Re: [Suit] Manifest-07 review

Brendan Moran <Brendan.Moran@arm.com> Wed, 24 June 2020 13:42 UTC

Return-Path: <Brendan.Moran@arm.com>
X-Original-To: suit@ietfa.amsl.com
Delivered-To: suit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D65C93A0DC3 for <suit@ietfa.amsl.com>; Wed, 24 Jun 2020 06:42:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=S9pIEx9v; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=S9pIEx9v
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ljO5bHCXSXiN for <suit@ietfa.amsl.com>; Wed, 24 Jun 2020 06:42:26 -0700 (PDT)
Received: from EUR05-VI1-obe.outbound.protection.outlook.com (mail-vi1eur05on2046.outbound.protection.outlook.com [40.107.21.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8B6E93A0DDD for <suit@ietf.org>; Wed, 24 Jun 2020 06:42:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zDyG/HIggbd4Suhk88rt+M9sDhwGAnPiHQ6YCJeQGuw=; b=S9pIEx9v9iVhW4waszyGFhdBZwbL/zpkSsyxHfoTFJ8um77lkVqBw4BC6KUB/DhK+9ytpq2eMZWD1XuodLh3Flw/Z75LSyNCndD3s2VQb8vN2XalqdW7Ky85zVO0KPdux/z93F3PNei3WdsXZj9tGe7j/n+GXDDyqaEQXny47wI=
Received: from AM5PR0402CA0018.eurprd04.prod.outlook.com (2603:10a6:203:90::28) by AM0PR08MB4035.eurprd08.prod.outlook.com (2603:10a6:208:134::33) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3109.21; Wed, 24 Jun 2020 13:42:17 +0000
Received: from VE1EUR03FT003.eop-EUR03.prod.protection.outlook.com (2603:10a6:203:90:cafe::a4) by AM5PR0402CA0018.outlook.office365.com (2603:10a6:203:90::28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3109.22 via Frontend Transport; Wed, 24 Jun 2020 13:42:17 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; ietf.org; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;ietf.org; dmarc=bestguesspass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com;
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by VE1EUR03FT003.mail.protection.outlook.com (10.152.18.108) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3131.20 via Frontend Transport; Wed, 24 Jun 2020 13:42:17 +0000
Received: ("Tessian outbound 217a52b9caed:v59"); Wed, 24 Jun 2020 13:42:16 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: 8028a47bb805f689
X-CR-MTA-TID: 64aa7808
Received: from 86a3aa697460.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id A3B98D8B-5FE1-4EE0-A85D-10E7F59AE5A4.1; Wed, 24 Jun 2020 13:42:11 +0000
Received: from EUR04-HE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 86a3aa697460.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 24 Jun 2020 13:42:11 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=hL/1MnQRSXAtScxcri04iifrI0F+zWcJrsiJL3LDgJQzr2c9aNTDssklEdsUjbgJmeNQCv7wfh10xgmCQ9GouIPouvOXI6gZqe91d5TaUFCZl24O0+It3nqWHzc1ixYRexWg0KbHrki7TCT54duWsNezxN7XcxoIMnodRdGznSw9e7Ftl/LqrtI9/hLeWaNJ91S18ReR3CS/C0UeP5VsX2WPyFlDwztLRrkbiDGOgWBtjPlBgGYMBzQ1JAJ+vNbUMYedYkp+QLPNVzISLOHZofbV/gXar2yYsv0FsaiFP9squcE76Z0aHVUWIll48FF97oKeU5djUV8JaU2TQd+i/g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zDyG/HIggbd4Suhk88rt+M9sDhwGAnPiHQ6YCJeQGuw=; b=F+SHep59Aqjaw3zeD2qp3SODe4vC08eR1YRUs0coM0/fEwF5Q0AhZ0iOYcZO/JIO7KVLH8x1lBHDom3e7qgYGtnbDi6LOAsYlFPITP6A1cC6FS6PvPs9IocgazwfxgUZqx+IbjR5ZBkk78s4OW0tD3x6dcV4MAxI9bS2dahRszBEN0fhtlxzbKboXlqbfl+lPaWfcc5rjXMXc0gjtZ4C+hoVuTptNUMedg4ARfUPQhU49gsBWdnTzkiacR85FjKBFubhHVKuUWQAEDiVkW/iImP4EiV6GLxh1NgHRnmMAw1d45p/OYKKC2Kd1DjQf3HvXx3MdsTt93nGz9WZM0vb/A==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=zDyG/HIggbd4Suhk88rt+M9sDhwGAnPiHQ6YCJeQGuw=; b=S9pIEx9v9iVhW4waszyGFhdBZwbL/zpkSsyxHfoTFJ8um77lkVqBw4BC6KUB/DhK+9ytpq2eMZWD1XuodLh3Flw/Z75LSyNCndD3s2VQb8vN2XalqdW7Ky85zVO0KPdux/z93F3PNei3WdsXZj9tGe7j/n+GXDDyqaEQXny47wI=
