[SCITT] Re: Last Call Review regarding extension of trust model to invocation context
Jennifer Bryan <jbryan522@comcast.net> Fri, 10 April 2026 14:22 UTC
Return-Path: <jbryan522@comcast.net>
X-Original-To: scitt@mail2.ietf.org
Delivered-To: scitt@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id B32DAD981871 for <scitt@mail2.ietf.org>; Fri, 10 Apr 2026 07:22:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=ietf.org; s=ietf1; t=1775830957; bh=aRRysW5kmq1E3QlOrrj8NQgBQYc7p/zUwfqH2NJRy78=; h=From:Subject:Date:References:Cc:In-Reply-To:To; b=cq/Erx5/gKmtMWty1FolvSIU5nV1qR691KdbTiLz6816aBzFKHSJ2zOCJ4kv2RoiQ mmvgQKoBh88D9NoF+nW4GbsEajly0cPFH+oKa6D7JLCTXeDcn6yTpQ7jBRBaKRZZ3+ vggQPo8bAuMiQDfLA8mlcOooHfJPYeEpK1qtcQgY=
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -1.849
X-Spam-Level:
X-Spam-Status: No, score=-1.849 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_ENVFROM_END_DIGIT=0.25, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=comcast.net
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JGTySBGtaRWQ for <scitt@mail2.ietf.org>; Fri, 10 Apr 2026 07:22:37 -0700 (PDT)
Received: from resqmta-h2p-567039.sys.comcast.net (resqmta-h2p-567039.sys.comcast.net [IPv6:2001:558:fd02:2446::9]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id EA8A6D98186C for <scitt@ietf.org>; Fri, 10 Apr 2026 07:22:36 -0700 (PDT)
Received: from resomta-h2p-554995.sys.comcast.net ([96.102.179.207]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 256/256 bits) (Client did not present a certificate) by resqmta-h2p-567039.sys.comcast.net with ESMTPS id BAIVwErUXgUQYBCkfwdoBs; Fri, 10 Apr 2026 14:22:29 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcast.net; s=20190202a; t=1775830949; bh=aRRysW5kmq1E3QlOrrj8NQgBQYc7p/zUwfqH2NJRy78=; h=Received:Received:Content-Type:From:Mime-Version:Subject:Date: Message-Id:To:Xfinity-Spam-Result; b=hJZjgtnga9H4ryOoWseaaMr+R72cBm2gAJMoAGi5naxMOM/ZI/MThOmSvKYcUNxsw 1rGmrxfOwarLeVzFu9wffWE7lIVrgs/RJFWo3MlVeVlOzypuKgjsK+2hJx5/LKJBoA 45W4ULbuPouQMKiWsL4GDRjp0b+AIWTo5yVWK4Ua1MqSynxAxT3VZiXcx0FgDunwdA xJHSbVEszLrOM+zS9m5nCl0cw3tgbU/RhqbHmsV1xenu7XMACJkUR5zsFAyZyRWy6M CjzVHvBisrAzbGX1B3ofAD2bUe8yexDjmqS2EvvrR5rUGYHp2zBRYYFNChiZmjdUOD JSfkCok/KqDZA==
Received: from smtpclient.apple ([69.197.203.190]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 256/256 bits) (Client did not present a certificate) by resomta-h2p-554995.sys.comcast.net with ESMTPSA id BCkVwn3uG0RygBCkXwNvtv; Fri, 10 Apr 2026 14:22:27 +0000
Xfinity-QID: BCkVwn3uG0RygBCkfwNvuX
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
From: Jennifer Bryan <jbryan522@comcast.net>
Mime-Version: 1.0 (1.0)
Date: Fri, 10 Apr 2026 09:22:09 -0500
Message-Id: <99020F5C-CAE8-4AA2-8755-1B5B057F54F8@comcast.net>
References: <0b8101dcc8ee$a469a1b0$ed3ce510$@businesscyberguardian.com>
In-Reply-To: <0b8101dcc8ee$a469a1b0$ed3ce510$@businesscyberguardian.com>
To: dick@businesscyberguardian.com
X-Mailer: iPhone Mail (23D8133)
X-CMAE-Envelope: MS4xfP/6XxNcmHED+uBTtWRsdoVL2fv8MVHCd9m/6N2CDkwO2Q1SOtw/gaZidzL0nrmjpsfzbW17+bJa/4Z+j7/S6csqG9Zmyl0IYsqsle7pve95HpIHyzzA +0HSGBfWHQA5dGv2kUaEIPcmasRg85kveGPUTxin+H/0z+8WFTX7CuZVbaFt3xcAbSZx1cBSYrZTh61a0NeavDHRvXvqAGjKW+igfxIE7SFoMwuvsynv8427
Message-ID-Hash: Z4BHPOMF6GNCQB7WEZ2OP2Z2ZUBKLWIU
X-Message-ID-Hash: Z4BHPOMF6GNCQB7WEZ2OP2Z2ZUBKLWIU
X-MailFrom: jbryan522@comcast.net
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: scitt@ietf.org
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [SCITT] Re: Last Call Review regarding extension of trust model to invocation context
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/KI5mNsmtBYb41B1f1FqW7GmoZBw>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Owner: <mailto:scitt-owner@ietf.org>
List-Post: <mailto:scitt@ietf.org>
List-Subscribe: <mailto:scitt-join@ietf.org>
List-Unsubscribe: <mailto:scitt-leave@ietf.org>
Dear Dick, Thank you for the thoughtful response and for pointing to Section 5.1.1. That was helpful, and I agree that SCITT clearly contemplates policy enforcement prior to registration through Registration Policies. The distinction I am trying to highlight is slightly different. It is not whether authorization checks occur before a signed statement is accepted, but whether the authorization context and outcome of those checks are captured and bound in a way that remains portable and independently verifiable after the fact. As I read the current model, SCITT provides strong guarantees that a statement was accepted under a given set of policies at registration time. What seems less clear is whether a downstream party, relying only on the artifact or receipt, can determine what authorization existed at the time the artifact was produced, without relying on the transparency service’s local enforcement. That difference between enforcement and verifiable evidence is the gap I was trying to point to. In environments with dynamic or automated generation, that distinction can become important when consumers need to assess not only what was recorded, but whether creation was demonstrably authorized in a way that can be evaluated independently. I agree that the architecture and SCRAPI work closely together, and my suggestion is simply that it may be worth considering how that authorization context at creation could be represented in a way that travels with the artifact and can be verified across systems. Thank you again for the engagement. I appreciate the perspective from