
From nobody Wed Oct  3 05:48:01 2018
Return-Path: <rdd@cert.org>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F04EA13118E for <secdispatch@ietfa.amsl.com>; Wed,  3 Oct 2018 05:47:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level: 
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cert.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3p2_NeabHzqo for <secdispatch@ietfa.amsl.com>; Wed,  3 Oct 2018 05:47:58 -0700 (PDT)
Received: from taper.sei.cmu.edu (taper.sei.cmu.edu [147.72.252.16]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4A8C0131029 for <secdispatch@ietf.org>; Wed,  3 Oct 2018 05:47:58 -0700 (PDT)
Received: from korb.sei.cmu.edu (korb.sei.cmu.edu [10.64.21.30]) by taper.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id w93Cluso025298 for <secdispatch@ietf.org>; Wed, 3 Oct 2018 08:47:56 -0400
DKIM-Filter: OpenDKIM Filter v2.11.0 taper.sei.cmu.edu w93Cluso025298
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cert.org; s=yc2bmwvrj62m; t=1538570876; bh=Uj7qx4Oo5oKvvGgNkvSa+ZPPjOB1PCeQQ+2eOD3TkBs=; h=From:To:Subject:Date:From; b=Z7A6mRsGpYhPOP4+CAWBPXimo8q9jTG+N00kZAQ7zh2bD55nbTPT4bE0jyGGSOJsk dDVU1lEwgrBYIjn6nQGiANXGlaYzqu4q+sUIXlft9X4mV7u+5ckar2fZOx99DqxyEt bM1uUG3Z3BgXc/kn6rQ0w5ShKvZHpO1ooA6QcTnU=
Received: from CASSINA.ad.sei.cmu.edu (cassina.ad.sei.cmu.edu [10.64.28.249]) by korb.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id w93ClrjY015123 for <secdispatch@ietf.org>; Wed, 3 Oct 2018 08:47:53 -0400
Received: from MARATHON.ad.sei.cmu.edu ([10.64.28.250]) by CASSINA.ad.sei.cmu.edu ([10.64.28.249]) with mapi id 14.03.0399.000; Wed, 3 Oct 2018 08:47:53 -0400
From: Roman Danyliw <rdd@cert.org>
To: "secdispatch@ietf.org" <secdispatch@ietf.org>
Thread-Topic: Call for agenda items at IETF 103
Thread-Index: AdRbFUBmpdLrtfmsTg6QIUGMnun29A==
Date: Wed, 3 Oct 2018 12:47:52 +0000
Message-ID: <359EC4B99E040048A7131E0F4E113AFC014C45DD5C@marathon>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.64.22.6]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/QLEYovhqGGQGLBQ0aNzsEWjp5mk>
Subject: [Secdispatch] Call for agenda items at IETF 103
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Oct 2018 12:48:00 -0000

Hello!

SecDispatch will be meeting at IETF 103 (at a time yet to be determined).  =
If you would like time on the agenda, send your request to the mailing list=
.  Helpful items to include in your request (if known/applicable) are:

(1) pointers to a draft(s)
(2) pointers to ongoing/prior discussions
(3) pointers to implementations
(4) pointers to any other background materials
(5) summarizing prior engagement with existing WGs
(6) summarizing who would want to advance this work
(7) desired next steps

If needed, precedence will be given to documents that have demonstrated int=
erest in the form of active drafts and list discussion.

If you have questions, please reach out to the co-chairs.

Regards,
Roman and Richard


From nobody Thu Oct  4 08:28:59 2018
Return-Path: <session-request@ietf.org>
X-Original-To: secdispatch@ietf.org
Delivered-To: secdispatch@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 647C6130E61; Thu,  4 Oct 2018 08:28:58 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: IETF Meeting Session Request Tool <session-request@ietf.org>
To: <session-request@ietf.org>
Cc: secdispatch@ietf.org, lflynn@amsl.com, kaduk@mit.edu, secdispatch-chairs@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.85.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <153866693840.4395.9354189576069875679.idtracker@ietfa.amsl.com>
Date: Thu, 04 Oct 2018 08:28:58 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/qQJTgBs3O5qSlvrFg6BL07vkr7w>
Subject: [Secdispatch] secdispatch - Update to a Meeting Session Request for IETF 103
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 04 Oct 2018 15:28:58 -0000

An update to a meeting session request has just been submitted by Liz Flynn, on behalf of the secdispatch working group.


