Re: [SPICE] Feedback on SPICE charter

Henk Birkholz <henk.birkholz@sit.fraunhofer.de> Thu, 19 October 2023 14:30 UTC

Return-Path: <henk.birkholz@sit.fraunhofer.de>
X-Original-To: spice@ietfa.amsl.com
Delivered-To: spice@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 69AECC170619 for <spice@ietfa.amsl.com>; Thu, 19 Oct 2023 07:30:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.097
X-Spam-Level:
X-Spam-Status: No, score=-7.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, NICE_REPLY_A=-0.091, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sit.fraunhofer.de header.b="F7gata1m"; dkim=pass (1024-bit key) header.d=fraunhofer.onmicrosoft.com header.b="Y6oFliqY"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OB9r7HHhFTsl for <spice@ietfa.amsl.com>; Thu, 19 Oct 2023 07:30:47 -0700 (PDT)
Received: from mail-edgeka24.fraunhofer.de (mail-edgeka24.fraunhofer.de [IPv6:2a03:db80:4420:b000::25:24]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DC1ECC151533 for <spice@ietf.org>; Thu, 19 Oct 2023 07:30:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=sit.fraunhofer.de; i=@sit.fraunhofer.de; q=dns/txt; s=emailbd1; t=1697725847; x=1729261847; h=message-id:date:from:subject:to:references:in-reply-to: content-transfer-encoding:mime-version; bh=TaCU4lWaEwtCkIHh61etYHrZHAwqr3PkH53xx0RKzsQ=; b=F7gata1m2SmzT2kIyZ4+9/LXH2vHHEBWC14zhF8yI0W9oW8Hr1ZJyvc+ LUth8P3laewwXJjCIqd0bETTBHCpgSEwI11uK1muIG9HJtma6MjIR32e+ cFPZE6s3FPNWmHzGtZa26slTIKALvjfnn5NCMSAjzsuVv11pYDJDWE736 cWcZgtNfPsmqU+JONe4ofiM0ptLsyyXS77iOhSu7Eiz/l6mzaSaX4Ppz8 ddC/Hawcl7PtbnHMQPLMiYlzKiHBsg/T/bJJkkojco/ea8yXwLsndiWzx I/9kqBOTJLI3ivOLkAGaWzyCR9ohQa8vhFBfGQCNin86EAaKzsHKyZjWK g==;
X-CSE-ConnectionGUID: dWyatg3ZQIuEvjmLbiZbrw==
X-CSE-MsgGUID: Q4i93bBCS9SykYIoghyOyA==
Authentication-Results: mail-edgeka24.fraunhofer.de; dkim=pass (signature verified) header.i=@fraunhofer.onmicrosoft.com
X-IPAS-Result: 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
IronPort-PHdr: A9a23:13lTxhfXcHfInLtV6UxFGt6vlGM+49/LVj580XJao6wbK/fr9sH4J 0Wa/vVk1gKXDs3QvuhJj+PGvqynQ2EE6IaMvCNnEtRAAhEfgNgQnwsuDdTDDkv+LfXwaDc9E tgEX1hgrDmgZFNYHMv1e1rI+Di89zcPHBX4OwdvY+PzH4/ZlcOs0O6uvpbUZlYt5nK9NJ1oK xDkgQzNu5stnIFgJ60tmD7EuWBBdOkT5E86DlWVgxv6+oKM7YZuoQFxnt9kycNaSqT9efYIC JljSRk2OGA84sLm8CLOSweC/FIweWUbmRkbZmqN5hGvBbnN8TDa77FkhAC3YtzoU4tlA3eZs qo6VjrHkjg4agcJ3EDol94tnIxriUfywn43ydvlPoa7MPtnT5LnQfg+YkdYZfQWamtjLIW3Y ZQCKcMQDedVjbv4pUsHpziTPROTOvm35AQRtEfp4LMiyMkHP1HbxikuRuJS6Hj0qdjpMKMUQ PqP4q6Y1BH9Mtda6GvC0tOZKh0Fgu7Xe+gqUcfMx28lMRnBiFSOrYi+ZguSz71Wn2mSseVHD eCkpWcXpTwhoDaI3YQjhpmTl5IOm1rZ0WZgg68fe8znaRBAT+/xQ9NA8iCAMI1uRdk+Bntlo zs+1ugesIWgL0Diqbwizh/bLvGLfIWL60i/EuiLKCp+hHVrdaj5ixvhuUSjy+ipTsCvyx4Kt StKlNDQq2oAnwLe8MmJS/Zxvw+h1D+D2hqV67RsL1o9iKzbLJAs2Pg3kJ8Sul7EBSj4hAP9i 6r+Sw==
