Re: [SPICE] Charter proposal for a Working Group

Henk Birkholz <henk.birkholz@sit.fraunhofer.de> Thu, 19 October 2023 15:42 UTC

Return-Path: <henk.birkholz@sit.fraunhofer.de>
X-Original-To: spice@ietfa.amsl.com
Delivered-To: spice@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D9CDC180DFC for <spice@ietfa.amsl.com>; Thu, 19 Oct 2023 08:42:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.088
X-Spam-Level:
X-Spam-Status: No, score=-2.088 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, NICE_REPLY_A=-0.091, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sit.fraunhofer.de header.b="khDQYM0S"; dkim=pass (1024-bit key) header.d=fraunhofer.onmicrosoft.com header.b="BMX2QH30"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tZZTx7n6JprP for <spice@ietfa.amsl.com>; Thu, 19 Oct 2023 08:42:17 -0700 (PDT)
Received: from mail-edgeka24.fraunhofer.de (mail-edgeka24.fraunhofer.de [IPv6:2a03:db80:4420:b000::25:24]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E83F3C180DFA for <spice@ietf.org>; Thu, 19 Oct 2023 08:42:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=sit.fraunhofer.de; i=@sit.fraunhofer.de; q=dns/txt; s=emailbd1; t=1697730136; x=1729266136; h=message-id:date:subject:to:references:from:in-reply-to: content-transfer-encoding:mime-version; bh=/eJzyU3UDliEAJ7bNOyUnaLNcATX/4ZwZSq3NmzENtw=; b=khDQYM0SkzmazVNxrmUa/++GzhrzvCmwdOx1P6blLgGhulSWYrpLPzza 1gIUoTKBBN8HUdzOTkNrarOEYKwVJFQk6mdg6kNmwQ2h0TqVflhUBMO10 pSUnqHC2+4hfSEYUobz1nXDHcTjm3QJCesLJ9q7HhkJluxPysUfeVwqCT Ji4EniGQ/pIJwT1DSBK9yogPS8Mcm9JU88LSnyjSHJ2izyEljpSTIbQaq y2mC6pUNzCTUAVHe4KWhID+qXIkMKCxV1/I9fgcp/mCUa2jpLJcwXABGp wsRTGiBrdq2OH6XwIOjEXrprINgsALHn6XzqKpQqX9CfRQpVA5sT4mZ9a A==;
X-CSE-ConnectionGUID: +gjCpEXlSieuitQ3fh8glA==
X-CSE-MsgGUID: Wf9h+mTvTRizmE8kmmqt3A==
Authentication-Results: mail-edgeka24.fraunhofer.de; dkim=pass (signature verified) header.i=@fraunhofer.onmicrosoft.com
X-IPAS-Result: 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
IronPort-PHdr: A9a23:CYrNrhRlDuhRHE6VO/sPbA6A6Npsou2eAWYlg6HP9ppQJ/3wt523J lfWoO5thQWUA9aT4Kdehu7fo63sHnYN5Z+RvXxRFf4EW0oLk8wLmQwnDsOfT0r9Kf/hdSshG 8peElRi+iLzKh1OFcLzbEHVuCf34yQbBxP/MgR4PKHyHIvThN6wzOe859jYZAAb4Vj1YeZcN hKz/ynYqsREupZoKKs61knsr2BTcutbgEJEd3mUmQrx4Nv1wI97/nZ1mtcMsvBNS777eKJqf fl9N3ELI2s17cvkuFz4QA2D62E1fk4WnxFLUG2npBv6C4zPkTn2tfU+5BGqfv/qZ6oaeQ6E6 /h3ERvLtBUWJiEQ9Ej8spJBvKZXkRX09Hkdi4SBSqSlbsNeJfvDXt1DeikdAeBgSRdAJL+6b 7IgSOokev5pgtTFp3Ef8SaPHAmCWeK15xoYg3LEnqM00cshMCT2/UsdA+kljHjlqoutLOBVX O2/1pPiwh/tTfxs4W2kw5TjQjl4mO2dXfVNQcHf+UwJGQzXlnSIgorDZxCV3+8LvWOqyPRZc evym05/oUJWh2KWndsnl6Tgmo4Nw07h+n46z7QSPtPkUm1mPeKNRcgYp2SbLYxwWsQ4XyRyt T0nzqFToZegZ3tiIPUPwhfeb7mKf4eF4Ru5CKCfOz5lgnJidr+lwRq/ogCsyez5A9G9y00C7 jFEnd/Fqm0X2lTN59KGRPpw8gbp2TuG2w3JrOARCU4unLfdK5kvz6R2kZwWsE/ZGTTxllmwh 6iTHng=
X-Talos-CUID: 9a23:eO87QG/zmDHgV1WjRYyVvw0bGOs9X03Z93bdPk6kMD1nSO2aTXbFrQ==
X-Talos-MUID: 9a23:Cw6B8QrbqFqQwa0jM5Iezw5sZccr5piwNHoMg5Ar68qBMDVsYB7I2Q==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="6.03,237,1694728800"; d="scan'208";a="1459406"
Received: from mail-mtadd25.fraunhofer.de ([192.102.167.25]) by mail-edgeka24.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Oct 2023 17:42:10 +0200
IronPort-SDR: 65314e51_c7TORB6hynaAY8nAKTjAbBqhiXC5GV38/aDgxqvGP3N7ERt VBliDWarDXXN7V3QwRtu7EEzvChFtHIYO6jImfg==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:hw/JNRTmVhghTqG4ilotNrpvntpsovKeAWYlg6HP9ppQJ/3wt523J lfWoO5thQWUA9aT4Kdehu7fo63sHnYN5Z+RvXxRFf4EW0oLk8wLmQwnDsOfT0r9Kf/hdSshG 8peElRi+iLzKh1OFcLzbEHVuCf34yQbBxP/MgR4PKHyHIvThN6wzOe859jYZAAb4Vj1YeZcN hKz/ynYqsREupZoKKs61knsr2BTcutbgEJEd3mUmQrx4Nv1wI97/nZ1mtcMsvBNS777eKJqf fl9N3ELI2s17cvkuFz4QA2D62E1fk4WnxFLUG2npBv6C4zPkTn2tfU+5BGqfv/qZ6oaeQ6E6 /h3ERvLtBUWJiEQ9Ej8spJBvKZXkRX09Hkdi4SBSqSlbsNeJfvDXt1DeikdAeBgSRdAJL+6b 7IgSOokev5pgtTFp3Ef8SaPHAmCWeK15xoYg3LEnqM00cshMCT2/UsdA+kljHjlqoutLOBVX O2/1pPiwh/tTfxs4W2kw5TjQjl4mO2dXfVNQcHf+UwJGQzXlnSIgorDZxCV3+8LvWOqyPRZc evym05/oUJWh2KWndsnl6Tgmo4Nw07h+n46z7QSPtPkUm1mPeKNRcgYp2SbLYxwWsQ4XyRyt T0nzqFToZegZ3tiIPUPwhfeb7mCb4Gkzki+EuiLKCp+hHVrdaj5ixvhuUSjy+ipTsCvyx4Kt StKlNDQq2oAnwLe8MmJS/Zxvw+h1D+D2hqV67RsL1o9iKzbLJAs2Pg3kJ8Sul7EBSj4hAP9i 6r+Sw==
IronPort-Data: A9a23:NlCE3ajwSGJAVHW+WC5sLFh1X161/xYKZh0ujC45NGQN5FlHY01je htvWmCHP/bZa2H8Ldt2btvlpk0BusfVzoViTAs++XhmFSpjpJueD7x1DKtf0wB+jiHnZBg6h ynLQoCYdKjYdleF+lH3dOKJQUBUjcmgXqD7BPPPJhd/TAplTDZJoR94kobVuKYx6TSCK13L4 YiaT/H3Ygf/gGcsazNMsspvlTs21BjMkGNA1rABTa0T1LPuvyF9JI4SI6i3M0z5TuF8dgJtb 7+epF0R1jqxEyYFUrtJoJ6iGqE5auK60Ty1t5Zjc/PKbi6uBsAF+v1T2PI0MS+7gtgS9jx74 I0lWZeYEW/FMkBQ8QgQe0EwLs1wAUFJ0K3Le32dv5SV9ECcUUn18c5FJ1tqGZJNr46bAUkWn RAZACsIcgjFivK9wPS1UOBxgMQkIsTxeo8S0p1i5WiEVrB3HtaaHPSMvIUHtNszrpgm8fL2Z 