
From nobody Mon Jun  3 13:46:31 2019
Return-Path: <kaduk@mit.edu>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 392F712001A for <secdispatch@ietfa.amsl.com>; Mon,  3 Jun 2019 13:46:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s5mk8l3iu82E for <secdispatch@ietfa.amsl.com>; Mon,  3 Jun 2019 13:46:23 -0700 (PDT)
Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6E70212086E for <secdispatch@ietf.org>; Mon,  3 Jun 2019 13:46:23 -0700 (PDT)
Received: from prolepsis.kaduk.org (c-24-16-119-19.hsd1.wa.comcast.net [24.16.119.19]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id x53KkIfF032714 (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for <secdispatch@ietf.org>; Mon, 3 Jun 2019 16:46:21 -0400
Date: Mon, 3 Jun 2019 13:46:18 -0700
From: Benjamin Kaduk <kaduk@mit.edu>
To: secdispatch@ietf.org
Message-ID: <20190603204618.GD1902@prolepsis.kaduk.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
User-Agent: Mutt/1.10.1 (2018-07-13)
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/zug9SCdn6prNdKvwX-ys3ZIg84s>
Subject: [Secdispatch] a proposed path forward on EDHOC/lightweight AKEs
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Jun 2019 20:46:30 -0000

Hello!

In late March, we summarized our perception of the information and
discussion that came out of the interim meeting [2], and solicited
feedback on proposed next steps [1].  Our proposed next step at that
time was to “charter a narrowly scoped, short-lived WG … with EDHOC as a
starting point”.

Since then, we received additional feedback, both on the summary and the
approach, including:

  * Support for the proposed approach in the form of:
    - Numerous individuals (>15) supported the proposed approach
    - A WG consensus endorsement for the approach from the CORE WG [3]
    - A reminder that the 6TISCH WG has consensus to use EDHOC in two WG drafts [6]
      and that it has been discussed in the WG since IETF 97 [7]
    - Interest in EDHOC for LPWAN [8] and for use in the Intelligent Transportation
      Union (ITU) [9]
    - Publication of draft-selander-lake-reqs to clarify requirements

  * Challenges to the proposed approach in the form of:
    - An individual supporting the formation of a WG, but defining no starting body
      of work
    - Questions on whether the design constraints are sufficiently well
      understood to evaluate solutions [12] [13] – rejecting “as low as
      reasonably possible” [10] or “as cheap as possible” as requirements 
    - Proposals to use a TLS derivative as an alternative to the EDHOC starting point
    - Publication of draft-rescorla-tls-ctls
    - Publication of experimental code designed to explore CTLS [11]
    - Spirited exchanges on the details, specificity and validity of
      lightweight AKE designs constraints, and real-world needs
    - Caution about the efficacy of narrow WGs [14] and the experiences of TCPINC [5]

As a result of this feedback and related discussions, we continue to
feel that there is support for the stance that developing a lightweight
AKE (LAKE) is an important problem to solve.  Furthermore, we also feel
that there is energy and interest to work on a LAKE, and that a focused
WG is the right structure to find a solution.  Another key ingredient
for success is a tight partnership with the WGs which have requirements
for such a LAKE.  In our assessment, at present, design constraints from
these requirements holders do not appear to be sufficiently precise to
allow the evaluation of alternative approaches.  A focused WG should be
able to tease apart the requirements from the various use cases into a
form that is precise enough to evaluate alternative approaches.

As a starting point, we would propose to charter a LAKE WG as follows:

==[ CHARTER ]==
Problem

Constrained environments using OSCORE in network environments such as
NB-IoT, 6TiSCH, and LoRaWAN need a ‘lightweight’ authenticated key
exchange (LAKE) that enables forward security.  'Lightweight' refers to:

  * resource consumption, measured by bytes on the wire, wall-clock time to
    complete, or power consumption
  * the amount of new code required on end systems which already have an
    OSCORE stack

Goals

This working group is intended to be a narrowly focused activity
intended to produce only at most one LAKE and close.

The working group will collaborate and coordinate with other IETF WGs
such as ACE, CORE, 6TISCH, and LPWAN to understand and validate the
requirements and solution.  The WG will also evaluate prior work from
the TLS WG and derivatives thereof, and draft-selander-ace-cose-ecdhe.

Program of Work

The deliverables of this WG are:

1. Design requirements of the LAKE in constrained environments (this
draft will not be published as an RFC but will be used to driving WG
consensus on the deliverable (2)

2. Standardize a lightweight authenticated key exchange (LAKE) for
suitable for use in a documented class of constrained environments  
==[ CHARTER ]==
 
We seek your feedback on this proposed approach.  Please share your
comments by Tuesday, June 18.  To keep momentum going on this topic we
plan to request a BoF slot at IETF 105, though the agenda for such a
slot will depend strongly on how the mailing list discussion proceeds.


