
From nobody Mon Jun  4 12:12:10 2018
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 189E7130DD0 for <secdispatch@ietfa.amsl.com>; Mon,  4 Jun 2018 12:12:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level: 
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TpcBieNGPVhf for <secdispatch@ietfa.amsl.com>; Mon,  4 Jun 2018 12:12:05 -0700 (PDT)
Received: from NAM01-SN1-obe.outbound.protection.outlook.com (mail-sn1nam01on0114.outbound.protection.outlook.com [104.47.32.114]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ECC59130DCE for <secdispatch@ietf.org>; Mon,  4 Jun 2018 12:12:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mqE4vhlj8flMNe4BTGC5AVKKghG8ZIr3bn6nwyAbUxc=; b=aRmu+lwt7MljuqKQ82C6FVhylN7vDWgcP84DbB7138xn7hv2tqR3NC2AAOsO5Xw8daB4TZF99t9+tvyeVya0yVjADNhMVZYuCRoEohNj3DFdlwp1ACeiV4x2yXQSImnZ1XEGUXVAytilT634fW1pA133YKI9WeF9OVfO2XORs8Q=
Received: from BL0PR00MB0292.namprd00.prod.outlook.com (52.132.19.158) by BL0PR00MB0355.namprd00.prod.outlook.com (52.132.20.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.874.0; Mon, 4 Jun 2018 19:12:02 +0000
Received: from BL0PR00MB0292.namprd00.prod.outlook.com ([fe80::8887:afea:3df5:ac5a]) by BL0PR00MB0292.namprd00.prod.outlook.com ([fe80::8887:afea:3df5:ac5a%3]) with mapi id 15.20.0875.000; Mon, 4 Jun 2018 19:12:02 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: "secdispatch@ietf.org" <secdispatch@ietf.org>
CC: Benjamin Kaduk <kaduk@mit.edu>
Thread-Topic: Document that registers the SECG secp256k1 elliptic curve
Thread-Index: AdP8Kdnc3ZZaMd5VTPONut+KoS2cIQ==
Date: Mon, 4 Jun 2018 19:12:02 +0000
Message-ID: <BL0PR00MB02927CDBA6AE65BB7979118FF5670@BL0PR00MB0292.namprd00.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [69.84.247.130]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BL0PR00MB0355; 7:bi+nWD+R4y0KnRGRd04KCbEQZl5LQrjRF1fQCgIRmx36VKcrP819TrfdA1BGNcOIzRnuIMlPIT+UG/IYRFCF0W0+vJN6dmiPtvGqmeXUfqWA237GFW25x3WqHnIH8qjTm3+RPqCf4Ia3okQm21iN9HZtHgfcCaDp7QFJBVKuIo170E3hWo/P2o78qZ5XPG/JfOTxMi4uDSXsUD9Sh5RpR9LlHK34rfmlVOVjXW76OHDw1qj61545Hx15QTQAx9pv; 20:YZ+Ge7yGJkG609JrkSyNYljyBonlqVNl4wKsTcehygLmcG1SRbRcnZFcjbS1dr2qx3K8VowG9bFFoRq/sS+v+3bxKzhOk6Pw+54KQmsvU9wGE2/05ZvFF1AKmKAKlhvMf9H9EmsG8qVO76JWOU20mpYt8Ok8fI4twOzR7ZZD+sw=
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7193020); SRVR:BL0PR00MB0355; 
x-ms-traffictypediagnostic: BL0PR00MB0355:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Michael.Jones@microsoft.com; 
x-microsoft-antispam-prvs: <BL0PR00MB03555EF5276AE765CE2802F3F5670@BL0PR00MB0355.namprd00.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(21748063052155)(5213294742642); 
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(2017102700009)(2017102701064)(6040522)(2401047)(5005006)(8121501046)(2017102702064)(20171027021009)(20171027022009)(20171027023009)(20171027024009)(20171027025009)(20171027026009)(2017102703076)(3231254)(2018427008)(944501410)(52105095)(93006095)(93001095)(10201501046)(3002001)(6055026)(149027)(150027)(6041310)(20161123560045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123564045)(20161123558120)(20161123562045)(6072148)(201708071742011)(7699016); SRVR:BL0PR00MB0355; BCL:0; PCL:0; RULEID:; SRVR:BL0PR00MB0355; 
x-forefront-prvs: 069373DFB6
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(366004)(39860400002)(346002)(376002)(396003)(39380400002)(52254002)(189003)(199004)(486006)(6306002)(81156014)(476003)(81166006)(478600001)(1730700003)(106356001)(8676002)(68736007)(74316002)(10290500003)(2351001)(14454004)(5660300001)(966005)(105586002)(72206003)(7736002)(6436002)(3660700001)(55016002)(3280700002)(33656002)(5640700003)(606006)(6916009)(5630700001)(25786009)(7696005)(2900100001)(3846002)(790700001)(10090500001)(6116002)(8990500004)(97736004)(186003)(102836004)(4326008)(99286004)(26005)(236005)(9686003)(53936002)(6506007)(86362001)(54896002)(2906002)(8936002)(86612001)(5250100002)(66066001)(22452003)(316002)(2501003); DIR:OUT; SFP:1102; SCL:1; SRVR:BL0PR00MB0355; H:BL0PR00MB0292.namprd00.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 0tyXDXJvVMpN67/5R9ZBhCnz9rJIqdmNWBlM8S+OkbOd5tjVhd27ivHr+ji097xMafeWedyiIqwUiXrb1RhI51zHaTDEsQajV0N/CzdIi7ZcMKZCyNIuBR2Z715IXKgFBvOAeQffnCut9jDLGbd7H4SRKheXAhaHttvlQNt2+yepIpW2VYi/TErXU8H7jmB4
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_BL0PR00MB02927CDBA6AE65BB7979118FF5670BL0PR00MB0292namp_"
MIME-Version: 1.0
X-MS-Office365-Filtering-Correlation-Id: df4d4256-ec23-44fc-01e0-08d5ca4f0df9
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: df4d4256-ec23-44fc-01e0-08d5ca4f0df9
X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Jun 2018 19:12:02.7942 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR00MB0355
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/f9cX-HUbUHmpen0bA0dUNJgXsfk>
Subject: [Secdispatch] Document that registers the SECG secp256k1 elliptic curve
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Jun 2018 19:12:10 -0000

--_000_BL0PR00MB02927CDBA6AE65BB7979118FF5670BL0PR00MB0292namp_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

This note is soliciting feedback on the best path for https://tools.ietf.or=
g/html/draft-jones-webauthn-secp256k1-00 to become an RFC.  Its purpose is =
very specific and narrow:  It registers JOSE and COSE curve identifiers for=
 the SECG secp256k1 elliptic curve and associated algorithm identifiers.   =
This is used by FIDO UAF, the W3C Verifiable Claims interest group, and sev=
eral blockchain projects.  I want to get standard identifiers registered so=
 these projects can use standards-based, rather than ad-hoc, cryptographic =
representations.  Given the widespread use of this curve and algorithm, I w=
ould like this spec to become an RFC so that the small integer values can b=
e assigned for COSE, per the "Standards Action" requirement for the Label a=
ssignment in the registry policy at https://tools.ietf.org/html/rfc8152#sec=
tion-16.2. I believe it's also very likely that some IETF specifications wi=
ll end up using these registrations as well.

As background, I'd committed to the W3C Web Authentication (WebAuthn) worki=
ng group and the FIDO Alliance to register all the algorithms used by their=
 specifications that do not have current IANA registrations for JOSE and CO=
SE.  https://tools.ietf.org/html/draft-jones-webauthn-cose-algorithms-01 st=
arted this process by registering additional RSA algorithms (with help from=
 Jim Schaad, Sean Turner, and others).  The next step in this process is re=
gistering the SECG secp256k1 elliptic curve and associated algorithm identi=
fiers.

Ben Kaduk suggested that I ask SecDispatch for input on the best path forwa=
rd.  For instance, is anyone interested in reviewing the document or being =
the document shepherd?  I believe that Area Director sponsorship probably m=
akes the best sense for this very targeted document but am open to other op=
tions.   I know that the W3C and the FIDO Alliance would appreciate having =
a path forward for these registrations.

Thanks for your feedback.

                                                       -- Mike


--_000_BL0PR00MB02927CDBA6AE65BB7979118FF5670BL0PR00MB0292namp_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:#954F72;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">This note is soliciting feedback on the best path fo=
r <a href=3D"https://tools.ietf.org/html/draft-jones-webauthn-secp256k1-00"=
>
https://tools.ietf.org/html/draft-jones-webauthn-secp256k1-00</a> to become=
 an RFC.&nbsp; Its purpose is very specific and narrow:&nbsp; It registers =
JOSE and COSE curve identifiers for the SECG secp256k1 elliptic curve and a=
ssociated algorithm identifiers. &nbsp; This is
 used by FIDO UAF, the W3C Verifiable Claims interest group, and several bl=
ockchain projects.&nbsp; I want to get standard identifiers registered so t=
hese projects can use standards-based, rather than ad-hoc, cryptographic re=
presentations.&nbsp; Given the widespread
 use of this curve and algorithm, I would like this spec to become an RFC s=
o that the small integer values can be assigned for COSE, per the &#8220;St=
andards Action&#8221; requirement for the Label assignment in the registry =
policy at
<a href=3D"https://tools.ietf.org/html/rfc8152#section-16.2">https://tools.=
ietf.org/html/rfc8152#section-16.2</a>. I believe it&#8217;s also very like=
ly that some IETF specifications will end up using these registrations as w=
ell.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">As background, I&#8217;d committed to the W3C Web Au=
thentication (WebAuthn) working group and the FIDO Alliance to register all=
 the algorithms used by their specifications that do not have current IANA =
registrations for JOSE and COSE.&nbsp;
<a href=3D"https://tools.ietf.org/html/draft-jones-webauthn-cose-algorithms=
-01">https://tools.ietf.org/html/draft-jones-webauthn-cose-algorithms-01</a=
> started this process by registering additional RSA algorithms (with help =
from Jim Schaad, Sean Turner, and
 others).&nbsp; The next step in this process is registering the SECG secp2=
56k1 elliptic curve and associated algorithm identifiers.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Ben Kaduk suggested that I ask SecDispatch for input=
 on the best path forward.&nbsp; For instance, is anyone interested in revi=
ewing the document or being the document shepherd?&nbsp; I believe that Are=
a Director sponsorship probably makes the best
 sense for this very targeted document but am open to other options. &nbsp;=
 I know that the W3C and the FIDO Alliance would appreciate having a path f=
orward for these registrations.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Thanks for your feedback.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; -- Mike<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_BL0PR00MB02927CDBA6AE65BB7979118FF5670BL0PR00MB0292namp_--


From nobody Mon Jun  4 12:15:12 2018
Return-Path: <hallam@gmail.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 37E7A130DD1 for <secdispatch@ietfa.amsl.com>; Mon,  4 Jun 2018 12:15:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.402
X-Spam-Level: 
X-Spam-Status: No, score=-1.402 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.248, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.249, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O4RZME6hz5UE for <secdispatch@ietfa.amsl.com>; Mon,  4 Jun 2018 12:15:09 -0700 (PDT)
Received: from mail-ot0-x235.google.com (mail-ot0-x235.google.com [IPv6:2607:f8b0:4003:c0f::235]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 56820130DCE for <secdispatch@ietf.org>; Mon,  4 Jun 2018 12:15:09 -0700 (PDT)
Received: by mail-ot0-x235.google.com with SMTP id i19-v6so8495942otk.10 for <secdispatch@ietf.org>; Mon, 04 Jun 2018 12:15:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=4bEcyPccmOaIflQA2qQ6/jFJ7LaMzkSZHNq/LeNmhag=; b=Y7bbqrRD7RZSx32uyxv1yTIR9AUp0OtjkGoK5S6VwyJGc4KaJVhwVx3lBbm9fACRL0 H+P1R0O0yQllGpfMpCvudzL/R1KT6Ni8NCTXoHyEeLU5ktHjhigOkzc7hLhI53Ztwl4S IEDHeZUJjNg9Y4F6byPiVQoFyU17PHQ70kh54meRAp+q/tK9n0pIkYG3wcVJwLWs75nZ gsBkDZ1uVSTCSEtEW85GwRpSfYp6yo4m3AvgQIaACDtnyFI2IUjCtXnVfs4DlJTPaKU9 VCXk5rJ1sx4euKanB2ol8pcN6rXNrRfmllWTcKscbAuhf0thi1NuUuH+xn7DBQzyb2TC sX3A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=4bEcyPccmOaIflQA2qQ6/jFJ7LaMzkSZHNq/LeNmhag=; b=SctpZkFRQtUYXNXYEFKotezxAW+kW1MUf9eZnNwf45o7aV70twmGU6SonEHXWy96VC Veqe2n8wsCESzYvG0TohgtE9doWYCRc49S7gryE3X6kYNbw1/oBMptOPkSOsVKTIc/fX IwvipMvN/7uRa1jmrLFpKXh4FhC21lXRtUQQz4I0GvixGAE4In8sJjJRSRa4NpfXbIOc rQu6Z0b6FF8vc2F0jVFA8XeEJivl9sYXLleo21lhCsNMkytqtgCc8kbSyOFQeVz1S19T TKnCFfmNbEb7JKAqaHVbhNQ/PUIG19VviVX4DUn/31MJ4iI1k/zH1O/YQDMHXzIJGAa0 yC8Q==
X-Gm-Message-State: APt69E3e00b7XNhjKvJLc0F6eq/PjeQ3MY1D0Dv3Va0QridHxYJdEA9c FuoroeGsCx0QEgONg0QucCsIoyZdPM3PJEmrBVY=
X-Google-Smtp-Source: ADUXVKJXCCiCL/Ry5fnRbjmvASrfPadUa64ltnWCp8hmNhZsz92yALFSswxestzpVzhUM0pxC9V2hbr6vnR3vZRTiK0=
X-Received: by 2002:a9d:21a1:: with SMTP id s30-v6mr2051765otb.218.1528139708694;  Mon, 04 Jun 2018 12:15:08 -0700 (PDT)
MIME-Version: 1.0
Sender: hallam@gmail.com
Received: by 2002:a9d:23:0:0:0:0:0 with HTTP; Mon, 4 Jun 2018 12:15:08 -0700 (PDT)
In-Reply-To: <BL0PR00MB02927CDBA6AE65BB7979118FF5670@BL0PR00MB0292.namprd00.prod.outlook.com>
References: <BL0PR00MB02927CDBA6AE65BB7979118FF5670@BL0PR00MB0292.namprd00.prod.outlook.com>
From: Phillip Hallam-Baker <phill@hallambaker.com>
Date: Mon, 4 Jun 2018 15:15:08 -0400
X-Google-Sender-Auth: aNWIXLCNeDqGXzbKI3qbqMgZ4oQ
Message-ID: <CAMm+Lwgf9nwPdhT7Gdex+mRhdRyfstwyYk-znpWFmaRchM_8vA@mail.gmail.com>
To: Mike Jones <Michael.Jones=40microsoft.com@dmarc.ietf.org>
Cc: "secdispatch@ietf.org" <secdispatch@ietf.org>, Benjamin Kaduk <kaduk@mit.edu>
Content-Type: multipart/alternative; boundary="000000000000810411056dd5c098"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/559v-SbVY81wCGb5RrBjO4m9s24>
Subject: Re: [Secdispatch] Document that registers the SECG secp256k1 elliptic curve
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Jun 2018 19:15:12 -0000

--000000000000810411056dd5c098
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

If we are going to register algorithms, perhaps we could do all of them in
one doc including ASN.1 OIDS. These need not be new code points if already
specified but we should have one OID for IETF purposes per algorithm
wherever possible.