8cfanxlbQ7DYxpLKH8MCY54kv2hm3//dDNVshSZqMLb5kCKnFMggeGwaYu9ltqiQ+NZ2V6fg E395V/gKw8xOIGN6jisyyf57gPItWahMG4IL5W0+/hrmxuSy3AdIBMMWFb9r+PRolWmWtlSA 00Z5iRoqrI9nGSsVNjwdwGiqXifuwMAVpxRFeEn8x2Xy6fPizt1HUBdE2UEOYNj7ZBnAGVwi RmXmpXiQzJ1uaCTSXWT+63SoT7a1TUpEFLurBQsFGMty9f5qZw1jhXBQ8wlF6iwj9bvHir3z SzMpy8774j/R+ZQv0li1QGf3WCftdLSQxQr5w7aeGug40krLMSmfoGkoxyTp/pJMI/THBHLs WkmivquyrkELaiMsyiRH8QLPrWivMiePBPm3FVAIpgG9haWwUCFQ7x+2j9FCX1SAp42QgOxO E73kiFN1aBXJ0qvPPNWYZruKsEEzprANNXCV9LGZ+p3f6p3Vg+Lw3xpbxSi22vszUseqoAkG JKhac33J20rOadm6zuXRukmzr4gwB4l917TXZzWyxeG06KUQWy8EJMpEQKpQLgizaWmpA71z Y5uB/GSwU8CbNykMzjlz4EDCHsrc145PMnSgO5KfLehJgFGJjkQO8XJy+l8R70/zrVnrcaWz HSTQUQC9UHeg0fAIgC0anxOTrPjcJJ8jHAjNxwXIlea9Ck/ULmr8ZsgWcM7TZs/+Mxn6MxEf f0PVsGDI/ZIEzr862s8a7v5p9dcbxiFv1+FEBekRzkdRKReYTL11OXqRDayyxlWPBGL7ZM/h 5aCyjLkRYEyQlU+LcTON9Oq4VCDnVkcv+NQTUL4G8Rhfmfs/Lc3LCarvPs8IpwPGy7i3Rqf7 R6dWj0DlNnOoqg00djHvr+FpIGXCNlDHlJWMm3YzLSuPwzI1zOH7a4Zd8jQZhHbdmf/2Jv6V NVv1/umbcE2xgdbgbRzA5NA7PwY5eK2g5R40w49PnHAT2rzO4NaOnPcgPV+7Pxc9IR45zmzd FmEoORBGLOzP8jgLl4dCSwlYsmH1tAWgjPi1us0Emqr+B5I+Ke7bmsKMymukCB9KJ5HALEhy 8olu+8U7FWxsQp1E9CkiisPyX+AAEZdWIoat7YbIrTRtCwV9n94b6fxNArK8bCUStAVMkAVM j6e36XDoLJHx3v9SXk4FFmT/Ox7mZgukQ14/F8ALn/Un9HAqKY92R1PwzEJXyBQ9BFm0v1yC EdvJUZaNaWDxBY2pclhDkSHORBNOw2dwWP1k2A2rWz+S1K5cFDNIEkWG/e/zGpA/01yJjFkr aylkkD7WjPUTeTN9yoVW389jcf8TNZ0pzbwqOr+E+urR5AFMCfY2Imwbm81qjziM8M7pGvDg cJIpO9QS6nKBRQ8kp0BKbux9OovEUifBWl4X/te0rsDHjjcdBGMyDG+ER2NVf0XFcPa032TK pJIFptDWS3rgWzK5noeCLUXKrB5oO8x6ZBQMvn3LGoBqP2EoiAvrJvU8TPkiXQ2R8l11/wwM Z7VaynIB1n4aaG4QIMRhJIs1rKEXOQ5
IronPort-HdrOrdr: A9a23:RK269K87nt3tjPmVhl5uk+Eydb1zdoMgy1knxilNoENuHfBwxv rDoB1E73LJYVYqOU3I6urwXpVoJkmsiaKdgLNhQItKOTOJhILGFvAG0WKP+UyaJ8S6zJ8m6U 4CSdkONDSTNykZsS+S2mDReLxBsbq6GeKT9J/jJh9WPH9XgspbnmBE42igYzRLrUV9dP4E/M 323Ls5m9PsQwVfUu2LQl0+G8TTrdzCk5zrJTYAGh4c8QGLyRel8qTzHRS01goXF2on+8ZozU H11yjCoomzufCyzRHRk0fV8pRtgdPkjv9OHtaFhMQ5IijlziyoeINicbufuy1dmpDm1H8a1P 335zswNcV67H3cOkmzvBvWwgHllA0j7nfzoGXo9UfLkIjcfnYXGsBBjYVWfl/y8Ew7puxx16 pNwiawq4dXJQmoplWw2/H4EzVR0makq3srluAey1ZFV5EFVbNXpYsDuGtIDZY7Gj7g4oxPKp giMCjl3ocZTbqmVQGZgoE2q+bcHkjbXy32CHTqg/blnAS/xxtCvgglLM92pAZ0yHtycegH2w 3+CNUbqFh/dL5nUUtDPpZzfSKWMB27ffueChPlHb2gLtBDB07w
X-Talos-CUID: 9a23:ytW6emMmkaWGDu5DSiU98WwaQsYefyf//m7iGGSTEzpNV+jA