Regards,

Ben and Roman
 
References
[1] https://mailarchive.ietf.org/arch/msg/secdispatch/Kz_6y6Jq4HsWxglsUHafWjXIm0c
[2] https://mailarchive.ietf.org/arch/msg/secdispatch/9AfqrecZfFMlMGxSXOo4ENZtrVk
[3] https://mailarchive.ietf.org/arch/msg/secdispatch/7UufjMgpCTifzoAmVeIDaT7bUuk
[4] https://datatracker.ietf.org/doc/draft-selander-lake-reqs/
[5] https://mailarchive.ietf.org/arch/msg/secdispatch/G2zo1cyO3AOhbPuM2r5pqVNI5hI
[6] https://mailarchive.ietf.org/arch/msg/secdispatch/nHQhxQ1v40HJ_8LuHvu3mC7b9Vg
[7] https://mailarchive.ietf.org/arch/msg/secdispatch/E0M1msLAmkSACB6T6wcG5h28XXE
[8] https://mailarchive.ietf.org/arch/msg/secdispatch/lMykdmZSoTFrHPuiU5F1EUlb7h8
[9] https://mailarchive.ietf.org/arch/msg/secdispatch/hihSp2ePB_kvl7Q8_tZ1DqMSRbI
[10] https://mailarchive.ietf.org/arch/msg/secdispatch/oXgki50_RNS7LNwEgYqjJOkBxF8
[11] https://mailarchive.ietf.org/arch/msg/secdispatch/s_AH1H73gttLv9XDCBaqLynMJ64
[12] https://mailarchive.ietf.org/arch/msg/secdispatch/vi55JLn-4XVuSOFUC6j28xcmePo
[13] https://mailarchive.ietf.org/arch/msg/secdispatch/oDmByIB_zRqZ316Vw6HyLyA_Jww
[14] https://mailarchive.ietf.org/arch/msg/secdispatch/6vnv7ZTEHw1JAdldn7qQz17YxBw


From nobody Mon Jun  3 15:28:24 2019
Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC807120086 for <secdispatch@ietfa.amsl.com>; Mon,  3 Jun 2019 15:28:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BJg88y_Jinfo for <secdispatch@ietfa.amsl.com>; Mon,  3 Jun 2019 15:28:21 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [IPv6:2607:f0b0:f:3:216:3eff:fe7c:d1f3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DE7A2120033 for <secdispatch@ietf.org>; Mon,  3 Jun 2019 15:28:20 -0700 (PDT)
Received: from sandelman.ca (unknown [IPv6:2607:f0b0:f:2:56b2:3ff:fe0b:d84]) by tuna.sandelman.ca (Postfix) with ESMTP id 1A985380BE; Mon,  3 Jun 2019 18:27:07 -0400 (EDT)
Received: by sandelman.ca (Postfix, from userid 179) id 8634B16A5; Mon,  3 Jun 2019 18:28:18 -0400 (EDT)
Received: from sandelman.ca (localhost [127.0.0.1]) by sandelman.ca (Postfix) with ESMTP id 83D7DE69; Mon,  3 Jun 2019 18:28:18 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: Benjamin Kaduk <kaduk@mit.edu>
cc: secdispatch@ietf.org
In-Reply-To: <20190603204618.GD1902@prolepsis.kaduk.org>
References: <20190603204618.GD1902@prolepsis.kaduk.org>
X-Mailer: MH-E 8.6; nmh 1.7+dev; GNU Emacs 24.5.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha256; protocol="application/pgp-signature"
Date: Mon, 03 Jun 2019 18:28:18 -0400
Message-ID: <12299.1559600898@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/EC30WlIUXhdpwnmJbQuC2jMJmGs>
Subject: Re: [Secdispatch] a proposed path forward on EDHOC/lightweight AKEs
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 03 Jun 2019 22:28:23 -0000

--=-=-=
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable


Benjamin Kaduk <kaduk@mit.edu> wrote:
    > As a starting point, we would propose to charter a LAKE WG as follows:

The charter text seems fine.
Thank you for considering to go directly to WG.

    > =3D=3D[ CHARTER ]=3D=3D
    > Problem

    > Constrained environments using OSCORE in network environments such as
    > NB-IoT, 6TiSCH, and LoRaWAN need a =E2=80=98lightweight=E2=80=99 auth=
enticated key
    > exchange (LAKE) that enables forward security.  'Lightweight' refers =
to:

    > * resource consumption, measured by bytes on the wire, wall-clock tim=
e to
    > complete, or power consumption
    > * the amount of new code required on end systems which already have an
    > OSCORE stack

    > Goals

    > This working group is intended to be a narrowly focused activity
    > intended to produce only at most one LAKE and close.

    > The working group will collaborate and coordinate with other IETF WGs
    > such as ACE, CORE, 6TISCH, and LPWAN to understand and validate the
    > requirements and solution.  The WG will also evaluate prior work from
    > the TLS WG and derivatives thereof, and draft-selander-ace-cose-ecdhe.

