Re: [SCITT] [EXT]Re: Endor: A SCITT PoC for W3C Verifiable Credentials

ProSapien Sam Smith <sam@prosapien.com> Tue, 16 August 2022 18:31 UTC

Return-Path: <sam@prosapien.com>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E5C18C1524B2 for <scitt@ietfa.amsl.com>; Tue, 16 Aug 2022 11:31:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.705
X-Spam-Level:
X-Spam-Status: No, score=-1.705 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_INVALID=0.1, DKIM_SIGNED=0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (public key: OpenSSL error: bad base64 decode)" header.d=prosapien.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cqHassNk7u4i for <scitt@ietfa.amsl.com>; Tue, 16 Aug 2022 11:31:52 -0700 (PDT)
Received: from mail-pg1-x532.google.com (mail-pg1-x532.google.com [IPv6:2607:f8b0:4864:20::532]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CA633C1524B0 for <scitt@ietf.org>; Tue, 16 Aug 2022 11:31:52 -0700 (PDT)
Received: by mail-pg1-x532.google.com with SMTP id bh13so9975852pgb.4 for <scitt@ietf.org>; Tue, 16 Aug 2022 11:31:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=prosapien.com; s=google; h=to:references:message-id:cc:date:in-reply-to:from:subject :mime-version:from:to:cc; bh=ZO4TuvRGLX7lEVhRG2zG4dl/jY+q2aNRpwEvumKkVQU=; b=SgZBhnY3DL1M740y2m0jzDJzOfzk//2EsWrUbitilPdQdRBoiMoGGx5F4j/7Zk164n wA+1bfQ511uqPI6Db25iViCMNZsNMY8gIuWUholJIdT0ddg+gWCgAu0ON8h82D7J4clS h9Nlveoj9SOp9YADn5Y1AX+ORIzNAAL8LUz+I4XWkmCOXMq3GleYGZK7FBLlgROr1IOl m/K6iz9GpNX0tipmvG+cX82ZL0lVqmJtfAQu+lIvxrRKeVFKZw0sBKmj7bkZJ18idWHp MNWEfTiXQqnjm68aCjhGZGdnu7704ogMakUi+gfA2mg0S/O/nLwebUC/8BBEED9N0ElP +Mkg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=to:references:message-id:cc:date:in-reply-to:from:subject :mime-version:x-gm-message-state:from:to:cc; bh=ZO4TuvRGLX7lEVhRG2zG4dl/jY+q2aNRpwEvumKkVQU=; b=nwnzCkJZ07IbqiMPVM+WjHdaiHIawpubnhYpNhpGlzc7InffOOcZhczbRHJOcVkRFP iqZVr9s/kdeEE0ilOMfDFH4aJ1iGP49wu2uvV8WUHPt0AGZc6byI1cm1iW7+YEms2lGr 1W/cv/G1ela1GgZxCVzNyerfs1fdGjFHlNG/4eYnbcGr4eZt+8R4hRJBNsb/HNPUpEGq FHAOzIsiVlS/szxcaZ640U6RzwlK0D7jcQ8qP0FFgBn8xGA7dsvn5QuzaHCUooIC0+ZE jvWAdk0wLrhaisM5M+QIAgp6J4VZvLiwH8eDukwuko6CCyfYU7LIz9LIKxHXnKmliDJX HpUQ==
X-Gm-Message-State: ACgBeo0h+ITHxiVmgatT6/2FSy0pUnJymIUhnb2wBEiZ6oLBml+5oDCh HT83yiYu8B1Y6JS8MJn0q+20HA==
X-Google-Smtp-Source: AA6agR7rR/XJWXUFyobmBVZsa+ukwWLf5Wk+kl0OcmnhElHgFxgluP4k0PbOBhwDoHcsyr7gDLNHDw==
X-Received: by 2002:a63:db17:0:b0:41b:8e02:3e80 with SMTP id e23-20020a63db17000000b0041b8e023e80mr19280266pgg.235.1660674711730; Tue, 16 Aug 2022 11:31:51 -0700 (PDT)
Received: from smtpclient.apple ([166.70.16.84]) by smtp.gmail.com with ESMTPSA id e3-20020aa798c3000000b00528bd940390sm8762417pfm.153.2022.08.16.11.31.50 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 16 Aug 2022 11:31:51 -0700 (PDT)
Content-Type: multipart/alternative; boundary="Apple-Mail=_7FAB04AB-0670-4B81-BD82-3B2116510D61"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.1\))
From: ProSapien Sam Smith <sam@prosapien.com>
In-Reply-To: <DS7PR21MB3341DB29B18C37AE487039EF9C6B9@DS7PR21MB3341.namprd21.prod.outlook.com>
Date: Tue, 16 Aug 2022 12:31:50 -0600
Cc: "dick@reliableenergyanalytics.com" <dick@reliableenergyanalytics.com>, Carl Wallace <carl@redhoundsoftware.com>, Orie Steele <orie@transmute.industries>, "scitt@ietf.org" <scitt@ietf.org>
Message-Id: <B0315D14-1C0F-478F-B31D-B4503A1DB5E5@prosapien.com>
References: <CAN8C-_K-w5QQqrZDS9VH2-gzOO9e+HS8b9nGvG+ZBjJ-PM-MCw@mail.gmail.com> <LV2PR21MB3350154C13FA8A6F9D940FA79C9C9@LV2PR21MB3350.namprd21.prod.outlook.com> <13e501d8a738$1b277ed0$51767c70$@reliableenergyanalytics.com> <CAN8C-_JvDwS4CTBJMm9YN8jdXnLATPg0j3xO5BFs+yraWZc2Yg@mail.gmail.com> <144801d8a73c$adb8dec0$092a9c40$@reliableenergyanalytics.com> <OS3PR01MB75270FA0BFF65C76B2AD2D58D19C9@OS3PR01MB7527.jpnprd01.prod.outlook.com> <OS3PR01MB75272702BC43C5DA50A57081D19C9@OS3PR01MB7527.jpnprd01.prod.outlook.com> <170b01d8a766$6cf8b110$46ea1330$@reliableenergyanalytics.com> <DS7PR21MB33410F208AF17F985E9D7F609C659@DS7PR21MB3341.namprd21.prod.outlook.com> <CAN8C-_+f5rvhSDKxGCJ_SxBuhO4HwONx7ZkRSV2qnhpYvH1_uQ@mail.gmail.com> <1B9FF775-B7AF-41F6-B8BE-A6783B0C5452@redhoundsoftware.com> <6bda01d8ad83$a2306030$e6912090$@reliableenergyanalytics.com> <DS7PR21MB3341FF9A28BD95E687E66F739C649@DS7PR21MB3341.namprd21.prod.outlook.com> <0BD53E48-2E51-41B9-915C-FA1333B95496@redhoundsoftware.com> <DS7PR21MB3341A3CBAB 6679A1D96A21449C689@DS7PR21MB3341.namprd21.prod.outlook.com> <DCEEC322-8E2C-4F46-8F09-9CBC1D1F6417@redhoundsoftware.com> <c05301d8b16e$e9a1bec0$bce53c40$@reliableenergyanalytics.com> <DS7PR21MB3341DB29B18C37AE487039EF9C6B9@DS7PR21MB3341.namprd21.prod.outlook.com>
To: Steve Lasker <Steve.Lasker=40microsoft.com@dmarc.ietf.org>
X-Mailer: Apple Mail (2.3696.120.41.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/Vag08L481voWzqjWG3esT0SE2is>
Subject: Re: [SCITT] [EXT]Re: Endor: A SCITT PoC for W3C Verifiable Credentials
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 16 Aug 2022 18:31:58 -0000

One solution to this class of problems is to use a Web-of-Trust approach with reputable trust anchors. 
