Re: [Secdispatch] Request for session at IETF 113

Ira McDonald <blueroofmusic@gmail.com> Tue, 22 March 2022 14:15 UTC

Return-Path: <blueroofmusic@gmail.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 689EB3A1388; Tue, 22 Mar 2022 07:15:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level:
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uIx31za7Z-gN; Tue, 22 Mar 2022 07:15:28 -0700 (PDT)
Received: from mail-vs1-xe33.google.com (mail-vs1-xe33.google.com [IPv6:2607:f8b0:4864:20::e33]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 10D763A12D3; Tue, 22 Mar 2022 07:15:28 -0700 (PDT)
Received: by mail-vs1-xe33.google.com with SMTP id g21so19193464vsp.6; Tue, 22 Mar 2022 07:15:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=scZgkZn3ePZRfimdKKhX8qI857IN8s1yssxZra5Usw8=; b=PViipTk8QgHqxVUNBcO1xzov9f2FE1Xpc4uEGe1lsgc/bTCftCs9iiIjIxgiBRopMY 2pGhr9/RnLjJH8RP83/m6SNQ8DW7te8T3B9XRVUDAk4lROUqmGdX+gVnhK/ReqKFTtj/ ueJWSKPXSZg/w+79RQP96YwjOUKG3ASX+2iw32lu9EG0/cA7a6VG9baHEhGccQxDjfwb vK2OU55d4iCWmxvJdtY4FgyXqGQOOZyQVFgwRridIBU3VkjeUXW3PaS/Xa0iPRiewDcK p+lLze0E6H2IfudPgKw4jtNplNh6aNmb2mV6CEmgrOasplh2JnCXysFXxi2267UzRW6p Ovjg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=scZgkZn3ePZRfimdKKhX8qI857IN8s1yssxZra5Usw8=; b=5ehF99jor4NP5o0xWQe3X4pZQh51V4JUe7Nelz4jujjVawDXnF63Yzm3J66EJTZXPN varJwL+Tz23Uv2MfDZfNxeMNL7LRiU0mau7XEVc4Hiz33INcjvBDGfCo5wJwFcSJSkMr /rlKAep3yNwzZ1oO9B82I8pm2M/oj1xyzzAgJmvmRFKZwT/cx/QdE1icvtly3irdGf0W 5hccxpUXjCGZSUGzkaS4L4ijtPliJIkSEbcMkXI0eMvsZsc36fZngSO+3frX1XSe7FbF Sg2XhATmHsBhwBwS5mUMpep2lQn51ez2CysanLIkmegbYbyR9/S5sZ9HsKqjFJharhRt 5dFw==
X-Gm-Message-State: AOAM532BUtOKgfAXWRh4q1p1yumo48kmfFxbbD06w3Cn+CRvpbbe47rV anKs29/y0RKf4PA2jZANs7y5FRjY6TZI70+Mi6o=
X-Google-Smtp-Source: ABdhPJwLQ5v3Swog78KbYDsXOk2WBLMox7cez/3T7nVKMKjwY9K0NUuSqv1I+HUKEIng51Rh3NoViPatWLH5XZ/NWeM=
X-Received: by 2002:a05:6102:c0f:b0:324:ce94:67eb with SMTP id x15-20020a0561020c0f00b00324ce9467ebmr8235084vss.49.1647958526480; Tue, 22 Mar 2022 07:15:26 -0700 (PDT)
MIME-Version: 1.0
References: <164583895227.24617.1939040203283436909@ietfa.amsl.com> <5b97a678-eba1-09c3-7e70-c71dd98db8a9@sit.fraunhofer.de> <etPan.6239ce83.43b93aee.b2ea@cert.org>
In-Reply-To: <etPan.6239ce83.43b93aee.b2ea@cert.org>
From: Ira McDonald <blueroofmusic@gmail.com>
Date: Tue, 22 Mar 2022 10:15:06 -0400
Message-ID: <CAN40gSs85k80krh-cGNN4RCLGmXqWVS=dxLq=u8cPa0S=R+9zw@mail.gmail.com>
To: Chris Inacio <inacio@cert.org>, Ira McDonald <blueroofmusic@gmail.com>
Cc: "secdispatch@ietf.org" <secdispatch@ietf.org>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>, "scitt@ietf.org" <scitt@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000093563705dacf3e13"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/idlWuXhzqPRF24262bovwMrHNAs>
Subject: Re: [Secdispatch] Request for session at IETF 113
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2022 14:15:34 -0000

Hi,

Please note that ETSI SAI (Security of AI) has been explicitly addressing
these
issues of algorithm/model/data set integrity and attestation for a couple
of years,
has already published several excellent documents and is developing more.

My co-chair in TCG Trusted Mobility Solutions (Alec Brusilovsky,
InterDigital) is a
co-editor and rapporteur (liaison) to TCG from ETSI SAI.

https://www.etsi.org/committee/sai

Interested folks can send me a note (offlist).