    > Program of Work

    > The deliverables of this WG are:

    > 1. Design requirements of the LAKE in constrained environments (this
    > draft will not be published as an RFC but will be used to driving WG
    > consensus on the deliverable (2)

    > 2. Standardize a lightweight authenticated key exchange (LAKE) for
    > suitable for use in a documented class of constrained environments
    > =3D=3D[ CHARTER ]=3D=3D

    > We seek your feedback on this proposed approach.  Please share your
    > comments by Tuesday, June 18.  To keep momentum going on this topic we
    > plan to request a BoF slot at IETF 105, though the agenda for such a
    > slot will depend strongly on how the mailing list discussion proceeds.

As it is difficult to enter conflicts for BOFs, it would be great if the
session request for this BOF could be done soonest, and that it include at a
minimum the following conflicts:
   1st: CORE ANIMA ACE LPWAN CBOR
   2nd: 6TISCH TLS SECDISPATCH ACME

Maybe Carsten or Goran have some additions here.

=2D-
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -=3D IPv6 IoT consulting =3D-




--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEbsyLEzg/qUTA43uogItw+93Q3WUFAlz1nwIACgkQgItw+93Q
3WW+0AgAvxDxIf7evJZyTWxFcncaZFYWSlPzDzKMPJXszyNr7FMM01KP4jkmiRND
jCb/na0qaIerj6EY9KTG4ZsU3cXXcfXp2r5PwSzgaRfgUShD5nG3NeIAEeAUJQBI
JsGDI95vtuHRtuNHZdIT+66WMwsG2xDE3tv9bNoDdSgoX5qUle3X0mVaKLo3pv9k
Qz00rZRszS+0mqlUk0E438FTwhomU4/Cd+nL2X4w+GZ5wthU1/xg+S0lhB23gXXt
hK7ngZiniCJxSO+C5w6M9ZUv5BVt8xtci93Wcpx9G0CLqeAlw1COjyGcONSOy+4x
izVOO9sInFA6jWU1MnxEIv86wfotxA==
=IHV1
-----END PGP SIGNATURE-----
--=-=-=--