X-Talos-CUID: 9a23:Z2yLzWzriV9rwfzWLwGVBgUYJdEsbnKG/k7xPmKmC2NNQrynQ0WPrfY=
X-Talos-MUID: 9a23:wbpFiQTH5YhaPC95RXTV2DAzb81CyJ//M1EOoLQBtMmVEj1ZbmI=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="6.03,237,1694728800"; d="scan'208";a="1451550"
Received: from mail-mtaka26.fraunhofer.de ([153.96.1.26]) by mail-edgeka24.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Oct 2023 16:30:39 +0200
IronPort-SDR: 65313d8c_Tpxzvu4FLZLKYWTTrR4CRwdE6DYfFxv9/nEQnw4yRSA2yIn 8ljxs4bGV8PjvSaQwB25S+Ris3cokV3x3I7W7YA==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:KSAZvRPtJxAZVDhjG7Il6nZKDBdPi9zP1nM99M9+2PpHJ7649tH5P EWFuKs+xFScR4jf4uJJh63MvqTpSWEMsvPj+HxXfoZFShkFjssbhUonBsuEAlf8N/nkc2oxG 8ERHEQw5Hy/PENJH9ykIlPIq2C07TkcFw+6MgxwJ+/vHZXVgdjy3Oe3qPixKwUdqiC6ZOFeJ Qm7/z7MvMsbipcwD6sq0RLGrz5pV7Z9wmV0KFSP2irt/sri2b9G3mFutug69slGA5W/Wp99Y KxTDD0gPG1w38DtuRTZZCek5nYXUTZz8FJCA12ewi25Rbeo6TKmn8ciyTeEBpysDotpVGW8y ohxVyC1sRcrFgEk4jzHpPxZ2fE+wlqr8i0hxKDQYZikBcBCVYf6UMohdy18GeR/USdPHY6aR po/DucjD+Nav4D3hHY2tySAH1GCP7rd8iB1mGft8IsUg/k7NA+f7FB4E/ILvWjQqNPkLp08V rCs6JeV6TnyM8xsgmal5azrbUsH+6usUK9+V8D3000pFh3Big7JkYv8Zmi51+1TvE/D7eFOX NKhtj4lpSZq4Tej1p09mpKYjJ8xiUmH3A8n0dkUe+aWeRsoKc7hEYFXsTmdLZczWM45XmV07 T4z0aZV0XbaVC0DyZBiwgLWSNXdLc6G+Bv+UuaWLzpiwn5oK/qzhBe3pFCp0fa0FtK131BDs jdfn5HSu2oM2R3e5onPSvZ08kq7nzfa/w7J4/xCIUc6mLCdLJgkw7UqkYEUv1iFFSjz8Hg=
IronPort-Data: A9a23:ZjA4q63gRgdVmMB+mvbD5UV3kn2cJEfYwER7XKvMYLTBsI5bpzUDy jMYUGyFM/mJazemKtp0Oojg8B4DuMXRxtAwSFFq3Hw8FHgiRegpqji6wuccGwvIc6UvmWo+t 512huHodZxyFDmGzvuUGuCJhWFm0q2VTabLBufBOyRgLSdpUy5JZShLwobVuaY2x4Dia++xk Ymq+ZaGYAb0g2cc3l88sspvljs/5JwehxtF5jTSVdgT1HfCmn8cCo4oJK3ZBxMUlaENQ4ZW7 86apF2I1juxEyUFU7tJoZ6nGqE+eYM+CCDV4pZgtwhOtTAZzsA6+v5T2PPx8i67gR3R9zx64 I0lWZBd1W7FM4WU8NnxXSW0HAlmOJd4pr/tekOH652o4kjJMF7Q3cRhWRRe0Y0woo6bAElV8 OAAbj0dZRDFifi/3bS7TedhnIIvIaEHPqtG5yomnG6fVKl3B8mZHM0m5vcAtNs0rsBDG/WYb csDajpoaAboeBxTfFkNAY84nOCmi2O5fzAwRFe9+/VmuTCCkFwZPL7FOeXbX9zVFfpuklfFm lzX1nzLWk0LK4nKodaC2jf27gPVpgvgQIMZGZW5++JkxlqJyQQ7EhEafVC2u+X/jVSxM/pYM U0Z0jY0pK4p8VG3Q5/8WRGlu2KevxMHM+e8CMVjtVrIm/WRulnIQzFeEXhfbZot8sEsTCEs1 liHksmvCTEHXKCpdE9xP4y89FuaESYPJHIEZSgKQBFD5N/moYopiQnIQMolG6mw5uAZ0xmqq 9xThHlm2ecgnoQQ2r+l/FvKpTupq9KbBkQ2/wjbFCbtpA9weIfvNcTi5En5/MRwCt+TbmCAm 3wYxOmYzuQFVq+WmAK3He4iIbCO5tS+CgP6v2JBJZcbymmSyyaRRrwIuDBaD2V1A/kAYg7sM RPyuxsOxZp9P0mKTK5QYqCjAvQT0JrmN9Tpaa3TZIB8ZpNwKQy1xwB1REuqx2u2ulMdoaI+H pa6cMiXEncRD5p8/ge2X+sw1bwKxDg04HH6HLTX7k2A/+KFRXi3TbwlDgO/Xtoh5vnZnDSPo sdtCcSa7j5+Dsv8W3Dz2qwOJwkoKXMbO8jHm/ZPfLTeHjs8SXATMN6P87YPYIc/or90kN3P9 