X-Talos-MUID: 9a23:+2WbtgXiWNgpPKnq/DnKiHZ6M+FH2L6VEWkTuplbqeqGHBUlbg==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="6.03,237,1694728800"; d="scan'208";a="187991519"
Received: from 153-97-179-127.vm.c.fraunhofer.de (HELO smtp.exch.fraunhofer.de) ([153.97.179.127]) by mail-mtaDD25.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 19 Oct 2023 17:42:08 +0200
Received: from XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) by XCH-HYBRID-03.ads.fraunhofer.de (10.225.9.57) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.27; Thu, 19 Oct 2023 17:42:08 +0200
Received: from DEU01-FR2-obe.outbound.protection.outlook.com (104.47.11.168) by XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.27 via Frontend Transport; Thu, 19 Oct 2023 17:42:08 +0200
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=G6qh9cqq0cTkBaaN0i/wD+AmPmUHVE/VjU5VxcUlazkaqY3pCcOlCIT6jihtPXAD6XyinfiKqLbzhRRAqqN3VJafi4/+rfZ6mTv3ipjzq6qG/LBH1Cyv3RUBPPjIhluS5C5tCxsdV9wSEvLv0q13/x2K5hShw0MPhOqpnrjdIeIf9Hy20wwwitgipvIwVr0VvwDCg20xjuuuU+awmHYCvcJLIH/tMT2O4EQ/wMMeScp55omL1Du5QGHJ3uD0mDyv7ZHG3eO2J9mHPgbddtwV772Caynm/e2+Sle1vCpc+8EqWfy04k+3xSWfKyhuYQ/K9lPXEskEbFGHG+ujRsTRdQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=sVKzdkw+TPX+ZtBrFHRNl7t1lKTZyywAlACP6YXldYo=; b=GXnhj/RZXHp2IDKiCcXiQ74zQA9e3C4212oLGHeLv9ByY9zISdtK9zbjyi4VDMJO22HiuF7A6AOOue2VrsGBaTclqrD4k0ktf1FqFsoCHXGgYO8A3WTDA9ZSVlDet7UmyKiGtP98nfzJq/c+/9BzWYGpnC3pArAXt6L7yzZIErLjh7lIr78v7zxeEqXtRswZWD1FvNjg2hDTr2nAt//UNZyY5hiJ44d5agqEA13WdLByTu2/5C4Q0ww+1eXql95bE9k9IDBe640HmC7MQUHxJ3Gas9M6Xfj8EvohBRsheHxD4eqMZcS1gu1M2BT09Z/J6uJfCLm791H9AYBDqAz23w==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=sit.fraunhofer.de; dmarc=pass action=none header.from=sit.fraunhofer.de; dkim=pass header.d=sit.fraunhofer.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fraunhofer.onmicrosoft.com; s=selector2-fraunhofer-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sVKzdkw+TPX+ZtBrFHRNl7t1lKTZyywAlACP6YXldYo=; b=BMX2QH30vKf1W+47NYvSiNTnhQG/hM/pYE5PhBy4UYqhF5i2EM8meZ+ffjGhIMXI/UtSCTdYn60p//eebrRBgBFJgRP21CtCXA1Qtyh/UXcfXmNfgzpIpCnN0KhacnfcYOvQLa5xH0b+OM2Q3tcuEAtdpavMg3+gZOsf4rKu4TA=
Received: from FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:4c::8) by FR0P281MB1529.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:82::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6907.24; Thu, 19 Oct 2023 15:42:07 +0000