From nobody Fri Jun  7 01:52:42 2019
Return-Path: <goran.selander@ericsson.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A57A712001A for <secdispatch@ietfa.amsl.com>; Fri,  7 Jun 2019 01:52:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.031
X-Spam-Level: 
X-Spam-Status: No, score=-1.031 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FROM_EXCESS_BASE64=0.979, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LSRaj3faRSWp for <secdispatch@ietfa.amsl.com>; Fri,  7 Jun 2019 01:52:38 -0700 (PDT)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-eopbgr150059.outbound.protection.outlook.com [40.107.15.59]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DC4FA120099 for <secdispatch@ietf.org>; Fri,  7 Jun 2019 01:52:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=r3ImGAG4SfvZNzc1DsGj7YDDFaF56dcr2V/RSvQyKxo=; b=bY9q34PnnvRGk1/m6a4+eogr52jJ8NAG/G6PyfoQtreuQheYcX4otm9V6lpgEX51edCmw46Jyf9FB3DRWtFcFqdO8CJZYFGCbKVVHAhuF1oxRQLztV0dV2erRSmgYVSzXk1v/csx/Ev+B3NXG3C9N/kEimLb0PyND2J7OuHFqjc=
Received: from HE1PR07MB4172.eurprd07.prod.outlook.com (20.176.166.25) by HE1PR07MB4153.eurprd07.prod.outlook.com (20.176.166.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1965.12; Fri, 7 Jun 2019 08:52:35 +0000
Received: from HE1PR07MB4172.eurprd07.prod.outlook.com ([fe80::8890:af24:bc53:9cb]) by HE1PR07MB4172.eurprd07.prod.outlook.com ([fe80::8890:af24:bc53:9cb%7]) with mapi id 15.20.1965.011; Fri, 7 Jun 2019 08:52:34 +0000
From: =?utf-8?B?R8O2cmFuIFNlbGFuZGVy?= <goran.selander@ericsson.com>
To: Benjamin Kaduk <kaduk@mit.edu>, "secdispatch@ietf.org" <secdispatch@ietf.org>
Thread-Topic: [Secdispatch] a proposed path forward on EDHOC/lightweight AKEs
Thread-Index: AQHVGk1ytUkXXyarI0KNBUj9irgJuKaQCZ2A
Date: Fri, 7 Jun 2019 08:52:34 +0000
Message-ID: <05B1C8AB-0598-4CDB-A779-FF7D0E73AF77@ericsson.com>
References: <20190603204618.GD1902@prolepsis.kaduk.org>
In-Reply-To: <20190603204618.GD1902@prolepsis.kaduk.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=goran.selander@ericsson.com; 
x-originating-ip: [213.89.213.86]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: bdcfc7ab-1199-4148-6e11-08d6eb257c2b
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:HE1PR07MB4153; 
x-ms-traffictypediagnostic: HE1PR07MB4153:
x-ms-exchange-purlcount: 15
x-microsoft-antispam-prvs: <HE1PR07MB4153F71708897D8B733190CBF4100@HE1PR07MB4153.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0061C35778
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(39860400002)(396003)(136003)(346002)(376002)(199004)(189003)(53936002)(7736002)(256004)(6306002)(71200400001)(8936002)(83716004)(3846002)(6116002)(14444005)(2906002)(85202003)(476003)(2616005)(33656002)(66574012)(6486002)(6512007)(71190400001)(11346002)(486006)(229853002)(5660300002)(446003)(6436002)(81166006)(186003)(2171002)(305945005)(25786009)(66066001)(76116006)(110136005)(36756003)(68736007)(66446008)(66476007)(8676002)(64756008)(85182001)(82746002)(58126008)(81156014)(86362001)(2501003)(6246003)(6506007)(99286004)(966005)(478600001)(14454004)(102836004)(76176011)(561944003)(66556008)(26005)(66946007)(73956011)(316002); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB4153; H:HE1PR07MB4172.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: utaLoCn/K9y3FhrnvcoWIm9Ealqx0Ft2xrZxcUo5/XA1/iYfzvhEMD3bkeRb/khjKJbZ9fXW/iryzFena48tfj2ks/iym/NngQ/40foRj72jnFajzCAYD2L9Qbg4kf9cI0enNQFecPo1CTSMum2ovfeaX9iSHz8kQtcZQqPcu8xYpSsDCMo8doqDUJo6KkLMmgcGUTWHVuYwsyNlnzAahQ5Y9PSCZyQUvdC1T7EfEpTRDbYjEa26GyR8FRamIfcN6RGpmhGWzw6RCmkR+jPcf4ThDzTiF4JF+suzo2gyakmwQGOQpFs2xttfNOG13bbz9BoDQDCcU92a9mMglWkP3Lic/VqpqQ0D3t/YcJcPi+UvhnUEuAgaEHlRE65mcZgQsn0JkAWtvKnW/TthcSLGMF8pZg787QjW7cKM+vvsQAE=
Content-Type: text/plain; charset="utf-8"
Content-ID: <66A4D59C66DCA444953458CB00AAFF40@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: bdcfc7ab-1199-4148-6e11-08d6eb257c2b
X-MS-Exchange-CrossTenant-originalarrivaltime: 07 Jun 2019 08:52:34.7682 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: goran.selander@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB4153
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/xJTkOA6zfU0TcQPMYevg8IBUSVk>
Subject: Re: [Secdispatch] a proposed path forward on EDHOC/lightweight AKEs
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Jun 2019 08:52:42 -0000
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From nobody Fri Jun  7 09:00:25 2019
Return-Path: <session-request@ietf.org>
X-Original-To: secdispatch@ietf.org
Delivered-To: secdispatch@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id CEF121200EF; Fri,  7 Jun 2019 09:00:17 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: IETF Meeting Session Request Tool <session-request@ietf.org>
To: <session-request@ietf.org>
Cc: rdd@cert.org, Kathleen.Moriarty.ietf@gmail.com, secdispatch@ietf.org, secdispatch-chairs@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.97.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <155992321776.19516.3775304388724185292.idtracker@ietfa.amsl.com>
Date: Fri, 07 Jun 2019 09:00:17 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/D2vIbXlOkyaKet28OtMet2rLHY0>
Subject: [Secdispatch] secdispatch - New Meeting Session Request for IETF 105
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 07 Jun 2019 16:00:23 -0000

A new meeting session request has just been submitted by Kathleen Moriarty, a Chair of the secdispatch working group.


---------------------------------------------------------
Working Group Name: Security Dispatch
Area Name: Security Area
Session Requester: Kathleen Moriarty

Number of Sessions: 1
Length of Session(s):  2 Hours
Number of Attendees: 200
Conflicts to Avoid: 
 First Priority: SAAG Dispatch ace acme cose curdle dots i2nsf ipsecme lamps mile oauth rats sacm secevent suit teep tls tokbind
 Second Priority:  httpbis rtcweb



People who must be present:
  Kathleen Moriarty
  Roman Danyliw
  Richard Barnes

Resources Requested:

Special Requests:
  I may have missed listing some WGs that Richard chairs not knowing his full list, please include those as conflicts.