XSDWkN17lrzqHnECAeSYEBYd7LdcsdjnE0/IBATEw6k61o7baaryZUvRZ89UL0k1e5klPBPX 6YkfeeECa9xUTjpwWkWQqT8i41ATy6VozyyERCrWxUBWqJxZhfo/4bkdzT/9SNVASuQs9A/k oKa1QjaYMQiQSJ+AOb/dcCfz1G4liUYk+dcBkHNIsdhfXv91I1QLw3wkf4FDMUeIjrTxjah9 li3ADVJgcLvsoMK4N3yqqTclLiQEsx6BVt8I2nXyZ2UJBvq1DOv7qEYWdnZYA2Hcn3//ZuTQ Nl8ztb+AaUhp0lLuY8tKIRb5/syyPW3roAL0zk+OmvAammqLbZSInOm+81rnY8Vz597vTqGY G6+yuN4C56oZvy8SEUwITA7ZNutzfsXwznezcokKXXAuRNYwuC1blVwDTKt1gptdKB4IaE08 9cH4cQ20TGyujAuE9SBjx1XyViyE2w9Y/0nm6weUaDWiVsN61BdYJbjJDf8z7ORZv5tbEQ7A D+mq5DTprZbx0GYdyIXEErc7NpjmJ0h6RV4/H4fFXu0m/7upPw+7DtO+xsZEyVXyRRm1bpoG 25JbkdaG4SHzw1KtuNiAV++Ph5nPwKI3HDxx38itnzrf2PxWkPjdGQCaPuwpmYH+GdiTx1n1 bC/yle9dw31fcv0jxAAaWQ8p9PNFdVOpxD/wua5FMG4Hr4/UzrvoomqQUEq8xLHI8cAtHfrl NlQ3tRbSPPEbHYLgqgBFYOl+6waS0mEKEx8UPhRxv41Ml+GSg6i+wqlCh6XSppBKcWfpAX8Q 4ZrK9lUXhuz6DeWo3pJTeQQKrtzh7gy6MBEZrrvInUcvqCCqiZy9qjd7TX6mHRhVuAGfRzR8 W8NX2nq/rSsuEZp
IronPort-HdrOrdr: A9a23:lCOQZawrVaL4vaHtPC/CKrPwIL1zdoMgy1knxilNoEpuA6ilfr OV/cjztCWatN9/Yh0dcLy7UpVoBEmslqKdgrN7AV7BZmnbUQKTRelfBMnZsl/d8kbFh4tgPM lbHpSXQbfLY2RHsQ==
X-Talos-CUID: 9a23:K1uhLW73wXb6iuGFpdss7EsuJJ4lWCbm9C2BGGK9BiVMdKOkRgrF
X-Talos-MUID: 9a23:Sq8j6gYs27y2XOBTvgDioTE9ZPhT77XzNH4cuI0045WVKnkl
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="6.03,237,1694728800"; d="scan'208";a="67920948"
Received: from 153-97-179-127.vm.c.fraunhofer.de (HELO smtp.exch.fraunhofer.de) ([153.97.179.127]) by mail-mtaKA26.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Oct 2023 16:30:36 +0200
Received: from XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) by XCH-HYBRID-03.ads.fraunhofer.de (10.225.9.57) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.27; Thu, 19 Oct 2023 16:30:36 +0200
Received: from DEU01-BE0-obe.outbound.protection.outlook.com (104.47.7.169) by XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.27 via Frontend Transport; Thu, 19 Oct 2023 16:30:36 +0200
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BA+4xBrqV+KWvqqMenyMVbFCpM8rSmWqQdnXb9jYe85wNBs28WhMLJU2RLzQ4zZt+5Sn4FyOrqSvPR8AX6gsl6Mjq0wzEaGs+pU+IwXN9lcX+l3yTupZ4KUUneNGyZw636bhTO5CKI+e83FaIVcw0GszQwQX4obZx/CMwP3DDUgmAwCkqJOT2/coC0Io61IQWt88ROjuviGjBXusBf2tezlpl6Y9DMCddr5O0APLtoz7arzk4O8Tk7jzZ8kK4aKaNv8TSeRBnSCVWwD3NHfnr7e4jN0KaRmnMbIk2LGalV7YBNokJVe2bPnyE4dj60IocM3gP9Iv+TysDoxtqMXFHg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=3FT+sH13q4AE7yvvS92+S5e9vMGrwW5QXDIWuz5xFXA=; b=Qr3CU1rkPUqs5b4ibuSGCiGf9BHHukX+kCCBgLn50S7ck4x2Co0XrSDHshncT8zi+p1t/hSayrzFvfuQsfEz14NxMm/B1+/CsYMEYX13+l33gXej/wj8F26dccag+Lef/do++vDzkISDcM1Hgh/iB8oKGZI3NRxuixCT2zpl9EHBlWbTl8FVPzsm9VSXAQ0OnaccufcrjcFdTRgX7bXyuf2x1eW7lxRvumUuEShafSBWNNLNUclflR5venVsx5gYsp9lsVNxuydeg6qZODZ2oLNn4lRHRIzCAVxYBZ3MWjrCGSUavFNV97dn0tGFTNwzcT+0w2cOw8s9bVbMErnxvg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=sit.fraunhofer.de; dmarc=pass action=none header.from=sit.fraunhofer.de; dkim=pass header.d=sit.fraunhofer.