Received: from AM6PR08MB4738.eurprd08.prod.outlook.com (2603:10a6:20b:cf::10) by AM5PR0801MB1682.eurprd08.prod.outlook.com (2603:10a6:203:2e::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3131.20; Wed, 24 Jun 2020 13:42:09 +0000
Received: from AM6PR08MB4738.eurprd08.prod.outlook.com ([fe80::208a:431d:b171:9615]) by AM6PR08MB4738.eurprd08.prod.outlook.com ([fe80::208a:431d:b171:9615%3]) with mapi id 15.20.3131.020; Wed, 24 Jun 2020 13:42:09 +0000
From: Brendan Moran <Brendan.Moran@arm.com>
To: Dick Brooks <dick@reliableenergyanalytics.com>
CC: "Waltermire, David A. (Fed)" <david.waltermire=40nist.gov@dmarc.ietf.org>, Øyvind Rønningstad <Oyvind.Ronningstad@nordicsemi.no>, suit <suit@ietf.org>
Thread-Topic: [Suit] Manifest-07 review
Thread-Index: AdZJ/dxWDAt2IAgGSk6bbwUyoDHNSgALZjZAAAA5wQAAADlfgA==
Date: Wed, 24 Jun 2020 13:42:09 +0000
Message-ID: <54E7F290-B43D-4D72-9E8C-DE1B7E74F03E@arm.com>
References: <AM0PR05MB4339D51F857444D08ECAC41888950@AM0PR05MB4339.eurprd05.prod.outlook.com> <CH2PR09MB425136BCE8E859DFBED017DCF0950@CH2PR09MB4251.namprd09.prod.outlook.com> <1cd0f01d64a2c$5e98ffb0$1bcaff10$@reliableenergyanalytics.com>
In-Reply-To: <1cd0f01d64a2c$5e98ffb0$1bcaff10$@reliableenergyanalytics.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3608.80.23.2.2)
Authentication-Results-Original: reliableenergyanalytics.com; dkim=none (message not signed) header.d=none;reliableenergyanalytics.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [82.20.19.206]
x-ms-publictraffictype: Email
X-MS-Office365-Filtering-HT: Tenant
X-MS-Office365-Filtering-Correlation-Id: 26056ef4-b918-44d8-5213-08d818446907
x-ms-traffictypediagnostic: AM5PR0801MB1682:|AM0PR08MB4035:
X-Microsoft-Antispam-PRVS: <AM0PR08MB4035BC8C44DB4DE44AC2F29AEA950@AM0PR08MB4035.eurprd08.prod.outlook.com>
x-checkrecipientrouted: true
nodisclaimer: true
x-ms-oob-tlc-oobclassifiers: OLM:8273;OLM:9508;
x-forefront-prvs: 0444EB1997
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: EcCu5S2crAqhfIhelQ19nF7PXV3F2Z1W+ipmFec9u+Mz3h8XqrmqH7yyDz/jR8TWsYSdLUAuOwLDDOp8XgHn1dVIo5+y6Osk5hZfB2S6NMZ7YuI4SfRTsMzy78o0DKnof0mL6YTxlG6YFOVm3HmYlVHdPLyO6s52gW8mAmDi8DaiAbAI7h9xjHf9323jcipWt/NxAwRt5ONLbYT/UhNNYaRS3mbP9SRlrY2R2xLasHJdENwxBU/Tv4z0JE0DGHdjuhaFHM2eN6EWGibrn8Rm1FJC5wFXuyKccgROKioiAZqQTdZPimoZ/LgXyAVrrW4DAT3MaguYkLXtVLA7XxL5tMAsq3T/8PWLtypYK4JCNlKiLe7SdJ0yicNA1aEPHqA0uoPJwQlo1fn5zHCBSwpbgg==
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AM6PR08MB4738.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(4636009)(136003)(346002)(376002)(366004)(39860400002)(396003)(8676002)(186003)(76116006)(8936002)(6512007)(66946007)(91956017)(83380400001)(2616005)(6916009)(64756008)(66574015)(66446008)(5660300002)(66476007)(316002)(83080400001)(26005)(66556008)(86362001)(966005)(6486002)(71200400001)(36756003)(54906003)(4326008)(6506007)(33656002)(53546011)(2906002)(478600001)(45080400002); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: F/7O5hmglDkZqzNTHKCLFvQqddvyrPBTbyAnLZPA7ml0sTh5yWK5rSdt3MYsYNWTOgHKLZ8v8Ec/Q+oXdHZt/CY9rdXcLenbY1rsfC3XlxTXY6qtxDU/h0EpjtfAwtCb7Si84XvyyRper86jNnWP+LdiXVMlVeUB9dR1b2trS/Xqy99iaMBc256LCNnGj63yGt3aVVAS0Avv2e7WSmyirlvUqLex4SKxaEmRYLDgwa169Ne/hbeBjTpTj7tTYw+J/1BfIdVb6QvhjBQyBCZ24NvmmRrKBj1M5tfNtOVUJAfz+v3DcDYVTzn+MqAGTEbf5cFMqlzD6nHz20BSR4q0Er+uDzp2HfDrCJ7rpqQ9WZCUSnNTQH/5wVxFCAfvVR5+33EEvwbEir3hCiZnK2bHK5NwapMABdIk/QmfFvLMyhxwe9IA4Usz4hmp1U2SIQI8DObsI/p2jshQAiw1X2stKckiJ/XNEwCyLXcv0TRiL78=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <BBF8FD34FA512F40BB573571F83A5203@eurprd08.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0801MB1682