---------------------------------------------------------


From nobody Mon Jun 10 17:12:29 2019
Return-Path: <jdhodges@google.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 50AB0120048 for <secdispatch@ietfa.amsl.com>; Mon, 10 Jun 2019 17:12:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -17.509
X-Spam-Level: 
X-Spam-Status: No, score=-17.509 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, ENV_AND_HDR_SPF_MATCH=-0.5, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, USER_IN_DEF_DKIM_WL=-7.5, USER_IN_DEF_SPF_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=google.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yggcIoRgjBms for <secdispatch@ietfa.amsl.com>; Mon, 10 Jun 2019 17:12:25 -0700 (PDT)
Received: from mail-wr1-x429.google.com (mail-wr1-x429.google.com [IPv6:2a00:1450:4864:20::429]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 97108120089 for <secdispatch@ietf.org>; Mon, 10 Jun 2019 17:12:24 -0700 (PDT)
Received: by mail-wr1-x429.google.com with SMTP id x4so8287995wrt.6 for <secdispatch@ietf.org>; Mon, 10 Jun 2019 17:12:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=8E9XpnJG+7HllCkl4e2fNi/wdfHbdgwpUURuLGh84Kg=; b=ElbbT3MY+uuNEI1MY26AfQ6xFcsb3zDocc8vTB3cY9yhdQHWB1pXOWB0gx/0bWoGYJ oWCtcGglmeFSeK3OqoqC8L4Mx48jTU9uy6L8xrQIMCWTQTs89XYlebf2JVlxMhMzMVd7 0bqgwFlFpvH7ak/wEp+oxZboe8u2DL9EJQlPCWO2QJs6cVNHhVNhMjNC8fuvVet31zHu d4kym96LnupeKKUeN0FtzA8p2WsDIQ//B4UAXsWVVQ1SOFY8E9POSYm4wgqO+xwckzZC 8XQkHnqH/ibq8wG5fGuiU3jEpNyr52nLUxXbcDyZfKuNjA1ySi7Q+XRINMaAczYyGDLH K9YA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=8E9XpnJG+7HllCkl4e2fNi/wdfHbdgwpUURuLGh84Kg=; b=GvF4oEpVXn/0wM8tXVSf7A+VJyfhL/vr5zpyuu44VIhQjIQeaWpUogORgsTgDgRtTn xhRvQrErJyObJFZdCppBjfqakKbyr6F+tWAxMMQPHNLS9R6ZG0UFFa04oNBToJCcnDVn LgXS2hufbIA/sN4gURxBxg+99o5WKmXt2404xwXA+Pc9TSGp7jLcOvProHjvkOzC7Rn1 +fyvpgFyPsBwx2cHRVwZDFnJl0mUYR9iLoRAmcerNkG4hrBlKi3dL7kJdBPEyTgE+yET /UzgnvbOoYzJYBRkL8fNC9QO/bQ9SuQXO569d9AcYRSn58YSLPkS+3P23XsiG+8nw3sy rlIw==
X-Gm-Message-State: APjAAAU7UPWzbti0EVGjlPoEPi/gMZEuucTJoSC/MlPJDZivkPAp5Z4H APunac4QTfTwCKlOG8Zr1vfBzqsixuz/jJ90NxDS8g==
X-Google-Smtp-Source: APXvYqyaRbfry/IWc5KJuWkSoRrKJAqx3sWpEj2qKQxnqOvDBnZ5l+Q3YsrTz0zsr1nf/+SM/52QvhTV0xneVRdjwRs=
X-Received: by 2002:adf:dfc2:: with SMTP id q2mr20449068wrn.339.1560211942647;  Mon, 10 Jun 2019 17:12:22 -0700 (PDT)
MIME-Version: 1.0
References: <20190326000905.Horde.5BCSQ8vr3ZyLXSy1pgFKEO0@box514.bluehost.com>
In-Reply-To: <20190326000905.Horde.5BCSQ8vr3ZyLXSy1pgFKEO0@box514.bluehost.com>
From: Jeff Hodges <jdhodges@google.com>
Date: Mon, 10 Jun 2019 17:11:56 -0700
Message-ID: <CAOt3QXvLXnkmSaR-NxuZnMJ_mkgwXrgv-ow_cCmYk3hbHBFu5A@mail.gmail.com>
To: Ben Kaduk <kaduk@mit.edu>
Cc: secdispatch@ietf.org
Content-Type: multipart/alternative; boundary="0000000000009e0854058b012614"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/uC0L8rTKWwxRLQgizaXnD3w3KGg>
Subject: Re: [Secdispatch] review request: draft-hodges-webauthn-registries-02
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 11 Jun 2019 00:12:28 -0000

--0000000000009e0854058b012614
Content-Type: text/plain; charset="UTF-8"

Given that there were no objections to Ben's
AD-sponsoring draft-hodges-webauthn-registries-02, we are hoping that that
is indeed the case :)

Ben, have you had time to review the draft as yet?

thanks,

=JeffH, Mike Jones, Giri Mandyam


On Tue, Mar 26, 2019 at 12:09 AM <jeff.hodges@kingsmountain.com> wrote:

> Hi,
>
> There have not been replies to the below inquiry on the mailing list,
> and I regrettably neglected to mention it during the secdispatch
> session yesterday here at IETF-104 (e.g., at the session end; I claim
> being distracted by dutifully taking minutes...).
>
> Anyway, are there any objections to Ben AD-sponsoring
> `draft-hodges-webauthn-registries` ?
>
> I and my co-authors (Mike Jones, Giri Mandyam) are around this week if
> y'all wish to chat f2f.
>
>
> thanks,
>
> =JeffH
>
>
> ---
> <Jeff.Hodges@Kingsmountain.com> scrawled on Tue, 12 March 2019 19:43 UTC:
>
> Hi,
>
> The WebAuthn spec recently attained Recommendation status [1][2], thus
> it is time to progress draft-hodges-webauthn-registries-02 [3].
>
> The latter I-D simply defines two IANA registries for W3C Web
> Authentication attestation statement format identifiers and extension
> identifiers.
>
> Kathleen had initially AD-sponsored draft-hodges-webauthn-registries --
> we're asking secdispatch to have Ben continue this sponsorship.
>
> We're happy to discuss during the SecDispatch session at IETF-104 Prague
> if y'all wish.
>
> Thanks,
>
> =JeffH, Mike Jones, Giri Mandyam
>
>
> [1]
> <
> https://www.w3.org/blog/webauthn/2019/03/10/web-authentication-level-1-is-a-w3c-recommendation/
> >
>
> [2] https://www.w3.org/TR/2019/REC-webauthn-1-20190304/
>
> [3] Subject: New Version Notification for
> draft-hodges-webauthn-registries-02.txt
> To: Michael B. Jones <mbj@microsoft.com>;, Giridhar Mandyam
> <mandyam@qti.qualcomm.com>;, Jeff Hodges <jdhodges@google.com>;
> From: <internet-drafts@ietf.org>;
> Date: Mon, Mar 11, 2019 at 7:44 PM
>
> A new version of I-D, draft-hodges-webauthn-registries-02.txt
> has been successfully submitted by Jeff Hodges and posted to the
> IETF repository.
>
> Name:           draft-hodges-webauthn-registries
> Revision:       02
> Title:          Registries for Web Authentication (WebAuthn)
> Document date:  2019-03-11
> Group:          Individual Submission
> Pages:          7
> URL:
> <
> https://www.ietf.org/internet-drafts/draft-hodges-webauthn-registries-02.txt
> >
> Status:
> <https://datatracker.ietf.org/doc/draft-hodges-webauthn-registries/>
> Htmlized:
> <https://tools.ietf.org/html/draft-hodges-webauthn-registries-02>
> Htmlized:
> <https://datatracker.ietf.org/doc/html/draft-hodges-webauthn-registries>
> Diff:
> <https://www.ietf.org/rfcdiff?url2=draft-hodges-webauthn-registries-02>
>
> Abstract:
>      This specification defines IANA registries for W3C Web Authentication
>      attestation statement format identifiers and extension identifiers.
>
>
> The IETF Secretariat
>
> _______________________________________________
> Secdispatch mailing list
> Secdispatch@ietf.org
> https://www.ietf.org/mailman/listinfo/secdispatch
>