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fraunhofer.onmicrosoft.com; s=selector2-fraunhofer-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=3FT+sH13q4AE7yvvS92+S5e9vMGrwW5QXDIWuz5xFXA=; b=Y6oFliqYYRTCLOEqSZ/U/JFncfweNAyXieJZmjxabKEPrWVr0FS1ZPwUvpsENF8urMf1X40dHmetllnyrRFo8qLV5LdY4WR390eLKw3N22HeufNbNrlnivll31Poq13Dia6gO0jcFaXfU8jfOs+gdx2yxs9buL+q+AB6y7I6SFY=
Received: from FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:4c::8) by FR0P281MB2352.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:23::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6907.24; Thu, 19 Oct 2023 14:30:35 +0000
Received: from FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM ([fe80::137f:9ae5:a4ef:253a]) by FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM ([fe80::137f:9ae5:a4ef:253a%7]) with mapi id 15.20.6907.025; Thu, 19 Oct 2023 14:30:35 +0000
Message-ID: <0248305b-92f0-e196-98a3-39b65549aac1@sit.fraunhofer.de>
Date: Thu, 19 Oct 2023 16:30:33 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.11.0
From: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
To: spice@ietf.org, Roman Danyliw <rdd@cert.org>, Orie Steele <orie@transmute.industries>
References: <BN2P110MB110768236AD5B58D1FBFC5B4DCD3A@BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM>
Content-Language: en-US
In-Reply-To: <BN2P110MB110768236AD5B58D1FBFC5B4DCD3A@BN2P110MB1107.NAMP110.PROD.OUTLOOK.COM>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: FR3P281CA0077.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:1f::10) To FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:4c::8)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: FR0P281MB2879:EE_|FR0P281MB2352:EE_
X-MS-Office365-Filtering-Correlation-Id: e12b0f7d-4f88-4223-ab47-08dbd0aff4e3
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230031)(376002)(366004)(39860400002)(136003)(346002)(396003)(230922051799003)(451199024)(1800799009)(64100799003)(186009)(82960400001)(38100700002)(478600001)(41300700001)(6486002)(6506007)(966005)(6512007)(53546011)(316002)(110136005)(66946007)(66476007)(66556008)(8936002)(5660300002)(44832011)(30864003)(2906002)(66899024)(83380400001)(2616005)(26005)(31696002)(31686004)(8676002)(86362001)(21314003)(45980500001)(43740500002); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: RGNUSyKtoGCi+8Bz2nzpxkjkJ1ZDznj4kfXPoqlOfQ5hbc6/d/qQjhQW9zvYFypWkUfgum3KM8N7lPd9wNXNrVun3Pe9wjfP7vHiFMsZ4WaqZ5pqW6U0O5LD1wIkTUrYHes+/ybhiA0p8H1ZLLJMX1Xk6pImdmJgLnFrYCR/bsnXmzYpuAg02Y3DjOBE59W0CkAQX0BS0Km2zB9LmYcr9/g1hF5hFbKthRtlMEkSSbeF9/+c7h6e8KOC9OyBW5oaTaNxpjqsaJyqwzYAt5luyN3mcK+hsAqF79hNBKeTH43QtOlM4v4YYDZy61Of5AAx1ckMD17Jx6vNaWvzJaWiHuYcAJRXHmSc9BWjwzIcPQsu+14w8lFuyXVLNNyLB7Zeqy9XHGRu1b5kYkBXyYmHQJI7bw9D2ifLPLlkG4PFgY10jB8uh6Rg8AB+6yZJ6/jgRmdFy0pw9aDxqskleCl+3lPejbJSgA1qzW4dbBJnhzO6p0WDhP9o2TXO0n1WB5N9NRhMit0xk18NRjBWmV1b4Wtqdr0ts+NCQvAsf5d63SPbNuEas4FOsE5OkF/Y1GQy3F3Ce1wdewwn9iIbKiu9dycTkQ68LNMDLGVvx0graYnPUTa7M3ZeaxCPOs2+oGOQjyGzYtSXMmCgXTwruNeqYlLX6pos+4g1YcLykOZrTJ703MyEhfgAQBD8vSyjtvZz1c5TXGvmSaiRqcHtJtqxIK+ZqKJ2pBKAqhllRGf1LHV3FpUQjtjWru/wbznT9+ndEkqATGJmrPO3TZ/IzLZIe8VKuAY/EUPGhR4DYreO/b0AJzHxFhdY4nSRKjOcyu2B6qfy3GC6ToRxAqO2UL8qDtKXQs5EXg6BcYGugX9pVRix9/RYfvnbqDkqQK81A2DLXA/SuHeCcG8UZCCHempVIbMYYdfEN48B6dNT4uClW8bQVIZwvHZo8gMT7eJbC8nEFIAbM8S4GfswcHbq0pbbiEkqiIIpVkENjDS/fFr9nlTeqHnkGmiBiMpgeTyad9YfeaCVtpck+H8W66/Imyw0nx2jEpYhVBOHjOkuzJVbbx5sVpJDqHRZwbVMqaMuhwbQ1s7qv63LuuNwjFA/YJFD7R4mK/8JXlEz8Q03lA8/LwSzqm3eloPn09iP3Jnmu8pcem44zDkUTwjz+EyfkjrzYxFA8VNIp9lvPZaMvyruOfv6NOIOGGSPpuJPqKMx6Ucv+w9aT4rs7FLb5uShweTvkWGBbfoCbXc5KdnjiPbeSs4za5Kqnrsy+U265zEJ0TVwgcl19JmbE5QJO1bd2bem6hn/GUIP65ELqDugCJL2CCwagbovsQDoLzewWw8zo1XDMXIeTBQg8K69XK177RYgLmjAetIBHqKs09Z7qNCag3bB8/YMJjIZlCxBioaqyMNYo0TFPYuT1AMLr0SOoareAjqiBuXWqfMNRnsVP7O54m9xSNH2UxDf4TGytSAbeCLrJq2Vz+B47WyJ+PksJ8zLMOcXf3oOSo7iLea42EAyDvSihJLsDgN4wl4yy6DudYEEWXvaoJyRT8VB96WG3JPHTpP29PQFlOZR8ROejxJJjzWkqE1xwghGcIG3uVBSsO3KHwdmWAgRAfnOyUaugGaCZQHoJFLs4FmwjXs4Z9IDZ6g=
X-MS-Exchange-CrossTenant-Network-Message-Id: e12b0f7d-4f88-4223-ab47-08dbd0aff4e3
X-MS-Exchange-CrossTenant-AuthSource: FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Oct 2023 14:30:35.1537 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f930300c-c97d-4019-be03-add650a171c4
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: s1a0wcHkgrJEM8SOGSouSQXl1vrDj3jq2H627CFZgQnR0r4JrgkTPl1laSOfWxaLmf5n8up2JoCacJzvBd5sQWYadb3qR7vQj/TzN0dBJSo=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: FR0P281MB2352
X-OriginatorOrg: sit.fraunhofer.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/spice/NxZNXiD4l480PsZE7gfrD2gxj1Y>
Subject: Re: [SPICE] Feedback on SPICE charter
X-BeenThere: spice@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Secure Patterns for Internet CrEdentials <spice.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spice>, <mailto:spice-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spice/>
List-Post: <mailto:spice@ietf.org>
List-Help: <mailto:spice-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spice>, <mailto:spice-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Oct 2023 14:30:52 -0000