---------------------------------------------------------
Working Group Name: Security Dispatch
Area Name: Security Area
Session Requester: Liz Flynn

Number of Sessions: 1
Length of Session(s):  2 Hours
Number of Attendees: 100
Conflicts to Avoid: 
 First Priority: saag mls acme perc dots ace dispatch
 Second Priority: tls mile



People who must be present:
  Eric Rescorla
  Roman Danyliw
  Richard Barnes
  Benjamin Kaduk

Resources Requested:

Special Requests:
  Ideally this session wouldn&#39;t conflict with any security area meetings; and would be early in the week. The Monday slot given for IETF 102 worked very well.
---------------------------------------------------------


From nobody Sat Oct  6 01:19:19 2018
Return-Path: <beldmit@gmail.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 73767130DD2 for <secdispatch@ietfa.amsl.com>; Sat,  6 Oct 2018 01:19:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8_2gyXKX-CXF for <secdispatch@ietfa.amsl.com>; Sat,  6 Oct 2018 01:19:14 -0700 (PDT)
Received: from mail-ed1-x530.google.com (mail-ed1-x530.google.com [IPv6:2a00:1450:4864:20::530]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 25943130E4A for <secdispatch@ietf.org>; Sat,  6 Oct 2018 01:19:14 -0700 (PDT)
Received: by mail-ed1-x530.google.com with SMTP id y19-v6so13557337edd.2 for <secdispatch@ietf.org>; Sat, 06 Oct 2018 01:19:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ou+nucTy65uAC7wwGaSpVcGgCNnkXKE78oFvXubyolo=; b=ddWcp5aOMtXwLJqUjffig2DY0qJfrsRGRQRowV3Bjm9uDzG8EvajX0xeNgweAX6FLF bGos1lbmojUyfM3F/2SsVQAe/eDfiGgLELQfF/1Pmhr1gDhitx+qPb+Q51QNijm+VEZd tfnksY+x4wnS1H49r7F4bWAY7KZssDhhdw+S7LtjIwv5tuohHMbW3ougsUisu2wFObQj f03j45zlrCJMUMDRdorAWpi41hvU0l1xSQpHyEWkdYAc5eZkqWXHJ3JJYpiQqyVqi1pL PGwrNAIKWnIBaO1frPsqeGQUiLbrxGk3bI84GE6MJxSLxl2jGUhBYONGbJdIVq1ra68m Dyvg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ou+nucTy65uAC7wwGaSpVcGgCNnkXKE78oFvXubyolo=; b=GvhxYQFnxGDncR0ZrpCn7JUeh3A3S+ZyiEWJaFwp3iEzS7UZNjfPnhTLH+2jKpS394 nWvY8wHrlwpXh8KvTh6UhLQXEizm+qwgZ+sY0zumCBH0vY5QfJ7l2lz0/WRnMOOrcPT/ BaX8wfCDYWfbW2Cd28l7huwar3n0t57vc3eLMddpNti3/D5OKiOXk9L7e4hvHNS0yR13 H4q+g2uZglRpWb918xUqf0c1cW3Pt+kPfMy4qpDxTaHgVXqdlo59SzSOolJVA8rsFiEP W3kfbtmhxIWLoHxLkBtfHGbo+fbWR00wygWZZ3ildQxL42yGkdfYeNO2048XFRIvkpH/ hHEA==
X-Gm-Message-State: ABuFfog/6b7oO+qQUTneBCLG8cLvuz+YWKtgtXrVbTHvKXI5mQxYWuJt qeJhuzhII6Nnt7WDvom2nVOTrKTTXmjDpmTNxF4=
X-Google-Smtp-Source: ACcGV62NeUYBtcsr2XbU93Q7qIEaZJ7QR3LdsPzl8U7yMlbfte2JZbpeKjoAMJCUlLJQbb4dWICOCbmY24iJRavwfhs=
X-Received: by 2002:a50:be4c:: with SMTP id b12-v6mr18499614edi.46.1538813952542;  Sat, 06 Oct 2018 01:19:12 -0700 (PDT)
MIME-Version: 1.0
References: <359EC4B99E040048A7131E0F4E113AFC014C45DD5C@marathon>
In-Reply-To: <359EC4B99E040048A7131E0F4E113AFC014C45DD5C@marathon>
From: Dmitry Belyavsky <beldmit@gmail.com>
Date: Sat, 6 Oct 2018 11:19:01 +0300
Message-ID: <CADqLbz+391x0updeCR21pC6xsbs3X4Cjp0RdicTZYikQoQAS-w@mail.gmail.com>
To: rdd@cert.org
Cc: secdispatch@ietf.org
Content-Type: multipart/alternative; boundary="000000000000044c6605778b0bb5"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/NCNrowm3NQPrRdzFQMDj9JzHE4w>
Subject: Re: [Secdispatch] Call for agenda items at IETF 103
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 06 Oct 2018 08:19:18 -0000