-- 
Thanks, HTH,

=JeffH

--0000000000009e0854058b012614
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">Given that there were no objections to Be=
n&#39;s AD-sponsoring=C2=A0draft-hodges-webauthn-registries-02, we are hopi=
ng that that is indeed the case :)<div><br></div><div>Ben, have you had tim=
e to review the draft as yet?</div><div><br></div><div>thanks,=C2=A0</div><=
div><br></div><div>=3DJeffH, Mike Jones, Giri Mandyam<br></div></div><div><=
br></div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_att=
r">On Tue, Mar 26, 2019 at 12:09 AM &lt;<a href=3D"mailto:jeff.hodges@kings=
mountain.com">jeff.hodges@kingsmountain.com</a>&gt; wrote:<br></div><blockq=
uote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1p=
x solid rgb(204,204,204);padding-left:1ex">Hi,<br>
<br>
There have not been replies to the below inquiry on the mailing list,=C2=A0=
 <br>
and I regrettably neglected to mention it during the secdispatch=C2=A0 <br>
session yesterday here at IETF-104 (e.g., at the session end; I claim=C2=A0=
 <br>
being distracted by dutifully taking minutes...).<br>
<br>
Anyway, are there any objections to Ben AD-sponsoring=C2=A0 <br>
`draft-hodges-webauthn-registries` ?<br>
<br>
I and my co-authors (Mike Jones, Giri Mandyam) are around this week if=C2=
=A0 <br>
y&#39;all wish to chat f2f.<br>
<br>
<br>
thanks,<br>
<br>
=3DJeffH<br>
<br>
<br>
---<br>
&lt;Jeff.Hodges@Kingsmountain.com&gt; scrawled on Tue, 12 March 2019 19:43 =
UTC:<br>
<br>
Hi,<br>
<br>
The WebAuthn spec recently attained Recommendation status [1][2], thus<br>
it is time to progress draft-hodges-webauthn-registries-02 [3].<br>
<br>
The latter I-D simply defines two IANA registries for W3C Web<br>
Authentication attestation statement format identifiers and extension<br>
identifiers.<br>
<br>
Kathleen had initially AD-sponsored draft-hodges-webauthn-registries --<br>
we&#39;re asking secdispatch to have Ben continue this sponsorship.<br>
<br>
We&#39;re happy to discuss during the SecDispatch session at IETF-104 Pragu=
e<br>
if y&#39;all wish.<br>
<br>
Thanks,<br>
<br>
=3DJeffH, Mike Jones, Giri Mandyam<br>
<br>
<br>
[1]<br>
&lt;<a href=3D"https://www.w3.org/blog/webauthn/2019/03/10/web-authenticati=
on-level-1-is-a-w3c-recommendation/" rel=3D"noreferrer" target=3D"_blank">h=
ttps://www.w3.org/blog/webauthn/2019/03/10/web-authentication-level-1-is-a-=
w3c-recommendation/</a>&gt;<br>
<br>
[2] <a href=3D"https://www.w3.org/TR/2019/REC-webauthn-1-20190304/" rel=3D"=
noreferrer" target=3D"_blank">https://www.w3.org/TR/2019/REC-webauthn-1-201=
90304/</a><br>
<br>
[3] Subject: New Version Notification for<br>
draft-hodges-webauthn-registries-02.txt<br>
To: Michael B. Jones &lt;<a href=3D"mailto:mbj@microsoft.com" target=3D"_bl=
ank">mbj@microsoft.com</a>&gt;;, Giridhar Mandyam<br>
&lt;<a href=3D"mailto:mandyam@qti.qualcomm.com" target=3D"_blank">mandyam@q=
ti.qualcomm.com</a>&gt;;, Jeff Hodges &lt;<a href=3D"mailto:jdhodges@google=
.com" target=3D"_blank">jdhodges@google.com</a>&gt;;<br>
From: &lt;<a href=3D"mailto:internet-drafts@ietf.org" target=3D"_blank">int=
ernet-drafts@ietf.org</a>&gt;;<br>
Date: Mon, Mar 11, 2019 at 7:44 PM<br>
<br>
A new version of I-D, draft-hodges-webauthn-registries-02.txt<br>
has been successfully submitted by Jeff Hodges and posted to the<br>
IETF repository.<br>
<br>
Name:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0draft-hodges-webauthn-registr=
ies<br>
Revision:=C2=A0 =C2=A0 =C2=A0 =C2=A002<br>
Title:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Registries for Web Authentication =
(WebAuthn)<br>
Document date:=C2=A0 2019-03-11<br>
Group:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Individual Submission<br>
Pages:=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 7<br>
URL:<br>
&lt;<a href=3D"https://www.ietf.org/internet-drafts/draft-hodges-webauthn-r=
egistries-02.txt" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org=
/internet-drafts/draft-hodges-webauthn-registries-02.txt</a>&gt;<br>
Status:<br>
&lt;<a href=3D"https://datatracker.ietf.org/doc/draft-hodges-webauthn-regis=
tries/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/d=
oc/draft-hodges-webauthn-registries/</a>&gt;<br>
Htmlized:<br>
&lt;<a href=3D"https://tools.ietf.org/html/draft-hodges-webauthn-registries=
-02" rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/draft=
-hodges-webauthn-registries-02</a>&gt;<br>
Htmlized:<br>
&lt;<a href=3D"https://datatracker.ietf.org/doc/html/draft-hodges-webauthn-=
registries" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.o=
rg/doc/html/draft-hodges-webauthn-registries</a>&gt;<br>
Diff:<br>
&lt;<a href=3D"https://www.ietf.org/rfcdiff?url2=3Ddraft-hodges-webauthn-re=
gistries-02" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org/rfcd=
iff?url2=3Ddraft-hodges-webauthn-registries-02</a>&gt;<br>
<br>
Abstract:<br>
=C2=A0 =C2=A0 =C2=A0This specification defines IANA registries for W3C Web =
Authentication<br>
=C2=A0 =C2=A0 =C2=A0attestation statement format identifiers and extension =
identifiers.<br>
<br>
<br>
The IETF Secretariat<br>
<br>
_______________________________________________<br>
Secdispatch mailing list<br>
<a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank">Secdispatch@ietf.=
org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/secdispatch" rel=3D"norefe=
rrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/secdispatch</=
a><br>
</blockquote></div><br clear=3D"all"><div><br></div>-- <br><div dir=3D"ltr"=
 class=3D"gmail_signature"><div dir=3D"ltr"><div>Thanks, HTH,<br><br>=3DJef=
fH<br></div></div></div></div>