For example the GLEIF (Global Legal Entity Identifier Foundation) is setting up a trust anchor where using a type of verifiable credential, they can make an attestation that a given cryptonymous identifier controlled by a set of (public, private) key pairs is associated with a given Legal Entity. Authorized Qualified Issuers perform identity assurance and identity authentication as a precursor to issuing those credentials. This provides a Global cryptographically verifiable mechanism for establishing that any attestions by Wabbit networks my be securely attributed to authorized representatives of Wabbit Networks.  

Using the same open source protocols and libraries (KERI/ACDC) as that used by GLEIF any ecosystem can set up their own root-of-trust for a trust anchor to provide a complementary establishment (instead of or in addition to) GLEIF's.  The underlying protocols support provenance chains-of-authority for any issued credential (indeed trees not just chains) so that the secure attribution problem is solved.

So a way to address this in the SCITT working group is to accept these types of provenancing for secure attribution and then focus on supply chain specific schema and formats for managing supply chains given a solution  to the secure attribution problem.

See https://keri.one/keri-resources/ <https://keri.one/keri-resources/>


> On 16 Aug 2022, at 12:19 , Steve Lasker <Steve.Lasker=40microsoft.com@dmarc.ietf.org> wrote:
> 
> Thanks Carl,
> I’m trying to understand your question. 
> In your example, how does ACME rockets know the artifact is a genuine product of Wabbit Networks? Current code signing mechanisms don’t achieve this (as Dick has noted). Ideally, public keys would not be trusted for a broader context than is actually necessary.
>  
> If the Wabbit Networks public key isn’t trusted, what are you suggesting?
>  
> The opt-in model for policy would/could be, ACME Rockets decides which identities they trust, through their trust policies. They may choose to trust only X.509 public keys. But, they can also specify which public keys they trust. For instance, they might trust content signed by Docker Inc, Wabbit Networks and Microsoft. If they attempt to import something from evilco, it’s denied by default. Even if evilco got a valid public certificate, import would still be denied. This is also where DiD would come in. Within the eNotary, based on the policy, ACME rockets confirms the Wabbit Networks identity is valid, at the time of evaluation.
>  
> A goal of the spec I referenced is representation of trust anchors along with constraints on usage.
> Awesome, yes, we need a solid pattern for enforcing constraints. The identity is the pre-filter to say content is signed by identities I trust. Now, lets confirm it matches the requirements.
>  
>  
> …ACME Rockets doesn’t get to choose what key Wabbit Networks used to sign something,
> I’m not sure I follow this. Wabbit Networks will publish their public keys. Through DiD, the signed artifact should identify where to find the public key, which the consumers can opt-into levels of that chain.
>  
> I do agree there’s a lot of alignment with RATS we should continue to look at and see what can be shared. We definitely want to build atop proven work.
>  
> From: Dick Brooks <dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>> 
> Sent: Tuesday, August 16, 2022 5:51 AM
> To: 'Carl Wallace' <carl@redhoundsoftware.com <mailto:carl@redhoundsoftware.com>>; Steve Lasker <Steve.Lasker@microsoft.com <mailto:Steve.Lasker@microsoft.com>>; Orie Steele <orie@transmute.industries <mailto:orie@transmute.industries>>
> Cc: scitt@ietf.org <mailto:scitt@ietf.org>
> Subject: RE: [SCITT] [EXT]Re: Endor: A SCITT PoC for W3C Verifiable Credentials
>  
> +1 to Carl’s statement: “[CW] OK. But ACME still needs to get its bearings to trust the signature from Wabbit Networks. There may be compliance programs where a digital letter of approval is generated as well, in which case ACME Rockets need not be the authority.”
>  
> IMO, SCITT provide the opportunity to provide customers with the ability to verify the authorized trust relationship between an artifact owner and an artifact signer.
>  
> We currently use the SHA256 Hash value of an artifact and the X.509 Thumbprint or PGP fingerprint of the digital signature to search for trust declarations in SAG-CTR.
>  
> Thanks,
>  
> Dick Brooks
> <image004.png>  <image005.png>
> Active Member of the CISA Critical Manufacturing Sector, 
> Sector Coordinating Council – A Public-Private Partnership
>  
> Never trust software, always verify and report! <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Freliableenergyanalytics.com%2Fproducts&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885206772%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=bqjKrd%2Fi9hMxKTy00u81QhTRmthzng%2FPXWnueiyLtv4%3D&reserved=0> ™
> http://www.reliableenergyanalytics.com <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.reliableenergyanalytics.com%2F&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885362159%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=doXFEcZmGr0vcZfSnxUudaB%2BDMOfFDyh4wlV7JtkbXg%3D&reserved=0>
> Email: dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>
> Tel: +1 978-696-1788
>  
> From: Carl Wallace <carl@redhoundsoftware.com <mailto:carl@redhoundsoftware.com>> 
> Sent: Tuesday, August 16, 2022 7:10 AM
> To: Steve Lasker <Steve.Lasker@microsoft.com <mailto:Steve.Lasker@microsoft.com>>; dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>; Orie Steele <orie@transmute.industries <mailto:orie@transmute.industries>>
> Cc: scitt@ietf.org <mailto:scitt@ietf.org>
> Subject: Re: [SCITT] [EXT]Re: Endor: A SCITT PoC for W3C Verifiable Credentials
>  
> Inline…
>  
> From: Steve Lasker <Steve.Lasker@microsoft.com <mailto:Steve.Lasker@microsoft.com>>
> Date: Monday, August 15, 2022 at 12:25 PM
> To: Carl Wallace <carl@redhoundsoftware.com <mailto:carl@redhoundsoftware.com>>, "dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>" <dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>>, Orie Steele <orie@transmute.industries <mailto:orie@transmute.industries>>
> Cc: "scitt@ietf.org <mailto:scitt@ietf.org>" <scitt@ietf.org <mailto:scitt@ietf.org>>
> Subject: RE: [SCITT] [EXT]Re: Endor: A SCITT PoC for W3C Verifiable Credentials
>  
> Thanks Carl,
> The code signing example has cropped up here fairly often (i.e., why should my code signing key be accepted as fit to verify a signature on some other company’s code).
>  
> Parsing this a bit more. I believe we’re talking about the promotion scenario. Where entity B consumes artifacts from Entity A. In the Notary v2 scenarios, we talk about Wabbit Networks as an ISV, and ACME Rockets as a consumer of the software.
>  
> When ACME Rockets consumes the net-monitor:v1 software from the Wabbit Networks public endpoint, how do services within ACME rockets know the artifact was approved for internal usage?