On Mon, Jun 4, 2018 at 3:12 PM, Mike Jones <
Michael.Jones=3D40microsoft.com@dmarc.ietf.org> wrote:

> This note is soliciting feedback on the best path for
> https://tools.ietf.org/html/draft-jones-webauthn-secp256k1-00 to become
> an RFC.  Its purpose is very specific and narrow:  It registers JOSE and
> COSE curve identifiers for the SECG secp256k1 elliptic curve and associat=
ed
> algorithm identifiers.   This is used by FIDO UAF, the W3C Verifiable
> Claims interest group, and several blockchain projects.  I want to get
> standard identifiers registered so these projects can use standards-based=
,
> rather than ad-hoc, cryptographic representations.  Given the widespread
> use of this curve and algorithm, I would like this spec to become an RFC =
so
> that the small integer values can be assigned for COSE, per the =E2=80=9C=
Standards
> Action=E2=80=9D requirement for the Label assignment in the registry poli=
cy at
> https://tools.ietf.org/html/rfc8152#section-16.2. I believe it=E2=80=99s =
also
> very likely that some IETF specifications will end up using these
> registrations as well.
>
>
>
> As background, I=E2=80=99d committed to the W3C Web Authentication (WebAu=
thn)
> working group and the FIDO Alliance to register all the algorithms used b=
y
> their specifications that do not have current IANA registrations for JOSE
> and COSE.  https://tools.ietf.org/html/draft-jones-webauthn-cose-
> algorithms-01 started this process by registering additional RSA
> algorithms (with help from Jim Schaad, Sean Turner, and others).  The nex=
t
> step in this process is registering the SECG secp256k1 elliptic curve and
> associated algorithm identifiers.
>
>
>
> Ben Kaduk suggested that I ask SecDispatch for input on the best path
> forward.  For instance, is anyone interested in reviewing the document or
> being the document shepherd?  I believe that Area Director sponsorship
> probably makes the best sense for this very targeted document but am open
> to other options.   I know that the W3C and the FIDO Alliance would
> appreciate having a path forward for these registrations.
>
>
>
> Thanks for your feedback.
>
>
>
>                                                        -- Mike
>
>
>
> _______________________________________________
> Secdispatch mailing list
> Secdispatch@ietf.org
> https://www.ietf.org/mailman/listinfo/secdispatch
>
>

--000000000000810411056dd5c098
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_default" style=3D"font-size:small">If =
we are going to register algorithms, perhaps we could do all of them in one=
 doc including ASN.1 OIDS. These need not be new code points if already spe=
cified but we should have one OID for IETF purposes per algorithm wherever =
possible.</div><div class=3D"gmail_default" style=3D"font-size:small"><br><=
/div></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Mon=
, Jun 4, 2018 at 3:12 PM, Mike Jones <span dir=3D"ltr">&lt;<a href=3D"mailt=
o:Michael.Jones=3D40microsoft.com@dmarc.ietf.org" target=3D"_blank">Michael=
.Jones=3D40microsoft.com@dmarc.ietf.org</a>&gt;</span> wrote:<br><blockquot=
e class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc sol=
id;padding-left:1ex">





<div lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72">
<div class=3D"m_6761201182141565128WordSection1">
<p class=3D"MsoNormal">This note is soliciting feedback on the best path fo=
r <a href=3D"https://tools.ietf.org/html/draft-jones-webauthn-secp256k1-00"=
 target=3D"_blank">
https://tools.ietf.org/html/<wbr>draft-jones-webauthn-<wbr>secp256k1-00</a>=
 to become an RFC.=C2=A0 Its purpose is very specific and narrow:=C2=A0 It =
registers JOSE and COSE curve identifiers for the SECG secp256k1 elliptic c=
urve and associated algorithm identifiers. =C2=A0 This is
 used by FIDO UAF, the W3C Verifiable Claims interest group, and several bl=
ockchain projects.=C2=A0 I want to get standard identifiers registered so t=
hese projects can use standards-based, rather than ad-hoc, cryptographic re=
presentations.=C2=A0 Given the widespread
 use of this curve and algorithm, I would like this spec to become an RFC s=
o that the small integer values can be assigned for COSE, per the =E2=80=9C=
Standards Action=E2=80=9D requirement for the Label assignment in the regis=
try policy at
<a href=3D"https://tools.ietf.org/html/rfc8152#section-16.2" target=3D"_bla=
nk">https://tools.ietf.org/html/<wbr>rfc8152#section-16.2</a>. I believe it=
=E2=80=99s also very likely that some IETF specifications will end up using=
 these registrations as well.<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">As background, I=E2=80=99d committed to the W3C Web =
Authentication (WebAuthn) working group and the FIDO Alliance to register a=
ll the algorithms used by their specifications that do not have current IAN=
A registrations for JOSE and COSE.=C2=A0
<a href=3D"https://tools.ietf.org/html/draft-jones-webauthn-cose-algorithms=
-01" target=3D"_blank">https://tools.ietf.org/html/<wbr>draft-jones-webauth=
n-cose-<wbr>algorithms-01</a> started this process by registering additiona=
l RSA algorithms (with help from Jim Schaad, Sean Turner, and
 others).=C2=A0 The next step in this process is registering the SECG secp2=
56k1 elliptic curve and associated algorithm identifiers.<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">Ben Kaduk suggested that I ask SecDispatch for input=
 on the best path forward.=C2=A0 For instance, is anyone interested in revi=
ewing the document or being the document shepherd?=C2=A0 I believe that Are=
a Director sponsorship probably makes the best
 sense for this very targeted document but am open to other options. =C2=A0=
 I know that the W3C and the FIDO Alliance would appreciate having a path f=
orward for these registrations.<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">Thanks for your feedback.<span class=3D"HOEnZb"><fon=
t color=3D"#888888"><u></u><u></u></font></span></p><span class=3D"HOEnZb">=
<font color=3D"#888888">
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0<wbr>=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 -- Mike<u></u><u></u=
></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</font></span></div>
</div>

<br>______________________________<wbr>_________________<br>
Secdispatch mailing list<br>
<a href=3D"mailto:Secdispatch@ietf.org">Secdispatch@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/secdispatch" rel=3D"norefe=
rrer" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/secdispa=
tch</a><br>
<br></blockquote></div><br></div>

--000000000000810411056dd5c098--


From nobody Mon Jun  4 12:17:46 2018
Return-Path: <john@syn.agency>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F1821130DD0 for <secdispatch@ietfa.amsl.com>; Mon,  4 Jun 2018 12:17:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=syn.agency
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3r9L0ZS7V7Jh for <secdispatch@ietfa.amsl.com>; Mon,  4 Jun 2018 12:17:37 -0700 (PDT)
Received: from mail2.protonmail.ch (mail2.protonmail.ch [185.70.40.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D0EC3130DCC for <secdispatch@ietf.org>; Mon,  4 Jun 2018 12:17:36 -0700 (PDT)
Date: Mon, 04 Jun 2018 15:17:29 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=syn.agency; s=protonmail; t=1528139851; bh=3py66KykBZF9/JVA5JAuy2UNH1sAj1EiwlRqTdl/6ew=; h=Date:To:From:Cc:Reply-To:Subject:In-Reply-To:References: Feedback-ID:From; b=Js6yzfo+FUewxROFBrZCPhXz+2bk+zdv5UL09fE6fw7Z5LCCi18U8eXaDf0RtUy1C QaU+9apL1poDTZMSikLnFi2pIAH/uwyHWKN+7llPzWkdHl3/ftW5hquoDuYebvvR6H 6hYugWUl6YyWq/P6TMVnPPANX9rYoGiSkPpNEyrI=
To: Phillip Hallam-Baker <phill@hallambaker.com>, Mike Jones <Michael.Jones=40microsoft.com@dmarc.ietf.org>
From: John Menerick <john@syn.agency>
Cc: "secdispatch@ietf.org" <secdispatch@ietf.org>, Benjamin Kaduk <kaduk@mit.edu>
Reply-To: John Menerick <john@syn.agency>
Message-ID: <quRVmqd1yO1DU1qmuk6ruEeczslBUpKEClUYbt0s8VeYsbqVg-hQhd5YS7IRYSzcHaPRlz2YmHq2Rx2vG1jk8mVziJkdFosRMgzMqxhy18A=@syn.agency>
In-Reply-To: <CAMm+Lwgf9nwPdhT7Gdex+mRhdRyfstwyYk-znpWFmaRchM_8vA@mail.gmail.com>
References: <BL0PR00MB02927CDBA6AE65BB7979118FF5670@BL0PR00MB0292.namprd00.prod.outlook.com> <CAMm+Lwgf9nwPdhT7Gdex+mRhdRyfstwyYk-znpWFmaRchM_8vA@mail.gmail.com>
Feedback-ID: iZ2oc5bGnsb8GsH0-PuA6V5K2VV8q_e43I8O-6r176i4WlN9P8-RhZ2N66vC_m8eCwHj0ITTy7fJ2sK347MNtA==:Ext:ProtonMail
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="b1_3855f3fb0f25a2398206a75912be357f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/mI4RVmYE9Idd7DtybjaEg9it32Y>
Subject: Re: [Secdispatch] Document that registers the SECG secp256k1 elliptic curve
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Jun 2018 19:17:44 -0000

This is a multi-part message in MIME format.

--b1_3855f3fb0f25a2398206a75912be357f
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: base64
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--b1_3855f3fb0f25a2398206a75912be357f
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: base64

PGRpdj5BZ3JlZWQuPC9kaXY+DQo8ZGl2Pg0KICAgIDxiciAvPg0KPC9kaXY+DQo8ZGl2Pg0KICAg
IDxiciAvPg0KPC9kaXY+DQo8ZGl2Pldhcm1seSw8L2Rpdj4NCjxkaXY+DQogICAgPGJyIC8+DQo8
L2Rpdj4NCjxkaXY+Sm9obiBNZW5lcmljazwvZGl2Pg0KPGRpdj5odHRwOi8vc2VjdXJlc3FsLmlu
Zm88L2Rpdj4NCjxkaXY+DQogICAgPGJyIC8+DQo8L2Rpdj4NCjxkaXYgaWQ9InByb3Rvbm1haWxf
bW9iaWxlX3NpZ25hdHVyZV9ibG9jayI+U2VudCBmcm9tIFByb3Rvbk1haWwgTW9iaWxlPC9kaXY+
DQo8ZGl2Pg0KICAgIDxiciAvPg0KICAgIDxkaXY+DQogICAgICAgIDxkaXY+DQogICAgICAgICAg
ICA8YnIgLz4NCiAgICAgICAgPC9kaXY+T24gTW9uLCBKdW4gNCwgMjAxOCBhdCAxMjoxNSwgUGhp
bGxpcCBIYWxsYW0tQmFrZXIgJmx0OzxhIGhyZWY9Im1haWx0bzpwaGlsbEBoYWxsYW1iYWtlci5j
b20iIGNsYXNzPSIiPnBoaWxsQGhhbGxhbWJha2VyLmNvbTwvYT4mZ3Q7IHdyb3RlOjwvZGl2Pg0K
ICAgIDxibG9ja3F1b3RlIGNsYXNzPSJwcm90b25tYWlsX3F1b3RlIiB0eXBlPSJjaXRlIj4NCiAg
ICAgICAgPGRpdiBkaXI9Imx0ciI+DQogICAgICAgICAgICA8ZGl2IGNsYXNzPSJnbWFpbF9kZWZh
dWx0IiBzdHlsZT0iZm9udC1zaXplOnNtYWxsIj5JZiB3ZSBhcmUgZ29pbmcgdG8gcmVnaXN0ZXIg
YWxnb3JpdGhtcywgcGVyaGFwcyB3ZSBjb3VsZCBkbyBhbGwgb2YgdGhlbSBpbiBvbmUgZG9jIGlu
Y2x1ZGluZyBBU04uMSBPSURTLiBUaGVzZSBuZWVkIG5vdCBiZSBuZXcgY29kZSBwb2ludHMgaWYg
YWxyZWFkeSBzcGVjaWZpZWQgYnV0IHdlIHNob3VsZCBoYXZlIG9uZSBPSUQgZm9yIElFVEYgcHVy
cG9zZXMgcGVyIGFsZ29yaXRobSB3aGVyZXZlciBwb3NzaWJsZS48L2Rpdj4NCiAgICAgICAgICAg
IDxkaXYNCiAgICAgICAgICAgIGNsYXNzPSJnbWFpbF9kZWZhdWx0IiBzdHlsZT0iZm9udC1zaXpl
OnNtYWxsIj4NCiAgICAgICAgICAgICAgICA8YnIgLz4NCiAgICAgICAgPC9kaXY+DQo8L2Rpdj4N
CjxkaXYgY2xhc3M9ImdtYWlsX2V4dHJhIj4NCiAgICA8YnIgLz4NCiAgICA8ZGl2IGNsYXNzPSJn
bWFpbF9xdW90ZSI+T24gTW9uLCBKdW4gNCwgMjAxOCBhdCAzOjEyIFBNLCBNaWtlIEpvbmVzIDxz
cGFuIGRpcj0ibHRyIj4mbHQ7PGEgaHJlZj0ibWFpbHRvOk1pY2hhZWwuSm9uZXM9NDBtaWNyb3Nv
ZnQuY29tQGRtYXJjLmlldGYub3JnIiB0YXJnZXQ9Il9ibGFuayI+TWljaGFlbC4uSm9uZXM9NDBt
aWNyb3NvZnQuY29tQGRtYXJjLmlldGYub3JnPC9hPiZndDs8L3NwYW4+IHdyb3RlOg0KICAgICAg
ICA8YnIgLz4NCiAgICAgICAgPGJsb2NrcXVvdGUgY2xhc3M9ImdtYWlsX3F1b3RlIiBzdHlsZT0i
bWFyZ2luOiAwcHggMHB4IDBweCAwLjhleDsgYm9yZGVyLWxlZnQtd2lkdGg6IDFweDsgYm9yZGVy
LWxlZnQtc3R5bGU6IHNvbGlkOyBib3JkZXItbGVmdC1jb2xvcjogcmdiKDIwNCwgMjA0LCAyMDQp
OyI+DQoNCg0KDQoNCg0KICAgICAgICAgICAgPGRpdiBsYW5nPSJFTi1VUyIgbGluaz0iIzA1NjND
MSIgdmxpbms9IiM5NTRGNzIiPg0KICAgICAgICAgICAgICAgIDxkaXYgY2xhc3M9Im1fNjc2MTIw
MTE4MjE0MTU2NTEyOFdvcmRTZWN0aW9uMSI+DQogICAgICAgICAgICAgICAgICAgIDxwIGNsYXNz
PSJNc29Ob3JtYWwiPlRoaXMgbm90ZSBpcyBzb2xpY2l0aW5nIGZlZWRiYWNrIG9uIHRoZSBiZXN0
IHBhdGggZm9yIDxhIGhyZWY9Imh0dHBzOi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC9kcmFmdC1qb25l
cy13ZWJhdXRobi1zZWNwMjU2azEtMDAiIHRhcmdldD0iX2JsYW5rIj4NCmh0dHBzOi8vdG9vbHMu
aWV0Zi5vcmcvaHRtbC88d2JyPmRyYWZ0LWpvbmVzLXdlYmF1dGhuLTx3YnI+c2VjcDI1NmsxLTAw
PC9hPiB0byBiZWNvbWUgYW4gUkZDLiZuYnNwOyBJdHMgcHVycG9zZSBpcyB2ZXJ5IHNwZWNpZmlj
IGFuZCBuYXJyb3c6Jm5ic3A7IEl0IHJlZ2lzdGVycyBKT1NFIGFuZCBDT1NFIGN1cnZlIGlkZW50
aWZpZXJzIGZvciB0aGUgU0VDRyBzZWNwMjU2azEgZWxsaXB0aWMgY3VydmUgYW5kIGFzc29jaWF0
ZWQgYWxnb3JpdGhtDQogICAgICAgICAgICAgICAgICAgICAgICBpZGVudGlmaWVycy4gJm5ic3A7
IFRoaXMgaXMgdXNlZCBieSBGSURPIFVBRiwgdGhlIFczQyBWZXJpZmlhYmxlIENsYWltcyBpbnRl
cmVzdCBncm91cCwgYW5kIHNldmVyYWwgYmxvY2tjaGFpbiBwcm9qZWN0cy4mbmJzcDsgSSB3YW50
IHRvIGdldCBzdGFuZGFyZCBpZGVudGlmaWVycyByZWdpc3RlcmVkIHNvIHRoZXNlIHByb2plY3Rz
IGNhbiB1c2Ugc3RhbmRhcmRzLWJhc2VkLCByYXRoZXIgdGhhbg0KICAgICAgICAgICAgICAgICAg
ICAgICAgYWQtaG9jLCBjcnlwdG9ncmFwaGljIHJlcHJlc2VudGF0aW9ucy4mbmJzcDsgR2l2ZW4g
dGhlIHdpZGVzcHJlYWQgdXNlIG9mIHRoaXMgY3VydmUgYW5kIGFsZ29yaXRobSwgSSB3b3VsZCBs
aWtlIHRoaXMgc3BlYyB0byBiZWNvbWUgYW4gUkZDIHNvIHRoYXQgdGhlIHNtYWxsIGludGVnZXIg
dmFsdWVzIGNhbiBiZSBhc3NpZ25lZCBmb3IgQ09TRSwgcGVyIHRoZSAiU3RhbmRhcmRzIEFjdGlv
biIgcmVxdWlyZW1lbnQNCiAgICAgICAgICAgICAgICAgICAgICAgIGZvciB0aGUgTGFiZWwgYXNz
aWdubWVudCBpbiB0aGUgcmVnaXN0cnkgcG9saWN5IGF0DQogICAgICAgICAgICAgICAgICAgICAg
ICA8YSBocmVmPSJodHRwczovL3Rvb2xzLmlldGYub3JnL2h0bWwvcmZjODE1MiNzZWN0aW9uLTE2
LjIiIHRhcmdldD0iX2JsYW5rIj5odHRwczovL3Rvb2xzLmlldGYub3JnL2h0bWwvPHdicj5yZmM4
MTUyI3NlY3Rpb24tMTYuMjwvYT4uIEkgYmVsaWV2ZSBpdOKAmXMgYWxzbyB2ZXJ5IGxpa2VseSB0
aGF0IHNvbWUgSUVURiBzcGVjaWZpY2F0aW9ucyB3aWxsIGVuZCB1cCB1c2luZyB0aGVzZSByZWdp
c3RyYXRpb25zDQogICAgICAgICAgICAgICAgICAgICAgICBhcyB3ZWxsLjx1PjwvdT48dT48L3U+
DQogICAgICAgICAgICAgICAgICAgIDwvcD4NCiAgICAgICAgICAgICAgICAgICAgPHAgY2xhc3M9
Ik1zb05vcm1hbCI+PHU+PC91PiZuYnNwOzx1PjwvdT4NCiAgICAgICAgICAgICAgICAgICAgPC9w
Pg0KICAgICAgICAgICAgICAgICAgICA8cCBjbGFzcz0iTXNvTm9ybWFsIj5BcyBiYWNrZ3JvdW5k
LCBJ4oCZZCBjb21taXR0ZWQgdG8gdGhlIFczQyBXZWIgQXV0aGVudGljYXRpb24gKFdlYkF1dGhu
KSB3b3JraW5nIGdyb3VwIGFuZCB0aGUgRklETyBBbGxpYW5jZSB0byByZWdpc3RlciBhbGwgdGhl
IGFsZ29yaXRobXMgdXNlZCBieSB0aGVpciBzcGVjaWZpY2F0aW9ucyB0aGF0IGRvIG5vdCBoYXZl
IGN1cnJlbnQgSUFOQSByZWdpc3RyYXRpb25zIGZvciBKT1NFIGFuZCBDT1NFLiZuYnNwOw0KICAg
ICAgICAgICAgICAgICAgICAgICAgPGEgaHJlZj0iaHR0cHM6Ly90b29scy5pZXRmLm9yZy9odG1s
L2RyYWZ0LWpvbmVzLXdlYmF1dGhuLWNvc2UtYWxnb3JpdGhtcy0wMSIgdGFyZ2V0PSJfYmxhbmsi
Pmh0dHBzOi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC88d2JyPmRyYWZ0LWpvbmVzLXdlYmF1dGhuLWNv
c2UtPHdicj5hbGdvcml0aG1zLTAxPC9hPiBzdGFydGVkIHRoaXMgcHJvY2VzcyBieSByZWdpc3Rl
cmluZyBhZGRpdGlvbmFsIFJTQSBhbGdvcml0aG1zDQogICAgICAgICAgICAgICAgICAgICAgICAo
d2l0aCBoZWxwIGZyb20gSmltIFNjaGFhZCwgU2VhbiBUdXJuZXIsIGFuZCBvdGhlcnMpLiZuYnNw
OyBUaGUgbmV4dCBzdGVwIGluIHRoaXMgcHJvY2VzcyBpcyByZWdpc3RlcmluZyB0aGUgU0VDRyBz
ZWNwMjU2azEgZWxsaXB0aWMgY3VydmUgYW5kIGFzc29jaWF0ZWQgYWxnb3JpdGhtIGlkZW50aWZp
ZXJzLjx1PjwvdT48dT48L3U+DQogICAgICAgICAgICAgICAgICAgIDwvcD4NCiAgICAgICAgICAg
ICAgICAgICAgPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHU+PC91PiZuYnNwOzx1PjwvdT4NCiAgICAg
ICAgICAgICAgICAgICAgPC9wPg0KICAgICAgICAgICAgICAgICAgICA8cCBjbGFzcz0iTXNvTm9y
bWFsIj5CZW4gS2FkdWsgc3VnZ2VzdGVkIHRoYXQgSSBhc2sgU2VjRGlzcGF0Y2ggZm9yIGlucHV0
IG9uIHRoZSBiZXN0IHBhdGggZm9yd2FyZC4mbmJzcDsgRm9yIGluc3RhbmNlLCBpcyBhbnlvbmUg
aW50ZXJlc3RlZCBpbiByZXZpZXdpbmcgdGhlIGRvY3VtZW50IG9yIGJlaW5nIHRoZSBkb2N1bWVu
dCBzaGVwaGVyZD8mbmJzcDsgSSBiZWxpZXZlIHRoYXQgQXJlYSBEaXJlY3RvciBzcG9uc29yc2hp
cCBwcm9iYWJseQ0KICAgICAgICAgICAgICAgICAgICAgICAgbWFrZXMgdGhlIGJlc3Qgc2Vuc2Ug
Zm9yIHRoaXMgdmVyeSB0YXJnZXRlZCBkb2N1bWVudCBidXQgYW0gb3BlbiB0byBvdGhlciBvcHRp
b25zLiAmbmJzcDsgSSBrbm93IHRoYXQgdGhlIFczQyBhbmQgdGhlIEZJRE8gQWxsaWFuY2Ugd291
bGQgYXBwcmVjaWF0ZSBoYXZpbmcgYSBwYXRoIGZvcndhcmQgZm9yIHRoZXNlIHJlZ2lzdHJhdGlv
bnMuPHU+PC91Pjx1PjwvdT4NCiAgICAgICAgICAgICAgICAgICAgPC9wPg0KICAgICAgICAgICAg
ICAgICAgICA8cCBjbGFzcz0iTXNvTm9ybWFsIj48dT48L3U+Jm5ic3A7PHU+PC91Pg0KICAgICAg
ICAgICAgICAgICAgICA8L3A+DQogICAgICAgICAgICAgICAgICAgIDxwIGNsYXNzPSJNc29Ob3Jt
YWwiPlRoYW5rcyBmb3IgeW91ciBmZWVkYmFjay48c3BhbiBjbGFzcz0iSE9FblpiIj48Zm9udCBj
b2xvcj0iIzg4ODg4OCI+PHU+PC91Pjx1PjwvdT48L2ZvbnQ+PC9zcGFuPg0KICAgICAgICAgICAg
ICAgICAgICA8L3A+PHNwYW4gY2xhc3M9IkhPRW5aYiI+PGZvbnQgY29sb3I9IiM4ODg4ODgiPg0K
PHAgY2xhc3M9Ik1zb05vcm1hbCI+PHU+PC91PiZuYnNwOzx1PjwvdT48L3A+DQo8cCBjbGFzcz0i
TXNvTm9ybWFsIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz
cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm
bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz
cDsmbmJzcDsmbmJzcDsmbmJzcDs8d2JyPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu
YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw
OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyAt
LSBNaWtlPHU+PC91Pjx1PjwvdT48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48dT48L3U+Jm5i
c3A7PHU+PC91PjwvcD4NCjwvZm9udD48L3NwYW4+DQogICAgICAgICAgICAgICAgPC9kaXY+DQog
ICAgICAgICAgICA8L2Rpdj4NCg0KICAgICAgICAgICAgPGJyIC8+X19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fDQogICAgICAgICAgICA8d2JyPl9fX19fX19fX19fX19fX19fDQogICAgICAg
ICAgICA8YnIgLz5TZWNkaXNwYXRjaCBtYWlsaW5nIGxpc3QNCiAgICAgICAgICAgIDxiciAvPg0K
ICAgICAgICAgICAgPGEgaHJlZj0ibWFpbHRvOlNlY2Rpc3BhdGNoQGlldGYub3JnIj5TZWNkaXNw
YXRjaEBpZXRmLm9yZzwvYT4NCiAgICAgICAgICAgIDxiciAvPg0KICAgICAgICAgICAgPGEgaHJl
Zj0iaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9zZWNkaXNwYXRjaCIgcmVs
PSJub3JlZmVycmVyIiB0YXJnZXQ9Il9ibGFuayI+aHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1h
bi88d2JyPmxpc3RpbmZvL3NlY2Rpc3BhdGNoPC9hPg0KICAgICAgICAgICAgPGJyIC8+DQogICAg
ICAgICAgICA8YnIgLz4NCiAgICAgICAgPC9ibG9ja3F1b3RlPg0KICAgIDwvZGl2Pg0KICAgIDxi
ciAvPg0KPC9kaXY+DQo8L2Jsb2NrcXVvdGU+DQo8L2Rpdj4=



