
From nobody Sun Nov  4 01:42:01 2018
Return-Path: <jordan.ietf@gmail.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EFBD6128DFD; Sun,  4 Nov 2018 01:41:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eUUPKS5Mib9R; Sun,  4 Nov 2018 01:41:44 -0700 (PDT)
Received: from mail-pf1-x441.google.com (mail-pf1-x441.google.com [IPv6:2607:f8b0:4864:20::441]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A4A12127133; Sun,  4 Nov 2018 01:41:41 -0700 (PDT)
Received: by mail-pf1-x441.google.com with SMTP id y18-v6so569568pfn.1; Sun, 04 Nov 2018 01:41:41 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=from:mime-version:subject:message-id:date:to; bh=hI1Ji5xDQQ+cmPe13UC+ELN092I7GhYhN6df96ofVv8=; b=p6Z6QqUkLoBjXoiEQBLCJaEkMhYwxpCTfHGDC9sE4T/bndc1jwPv+TipEH/Rmn5Vam lc0IlWyukRKGInAmNPm6SjskIsPuIuGNgguM/Q8RJewS2GbWoXYaiv86arYWPy0WEL7v oW1nXO5l4fl6/F6IKs2giUKFXAtywOF4ENc2TgsbKUu1DUbTXlqPy0jXwQ6pPAaBokiG FlvSepWjpbMfc9Dd7INn1hquMrptb3gDFahJ27ZwVcVAN9hRuPzfmjnJyt3itvdcFmKI yH5DKIttRZMr4Tobs+WXwW0TB1agoqaVjEYKbaiZvG3cR8crQH4GqfaS8uMGkiowIPqv lRUQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:mime-version:subject:message-id:date:to; bh=hI1Ji5xDQQ+cmPe13UC+ELN092I7GhYhN6df96ofVv8=; b=bPsHDJkoBh5jueH72zWOl0B/jBnEhXdJghTHyQ0gIKFsCANRMO4L3yX0pTuR+NZg9y 8QKim7/YvV7dDFW8I6r2/CyrTeF5ZouOifY520WGkC2e5mplqh1QBSoiLQ7MrIDoH7vt 86tlZBaARIhJrLh/ByKfwSkRxox21mB323f677NdAJc7jYdiML8nPKRjvTU0KSR0clzP 78nRz8nIv7gMmdBQI4k5bgEiRqJs9vsx39ORYqVn05P6YI/btIeobGDra91AHRzXm8yQ K/OZ5QL04+gjH9ZJpqCpGIWhS7OrQTDrcWLCmhAyzj9cfaRsvJGjup9SY/0Lyk1zmkdx FDtA==
X-Gm-Message-State: AGRZ1gKLfyNeIa56ETyvxnUxlct78Rn/zYscD2Oy0PiWoizunlJvOnsn 3M6FQba4JgcG44c7KR5bJjzTlZKK
X-Google-Smtp-Source: AJdET5c1Sz75zXHrj2sxMIjwQ6v10iKCbIaujKamTWlxEc6WwdalIMXbDA6d8ZAeeyjRnBOdcfszXA==
X-Received: by 2002:a63:e055:: with SMTP id n21mr2714654pgj.397.1541320900536;  Sun, 04 Nov 2018 01:41:40 -0700 (PDT)
Received: from [172.20.24.247] (110-170-235-6.static.asianet.co.th. [110.170.235.6]) by smtp.gmail.com with ESMTPSA id d64-v6sm7781012pfa.80.2018.11.04.01.41.38 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 04 Nov 2018 01:41:39 -0700 (PDT)
From: Bret Jordan <jordan.ietf@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_FE0F3960-533C-4337-8B48-183471BAC0A4"
Mime-Version: 1.0 (Mac OS X Mail 11.5 \(3445.9.1\))
Message-Id: <606EB479-0F4D-40D1-B1AF-463CB0FB6418@gmail.com>
Date: Sun, 4 Nov 2018 15:41:27 +0700
To: "saag@ietf.org" <saag@ietf.org>, Secdispatch@ietf.org, cacao@ietf.org
X-Mailer: Apple Mail (2.3445.9.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/rOxNH-J2ZLBRDMbNe4VH-nqgX6c>
Subject: [Secdispatch] CACAO meetings at IETF 103 Bangkok
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 04 Nov 2018 08:41:47 -0000