>  
> [CW] Thank you for the example as this clearly illustrates we are talking about different things. In your example, how does ACME rockets know the artifact is a genuine product of Wabbit Networks? Current code signing mechanisms don’t achieve this (as Dick has noted). Ideally, public keys would not be trusted for a broader context than is actually necessary.
>  
> One solution is simply adding an ACME Rockets signature to the net-monitor:v1 software. Then, internal systems only need to check if an ACME Rockets signature exists, and it would be approved. This is overly simplistic. With SCITT, we can now add “context” to what scenarios/environments the net-monitor:v1 software was approved for use within ACME Rockets.
> The premise is consumers within ACME Rockets check for a specific claim/attestation/endorsement to allow the artifact to pass a check. However, the filter on the claims check is based on a set of approved identities. For instance, if Wabbit Networks says it passes ABC123 compliance, that’s nice, but it wouldn’t pass the check. Only claims from ACME Rockets for ABC123 compliance would be allowed to pass.
>  
> So, the identity is a pre-filter to a set of claims/attestations/endorsements.
>  
> [CW] OK. But ACME still needs to get its bearings to trust the signature from Wabbit Networks. There may be compliance programs where a digital letter of approval is generated as well, in which case ACME Rockets need not be the authority.
>  
> ------
>  
> We’ll need a means to correlate the multiples, as how do they merge.
> [CW] I’m not following why we would merge collections. Selecting a collection for use seems more likely.
>  
> How would we support a company that has multiple trusts policies they need to support? There may be a company wide policy, and a department specific policy. Or, there may be an industry policy and a company specific policy. When additive, these are easy. When overlapping, how do we define the resolution of conflicting deny/accept policies?
>  
> [CW] Each of these polices describing what is fit for internal use may require proof of origin, integrity, etc. before the ACME Rockets’ signature is applied. A goal of the spec I referenced is representation of trust anchors along with constraints on usage. These constraints would apply to CAs and end entities, if any, and be used by relying parties. In this case, the component that applies the ACME signature would be a relying party. ACME Rockets doesn’t get to choose what key Wabbit Networks used to sign something, but can enforce constraints on the usage of public keys to limit damage if the corresponding private key is ever stolen (so that they don’t consume a net-monitor:v1 that purports to be from Wabbit Networks but was signed by Coyote, Inc.). Expressing/enforcing constraints is the hard part. The spec is loosely based on the FIDO metadata syntax, where authenticator values provide a clean target. At present it uses identifiers, claims, etc. from various specs related to the RATS working group, but is a work in progress.
>  
>  
> From: Carl Wallace <carl@redhoundsoftware.com <mailto:carl@redhoundsoftware.com>> 
> Sent: Friday, August 12, 2022 3:55 AM
> To: Steve Lasker <Steve.Lasker@microsoft.com <mailto:Steve.Lasker@microsoft.com>>; dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>; Orie Steele <orie@transmute.industries <mailto:orie@transmute.industries>>
> Cc: scitt@ietf.org <mailto:scitt@ietf.org>; Steve Lasker <Steve.Lasker@microsoft.com <mailto:Steve.Lasker@microsoft.com>>
> Subject: Re: [SCITT] [EXT]Re: Endor: A SCITT PoC for W3C Verifiable Credentials
>  
> Inline…
>  
> From: Steve Lasker <Steve.Lasker@microsoft.com <mailto:Steve.Lasker@microsoft.com>>
> Date: Thursday, August 11, 2022 at 7:20 PM
> To: "dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>" <dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>>, 'Carl Wallace' <carl@redhoundsoftware.com <mailto:carl@redhoundsoftware.com>>, Orie Steele <orie@transmute.industries <mailto:orie@transmute.industries>>
> Cc: "scitt@ietf.org <mailto:scitt@ietf.org>" <scitt@ietf.org <mailto:scitt@ietf.org>>, 'Steve Lasker' <Steve.Lasker=40microsoft.com@dmarc.ietf.org <mailto:Steve.Lasker=40microsoft.com@dmarc.ietf.org>>
> Subject: RE: [SCITT] [EXT]Re: Endor: A SCITT PoC for W3C Verifiable Credentials
>  
> Hi Carl, you bring up a great point that I should have clarified.
> There roots of trust should be a collection. 
>  
> [CW] My point was more that even where there is a collection and it is possible to (tightly) bound the scope of a trust anchor or any public key then we should. The code signing example has cropped up here fairly often (i.e., why should my code signing key be accepted as fit to verify a signature on some other company’s code). FIDO attestation roots suggest that at least in some cases per-company TAs/CAs are the norm. TAs/CAs could be constrained to codify that practice.
>  
> You may choose to have a “public/vertical” trust policy, and an internal team “trust policy”.
> We’ll need a means to correlate the multiples, as how do they merge.
>  
> [CW] I’m not following why we would merge collections. Selecting a collection for use seems more likely.
>  
> Dick – yup. It’s interesting to think about how a company stamps their security stamp, and how it relates to the sources they allow in.
>  
> From: SCITT <scitt-bounces@ietf.org <mailto:scitt-bounces@ietf.org>> On Behalf Of Dick Brooks
> Sent: Thursday, August 11, 2022 6:10 AM
> To: 'Carl Wallace' <carl@redhoundsoftware.com <mailto:carl@redhoundsoftware.com>>; Orie Steele <orie@transmute.industries <mailto:orie@transmute.industries>>; Steve Lasker <Steve.Lasker@microsoft.com <mailto:Steve.Lasker@microsoft.com>>
> Cc: scitt@ietf.org <mailto:scitt@ietf.org>; 'Steve Lasker' <Steve.Lasker=40microsoft.com@dmarc.ietf.org <mailto:Steve.Lasker=40microsoft.com@dmarc.ietf.org>>
> Subject: Re: [SCITT] [EXT]Re: Endor: A SCITT PoC for W3C Verifiable Credentials
>  
> Just like other entities in the sw supply chain, the entity providing the root of trust can impact the trustworthiness score of software.
>  
> Thanks,
>  
> Dick Brooks
> <image006.png>  <image007.png>
> Active Member of the CISA Critical Manufacturing Sector, 
> Sector Coordinating Council – A Public-Private Partnership
>  
> Never trust software, always verify and report! <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Freliableenergyanalytics.com%2Fproducts&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885362159%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=tPF8XgTE5JuysNvZ1JbKANGDn2fsopow0LyOMwTYoWE%3D&reserved=0> ™
> http://www.reliableenergyanalytics.com <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.reliableenergyanalytics.com%2F&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885362159%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=doXFEcZmGr0vcZfSnxUudaB%2BDMOfFDyh4wlV7JtkbXg%3D&reserved=0>
> Email: dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>
> Tel: +1 978-696-1788
>  
> From: Carl Wallace <carl@redhoundsoftware.com <mailto:carl@redhoundsoftware.com>> 
> Sent: Thursday, August 11, 2022 7:22 AM
> To: Orie Steele <orie@transmute.industries <mailto:orie@transmute.industries>>; Steve Lasker <Steve.Lasker@microsoft.com <mailto:Steve.Lasker@microsoft.com>>
> Cc: scitt@ietf.org <mailto:scitt@ietf.org>; Steve Lasker <Steve.Lasker=40microsoft.com@dmarc.ietf.org <mailto:Steve.Lasker=40microsoft.com@dmarc.ietf.org>>; dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>
> Subject: Re: [SCITT] [EXT]Re: Endor: A SCITT PoC for W3C Verifiable Credentials
>  
> A single “trust store” may or may not suffice, but we likely want to put some fences around each trust anchor to limit what the trust anchor may be used to verify.