Dear Roman,

thank you for your extensive review. It is a great help. We addressed 
almost all your comments in a first pass.

Changes are captured in a github branch on the charter text and a 
corresponding PR for visibility and targeted feedback and suggestions:

https://github.com/transmute-industries/ietf-spice-charter/pull/4

Please find detailed replies to your review in-line.


Viele Grüße,

Orie & Henk


On 12.10.23 18:08, Roman Danyliw wrote:
> Hi!
> 
> It's been very helpful to have a draft charter for discussion.  See https://github.com/transmute-industries/ietf-spice-charter/blob/main/charter.md.  I realize that we are still weeks before the BoF where key discussions need to occur and no consensus has been determined.  Additional editorial polish is also likely.  To contribute to the BoF planning, please find an early review of the charter.
> 
> ** Introduction Section
> 
> -- I read this section and wasn’t sure what IETF’s role was.  I was hoping to better understand the problem to solve so as to motivate the solution in later text.  The section left me with the impression that IETF standards are already deployed without an appreciation for the gaps.

First attempt to address is found in commit 04f116c.

> 
> -- Per “In order to meet privacy, security, and sustainability objectives, digital credentials need to be designed with awareness of computation and storage constraints associated with their use cases”, in the abstract that seems helpful.  However, what isn’t clear the totality of the objectives.  Subsequent text mentions “selective disclosure” and “unlikability”.  “Sustainability” is called out, but I can find no later references to it and design constraints tied to it.

