Re: [Tm-rid] 1st steps - time lines and drafts

"Card, Stu" <stu.card@axenterprize.com> Thu, 01 August 2019 14:28 UTC

Return-Path: <stu.card@axenterprize.com>
X-Original-To: tm-rid@ietfa.amsl.com
Delivered-To: tm-rid@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D262212000E for <tm-rid@ietfa.amsl.com>; Thu, 1 Aug 2019 07:28:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=axenterprize.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id arD_cc9GV5FY for <tm-rid@ietfa.amsl.com>; Thu, 1 Aug 2019 07:28:26 -0700 (PDT)
Received: from mail-io1-xd29.google.com (mail-io1-xd29.google.com [IPv6:2607:f8b0:4864:20::d29]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6E172120020 for <tm-rid@ietf.org>; Thu, 1 Aug 2019 07:28:26 -0700 (PDT)
Received: by mail-io1-xd29.google.com with SMTP id e20so11809003iob.9 for <tm-rid@ietf.org>; Thu, 01 Aug 2019 07:28:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=axenterprize.com; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=UOp9FGQ31SV7RE7cMtsFk2mpRy5ZMbVLgz5SMB5e3p0=; b=aczqj92fyaAloLeOyegVA0ZdbymWP8+sNV2rw0eZ9M8q6wnmtmiPMpx4eNyj6484xa 3fytoPqXLaHoHrKxPs3ezBvbqww9f4C/kWowW0g3z0zxNUj0S8P1TsS/3RflZqd9qgtC qes+jmGllG+x+tH9ZKGQiDc7kpf+TCp3DppRM=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=UOp9FGQ31SV7RE7cMtsFk2mpRy5ZMbVLgz5SMB5e3p0=; b=db69ktKsi7IK7frtEEPHjKJzcd9PPsFBb03vx7QmDlgzMMEf8U1HHBz/BCaIYTDee8 cS6zMv0zRmZi8+CUrwE5CAeDbwojSQ7gZLYSDg2fKL6ShJiTbtL6aEJ5JNqjv1IgUfpq 8WzR7u+rSGzDFiXOSjFcsqX1U7lXxw1I4c3OnKM/7jyCSVmJ3TLtlVE0m4wRuU5NfphZ fYcoIWzAUvmYvy9dAkd+awTLZfjaYATCVc5J6Jw2uIZTyuORmQj0B70KFhcC14tQV2U9 77idgwpkoGoITqUqX1ioIwP0slwothNF19v4vTbkBL0BrlJ1gwVqBIUg/grquWsdtT6i MfQw==
X-Gm-Message-State: APjAAAVptudwK6EmFXO6znrteB7azYCv6el6xaME6cretJdKqBo5tG2Q FzpIIyouT4+dF6ufupa/f+U2WXeEUt4QO+OGEwD1+DV6RHo=
X-Google-Smtp-Source: APXvYqw689oS6loTdqziRdq3244T/ZqzXZYG1GpDXIh0fKb2fW8oxYJ27usv+MlPOS+1zmb5W4U0m5KR4GJEBOw/j+M=
X-Received: by 2002:a02:85c7:: with SMTP id d65mr19332152jai.8.1564669704935; Thu, 01 Aug 2019 07:28:24 -0700 (PDT)
MIME-Version: 1.0
References: <30eb80bc-8f7a-e550-d081-547b8bf0dbed@labs.htt-consult.com> <41dbac5b-0c59-e470-f1c3-933a9dbc14d0@labs.htt-consult.com>
In-Reply-To: <41dbac5b-0c59-e470-f1c3-933a9dbc14d0@labs.htt-consult.com>
From: "Card, Stu" <stu.card@axenterprize.com>
Date: Thu, 01 Aug 2019 10:28:12 -0400
Message-ID: <CAKM0pYNsj95RCnQAW7hggOfAQXRHCxXbC8JEUK_VNG3E8b1wXQ@mail.gmail.com>
To: Robert Moskowitz <rgm@labs.htt-consult.com>
Cc: tm-rid@ietf.org
Content-Type: multipart/alternative; boundary="000000000000f4378c058f0f0d54"
Archived-At: <https://mailarchive.ietf.org/arch/msg/tm-rid/btnMeKYgeiN6v_Vad_3AF7sIjHc>
Subject: Re: [Tm-rid] 1st steps - time lines and drafts
X-BeenThere: tm-rid@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Trustworthy Multipurpose RemoteID <tm-rid.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/tm-rid/>
List-Post: <mailto:tm-rid@ietf.org>
List-Help: <mailto:tm-rid-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/tm-rid>, <mailto:tm-rid-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Aug 2019 14:28:29 -0000

I like the generality & extensibility of CBOR, CDDL, COSE, COID, etc., esp.
as an attempt at future-proofing tm-rid.

I wonder, though, whether all their self-describing headers are too much
overhead for the severely constrained Bluetooth frames of ASTM's proposed
Broadcast Remote ID format.

IETF, as latecomers to the aviation community's party, should look closely
at what ASTM, FAA, ICAO, et al have already concluded or proposed, rather
than regard this as an entirely clean slate; although a truly compelling
solution might get them to change some of their thinking, as it has not yet
been issued as a standard or implemented by UAS makers (beyond
experimentally).