>  
> The FIDO metadata alliance has method of organizing trust anchors based on authenticator type: https://fidoalliance.org/specs/mds/fido-metadata-statement-v3.0-ps-20210518.html <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Ffidoalliance.org%2Fspecs%2Fmds%2Ffido-metadata-statement-v3.0-ps-20210518.html&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885362159%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Ql3P%2Fw4YgjuOBMxOocirGmwK%2F3uCUbjjUNDSjDulWyQ%3D&reserved=0>.
>  
> I briefed this new spec to the RATS working group last month: https://datatracker.ietf.org/doc/html/draft-wallace-rats-concise-ta-stores-00 <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-wallace-rats-concise-ta-stores-00&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885362159%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=3W7bzUGQDFeqIwbl6WxnRzNqo2AFuPpEFOs3ev%2FOgzg%3D&reserved=0>. There’s a fork of the Veraison project’s Corim repo with support for the -00 draft added here: https://github.com/carl-wallace/corim <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fcarl-wallace%2Fcorim&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885362159%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=lg4yz1OYe4GXDw5jGikXbLXRljxpwPwPVyu0o4OuLKs%3D&reserved=0>. I’d imagine the environment and constraints parts move a bit still, but the rough idea may be what you are getting at below.
>  
>  
> From: SCITT <scitt-bounces@ietf.org <mailto:scitt-bounces@ietf.org>> on behalf of Orie Steele <orie@transmute.industries <mailto:orie@transmute.industries>>
> Date: Wednesday, August 10, 2022 at 2:30 PM
> To: Steve Lasker <Steve.Lasker@microsoft.com <mailto:Steve.Lasker@microsoft.com>>
> Cc: "scitt@ietf.org <mailto:scitt@ietf.org>" <scitt@ietf.org <mailto:scitt@ietf.org>>, Steve Lasker <Steve.Lasker=40microsoft.com@dmarc.ietf.org <mailto:Steve.Lasker=40microsoft.com@dmarc.ietf.org>>, "dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>" <dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>>
> Subject: Re: [SCITT] [EXT]Re: Endor: A SCITT PoC for W3C Verifiable Credentials
>  
> > This just points to the value of having personal, company, industry policy based trust stores
> 
> +1 to this, here are a few examples of how groups have formed their own trust systems:
> 
> - https://www.iata.org/en/pressroom/pr/2020-12-16-01/ <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.iata.org%2Fen%2Fpressroom%2Fpr%2F2020-12-16-01%2F&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885362159%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=sw7t1Bdfm%2B7nvE6%2Bl8Vc2wR1bLa7OhsttIKjyUDiX3A%3D&reserved=0> (aviation / travel)
> - https://vci.org/issuers <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fvci.org%2Fissuers&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885362159%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=JsVVzbbUlwe7ndd6xZLm8jdLFdyzYBSgG%2Biie8xySjk%3D&reserved=0> (healthcare)
> - https://support.apple.com/guide/keychain-access/what-is-keychain-access-kyca1083/mac <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsupport.apple.com%2Fguide%2Fkeychain-access%2Fwhat-is-keychain-access-kyca1083%2Fmac&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885362159%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=52PjlJal8dAEwGwSCuBYbP7SzFzLG1wzDppW%2BM3MLmE%3D&reserved=0> (personal)
> 
> You can imagine scenarios where a more limited set of issuers  might be required, or cases where you really want to be very open.
> 
> Regards,
> 
> OS
>  
> On Wed, Aug 10, 2022 at 1:21 PM Steve Lasker <Steve.Lasker@microsoft.com <mailto:Steve.Lasker@microsoft.com>> wrote:
> It’s an interesting example of whether a single root trust store is the best solution.
> Just because the browser trusts a root certificate, doesn’t mean it’s something we individually, or as a company believe is appropriate. We’ll just leave the specifics for obvious conclusion. 
> This just points to the value of having personal, company, industry policy based trust stores
>  
> From: SCITT <scitt-bounces@ietf.org <mailto:scitt-bounces@ietf.org>> On Behalf Of Dick Brooks
> Sent: Wednesday, August 3, 2022 11:26 AM
> To: 'Hart, Charlie' <charlie.hart@hal.hitachi.com <mailto:charlie.hart@hal.hitachi.com>>; Orie Steele <orie@transmute.industries <mailto:orie@transmute.industries>>
> Cc: 'Steve Lasker' <Steve.Lasker=40microsoft.com@dmarc.ietf.org <mailto:40microsoft.com@dmarc.ietf.org>>; scitt@ietf.org <mailto:scitt@ietf.org>
> Subject: Re: [SCITT] [EXT]Re: Endor: A SCITT PoC for W3C Verifiable Credentials
>  
> That’s correct, Charlie. OATI’s root cert is not included in the browser trusted certificate store.
>  
> I’m not sure why they chose to do this.
>  
> Thanks,
>  
> Dick Brooks
> <image008.png>  <image007.png>
> Active Member of the CISA Critical Manufacturing Sector,
> Sector Coordinating Council – A Public-Private Partnership
>  
> Never trust software, always verify and report! <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Freliableenergyanalytics.com%2Fproducts&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885362159%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=tPF8XgTE5JuysNvZ1JbKANGDn2fsopow0LyOMwTYoWE%3D&reserved=0> ™
> http://www.reliableenergyanalytics.com <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.reliableenergyanalytics.com%2F&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885362159%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=doXFEcZmGr0vcZfSnxUudaB%2BDMOfFDyh4wlV7JtkbXg%3D&reserved=0>
> Email: dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>
> Tel: +1 978-696-1788
>  
> From: Hart, Charlie <charlie.hart@hal.hitachi.com <mailto:charlie.hart@hal.hitachi.com>> 
> Sent: Wednesday, August 3, 2022 12:00 PM
> To: 'Orie Steele' <orie@transmute.industries <mailto:orie@transmute.industries>>; dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>
> Cc: 'Steve Lasker' <Steve.Lasker=40microsoft.com@dmarc.ietf.org <mailto:Steve.Lasker=40microsoft.com@dmarc.ietf.org>>; scitt@ietf.org <mailto:scitt@ietf.org>
> Subject: Re: [SCITT] [EXT]Re: Endor: A SCITT PoC for W3C Verifiable Credentials
>  
> (Side comment: I see that OATI is not a recognized root certificate authority by Mozilla or Apple - didn't check others - so the website is therefore inaccessible without relaxing security.)
>  
> From: SCITT <scitt-bounces@ietf.org <mailto:scitt-bounces@ietf.org>> on behalf of Hart, Charlie <charlie.hart@hal.hitachi.com <mailto:charlie.hart@hal.hitachi.com>>
> Sent: Wednesday, August 3, 2022 11:48 AM
> To: 'Orie Steele' <orie@transmute.industries <mailto:orie@transmute.industries>>; dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com> <dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>>
> Cc: 'Steve Lasker' <Steve.Lasker=40microsoft.com@dmarc.ietf.org <mailto:Steve.Lasker=40microsoft.com@dmarc.ietf.org>>; scitt@ietf.org <mailto:scitt@ietf.org> <scitt@ietf.org <mailto:scitt@ietf.org>>
> Subject: Re: [SCITT] [EXT]Re: Endor: A SCITT PoC for W3C Verifiable Credentials
>  
> Thanks Dick. That is really helpful for SCITT a lot of related projects I am working on.