--Apple-Mail=_FE0F3960-533C-4337-8B48-183471BAC0A4
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

All,

This is just a friendly reminder about the two scheduled activities =
around CACAO at this IETF. If anyone would like further information, or =
would like to talk at an additional time, please let me know. =20

Sunday Night 18:00 Hot RFC Talk in Chitlada 3, 2nd floor
Tuesday Night 17:00 Side Meeting in Pagoda, 4th floor

Document
The initial introduction draft document can be found here: =
https://tools.ietf.org/html/draft-jordan-cacao-introduction-00 =
<https://tools.ietf.org/html/draft-jordan-cacao-introduction-00>

Abstract
The CACAO draft describes the need for defining a standardized language =
and associated protocols to capture and automate a collection of =
coordinated cyber security actions and responses.  This collection of =
actions is called a Course of Action (COA) Project.=20

Goals
Our goal is to have a BOF at IETF 104 Prague and hopefully a working =
group shortly there after. If you are interested in Course of Action =
Projects, Security Playbooks, the Integrated Adaptive Cyber Defense =
(IACD) work from Johns Hopkins University - Applied Physics Lab (APL), =
or automated security response please join us.


Thanks,
Bret
PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050
"Without cryptography vihv vivc ce xhrnrw, however, the only thing that =
can not be unscrambled is an egg."


