[Uta] Agenda Items for Dallas

"Orit Levin (LCA)" <oritl@microsoft.com> Mon, 26 January 2015 20:53 UTC

Return-Path: <oritl@microsoft.com>
X-Original-To: uta@ietfa.amsl.com
Delivered-To: uta@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8BF651A0368 for <uta@ietfa.amsl.com>; Mon, 26 Jan 2015 12:53:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level:
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ykQVHyDSbzsB for <uta@ietfa.amsl.com>; Mon, 26 Jan 2015 12:53:33 -0800 (PST)
Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2on0142.outbound.protection.outlook.com [65.55.169.142]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7A1B81A1B69 for <uta@ietf.org>; Mon, 26 Jan 2015 12:53:33 -0800 (PST)
Received: from BL2PR03MB289.namprd03.prod.outlook.com (10.141.68.12) by BL2PR03MB131.namprd03.prod.outlook.com (10.255.230.23) with Microsoft SMTP Server (TLS) id 15.1.65.19; Mon, 26 Jan 2015 20:53:32 +0000
Received: from BL2PR03MB290.namprd03.prod.outlook.com (10.141.68.19) by BL2PR03MB289.namprd03.prod.outlook.com (10.141.68.12) with Microsoft SMTP Server (TLS) id 15.1.75.14; Mon, 26 Jan 2015 20:53:31 +0000
Received: from BL2PR03MB290.namprd03.prod.outlook.com ([10.141.68.19]) by BL2PR03MB290.namprd03.prod.outlook.com ([10.141.68.19]) with mapi id 15.01.0075.002; Mon, 26 Jan 2015 20:53:31 +0000
From: "Orit Levin (LCA)" <oritl@microsoft.com>
To: "uta@ietf.org" <uta@ietf.org>
Thread-Topic: Agenda Items for Dallas
Thread-Index: AdA5qYarZ5yV+OCVSY2A+AG0vFdLdQ==
Date: Mon, 26 Jan 2015 20:53:31 +0000
Message-ID: <BL2PR03MB2909DCD0F619A661BCD8883AD350@BL2PR03MB290.namprd03.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [2001:4898:80e0:ed43::2]
authentication-results: spf=none (sender IP is ) smtp.mailfrom=oritl@microsoft.com;
x-dmarcaction-test: None
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(3005004); SRVR:BL2PR03MB289; UriScan:;
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:;SRVR:BL2PR03MB289;
x-forefront-prvs: 0468FE4A2B
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(979002)(6009001)(51704005)(77096005)(122556002)(2900100001)(15975445007)(102836002)(46102003)(450100001)(110136001)(77156002)(33656002)(62966003)(2501002)(40100003)(99286002)(92566002)(86362001)(19580395003)(86612001)(2656002)(87936001)(54356999)(50986999)(2351001)(229853001)(74316001)(107886001)(76576001)(3826002)(969003)(989001)(999001)(1009001)(1019001); DIR:OUT; SFP:1102; SCL:1; SRVR:BL2PR03MB289; H:BL2PR03MB290.namprd03.prod.outlook.com; FPR:; SPF:None; MLV:ovrnspm; PTR:InfoNoRecords; LANG:en;
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Jan 2015 20:53:31.1861 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL2PR03MB289
X-Microsoft-Antispam: BCL:0;PCL:0;RULEID:;SRVR:BL2PR03MB131;
X-OriginatorOrg: microsoft.onmicrosoft.com
Archived-At: <http://mailarchive.ietf.org/arch/msg/uta/Wd77ITF8P9qWgBO5aiXKlfPPw9I>
Subject: [Uta] Agenda Items for Dallas
X-BeenThere: uta@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: UTA working group mailing list <uta.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/uta>, <mailto:uta-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/uta/>
List-Post: <mailto:uta@ietf.org>
List-Help: <mailto:uta-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/uta>, <mailto:uta-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Jan 2015 20:53:35 -0000

>Please send your agenda requests for Dallas to the list as soon as possible!
>
>	Cheers Leif

To help the ball rolling, here is the conclusion from Honolulu:

Brief summary of the UTA WG meeting @IETF 91, Honolulu
Tuesday, Nov 11, 2014

https://datatracker.ietf.org/doc/draft-ietf-uta-tls-bcp/
The new version incorporating all comments from the LC is available as -07. Short one week last call starts from today. All are encouraged to double check that their concerns and feedback have been addressed.
  
https://datatracker.ietf.org/doc/draft-newman-email-deep/
Adopted and will be resubmitted as a new WG ID. Rename "assurance" to "confidentiality". Ross and Sean will review the pinning mechanism. Keep the email certificates draft separate for now. Other open issues to be further investigated and discussed on the list.

https://datatracker.ietf.org/doc/draft-martin-authentication-results-tls/
Perceived as a useful tool including for the inter-domain use cases.  Expressed concerns are related to privacy and insufficient semantics of the recorded authentication details. The author will continue working on the individual draft. The author, Chris Newman, with other volunteers will write an (additional) draft focusing on the broader meaning/semantics of the inter-domain authentication.

https://datatracker.ietf.org/doc/draft-popov-token-binding/ and
https://datatracker.ietf.org/doc/draft-balfanz-https-token-binding/
Perceived as a very much needed approach. Defines a complicated system with many moving parts. HTTP is not a single application to benefit from it. Another would be Email with SAML. Strong sense that a dedicated new WG (preferably in the Security Area) needs to be established to make this infrastructural work finally happen. This is for the ADs to address.
 
"TLS Fallback Dance"
Daniel Kahn Gillmor with a group of volunteers (~5) will write an initial draft documenting known fallback use cases and the existing techniques to deal with them. Tentative goals include sharing common knowledge and educating the community about the pitfalls of this approach. 

Leif & Orit.