>  
> Charlie
> From: SCITT <scitt-bounces@ietf.org <mailto:scitt-bounces@ietf.org>> on behalf of Dick Brooks <dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>>
> Sent: Wednesday, August 3, 2022 9:26 AM
> To: 'Orie Steele' <orie@transmute.industries <mailto:orie@transmute.industries>>
> Cc: 'Steve Lasker' <Steve.Lasker=40microsoft.com@dmarc.ietf.org <mailto:Steve.Lasker=40microsoft.com@dmarc.ietf.org>>; scitt@ietf.org <mailto:scitt@ietf.org> <scitt@ietf.org <mailto:scitt@ietf.org>>
> Subject: [EXT]Re: [SCITT] Endor: A SCITT PoC for W3C Verifiable Credentials
>  
> Orie,
> 
>  
> 
> Here is a high-level overview of the authentication mechanism and tracking used today for OASIS, inter-tie electricity scheduling.
> 
>  
> 
> Everything starts with the NAESB registry (EIR);https://www.naesb.org/pdf4/webregistry_mo_registration_quick_ref_guide_v1.0_0417.pdf <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecure-web.cisco.com%2F1IukwuhEQqregcVfBu_YTf7qloyu0S9CLEMvuw998GuhDfEFcipDth2Xtizyt11QWJE_rg9tKWNdFy9sR6AYzFs5C9RVZkYIdTyO90iI560dk7KjlRPsssiji4ni2uFgQoviKwbEitz9W0A-Jkx8qlZ-bf02dT2GpXl7-qqNgMCReV-n9bPYr7-gF7wRDuDdEpNTctYLkQFh_ODy3F4KcLc2yzJA66rSl-AObqSJo6LSNwG5QHs27-jxMPvsyvzy25FLEf6Q2NCVCA80ajyeRx-DLlAeVOtx8sKKHCAdqS60vvgk6XONNeacK9KVifmF7%2Fhttps%253A%252F%252Fwww.naesb.org%252Fpdf4%252Fwebregistry_mo_registration_quick_ref_guide_v1.0_0417.pdf&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885362159%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=CrTs4xAFl7%2FpZo8Gh5LF2ZnqYQSiBEEmXKIHvMmkSLE%3D&reserved=0>
>  
> 
> Entities involved in inter-tie electricity transactions must register with NAESB’s EIR, see link above.
> 
> The registration process requires a party to obtain a NAESB compliant X.509 certificate from an accredited certificate authority (ACA);https://www.naesb.org/pdf4/ac_authorities_2022.pdf <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecure-web.cisco.com%2F1T_py857nSLdfkwTRZ1F7IUeOLa0Mr0av8bfeuUJwVfOrnlR9B8EzOzxv92Uz4iu2yhDeR4WKL_eKK39aC0HZNHbI0L6S2ynYyf3MIqoWrhcKic931Qc8ha00DiNeKcev3mIQGWSdmm3oQWFZZeYhZ_XBpcojw3HL66SqprENJXYRuXx_69m7-vIbXr6m_muJ25A0-WOODvl0ZvSKLB5bCCNQHy8CETUnFlhi7KK4XlPGw6ngc0NPELIFd66qeSsonDSqajtS6_XsVDeQZ9afWewRkWRR2CS3RPxKELdvgtWbTLdNUMEo_OVauUoZUAaf%2Fhttps%253A%252F%252Fwww.naesb.org%252Fpdf4%252Fac_authorities_2022.pdf&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885362159%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=u3j%2BB8UVPy%2Bl8pGQ22ohhznZmaw0eMC9w1qqETEsUck%3D&reserved=0>
>  
> 
> Entities use their digital certificates for identification in OASIS; https://www.naesbwry.oati.com/NAESBWRY/sys-index.wml <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecure-web.cisco.com%2F1K2p4qEguxjMHN9-wdAstRzAre5VeA0Zed0mvgfndElWXB3ORaiJPQc8AT7JJNrTMjapfMno_fFQCf0Y62gyPgnjQbEmdVMFYieaur2q043F0tN564aUJcAdmTBs4wbQV9V3zBPE-_4E3LKMveTRd4EEA3R0FVZKKh4vLBs4hzSu8wqJmm85OMK7l0hlniB0BYAgK4rRAKxGyo9m2gQbGh64ogBMsxFwFgbsiArp0Y6fdpXW0-RGp2kcNruYE4OtklUzkSHLHYNwG_4xj3QZVT0CcrM1parwb_zHxkQwcXBjyXQwqawaXGq5azf6Ymysk%2Fhttps%253A%252F%252Fwww.naesbwry.oati.com%252FNAESBWRY%252Fsys-index.wml&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885362159%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=WGAxhWffQWszSIXbB3%2FepwwtPIRHkFPQmCSfTPFMEyo%3D&reserved=0>
>  
> 
> Inter-tie transactions are scheduled and tracked, using an E-TAG; https://en.wikipedia.org/wiki/NERC_Tag <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecure-web.cisco.com%2F1jg0PAl4xaAUqdpMj0XlwOYUgtyWJ8AEDByMI06i_FhGx7hBsVedp3De0cfsLDJrOWQk0OpLsHA-LZhek33mGBHnd1yGGQeO7gyBdmpJ8iJUh1jEMhZRFRhVJl0de4TxzOc-JCGbVPgYXa-8-oyvGUdvqCL1u0riyE5i35ZXxhgFrK5jS167ftdpGerze8DpFzv01q-lfBzQY3KxMikI7Aq599QaeahZrP9NaHPsunaoGrxrKD2WGOgLGAbiIogZvwqD6F-rbN2lIbrdeJZSVYw42P3L69rJ7XlgeaYjhgkVyPIJ1HC1whjq-NLkd-N0k%2Fhttps%253A%252F%252Fen.wikipedia.org%252Fwiki%252FNERC_Tag&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885362159%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=NvHvvjOEEB%2BfEqbQTcdyvNC7nXn0ekfExdnbqZJcFYk%3D&reserved=0>
>  
> 
> E-TAG’s are used to “connect the dots” and settle transactions that flow across Balancing Authroities.
> 
>  
> 
> Hope this helps.
