 Jan 2024 12:09:46 -0800 (PST)
Received: from mail-pg1-x530.google.com (mail-pg1-x530.google.com [IPv6:2607:f8b0:4864:20::530]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 921E7C151549 for <scitt@ietf.org>; Mon, 29 Jan 2024 12:09:46 -0800 (PST)
Received: by mail-pg1-x530.google.com with SMTP id 41be03b00d2f7-5ceb3fe708eso1780111a12.3 for <scitt@ietf.org>; Mon, 29 Jan 2024 12:09:46 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=transmute.industries; s=google; t=1706558985; x=1707163785; darn=ietf.org; h=to:subject:message-id:date:from:mime-version:from:to:cc:subject :date:message-id:reply-to; bh=5anh/CnM7T3/rOU+0D1O1MEp9m4+vYdd/pqMXTWLE7Y=; b=fpOZrBwP1arUUZsrAvmlHljHb2lenWp1wuIpml37aOFQJc3VrZhhPJvEE+5S6lbrVy 18JDdLB6QrkiqH9d0nzYrdm6kp5eQAwAL+3BfjFvdh0T9KzEyxRVCegec/L57PhPReyW 26KpAyOqqcLfePmbOmQ7ADkbP5UqlcyerpLUwpbhL45RW08Rw3Hb/LCt+9vKoGstr+94 KlJ487LMZXc4ChMFY4PM+V901dD6134B1gUIj/SqxTtxtq62b8hi6seEt5pJh3HUbqws +U5MQHq0E7t4TZASB4fyP9NwjThS4AaXa7dIg/mn7bC4iGL+2/RWjJuh1BEPO0GDIAf0 llkA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1706558985; x=1707163785; h=to:subject:message-id:date:from:mime-version:x-gm-message-state :from:to:cc:subject:date:message-id:reply-to; bh=5anh/CnM7T3/rOU+0D1O1MEp9m4+vYdd/pqMXTWLE7Y=; b=gBTOqz7YBD6bXfP7VfKMoV4ZgRCjAbb6muRewPoC9VXUgprg/G/SReLSniKxHVv2yg FbyoahdiMEExwK1I2X90hLs7QaJk+e/Um0DC3/UI9vNyaNKTnMwGviUI960XfA3+JXHk hfXzVcJZPObcvvyQqaDmO0rvqOJjsZgv6U9PG+JEUAvmxo82ycKtWtGtuIhJUe2kFNPZ 7bDTiwCnDnCwZw1cj1IF4d8SFIbBaHRCGDhZg4XxdeZhpG4zchXN8nzScw9q6ptk4wkj 6OTBay1S3i04MzqZw3ow9SQbk+XElyi8FdpDJnPLq4pMn3SwnlJ98xx7FB6Sz/tQR6yq EzAQ==
X-Gm-Message-State: AOJu0Yx+2qZ5o4rNzT3s88Az+Sa4o98STbfjPEZdStVxnRqeKl2QDF3l qhA2k0FgQ7YRtwLI+SWWt67fbZhrc7vX+f+Ywj/xRzhAqFeKQkxk5bftAh4c6ANyMnzeC6CwFea rjfcWb41IdEHNuxt41e3dT7Kh35jfNHkOHDFp2x593b5mZjWUarM=
X-Google-Smtp-Source: AGHT+IGaP92yrSFrmY2N2nwxxa1YT5+Fw9MZkaOH5QE4DITq5Ps7mh9gRnRVRq01lytnoOC11nkxzYBHfo8JOshMwXQ=
X-Received: by 2002:a17:90a:ac0d:b0:294:1261:6412 with SMTP id o13-20020a17090aac0d00b0029412616412mr3891714pjq.9.1706558985547; Mon, 29 Jan 2024 12:09:45 -0800 (PST)
MIME-Version: 1.0
From: Orie Steele <orie@transmute.industries>
Date: Mon, 29 Jan 2024 14:09:34 -0600
Message-ID: <CAN8C-_J=VcOGOFK1C_f2NHM8zX+FbpJZF3D=sMXHKmodNSo8ng@mail.gmail.com>
To: scitt <scitt@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000001f48d206101b3af6"
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/5jiNd6-R4Ig8NV1DfzSwXR1uFao>
Subject: [SCITT] IDevID and draft-ietf-netconf-keystore
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Jan 2024 20:09:50 -0000

Implementations may utilize operating-system level keystore utilities
(e.g., "Keychain Access" on MacOS) and/or cryptographic hardware (e.g.,
TPMs).

https://datatracker.ietf.org/doc/html/draft-ietf-netconf-keystore-30

It's interesting to consider how a SCITT transparency service might fit
into this picture.

OS


-- 


ORIE STEELE
Chief Technology Officer
www.transmute.industries

<https://transmute.industries>