--000000000000044c6605778b0bb5
Content-Type: text/plain; charset="UTF-8"

I would like to suggest this draft to agenda:

https://tools.ietf.org/html/draft-belyavskiy-certificate-limitation-policy-06

It was previously discussed on SAAG in IETF99 in Prague and updated to
provide more detailed examples.

On Wed, Oct 3, 2018 at 3:48 PM Roman Danyliw <rdd@cert.org> wrote:

> Hello!
>
> SecDispatch will be meeting at IETF 103 (at a time yet to be determined).
> If you would like time on the agenda, send your request to the mailing
> list.  Helpful items to include in your request (if known/applicable) are:
>
> (1) pointers to a draft(s)
> (2) pointers to ongoing/prior discussions
> (3) pointers to implementations
> (4) pointers to any other background materials
> (5) summarizing prior engagement with existing WGs
> (6) summarizing who would want to advance this work
> (7) desired next steps
>
> If needed, precedence will be given to documents that have demonstrated
> interest in the form of active drafts and list discussion.
>
> If you have questions, please reach out to the co-chairs.
>
> Regards,
> Roman and Richard
>
> _______________________________________________
> Secdispatch mailing list
> Secdispatch@ietf.org
> https://www.ietf.org/mailman/listinfo/secdispatch
>


-- 
SY, Dmitry Belyavsky

--000000000000044c6605778b0bb5
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">I would like to suggest this draft to age=
nda:<div><br></div><div><a href=3D"https://tools.ietf.org/html/draft-belyav=
skiy-certificate-limitation-policy-06">https://tools.ietf.org/html/draft-be=
lyavskiy-certificate-limitation-policy-06</a><br></div><div><br></div><div>=
It was previously discussed on SAAG in IETF99 in Prague and updated to prov=
ide more detailed examples.</div></div></div><br><div class=3D"gmail_quote"=
><div dir=3D"ltr">On Wed, Oct 3, 2018 at 3:48 PM Roman Danyliw &lt;<a href=
=3D"mailto:rdd@cert.org">rdd@cert.org</a>&gt; wrote:<br></div><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;=
padding-left:1ex">Hello!<br>
<br>
SecDispatch will be meeting at IETF 103 (at a time yet to be determined).=
=C2=A0 If you would like time on the agenda, send your request to the maili=
ng list.=C2=A0 Helpful items to include in your request (if known/applicabl=
e) are:<br>
<br>
(1) pointers to a draft(s)<br>
(2) pointers to ongoing/prior discussions<br>
(3) pointers to implementations<br>
(4) pointers to any other background materials<br>
(5) summarizing prior engagement with existing WGs<br>
(6) summarizing who would want to advance this work<br>
(7) desired next steps<br>
<br>
If needed, precedence will be given to documents that have demonstrated int=
erest in the form of active drafts and list discussion.<br>
<br>
If you have questions, please reach out to the co-chairs.<br>
<br>
Regards,<br>
Roman and Richard<br>
<br>
_______________________________________________<br>
Secdispatch mailing list<br>
<a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank">Secdispatch@ietf.=
org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/secdispatch" rel=3D"norefe=
rrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/secdispatch</=
a><br>
</blockquote></div><br clear=3D"all"><div><br></div>-- <br><div dir=3D"ltr"=
 class=3D"gmail_signature" data-smartmail=3D"gmail_signature">SY, Dmitry Be=
lyavsky</div>

