Re: [Secret] Secure Credential Transfer (secret) BOF Virtual Meeting: 2022-02-10

Francesca Palombini <francesca.palombini@ericsson.com> Tue, 01 March 2022 10:29 UTC

Return-Path: <francesca.palombini@ericsson.com>
X-Original-To: secret@ietfa.amsl.com
Delivered-To: secret@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6FA4A3A1855; Tue, 1 Mar 2022 02:29:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.11
X-Spam-Level:
X-Spam-Status: No, score=-7.11 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zDrAb45xvZPq; Tue, 1 Mar 2022 02:29:28 -0800 (PST)
Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on20604.outbound.protection.outlook.com [IPv6:2a01:111:f400:7e1a::604]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 194763A0B3D; Tue, 1 Mar 2022 02:29:27 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=fxyxXhcylWuwXqUzvPm0yqPtqtGql0fYM8DSG5mQZ9WYeHo3JIWYk3T7v4vxWpVuJxD8J2cckQgUF68f049wS6oY19Xv6I4J9qKGcH++JpN6PvTTK1VJ9eLikpJ2JGRWgLbNH1h2rEO6CPZMPjlHHytZYX51JncbVCcAGzObDaFf07/3+OA1aCFy2ERvYbylsRLSpQxBlo6zBIEEwRkPxX0vNy/UNnoEEmWsWbyg3iKug2DKSmjUsTGYYdNFob0Mhb1mj2Ye5HmPnPB2jJZH8b9f8a3MRwoQKlxYvaGqGT9RK+DdHq9YjEFTKy0M1GA/THBe2Ljv+Wkhu4kl+8ABHw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=NrJzDnynBSl2NVxSOqBxjzZSUDXp+Teo/gmmbpWDH98=; b=A/5kU5YlnwJdloVdK3FQO/0NttdyYli9hvOG4Qh68dWawLxSFNstcOsw4kPcVhjDmUftEVPOTDYeiVgwedlz7GF2wOgx+OtVSMv5PkKqnkcMjKThx2E9zJZRFxuvwEs43bn9aIKjuVXwB8DS9ruKPt0XPPiSx+A8hY5OvH8uIG3PFol1NPpZ21mGEsr6XUkbmTG0NPvgBcTHEmq61r2b5qqTezOry/IQQAdhe5xh/Y1+KfWgv64GKK0TEdQtXx7JFDgA/4a/oE6h7j8DIDMhG+9/IBqF0uixFmiMXVCKnn6KDOFxjyi7dV+pPhk6YiiPzwMnrM+uT1MLkwoQd97aog==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=ericsson.com; dmarc=pass action=none header.from=ericsson.com; dkim=pass header.d=ericsson.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NrJzDnynBSl2NVxSOqBxjzZSUDXp+Teo/gmmbpWDH98=; b=Gw4NiCFLyNrx3G6PD9dZA7HA/N16PTQp8ugYvNs1YZ/yVwt+VJ8DIr9tp5LGAO0chuowAX/IgB4UNAa0Ipx9mvIpH4h6RUrGFLfgHeYojfgwenlBbkXBDZ2ntxHzkypx8q3zoBw7AryzJyMNRre4G3XGdb8Wy58/MbqP7IpxDbw=
Received: from HE1PR07MB4217.eurprd07.prod.outlook.com (2603:10a6:7:96::33) by AM4PR07MB3284.eurprd07.prod.outlook.com (2603:10a6:205:5::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.9; Tue, 1 Mar 2022 10:29:22 +0000
Received: from HE1PR07MB4217.eurprd07.prod.outlook.com ([fe80::6d0c:b1c0:d332:6f33]) by HE1PR07MB4217.eurprd07.prod.outlook.com ([fe80::6d0c:b1c0:d332:6f33%6]) with mapi id 15.20.5038.013; Tue, 1 Mar 2022 10:29:22 +0000
From: Francesca Palombini <francesca.palombini@ericsson.com>
To: "secret@ietf.org" <secret@ietf.org>
CC: "secret-chairs@ietf.org" <secret-chairs@ietf.org>
Thread-Topic: [Secret] Secure Credential Transfer (secret) BOF Virtual Meeting: 2022-02-10
Thread-Index: AQHYEttrGDmcw5z0QkCuZIEBWQK9xayqh0OQ
Date: Tue, 01 Mar 2022 10:29:22 +0000
Message-ID: <HE1PR07MB4217DBB408CD21C0463B520198029@HE1PR07MB4217.eurprd07.prod.outlook.com>
References: <164321863329.27385.6340387845625300575@ietfa.amsl.com>
In-Reply-To: <164321863329.27385.6340387845625300575@ietfa.amsl.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=ericsson.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 3dec1ce8-460b-4816-17e9-08d9fb6e5a2e
x-ms-traffictypediagnostic: AM4PR07MB3284:EE_
x-microsoft-antispam-prvs: <AM4PR07MB3284C89ACDD577B1008BD8AC98029@AM4PR07MB3284.eurprd07.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:HE1PR07MB4217.eurprd07.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(71200400001)(86362001)(38070700005)(508600001)(55016003)(53546011)(6506007)(7696005)(186003)(38100700002)(33656002)(9686003)(966005)(83380400001)(166002)(82960400001)(66946007)(5660300002)(76116006)(66556008)(64756008)(66446008)(66476007)(8676002)(4326008)(450100002)(122000001)(91956017)(9326002)(8936002)(2906002)(6916009)(52536014)(316002)(44832011)(219293001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 2
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-antispam-messagedata-1: xApVYYJ8mcLLLvPdFqIiqcf35iQWjjAxXss=
Content-Type: multipart/alternative; boundary="_000_HE1PR07MB4217DBB408CD21C0463B520198029HE1PR07MB4217eurp_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: HE1PR07MB4217.eurprd07.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3dec1ce8-460b-4816-17e9-08d9fb6e5a2e
X-MS-Exchange-CrossTenant-originalarrivaltime: 01 Mar 2022 10:29:22.6174 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: CBfVQV8kUn0A3plUQ/ZQF3IyG6BYHmi57OlKGsiMsRi+6kPLHHear/1AYTkH7ShJUobpa6ZFIdeR/k/iQ6MiRDo+H+P2ybTksTgEIsAWmy407yyHln6eNOwyRpx2JcAa
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR07MB3284
Archived-At: <https://mailarchive.ietf.org/arch/msg/secret/7-J5NhzwydeCH0deXDmcmPpOA8w>
Subject: Re: [Secret] Secure Credential Transfer (secret) BOF Virtual Meeting: 2022-02-10
X-BeenThere: secret@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Secure Credential Transfer <secret.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secret>, <mailto:secret-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secret/>
List-Post: <mailto:secret@ietf.org>
List-Help: <mailto:secret-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secret>, <mailto:secret-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 01 Mar 2022 10:29:34 -0000