Objective summary aggregated at a single point in Introduction is now 
found in commit b3b872e.

> 
> -- Per “The SPICE WG aims to support digitial credential formats based on existing IETF standards, and extend them to support stakeholders that are building compliance and automation systems based on industry adopted cryptography and protocols”, the setup is confusing for me.  Why would the SPICE WG support digital credential formats?  Should not it define them?  I’m not sure if this is editorial or nuanced scope statement.

Adjusted text to make it clear we are not defining credential formats, 
we are making a framework for others to do so with IETF standards is now 
also found in commit b3b872e.

> 
> -- “Digital credential” is being used as specialized term with a narrow scope which might not be obvious to casual reader.  For example, to some, an X.509 is a digital credential.  I would recommend a definition.

Added a definition for "Digital credential" in commit 635d829.

> 
> ** Goals Section
> 
> -- Nit.  WIMSE is BOF with no long-term standing for coordination so please remove it.

We removed WIMSE.

> 
> -- Per “Feedback from experts in other IETF working groups is gathered in the SPICE WG without creating fragments of credential work spread accross several existing places in the IETF.”  It isn’t clear to me how credential work is unified by this charter.  Is the pitch that SPICE reuses the building blocks of other IETF work to defined particular “digital credentials”?

Yes, we believe this was addressed in 04f116c, b3b872e, and 635d829. 
Still we added one small clarification on "Claims in IANA registry" in 
commit .

> 
> ** Goals/In-Scope Section
> 
> Two high-level questions:
> -- What’s the output?  Will it be a profile for CWT with additional properties (e.g., unlinkability) or (and?) will it be an entirely new “/token/framework”?  I see hints in the charter of both directions – the reference to EAT-as-a-framework suggests it will be a new derived format of something (i.e., EAT is not a CWT profile but reuses the claims registries) but the example of draft under work items cites https://datatracker.ietf.org/doc/draft-prorock-cose-sd-cwt/ which seems to profile CWT.

Intended output is an architecture document and additional documents 
related to specific properties, such as selective disclosure or 
unlinkability. Output documents are developed to address industry needs, 
e.g., selective disclosure and unlinkability of SBOMs. Corresponding 
changes to the charter are found in commit d7d5155.

> 
> -- Is the encoding format relevant and is it only COSE?  The text currently mentions “aligning JWT/CWT claims” and ensuring that JOSE/COSE is consistently applied.  Including draft-ietf-jose-json-web-proof is also mentioned.  However, a number of the example drafts all seem to be COSE related (draft-ietf-cose-merkle-tree-proofs, RFC9338, draft-prorock-cose-sd-cwt, draft-ietf-cose-key-thumbprint) except RFC9278.  In the “Relationship with W3C VCWG”, concerns with JSON, CBOR or other formats is mentioned.

We clarified the relationship between inspiring input documents and 
"desired properties" of digital credentials in commit 317ec4b.

> To the specifics:
> 
> -- Per “The work of the SPICE WG aligns JWT and CWT registered claim names for use with the 'Three Role Model' …”, what does it mean to “align claims”?  Does this mean register new ones?  Profile collections of them (i.e., specify the use of some subset of them for a particular purpose)?

This is probably addressed by previous changes, i.e., via statements 
around the need for registered semantics. We don't think profiles to 
ensure alignment are fundamentally necessary, although EAT as a 
framework is conceptually similar to "digitial credentials" as a profile 
of JWT/CWT.

> 
> -- The intent is also to apply lessons learned from the development of W3C's 'Securing Verifiable Credentials using JOSE and COSE' specification.  What are those lessons learned? Could they be converted to design guidance described here?  Discussed at the BoF?

Added an itemized list of lessons learned in commit 61c488a.