--Apple-Mail=_FE0F3960-533C-4337-8B48-183471BAC0A4
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" =
class=3D"">All,<div class=3D""><br class=3D""></div><div class=3D"">This =
is just a friendly reminder about the two scheduled activities around =
CACAO at this IETF. If anyone would like further information, or would =
like to talk at an additional time, please let me know. &nbsp;</div><div =
class=3D""><br class=3D""></div><div class=3D""><ol class=3D""><li =
class=3D"">Sunday Night 18:00 Hot RFC Talk in&nbsp;Chitlada 3, 2nd =
floor</li><li class=3D"">Tuesday Night 17:00 Side Meeting in Pagoda, 4th =
floor</li></ol></div><div class=3D""><br class=3D""></div><div =
class=3D""><b class=3D"">Document</b></div><div class=3D"">The initial =
introduction draft document can be found here: <a =
href=3D"https://tools.ietf.org/html/draft-jordan-cacao-introduction-00" =
class=3D"">https://tools.ietf.org/html/draft-jordan-cacao-introduction-00<=
/a></div><div class=3D""><br class=3D""></div><div class=3D""><div =
class=3D""><b class=3D"">Abstract</b></div><div class=3D"">The CACAO =
draft describes the need for defining a standardized language and =
associated protocols to capture and automate a collection of coordinated =
cyber security actions and responses. &nbsp;This collection of actions =
is called a Course of Action (COA) Project.&nbsp;</div></div><div =
class=3D""><br class=3D""></div><div class=3D""><b =
class=3D"">Goals</b></div><div class=3D"">Our goal is to have a BOF at =
IETF 104 Prague and hopefully a working group shortly there after. If =
you are interested in Course of Action Projects, Security Playbooks, the =
Integrated Adaptive Cyber Defense (IACD) work from Johns =
Hopkins&nbsp;University -&nbsp;Applied Physics Lab (APL), or automated =
security response please join us.</div><div class=3D""><br =
class=3D""></div><div class=3D""><br class=3D""></div><div class=3D""><div=
 class=3D"">
<div style=3D"caret-color: rgb(0, 0, 0); color: rgb(0, 0, 0); =
font-family: Helvetica; font-size: 14px; font-style: normal; =
font-variant-caps: normal; font-weight: normal; letter-spacing: normal; =
orphans: auto; text-align: start; text-indent: 0px; text-transform: =
none; white-space: normal; widows: auto; word-spacing: 0px; =
-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; =
text-decoration: none;"><div class=3D"" style=3D"orphans: 2; widows: 2; =
font-variant-ligatures: normal; font-variant-east-asian: normal; =
font-variant-position: normal; line-height: normal; =
-webkit-text-decorations-in-effect: none;"><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-variant-ligatures: normal; font-variant-east-asian: normal; =
font-variant-position: normal; line-height: normal; border-spacing: 0px; =
-webkit-text-decorations-in-effect: none;">Thanks,</span></div><div =
class=3D"" style=3D"orphans: 2; widows: 2; font-variant-ligatures: =
normal; font-variant-east-asian: normal; font-variant-position: normal; =
line-height: normal; -webkit-text-decorations-in-effect: none;"><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
font-variant-ligatures: normal; font-variant-east-asian: normal; =
font-variant-position: normal; line-height: normal; text-align: =
-webkit-auto; border-spacing: 0px; -webkit-text-decorations-in-effect: =
none;">Bret</span></div><div class=3D"" style=3D"orphans: 2; widows: =
2;"><span class=3D"Apple-style-span" style=3D"border-collapse: separate; =
text-align: -webkit-auto; border-spacing: 0px;"><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
text-align: -webkit-auto; border-spacing: 0px;"><div class=3D"" =
style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; line-break: =
after-white-space;"><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; text-align: -webkit-auto; =
border-spacing: 0px;"><div class=3D"" style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;"><span =
class=3D"Apple-style-span" style=3D"border-collapse: separate; =
text-align: -webkit-auto; border-spacing: 0px;"><div class=3D"" =
style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; line-break: =
after-white-space;"><span class=3D"Apple-style-span" =
style=3D"border-collapse: separate; text-align: -webkit-auto; =
border-spacing: 0px;"><div class=3D""><font color=3D"#7c7c7c" =
face=3D"Calibre, Verdana" class=3D"" style=3D"font-variant-ligatures: =
normal; font-variant-east-asian: normal; font-variant-position: normal; =
line-height: normal; -webkit-text-decorations-in-effect: none;"><span =
class=3D"" style=3D"font-size: 11px;">PGP =
Fingerprint:&nbsp;</span></font><span class=3D"" style=3D"text-align: =
-webkit-auto; font-size: 11px;"><font color=3D"#7c7c7c" face=3D"Calibre, =
Verdana" class=3D"">63B4 FC53 680A 6B7D 1447 &nbsp;F2C0 74F8 ACAE 7415 =
0050</font></span></div><div class=3D"" style=3D"font-variant-ligatures: =
normal; font-variant-east-asian: normal; font-variant-position: normal; =
line-height: normal; -webkit-text-decorations-in-effect: none;"><span =
class=3D"" style=3D"color: rgb(124, 124, 124); font-size: 8pt; =
font-family: Calibre, Verdana; text-align: -webkit-auto;">"Without =
cryptography vihv vivc ce xhrnrw, however, the only thing that can not =
be unscrambled is an =
egg."</span></div></span></div></span></div></span></div></span></span></d=
iv></div>
</div>
<br class=3D""></div></body></html>=

