Re: [Secdispatch] Request for session at IETF 113

Chris Inacio <inacio@cert.org> Tue, 22 March 2022 13:27 UTC

Return-Path: <inacio@cert.org>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F0A0E3A1399; Tue, 22 Mar 2022 06:27:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level:
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=seicmu.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uK5Tx5Limd7M; Tue, 22 Mar 2022 06:27:01 -0700 (PDT)
Received: from USG02-BN3-obe.outbound.protection.office365.us (mail-bn3usg02on0134.outbound.protection.office365.us [23.103.208.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 711D43A1423; Tue, 22 Mar 2022 06:26:31 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector5401; d=microsoft.com; cv=none; b=dLcDPMlaTwGN8x6glaSnNZ7xTDddF8t5a2ou8gbv1jyOGrcR7sPAtjMNpdrzAmYM882ojP80QMYpmgF0JTnLx819Z54BH+bQt9PDABOqbtHdEc6RgNeZtbxQdnYyt8cyaB1TBDY0s7tH4QNoIlzJQl0gAO9T1OOdqLbse0ZtWVN4GbxhlH1mNpG2otIeE6SK0C2L3cEZ42F5b9OwN+zbn5RfCULsLYcierBW0Ed7TZTP+99IlMz9bi7lnjZeaPaz5ypuLvyoX7ZlVs50OeW+6b2T//5KOCthYvFvcURRVzrpmq0aOe2yavCu2+MDS2IZj/RXlepY7X4JhoszmUcK9A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector5401; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=H9lKIctZzoKcVgoGSCXVduY7p1Yp6zZdqog/wSkvA9k=; b=l3vB9YIh0JBWdnpcQV7giZ20ipGIG8Zh832MyXf2RmaaIBa1Dj9XYyBFPVocRHXfd8EYUI/x2EHZfnHNAUGvn0cTUIBGnmxgLb2ancDzAMAibsFqwU5Erl75kzsyEm3SsNNdQV8irx1vaTGZFLmAsFxGcV6p47VjiiEFrQrvaVGD8odGqY/PoaclV74+70OxrDryAZybVAULcDlTLv8jynAbLacrzdKJgMfFGBLVIQEZu3P2pm+OnIY0WjXOJCbQm1TjJr4Z91kmCLu+/XYvGVI39J63sK9P2nxbN3JY96r+Uy/QErraSr4uLB7XyZ1WJ1UUZY3g7cwUahiZRei/Kw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cert.org; dmarc=pass action=none header.from=cert.org; dkim=pass header.d=cert.org; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=seicmu.onmicrosoft.com; s=selector1-seicmu-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=H9lKIctZzoKcVgoGSCXVduY7p1Yp6zZdqog/wSkvA9k=; b=JDGA6xgQVCA34vbliaCwpoHQ/5Eni+7XLq/0d5+H/aI/02P5AE6mv2T/xknFeDUeiDRR+sAchJvOCW9ORqKsev763dPBpoKJ7Axoz8DYC8DN6fyAibe0j7eTNjZNG4stADA/7Oo/gPd/k0bcsaN1LqSP8JAEPdZRfoN2iQLBfd4=
Received: from PH1P110MB1113.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:175::13) by PH1P110MB1539.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:18b::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.24; Tue, 22 Mar 2022 13:26:28 +0000
Received: from PH1P110MB1113.NAMP110.PROD.OUTLOOK.COM ([fe80::c5f4:c8f2:21db:48d7]) by PH1P110MB1113.NAMP110.PROD.OUTLOOK.COM ([fe80::c5f4:c8f2:21db:48d7%5]) with mapi id 15.20.5061.024; Tue, 22 Mar 2022 13:26:28 +0000
From: Chris Inacio <inacio@cert.org>
To: "secdispatch@ietf.org" <secdispatch@ietf.org>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>, "scitt@ietf.org" <scitt@ietf.org>
Thread-Topic: [Secdispatch] Request for session at IETF 113
Thread-Index: AQHYNAaiJ6edOPtaskuVlnXrwcl3xazLeMoA
Date: Tue, 22 Mar 2022 13:26:28 +0000
Message-ID: <etPan.6239ce83.43b93aee.b2ea@cert.org>
References: <164583895227.24617.1939040203283436909@ietfa.amsl.com> <5b97a678-eba1-09c3-7e70-c71dd98db8a9@sit.fraunhofer.de>
In-Reply-To: <5b97a678-eba1-09c3-7e70-c71dd98db8a9@sit.fraunhofer.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cert.org;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 76547828-af8a-48ad-5be4-08da0c079212
x-ms-traffictypediagnostic: PH1P110MB1539:EE_
x-microsoft-antispam-prvs: <PH1P110MB15398FFB3FE266AFDEE6A610AD179@PH1P110MB1539.NAMP110.PROD.OUTLOOK.COM>
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH1P110MB1113.NAMP110.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230001)(366004)(110136005)(966005)(508600001)(122000001)(6486002)(5660300002)(38100700002)(71200400001)(66476007)(66556008)(8936002)(2906002)(76116006)(64756008)(66446008)(66946007)(8676002)(66574015)(82960400001)(6506007)(53546011)(86362001)(38070700005)(36756003)(6512007)(83380400001)(2616005)(186003)(26005)(316002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 5L9HM9pfZnJD7e0XAdcNfpm/bT0BtzLYdvsvEtQgkfzbNKXdHTe8vCbfKfadTKOtMd79L7SCKCPA7CEiPOJ666hC5b5gc2I4AewQi45Q1pe78ksMSvjQTcpjNWO1bf18pd7yOq0RwMjWHMaukWDBDg==
Content-Type: text/plain; charset="utf-8"
Content-ID: <24C8A3BE7898694CAF98DED70721A912@NAMP110.PROD.OUTLOOK.COM>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: cert.org
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH1P110MB1113.NAMP110.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 76547828-af8a-48ad-5be4-08da0c079212
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Mar 2022 13:26:28.0390 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 95a9dce2-04f2-4043-995d-1ec3861911c6
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH1P110MB1539
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/NAk8mj-zk6yh6T6d5XAHlxBgjkw>
Subject: Re: [Secdispatch] Request for session at IETF 113
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2022 13:27:15 -0000