--000000000000044c6605778b0bb5--


From nobody Sat Oct 13 19:55:16 2018
Return-Path: <Daniel.VanGeest@isara.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BCADF12D7F8 for <secdispatch@ietfa.amsl.com>; Sat, 13 Oct 2018 19:55:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5na5w2gAUrxZ for <secdispatch@ietfa.amsl.com>; Sat, 13 Oct 2018 19:55:10 -0700 (PDT)
Received: from esa2.isaracorp.com (esa2.isaracorp.com [207.107.152.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4D18F128CFD for <secdispatch@ietf.org>; Sat, 13 Oct 2018 19:55:10 -0700 (PDT)
Received: from unknown (HELO V0501WEXGPR01.isaracorp.com) ([10.5.8.20]) by ip2.isaracorp.com with ESMTP; 14 Oct 2018 02:55:08 +0000
Received: from V0501WEXGPR01.isaracorp.com (10.5.8.20) by V0501WEXGPR01.isaracorp.com (10.5.8.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1466.3; Sat, 13 Oct 2018 22:55:05 -0400
Received: from V0501WEXGPR01.isaracorp.com ([fe80::d802:5aec:db34:beba]) by V0501WEXGPR01.isaracorp.com ([fe80::d802:5aec:db34:beba%7]) with mapi id 15.01.1466.003; Sat, 13 Oct 2018 22:55:05 -0400
From: Daniel Van Geest <Daniel.VanGeest@isara.com>
To: Roman Danyliw <rdd@cert.org>, "secdispatch@ietf.org" <secdispatch@ietf.org>
Thread-Topic: [Secdispatch] Call for agenda items at IETF 103
Thread-Index: AQHUY2lPpSWqERz+f0S/p9XagRupKA==
Date: Sun, 14 Oct 2018 02:55:05 +0000
Message-ID: <7F95BA9C-08CE-4568-9EB1-7DD220C3FFBF@isara.com>
Accept-Language: en-CA, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [172.31.5.52]
Content-Type: multipart/alternative; boundary="_000_7F95BA9C08CE45689EB17DD220C3FFBFisaracom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/LHsJ3tC8RvNGnRIQkEoThnkymEI>
Subject: Re: [Secdispatch] Call for agenda items at IETF 103
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 14 Oct 2018 02:55:15 -0000

--_000_7F95BA9C08CE45689EB17DD220C3FFBFisaracom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