Received: from FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM ([fe80::137f:9ae5:a4ef:253a]) by FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM ([fe80::137f:9ae5:a4ef:253a%7]) with mapi id 15.20.6907.025; Thu, 19 Oct 2023 15:42:07 +0000
Message-ID: <0f725322-7c64-2fd7-83c1-cd0797a2133c@sit.fraunhofer.de>
Date: Thu, 19 Oct 2023 17:42:05 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.11.0
Content-Language: en-US
To: Denis <denis.ietf@free.fr>, "spice@ietf.org" <spice@ietf.org>, Orie Steele <orie@transmute.industries>
References: <ff63d927-3a46-46c5-1e4d-05459836d01d@free.fr>
From: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
In-Reply-To: <ff63d927-3a46-46c5-1e4d-05459836d01d@free.fr>
Content-Type: text/plain; charset="UTF-8"; format="flowed"
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: FR5P281CA0057.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:f0::15) To FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM (2603:10a6:d10:4c::8)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-TrafficTypeDiagnostic: FR0P281MB2879:EE_|FR0P281MB1529:EE_
X-MS-Office365-Filtering-Correlation-Id: 5461d693-8b20-41ff-2b34-08dbd0b9f31e
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230031)(346002)(136003)(376002)(366004)(396003)(39860400002)(230922051799003)(451199024)(64100799003)(1800799009)(186009)(41300700001)(2906002)(53546011)(31686004)(6512007)(6506007)(8676002)(8936002)(5660300002)(3613699003)(30864003)(44832011)(83380400001)(966005)(26005)(6486002)(66556008)(66574015)(2616005)(66946007)(316002)(110136005)(38100700002)(82960400001)(478600001)(66476007)(86362001)(31696002)(66899024)(43740500002)(41080700001)(45980500001); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: F1mih7bIHQCbg/pAnQaGD3ZXRHUup4eEBIEyUiJ4tzBOw2D66PKQVivNeUVYY7g0bKYunfFjKFkaBA2t9DoEQ/M4tbyAqC6HoFIqEnC5bcl096sECtjPJp1kfbXIQJnfmmO1wqcd7PB4CyYjM5J9CiCq+79fQ9MlC9+7ulW9taLGpkpiVSMBHMum/073QJIszEny/suoYkw2UabDE/ut/8dE5KEzoIVutcTkdI6fPgmG7EPoDNOQZtmd8DZ7w92yNCYNaTC9jw7XwasQTyGxXa8vaySO07JpVNjACWhZVjyNox50qOPSvIlZ171ciWayDOvX9oK0kujPwRkEhmWP+9ee3KX0Q6IzmBQhQjTPL8ezK4bVjgM+WtVVVinTftirioa24tALtsEletjeK/+sUsC1u+iDEykQ0HVGybz1/GGkLtHekwlP3lbp1IW6Rz7UAA46+/hmiAQjE1XUDMA4CXPsiNFUVqw9LUw6MlmcG6WLUC3pLwcexargX54bkihVzFw26h2ptrZOVa3/NOEdw6E3jnxgRNUAXExzU0+uu9qkAsEhNrdGg94k0c2+rGNeJO2HKuMelCpNHy6EiggfVTtcoze/u+slooHpG4kqwAQDib0P/UGgC+sQyxUwcrZUCENVGYiz4TV2nEhTsjEOFg/IjLg3sFfJ0gzRWAib60ym7UPXgzE9rgU4RcFA6h3ZxwbVTPhsK1bot1oBX/AUqDzD1xLRqqazyTk/A1VcBZmwq1msDpNKTUQ1yi1mjK+T7ug/EPkX7ltOIuWnlBmSjNcbAXkKrtvafA8zNWYr9S/SCliguPO+QU9gVkPJKDPPeIXNeyYuicqpQ9USfyq85kpQxLEBuohpq+D/fdWCMPOh0kNv40FhLdNxwCe22R545AQIML2VhEGdJcDzvX8OBkC9tU8ab4+y7GiLqLfeGx+o7Z5hJkavKAngA22ZtYkFnwgnml/yppPv/LHyFYI3oh11iKacGT5L2OhkU53RILzpwBiglric4WztPMyVAK92tZh9Lam6+V5mfgiGI9o7lNDqfVmjDb8i2Qq0htohYUI5OmRqRpVyyy2VNhgo3kvhOEOrlw1VshYMSqYrfMAWbYeJvauR/M5uF3DreD3t25mj/Yvgt8t/Uu5XUiRB32a8WY+EnhTEB5fMklioo0K8nra7zU2QwBnNaqvH0+qZlESsJaCHFzrArpcjJh4xMn1kndlxfwZ+VmGkxtp/7k20JSW/yGZ9bClYzkpN58uqGy/JW6KFbcO+pXEYigolYMXerdohfZ4GZidm6MHTavpE1RzbCpQGgqHRyy7wqNnvjImc/Bg4q3aKrat8pkJaI8j4Xhyenk89x7C1UV1zPpSzsssXQOCPOZHIf2z8EpI1gWQ7ZMuVbzhg93fmBcfciBWtKLu85vII2oVWGVr5gjPj4qHfoof0e/GcTDeIYyuAUBziYC+gJRdC8gUAwiU7ouuh8BRyX9nN9UkSNULyT9hI/p967X2FYYpPuJKLsvSLxPkFBNa6G5v0n/HnVXPU685PpbrFMlzQWdJWpx29WruHjMVbi89dKF/3YGXxU3P+Xza4ATJ3Fe127Sl5mzZ7ThV+8Qk39PkSVUVe+JiG5MecB86L5Vgoc+p7+FPsrBrBZ8A=
X-MS-Exchange-CrossTenant-Network-Message-Id: 5461d693-8b20-41ff-2b34-08dbd0b9f31e
X-MS-Exchange-CrossTenant-AuthSource: FR0P281MB2879.DEUP281.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 19 Oct 2023 15:42:07.0639 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f930300c-c97d-4019-be03-add650a171c4
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: O2YklLyc6pFNC9hAfVfEj+Ln68shXpqxLRCAhRsdYCs3lzMsswfvaq6mA0CmdO4B/gE+Z0RSW+ee8DQsuI3OC9Mtqt5mM6Pvc3fI5Q4CJoU=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: FR0P281MB1529
X-OriginatorOrg: sit.fraunhofer.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/spice/xKsau9mGxHFPAF53jYPoxl0Gbng>
Subject: Re: [SPICE] Charter proposal for a Working Group
X-BeenThere: spice@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Secure Patterns for Internet CrEdentials <spice.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/spice>, <mailto:spice-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/spice/>
List-Post: <mailto:spice@ietf.org>
List-Help: <mailto:spice-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/spice>, <mailto:spice-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 19 Oct 2023 15:42:22 -0000