> 
>  
> 
> Thanks,
> 
>  
> 
> Dick Brooks
> 
> <image008.png>  <image009.png>
> 
> Active Member of the CISA Critical Manufacturing Sector,
> 
> Sector Coordinating Council – A Public-Private Partnership
> 
>  
> 
> Never trust software, always verify and report! <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecure-web.cisco.com%2F1uy0clDWHgs8Om4IdyHuQzeSluoA8y61U3xQt6svGk4U9mgvOzG2j87xdGPNZwfL_6NeZLyvs2RtDXbQkJ-uy5FySOKYDraC9BCS46sTnuZZuNABtffYE50uYM3Wm6rGdSXPbIPyLIo1S9U5eKgRY62SvXzyvZStiEIy-g4zrHrqiwoZ4G2AfwJHqEMJbnR-Z8wwwLfANn8naHWq7IhHtieZojGBeisJx2LyDGehov7fBpcHgRQuNF-I-Idh5jB6CnEp4puLs01qMMVa-dVd11j8FHVTLpLcooV6gqqaabRENW_QqNKXvWegEhvV1Ow4u%2Fhttps%253A%252F%252Freliableenergyanalytics.com%252Fproducts&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885518391%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=dYilKWVhjSyuaMR1jgMnTEae6DDNeqn%2FE1pkgu8e%2FyU%3D&reserved=0> ™
> 
> http://www.reliableenergyanalytics.com <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsecure-web.cisco.com%2F1GaJ6l5AOFj6kxiBsMksWncl4vuiZ-pUmsWTXCh5o60xFuI9fXHdmN1JPI17VWNKtRAJykdCd5QOfGdmalJsZes_8gztMRvB-TvoYWb6WOAm14Usouk0VNKr4H31T9BT5T0w1SnOo7YCh-3jVo0P2A80_8zELCxl4Ngnjzy7TfQm5dwNV_k8eKhiVi6wwvKSudLmuLC5ig0f-n4vQfqd3zlefh4egnP1zyrbhWoo50tuzH3ceMULrOjDHUs9QVKGe8Q74awwW_o1b6KYbqOP7Z8sQrpBMjf_ClYd-WXRlq6NNIXX0Ncd2niPfogZIcU6Y%2Fhttp%253A%252F%252Fwww.reliableenergyanalytics.com%252F&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885518391%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=9jwJG0ciorieIfS5L02EuW%2FV%2FZHYKZO7lkoXCNIsybQ%3D&reserved=0>
> Email: dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>
> Tel: +1 978-696-1788
> 
>  
> 
> From: Orie Steele <orie@transmute.industries <mailto:orie@transmute.industries>> 
> Sent: Wednesday, August 3, 2022 9:09 AM
> To: dick <dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>>
> Cc: Steve Lasker <Steve.Lasker=40microsoft.com@dmarc.ietf.org <mailto:Steve.Lasker=40microsoft.com@dmarc.ietf.org>>; scitt@ietf.org <mailto:scitt@ietf.org>
> Subject: Re: [SCITT] Endor: A SCITT PoC for W3C Verifiable Credentials
> 
>  
> 
> Thanks! 
> 
>  
> 
> I am interested in applying Verifiable Credentials to energy use cases, even if we don't have customers in that sector today.
> 
> The calls are open (https://github.com/w3c-ccg/traceability-vocab#meetings <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecure-web.cisco.com%2F1HgK84MRR4bzXYAE7Niaeb8pYlkoyIfmiR0g4Dwj3DQJAh8OlSJW5p7TckF_9U5dHGeGuxJhuDgslYxAZNOsxcRUvIxstDWa3DOjtKeNjD-_Hps6IsgjIJjvkoJM6z6RXWAtxjfWtD3HV63XpkV_CEsvexRY-o5lFOUDFBoLvOST5pm3bbQJt3vdY1-67GIT9kXmrMYnnWWXvjuDcZkNODE1fmxIV1SYT7tQT9JveadGh5Z92HkOF2nqx92HaLeF53pxMJ1kYS8DiFQiewlQiLm9iNH3U9ZkX9n0d4hCRmD8Sp062hKxDB9F-2b8UFejS%2Fhttps%253A%252F%252Fgithub.com%252Fw3c-ccg%252Ftraceability-vocab%2523meetings&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885518391%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=3UEDJCQbiuJiHYWcBuDQ%2F5bFBSwqsgNAc%2B9o7kdofRY%3D&reserved=0>), but fair warning that most of the work happens on github async, and we usually just process issues and PRs during call time.
> 
> There are also aspects of Verifiable Credentials that I believe are relevant to the structure of endorsements / receipts:
> 
> The concept of "evidence":
> 
> - https://www.w3.org/TR/vc-data-model/#evidence <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecure-web.cisco.com%2F1q-6jNVM6JiTVpXBQDNrSw3REGqFIliEx86xQ3m1hKtfX38eVvCRSGYTej4K2SK8mdFcn2JqBZgNoMPS_rcXVBpyF1l5PmPOoFcCN-jmLI5CobgwDRSgnNTCovBIYUYq-zsaSmiiEAjGR8kgswrCi8csy-ZzBotSGM-M-GgM63-EeON2WUp7tplgZcM0drfvbvSkPmJNyhQ7IVz_JWZxPH45UgBXDwg3rEsIvPQjU2jV8dtlLOSr9PG4zRhRFcn9AsvFV6OrKVwmbgHSCHZuRW-k3T397qO__A7xJXOWprvooFuCc9y3ROkMuPUf12DNw%2Fhttps%253A%252F%252Fwww.w3.org%252FTR%252Fvc-data-model%252F%2523evidence&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885518391%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Dei%2B728w2cBRINb9ZxKZOmkf%2Fu5eRm1Tih7MOmPTC7M%3D&reserved=0>
> - https://datatracker.ietf.org/doc/html/draft-ietf-cose-countersign#section-3.1 <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecure-web.cisco.com%2F13CILjI0celZHQgVsa-DDsoLq4Y6By6DHs7W3LY0H0AaoPvolfKPwURAqZMWPsqbcYMf_kWUKJ-sA8NLPu8wziluBz0l68B1CFniaOfUMqbMnF6C6XI8csVpayR5nSduP0DzdtYVrex3bRpGSYyBCgbFgdA9HbqgX48TPfCCsHHqaKMfCgJpqP1qqkn_Rvw8fRnwCncrbvhrPVrZR2672B85djLFYzQp6QkfNZLX2m7CyYa7EPkxXYtqpqrgKQ86Yl61tsyZjFCIlMY3qaHk_-T7iJ8rYjvtEwV0uGSDPKFXIQ-beS1aVt3d7utZHCYYa%2Fhttps%253A%252F%252Fdatatracker.ietf.org%252Fdoc%252Fhtml%252Fdraft-ietf-cose-countersign%2523section-3.1&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885518391%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=KPJ7mIvx7XcGsFjo25Iz9w8CtlcxUpH%2B18UQ%2Fbnmm3c%3D&reserved=0>
> - https://datatracker.ietf.org/doc/html/rfc4998 <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecure-web.cisco.com%2F17DAGq2foFEYXkhjzWI_n3yyo-dU8HMigJwlon4x4SGlq2nwnPypo_SZZqn_HVrT0rymuTwcEF4muUKWKqsOGLkvOVa-LFd_al2zZ_lLftgtmhzFQhRFS7caOQJT0nf29VQs3woHnI7EoIfq1qF_87Py293jXAOIKL085OwcNuJbugCi46HG7Aoa0iPHiyavETuibYIlyB9E0dX9ck-eC39YMnZLGZAbf_U_zNKqeI-AYJbaKiKSYOMap89Xfp9wsrscC0zBwrQyJbQeJeX0W6bmWhWAyUuBgeHltrwzsA_eV6OT02qMLpg525iRIanpK%2Fhttps%253A%252F%252Fdatatracker.ietf.org%252Fdoc%252Fhtml%252Frfc4998&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885518391%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=Rq50glwrPmFmCJZ7e8xJFr7LC%2FLJgXnBeSVK9YgmDBU%3D&reserved=0>
>  
> 
> As one example.