implementation. Sincerely, Jennifer J. Bryan, MD, FAAFP Founder, Quiet Signal Technologies LLC > On Apr 10, 2026, at 8:34 AM, Dick Brooks <dick@businesscyberguardian.com> wrote: > > Jennifer, > > Thanks for the feedback. > > Regarding you comment " The drafts do not appear to define a mechanism for representing or verifying authorization context at the time of invocation. This includes whether a given actor, system, or credential was permitted to produce the artifact at the moment of generation and under what scope or constraints." > > We define detailed expectations within the "Registration Policies" required by the SCITT Architecture In our SAG-CTR Trust Registry implementation that has been proposed to serve as the US Cyber Trust Mark Label Registry. > " Registration Policies refer to additional checks over and above the Mandatory Registration Checks that are performed before a Signed Statement is registered to the Verifiable Data Structure." > > SCITT Registration Polices application and use: https://www.ietf.org/archive/id/draft-ietf-scitt-architecture-22.html#section-5.1.1 > > These SCITT Registration Policies provide the type of content I think you are asking for. SCITT Transparency Services Registration Policies are enforced before any attempt to place a signed statement into the SCITT ledger, using SCRAPI. > The SCITT Architecture and SCRAPI work in conjunction and should be considered two required parts of a Trust Registry/Transparency Service implementation. > > Just my .02 from the implementation trenches. > > Thanks, > > Dick Brooks > > Active Member of the CISA Critical Manufacturing Sector, > Sector Coordinating Council – A Public-Private Partnership > Lifetime IEEE Member > Never trust software, always verify and report! ™ > Risk always exists, but trust must be earned and awarded.™ > https://businesscyberguardian.com/ > Email: dick@businesscyberguardian.com > Tel: +1 978-696-1788 > > > -----Original Message----- > From: Jennifer Bryan <jbryan522=40comcast.net@dmarc.ietf.org> > Sent: Thursday, April 9, 2026 10:09 PM > To: scitt@ietf.org > Subject: [SCITT] Last Call Review regarding extension of trust model to invocation context > > Dear colleagues, > > The current SCITT architecture and associated drafts, including the reference APIs and receipt structures, provide a strong model for registering statements and producing verifiable receipts that support post hoc provenance and inclusion proofs. > > However, as currently written, the trust model is implicitly anchored at the point of statement registration rather than at the point of artifact generation. This creates a structural gap in scenarios where the trustworthiness of the artifact depends not only on its inclusion in a transparency service but on the conditions under which it was originally produced. > > The drafts do not appear to define a mechanism for representing or verifying authorization context at the time of invocation. This includes whether a given actor, system, or credential was permitted to produce the artifact at the moment of generation and under what scope or constraints. > > This distinction becomes increasingly important in environments where artifacts are generated dynamically by automated systems, where multiple actors or roles may invoke the same underlying capability, and where downstream consumers must be able to distinguish between outputs that are merely recorded versus those that were validly authorized at creation. > > Without a way to bind invocation context to the resulting statement or receipt, SCITT provides strong guarantees about what was recorded but limited guarantees about whether the recorded action was permissible or valid at the time it occurred. > > It may be useful to consider whether the model should be extended to support representation of invocation time authorization context as part of the signed statement or associated metadata, cryptographic binding of that context to the resulting artifact or receipt, and verifiability of that context by third parties independently of the original system. > > This could be introduced in a way that remains implementation agnostic, for example through optional fields, extensible metadata, or profile level constraints, while enabling higher assurance use cases that depend on more than post hoc provenance. > > Framing this specifically in the architecture may help ensure that SCITT can support not only transparency and integrity but also validity of action at the point of creation, which is increasingly a first order requirement in automated and distributed systems. > > This is intended as a complement to the existing model rather than a replacement, extending the trust boundary upstream without constraining implementation approaches. > > Thank you for the opportunity to contribute and please don’t hesitate to reach out if I may be of assistance. > > Sincerely, > > Jennifer J. Bryan, MD, FAAFP > Founder, Quiet Signal Technologies LLC > > -- > SCITT mailing list -- scitt@ietf.org > To unsubscribe send an email to scitt-leave@ietf.org >
- [SCITT] Last Call Review regarding extension of t… Jennifer Bryan
- [SCITT] Re: Last Call Review regarding extension … Dick Brooks
- [SCITT] Re: Last Call Review regarding extension … Jennifer Bryan
- [SCITT] Re: Last Call Review regarding extension … Dick Brooks
- [SCITT] Re: Last Call Review regarding extension … Jennifer Bryan
- [SCITT] Re: Last Call Review regarding extension … Dick Brooks