Original-Authentication-Results: reliableenergyanalytics.com; dkim=none (message not signed) header.d=none;reliableenergyanalytics.com; dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: VE1EUR03FT003.eop-EUR03.prod.protection.outlook.com
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFTY:; SFS:(4636009)(136003)(396003)(39860400002)(346002)(376002)(46966005)(70586007)(33656002)(2616005)(70206006)(26005)(47076004)(86362001)(53546011)(6506007)(6486002)(6862004)(186003)(356005)(45080400002)(5660300002)(478600001)(966005)(36756003)(316002)(2906002)(82310400002)(8936002)(66574015)(36906005)(82740400003)(81166007)(54906003)(8676002)(6512007)(336012)(83080400001)(83380400001)(4326008); DIR:OUT; SFP:1101;
X-MS-Office365-Filtering-Correlation-Id-Prvs: 225ac406-64e6-4ca9-f72b-08d81844647f
X-Forefront-PRVS: 0444EB1997
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: +C/M9bF524lsCcYd7GtksHQytoR8f7Y/W1K4yYwePtkhtxhyLBcK1vXwhyRZC4v0+kgXzzarjfxUU1Bqlaez9V972NqFAiUv+Jl/3OJj4lU/testg12emuw3DZtraiCwf+8Nk+nD7onvYfxAs/JFY/VaouI+m7ktnZecsQqBvDwEPDb5yz2vpxMTJmU3jbUs3HAoTk489sw6xVroTrNlCLQe5DbvLIj9mB86k4w3GzZzhNWnhEMTx1yM/MRk3D4Jz/pFMD/XXkiFq0kMai5eHJwG1l9qStH3xSsEDDWu62emc5b9zGIerIq8SjMMv+TdGqu6w7NbPOWIyh3OyDif1jcGmpOdWox8TiXsmga65pDhFqJUIW/nvp8No6RdTzcD14oH54ESXsc+pAH/RMsOmEub91UcKpbjVLJ3EzUft7+hrD5WDzp5DJqDyDeofzpD4CrmNMRctgSMTmqYYs/20sl9/22+3rpPjUoOiiTyM/k=
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 24 Jun 2020 13:42:17.0336 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 26056ef4-b918-44d8-5213-08d818446907
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB4035
Archived-At: <https://mailarchive.ietf.org/arch/msg/suit/LJLi4zmq_0JuMqg0WtoMA-cgovA>
Subject: Re: [Suit] Manifest-07 review
X-BeenThere: suit@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Software Updates for Internet of Things <suit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/suit>, <mailto:suit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/suit/>
List-Post: <mailto:suit@ietf.org>
List-Help: <mailto:suit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/suit>, <mailto:suit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 24 Jun 2020 13:42:28 -0000

The intent is to register a CBOR tag that identifies the manifest envelope. This allows detection of manifests by signature in the first 2-3 bytes. A typical filename extension would be fine. I think the most suitable suggestion would be “.suit” if that suits the working group. We’re past the days of 3 letter extensions now, right?

Best Regards,
Brendan

> On 24 Jun 2020, at 14:35, Dick Brooks <dick@reliableenergyanalytics.com> wrote:
>
> Are there plans for a standard file naming nomenclature to identify software
> objects that contain a suit manifest?
>
> Today, I use the filename extension to drive an introspection procedure to
> generate an SBOM and having a defined filename extension to indicate that a
> suit manifest is present would help, otherwise I have to parse each file to
> determine which SBOM introspection procedure to invoke.