--b1_3855f3fb0f25a2398206a75912be357f--


From nobody Mon Jun  4 17:43:59 2018
Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC3CF130E3C for <secdispatch@ietfa.amsl.com>; Mon,  4 Jun 2018 17:43:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RbThJwDUsb7K for <secdispatch@ietfa.amsl.com>; Mon,  4 Jun 2018 17:43:55 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6FBED130E29 for <secdispatch@ietf.org>; Mon,  4 Jun 2018 17:43:55 -0700 (PDT)
Received: from sandelman.ca (obiwan.sandelman.ca [IPv6:2607:f0b0:f:2::247]) by tuna.sandelman.ca (Postfix) with ESMTP id 5DF7520091; Mon,  4 Jun 2018 20:57:15 -0400 (EDT)
Received: by sandelman.ca (Postfix, from userid 179) id D75262B9E; Mon,  4 Jun 2018 20:43:19 -0400 (EDT)
Received: from sandelman.ca (localhost [127.0.0.1]) by sandelman.ca (Postfix) with ESMTP id D506D2643; Mon,  4 Jun 2018 20:43:19 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Mike Jones <Michael.Jones=40microsoft.com@dmarc.ietf.org>
cc: "secdispatch\@ietf.org" <secdispatch@ietf.org>, Benjamin Kaduk <kaduk@mit.edu>
In-Reply-To: <BL0PR00MB02927CDBA6AE65BB7979118FF5670@BL0PR00MB0292.namprd00.prod.outlook.com>
References: <BL0PR00MB02927CDBA6AE65BB7979118FF5670@BL0PR00MB0292.namprd00.prod.outlook.com>
X-Mailer: MH-E 8.6; nmh 1.7+dev; GNU Emacs 24.5.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha1; protocol="application/pgp-signature"
Date: Mon, 04 Jun 2018 20:43:19 -0400
Message-ID: <26770.1528159399@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/oa-U3Bs13WwbcddFHOqKJ9Us5ks>
Subject: Re: [Secdispatch] Document that registers the SECG secp256k1 elliptic curve
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 05 Jun 2018 00:43:58 -0000

--=-=-=
Content-Type: text/plain
Content-Transfer-Encoding: quoted-printable


Mike Jones <Michael.Jones=3D40microsoft.com@dmarc.ietf.org> wrote:
    > Ben Kaduk suggested that I ask SecDispatch for input on the best path
    > forward.  For instance, is anyone interested in reviewing the document
    > or being the document shepherd?  I believe that Area Director
    > sponsorship probably makes the best sense for this very targeted
    > document but am open to other options.   I know that the W3C and the
    > FIDO Alliance would appreciate having a path forward for these
    > registrations.

I'll volunteer to be the document shepherd.

=2D-=20
]               Never tell me the odds!                 | ipv6 mesh network=
s [=20
]   Michael Richardson, Sandelman Software Works        | network architect=
  [=20
]     mcr@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails  =
  [=20
=09


--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEVAwUBWxXcpYCLcPvd0N1lAQKUqAf+L82zrE8Zc3+Zl8+bHBAMVBjDCC6LDTSH
sRaaLWkbemhaLrUrXvAsz8Njlf/8vZ26ds9OdxYn8aXWQNcbcn/CWuOsXCLGq771
T7+ebyRY5kFthn/7afIoLJiMR6png08qvpFbQpQLhc2eJ2NUCEugza/zSYFAVhL8
6jkSm24WCzBvcnU5eYqVD5GDvj4JBa32fLFE3us6sC1iWdX4ggK0uVZB2GjlayoM
fclBkAyjy86q+rowKf/XEHoP9ircRNQlHJ8BgTKu71Km9x+E/iPSqZglKYUJZP6D
9Hs3rGpBFfHAfiOplRCBT8phli4kXHsMqCGfiksw7w0GiZSxPgq+5Q==
=683w
-----END PGP SIGNATURE-----
--=-=-=--


From nobody Fri Jun  8 10:43:27 2018
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 30B9D130F74 for <secdispatch@ietfa.amsl.com>; Fri,  8 Jun 2018 10:43:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level: 
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lG4fVvApm1aW for <secdispatch@ietfa.amsl.com>; Fri,  8 Jun 2018 10:43:22 -0700 (PDT)
Received: from NAM03-DM3-obe.outbound.protection.outlook.com (mail-dm3nam03on0709.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe49::709]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2DACF130F67 for <secdispatch@ietf.org>; Fri,  8 Jun 2018 10:43:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=8MXl1TfTmLaV8zjklyJ89QVnbxOtESiD7RsV/olR0aw=; b=hxB1K9zxcYQvTACvaPW6B4dPAwFqckFfr54MZzNAEgudgkI7cpqEay888E0WVgfS+Ljq4BpQSDEWrQoQbhE+PDpuIaEnq+Q4WQQCgLo7WVjC3NOMjLiEY+mSLUJZDSr7ohocgDy2lxBwQ4liyHdZ+7W0yYZm5WX3CxwtAekyiuM=
Received: from BL0PR00MB0292.namprd00.prod.outlook.com (52.132.19.158) by BL0PR00MB0305.namprd00.prod.outlook.com (52.132.19.159) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.884.0; Fri, 8 Jun 2018 17:43:15 +0000
Received: from BL0PR00MB0292.namprd00.prod.outlook.com ([fe80::13e:8f40:ef2a:4b2f]) by BL0PR00MB0292.namprd00.prod.outlook.com ([fe80::13e:8f40:ef2a:4b2f%3]) with mapi id 15.20.0880.000; Fri, 8 Jun 2018 17:43:15 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Phillip Hallam-Baker <phill@hallambaker.com>
CC: "secdispatch@ietf.org" <secdispatch@ietf.org>, Benjamin Kaduk <kaduk@mit.edu>
Thread-Topic: [Secdispatch] Document that registers the SECG secp256k1 elliptic curve
Thread-Index: AdP8Kdnc3ZZaMd5VTPONut+KoS2cIQADoAAAAMUz5FA=
Date: Fri, 8 Jun 2018 17:43:15 +0000
Message-ID: <BL0PR00MB029274D5B739CC78BE98B3E5F57B0@BL0PR00MB0292.namprd00.prod.outlook.com>
References: <BL0PR00MB02927CDBA6AE65BB7979118FF5670@BL0PR00MB0292.namprd00.prod.outlook.com> <CAMm+Lwgf9nwPdhT7Gdex+mRhdRyfstwyYk-znpWFmaRchM_8vA@mail.gmail.com>
In-Reply-To: <CAMm+Lwgf9nwPdhT7Gdex+mRhdRyfstwyYk-znpWFmaRchM_8vA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [2001:4898:80e8:9:260e:215d:9bb0:55e8]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BL0PR00MB0305; 7:HueY+rZGMUeaFF2uy78KTIDQnxePe6hszVX+yvoCW44HJm+tTLOW3XWQEt5iBwCv3qrYDRxlxtkjQkDcb+QamtzTg/jQe0pMyPxQV4c+S6dN2e1B+kCm/aV9hLCSOhkcYg263iDlry1SBDGqlYQOQHcrhSC3vqg/syRKLu9Cvz0gUc5ypSqW1farxdGnn31KhJY6JJjL12JUPs79H+Qy7pzXx6+emFFKBR0pqITorAEXqyRnWaOUgt5aY6DZxKc0
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7193020); SRVR:BL0PR00MB0305; 
x-ms-traffictypediagnostic: BL0PR00MB0305:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Michael.Jones@microsoft.com; 
x-microsoft-antispam-prvs: <BL0PR00MB0305B77F0D0D0CD8600411CCF57B0@BL0PR00MB0305.namprd00.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(89211679590171)(85827821059158)(21748063052155)(240460790083961)(5213294742642);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(2017102700009)(2017102701064)(6040522)(2401047)(8121501046)(5005006)(2017102702064)(20171027021009)(20171027022009)(20171027023009)(20171027024009)(20171027025009)(20171027026009)(2017102703076)(3002001)(3231254)(2018427008)(944501410)(52105095)(93006095)(93001095)(10201501046)(6055026)(149027)(150027)(6041310)(20161123560045)(20161123558120)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(6072148)(201708071742011)(7699016); SRVR:BL0PR00MB0305; BCL:0; PCL:0; RULEID:; SRVR:BL0PR00MB0305; 
x-forefront-prvs: 06973FFAD3
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(366004)(376002)(39860400002)(346002)(396003)(39380400002)(52254002)(199004)(189003)(22452003)(6436002)(7736002)(74316002)(97736004)(316002)(186003)(46003)(86612001)(2906002)(81156014)(81166006)(4326008)(54906003)(25786009)(478600001)(7696005)(76176011)(6506007)(53546011)(5250100002)(606006)(19609705001)(8676002)(8936002)(102836004)(10290500003)(86362001)(6246003)(33656002)(236005)(105586002)(68736007)(106356001)(53936002)(966005)(14454004)(6916009)(229853002)(5660300001)(9686003)(486006)(3280700002)(446003)(476003)(11346002)(3660700001)(54896002)(99286004)(6306002)(55016002)(72206003)(8990500004)(10090500001)(6116002)(790700001)(2900100001); DIR:OUT; SFP:1102; SCL:1; SRVR:BL0PR00MB0305; H:BL0PR00MB0292.namprd00.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: idut2tlC7PA3Y9zjudoTJkqUGgh0wF4ryWtMoYiyvwQCY+xrDzuCT7Vi7cUq6jnM6RuOuSaSazC9V0kE8yZTe/P/wvAEcj8dY024T6rcIliB7oefzho3coDhTfR7lxtNc+my7rR9/5Dfk0HSvQpSexlNwusO0GATOQ24pVAZZjA6ZloLEFSdIz1/eIUkhphO
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_BL0PR00MB029274D5B739CC78BE98B3E5F57B0BL0PR00MB0292namp_"
MIME-Version: 1.0
X-MS-Office365-Filtering-Correlation-Id: 553833a4-7f2b-4e6e-3c4e-08d5cd675074
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 553833a4-7f2b-4e6e-3c4e-08d5cd675074
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Jun 2018 17:43:15.6762 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR00MB0305
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/xy8qmePiwnXS90bCS0y6kW42LAs>
Subject: Re: [Secdispatch] Document that registers the SECG secp256k1 elliptic curve
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Jun 2018 17:43:26 -0000

--_000_BL0PR00MB029274D5B739CC78BE98B3E5F57B0BL0PR00MB0292namp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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==