--Apple-Mail=_FE0F3960-533C-4337-8B48-183471BAC0A4--


From nobody Sat Nov 17 01:16:17 2018
Return-Path: <rdd@cert.org>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C7094130E57 for <secdispatch@ietfa.amsl.com>; Sat, 17 Nov 2018 01:16:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.001
X-Spam-Level: 
X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cert.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id woNsft6bruG4 for <secdispatch@ietfa.amsl.com>; Sat, 17 Nov 2018 01:16:12 -0800 (PST)
Received: from veto.sei.cmu.edu (veto.sei.cmu.edu [147.72.252.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DD75712F295 for <secdispatch@ietf.org>; Sat, 17 Nov 2018 01:16:11 -0800 (PST)
Received: from korb.sei.cmu.edu (korb.sei.cmu.edu [10.64.21.30]) by veto.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id wAH9G9nH013347 for <secdispatch@ietf.org>; Sat, 17 Nov 2018 04:16:09 -0500
DKIM-Filter: OpenDKIM Filter v2.11.0 veto.sei.cmu.edu wAH9G9nH013347
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cert.org; s=yc2bmwvrj62m; t=1542446169; bh=uTsUjCikq63Zlmsw/yx7wEmr0jI+1QEeRT46lArhzv8=; h=From:To:Subject:Date:From; b=eh75UrLY7LRpM97OJS2JfR64JXZFcqmfq8KhbvojNfCN7b6sludLce2HMktqPd72r mFYCz3Vkv/x/VUUZACAi1GsN1Z2Fo6UP337U/duNeGQcbEfwZ/yXIvhf/qWBkW2xvJ 70EbPBuIDn9vbfsVmGaTzmTsnkSDjc+l1FNL+vA0=
Received: from CASSINA.ad.sei.cmu.edu (cassina.ad.sei.cmu.edu [10.64.28.249]) by korb.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id wAH9G5x6017587 for <secdispatch@ietf.org>; Sat, 17 Nov 2018 04:16:05 -0500
Received: from MARATHON.ad.sei.cmu.edu ([10.64.28.250]) by CASSINA.ad.sei.cmu.edu ([10.64.28.249]) with mapi id 14.03.0415.000; Sat, 17 Nov 2018 04:16:04 -0500
From: Roman Danyliw <rdd@cert.org>
To: "secdispatch@ietf.org" <secdispatch@ietf.org>
Thread-Topic: Draft IETF 103 minutes available
Thread-Index: AdR+VM2Y6aKK374qSNqDVvtATL75Bg==
Date: Sat, 17 Nov 2018 09:16:03 +0000
Message-ID: <359EC4B99E040048A7131E0F4E113AFC0184C42BC0@marathon>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.64.22.6]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/eTEirpEW6IAEe-0vOqg9OEia388>
Subject: [Secdispatch] Draft IETF 103 minutes available
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 17 Nov 2018 09:16:16 -0000

Hello!

Thanks to Mohit Sethi, a preliminary version of the minutes from the Bangko=
k meeting are available at:

https://datatracker.ietf.org/meeting/103/materials/minutes-103-secdispatch-=
00

If you have corrections or revisions, please provide it to the chairs.