> 
> ** Goals/Out-of-Scope Section
> 
> -- Per “The working group will NOT be limited to JSON-LD data models, but to the extent that JSON-LD is compatible with JWT regsitered claims and private claims, the W3C Verifiable Data Model remains supported, as described in https://www.w3.org/TR/vc-jose-cose”, there seems to be a lot of guidance here.  Could this be simplified?  My read is “When work is done in SPICE, JSON-LD won’t be used.  No attempt will be made for compatibility.  However, newly registered claims may have broader applicability”
> 
> -- Per “The working group will NOT address specific credential use cases, such as "personal credentials" or "software supply chain". Instead, the SPICE WG will reuse existing work or incorporate emerging work items produced by other IETF working groups, such as SCITT, OAUTH”, the first sentence is clear to me.  The second is not.  What does it mean to “reuse existing work” in the context of a discussion on use cases?

Made the Out-of-Scope Section more concise and moved SDO interaction to 
Goals in commit b37df94.

> 
> ** Motivating Use Case section
> 
> I struggled with the length and intent of this section.  What does inclusion here commit the IETF to doing?  Does the SPICE WG need to ensure its “output” satisfies each and everyone of these bullets despite the earlier text says the “WG will NOT address specific credential use cases …”?  Will future documents be declared as in-scope because they are needed by a community/technology/initiative/goal listed here?  I strongly recommend removing this section and replacing it with the design properties these use cases need and/or some shorter digest of them in the introduction.
> 
> As an aside, the IESG recently provided a similar message (of less use case text) on the VCON charter review.  See https://datatracker.ietf.org/doc/charter-ietf-vcon/ballot/.
> 
> This material was useful for the BoF request and might be reused during the IETF 118 BOF.

We removed motivating use case Section and added key design properties 
Section instead in commit dd279eb.

> 
> ** Motivating Factors for conducting this work at IETF
> 
> Please remove.  This was helpful in motivating the BoF request, but not in a charter.  Consider if coordination with the IRTF (is it CFRG?) is a specific goal.

We removed Motivating Factors and added CFRG to the first items of goals 
in commit 6253b71.

> 
> ** Work Items
> 
> -- As a general comment, unadopted individual drafts when used in charter text need strong caveats.  If they stay, they need language similar to “(draft-xxx may be used by the WG as a starting point)”.

We added a bit expositional text and reshuffled some content to key 
design properties in commit 6f02861.
Maybe we need to do more here?

> 
> -- It has a “TBD” in it, so I don’t mean to press, but “Identity Specification inspired by” needs clarity.

Work Items and Inspiring Input Documents Sections are cleaned up and 
reshuffled a bit, plus no more TBDs in commit be0d11f.

> 
> -- Per the OAuth document language, I’m not sure what do here beyond calling out that it is highly unusual in the SEC area for documents to move WGs after adoption.  On a technical level, I don’t entirely follow how the scope described here motivates the decisions of where those (and likely future) documents might land.  I would like to tease that out on the BoF.  I’m putting a marker down here that this text will need revision if this charter is to advance.  In such cases where something can be potentially done in two WGs, and WGs are being rechartered, the IESG typically says “have the conversation first and then modify the charter text.”  The closest we have is in the SUIT charter (https://datatracker.ietf.org/wg/suit/about/), “In addition, either the SUIT WG or the RATS WG will produce: A set of claims for attesting to firmware update status.”  In this case, there was no prior WG adoption of a document.

Lets discuss at the BoF. Or is there anything you would like to change 
explicitly, beforehand?

> 
> ** Milestones
> 
> -- There is a markdown formatting issue with linebreaks
> 
> -- The IESG has in recent charter reviews has been particular about wanting to see the intended status of the document (i.e., proposed standard vs. information) explicitly stated
> 
> -- There is no milestone for the “TBD identity specification”.  Whatever is listed in the work items, should have a corresponding milestone
> 
> --  Please add notional dates
> 
> ** Why IETF Section
> 
> Please remove.  This was helpful in motivating the BoF request, but not in a charter.
> 
> ** Relationship with W3C VCWG Section
> 
> Please remove.  Unless I missed something, the text currently reads like there won’t be much coordination and the IETF will be developing something different.

We cleaned up and improved the Milestone Section (,added some 
preliminary guesses on dates), and removed "Why IETF" & "Relationship 
with W3C VCWG" Section in commit 000bcf3.

> 
> Regards,
> Roman