--_000_BL0PR00MB029274D5B739CC78BE98B3E5F57B0BL0PR00MB0292namp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg
Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv
ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl
PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6
IkNhbWJyaWEgTWF0aCI7DQoJcGFub3NlLTE6MiA0IDUgMyA1IDQgNiAzIDIgNDt9DQpAZm9udC1m
YWNlDQoJe2ZvbnQtZmFtaWx5OkNhbGlicmk7DQoJcGFub3NlLTE6MiAxNSA1IDIgMiAyIDQgMyAy
IDQ7fQ0KLyogU3R5bGUgRGVmaW5pdGlvbnMgKi8NCnAuTXNvTm9ybWFsLCBsaS5Nc29Ob3JtYWws
IGRpdi5Nc29Ob3JtYWwNCgl7bWFyZ2luOjBpbjsNCgltYXJnaW4tYm90dG9tOi4wMDAxcHQ7DQoJ
Zm9udC1zaXplOjExLjBwdDsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsc2Fucy1zZXJpZjt9DQph
OmxpbmssIHNwYW4uTXNvSHlwZXJsaW5rDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xv
cjpibHVlOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KYTp2aXNpdGVkLCBzcGFuLk1z
b0h5cGVybGlua0ZvbGxvd2VkDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xvcjpwdXJw
bGU7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQpwLm1zb25vcm1hbDAsIGxpLm1zb25v
cm1hbDAsIGRpdi5tc29ub3JtYWwwDQoJe21zby1zdHlsZS1uYW1lOm1zb25vcm1hbDsNCgltc28t
bWFyZ2luLXRvcC1hbHQ6YXV0bzsNCgltYXJnaW4tcmlnaHQ6MGluOw0KCW1zby1tYXJnaW4tYm90
dG9tLWFsdDphdXRvOw0KCW1hcmdpbi1sZWZ0OjBpbjsNCglmb250LXNpemU6MTEuMHB0Ow0KCWZv
bnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNlcmlmO30NCnNwYW4uaG9lbnpiDQoJe21zby1zdHls
ZS1uYW1lOmhvZW56Yjt9DQpzcGFuLkVtYWlsU3R5bGUxOQ0KCXttc28tc3R5bGUtdHlwZTpwZXJz
b25hbC1yZXBseTsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsc2Fucy1zZXJpZjsNCgljb2xvcjoj
MDAyMDYwO30NCi5Nc29DaHBEZWZhdWx0DQoJe21zby1zdHlsZS10eXBlOmV4cG9ydC1vbmx5Ow0K
CWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNlcmlmO30NCkBwYWdlIFdvcmRTZWN0aW9uMQ0K
CXtzaXplOjguNWluIDExLjBpbjsNCgltYXJnaW46MS4waW4gMS4waW4gMS4waW4gMS4waW47fQ0K
ZGl2LldvcmRTZWN0aW9uMQ0KCXtwYWdlOldvcmRTZWN0aW9uMTt9DQotLT48L3N0eWxlPjwhLS1b
aWYgZ3RlIG1zbyA5XT48eG1sPg0KPG86c2hhcGVkZWZhdWx0cyB2OmV4dD0iZWRpdCIgc3BpZG1h
eD0iMTAyNiIgLz4NCjwveG1sPjwhW2VuZGlmXS0tPjwhLS1baWYgZ3RlIG1zbyA5XT48eG1sPg0K
PG86c2hhcGVsYXlvdXQgdjpleHQ9ImVkaXQiPg0KPG86aWRtYXAgdjpleHQ9ImVkaXQiIGRhdGE9
IjEiIC8+DQo8L286c2hhcGVsYXlvdXQ+PC94bWw+PCFbZW5kaWZdLS0+DQo8L2hlYWQ+DQo8Ym9k
eSBsYW5nPSJFTi1VUyIgbGluaz0iYmx1ZSIgdmxpbms9InB1cnBsZSI+DQo8ZGl2IGNsYXNzPSJX
b3JkU2VjdGlvbjEiPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImNvbG9yOiMw
MDIwNjAiPlRoYW5rcyBmb3IgYXNraW5nLCBQaGlsbGlwLiZuYnNwOyBJIGp1c3QgdG9vayB0aGUg
dGltZSB0byBsb29rIHVwIHdoZXRoZXIgdGhlcmUgaXMgYWxyZWFkeSBhbiBPSUQgcmVnaXN0ZXJl
ZCBmb3IgdGhpcyBjdXJ2ZSBhbmQgaXQgdHVybnMgb3V0IHRoYXQgdGhlcmUgaXMuJm5ic3A7IFNl
ZSBTZWN0aW9uIEEuMi4xIG9mDQo8YSBocmVmPSJodHRwOi8vd3d3LnNlY2cub3JnL3NlYzItdjIu
cGRmIj5odHRwOi8vd3d3LnNlY2cub3JnL3NlYzItdjIucGRmPC9hPiB3aGljaCBzcGVjaWZpZXMg
dGhlIE9JRCAxLjMuMTMyLjAuMTAgZm9yIHNlY3AyNTZrMSAmbmJzcDsoYW5kIGFsc28gc3BlY2lm
aWVzIE9JRHMgZm9yIHRoZSBvdGhlciBjdXJ2ZXMgc3BlY2lmaWVkIHRoZXJlaW4sIHN1Y2ggYXMg
MS4yLjg0MC4xMDA0NS4zLjEuNyBmb3Igc2VjcDI1NnIxKS4mbmJzcDsgRnVydGhlcm1vcmUsIFJG
Qw0KIDU3NTggc3BlY2lmaWVzIHRoZSBPSUQgMS4yLjg0MC4xMDA0NS40LjMuMiBmb3IgRUNEU0Eg
d2l0aCBTSEEtMjU2IGluIDxhIGhyZWY9Imh0dHBzOi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC9yZmM1
NzU4I3NlY3Rpb24tMy4yIj4NCmh0dHBzOi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC9yZmM1NzU4I3Nl
Y3Rpb24tMy4yPC9hPi48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
Ij48c3BhbiBzdHlsZT0iY29sb3I6IzAwMjA2MCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9w
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImNvbG9yOiMwMDIwNjAiPlNvIEkg
YmVsaWV2ZSB3ZeKAmXJlIGFscmVhZHkgY292ZXJlZCBvbiB0aGUgT0lEIHJlZ2lzdHJhdGlvbnMu
PG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9
ImNvbG9yOiMwMDIwNjAiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJN
c29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJjb2xvcjojMDAyMDYwIj4mbmJzcDsmbmJzcDsmbmJzcDsm
bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz
cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm
bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz
cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm
bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz
cDsmbmJzcDsmbmJzcDsmbmJzcDsgLS0gTWlrZTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJjb2xvcjojMDAyMDYwIj48bzpwPiZuYnNwOzwv
bzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48Yj5Gcm9tOjwvYj4gaGFsbGFt
QGdtYWlsLmNvbSAmbHQ7aGFsbGFtQGdtYWlsLmNvbSZndDsgPGI+T24gQmVoYWxmIE9mDQo8L2I+
UGhpbGxpcCBIYWxsYW0tQmFrZXI8YnI+DQo8Yj5TZW50OjwvYj4gTW9uZGF5LCBKdW5lIDQsIDIw
MTggMTI6MTUgUE08YnI+DQo8Yj5Ubzo8L2I+IE1pa2UgSm9uZXMgJmx0O01pY2hhZWwuSm9uZXNA
bWljcm9zb2Z0LmNvbSZndDs8YnI+DQo8Yj5DYzo8L2I+IHNlY2Rpc3BhdGNoQGlldGYub3JnOyBC
ZW5qYW1pbiBLYWR1ayAmbHQ7a2FkdWtAbWl0LmVkdSZndDs8YnI+DQo8Yj5TdWJqZWN0OjwvYj4g
UmU6IFtTZWNkaXNwYXRjaF0gRG9jdW1lbnQgdGhhdCByZWdpc3RlcnMgdGhlIFNFQ0cgc2VjcDI1
NmsxIGVsbGlwdGljIGN1cnZlPG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48
bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+
PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4wcHQiPklmIHdlIGFyZSBnb2luZyB0byByZWdpc3Rl
ciBhbGdvcml0aG1zLCBwZXJoYXBzIHdlIGNvdWxkIGRvIGFsbCBvZiB0aGVtIGluIG9uZSBkb2Mg
aW5jbHVkaW5nIEFTTi4xIE9JRFMuIFRoZXNlIG5lZWQgbm90IGJlIG5ldyBjb2RlIHBvaW50cyBp
ZiBhbHJlYWR5IHNwZWNpZmllZCBidXQgd2Ugc2hvdWxkIGhhdmUgb25lIE9JRCBmb3IgSUVURiBw
dXJwb3Nlcw0KIHBlciBhbGdvcml0aG0gd2hlcmV2ZXIgcG9zc2libGUuPG86cD48L286cD48L3Nw
YW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9
ImZvbnQtc2l6ZToxMi4wcHQiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0K
PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+
DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+T24gTW9uLCBKdW4gNCwgMjAxOCBhdCAzOjEy
IFBNLCBNaWtlIEpvbmVzICZsdDs8YSBocmVmPSJtYWlsdG86TWljaGFlbC5Kb25lcz00MG1pY3Jv
c29mdC5jb21AZG1hcmMuaWV0Zi5vcmciIHRhcmdldD0iX2JsYW5rIj5NaWNoYWVsLi5Kb25lcz00
MG1pY3Jvc29mdC5jb21AZG1hcmMuaWV0Zi5vcmc8L2E+Jmd0OyB3cm90ZTo8bzpwPjwvbzpwPjwv
cD4NCjxibG9ja3F1b3RlIHN0eWxlPSJib3JkZXI6bm9uZTtib3JkZXItbGVmdDpzb2xpZCAjQ0ND
Q0NDIDEuMHB0O3BhZGRpbmc6MGluIDBpbiAwaW4gNi4wcHQ7bWFyZ2luLWxlZnQ6NC44cHQ7bWFy
Z2luLXJpZ2h0OjBpbiI+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxl
PSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+VGhp
cyBub3RlIGlzIHNvbGljaXRpbmcgZmVlZGJhY2sgb24gdGhlIGJlc3QgcGF0aCBmb3INCjxhIGhy
ZWY9Imh0dHBzOi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC9kcmFmdC1qb25lcy13ZWJhdXRobi1zZWNw
MjU2azEtMDAiIHRhcmdldD0iX2JsYW5rIj4NCmh0dHBzOi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC9k
cmFmdC1qb25lcy13ZWJhdXRobi1zZWNwMjU2azEtMDA8L2E+IHRvIGJlY29tZSBhbiBSRkMuJm5i
c3A7IEl0cyBwdXJwb3NlIGlzIHZlcnkgc3BlY2lmaWMgYW5kIG5hcnJvdzombmJzcDsgSXQgcmVn
aXN0ZXJzIEpPU0UgYW5kIENPU0UgY3VydmUgaWRlbnRpZmllcnMgZm9yIHRoZSBTRUNHIHNlY3Ay
NTZrMSBlbGxpcHRpYyBjdXJ2ZSBhbmQgYXNzb2NpYXRlZCBhbGdvcml0aG0gaWRlbnRpZmllcnMu
ICZuYnNwOyBUaGlzIGlzDQogdXNlZCBieSBGSURPIFVBRiwgdGhlIFczQyBWZXJpZmlhYmxlIENs
YWltcyBpbnRlcmVzdCBncm91cCwgYW5kIHNldmVyYWwgYmxvY2tjaGFpbiBwcm9qZWN0cy4mbmJz
cDsgSSB3YW50IHRvIGdldCBzdGFuZGFyZCBpZGVudGlmaWVycyByZWdpc3RlcmVkIHNvIHRoZXNl
IHByb2plY3RzIGNhbiB1c2Ugc3RhbmRhcmRzLWJhc2VkLCByYXRoZXIgdGhhbiBhZC1ob2MsIGNy
eXB0b2dyYXBoaWMgcmVwcmVzZW50YXRpb25zLiZuYnNwOyBHaXZlbiB0aGUgd2lkZXNwcmVhZA0K
IHVzZSBvZiB0aGlzIGN1cnZlIGFuZCBhbGdvcml0aG0sIEkgd291bGQgbGlrZSB0aGlzIHNwZWMg
dG8gYmVjb21lIGFuIFJGQyBzbyB0aGF0IHRoZSBzbWFsbCBpbnRlZ2VyIHZhbHVlcyBjYW4gYmUg
YXNzaWduZWQgZm9yIENPU0UsIHBlciB0aGUg4oCcU3RhbmRhcmRzIEFjdGlvbuKAnSByZXF1aXJl
bWVudCBmb3IgdGhlIExhYmVsIGFzc2lnbm1lbnQgaW4gdGhlIHJlZ2lzdHJ5IHBvbGljeSBhdA0K
PGEgaHJlZj0iaHR0cHM6Ly90b29scy5pZXRmLm9yZy9odG1sL3JmYzgxNTIjc2VjdGlvbi0xNi4y
IiB0YXJnZXQ9Il9ibGFuayI+aHR0cHM6Ly90b29scy5pZXRmLm9yZy9odG1sL3JmYzgxNTIjc2Vj
dGlvbi0xNi4yPC9hPi4gSSBiZWxpZXZlIGl04oCZcyBhbHNvIHZlcnkgbGlrZWx5IHRoYXQgc29t
ZSBJRVRGIHNwZWNpZmljYXRpb25zIHdpbGwgZW5kIHVwIHVzaW5nIHRoZXNlIHJlZ2lzdHJhdGlv
bnMgYXMgd2VsbC48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJt
c28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+Jm5ic3A7
PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10
b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG8iPkFzIGJhY2tncm91bmQsIEni
gJlkIGNvbW1pdHRlZCB0byB0aGUgVzNDIFdlYiBBdXRoZW50aWNhdGlvbiAoV2ViQXV0aG4pIHdv
cmtpbmcgZ3JvdXAgYW5kIHRoZSBGSURPIEFsbGlhbmNlIHRvIHJlZ2lzdGVyIGFsbCB0aGUgYWxn
b3JpdGhtcyB1c2VkIGJ5IHRoZWlyIHNwZWNpZmljYXRpb25zIHRoYXQgZG8gbm90DQogaGF2ZSBj
dXJyZW50IElBTkEgcmVnaXN0cmF0aW9ucyBmb3IgSk9TRSBhbmQgQ09TRS4mbmJzcDsgPGEgaHJl
Zj0iaHR0cHM6Ly90b29scy5pZXRmLm9yZy9odG1sL2RyYWZ0LWpvbmVzLXdlYmF1dGhuLWNvc2Ut
YWxnb3JpdGhtcy0wMSIgdGFyZ2V0PSJfYmxhbmsiPg0KaHR0cHM6Ly90b29scy5pZXRmLm9yZy9o
dG1sL2RyYWZ0LWpvbmVzLXdlYmF1dGhuLWNvc2UtYWxnb3JpdGhtcy0wMTwvYT4gc3RhcnRlZCB0
aGlzIHByb2Nlc3MgYnkgcmVnaXN0ZXJpbmcgYWRkaXRpb25hbCBSU0EgYWxnb3JpdGhtcyAod2l0
aCBoZWxwIGZyb20gSmltIFNjaGFhZCwgU2VhbiBUdXJuZXIsIGFuZCBvdGhlcnMpLiZuYnNwOyBU
aGUgbmV4dCBzdGVwIGluIHRoaXMgcHJvY2VzcyBpcyByZWdpc3RlcmluZyB0aGUgU0VDRyBzZWNw
MjU2azEgZWxsaXB0aWMNCiBjdXJ2ZSBhbmQgYXNzb2NpYXRlZCBhbGdvcml0aG0gaWRlbnRpZmll
cnMuPG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdp
bi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG8iPiZuYnNwOzxvOnA+PC9v
OnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDph
dXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj5CZW4gS2FkdWsgc3VnZ2VzdGVkIHRoYXQg
SSBhc2sgU2VjRGlzcGF0Y2ggZm9yIGlucHV0IG9uIHRoZSBiZXN0IHBhdGggZm9yd2FyZC4mbmJz
cDsgRm9yIGluc3RhbmNlLCBpcyBhbnlvbmUgaW50ZXJlc3RlZCBpbiByZXZpZXdpbmcgdGhlIGRv
Y3VtZW50IG9yIGJlaW5nIHRoZSBkb2N1bWVudCBzaGVwaGVyZD8mbmJzcDsgSSBiZWxpZXZlDQog
dGhhdCBBcmVhIERpcmVjdG9yIHNwb25zb3JzaGlwIHByb2JhYmx5IG1ha2VzIHRoZSBiZXN0IHNl
bnNlIGZvciB0aGlzIHZlcnkgdGFyZ2V0ZWQgZG9jdW1lbnQgYnV0IGFtIG9wZW4gdG8gb3RoZXIg
b3B0aW9ucy4gJm5ic3A7IEkga25vdyB0aGF0IHRoZSBXM0MgYW5kIHRoZSBGSURPIEFsbGlhbmNl
IHdvdWxkIGFwcHJlY2lhdGUgaGF2aW5nIGEgcGF0aCBmb3J3YXJkIGZvciB0aGVzZSByZWdpc3Ry
YXRpb25zLjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1t
YXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj4mbmJzcDs8bzpw
PjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtc28tbWFyZ2luLXRvcC1h
bHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+VGhhbmtzIGZvciB5b3VyIGZlZWRi
YWNrLjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJn
aW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj48c3BhbiBzdHlsZT0i
Y29sb3I6Izg4ODg4OCI+Jm5ic3A7PG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1z
b05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9t
LWFsdDphdXRvIj48c3BhbiBzdHlsZT0iY29sb3I6Izg4ODg4OCI+Jm5ic3A7Jm5ic3A7Jm5ic3A7
Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i
c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7
Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i
c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7
Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i
c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IC0tIE1pa2U8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBj
bGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdp
bi1ib3R0b20tYWx0OmF1dG8iPjxzcGFuIHN0eWxlPSJjb2xvcjojODg4ODg4Ij4mbmJzcDs8bzpw
PjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIg
c3R5bGU9Im1hcmdpbi1ib3R0b206MTIuMHB0Ij48YnI+DQpfX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fXzxicj4NClNlY2Rpc3BhdGNoIG1haWxpbmcgbGlzdDxi
cj4NCjxhIGhyZWY9Im1haWx0bzpTZWNkaXNwYXRjaEBpZXRmLm9yZyI+U2VjZGlzcGF0Y2hAaWV0
Zi5vcmc8L2E+PGJyPg0KPGEgaHJlZj0iaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0
aW5mby9zZWNkaXNwYXRjaCIgdGFyZ2V0PSJfYmxhbmsiPmh0dHBzOi8vd3d3LmlldGYub3JnL21h
aWxtYW4vbGlzdGluZm8vc2VjZGlzcGF0Y2g8L2E+PG86cD48L286cD48L3A+DQo8L2Jsb2NrcXVv
dGU+DQo8L2Rpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0K
PC9kaXY+DQo8L2Rpdj4NCjwvYm9keT4NCjwvaHRtbD4NCg==