> 
> I am hopeful that the next version of the Verifiable Credentials specification can point more directly to IETF RFCs to make its arguments, 
> even if the json data model can't be updated to support CBOR / COSE as a first class citizen this round.
> Perhaps the next charter for that WG might support this better, if we pave the way with examples.
> 
> Regards,
> 
> OS
> 
>  
> 
> On Wed, Aug 3, 2022, 7:54 AM Dick Brooks <dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>> wrote:
> 
> I agree. This paper by Orie, Michael, Brian and Mahmoud is very useful as guide for terminology and semantics.
> 
>  
> 
> I can provide the authors with a description of how we track electricity transactions for inter-tie scheduling, called OASIS a NAESB standard, if interested.
> 
>  
> 
> Thanks,
> 
>  
> 
> Dick Brooks
> 
>  
> 
> Active Member of the CISA Critical Manufacturing Sector,
> 
> Sector Coordinating Council – A Public-Private Partnership
> 
>  
> 
> Never trust software, always verify and report! <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecure-web.cisco.com%2F1uy0clDWHgs8Om4IdyHuQzeSluoA8y61U3xQt6svGk4U9mgvOzG2j87xdGPNZwfL_6NeZLyvs2RtDXbQkJ-uy5FySOKYDraC9BCS46sTnuZZuNABtffYE50uYM3Wm6rGdSXPbIPyLIo1S9U5eKgRY62SvXzyvZStiEIy-g4zrHrqiwoZ4G2AfwJHqEMJbnR-Z8wwwLfANn8naHWq7IhHtieZojGBeisJx2LyDGehov7fBpcHgRQuNF-I-Idh5jB6CnEp4puLs01qMMVa-dVd11j8FHVTLpLcooV6gqqaabRENW_QqNKXvWegEhvV1Ow4u%2Fhttps%253A%252F%252Freliableenergyanalytics.com%252Fproducts&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885518391%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=dYilKWVhjSyuaMR1jgMnTEae6DDNeqn%2FE1pkgu8e%2FyU%3D&reserved=0> ™
> 
> http://www.reliableenergyanalytics.com <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsecure-web.cisco.com%2F1GaJ6l5AOFj6kxiBsMksWncl4vuiZ-pUmsWTXCh5o60xFuI9fXHdmN1JPI17VWNKtRAJykdCd5QOfGdmalJsZes_8gztMRvB-TvoYWb6WOAm14Usouk0VNKr4H31T9BT5T0w1SnOo7YCh-3jVo0P2A80_8zELCxl4Ngnjzy7TfQm5dwNV_k8eKhiVi6wwvKSudLmuLC5ig0f-n4vQfqd3zlefh4egnP1zyrbhWoo50tuzH3ceMULrOjDHUs9QVKGe8Q74awwW_o1b6KYbqOP7Z8sQrpBMjf_ClYd-WXRlq6NNIXX0Ncd2niPfogZIcU6Y%2Fhttp%253A%252F%252Fwww.reliableenergyanalytics.com%252F&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885518391%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=9jwJG0ciorieIfS5L02EuW%2FV%2FZHYKZO7lkoXCNIsybQ%3D&reserved=0>
> Email: dick@reliableenergyanalytics.com <mailto:dick@reliableenergyanalytics.com>
> Tel: +1 978-696-1788
> 
>  
> 
> From: SCITT <scitt-bounces@ietf.org <mailto:scitt-bounces@ietf.org>> On Behalf Of Steve Lasker
> Sent: Tuesday, August 2, 2022 8:21 PM
> To: Orie Steele <orie@transmute.industries <mailto:orie@transmute.industries>>; scitt@ietf.org <mailto:scitt@ietf.org>
> Subject: Re: [SCITT] Endor: A SCITT PoC for W3C Verifiable Credentials
> 
>  
> 
> Very cool, Orie. 
> 
> Love the sandbox experiments
> 
>  
> 
>  
> 
> From: SCITT <scitt-bounces@ietf.org <mailto:scitt-bounces@ietf.org>> On Behalf Of Orie Steele
> Sent: Saturday, July 30, 2022 2:08 PM
> To: scitt@ietf.org <mailto:scitt@ietf.org>
> Subject: [SCITT] Endor: A SCITT PoC for W3C Verifiable Credentials
> 
>  
> 
> I made this today:
> 
> https://github.com/OR13/endor <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecure-web.cisco.com%2F1JdHGvnoZNb-fsV-unMzNkw21OKT7rRYo5H60Wa4K-Q4p7fB8jPlLTjzltfaxYOFnI68iv9RdZu4eeZzCvslBoPZThRfqgjbkIpAc_QAmXII8wXvclTmJp1PwWBck7W8vUKCgPgTPKwAgR4azwJsBLeLGe7E_NyiTmvg20gtS7omF01B7xzwXNs2jk4HRv9cwHQUOknpcyXaDoXN69mDdag7A6KlfSI3EnnlDQtYrlaKovDQmzajAmTkxfuCfWTP_pf0IHh1ylWT3YFkVxRBNLDyDNrCvdIUdSvpseyxcBy2VV7YxaRLm7g0FGZCbhIv6%2Fhttps%253A%252F%252Fnam06.safelinks.protection.outlook.com%252F%253Furl%253Dhttps%25253A%25252F%25252Fgithub.com%25252FOR13%25252Fendor%2526data%253D05%25257C01%25257CSteve.Lasker%252540microsoft.com%25257C79cb3d326bec41bf51ac08da726fb0f1%25257C72f988bf86f141af91ab2d7cd011db47%25257C1%25257C0%25257C637948121310174010%25257CUnknown%25257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%25253D%25257C3000%25257C%25257C%25257C%2526sdata%253DGdRRD0aMpzOJQIcqCyhajcz2NXRZH4irlRR31FFausk%25253D%2526reserved%253D0&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885518391%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=DZTzAEgesf0YPZAtG8Bqk5pLtcK9TMy4nE%2F6F%2BuBjus%3D&reserved=0>
> 
> As it says in the readme, this is just a toy example I made up to experiment with.
> 
> The nice thing about endorsing W3C Verifiable Credentials is that they are already an abstraction that applies to "non software supply chain" use cases... 
> 
> For example, we model cyber physical supply chain flows using them:
> 
> https://w3id.org/eability <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecure-web.cisco.com%2F12vv3ms4fQAlyFEE4k1zPXuwNVQhbw5JZJG1gBL6pcqttkVpsiI3zrO00D8muCuDxuryJz9JNlTjNav5jhFZwmrDOzf2g002uvnOa4j5zplIUKqg9fIr9y-JZ4w5q4mXJXza6z62EHNy6BzBsjPIluYavv0fR109auX6z1titrQhnW1fmk_usfbPqwJgY780ZABU5QTV12sZSiHaInC4MzZokObYCrnulteZlYaIml9emeQtOkK5mYExh0HK13aas-6VpgxE3PbRyBO3h9W_wUt3BpoaWT0QrjMaAM3NSTsiDsayitR5Pm48JR4E_wr_U%2Fhttps%253A%252F%252Fw3id.org%252Feability&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885518391%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=yJjvx1CUgdnClwO8kIMsuAidsEZN7QqGNl6HyNBOqxw%3D&reserved=0>
> 
> There are a number of organizations looking at oil and gas, steel, ecommerce, and agriculture supply chains.