Regards,
Roman and Richard


From nobody Sun Nov 25 10:37:52 2018
Return-Path: <beldmit@gmail.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 740C5130DCB for <secdispatch@ietfa.amsl.com>; Sun, 25 Nov 2018 10:37:51 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1iju845KHaOk for <secdispatch@ietfa.amsl.com>; Sun, 25 Nov 2018 10:37:49 -0800 (PST)
Received: from mail-ed1-x529.google.com (mail-ed1-x529.google.com [IPv6:2a00:1450:4864:20::529]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0D1F01288EB for <secdispatch@ietf.org>; Sun, 25 Nov 2018 10:37:49 -0800 (PST)
Received: by mail-ed1-x529.google.com with SMTP id f23so13993359edb.3 for <secdispatch@ietf.org>; Sun, 25 Nov 2018 10:37:48 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to;  bh=J271GubCiZaug3xiN8/EEO5Z3g9TFQ4IGMSPPed+aG4=; b=b+/SnrG+7ql57hu7ZgqQkPAeEOY0ppFyiQ4LHE9pflM3MTU4jWAT39Gomf0H7GlIYa UZtiayeHIq+0W54RHf1WvqCeh63op/CQBM8PGBy4lcJCk1MjypwSx7gHghTYa8rHUU1A adrU/kGy5YLvWMyZRva2SXXteVYP79Kx6G2s4M+C4oov3jNdD2YVAOzg/4z2wBEoOe7S gsCXWX2ZAmyStHWc1QBPxtoAdHnFVIMHLcb18h6DZ4cUOJVIIClCeHRMiqErFNrzpAwe 0Fze98H0pv8A1EN4zM5dmLj8C3JXuBBgmnwlTjDitaULAHWP4nwOz0QGyGh6a80EmeHZ oMhQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=J271GubCiZaug3xiN8/EEO5Z3g9TFQ4IGMSPPed+aG4=; b=nXdNNLM5SedWmcXxM0Fx0jYCjYseEveMl7uPK+DrUlXKdVzRIHUhmspSVQh5BD89uL r1lpSzWkswPHy/oGbLLE3CU4u9zDg5+zD/IKIOxx2GzeQwuZvUTigC377VUp+RlDz3aU czSz0RiOnsjGUzPVCfAP6jQp5fWuP+eBzh74/fVuelmaYRKxszspX7RrKoWTJIzFg8vG pXC/WfK/9dw5SRVNBXzxLFpxvvoRXC3fSK4ln8W1ac8qP5BK2+iladiQgxuCA/6nbC1Y U09B17U/rx2PvFbY7y0+P3/wrjzBoHAfGodYOgryctZ7j6tA8nqs3CVreuiQqfUc4d8V kSOw==
X-Gm-Message-State: AA+aEWZINJaNQxs3eyUXNEc3P2CSTKmtErW9KHKasYlmtpylg7OYpaJd HwpklPcNUVWHqKgof+eZD6xzf3Zx33R6aUivnd0XDOJjNLY=
X-Google-Smtp-Source: AFSGD/V6njZWu60USiqgKmIFvQcz6tQ9jJ+G2pYFLCXcsMMqjKZz/kRXAckhltUCuNpQu8F5Dbxrz0UQVoZmmRxMJzk=
X-Received: by 2002:a50:e3cb:: with SMTP id c11mr20758996edm.80.1543171067169;  Sun, 25 Nov 2018 10:37:47 -0800 (PST)
MIME-Version: 1.0
References: <154317063069.24308.3576262247647890652.idtracker@ietfa.amsl.com>
In-Reply-To: <154317063069.24308.3576262247647890652.idtracker@ietfa.amsl.com>
From: Dmitry Belyavsky <beldmit@gmail.com>
Date: Sun, 25 Nov 2018 21:37:35 +0300
Message-ID: <CADqLbzLUkjtRAhgGgv=P+eY4LfLtiL6z5rRdPWrQdASvsgX83Q@mail.gmail.com>
To: secdispatch@ietf.org
Content-Type: multipart/alternative; boundary="0000000000004951d7057b818331"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/mUSH71n-6RW8jIzZsA6idrJSQs8>
Subject: [Secdispatch] Fwd: New Version Notification for draft-belyavskiy-certificate-limitation-policy-07.txt
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 25 Nov 2018 18:37:52 -0000

--0000000000004951d7057b818331
Content-Type: text/plain; charset="UTF-8"

Hello,

I've updated the draft draft-belyavskiy-certificate-limitation-policy
considering the discussions during Secdispatch@IETF103.

The updated document contains 2 changes:
1. Limitations are expected to be linked to root and intermediate CAs, not
to leaf certificates.
2. (Finally :) ) the examples of classes of applications expected to use
CLPs are provided.

Any comments are welcome.

---------- Forwarded message ---------
From: <internet-drafts@ietf.org>
Date: Sun, Nov 25, 2018 at 9:30 PM
Subject: New Version Notification for
draft-belyavskiy-certificate-limitation-policy-07.txt
To: Dmitry Belyavskiy <beldmit@gmail.com>



A new version of I-D, draft-belyavskiy-certificate-limitation-policy-07.txt
has been successfully submitted by Dmitry Belyavskiy and posted to the
IETF repository.

Name:           draft-belyavskiy-certificate-limitation-policy
Revision:       07
Title:          Certificate Limitation Policy
Document date:  2018-11-25
Group:          Individual Submission
Pages:          9
URL:
https://www.ietf.org/internet-drafts/draft-belyavskiy-certificate-limitation-policy-07.txt
Status:
https://datatracker.ietf.org/doc/draft-belyavskiy-certificate-limitation-policy/
Htmlized:
https://tools.ietf.org/html/draft-belyavskiy-certificate-limitation-policy-07
Htmlized:
https://datatracker.ietf.org/doc/html/draft-belyavskiy-certificate-limitation-policy
Diff:
https://www.ietf.org/rfcdiff?url2=draft-belyavskiy-certificate-limitation-policy-07

Abstract:
   The document provides a specification of the application-level trust
   model.  Being provided at the application level, the limitations of
   trust can be distributed separately using cryptographically protected
   format instead of hardcoding the checks into the application itself.