SeKAmWQgbGlrZSB0aGlzIHRvIGJlIGFkZGVkIHRvIHRoZSBhZ2VuZGE6DQoNCmh0dHBzOi8vdG9v
bHMuaWV0Zi5vcmcvaHRtbC9kcmFmdC12YW5nZWVzdC14NTA5LWhhc2gtc2lncy0wMQ0KDQpJdCB3
YXMgcG9zdGVkIHRvIHRoZSBMQU1QUyBtYWlsaW5nIGxpc3QgKGh0dHBzOi8vbWFpbGFyY2hpdmUu
aWV0Zi5vcmcvYXJjaC9icm93c2Uvc3Bhc20vP2didD0xJmluZGV4PTVadkxDeG8zSFRha3ZVWm52
NUt6a016bHFHRSkgd2l0aCBzb21lIGRpc2N1c3Npb24sIGFuZCBSdXNzIHN1Z2dlc3RlZCBpdCBz
aG91bGQgZ28gdGhyb3VnaCBzZWNkaXNwYXRjaCwgd2l0aCBhIGRpc2N1c3Npb24gYXQgdGhlIGVu
ZCBvZiB0aGUgTEFNUFMgc2Vzc2lvbiBhcyB3ZWxsLCBpZiB0aW1lIGFsbG93cy4NCg0KVGhlIGRy
YWZ0IGRlZmluZXMgYWxnb3JpdGhtIGlkZW50aWZpZXJzIGZvciBIU1MgYW5kIFhNU1MoXk1UKSBo
YXNoLWJhc2VkIHNpZ25hdHVyZSBzY2hlbWVzIGZvciB1c2UgaW4gWC41MDkgY2VydGlmaWNhdGVz
LiAgSGFzaC1iYXNlZCBzaWduYXR1cmVzIGFyZSBhIHdlbGwtc3R1ZGllZCBjbGFzcyBvZiBxdWFu
dHVtLXNhZmUgc2lnbmF0dXJlIGFsZ29yaXRobXMgd2hpY2ggY2FuIGJlIGRlcGxveWVkIG5vdyBm
b3Igcm9vdHMgb2YgdHJ1c3QgYW5kIGNvZGUgc2lnbmluZy4gIE15IGVtcGxveWVyIGhhcyBzZWVu
IGludGVyZXN0IGluIHRoZXNlIHNpZ25hdHVyZSBzY2hlbWVzIGZvciBYLjUwOSBjZXJ0aWZpY2F0
ZXMgYW5kIGlzIGltcGxlbWVudGluZyBzdXBwb3J0IGZvciB0aGVtLiAgSSBrbm93IG9mIGF0IGxl
YXN0IG9uZSBvdGhlciBjb21wYW55IGRvaW5nIHRoZSBzYW1lIGFuZCB3ZeKAmWQgbGlrZSB0byBz
dGFuZGFyZGl6ZSBvbiBhIHNldCBvZiBwdWJsaWNseSBhY2NlcHRlZCBhbGdvcml0aG0gaWRlbnRp
ZmllcnMuDQoNClRoZSBkZXNpcmVkIG5leHQgc3RlcHMgd291bGQgYmUgdG8gaGF2ZSB0aGlzIGFk
ZGVkIHRvIHRoZSBMQU1QUyBjaGFydGVyLg0KDQpUaGFua3MsDQpEYW5pZWwNCg0KT24gMjAxOC0x
MC0wMywgODo0OCBBTSwgIlNlY2Rpc3BhdGNoIG9uIGJlaGFsZiBvZiBSb21hbiBEYW55bGl3IiA8
c2VjZGlzcGF0Y2gtYm91bmNlc0BpZXRmLm9yZzxtYWlsdG86c2VjZGlzcGF0Y2gtYm91bmNlc0Bp
ZXRmLm9yZz4gb24gYmVoYWxmIG9mIHJkZEBjZXJ0Lm9yZzxtYWlsdG86cmRkQGNlcnQub3JnPj4g
d3JvdGU6DQoNCkhlbGxvIQ0KDQpTZWNEaXNwYXRjaCB3aWxsIGJlIG1lZXRpbmcgYXQgSUVURiAx
MDMgKGF0IGEgdGltZSB5ZXQgdG8gYmUgZGV0ZXJtaW5lZCkuICBJZiB5b3Ugd291bGQgbGlrZSB0
aW1lIG9uIHRoZSBhZ2VuZGEsIHNlbmQgeW91ciByZXF1ZXN0IHRvIHRoZSBtYWlsaW5nIGxpc3Qu
ICBIZWxwZnVsIGl0ZW1zIHRvIGluY2x1ZGUgaW4geW91ciByZXF1ZXN0IChpZiBrbm93bi9hcHBs
aWNhYmxlKSBhcmU6DQoNCigxKSBwb2ludGVycyB0byBhIGRyYWZ0KHMpDQooMikgcG9pbnRlcnMg
dG8gb25nb2luZy9wcmlvciBkaXNjdXNzaW9ucw0KKDMpIHBvaW50ZXJzIHRvIGltcGxlbWVudGF0
aW9ucw0KKDQpIHBvaW50ZXJzIHRvIGFueSBvdGhlciBiYWNrZ3JvdW5kIG1hdGVyaWFscw0KKDUp
IHN1bW1hcml6aW5nIHByaW9yIGVuZ2FnZW1lbnQgd2l0aCBleGlzdGluZyBXR3MNCig2KSBzdW1t
YXJpemluZyB3aG8gd291bGQgd2FudCB0byBhZHZhbmNlIHRoaXMgd29yaw0KKDcpIGRlc2lyZWQg
bmV4dCBzdGVwcw0KDQpJZiBuZWVkZWQsIHByZWNlZGVuY2Ugd2lsbCBiZSBnaXZlbiB0byBkb2N1
bWVudHMgdGhhdCBoYXZlIGRlbW9uc3RyYXRlZCBpbnRlcmVzdCBpbiB0aGUgZm9ybSBvZiBhY3Rp
dmUgZHJhZnRzIGFuZCBsaXN0IGRpc2N1c3Npb24uDQoNCklmIHlvdSBoYXZlIHF1ZXN0aW9ucywg
cGxlYXNlIHJlYWNoIG91dCB0byB0aGUgY28tY2hhaXJzLg0KDQpSZWdhcmRzLA0KUm9tYW4gYW5k
IFJpY2hhcmQNCg0KX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X18NClNlY2Rpc3BhdGNoIG1haWxpbmcgbGlzdA0KU2VjZGlzcGF0Y2hAaWV0Zi5vcmc8bWFpbHRv
OlNlY2Rpc3BhdGNoQGlldGYub3JnPg0KaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0
aW5mby9zZWNkaXNwYXRjaA0KDQo=