On Thu, Aug 1, 2019, 08:38 Robert Moskowitz <rgm@labs.htt-consult.com>
wrote:

> I have made some headway on planning and drafts.
>
> First I spoke with the AD for this effort: Eric Vyncke.  This work may
> more likely be a rechartering of HIP than an independent effort; no BOF
> in Singapore, just get to work.  Of course that means I have to get in
> gear and get the last 3 docs finish (well only 2 have my name on them)!
>
> This also has bearing on draft naming.  So for now the Hierarchical HIP
> draft will be:
>
> draft-moskowitz-hip-hierarchical-hip.  I hope to have 00 posted the end
> of next week.
>
> Part of timing is I realize that I should calf off the new crypto into
> its own draft.  This will be:
>
> draft-moskowitz-hip-new-crypto or something like that.  It will have:
>
> EDDSA
> SHAKE, cSHAKE, and KMAC.  I am looking at cSHAKE that it might be a
> better hash for making the HIT as properly parameters will mean that no
> truncation is needed.  cSHAKE (in my reading) will make a hash of the
> size you want.  More study needed.
> KMAC is a replacement for HMAC which is a big change for KEYMAT in HIP.
>
> One of the considerations will be the size of the sponge for the
> underlying Keccak function.  NIST specified a sponge of b=1600, but that
> is for large messages and parallel processing.  In HIP, everything is
> small messages and for this effort constrained systems.  A sponge of
> b=400 yields 128 bit strength and b=800 for 256 bit strength.  I have
> been told that NIST is working on standardizing these smaller sponge
> sizes, so I plan on using them to help move NIST along.
>
> Finally offering Kedje Jr as an alternative to AES use.  Note that this
> is a bit of a placeholder as NIST is working on such a small crypto
> cipher.  Or so I have been assured.
>
> You can see much of this in my draft-moskowitz-small-crypto, so I have
> text to pull into this new draft, I just have to work out the HIP
> parameters.
>
> There is plenty of work here for anyone that wants to lend a hand. Like
> on CBOR Concise Identity as an addendum to RFC 8002.  And is there value
> to use CBOR and CDDL in HIP?
>
> Bob
>
> On 7/25/19 10:29 AM, Robert Moskowitz wrote:
> > Greetings!
> >
> > Thanks to the FAA stating that they plan on the initial rule making on
> > RemoteID for UAS in September, 2019, the initial work on tm-rid is
> > extremely accelerated.  My understanding is if we have initial draft
> > documents we will then have some time for official RFCs.
> >
> > There will also need to be some level of interaction with ATSM that
> > has been generating RemoteID standards.  See:
> >
> > https://github.com/opendroneid/specs
> >
> > The IETF MAY desire to enter into an MOU with ATSM.  ATSM may want it
> > also.  Note that ATSM claims to be the oldest SDO around.
> >
> > The work (drafts) I see are listed below.  A charter for this effort
> > SHOULD be within the 1st draft listed.  I will be working with Stu and
> > Adam on a charter that we will display somewhere given that we are
> > pre-BOF here.
> >
> > We are looking for people interested in writing/reviewing.
> >
> >
> > ====================== Initial Drafts ========================
> >
> > Trustworthy Multipurpose Remote IDs in UAS
> >
> > draft-tm-rid-uas
> >
> > Abstract:    This memo defines the use of Host Identity Tags (HIT)
> > from the Host Identity Protocol (HIP) that can provide a
> > self-asserting trustable identity for Unmanned Aircraft Systems
> > (UAS).  The justification for trust in the IDs, generation and
> > registration of HITs, and use of HITs in UAS messages.
> >
> >
> > Trustworthy Multipurpose Remote IDs in Discovery Services
> >
> > draft-tm-rid-uas-ds
> >
> > Abstract:    This memo defines HIT based Discovery Services to obtain
> > both static and dynamic information about UASs.  These services will
> > implement access policy rules to limit what different entities can
> > learn and control of the UASs.
> >
> >
> > Hierarchical HITs for HIP
> >
> > draft-tm-rid-hierarchical-hip
> >
> > Abstract:    This document describes the structure of hierarchical
> > HITs to facilitate large deployments in mobile networks.
> >
> >
> > Registration Services for Hierarchical HITs
> >
> > draft-tm-rid-hierarchical-hip-registration
> >
> > Abstract:    This document describes the registration of hierarchical
> > HITs (HHIT).  It provides for registrar entities and how they can be
> > found.  It does not describe the policies that registrars must meet as
> > HHIT registrars. It may reference RFC7451.
> >
> >
> > New crypto for HIP
> >
> > draft-moskowitz-hip-crypto-update
> >
> > Abstract:    This document adds support for new cryptographic
> > algorithms and methods to HIP. e.g. EDDSA, KMAC, cSHAKE, SHA-3, Kedje.
> >
> > Note that Kedje is a sort of placeholder as NIST is still working on
> > the 'small' cypher that we want for this project.
> >
> >
> > CBOR formats for HIP
> >
> > draft-tm-rid-hip-cbor
> >
> > Abstract:    This document replaces the HIP TLV structures with CBOR CTW.
> >
> >
> > HIP as OAUTH method
> >
> > draft-tm-rid-hip-oauth
> >
> > Abstract:    This document adds support of HIP as an OAUTH method
> >
> > ============================================
> >
> > Thank you
> >
>
> --
> Tm-rid mailing list
> Tm-rid@ietf.org
> https://www.ietf.org/mailman/listinfo/tm-rid
>