Henk,

Just a quick comment before the start of the actual SECDISPATCH session: signing an ML algorithm isn’t all that interesting, _maybe_ signing the model is a bit more interesting.  What’s really interesting is the data used to create the model, and that is where a lot of work in adversarial AI happens.  But they don’t call it big data for nothing, and I’m not sure the logistics of transparent (big) data, or the privacy impact of that are reasonable.

So maybe a different example may be appropriate.


--
Chris Inacio
inacio@cert.org

-----Original Message-----
From: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Date: March 9, 2022 at 5:40:11 PM
To: secdispatch@ietf.org <secdispatch@ietf.org>, scitt@ietf.org <scitt@ietf.org>
Subject:  [Secdispatch] Request for session at IETF 113

> Hi secdispatch,
> (hi scitt),
>  
> emerging work on the topic of Supply Chain Integrity, Transparency,
> Trust has taken some shape recently.
>  
> The work combines existing IETF building blocks to facilitate useful
> Internet-based support of global supply chain interoperability.
>  
> Current contributions focus on the definition of Transparency Services
> based on Internet technology (using CBOR/CDDL/COSE) to achieve
> unambiguous, scaleable, and resilient integration with common devops and
> secops requirements.
>  
> I'd like to request secdispatch agenda time for two documents that are
> currently submitted:
> > https://datatracker.ietf.org/doc/draft-birkholz-scitt-architecture/
>  
> and
>  
> > https://datatracker.ietf.org/doc/draft-birkholz-scitt-receipts/
>  
> These two contributions are in -00 state. Yet, they already address
> essential requirements, such as, air-gapped validation when being
> offline, integration of remote attestation, efficient and crypto-agile
> signing prescriptions for out-of-the-box interoperability, and - in
> essence - long-long-term guarantees in support of various types of
> supply chains requirements.
>  
> We’d be happy to present this emerging work in secdispatch with the goal
> of discussing whether it might fit into the IETF space and how to
> progress it together.
>  
> Viele Grüße,
>  
> Henk
>  
> On 26.02.22 02:29, "IETF Secretariat" wrote:
> > Dear Mohit Sethi,
> >
> > The session(s) that you have requested have been scheduled.
> > Below is the scheduled session information followed by
> > the original request.
> >
> >
> > secdispatch Session 1 (2:00 requested)
> > Tuesday, 22 March 2022, Afternoon Session II 1430-1630
> > Room Name: Grand Park Hall 3 size: 250
> > ---------------------------------------------
> >
> >
> > iCalendar: https://datatracker.ietf.org/meeting/113/sessions/secdispatch.ics  
> >
> > Request Information:
> >
> >
> > ---------------------------------------------------------
> > Working Group Name: Security Dispatch
> > Area Name: Security Area
> > Session Requester: Mohit Sethi
> >
> >
> > Number of Sessions: 1
> > Length of Session(s):
> > Number of Attendees: 200
> > Conflicts to Avoid:
> >
> >
> >
> >
> > People who must be present:
> > Benjamin Kaduk
> > Kathleen Moriarty
> > Mohit Sethi
> > Paul Wouters
> > Richard Barnes
> > Roman Danyliw
> >
> > Resources Requested:
> >
> > Special Requests:
> > Please avoid conflict with any Security related BoF.
> > ---------------------------------------------------------
> >
> >
> > _______________________________________________
> > Secdispatch mailing list
> > Secdispatch@ietf.org
> > https://www.ietf.org/mailman/listinfo/secdispatch
>  
> _______________________________________________
> Secdispatch mailing list
> Secdispatch@ietf.org
> https://www.ietf.org/mailman/listinfo/secdispatch
>