--_000_7F95BA9C08CE45689EB17DD220C3FFBFisaracom_
Content-Type: text/html; charset="utf-8"
Content-ID: <97A513D96D509B4A963B37DF58A7DCC1@isara.com>
Content-Transfer-Encoding: base64
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--_000_7F95BA9C08CE45689EB17DD220C3FFBFisaracom_--


From nobody Thu Oct 18 17:03:16 2018
Return-Path: <nunnun@mercari.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 63589130E69 for <secdispatch@ietfa.amsl.com>; Thu, 18 Oct 2018 17:03:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.902
X-Spam-Level: 
X-Spam-Status: No, score=-1.902 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mercari-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KzCTUzGPXTnT for <secdispatch@ietfa.amsl.com>; Thu, 18 Oct 2018 17:03:12 -0700 (PDT)
Received: from mail-pg1-x531.google.com (mail-pg1-x531.google.com [IPv6:2607:f8b0:4864:20::531]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9907E130E64 for <secdispatch@ietf.org>; Thu, 18 Oct 2018 17:03:12 -0700 (PDT)
Received: by mail-pg1-x531.google.com with SMTP id r9-v6so14940499pgv.6 for <secdispatch@ietf.org>; Thu, 18 Oct 2018 17:03:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mercari-com.20150623.gappssmtp.com; s=20150623; h=from:mime-version:subject:message-id:date:to; bh=qxfs9jy8tnYWkY/X0bkHvEP+wKABEu44kMh8um6KUv0=; b=lee5nupdUIY2i28EOAqcanlJitXQh1Od9BIeUcanz/CHQbBpnJynKOnCdBtr+/b5cq hSyexCbS2VE+lPCf8Bc6nPkipF6l16oyeLCzNDKUBI3GXgxonDw0SQznm17C/xDkIdCJ i4XUEs80ESd2if05rwNmAR6S69e/6z0+3SAcG6Pld83qobMZjwMywrJYwA0NFeY9tv8R 4veuS9u5hcDCXY1OK7ST4n5T7Hl1W0wIW5uL//J2rcR/2j8C3yHPOwO+JijC4xQrqdO0 44GIc+qy6N84WHIogn482cHhT+iYK6GGOC5w7NyOuI0331gZakrduC2Z4+nGRKgcm6Mz U1qA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:mime-version:subject:message-id:date:to; bh=qxfs9jy8tnYWkY/X0bkHvEP+wKABEu44kMh8um6KUv0=; b=thvDtUGPTYS3M5D4VX+j3VpXjMRRdUv0Ymk8n1EgRNVSSiq3w0nAMIb/1BLCclac3x SU9IQ6O0CYFXiqRiHoeereHoBSnYXFo1HW0+veYnXY/37vkw9ThArL57o9xeOiA6v+s2 RXRwOTuDNbVSPo2ED0DyEaGYWCMykF/PkirhZ2EYiJcDlpCaJ/hdR1K1rwyYHglQ1WYO OAGpa05UAZxw1gCKYA6vwUXwV/P4RAwFr5ldXzN2ewuBjQuacar6rktxkVhbD6M/I33u hgXpE/yPhyj2B2Q1eEodztA9dJALgzar7Vyq8//1HAXcg0CjXs8uzPulBwgqJXBxXysU MnOQ==
X-Gm-Message-State: ABuFfojy78BKP2enoCqmSkaiLqXEkTwRMQngat+PnCKvFsMQkqobUnAg xjxwAZ3E2HewuMEmg74iBhfy8oi2DvLWCQ==
X-Google-Smtp-Source: ACcGV629KKm2Km3th7VgKKNubEN3x2rZaiHbrmhy+m2OocSWVm4zK/O72wy+zD8OO2fw+r2xhpsxoQ==
X-Received: by 2002:a62:670a:: with SMTP id b10-v6mr32277356pfc.243.1539907391411;  Thu, 18 Oct 2018 17:03:11 -0700 (PDT)
Received: from [172.20.10.3] (sp49-98-156-177.msd.spmode.ne.jp. [49.98.156.177]) by smtp.gmail.com with ESMTPSA id k72-v6sm38321963pfj.63.2018.10.18.17.03.10 for <secdispatch@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 18 Oct 2018 17:03:10 -0700 (PDT)
From: Hirotaka NAKAJIMA <nunnun@mercari.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_25E4761D-B93C-4671-85D7-FE545D77158F"; protocol="application/pgp-signature"; micalg=pgp-sha512
Mime-Version: 1.0 (Mac OS X Mail 12.0 \(3445.100.39\))
Message-Id: <B481B5F8-E039-4C05-BEDA-B95AF8607664@mercari.com>
Date: Fri, 19 Oct 2018 09:03:01 +0900
To: secdispatch@ietf.org
X-Mailer: Apple Mail (2.3445.100.39)
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/VgmpNlnYq0-lKx3uuXUZsIXuHZw>
Subject: Re: [Secdispatch] Call for agenda items at IETF 103
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Oct 2018 00:03:15 -0000