Cheers,
- Ira

*Ira McDonald (Musician / Software Architect)*

*Chair - SAE Trust Anchors and Authentication TF*
*Co-Chair - TCG Trusted Mobility Solutions WG*

*Co-Chair - TCG Metadata Access Protocol SG*








*Chair - Linux Foundation Open Printing WGSecretary - IEEE-ISTO Printer
Working GroupCo-Chair - IEEE-ISTO PWG Internet Printing Protocol WGIETF
Designated Expert - IPP & Printer MIBBlue Roof Music / High North
Inchttp://sites.google.com/site/blueroofmusic
<http://sites.google.com/site/blueroofmusic>http://sites.google.com/site/highnorthinc
<http://sites.google.com/site/highnorthinc>mailto: blueroofmusic@gmail.com
<blueroofmusic@gmail.com>(permanent) PO Box 221  Grand Marais, MI 49839
906-494-2434*


On Tue, Mar 22, 2022 at 9:30 AM Chris Inacio <inacio@cert.org> wrote:

> Henk,
>
> Just a quick comment before the start of the actual SECDISPATCH session:
> signing an ML algorithm isn’t all that interesting, _maybe_ signing the
> model is a bit more interesting.  What’s really interesting is the data
> used to create the model, and that is where a lot of work in adversarial AI
> happens.  But they don’t call it big data for nothing, and I’m not sure the
> logistics of transparent (big) data, or the privacy impact of that are
> reasonable.
>
> So maybe a different example may be appropriate.
>
>
> --
> Chris Inacio
> inacio@cert.org
>
> -----Original Message-----
> From: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
> Date: March 9, 2022 at 5:40:11 PM
> To: secdispatch@ietf.org <secdispatch@ietf.org>, scitt@ietf.org <
> scitt@ietf.org>
> Subject:  [Secdispatch] Request for session at IETF 113
>
> > Hi secdispatch,
> > (hi scitt),
> >
> > emerging work on the topic of Supply Chain Integrity, Transparency,
> > Trust has taken some shape recently.
> >
> > The work combines existing IETF building blocks to facilitate useful
> > Internet-based support of global supply chain interoperability.
> >
> > Current contributions focus on the definition of Transparency Services
> > based on Internet technology (using CBOR/CDDL/COSE) to achieve
> > unambiguous, scaleable, and resilient integration with common devops and
> > secops requirements.
> >
> > I'd like to request secdispatch agenda time for two documents that are
> > currently submitted:
> > > https://datatracker.ietf.org/doc/draft-birkholz-scitt-architecture/
> >
> > and
> >
> > > https://datatracker.ietf.org/doc/draft-birkholz-scitt-receipts/
> >
> > These two contributions are in -00 state. Yet, they already address
> > essential requirements, such as, air-gapped validation when being
> > offline, integration of remote attestation, efficient and crypto-agile
> > signing prescriptions for out-of-the-box interoperability, and - in
> > essence - long-long-term guarantees in support of various types of
> > supply chains requirements.
> >
> > We’d be happy to present this emerging work in secdispatch with the goal
> > of discussing whether it might fit into the IETF space and how to
> > progress it together.
> >
> > Viele Grüße,
> >
> > Henk
> >
> > On 26.02.22 02:29, "IETF Secretariat" wrote:
> > > Dear Mohit Sethi,
> > >
> > > The session(s) that you have requested have been scheduled.
> > > Below is the scheduled session information followed by
> > > the original request.
> > >
> > >
> > > secdispatch Session 1 (2:00 requested)
> > > Tuesday, 22 March 2022, Afternoon Session II 1430-1630
> > > Room Name: Grand Park Hall 3 size: 250
> > > ---------------------------------------------
> > >
> > >
> > > iCalendar:
> https://datatracker.ietf.org/meeting/113/sessions/secdispatch.ics
> > >
> > > Request Information:
> > >
> > >
> > > ---------------------------------------------------------
> > > Working Group Name: Security Dispatch
> > > Area Name: Security Area
> > > Session Requester: Mohit Sethi
> > >
> > >
> > > Number of Sessions: 1
> > > Length of Session(s):
> > > Number of Attendees: 200
> > > Conflicts to Avoid:
> > >
> > >
> > >
> > >
> > > People who must be present:
> > > Benjamin Kaduk
> > > Kathleen Moriarty
> > > Mohit Sethi
> > > Paul Wouters
> > > Richard Barnes
> > > Roman Danyliw
> > >
> > > Resources Requested:
> > >
> > > Special Requests:
> > > Please avoid conflict with any Security related BoF.
> > > ---------------------------------------------------------
> > >
> > >
> > > _______________________________________________
> > > Secdispatch mailing list
> > > Secdispatch@ietf.org
> > > https://www.ietf.org/mailman/listinfo/secdispatch
> >
> > _______________________________________________
> > Secdispatch mailing list
> > Secdispatch@ietf.org
> > https://www.ietf.org/mailman/listinfo/secdispatch
> >
> _______________________________________________
> Secdispatch mailing list
> Secdispatch@ietf.org
> https://www.ietf.org/mailman/listinfo/secdispatch
>