Hi,

Minutes have been posted: https://datatracker.ietf.org/meeting/interim-2022-secret-01/materials/minutes-interim-2022-secret-01-202202100900-00
Recordings can be found here: https://www.youtube.com/watch?v=SDu4kKEJwCQ

Thanks to the chairs and to the meetecho team for a smooth session. Please let us know if you believe anything wasn’t captured correctly, or feel free to provide additional input in the mailing list if you were not able to join. The SEC ADs and I will be meeting soon to synchronize and announce next steps.

Thanks,
Francesca

From: Secret <secret-bounces@ietf.org<mailto:secret-bounces@ietf.org>> on behalf of IESG Secretary <iesg-secretary@ietf.org<mailto:iesg-secretary@ietf.org>>
Date: Wednesday, 26 January 2022 at 18:37
To: IETF-Announce <ietf-announce@ietf.org<mailto:ietf-announce@ietf.org>>
Cc: secret@ietf.org<mailto:secret@ietf.org> <secret@ietf.org<mailto:secret@ietf.org>>
Subject: [Secret] Secure Credential Transfer (secret) BOF Virtual Meeting: 2022-02-10
The Secure Credential Transfer (secret) BOF will hold a virtual interim meeting on 2022-02-10 from 09:00 to 11:00 America/Los_Angeles (17:00 to 19:00 UTC).

Agenda:

    Intro
    Use cases
    Requirements
    WG charter discussion: https://github.com/dimmyvi/secure-credential-transfer/blob/main/charter.md<https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-14bc877d5d462254&q=1&e=1065a1b2-6cda-4145-9099-11085b463ea2&u=https%3A%2F%2Fgithub.com%2Fdimmyvi%2Fsecure-credential-transfer%2Fblob%2Fmain%2Fcharter.md>
    Conclusion

Draft: https://datatracker.ietf.org/doc/html/draft-secure-credential-transfer-03

Information about remote participation:
https://ws.conf.meetecho.com/conference/?short=d1a67502-8fe8-4fc2-bb9b-f2e2f4594bb4<https://protect2.fireeye.com/v1/url?k=31323334-501d5122-313273af-454445555731-e93e0a8780df8fc1&q=1&e=1065a1b2-6cda-4145-9099-11085b463ea2&u=https%3A%2F%2Fws.conf.meetecho.com%2Fconference%2F%3Fshort%3Dd1a67502-8fe8-4fc2-bb9b-f2e2f4594bb4>

The meeting will happen over Meetecho. To join the session, you will need to use your IETF Datatracker (https://datatracker.ietf.org/) login, which you should create ahead of time if you don't already have one. If you have forgotten your IETF Datatracker password, you can request a reset (https://datatracker.ietf.org/accounts/reset/). For more information, see the Meetecho guide for participants (https://www.ietf.org/how/meetings/technology/meetecho-guide-participant/).

BOF Request: https://datatracker.ietf.org/doc/bofreq-secure-credential-transfer-bof-request/

Description:

We presented the secure credential draft to Dispatch on Monday of IETF week (2021). There was a lot of interest, but folks asked for additional detail on the problem statement, requirements, and use cases. It was decided that we weren’t ready to form a WG right away and instead endeavored to schedule a BoF to review the above items prior to forming a WG. The goal is to allow users with secure credentials on their mobile devices to be able to shares entitlements that these credentials grant to other users. This would be achieved by defining and standardizing a protocol that will facilitate such credential transfers from individual to individual. The protocol will leverage a “relay server” to transfer data from sender to recipient. The scope of the transfer is limited to a single origin device and a single destination device. This system does not exist today in a standards-based, cross-platform and cross-channel capacity. The goal of this BoF is to answer some of the questions that came up during the Dispatch meeting (such as, why can’t these credentials simply be lifted and cloned and then sent to the recipient?). We also want to provide additional detail into the applicable use cases, and some of the security and privacy requirements for the solution. The ultimate goal is to form a WG to discuss the initiative in an ongoing capacity.

--
Secret mailing list
Secret@ietf.org<mailto:Secret@ietf.org>
https://www.ietf.org/mailman/listinfo/secret