--_000_BL0PR00MB029274D5B739CC78BE98B3E5F57B0BL0PR00MB0292namp_--


From nobody Fri Jun  8 12:03:26 2018
Return-Path: <hallam@gmail.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0D8AA130F7C for <secdispatch@ietfa.amsl.com>; Fri,  8 Jun 2018 12:03:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.402
X-Spam-Level: 
X-Spam-Status: No, score=-1.402 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.248, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.249, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rS_mlJWJXjSu for <secdispatch@ietfa.amsl.com>; Fri,  8 Jun 2018 12:03:21 -0700 (PDT)
Received: from mail-ot0-x22b.google.com (mail-ot0-x22b.google.com [IPv6:2607:f8b0:4003:c0f::22b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DB8F4130F80 for <secdispatch@ietf.org>; Fri,  8 Jun 2018 12:03:20 -0700 (PDT)
Received: by mail-ot0-x22b.google.com with SMTP id 101-v6so16888826oth.4 for <secdispatch@ietf.org>; Fri, 08 Jun 2018 12:03:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=4zybZojeLxdhK9ZftdXzy2gWpp/ehZVlhxuUC0e0Ih8=; b=A+LGMP0S0D3Z6teA0Opj6RbWzKF7JhMDIA6MQRtw2y1dy88xaEDATMTPSK69nEiWG3 h8E6adPJhwfOkf7nrzPABPCLyo6+MhlsicBlIOgLdEthilAXhUA4MCYq3J0RCWnmTwTJ SZFSUlKJ1ctkJPJumTefY6qIM3BsgOXawaVd3pSXleZdnz+eJRjTtg2VFPG0SEpYBv4z I7zPAjlHRH/0lSIubVnBPLa5C9jD4I4NV/aOBAA0PS+mo12AWaNhWrCtlYWdUckq58t7 tOVbqrq7J/3DT9qi14nB6xqIGzqbiev7tusLl/w300EUL4oOkUUfHuarAet6DYget65p 7qWQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=4zybZojeLxdhK9ZftdXzy2gWpp/ehZVlhxuUC0e0Ih8=; b=qwuJ3rbtN4X6HEi4RncjDDxZIPxbc9SqOqd78XFRlnrDs7AQ123FBEkMAoNksKUQRX DzrIZvLsn3yt5dex/6ANSVck4UsZUs3jzYRfDF1Y68wgc6xUlaBEbIheYAeZuxbMPblO Z4iKQMEXmHTczDStuXLDZ4nL94bKQU1WV7Sx7lu9MrqV80x9OE5B6h1xj3QjN4C2UAEs MyCjqS4m6w/ygwXbHgQjLyIeNipDro9FBEdjqP7788DUWNCKKXK8lZ7PFWERH6hChTIP 3usZUwzDj658yZbqNjIAOlUf42uhmaSGUaodIXzLrTUbNQLm2yytzF2Tq9+xcz2FqU79 oJcA==
X-Gm-Message-State: APt69E12J5fldoiJWkBIRFI7JkiReBZkw5MRfeLYM/qSvj8JXVfvDSm/ 1KPnipUIl//V0OSNowYXaVnxAnMctWfKFn55+RY=
X-Google-Smtp-Source: ADUXVKL6Jm00Gnw/cWsqv93kzvzzMlZ0+qPiqciKvpb1z7PbwjWhmqjLaXprn8rP4G4m+uAQH0CMjHCkKoXpzuY6q+U=
X-Received: by 2002:a9d:16ce:: with SMTP id s14-v6mr4122428ots.113.1528484600191;  Fri, 08 Jun 2018 12:03:20 -0700 (PDT)
MIME-Version: 1.0
Sender: hallam@gmail.com
Received: by 2002:a9d:23:0:0:0:0:0 with HTTP; Fri, 8 Jun 2018 12:03:19 -0700 (PDT)
In-Reply-To: <BL0PR00MB029274D5B739CC78BE98B3E5F57B0@BL0PR00MB0292.namprd00.prod.outlook.com>
References: <BL0PR00MB02927CDBA6AE65BB7979118FF5670@BL0PR00MB0292.namprd00.prod.outlook.com> <CAMm+Lwgf9nwPdhT7Gdex+mRhdRyfstwyYk-znpWFmaRchM_8vA@mail.gmail.com> <BL0PR00MB029274D5B739CC78BE98B3E5F57B0@BL0PR00MB0292.namprd00.prod.outlook.com>
From: Phillip Hallam-Baker <phill@hallambaker.com>
Date: Fri, 8 Jun 2018 15:03:19 -0400
X-Google-Sender-Auth: L1gkDEN5j2_7sdOENxAiZ9XsqnM
Message-ID: <CAMm+LwgbWr+xF6nKU=jhCQuA_J=vHLNfFFqyN7uLH3-tiV2jOQ@mail.gmail.com>
To: Mike Jones <Michael.Jones@microsoft.com>
Cc: "secdispatch@ietf.org" <secdispatch@ietf.org>, Benjamin Kaduk <kaduk@mit.edu>
Content-Type: multipart/alternative; boundary="000000000000a3a07b056e260db3"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/rTzkAy4yzwzesxTA_jw2u-No3uY>
Subject: Re: [Secdispatch] Document that registers the SECG secp256k1 elliptic curve
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Jun 2018 19:03:25 -0000

--000000000000a3a07b056e260db3
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Could you point to those definitions in your draft so that we close the
circle?

There are two reasons for this. First, a lot of folk are going to use your
draft as cookie cutter for theirs and so there may not be an OID. But
equally importantly, we need to capture the fact that these two things are
the same. Otherwise, we are likely to end up having to write documents to
state that...


On Fri, Jun 8, 2018 at 1:43 PM, Mike Jones <Michael.Jones@microsoft.com>
wrote:

> Thanks for asking, Phillip.  I just took the time to look up whether ther=
e
> is already an OID registered for this curve and it turns out that there
> is.  See Section A.2.1 of http://www.secg.org/sec2-v2.pdf which specifies
> the OID 1.3.132.0.10 for secp256k1  (and also specifies OIDs for the othe=
r
> curves specified therein, such as 1.2.840.10045.3.1.7 for secp256r1).
> Furthermore, RFC 5758 specifies the OID 1.2.840.10045.4.3.2 for ECDSA wit=
h
> SHA-256 in https://tools.ietf.org/html/rfc5758#section-3.2.
>
>
>
> So I believe we=E2=80=99re already covered on the OID registrations.
>
>
>
>                                                        -- Mike
>
>
>
> *From:* hallam@gmail.com <hallam@gmail.com> *On Behalf Of *Phillip
> Hallam-Baker
> *Sent:* Monday, June 4, 2018 12:15 PM
> *To:* Mike Jones <Michael.Jones@microsoft.com>
> *Cc:* secdispatch@ietf.org; Benjamin Kaduk <kaduk@mit.edu>
> *Subject:* Re: [Secdispatch] Document that registers the SECG secp256k1
> elliptic curve
>
>
>
> If we are going to register algorithms, perhaps we could do all of them i=
n
> one doc including ASN.1 OIDS. These need not be new code points if alread=
y
> specified but we should have one OID for IETF purposes per algorithm
> wherever possible.
>
>
>
>
>
> On Mon, Jun 4, 2018 at 3:12 PM, Mike Jones <Michael..Jones=3D40microsoft.
> com@dmarc.ietf.org <Michael.Jones=3D40microsoft.com@dmarc.ietf.org>> wrot=
e:
>
> This note is soliciting feedback on the best path for
> https://tools.ietf.org/html/draft-jones-webauthn-secp256k1-00 to become
> an RFC.  Its purpose is very specific and narrow:  It registers JOSE and
> COSE curve identifiers for the SECG secp256k1 elliptic curve and associat=
ed
> algorithm identifiers.   This is used by FIDO UAF, the W3C Verifiable
> Claims interest group, and several blockchain projects.  I want to get
> standard identifiers registered so these projects can use standards-based=
,
> rather than ad-hoc, cryptographic representations.  Given the widespread
> use of this curve and algorithm, I would like this spec to become an RFC =
so
> that the small integer values can be assigned for COSE, per the =E2=80=9C=
Standards
> Action=E2=80=9D requirement for the Label assignment in the registry poli=
cy at
> https://tools.ietf.org/html/rfc8152#section-16.2. I believe it=E2=80=99s =
also
> very likely that some IETF specifications will end up using these
> registrations as well.
>
>
>
> As background, I=E2=80=99d committed to the W3C Web Authentication (WebAu=
thn)
> working group and the FIDO Alliance to register all the algorithms used b=
y
> their specifications that do not have current IANA registrations for JOSE
> and COSE.  https://tools.ietf.org/html/draft-jones-webauthn-cose-
> algorithms-01 started this process by registering additional RSA
> algorithms (with help from Jim Schaad, Sean Turner, and others).  The nex=
t
> step in this process is registering the SECG secp256k1 elliptic curve and
> associated algorithm identifiers.
>
>
>
> Ben Kaduk suggested that I ask SecDispatch for input on the best path
> forward.  For instance, is anyone interested in reviewing the document or
> being the document shepherd?  I believe that Area Director sponsorship
> probably makes the best sense for this very targeted document but am open
> to other options.   I know that the W3C and the FIDO Alliance would
> appreciate having a path forward for these registrations.
>
>
>
> Thanks for your feedback.
>
>
>
>                                                        -- Mike
>
>
>
>
> _______________________________________________
> Secdispatch mailing list
> Secdispatch@ietf.org
> https://www.ietf.org/mailman/listinfo/secdispatch
>
>
>

--000000000000a3a07b056e260db3
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_default" style=3D"font-size:small">Cou=
ld you point to those definitions in your draft so that we close the circle=
?</div><div class=3D"gmail_default" style=3D"font-size:small"><br></div><di=
v class=3D"gmail_default" style=3D"font-size:small">There are two reasons f=
or this. First, a lot of folk are going to use your draft as cookie cutter =
for theirs and so there may not be an OID. But equally importantly, we need=
 to capture the fact that these two things are the same. Otherwise, we are =
likely to end up having to write documents to state that...</div><div class=
=3D"gmail_default" style=3D"font-size:small"><br></div></div><div class=3D"=
gmail_extra"><br><div class=3D"gmail_quote">On Fri, Jun 8, 2018 at 1:43 PM,=
 Mike Jones <span dir=3D"ltr">&lt;<a href=3D"mailto:Michael.Jones@microsoft=
.com" target=3D"_blank">Michael.Jones@microsoft.com</a>&gt;</span> wrote:<b=
r><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:=
1px #ccc solid;padding-left:1ex">





<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"m_-4527464826839640307WordSection1">
<p class=3D"MsoNormal"><span style=3D"color:#002060">Thanks for asking, Phi=
llip.=C2=A0 I just took the time to look up whether there is already an OID=
 registered for this curve and it turns out that there is.=C2=A0 See Sectio=
n A.2.1 of
<a href=3D"http://www.secg.org/sec2-v2.pdf" target=3D"_blank">http://www.se=
cg.org/sec2-v2.<wbr>pdf</a> which specifies the OID 1.3.132.0.10 for secp25=
6k1 =C2=A0(and also specifies OIDs for the other curves specified therein, =
such as 1.2.840.10045.3.1.7 for secp256r1).=C2=A0 Furthermore, RFC
 5758 specifies the OID 1.2.840.10045.4.3.2 for ECDSA with SHA-256 in <a hr=
ef=3D"https://tools.ietf.org/html/rfc5758#section-3.2" target=3D"_blank">
https://tools.ietf.org/html/<wbr>rfc5758#section-3.2</a>.<u></u><u></u></sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">So I believe we=E2=80=
=99re already covered on the OID registrations.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060">=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0<wbr>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 -- Mike<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#002060"><u></u>=C2=A0<u></u></=
span></p>
<p class=3D"MsoNormal"><b>From:</b> <a href=3D"mailto:hallam@gmail.com" tar=
get=3D"_blank">hallam@gmail.com</a> &lt;<a href=3D"mailto:hallam@gmail.com"=
 target=3D"_blank">hallam@gmail.com</a>&gt; <b>On Behalf Of
</b>Phillip Hallam-Baker<br>
<b>Sent:</b> Monday, June 4, 2018 12:15 PM<br>
<b>To:</b> Mike Jones &lt;<a href=3D"mailto:Michael.Jones@microsoft.com" ta=
rget=3D"_blank">Michael.Jones@microsoft.com</a>&gt;<br>
<b>Cc:</b> <a href=3D"mailto:secdispatch@ietf.org" target=3D"_blank">secdis=
patch@ietf.org</a>; Benjamin Kaduk &lt;<a href=3D"mailto:kaduk@mit.edu" tar=
get=3D"_blank">kaduk@mit.edu</a>&gt;<br>
<b>Subject:</b> Re: [Secdispatch] Document that registers the SECG secp256k=
1 elliptic curve<u></u><u></u></p><span class=3D"">
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt">If we are going to =
register algorithms, perhaps we could do all of them in one doc including A=
SN.1 OIDS. These need not be new code points if already specified but we sh=
ould have one OID for IETF purposes
 per algorithm wherever possible.<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:12.0pt"><u></u>=C2=A0<u></u=
></span></p>
</div>
</div>
</span><span class=3D""><div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">On Mon, Jun 4, 2018 at 3:12 PM, Mike Jones &lt;<a hr=
ef=3D"mailto:Michael.Jones=3D40microsoft.com@dmarc.ietf.org" target=3D"_bla=
nk">Michael..Jones=3D40microsoft.<wbr>com@dmarc.ietf.org</a>&gt; wrote:<u><=
/u><u></u></p>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0i=
n 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<div>
<div>
<p class=3D"MsoNormal">This note is soliciting feedback on the best path fo=
r
<a href=3D"https://tools.ietf.org/html/draft-jones-webauthn-secp256k1-00" t=
arget=3D"_blank">
https://tools.ietf.org/html/<wbr>draft-jones-webauthn-<wbr>secp256k1-00</a>=
 to become an RFC.=C2=A0 Its purpose is very specific and narrow:=C2=A0 It =
registers JOSE and COSE curve identifiers for the SECG secp256k1 elliptic c=
urve and associated algorithm identifiers. =C2=A0 This is
 used by FIDO UAF, the W3C Verifiable Claims interest group, and several bl=
ockchain projects.=C2=A0 I want to get standard identifiers registered so t=
hese projects can use standards-based, rather than ad-hoc, cryptographic re=
presentations.=C2=A0 Given the widespread
 use of this curve and algorithm, I would like this spec to become an RFC s=
o that the small integer values can be assigned for COSE, per the =E2=80=9C=
Standards Action=E2=80=9D requirement for the Label assignment in the regis=
try policy at
<a href=3D"https://tools.ietf.org/html/rfc8152#section-16.2" target=3D"_bla=
nk">https://tools.ietf.org/html/<wbr>rfc8152#section-16.2</a>. I believe it=
=E2=80=99s also very likely that some IETF specifications will end up using=
 these registrations as well.<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">As background, I=E2=80=99d committed to the W3C Web =
Authentication (WebAuthn) working group and the FIDO Alliance to register a=
ll the algorithms used by their specifications that do not
 have current IANA registrations for JOSE and COSE.=C2=A0 <a href=3D"https:=
//tools.ietf.org/html/draft-jones-webauthn-cose-algorithms-01" target=3D"_b=
lank">
https://tools.ietf.org/html/<wbr>draft-jones-webauthn-cose-<wbr>algorithms-=
01</a> started this process by registering additional RSA algorithms (with =
help from Jim Schaad, Sean Turner, and others).=C2=A0 The next step in this=
 process is registering the SECG secp256k1 elliptic
 curve and associated algorithm identifiers.<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">Ben Kaduk suggested that I ask SecDispatch for input=
 on the best path forward.=C2=A0 For instance, is anyone interested in revi=
ewing the document or being the document shepherd?=C2=A0 I believe
 that Area Director sponsorship probably makes the best sense for this very=
 targeted document but am open to other options. =C2=A0 I know that the W3C=
 and the FIDO Alliance would appreciate having a path forward for these reg=
istrations.<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal">Thanks for your feedback.<u></u><u></u></p>
<p class=3D"MsoNormal"><span style=3D"color:#888888">=C2=A0<u></u><u></u></=
span></p>
<p class=3D"MsoNormal"><span style=3D"color:#888888">=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0<wbr>=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 -- Mike<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span style=3D"color:#888888">=C2=A0<u></u><u></u></=
span></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
______________________________<wbr>_________________<br>
Secdispatch mailing list<br>
<a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank">Secdispatch@ietf.=
org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/secdispatch" target=3D"_bl=
ank">https://www.ietf.org/mailman/<wbr>listinfo/secdispatch</a><u></u><u></=
u></p>
</blockquote>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</span></div>
</div>