> 
> Often they will share some common trade documents such as Bills of Lading or Commercial Invoices.
> 
> These are examples of "SCITT Artifact Types" which you might expect to see across various distinct supply chain use cases.
> 
> However, as is the case with Oil and Gas needing to account for fluid dynamics, and software needing to account for compilers, build servers and various source files, there are cases where you may need to model components of a supply chain with Verifiable Credentials that are highly specific to the use case.
> 
> If you can tolerate modeling in RDF, W3C Verifiable Credentials come with a built in abstract data model that integrates well with existing industry ontologies such as:
> 
> - https://www.ebi.ac.uk/chebi/ <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecure-web.cisco.com%2F1xFJzJsWalPbOckWorQVNuB3cCxcqr_4Pnqdh8BSqQrkm5N_-bHyC7w5_vXmkyt3-yiVfIj2Taw61Ngm4aT3AjD2Qv9jcxLAp632sCb0f7Z5opQ1IopQYFh035H3GJnum5M15fE7-kYGBh8eU24y4DJKQAGfZ6-2bMGAFBVdqq-7OCluOKHpJ7klc1xO775JEUod25j8sSRq32VCH023VBaqj9QgsfC-48IxN6LcJbg6jK3GgYWuUW9etiMl5z6YA0zskfxChMC6yEEFi8jPu3jPIy1SKm5Zu3HDbk7_-aS_gzJ-Kg45rGJrtq0L6Yh9Y%2Fhttps%253A%252F%252Fnam06.safelinks.protection.outlook.com%252F%253Furl%253Dhttps%25253A%25252F%25252Fwww.ebi.ac.uk%25252Fchebi%25252F%2526data%253D05%25257C01%25257CSteve.Lasker%252540microsoft.com%25257C79cb3d326bec41bf51ac08da726fb0f1%25257C72f988bf86f141af91ab2d7cd011db47%25257C1%25257C0%25257C637948121310174010%25257CUnknown%25257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%25253D%25257C3000%25257C%25257C%25257C%2526sdata%253DbXykuDkWeLmveTLjWO5zepwu20MQ5H8LIcQJyCaKN%25252BM%25253D%2526reserved%253D0&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885518391%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=M0hOOrtk20cvAsVONR2Wbob24sDkHjxY8j0FKgVziuo%3D&reserved=0>
> - https://qudt.org/ <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fsecure-web.cisco.com%2F1wTZmUTRG0X-fSLt6dzZoQCNorRuSvOgI2Zkd9g1PT-Iict4ikGg0GMZvBAIgZsC1maaOAyMgHegWdFG3dXEcQrYKnrjpiOl7OWCtiRGcjVJC4W7PiyfkrkoEDMc-WVzXjqIc3RTjhCVEO2Hy1KcH5Xg8lqTshdNo9NGPllnHT63UctpLAAQ4N8tGBMfu3q7YUicxI0zcgap8yD60I8HL33SfI2MFnr2DphA42faHPK6e5mePI5N1MZuhmdt3ou2MvF4zqUj9xhZGwb3nRkquaaObQFWXt8G-nog2o8iwaQFLpUTsPJbOJlpOLnLalkAL%2Fhttps%253A%252F%252Fnam06.safelinks.protection.outlook.com%252F%253Furl%253Dhttps%25253A%25252F%25252Fqudt.org%25252F%2526data%253D05%25257C01%25257CSteve.Lasker%252540microsoft.com%25257C79cb3d326bec41bf51ac08da726fb0f1%25257C72f988bf86f141af91ab2d7cd011db47%25257C1%25257C0%25257C637948121310174010%25257CUnknown%25257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%25253D%25257C3000%25257C%25257C%25257C%2526sdata%253DQOs%25252F5MIMJSm%25252BkqzHSSxV6MtsA4mOIzanJ6Vwtpl4NO8%25253D%2526reserved%253D0&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885518391%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=NlitqFPWmcUAyZ73FWjMOhUB1PYJ7imzIv0shp7SnR8%3D&reserved=0>
> 
> My main complaint against W3C Verifiable Credentials is the limitation to JSON representations, if we could represent RDF in CBOR, we would have the best of both worlds with the main remaining disadvantage being the namespace overhead inherent in RDF.
> 
> If you drop that, you will likely need some registry or algorithm process for handling collisions and interoperability, but there are various solutions to those problems.
> 
> If you feel I butchered any of the concepts or terminology, feel free to yell at me here or on github issues, as I said, I made this today, it's not reflective of actual SCITT architecture, it was just to explore the space.
> 
> Regards,
> 
> OS
> 
> 
>  
> 
> -- 
> 
> ORIE STEELE
> 
> Chief Technical Officer
> 
> www.transmute.industries <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fsecure-web.cisco.com%2F1Pqu2CqEyHo4isckQh51PNnQ8tUbRhJ7fbWyn-w7XWT8mKjJG9jHB52pzDC91cVOUDvvB6yXP7TPyKL-6KQw4nyDVUvafmadZHo9d8Ch-lC1xIGYylhkgiUeEJlkJzb-8_bPpc3HM-numNyVUnz3wy-QWiv7Bwzc0EZvjlrk8l2zMTP7sgOAXQE64zUCay7yyWGYJm91CoHDytU3DDP8fEQdoS8GBRvo94T1w1wYmTEFjJWuq9_05ol76LbaYkHTQoZhRROFIusDfu9XNDv5Ofj1Xk0y_YmZkz6KS0Mx2eClGFuUIOo_FtTiX7i0x16EI%2Fhttp%253A%252F%252Fwww.transmute.industries&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885518391%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=2xwgXfM5ocGZewbNzrIsoD5NKdyX7jG1o1KxswqOtvQ%3D&reserved=0>
>  
> 
> 
>  
> -- 
> ORIE STEELE
> Chief Technical Officer
> www.transmute.industries <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.transmute.industries%2F&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885518391%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=ly8U9HHzn47GyRF5GCHuI%2B6oVWHZUY8veXgK4KFH42c%3D&reserved=0>
>  
>  <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.transmute.industries%2F&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885675056%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=%2Fh2XFjoawy1FHft6hx74jVovMxlII2QoLmRJ0eoLQcY%3D&reserved=0>
> -- SCITT mailing list SCITT@ietf.org <mailto:SCITT@ietf.org> https://www.ietf.org/mailman/listinfo/scitt <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fscitt&data=05%7C01%7CSteve.Lasker%40microsoft.com%7C6b311c611f2543ec539d08da7f860c56%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637962511885675056%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=W5K%2BOBo0US0xFG1otbS4KF1YnXYgj%2FCm4zFdHCJKTOc%3D&reserved=0>-- 
> SCITT mailing list
> SCITT@ietf.org <mailto:SCITT@ietf.org>
> https://www.ietf.org/mailman/listinfo/scitt <https://www.ietf.org/mailman/listinfo/scitt>