-- 
SY, Dmitry Belyavsky

--0000000000004951d7057b818331
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">Hello,<br><br>I&#39;ve updated the draft =
draft-belyavskiy-certificate-limitation-policy considering the discussions =
during Secdispatch@IETF103.</div><div dir=3D"ltr"><br></div><div dir=3D"ltr=
">The updated document contains 2 changes:</div><div dir=3D"ltr">1. Limitat=
ions are expected to be linked to root and intermediate CAs, not to leaf ce=
rtificates.</div><div dir=3D"ltr">2. (Finally :) ) the examples of classes =
of applications expected to use CLPs are provided.=C2=A0</div><div dir=3D"l=
tr"><br></div><div dir=3D"ltr">Any comments are welcome.<br><br><div class=
=3D"gmail_quote"><div dir=3D"ltr">---------- Forwarded message ---------<br=
>From: <span dir=3D"ltr">&lt;<a href=3D"mailto:internet-drafts@ietf.org">in=
ternet-drafts@ietf.org</a>&gt;</span><br>Date: Sun, Nov 25, 2018 at 9:30 PM=
<br>Subject: New Version Notification for draft-belyavskiy-certificate-limi=
tation-policy-07.txt<br>To: Dmitry Belyavskiy &lt;<a href=3D"mailto:beldmit=
@gmail.com">beldmit@gmail.com</a>&gt;<br></div><br><br><br>
A new version of I-D, draft-belyavskiy-certificate-limitation-policy-07.txt=
<br>
has been successfully submitted by Dmitry Belyavskiy and posted to the<br>
IETF repository.<br>
<br>
Name:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0draft-belyavskiy-certificate-=
limitation-policy<br>
Revision:=C2=A0 =C2=A0 =C2=A0 =C2=A007<br>
Title:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Certificate Limitation Policy<br>
Document date:=C2=A0 2018-11-25<br>
Group:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Individual Submission<br>
Pages:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 9<br>
URL:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 <a href=3D"https://www.ietf.o=
rg/internet-drafts/draft-belyavskiy-certificate-limitation-policy-07.txt" r=
el=3D"noreferrer" target=3D"_blank">https://www.ietf.org/internet-drafts/dr=
aft-belyavskiy-certificate-limitation-policy-07.txt</a><br>
Status:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://datatracker.iet=
f.org/doc/draft-belyavskiy-certificate-limitation-policy/" rel=3D"noreferre=
r" target=3D"_blank">https://datatracker.ietf.org/doc/draft-belyavskiy-cert=
ificate-limitation-policy/</a><br>
Htmlized:=C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://tools.ietf.org/html/=
draft-belyavskiy-certificate-limitation-policy-07" rel=3D"noreferrer" targe=
t=3D"_blank">https://tools.ietf.org/html/draft-belyavskiy-certificate-limit=
ation-policy-07</a><br>
Htmlized:=C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://datatracker.ietf.org=
/doc/html/draft-belyavskiy-certificate-limitation-policy" rel=3D"noreferrer=
" target=3D"_blank">https://datatracker.ietf.org/doc/html/draft-belyavskiy-=
certificate-limitation-policy</a><br>
Diff:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0<a href=3D"https://www.ietf.o=
rg/rfcdiff?url2=3Ddraft-belyavskiy-certificate-limitation-policy-07" rel=3D=
"noreferrer" target=3D"_blank">https://www.ietf.org/rfcdiff?url2=3Ddraft-be=
lyavskiy-certificate-limitation-policy-07</a><br>
<br>
Abstract:<br>
=C2=A0 =C2=A0The document provides a specification of the application-level=
 trust<br>
=C2=A0 =C2=A0model.=C2=A0 Being provided at the application level, the limi=
tations of<br>
=C2=A0 =C2=A0trust can be distributed separately using cryptographically pr=
otected<br>
=C2=A0 =C2=A0format instead of hardcoding the checks into the application i=
tself.<br>
<br><br></div>-- <br><div dir=3D"ltr" class=3D"gmail_signature">SY, Dmitry =
Belyavsky</div></div></div>

--0000000000004951d7057b818331--