</blockquote></div><br></div>

--000000000000a3a07b056e260db3--


From nobody Fri Jun  8 12:23:54 2018
Return-Path: <Michael.Jones@microsoft.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 10736130EFD for <secdispatch@ietfa.amsl.com>; Fri,  8 Jun 2018 12:23:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level: 
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EPyKsjq0v4aa for <secdispatch@ietfa.amsl.com>; Fri,  8 Jun 2018 12:23:48 -0700 (PDT)
Received: from NAM03-CO1-obe.outbound.protection.outlook.com (mail-co1nam03on071c.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe48::71c]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F2F40130F7C for <secdispatch@ietf.org>; Fri,  8 Jun 2018 12:23:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HmyNBGVBkN6ciHUSBJXVw4ShzMrgAQ8f4EPsZ+6/UHw=; b=XGcsumv8jIWVj3XVy+EViXT3BZovE0OZRSkxVPxBpX0zPD5b/m7uI3gL5o/8p1beLDKdtZUIPeRTuBD71HER86c+NOAicOo+KyaX3HRzKhSSuaKf03Io1g3FHpP+5SDEo3iPoHMHHLotH1XIAldkNNQrWxy/eClN6udVyqg6mEc=
Received: from BL0PR00MB0292.namprd00.prod.outlook.com (52.132.19.158) by BL0PR00MB0292.namprd00.prod.outlook.com (52.132.19.158) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.880.0; Fri, 8 Jun 2018 19:23:32 +0000
Received: from BL0PR00MB0292.namprd00.prod.outlook.com ([fe80::13e:8f40:ef2a:4b2f]) by BL0PR00MB0292.namprd00.prod.outlook.com ([fe80::13e:8f40:ef2a:4b2f%3]) with mapi id 15.20.0880.000; Fri, 8 Jun 2018 19:23:32 +0000
From: Mike Jones <Michael.Jones@microsoft.com>
To: Phillip Hallam-Baker <phill@hallambaker.com>
CC: "secdispatch@ietf.org" <secdispatch@ietf.org>, Benjamin Kaduk <kaduk@mit.edu>
Thread-Topic: [Secdispatch] Document that registers the SECG secp256k1 elliptic curve
Thread-Index: AdP8Kdnc3ZZaMd5VTPONut+KoS2cIQADoAAAAMUz5FAAA4zggAAAo6QA
Date: Fri, 8 Jun 2018 19:23:32 +0000
Message-ID: <BL0PR00MB0292B6891FCF5AA30D590E34F57B0@BL0PR00MB0292.namprd00.prod.outlook.com>
References: <BL0PR00MB02927CDBA6AE65BB7979118FF5670@BL0PR00MB0292.namprd00.prod.outlook.com> <CAMm+Lwgf9nwPdhT7Gdex+mRhdRyfstwyYk-znpWFmaRchM_8vA@mail.gmail.com> <BL0PR00MB029274D5B739CC78BE98B3E5F57B0@BL0PR00MB0292.namprd00.prod.outlook.com> <CAMm+LwgbWr+xF6nKU=jhCQuA_J=vHLNfFFqyN7uLH3-tiV2jOQ@mail.gmail.com>
In-Reply-To: <CAMm+LwgbWr+xF6nKU=jhCQuA_J=vHLNfFFqyN7uLH3-tiV2jOQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Owner=mbj@microsoft.com; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2018-06-08T19:23:29.4388720Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=General; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Application=Microsoft Azure Information Protection; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Extended_MSFT_Method=Automatic; Sensitivity=General
x-originating-ip: [2001:4898:80e8:1:8d97:35c9:9394:f501]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BL0PR00MB0292; 7:0cW26E4GcjYFY9HYtCRc0kDizh6bGbkHxzjtLIlh0dGZoHziVDrkwOnqn2W76exRHe4tg6rRwMQ7/aN2LXnuOuVeuW7TjR78AWWpfqldikRgrvsT90ZA9DdXdnsnxUj5vo1PxVXakOhDZsisXoYbixQazXmhvau6IOjrJlmxBM5RLFuHDEgHymGScILGYcBWHl9ExlkErUq7PKG5VZTX8RsRGa9ApepwywpG+3Wo5hCIx5H08n62xkBFadz/9fGq
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7193020); SRVR:BL0PR00MB0292; 
x-ms-traffictypediagnostic: BL0PR00MB0292:
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Michael.Jones@microsoft.com; 
x-microsoft-antispam-prvs: <BL0PR00MB029262B0B8A1F379A2A738F0F57B0@BL0PR00MB0292.namprd00.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(89211679590171)(85827821059158)(21748063052155)(240460790083961)(5213294742642);
x-ms-exchange-senderadcheck: 1
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(2017102700009)(2017102701064)(6040522)(2401047)(5005006)(8121501046)(2017102702064)(20171027021009)(20171027022009)(20171027023009)(20171027024009)(20171027025009)(20171027026009)(2017102703076)(3231254)(2018427008)(944501410)(52105095)(93006095)(93001095)(3002001)(10201501046)(6055026)(149027)(150027)(6041310)(20161123562045)(20161123560045)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(6072148)(201708071742011)(7699016); SRVR:BL0PR00MB0292; BCL:0; PCL:0; RULEID:; SRVR:BL0PR00MB0292; 
x-forefront-prvs: 06973FFAD3
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(396003)(366004)(39380400002)(346002)(376002)(199004)(52254002)(189003)(53546011)(59450400001)(6506007)(478600001)(5250100002)(10290500003)(186003)(10090500001)(46003)(86612001)(446003)(486006)(99286004)(76176011)(86362001)(476003)(11346002)(102836004)(72206003)(22452003)(966005)(8990500004)(33656002)(54906003)(19609705001)(316002)(14454004)(5660300001)(53936002)(6436002)(81166006)(236005)(6246003)(2906002)(2900100001)(229853002)(68736007)(97736004)(7696005)(106356001)(74316002)(55016002)(54896002)(8676002)(81156014)(7736002)(8936002)(105586002)(6306002)(9686003)(6116002)(790700001)(3660700001)(3280700002)(93886005)(4326008)(6916009)(606006)(25786009); DIR:OUT; SFP:1102; SCL:1; SRVR:BL0PR00MB0292; H:BL0PR00MB0292.namprd00.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: B97thRXXBObRcqX/+yemnQCIBioWqwZl0UahKm8buWYKezKbI5Edr8jE4ti0u74wbI5pMAnBSGCSg6Fw1eSYalsHOGmLi/GDXKFBNz1g8ekeHazj23tc1tJMl4FYRzbSmzv6C0cOc8KUr9eTr9OvNte/db1IKwuj4RYG2jq0FUj0mndD48S+tU6DScAp5ChW
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_BL0PR00MB0292B6891FCF5AA30D590E34F57B0BL0PR00MB0292namp_"
MIME-Version: 1.0
X-MS-Office365-Filtering-Correlation-Id: 3bdf67ed-0db7-4813-bd85-08d5cd75528e
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3bdf67ed-0db7-4813-bd85-08d5cd75528e
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Jun 2018 19:23:32.1606 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR00MB0292
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/i30ilATxDbZuY3jOkLZKG-GCOl4>
Subject: Re: [Secdispatch] Document that registers the SECG secp256k1 elliptic curve
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Jun 2018 19:23:52 -0000