--Apple-Mail=_25E4761D-B93C-4671-85D7-FE545D77158F
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Hi,

I=E2=80=99d like to add this to be added to the agenda.
=
https://datatracker.ietf.org/doc/draft-vcgtf-crypto-assets-security-consid=
erations/

This draft is to propose a security considerations for crypto assets =
custodians including management of private key for crypto assets (e.g. =
Bitcoin)
We(Authors) are not sure which working group in IETF would be suitable =
for this draft but we believe Security Area is one of an area should be =
involved.

Desired next step would be finding a working group in IETF and discuss =
this document in WG.

Best,
Hiro

--
Hirotaka NAKAJIMA
Senior Research Engineer, Mercari, Inc.
nunnun@mercari.com


--Apple-Mail=_25E4761D-B93C-4671-85D7-FE545D77158F
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP

-----BEGIN PGP SIGNATURE-----
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=4gi5
-----END PGP SIGNATURE-----

--Apple-Mail=_25E4761D-B93C-4671-85D7-FE545D77158F--


From nobody Fri Oct 19 12:00:21 2018
Return-Path: <agenda@ietf.org>
X-Original-To: secdispatch@ietf.org
Delivered-To: secdispatch@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 3A1921310D2; Fri, 19 Oct 2018 11:56:32 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: "\"IETF Secretariat\"" <agenda@ietf.org>
To: <rdd@cert.org>, <secdispatch-chairs@ietf.org>
Cc: secdispatch@ietf.org, kaduk@mit.edu
X-Test-IDTracker: no
X-IETF-IDTracker: 6.87.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <153997539223.6592.10102644787535181926.idtracker@ietfa.amsl.com>
Date: Fri, 19 Oct 2018 11:56:32 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/imZ4njYFrfgyuKFJT1oX90mj8xo>
Subject: [Secdispatch] secdispatch - Requested session has been scheduled for IETF 103
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Oct 2018 18:56:40 -0000

Dear Roman Danyliw,

The session(s) that you have requested have been scheduled.
Below is the scheduled session information followed by
the original request. 


    secdispatch Session 1 (2:00 requested)
    Tuesday, 6 November 2018, Afternoon Session II 1610-1810
    Room Name: Meeting 2 size: 150
    ---------------------------------------------


iCalendar: https://datatracker.ietf.org/meeting/103/sessions/secdispatch.ics

Request Information:


---------------------------------------------------------
Working Group Name: Security Dispatch
Area Name: Security Area
Session Requester: Roman Danyliw

Number of Sessions: 1
Length of Session(s):  2 Hours
Number of Attendees: 100
Conflicts to Avoid: 
 First Priority: dispatch ace dots perc acme mls saag
 Second Priority: tls mile



People who must be present:
  Eric Rescorla
  Roman Danyliw
  Richard Barnes
  Benjamin Kaduk

Resources Requested:

Special Requests:
  Ideally this session wouldn&#39;t conflict with any security area meetings; and would be early in the week. The Monday slot given for IETF 102 worked very well.
---------------------------------------------------------