Dear Denis,

thank you for your thoughts on charter scope and content. We think we 
incorporated some of your conceptual topics via the response to Roman's 
charter review. Please find detailed replies in-line.


Viele Grüße,

Orie & Henk

On 14.10.23 16:06, Denis wrote:
> 
> Below is a new charter proposal constructed along three sections:
> 
> - Background,
>      - Goals,
>      - Program of Work.
> 
> It is an incomplete proposal, since it does not include a section about 
> milestones.
> 
> It uses the following terminology:
> 
>        - "digital credential" which is equivalent to "VC" in the VCDM2.0 
> from W3C (with a definition of this wording).

We adopted this language and provided a definition in response to 
Roman's feedback.

> 
>        - "proof token" which is equivalent to "VP" in the VCDM 2.0 from 
> W3C (with an explanation of this wording).

We comment of JWP / JWT / CWT when discussing the use of existing IETF 
work in the current charter version.

> 
> 
> *Charter for Working Group *
> 
> *Background*
> 
> Wallets are resident applications placed in a smart phones. They are 
> already in use today, mostly for payments purposes,
> with smart phones equipped with NFC (Near-field communication). NFC 
> allows wallets to be used either in an offline
> or an online mode. Their usage is currently being expended to support 
> digital credentials intended to be used both
> in the public and private sectors.

We don't think that end user devices or platform specific details are 
necessary to address the architectural design goals of digital credentials.

> 
> In this kind of environments, a "three roles model" is considered. It 
> involves: an Holder, an Issuer and a Verifier.
> An Issuer delivers to a user (i.e. an individual) upon his request one 
> or more digital credentials.
> 
> A digital credential is a set of tamper-evident claims and metadata that 
> cryptographically prove who issued it.

We call this out as a desired property of digital credentials in the 
current charter, among others.

> 
> When a user has gotten a digital credential, then he becomes a Holder. 
> An Holder that has received one or more digital
> credentialsfrom one or more Issuers places them into a wallet, 
> associated with one or more cryptographic keys.
> 
> An Holder transforms one or more digital credentials into a proof token 
> which is then presented to a Verifier
> which is usually a service or a goods provider.

RES: This will likely need to be addressed in the architecture document, 
we think the current charter text is consistent with your suggestion.

> 
> Different actors are already working on this topic, in particular W3C 
> which has specified a "Verifiable Credential Data Model"
> VCDM 2.0. This year, the EU has launched various experiments before the 
> issuance of a final version of the eIDAS 2.0 Regulation.

We removed some commentary on this topic at Roman's request.

> 
> *Goals*
> 
> Some verifiers may require the disclosure of more personal information 
> than strictly necessary in order to allow a user
> to perform a given action. It is intended to help users to select and 
> give their consent about the personal data
> they wish to disclose to a verifier, using a digital credential format, 
> a proof token format and a protocol that the verifier
> and the wallet jointly support.

Agreed, topics such as this will have to be addressed in the privacy / 
security considerations sections of the architecture document.

> 
> While a digital credential contains a set of claims about a user, the 
> wallet should be able to selectively disclose
> a subset of these claims and obtain the user consent before building and 
> sending a proof token to a Verifier.

Same comment regarding the architecture document, we don't think this 
level of detail is appropriate for the charter.

> 
> Claims may be general claims such as : given_name, family_name, 
> middle_name, nickname, preferred_username, email, email_verified,
> gender, birthdate, phone_number, phone_number_verified, address, but may 
> also be sector specific, e.g. for healthcare or education,
> or professional claims like professional qualifications or positions in 
> a company like roles or group memberships. It is intended
> to allow the inclusion of sector specific claims into a digital 
> credential but to let external actors specifying them.
> A goal is to be able to use digital credentials both for C to B and B to B.

This seems to be questioning how private claims vs. registered claims 
function. Addressing this is a goal of the architecture document.

> 
> A concern is whether different Verifiers will be able to link the proof 
> tokens they receive to the same user.
> While such linkage may be desirable between servers belonging to the 
> public sector, it may not be desirable for the private sector.

This is verifier / verifier unlinkability, its best commented on here: 
https://github.com/oauth-wg/oauth-selective-disclosure-jwt/pull/354

> 
> One goal of the work is to be able to support both cases, i.e., either 
> unlinkability or linkability. The revocation of digital credentials
> will be considered for both cases: when supporting the unlinkability 
> property and when not supporting it.

Agreed. See the OAUTH definition in the link above, which we feel is 
state-of-the-art at this time.