--_000_BL0PR00MB0292B6891FCF5AA30D590E34F57B0BL0PR00MB0292namp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_BL0PR00MB0292B6891FCF5AA30D590E34F57B0BL0PR00MB0292namp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy
bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt
YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj
cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv
VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg
Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv
ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl
PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6
IkNhbWJyaWEgTWF0aCI7DQoJcGFub3NlLTE6MiA0IDUgMyA1IDQgNiAzIDIgNDt9DQpAZm9udC1m
YWNlDQoJe2ZvbnQtZmFtaWx5OkNhbGlicmk7DQoJcGFub3NlLTE6MiAxNSA1IDIgMiAyIDQgMyAy
IDQ7fQ0KLyogU3R5bGUgRGVmaW5pdGlvbnMgKi8NCnAuTXNvTm9ybWFsLCBsaS5Nc29Ob3JtYWws
IGRpdi5Nc29Ob3JtYWwNCgl7bWFyZ2luOjBpbjsNCgltYXJnaW4tYm90dG9tOi4wMDAxcHQ7DQoJ
Zm9udC1zaXplOjExLjBwdDsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsc2Fucy1zZXJpZjt9DQph
OmxpbmssIHNwYW4uTXNvSHlwZXJsaW5rDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xv
cjpibHVlOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KYTp2aXNpdGVkLCBzcGFuLk1z
b0h5cGVybGlua0ZvbGxvd2VkDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsNCgljb2xvcjpwdXJw
bGU7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQpwLm1zb25vcm1hbDAsIGxpLm1zb25v
cm1hbDAsIGRpdi5tc29ub3JtYWwwDQoJe21zby1zdHlsZS1uYW1lOm1zb25vcm1hbDsNCgltc28t
bWFyZ2luLXRvcC1hbHQ6YXV0bzsNCgltYXJnaW4tcmlnaHQ6MGluOw0KCW1zby1tYXJnaW4tYm90
dG9tLWFsdDphdXRvOw0KCW1hcmdpbi1sZWZ0OjBpbjsNCglmb250LXNpemU6MTEuMHB0Ow0KCWZv
bnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNlcmlmO30NCnNwYW4uRW1haWxTdHlsZTE4DQoJe21z
by1zdHlsZS10eXBlOnBlcnNvbmFsLXJlcGx5Ow0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5z
LXNlcmlmOw0KCWNvbG9yOiMwMDIwNjA7fQ0KLk1zb0NocERlZmF1bHQNCgl7bXNvLXN0eWxlLXR5
cGU6ZXhwb3J0LW9ubHk7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLHNhbnMtc2VyaWY7fQ0KQHBh
Z2UgV29yZFNlY3Rpb24xDQoJe3NpemU6OC41aW4gMTEuMGluOw0KCW1hcmdpbjoxLjBpbiAxLjBp
biAxLjBpbiAxLjBpbjt9DQpkaXYuV29yZFNlY3Rpb24xDQoJe3BhZ2U6V29yZFNlY3Rpb24xO30N
Ci0tPjwvc3R5bGU+PCEtLVtpZiBndGUgbXNvIDldPjx4bWw+DQo8bzpzaGFwZWRlZmF1bHRzIHY6
ZXh0PSJlZGl0IiBzcGlkbWF4PSIxMDI2IiAvPg0KPC94bWw+PCFbZW5kaWZdLS0+PCEtLVtpZiBn
dGUgbXNvIDldPjx4bWw+DQo8bzpzaGFwZWxheW91dCB2OmV4dD0iZWRpdCI+DQo8bzppZG1hcCB2
OmV4dD0iZWRpdCIgZGF0YT0iMSIgLz4NCjwvbzpzaGFwZWxheW91dD48L3htbD48IVtlbmRpZl0t
LT4NCjwvaGVhZD4NCjxib2R5IGxhbmc9IkVOLVVTIiBsaW5rPSJibHVlIiB2bGluaz0icHVycGxl
Ij4NCjxkaXYgY2xhc3M9IldvcmRTZWN0aW9uMSI+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3Bh
biBzdHlsZT0iY29sb3I6IzAwMjA2MCI+U3VyZS4mbmJzcDsgSSB3YXMgYWN0dWFsbHkgdGhpbmtp
bmcgb2YgYWRkaW5nIGFuIGFwcGVuZGl4IG11Y2ggbGlrZSB0aGUgb25lIGF0DQo8YSBocmVmPSJo
dHRwczovL3Rvb2xzLmlldGYub3JnL2h0bWwvcmZjNzUxOCNhcHBlbmRpeC1BIj5odHRwczovL3Rv
b2xzLmlldGYub3JnL2h0bWwvcmZjNzUxOCNhcHBlbmRpeC1BPC9hPiBjcm9zcy1yZWZlcmVuY2lu
ZyB0aGUgZGlmZmVyZW50IGlkZW50aWZpZXJzLjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJjb2xvcjojMDAyMDYwIj48bzpwPiZuYnNwOzwv
bzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iY29sb3I6
IzAwMjA2MCI+Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7
Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i
c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7
Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i
c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7
Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5i
c3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7Jm5ic3A7IC0tIE1pa2U8bzpw
PjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iY29s
b3I6IzAwMjA2MCI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCI+PGI+RnJvbTo8L2I+IFNlY2Rpc3BhdGNoICZsdDtzZWNkaXNwYXRjaC1ib3VuY2VzQGll
dGYub3JnJmd0OyA8Yj5PbiBCZWhhbGYgT2YNCjwvYj5QaGlsbGlwIEhhbGxhbS1CYWtlcjxicj4N
CjxiPlNlbnQ6PC9iPiBGcmlkYXksIEp1bmUgOCwgMjAxOCAxMjowMyBQTTxicj4NCjxiPlRvOjwv
Yj4gTWlrZSBKb25lcyAmbHQ7TWljaGFlbC5Kb25lc0BtaWNyb3NvZnQuY29tJmd0Ozxicj4NCjxi
PkNjOjwvYj4gc2VjZGlzcGF0Y2hAaWV0Zi5vcmc7IEJlbmphbWluIEthZHVrICZsdDtrYWR1a0Bt
aXQuZWR1Jmd0Ozxicj4NCjxiPlN1YmplY3Q6PC9iPiBSZTogW1NlY2Rpc3BhdGNoXSBEb2N1bWVu
dCB0aGF0IHJlZ2lzdGVycyB0aGUgU0VDRyBzZWNwMjU2azEgZWxsaXB0aWMgY3VydmU8bzpwPjwv
bzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPGRp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEy
LjBwdCI+Q291bGQgeW91IHBvaW50IHRvIHRob3NlIGRlZmluaXRpb25zIGluIHlvdXIgZHJhZnQg
c28gdGhhdCB3ZSBjbG9zZSB0aGUgY2lyY2xlPzxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2
Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTIu
MHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEyLjBwdCI+VGhlcmUgYXJlIHR3
byByZWFzb25zIGZvciB0aGlzLiBGaXJzdCwgYSBsb3Qgb2YgZm9sayBhcmUgZ29pbmcgdG8gdXNl
IHlvdXIgZHJhZnQgYXMgY29va2llIGN1dHRlciBmb3IgdGhlaXJzIGFuZCBzbyB0aGVyZSBtYXkg
bm90IGJlIGFuIE9JRC4gQnV0IGVxdWFsbHkgaW1wb3J0YW50bHksIHdlIG5lZWQgdG8gY2FwdHVy
ZSB0aGUgZmFjdCB0aGF0IHRoZXNlDQogdHdvIHRoaW5ncyBhcmUgdGhlIHNhbWUuIE90aGVyd2lz
ZSwgd2UgYXJlIGxpa2VseSB0byBlbmQgdXAgaGF2aW5nIHRvIHdyaXRlIGRvY3VtZW50cyB0byBz
dGF0ZSB0aGF0Li4uPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4wcHQiPjxvOnA+Jm5ic3A7
PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+
T24gRnJpLCBKdW4gOCwgMjAxOCBhdCAxOjQzIFBNLCBNaWtlIEpvbmVzICZsdDs8YSBocmVmPSJt
YWlsdG86TWljaGFlbC5Kb25lc0BtaWNyb3NvZnQuLmNvbSIgdGFyZ2V0PSJfYmxhbmsiPk1pY2hh
ZWwuSm9uZXNAbWljcm9zb2Z0LmNvbTwvYT4mZ3Q7IHdyb3RlOjxvOnA+PC9vOnA+PC9wPg0KPGJs
b2NrcXVvdGUgc3R5bGU9ImJvcmRlcjpub25lO2JvcmRlci1sZWZ0OnNvbGlkICNDQ0NDQ0MgMS4w
cHQ7cGFkZGluZzowaW4gMGluIDBpbiA2LjBwdDttYXJnaW4tbGVmdDo0LjhwdDttYXJnaW4tcmln
aHQ6MGluIj4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1t
YXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj48c3BhbiBzdHls
ZT0iY29sb3I6IzAwMjA2MCI+VGhhbmtzIGZvciBhc2tpbmcsIFBoaWxsaXAuJm5ic3A7IEkganVz
dCB0b29rIHRoZSB0aW1lIHRvIGxvb2sgdXAgd2hldGhlciB0aGVyZSBpcyBhbHJlYWR5IGFuIE9J
RCByZWdpc3RlcmVkIGZvciB0aGlzIGN1cnZlIGFuZCBpdCB0dXJucyBvdXQgdGhhdCB0aGVyZSBp
cy4mbmJzcDsNCiBTZWUgU2VjdGlvbiBBLjIuMSBvZiA8YSBocmVmPSJodHRwOi8vd3d3LnNlY2cu
b3JnL3NlYzItdjIucGRmIiB0YXJnZXQ9Il9ibGFuayI+aHR0cDovL3d3dy5zZWNnLm9yZy9zZWMy
LXYyLnBkZjwvYT4gd2hpY2ggc3BlY2lmaWVzIHRoZSBPSUQgMS4zLjEzMi4wLjEwIGZvciBzZWNw
MjU2azEgJm5ic3A7KGFuZCBhbHNvIHNwZWNpZmllcyBPSURzIGZvciB0aGUgb3RoZXIgY3VydmVz
IHNwZWNpZmllZCB0aGVyZWluLCBzdWNoIGFzIDEuMi44NDAuMTAwNDUuMy4xLjcNCiBmb3Igc2Vj
cDI1NnIxKS4mbmJzcDsgRnVydGhlcm1vcmUsIFJGQyA1NzU4IHNwZWNpZmllcyB0aGUgT0lEIDEu
Mi44NDAuMTAwNDUuNC4zLjIgZm9yIEVDRFNBIHdpdGggU0hBLTI1NiBpbg0KPGEgaHJlZj0iaHR0
cHM6Ly90b29scy5pZXRmLm9yZy9odG1sL3JmYzU3NTgjc2VjdGlvbi0zLjIiIHRhcmdldD0iX2Js
YW5rIj5odHRwczovL3Rvb2xzLmlldGYub3JnL2h0bWwvcmZjNTc1OCNzZWN0aW9uLTMuMjwvYT4u
PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1t
YXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj48c3BhbiBzdHls
ZT0iY29sb3I6IzAwMjA2MCI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90
dG9tLWFsdDphdXRvIj48c3BhbiBzdHlsZT0iY29sb3I6IzAwMjA2MCI+U28gSSBiZWxpZXZlIHdl
4oCZcmUgYWxyZWFkeSBjb3ZlcmVkIG9uIHRoZSBPSUQgcmVnaXN0cmF0aW9ucy48L3NwYW4+PG86
cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10b3At
YWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG8iPjxzcGFuIHN0eWxlPSJjb2xvcjoj
MDAyMDYwIj4mbmJzcDs8L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFs
IiBzdHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1
dG8iPjxzcGFuIHN0eWxlPSJjb2xvcjojMDAyMDYwIj4mbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm
bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz
cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm
bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz
cDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsm
bmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJzcDsmbmJz
cDsmbmJzcDsmbmJzcDsgLS0gTWlrZTwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJN
c29Ob3JtYWwiIHN0eWxlPSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRv
bS1hbHQ6YXV0byI+PHNwYW4gc3R5bGU9ImNvbG9yOiMwMDIwNjAiPiZuYnNwOzwvc3Bhbj48bzpw
PjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtc28tbWFyZ2luLXRvcC1h
bHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+PGI+RnJvbTo8L2I+DQo8YSBocmVm
PSJtYWlsdG86aGFsbGFtQGdtYWlsLmNvbSIgdGFyZ2V0PSJfYmxhbmsiPmhhbGxhbUBnbWFpbC5j
b208L2E+ICZsdDs8YSBocmVmPSJtYWlsdG86aGFsbGFtQGdtYWlsLmNvbSIgdGFyZ2V0PSJfYmxh
bmsiPmhhbGxhbUBnbWFpbC5jb208L2E+Jmd0Ow0KPGI+T24gQmVoYWxmIE9mIDwvYj5QaGlsbGlw
IEhhbGxhbS1CYWtlcjxicj4NCjxiPlNlbnQ6PC9iPiBNb25kYXksIEp1bmUgNCwgMjAxOCAxMjox
NSBQTTxicj4NCjxiPlRvOjwvYj4gTWlrZSBKb25lcyAmbHQ7PGEgaHJlZj0ibWFpbHRvOk1pY2hh
ZWwuSm9uZXNAbWljcm9zb2Z0LmNvbSIgdGFyZ2V0PSJfYmxhbmsiPk1pY2hhZWwuSm9uZXNAbWlj
cm9zb2Z0LmNvbTwvYT4mZ3Q7PGJyPg0KPGI+Q2M6PC9iPiA8YSBocmVmPSJtYWlsdG86c2VjZGlz
cGF0Y2hAaWV0Zi5vcmciIHRhcmdldD0iX2JsYW5rIj5zZWNkaXNwYXRjaEBpZXRmLm9yZzwvYT47
IEJlbmphbWluIEthZHVrICZsdDs8YSBocmVmPSJtYWlsdG86a2FkdWtAbWl0LmVkdSIgdGFyZ2V0
PSJfYmxhbmsiPmthZHVrQG1pdC5lZHU8L2E+Jmd0Ozxicj4NCjxiPlN1YmplY3Q6PC9iPiBSZTog
W1NlY2Rpc3BhdGNoXSBEb2N1bWVudCB0aGF0IHJlZ2lzdGVycyB0aGUgU0VDRyBzZWNwMjU2azEg
ZWxsaXB0aWMgY3VydmU8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxl
PSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+Jm5i
c3A7PG86cD48L286cD48L3A+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0
eWxlPSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+
PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4wcHQiPklmIHdlIGFyZSBnb2luZyB0byByZWdpc3Rl
ciBhbGdvcml0aG1zLCBwZXJoYXBzIHdlIGNvdWxkIGRvIGFsbCBvZiB0aGVtIGluIG9uZSBkb2Mg
aW5jbHVkaW5nIEFTTi4xIE9JRFMuIFRoZXNlIG5lZWQgbm90IGJlIG5ldyBjb2RlIHBvaW50cyBp
ZiBhbHJlYWR5DQogc3BlY2lmaWVkIGJ1dCB3ZSBzaG91bGQgaGF2ZSBvbmUgT0lEIGZvciBJRVRG
IHB1cnBvc2VzIHBlciBhbGdvcml0aG0gd2hlcmV2ZXIgcG9zc2libGUuPC9zcGFuPjxvOnA+PC9v
OnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1t
YXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj48c3BhbiBzdHls
ZT0iZm9udC1zaXplOjEyLjBwdCI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+
DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10
b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG8iPiZuYnNwOzxvOnA+PC9vOnA+
PC9wPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtc28tbWFyZ2luLXRvcC1h
bHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+T24gTW9uLCBKdW4gNCwgMjAxOCBh
dCAzOjEyIFBNLCBNaWtlIEpvbmVzICZsdDs8YSBocmVmPSJtYWlsdG86TWljaGFlbC5Kb25lcz00
MG1pY3Jvc29mdC5jb21AZG1hcmMuaWV0Zi5vcmciIHRhcmdldD0iX2JsYW5rIj5NaWNoYWVsLi5K
b25lcz00MG1pY3Jvc29mdC5jb21AZG1hcmMuaWV0Zi5vcmc8L2E+Jmd0OyB3cm90ZTo8bzpwPjwv
bzpwPjwvcD4NCjxibG9ja3F1b3RlIHN0eWxlPSJib3JkZXI6bm9uZTtib3JkZXItbGVmdDpzb2xp
ZCAjQ0NDQ0NDIDEuMHB0O3BhZGRpbmc6MGluIDBpbiAwaW4gNi4wcHQ7bWFyZ2luLWxlZnQ6NC44
cHQ7bWFyZ2luLXRvcDo1LjBwdDttYXJnaW4tcmlnaHQ6MGluO21hcmdpbi1ib3R0b206NS4wcHQi
Pg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10
b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG8iPlRoaXMgbm90ZSBpcyBzb2xp
Y2l0aW5nIGZlZWRiYWNrIG9uIHRoZSBiZXN0IHBhdGggZm9yDQo8YSBocmVmPSJodHRwczovL3Rv
b2xzLmlldGYub3JnL2h0bWwvZHJhZnQtam9uZXMtd2ViYXV0aG4tc2VjcDI1NmsxLTAwIiB0YXJn
ZXQ9Il9ibGFuayI+DQpodHRwczovL3Rvb2xzLmlldGYub3JnL2h0bWwvZHJhZnQtam9uZXMtd2Vi
YXV0aG4tc2VjcDI1NmsxLTAwPC9hPiB0byBiZWNvbWUgYW4gUkZDLiZuYnNwOyBJdHMgcHVycG9z
ZSBpcyB2ZXJ5IHNwZWNpZmljIGFuZCBuYXJyb3c6Jm5ic3A7IEl0IHJlZ2lzdGVycyBKT1NFIGFu
ZCBDT1NFIGN1cnZlIGlkZW50aWZpZXJzIGZvciB0aGUgU0VDRyBzZWNwMjU2azEgZWxsaXB0aWMg
Y3VydmUgYW5kIGFzc29jaWF0ZWQgYWxnb3JpdGhtIGlkZW50aWZpZXJzLiAmbmJzcDsgVGhpcyBp
cw0KIHVzZWQgYnkgRklETyBVQUYsIHRoZSBXM0MgVmVyaWZpYWJsZSBDbGFpbXMgaW50ZXJlc3Qg
Z3JvdXAsIGFuZCBzZXZlcmFsIGJsb2NrY2hhaW4gcHJvamVjdHMuJm5ic3A7IEkgd2FudCB0byBn
ZXQgc3RhbmRhcmQgaWRlbnRpZmllcnMgcmVnaXN0ZXJlZCBzbyB0aGVzZSBwcm9qZWN0cyBjYW4g
dXNlIHN0YW5kYXJkcy1iYXNlZCwgcmF0aGVyIHRoYW4gYWQtaG9jLCBjcnlwdG9ncmFwaGljIHJl
cHJlc2VudGF0aW9ucy4mbmJzcDsgR2l2ZW4gdGhlIHdpZGVzcHJlYWQNCiB1c2Ugb2YgdGhpcyBj
dXJ2ZSBhbmQgYWxnb3JpdGhtLCBJIHdvdWxkIGxpa2UgdGhpcyBzcGVjIHRvIGJlY29tZSBhbiBS
RkMgc28gdGhhdCB0aGUgc21hbGwgaW50ZWdlciB2YWx1ZXMgY2FuIGJlIGFzc2lnbmVkIGZvciBD
T1NFLCBwZXIgdGhlIOKAnFN0YW5kYXJkcyBBY3Rpb27igJ0gcmVxdWlyZW1lbnQgZm9yIHRoZSBM
YWJlbCBhc3NpZ25tZW50IGluIHRoZSByZWdpc3RyeSBwb2xpY3kgYXQNCjxhIGhyZWY9Imh0dHBz
Oi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC9yZmM4MTUyI3NlY3Rpb24tMTYuMiIgdGFyZ2V0PSJfYmxh
bmsiPmh0dHBzOi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC9yZmM4MTUyI3NlY3Rpb24tMTYuMjwvYT4u
IEkgYmVsaWV2ZSBpdOKAmXMgYWxzbyB2ZXJ5IGxpa2VseSB0aGF0IHNvbWUgSUVURiBzcGVjaWZp
Y2F0aW9ucyB3aWxsIGVuZCB1cCB1c2luZyB0aGVzZSByZWdpc3RyYXRpb25zIGFzIHdlbGwuPG86
cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10b3At
YWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG8iPiZuYnNwOzxvOnA+PC9vOnA+PC9w
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21z
by1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj5BcyBiYWNrZ3JvdW5kLCBJ4oCZZCBjb21taXR0ZWQg
dG8gdGhlIFczQyBXZWIgQXV0aGVudGljYXRpb24gKFdlYkF1dGhuKSB3b3JraW5nIGdyb3VwIGFu
ZCB0aGUgRklETyBBbGxpYW5jZSB0byByZWdpc3RlciBhbGwgdGhlIGFsZ29yaXRobXMgdXNlZCBi
eSB0aGVpciBzcGVjaWZpY2F0aW9ucyB0aGF0IGRvIG5vdA0KIGhhdmUgY3VycmVudCBJQU5BIHJl
Z2lzdHJhdGlvbnMgZm9yIEpPU0UgYW5kIENPU0UuJm5ic3A7IDxhIGhyZWY9Imh0dHBzOi8vdG9v
bHMuaWV0Zi5vcmcvaHRtbC9kcmFmdC1qb25lcy13ZWJhdXRobi1jb3NlLWFsZ29yaXRobXMtMDEi
IHRhcmdldD0iX2JsYW5rIj4NCmh0dHBzOi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC9kcmFmdC1qb25l
cy13ZWJhdXRobi1jb3NlLWFsZ29yaXRobXMtMDE8L2E+IHN0YXJ0ZWQgdGhpcyBwcm9jZXNzIGJ5
IHJlZ2lzdGVyaW5nIGFkZGl0aW9uYWwgUlNBIGFsZ29yaXRobXMgKHdpdGggaGVscCBmcm9tIEpp
bSBTY2hhYWQsIFNlYW4gVHVybmVyLCBhbmQgb3RoZXJzKS4mbmJzcDsgVGhlIG5leHQgc3RlcCBp
biB0aGlzIHByb2Nlc3MgaXMgcmVnaXN0ZXJpbmcgdGhlIFNFQ0cgc2VjcDI1NmsxIGVsbGlwdGlj
DQogY3VydmUgYW5kIGFzc29jaWF0ZWQgYWxnb3JpdGhtIGlkZW50aWZpZXJzLjxvOnA+PC9vOnA+
PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRv
O21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj4mbmJzcDs8bzpwPjwvbzpwPjwvcD4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2lu
LWJvdHRvbS1hbHQ6YXV0byI+QmVuIEthZHVrIHN1Z2dlc3RlZCB0aGF0IEkgYXNrIFNlY0Rpc3Bh
dGNoIGZvciBpbnB1dCBvbiB0aGUgYmVzdCBwYXRoIGZvcndhcmQuJm5ic3A7IEZvciBpbnN0YW5j
ZSwgaXMgYW55b25lIGludGVyZXN0ZWQgaW4gcmV2aWV3aW5nIHRoZSBkb2N1bWVudCBvciBiZWlu
ZyB0aGUgZG9jdW1lbnQgc2hlcGhlcmQ/Jm5ic3A7IEkgYmVsaWV2ZQ0KIHRoYXQgQXJlYSBEaXJl
Y3RvciBzcG9uc29yc2hpcCBwcm9iYWJseSBtYWtlcyB0aGUgYmVzdCBzZW5zZSBmb3IgdGhpcyB2
ZXJ5IHRhcmdldGVkIGRvY3VtZW50IGJ1dCBhbSBvcGVuIHRvIG90aGVyIG9wdGlvbnMuICZuYnNw
OyBJIGtub3cgdGhhdCB0aGUgVzNDIGFuZCB0aGUgRklETyBBbGxpYW5jZSB3b3VsZCBhcHByZWNp
YXRlIGhhdmluZyBhIHBhdGggZm9yd2FyZCBmb3IgdGhlc2UgcmVnaXN0cmF0aW9ucy48bzpwPjwv
bzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtc28tbWFyZ2luLXRvcC1hbHQ6
YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+Jm5ic3A7PG86cD48L286cD48L3A+DQo8
cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1h
cmdpbi1ib3R0b20tYWx0OmF1dG8iPlRoYW5rcyBmb3IgeW91ciBmZWVkYmFjay48bzpwPjwvbzpw
PjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0
bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+PHNwYW4gc3R5bGU9ImNvbG9yOiM4ODg4ODgi
PiZuYnNwOzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxl
PSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+PHNw
YW4gc3R5bGU9ImNvbG9yOiM4ODg4ODgiPiZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu
YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw
OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu
YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw
OyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZu
YnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNwOyZuYnNw
OyZuYnNwOyAtLSBNaWtlPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDph
dXRvIj48c3BhbiBzdHlsZT0iY29sb3I6Izg4ODg4OCI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+
PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtc28tbWFy
Z2luLXRvcC1hbHQ6YXV0bzttYXJnaW4tYm90dG9tOjEyLjBwdCI+PGJyPg0KX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX188YnI+DQpTZWNkaXNwYXRjaCBtYWls
aW5nIGxpc3Q8YnI+DQo8YSBocmVmPSJtYWlsdG86U2VjZGlzcGF0Y2hAaWV0Zi5vcmciIHRhcmdl
dD0iX2JsYW5rIj5TZWNkaXNwYXRjaEBpZXRmLm9yZzwvYT48YnI+DQo8YSBocmVmPSJodHRwczov
L3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL3NlY2Rpc3BhdGNoIiB0YXJnZXQ9Il9ibGFu
ayI+aHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9zZWNkaXNwYXRjaDwvYT48
bzpwPjwvbzpwPjwvcD4NCjwvYmxvY2txdW90ZT4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDph
dXRvIj4mbmJzcDs8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Rpdj4NCjwvYmxv
Y2txdW90ZT4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48
L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9ib2R5Pg0KPC9odG1sPg0K

--_000_BL0PR00MB0292B6891FCF5AA30D590E34F57B0BL0PR00MB0292namp_--


From nobody Thu Jun 14 07:39:41 2018
Return-Path: <hallam@gmail.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F392D12777C for <secdispatch@ietfa.amsl.com>; Thu, 14 Jun 2018 07:39:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.4
X-Spam-Level: 
X-Spam-Status: No, score=-1.4 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.249, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.249, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IDAhvs-1xxN1 for <secdispatch@ietfa.amsl.com>; Thu, 14 Jun 2018 07:39:35 -0700 (PDT)
Received: from mail-ot0-x22f.google.com (mail-ot0-x22f.google.com [IPv6:2607:f8b0:4003:c0f::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7588A130E69 for <secdispatch@ietf.org>; Thu, 14 Jun 2018 07:39:35 -0700 (PDT)
Received: by mail-ot0-x22f.google.com with SMTP id r18-v6so7368040otk.1 for <secdispatch@ietf.org>; Thu, 14 Jun 2018 07:39:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to; bh=nwd8EfeCPXOv0MQ7lfFuhnLK+JTJZIVxaQZpJPN5msE=; b=kUPTTIM6UV0/gG1tlirNxb8YIRMoICDJVSacAjm8QWtk8cV8E4A9mz+DjKYc3mpbr4 KSp6721WC4gzySGbOz9l57tXWa9yZZB2a/0GItp35zzKNHK1oS0elKVXec8yfA97fqBT AAsfifLjmoMP89JZMPjgizVhURb9RNRPrcKqhyX+et8j2iqeTQOiyttdJumx/MmyZ9sF iuNlFAUyX/L85w+o4wBksiJU+40mXp9kQbMSrx6V9q5LRId9eBqj69tSxEl7P7ee+e8m 7IK4p0DOCXaK3bww8djg7OZNrErG5Z9YLAfijRv9nv8osapvijWwJb/96ucENFZHSQLn 829A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to; bh=nwd8EfeCPXOv0MQ7lfFuhnLK+JTJZIVxaQZpJPN5msE=; b=Zk33m4TdRAJ9zG8ChdFz/hZD6+nRozt5P0frBt8B/yuvezFJ5/LN6OgiYWiICpkFCJ vjpinHSaREx/3C/nK+jEf0GmN8C9FwlHNzx3O/ER6zIixTkJ0te4GfLPJhoO4r3ym9dp nFTMryoREBoV8jE4bnVzkBm9jAhHUDi8ciUsJPOsC4SrwTO75+D7eESp95JOgDhNVlpX IklGdU4ECSTb5Ii0cfZEM9OosO6NQkEe6aILhpdmOEGnS71ihuCY7o1+EbHbcNjQ4aui 2m/26r9+Oub9s81QZIl0YOSpoRTDxiyErti2dv9kAl3//5tCVZX1OO2w0mTCJMBczZkR 9MlQ==
X-Gm-Message-State: APt69E1Aake/dP8DHzScFOPU0dYufdEoCkKFotMKfWpPSCXzQGmDm6nb xaBy2dSKgQQVFtrFU8YAJdvb2IXPSHMruph5erA=
X-Google-Smtp-Source: ADUXVKLihgEKvEYn/WjLp+CQf5RSLPcNVc5drngsy4Ui50PM4S5FxAqYz/96e57iuxD9I9whz1lFdxLo0Gu0wVkYQZw=
X-Received: by 2002:a9d:20e3:: with SMTP id x90-v6mr1615452ota.338.1528987174710;  Thu, 14 Jun 2018 07:39:34 -0700 (PDT)
MIME-Version: 1.0
Sender: hallam@gmail.com
Received: by 2002:a9d:3a74:0:0:0:0:0 with HTTP; Thu, 14 Jun 2018 07:39:34 -0700 (PDT)
In-Reply-To: <CAMm+Lwj8NVzaV4PXagxxjb-Sz9dc7bZHBF4GQXGJ5k_C-_YNXQ@mail.gmail.com>
References: <CAMm+Lwj8NVzaV4PXagxxjb-Sz9dc7bZHBF4GQXGJ5k_C-_YNXQ@mail.gmail.com>
From: Phillip Hallam-Baker <phill@hallambaker.com>
Date: Thu, 14 Jun 2018 10:39:34 -0400
X-Google-Sender-Auth: g_b7T2MeI5fZlBSwTQCddd6F0YI
Message-ID: <CAMm+LwjGuX_O4ym=SkP_Dr7rudVWpqbHtKy8MChtLk9+LyE2-Q@mail.gmail.com>
To: secdispatch@ietf.org
Content-Type: multipart/alternative; boundary="0000000000006a34ec056e9b119a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/FSIInj4wNVjdL9Ar2TXA0vGI6qo>
Subject: Re: [Secdispatch] DARE Message and Container formats
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 14 Jun 2018 14:39:39 -0000

--0000000000006a34ec056e9b119a
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

After first proposing this, I have become a GDPR stuckee.