>
> Thanks,
>
> Dick Brooks
>
> Never trust software, always verify and report! T
> http://www.reliableenergyanalytics.com
> Email: dick@reliableenergyanalytics.com
> Tel: +1 978-696-1788
>
> -----Original Message-----
> From: Suit <suit-bounces@ietf.org> On Behalf Of Waltermire, David A. (Fed)
> Sent: Wednesday, June 24, 2020 9:30 AM
> To: Rønningstad, Øyvind <Oyvind.Ronningstad@nordicsemi.no>; suit
> <suit@ietf.org>
> Subject: Re: [Suit] Manifest-07 review
>
> Øyvind,
>
> Thanks for this review!
>
> Dave
>
> -----Original Message-----
> From: Suit <suit-bounces@ietf.org> On Behalf Of Rønningstad, Øyvind
> Sent: Wednesday, June 24, 2020 6:03 AM
> To: suit <suit@ietf.org>
> Subject: [Suit] Manifest-07 review
>
> Hi guys, here is a review of manifest-07. Mostly small stuff.
>
> Questions:
> .... Section 6.4: What are the guidelines for extracting the vendor-id,
> class-id, device-id, or version of a component?
> .... Suit-condition-component-offset is used in an example, but marked as TBD
> in its section. I see that it is described in 6.4 as
> "assert(offsetof(component) == arg)". What are the semantics of "offsetof"?
> .... Can suit-directive-process-dependency be done on a component, or just on
> a dependency? Generally, there seems to be some mismatch between the
> description in 6.4 (which implies that most directives and conditions only
> apply to a component index) and textual descriptions e.g. in 9.8.4.1 and
> 9.8.4.2 (which imply that directives and conditions apply to whichever is
> available of component index and dependency index).
> .... (It would be very beneficial to make 6.4 "Abstract Machine Description"
> more prominent, e.g. by linking from the individual section for commands,
> since 6.4 contains very useful info about how the commands work, and it's
> hard to discover otherwise.) .. What (if any) are the rules regarding when
> to perform dependency-resolution, payload-fetch, and install, and when to
> perform only validate, load, and run?
> .... suit-manifest-sequence-number: "Each Recipient MUST reject any manifest
> that has a sequence number lower than its current sequence number." Are
> there several "current sequence number"s or just one for each SUIT
> processor. Exactly when is the "current sequence number" updated?
> .... What should the processor do when waiting on a suit-directive-wait? Can
> it be interpreted as "try again later", or "busy wait"?
> .... There are important limitations to what sort of commands can be in
> suit-common. Could the limitations be reflected in the CDDL? It seems like a
> natural thing to do, to make the limitations more prominent.
> .... When processing dependencies, how do we know when to a) expect a
> signature and b) check the signature on a dependency manifest?
> .... Did we mean for short payloads to be embeddable in the manifest (I can't
> find this)? This would be very useful for setting configuration options via
> SUIT manifests.
> .... Is the device-identifier unique for each individual device, or for a
> collection of devices?
> .... Why are suit-directive-set-component-index and
> suit-directive-set-dependency-index not implemented through set-parameters?
> Are they subject to the same override mechanics? If not, it might be
> confusing with suit-parameter-source-component, which seems to be analogous
> to set-component-index, but might have subtly different behavior because of
> override mechanics.
>
> Nits:
> .... Suit-directive-fetch: "manifest-index" is not referred to elsewhere in
> the document.
> .... Section 7: Suggested edit in bold: "A digest should always be set using
> Override Parameters, since this prevents a less-privileged dependent OR
> dependency from replacing the digest."
> .... suit-condition-update-authorized seems like it could use some metadata
> to help determine what is being authorized, e.g. A human readable prompt if
> user interaction is required, or an identifier if multiple instances of the
> condition are used in a manifest.
>
>
> Thanks for the good work,
>
> Øyvind
>
> _______________________________________________
> Suit mailing list
> Suit@ietf.org
> https://gcc02.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.o
> rg%2Fmailman%2Flistinfo%2Fsuit&amp;data=02%7C01%7Cdavid.waltermire%40nist..go
> v%7C909e99a025494e915e6008d81825e30f%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%
> 7C0%7C637285898291416907&amp;sdata=Hww6iMALkbaHZQLb1VeYGCDfb7yrQGbpUbUa%2FD5
> u4Fo%3D&amp;reserved=0
>
> _______________________________________________
> Suit mailing list
> Suit@ietf.org
> https://www.ietf.org/mailman/listinfo/suit
>
> _______________________________________________
> Suit mailing list
> Suit@ietf.org
> https://www.ietf.org/mailman/listinfo/suit

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.