> 
> An important use case is to be able to demonstrate that a user is above 
> an age limit without disclosing his date of birth,
> nor its age, nor one or more claims that would allow verifiers to link 
> user accounts. In this use case, it is necessary to prevent
> collaborative attacks between users, e.g., where Bob who is 25 would 
> transfer to Alice who is 12 a proof token demonstrating
> that he is over 18 and, as a result, Alice would be able to fool a 
> Verifier by demonstrating that she is over 18.
> This security issue will be addressed.

This is too much detail for a charter, but could be addressed in the 
architecture document to some extent, potentially.

> 
> Proof tokens may use either asymmetric cryptography or zero-knowledge 
> proofs (ZKPs). One goal is to allow a co-existence
> of asymmetric cryptography with ZKPs as well as a smooth transition from 
> asymmetric cryptography to ZKPs.
> 
> While ZKPs allow to support selective disclosure and (if properly used) 
> the unlinkability property, they allow a wide range
> of possibilities, e.g., to proof of knowledge of something without 
> revealing the something (e.g. a signature value),
> to support predicates that allow verifiers to check a claim value 
> against a certain condition without disclosing the value of the claim,
> to check whether a claim value is either a member of a set of values or 
> is not a member of a set of values without disclosing
> the value of the claim. One goal is to be able to support such kinds of 
> ZKPs.

Agreed, but again too much detail on the solution and we have included 
relevant references in the current revised charter text.

> 
> *Program of Work*
> 
> The WG is expected to develop:
> 
> (1) A framework for the three-roles model (i.e., Holder, Issuer and 
> Verifier) and additional components for the support
>      of this model in the context of digital identity wallets (as an 
> informational document).
> _
> _ _Note_: The framework will allow to define and stabilize the 
> vocabulary and to identify which interactions may take place
>            between the components and which kind of metadata should be 
> made available by Issuers and Verifiers.
>            The Framework will not define the syntaxes to be used.

Yes, we feel the architecture document will do this, while also defining 
the desired properties of digital credentials.

> 
> (2) Standard Track documents to define one or more digital credential 
> formats and their associated cryptographic keys.
> 
> _Note_: It is possible that a format able to natively support the 
> unlinkability property will be different from
>             another one that does not natively support the unlinkability 
> property.

Yes. See revised milestones.

> 
> (3) A Standards Track document for protocols allowing a candidate-Holder 
> to request to an Issuer a certain digital credential
>      using a wallet and then to receive it so that it can be stored into 
> the wallet and associated with a cryptographic key.
> 
> _Note_: EAT (Entity Attestation Token) developed by the RATS WG 
> (draft-ietf-rats-eat) is likely to be a candidate
>             to be used within this protocol.

No. See the desire to keep protocols out.

> 
> (4) Standards Track document(s) specifying Metadata associated with 
> Issuers and Verifiers.
> 
> _Note_: Metadata associated with Verifiers may be made public or only be 
> made available at the time of an action
>            that an Holder is willing to perform on a Verifier.

Yes. See the identity document proposal in current charter work items / 
milestones.

> 
> (5) Standards Track document(s) for allowing an Holder to build a Proof 
> Token from one or more digital credentials
>      and then to communicate it to a Verifier.

Yes. See revised milestones.

> 
> (6) Guidance for the revocation of Credentials while supporting or not 
> the unlinkability property between verifiers
>      (as an informational document).

Yes, although this is probably best addressed in architecture and then 
referenced from the "token formats" Internet-Drafts, to comment on the 
Issuer/Verifier vs Verifier/Verifier implications, also coordination 
OAUTH which has adopted status list mechanisms that might be used with 
the other work items adopted by OAUTH.


> _
> _ _Note 1_: It is anticipated that the support of the unlinkability 
> between verifiers will mandate specific characteristics
>              for both the wallet and the smartphone used by the Holder 
> which are wallet, RichOS and device specific.
> 
> _Note 2_: It is anticipated that the status_list extension draft from 
> the OAuth WG will be usable when the unlinkability
>              property is not required.
> 
> An informal goal of the working group is close coordination with the 
> JOSE WG, OAuth WG, OpenID Connect and the IRTF CFRG
> that has made available a draft on BBS+ signatures 
> (draft-irtf-cfrg-bbs-signatures-latest)

Yes, we believe this is reflected in the current text.

> 
> Denis
> 
> 
>