One of my prime concerns is the habit that Internet servers of all types
have of creating log files. In many cases log files are generated by
default and in locations that are not necessarily obvious to the operators.
Since it is understood that IP addresses MAY be PII, this is a serious
concern.

And it gets worse: Simply deleting the logs may not help because the logs
may be required to audit compliance with the privacy undertakings made.

The simplest approach is to 'encrypt the log files'. But neither S/MIME nor
OpenPGP is a suitable format for incremental encryption. These data formats
are designed to support encryption of individual records in an append only
log format without losing the capabilities that we demand of logs such as
the ability to read the last 100 records of a million record log.


On Thu, May 24, 2018 at 9:44 PM, Phillip Hallam-Baker <phill@hallambaker.co=
m
> wrote:

> =E2=80=8BI have been developing a set of tools and data formats to suppor=
t
> encryption and authentication of sequenced data. These build on the work =
in
> JSON and JOSE =E2=80=8Bbut make certain changes for reasons of efficiency=
 and/or
> simplicity.
>
> The text versions of the documents are to be found here:
>
> https://datatracker.ietf.org/doc/draft-hallambaker-jsonbcd/
> https://datatracker.ietf.org/doc/draft-hallambaker-dare-message/
> https://datatracker.ietf.org/doc/draft-hallambaker-dare-container/
>
>
> The HTML versions have diagrams (converted into data URLs so they are
> still single file objects)
>
> http://mathmesh.com/Documents/draft-hallambaker-jsonbcd.html
> http://mathmesh.com/Documents/draft-hallambaker-dare-message.html
> http://mathmesh.com/Documents/draft-hallambaker-dare-container.html
>
>
> The near term application for this work is to encrypt log files for GDPR
> compliance. An open source reference implementation is available on GitHu=
b.
>
> https://github.com/hallambaker/Mathematical-Mesh
>
>
> The chief difference between this work and earlier work is that the
> formats are designed to support efficient encryption of incremental updat=
es
> to an append only log. So if a server restarts, it can perform a new key
> agreement and keep on writing to the old log.
>
> Use of split decryption key (recryption) functionality is supported but
> not required. So in an enterprise environment log files might be encrypte=
d
> to the site encryption key and individual system administrators granted
> access to specific log files on an as-needed basis by the recryption
> service.
>
> Individual messages posted to the container consist of a body and a serie=
s
> of optional headers which may also be encrypted. This feature allows a
> message subject line to be encrypted separately from the message body tha=
t
> it applies to.
>
>
> A key innovation in the container format is the use of bidirectional
> frames which allow the file to be read with equal efficiency in either th=
e
> forward or reverse direction. The container may optionally be indexed
> enabling rapid random access.
>
> The container format also provides means for digest authentication
> including static, chained and Merkle tree modes [The astute will notice
> that this provides a functionality similar to one that rhymes with
> clock-train]. Thus the format may be used for applications such as an
> archive format where one signature can be used to validate all the files =
in
> the archive.
>
> The message format is designed for both signature and encryption. The
> message body is signed first and then encryption is applied to both the
> message body and the signature values. This approach demonstrates that th=
e
> signer had actual knowledge of the message content that was signed,
> defeating certain message substitution attacks.
>
>
> I would like to seek AD Sponsorship of this work.
>

--0000000000006a34ec056e9b119a
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_default" style=3D"font-size:small">Aft=
er first proposing this, I have become a GDPR stuckee.</div><div class=3D"g=
mail_default" style=3D"font-size:small"><br></div><div class=3D"gmail_defau=
lt" style=3D"font-size:small">One of my prime concerns is the habit that In=
ternet servers of all types have of creating log files. In many cases log f=
iles are generated by default and in locations that are not necessarily obv=
ious to the operators. Since it is understood that IP addresses MAY be PII,=
 this is a serious concern.</div><div class=3D"gmail_default" style=3D"font=
-size:small"><br></div><div class=3D"gmail_default" style=3D"font-size:smal=
l">And it gets worse: Simply deleting the logs may not help because the log=
s may be required to audit compliance with the privacy undertakings made.</=
div><div class=3D"gmail_default" style=3D"font-size:small"><br></div><div c=
lass=3D"gmail_default" style=3D"font-size:small">The simplest approach is t=
o &#39;encrypt the log files&#39;. But neither S/MIME nor OpenPGP is a suit=
able format for incremental encryption. These data formats are designed to =
support encryption of individual records in an append only log format witho=
ut losing the capabilities that we demand of logs such as the ability to re=
ad the last 100 records of a million record log.</div><div class=3D"gmail_d=
efault" style=3D"font-size:small"><br></div></div><div class=3D"gmail_extra=
"><br><div class=3D"gmail_quote">On Thu, May 24, 2018 at 9:44 PM, Phillip H=
allam-Baker <span dir=3D"ltr">&lt;<a href=3D"mailto:phill@hallambaker.com" =
target=3D"_blank">phill@hallambaker.com</a>&gt;</span> wrote:<br><blockquot=
e class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc sol=
id;padding-left:1ex"><div dir=3D"ltr"><div class=3D"gmail_default" style=3D=
"font-size:small">=E2=80=8BI have been developing a set of tools and data f=
ormats to support encryption and authentication of sequenced data. These bu=
ild on the work in JSON and JOSE =E2=80=8Bbut make certain changes for reas=
ons of efficiency and/or simplicity.</div><div class=3D"gmail_default" styl=
e=3D"font-size:small"><br></div><div class=3D"gmail_default" style=3D"font-=
size:small">The text versions of the documents are to be found here:</div><=
div class=3D"gmail_default" style=3D"font-size:small"><br></div><div class=
=3D"gmail_default"><a href=3D"https://datatracker.ietf.org/doc/draft-hallam=
baker-jsonbcd/" target=3D"_blank">https://datatracker.ietf.org/<wbr>doc/dra=
ft-hallambaker-jsonbcd/</a><br></div><div class=3D"gmail_default"><a href=
=3D"https://datatracker.ietf.org/doc/draft-hallambaker-dare-message/" targe=
t=3D"_blank">https://datatracker.ietf.org/<wbr>doc/draft-hallambaker-dare-<=
wbr>message/</a><br></div><div class=3D"gmail_default"><a href=3D"https://d=
atatracker.ietf.org/doc/draft-hallambaker-dare-container/" target=3D"_blank=
">https://datatracker.ietf.org/<wbr>doc/draft-hallambaker-dare-<wbr>contain=
er/</a><br></div><div class=3D"gmail_default"><br></div><div class=3D"gmail=
_default"><br></div><div class=3D"gmail_default" style=3D"font-size:small">=
The HTML versions have diagrams (converted into data URLs so they are still=
 single file objects)</div><div class=3D"gmail_default" style=3D"font-size:=
small"><br></div><div class=3D"gmail_default"><a href=3D"http://mathmesh.co=
m/Documents/draft-hallambaker-jsonbcd.html" target=3D"_blank">http://mathme=
sh.com/Documents/<wbr>draft-hallambaker-jsonbcd.html</a><br></div><div clas=
s=3D"gmail_default"><a href=3D"http://mathmesh.com/Documents/draft-hallamba=
ker-dare-message.html" target=3D"_blank">http://mathmesh.com/Documents/<wbr=
>draft-hallambaker-dare-<wbr>message.html</a><br></div><div class=3D"gmail_=
default"><a href=3D"http://mathmesh.com/Documents/draft-hallambaker-dare-co=
ntainer.html" target=3D"_blank">http://mathmesh.com/Documents/<wbr>draft-ha=
llambaker-dare-<wbr>container.html</a><br></div><div class=3D"gmail_default=
"><br></div><div class=3D"gmail_default"><br></div><div class=3D"gmail_defa=
ult" style=3D"font-size:small">The near term application for this work is t=
o encrypt log files for GDPR compliance. An open source reference implement=
ation is available on GitHub.</div><div class=3D"gmail_default" style=3D"fo=
nt-size:small"><br></div><div class=3D"gmail_default"><a href=3D"https://gi=
thub.com/hallambaker/Mathematical-Mesh" target=3D"_blank">https://github.co=
m/<wbr>hallambaker/Mathematical-Mesh</a><br></div><div class=3D"gmail_defau=
lt" style=3D"font-size:small"><br></div><div class=3D"gmail_default" style=
=3D"font-size:small"><br></div><div class=3D"gmail_default" style=3D"font-s=
ize:small">The chief difference between this work and earlier work is that =
the formats are designed to support efficient encryption of incremental upd=
ates to an append only log. So if a server restarts, it can perform a new k=
ey agreement and keep on writing to the old log.</div><div class=3D"gmail_d=
efault" style=3D"font-size:small"><br></div><div class=3D"gmail_default" st=
yle=3D"font-size:small">Use of split decryption key (recryption) functional=
ity is supported but not required. So in an enterprise environment log file=
s might be encrypted to the site encryption key and individual system admin=
istrators granted access to specific log files on an as-needed basis by the=
 recryption service.=C2=A0</div><div class=3D"gmail_default" style=3D"font-=
size:small"><br></div><div class=3D"gmail_default" style=3D"font-size:small=
">Individual messages posted to the container consist of a body and a serie=
s of optional headers which may also be encrypted. This feature allows a me=
ssage subject line to be encrypted separately from the message body that it=
 applies to.</div><div class=3D"gmail_default" style=3D"font-size:small"><b=
r></div><div class=3D"gmail_default" style=3D"font-size:small"><br></div><d=
iv class=3D"gmail_default" style=3D"font-size:small">A key innovation in th=
e container format is the use of bidirectional frames which allow the file =
to be read with equal efficiency in either the forward or reverse direction=
. The container may optionally be indexed enabling rapid random access.</di=
v><div class=3D"gmail_default" style=3D"font-size:small"><br></div><div cla=
ss=3D"gmail_default" style=3D"font-size:small">The container format also pr=
ovides means for digest authentication including static, chained and Merkle=
 tree modes [The astute will notice that this provides a functionality simi=
lar to one that rhymes with clock-train]. Thus the format may be used for a=
pplications such as an archive format where one signature can be used to va=
lidate all the files in the archive.</div><div class=3D"gmail_default" styl=
e=3D"font-size:small"><br></div><div class=3D"gmail_default" style=3D"font-=
size:small">The message format is designed for both signature and encryptio=
n. The message body is signed first and then encryption is applied to both =
the message body and the signature values. This approach demonstrates that =
the signer had actual knowledge of the message content that was signed, def=
eating certain message substitution attacks.</div><div class=3D"gmail_defau=
lt" style=3D"font-size:small"><br></div><div class=3D"gmail_default" style=
=3D"font-size:small"><br></div><div class=3D"gmail_default" style=3D"font-s=
ize:small">I would like to seek AD Sponsorship of this work.</div></div>
</blockquote></div><br></div>

--0000000000006a34ec056e9b119a--


From nobody Mon Jun 18 15:03:01 2018
Return-Path: <rfc-ise@rfc-editor.org>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 60727130F85; Mon, 18 Jun 2018 15:02:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yTiOI8sukj3g; Mon, 18 Jun 2018 15:02:51 -0700 (PDT)
Received: from mail.amsl.com (c8a.amsl.com [4.31.198.40]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 098D9130E54; Mon, 18 Jun 2018 15:02:51 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by c8a.amsl.com (Postfix) with ESMTP id 677AE1CAE0C; Mon, 18 Jun 2018 15:02:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
Received: from c8a.amsl.com ([127.0.0.1]) by localhost (c8a.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4A9g0ZQ3bQ2V; Mon, 18 Jun 2018 15:02:49 -0700 (PDT)
Received: from www.amsl.com (localhost [127.0.0.1]) by c8a.amsl.com (Postfix) with ESMTP id 409D81CAE09; Mon, 18 Jun 2018 15:02:49 -0700 (PDT)
Received: from 81.174.196.1 (SquirrelMail authenticated user rfcpise) by www.amsl.com with HTTP; Mon, 18 Jun 2018 15:02:49 -0700
Message-ID: <4ea4564734325aa74b5cd2bf42724327.squirrel@www.amsl.com>
Date: Mon, 18 Jun 2018 15:02:49 -0700
From: "RFC ISE (Adrian Farrel)" <rfc-ise@rfc-editor.org>
To: SECDispatch@ietf.org
Cc: rfc-ise@rfc-editor.org, draft-mavrogiannopoulos-pkcs8-validated-parameters@ietf.org
Reply-To: rfc-ise@rfc-editor.org
User-Agent: SquirrelMail/1.4.21
MIME-Version: 1.0
Content-Type: text/plain;charset=iso-8859-1
Content-Transfer-Encoding: 8bit
X-Priority: 3 (Normal)
Importance: Normal
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/EAJPP7rc8tHw3iw5Ovz3ifoCkAk>
Subject: [Secdispatch] Consideration of draft-mavrogiannopoulos-pkcs8-validated-parameters
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Jun 2018 22:02:55 -0000

Hi SECDispatch,

I'm the Independent Submissions Editor, and I have a couple of questions
you could help me with.

draft-mavrogiannopoulos-pkcs8-validated-parameters has been proposed for
publication as an Independent Submission RFC. Along the way it was briefly
discussed on the SAAG list where (my interpretation) there was no
objection, but also no enthusiasm.

During the IESG conflict review (cf. RFC 5742), the AD asked that the draft
be considered by SECDispatch. I think the questions to be asked are:

- Is this work that a body of people want to bring into the IETF to polish
and publish? In other words, would *you* like to help work on the draft
and find a venue in the IETF to do that work (here, a new WG, AD
sponsored, ...)?

- Is the proposed approach harmful in any way (especially to
implementations of 5208 or 5958)?

- Does the proposed extension constitute a security vulnerability of
itself that is a cause for concern to anyone?

We are somewhat used to 2 week review periods but owing to the unusual
nature of this request and the run up to IETF-102 I suggest a four week
period to make any determination. So please send your thought by Monday
16th July (which also gives you a chance to find me in person in
Montreal). I've asked the chairs to help with any consensus calls should
they prove necessary.

Many thanks,
Adrian
-- 
Adrian Farrel (ISE),
rfc-ise@rfc-editor.org


From nobody Thu Jun 28 17:41:00 2018
Return-Path: <rdd@cert.org>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B693130E40 for <secdispatch@ietfa.amsl.com>; Thu, 28 Jun 2018 17:40:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level: 
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cert.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a9nkoo-tF_yb for <secdispatch@ietfa.amsl.com>; Thu, 28 Jun 2018 17:40:55 -0700 (PDT)
Received: from taper.sei.cmu.edu (taper.sei.cmu.edu [147.72.252.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 55C13130E3E for <secdispatch@ietf.org>; Thu, 28 Jun 2018 17:40:54 -0700 (PDT)
Received: from korb.sei.cmu.edu (korb.sei.cmu.edu [10.64.21.30]) by taper.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id w5T0eq9W002106 for <secdispatch@ietf.org>; Thu, 28 Jun 2018 20:40:52 -0400
DKIM-Filter: OpenDKIM Filter v2.11.0 taper.sei.cmu.edu w5T0eq9W002106
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cert.org; s=yc2bmwvrj62m; t=1530232852; bh=0hVdFPdnSxlIZmoyGwmfZJupyEJFb5baSLWK52gNmaI=; h=From:To:Subject:Date:From; b=DXWjAZZzWW+/pVe5B/6PBx8jy5wMUXaWyRxFMl+a77roWjMYD0qlIsYsmQh1M+K0z 6DHj+sRVnoMbg+L2ioH6FO6KnAUah1lcfZiMDF5EnuXGoNvAmkYB6/u2GZAc6C1PyL FVyeBpm8M4D/QGgPfG3+7eVvI2mPWbT704x1nO7E=
Received: from CASSINA.ad.sei.cmu.edu (cassina.ad.sei.cmu.edu [10.64.28.249]) by korb.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id w5T0emvq007609 for <secdispatch@ietf.org>; Thu, 28 Jun 2018 20:40:48 -0400
Received: from MARATHON.ad.sei.cmu.edu ([10.64.28.250]) by CASSINA.ad.sei.cmu.edu ([10.64.28.249]) with mapi id 14.03.0399.000; Thu, 28 Jun 2018 20:40:48 -0400
From: Roman Danyliw <rdd@cert.org>
To: "secdispatch@ietf.org" <secdispatch@ietf.org>
Thread-Topic: Call for agenda items at IETF 102
Thread-Index: AdQPQazVsZRfU3VySX+R1LQbC9sm0Q==
Date: Fri, 29 Jun 2018 00:40:47 +0000
Message-ID: <359EC4B99E040048A7131E0F4E113AFC014C3F68E0@marathon>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.64.22.6]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/z3qSCdeebKwvsBvIfFk2bNO1IzY>
Subject: [Secdispatch] Call for agenda items at IETF 102
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.26
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jun 2018 00:40:59 -0000

Hello!

SecDispatch has been scheduled at IETF 102 on Monday (July 16) from 1550-17=
50.  If you would like time on the agenda, send your request to the mailing=
 list.  Helpful items to include in your request (if known/applicable) are:

** pointers to a draft(s)/document
** pointers to related background or prior discussion
** desired next steps

If needed, precedence will be given to documents that have demonstrated int=
erest in the form of active drafts and list discussion.

If you have questions, please reach out to the co-chairs.

Regards,
Roman and Richard