From nobody Fri Oct 19 14:29:21 2018
Return-Path: <rdd@cert.org>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDBF9130E09 for <secdispatch@ietfa.amsl.com>; Fri, 19 Oct 2018 14:29:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cert.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mPGyouKKwVR8 for <secdispatch@ietfa.amsl.com>; Fri, 19 Oct 2018 14:29:17 -0700 (PDT)
Received: from veto.sei.cmu.edu (veto.sei.cmu.edu [147.72.252.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 47837130E05 for <secdispatch@ietf.org>; Fri, 19 Oct 2018 14:29:17 -0700 (PDT)
Received: from delp.sei.cmu.edu (delp.sei.cmu.edu [10.64.21.31]) by veto.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id w9JLTFNj000811 for <secdispatch@ietf.org>; Fri, 19 Oct 2018 17:29:16 -0400
DKIM-Filter: OpenDKIM Filter v2.11.0 veto.sei.cmu.edu w9JLTFNj000811
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cert.org; s=yc2bmwvrj62m; t=1539984556; bh=Mmt4T1k2UHkcUjSjZRllhsLQjfeEqKTGB1q70vH0pDs=; h=From:To:Subject:Date:From; b=SSHyvNaO0bmTGQLM6NTw7zYWnSuDABfaxtIvx1GQI8/RZTb66CZzB0/kKo2I15YQ/ sR0gfkSeVJJjEBWOpn5JSJM2YfljuyMUElEyyDdmh83mvjHU52Do1skD5BCmhZnTy5 FKTpDW/UCfYHoUvFBZ665qt8fAOtMW/73MUrD/bY=
Received: from CASSINA.ad.sei.cmu.edu (cassina.ad.sei.cmu.edu [10.64.28.249]) by delp.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id w9JLTA96035243 for <secdispatch@ietf.org>; Fri, 19 Oct 2018 17:29:10 -0400
Received: from MARATHON.ad.sei.cmu.edu ([10.64.28.250]) by CASSINA.ad.sei.cmu.edu ([10.64.28.249]) with mapi id 14.03.0399.000; Fri, 19 Oct 2018 17:29:10 -0400
From: Roman Danyliw <rdd@cert.org>
To: "secdispatch@ietf.org" <secdispatch@ietf.org>
Thread-Topic: Draft agenda for IETF 103
Thread-Index: AdRn8ikxI/cRaP38Sd2l6u+tOQZugg==
Date: Fri, 19 Oct 2018 21:29:09 +0000
Message-ID: <359EC4B99E040048A7131E0F4E113AFC0181A15F8C@marathon>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.64.22.6]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/6YDGm8t8dR-wMr9JVPYEnXKu3W0>
Subject: [Secdispatch] Draft agenda for IETF 103
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 19 Oct 2018 21:29:20 -0000

Hello WG!

SecDispatch is scheduled to meet on Tuesday, November 6, 2018 at 1610-1810 =
 (Afternoon Session II).  Based on the input to date, the following is the =
draft agenda:=09

--[ agenda ]--
1. Logistics and introduction (chairs, 5 min)

2. Dispatch items
(Each item is 15 minutes)

(a) Certificate Limitation Policy
draft: draft-belyavskiy-certificate-limitation-policy-06=20
presenter: Dmitry Belyavsky
background: https://datatracker.ietf.org/meeting/99/materials/slides-99-saa=
g-certificate-limitation-profile-01

(b) Algorithm Identifiers for HSS and XMSS for Use in the Internet X.509 Pu=
blic Key Infrastructure
draft: draft-vangeest-x509-hash-sigs-01
presenter: Daniel Van Geest
background: https://mailarchive.ietf.org/arch/browse/spasm/?gbt=3D1&index=
=3D5ZvLCxo3HTakvUZnv5KzkMzlqGE

(c) General Security Considerations for Crypto Assets Custodians
draft: draft-vcgtf-crypto-assets-security-considerations-02
presenter: Hirotaka Nakajima
background: https://www.ietf.org/mail-archive/web/secdispatch/current/msg00=
058.html
--[ end ]--

If you have feedback on this draft agenda or would like time on it, please =
provide feedback on the list.

Regards,
Roman and Richard