--0000000000009e0854058b012614--


From nobody Fri Jun 14 12:32:25 2019
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1A1D31200B6; Fri, 14 Jun 2019 12:32:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.299
X-Spam-Level: 
X-Spam-Status: No, score=-4.299 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uL1mTF8MMylo; Fri, 14 Jun 2019 12:32:20 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 087DB120047; Fri, 14 Jun 2019 12:32:19 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 9AFF6BE3E; Fri, 14 Jun 2019 20:32:16 +0100 (IST)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b7zVgpg-hfpb; Fri, 14 Jun 2019 20:32:14 +0100 (IST)
Received: from [10.244.2.138] (95-45-153-252-dynamic.agg2.phb.bdt-fng.eircom.net [95.45.153.252]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id AAC1DBE2F; Fri, 14 Jun 2019 20:32:14 +0100 (IST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1560540734; bh=KXhCOEuE6V0sT36rBsH39E6umFIgqq7kTcl57KdoSC0=; h=Subject:References:To:Cc:From:Date:In-Reply-To:From; b=h0uoh/1L4ftWGqGftp1/0HhkrK0D7hrHGlrIxGSozJoUfUZPJeAGKVi4CmVhBxj7K yRMsrLEg8hue77SJBqdMQJn3MymS8LA+m0l1UjAeUsvNnHxjqFNdVX+iqWFwinstLA 4geix3B/06vmddgC2Jf0nv4RCAE9uioaK4zFOnL0=
References: <156053223475.31498.16975787393043418766.idtracker@ietfa.amsl.com>
To: "saag@ietf.org" <saag@ietf.org>, "secdispatch@ietf.org" <secdispatch@ietf.org>
Cc: Yoav Nir <ynir.ietf@gmail.com>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Openpgp: id=5BB5A6EA5765D2C5863CAE275AB2FAF17B172BEA; url=
Autocrypt: addr=stephen.farrell@cs.tcd.ie; prefer-encrypt=mutual; keydata= mQINBFo9UDIBEADUH4ZPcUnX5WWRWO4kEkHea5Y5eEvZjSwe/YA+G0nrTuOU9nemCP5PMvmh 5Cg8gBTyWyN4Z2+O25p9Tja5zUb+vPMWYvOtokRrp46yhFZOmiS5b6kTq0IqYzsEv5HI58S+ QtaFq978CRa4xH9Gi9u4yzUmT03QNIGDXE37honcAM4MOEtEgvw4fVhVWJuyy3w//0F2tzKr EMjmL5VGuD/Q9+G/7abuXiYNNd9ZFjv4625AUWwy+pAh4EKzS1FE7BOZp9daMu9MUQmDqtZU bUv0Q+DnQAB/4tNncejJPz0p2z3MWCp5iSwHiQvytYgatMp34a50l6CWqa13n6vY8VcPlIqO Vz+7L+WiVfxLbeVqBwV+4uL9to9zLF9IyUvl94lCxpscR2kgRgpM6A5LylRDkR6E0oudFnJg b097ZaNyuY1ETghVB5Uir1GCYChs8NUNumTHXiOkuzk+Gs4DAHx/a78YxBolKHi+esLH8r2k 4LyM2lp5FmBKjG7cGcpBGmWavACYEa7rwAadg4uBx9SHMV5i33vDXQUZcmW0vslQ2Is02NMK 7uB7E7HlVE1IM1zNkVTYYGkKreU8DVQu8qNOtPVE/CdaCJ/pbXoYeHz2B1Nvbl9tlyWxn5Xi HzFPJleXc0ksb9SkJokAfwTSZzTxeQPER8la5lsEEPbU/cDTcwARAQABtDJTdGVwaGVuIEZh cnJlbGwgKDIwMTcpIDxzdGVwaGVuLmZhcnJlbGxAY3MudGNkLmllPokCQAQTAQgAKgIbAwUJ CZQmAAULCQgHAgYVCAkKCwIEFgIDAQIeAQIXgAUCWj6jdwIZAQAKCRBasvrxexcr6o7QD/9m x9DPJetmW794RXmNTrbTJ44zc/tJbcLdRBh0KBn9OW/EaAqjDmgNJeCMyJTKr1ywaps8HGUN hLEVkc14NUpgi4/Zkrbi3DmTp25OHj6wXBS5qVMyVynTMEIjOfeFFyxG+48od+Xn7qg6LT7G rHeNf+z/r0v9+8eZ1Ip63kshQDGhhpmRMKu4Ws9ZvTW2ACXkkTFaSGYJj3yIP4R6IgwBYGMz DXFX6nS4LA1s3pcPNxOgrvCyb60AiJZTLcOk/rRrpZtXB1XQc23ZZmrlTkl2HaThL6w3YKdi Ti1NbuMeOxZqtXcUshII45sANm4HuWNTiRh93Bn5bN6ddjgsaXEZBKUBuUaPBl7gQiQJcAlS 3MmGgVS4ZoX8+VaPGpXdQVFyBMRFlOKOC5XJESt7wY0RE2C8PFm+5eywSO/P1fkl9whkMgml 3OEuIQiP2ehRt/HVLMHkoM9CPQ7t6UwdrXrvX+vBZykav8x9U9M6KTgfsXytxUl6Vx5lPMLi 2/Jrsz6Mzh/IVZa3xjhq1OLFSI/tT2ji4FkJDQbO+yYUDhcuqfakDmtWLMxecZsY6O58A/95 8Qni6Xeq+Nh7zJ7wNcQOMoDGj+24di2TX1cKLzdDMWFaWzlNP5dB5VMwS9Wqj1Z6TzKjGjru q8soqohwb2CK9B3wzFg0Bs1iBI+2RuFnxLkCDQRaPVAyARAA+g3R0HzGr/Dl34Y07XqGqzq5 SU0nXIu9u8Ynsxj7gR5qb3HgUWYEWrHW2jHOByXnvkffucf5yzwrsvw8Q8iI8CFHiTYHPpey 4yPVn6R0w/FOMcY70eTIu/k6EEFDlDbs09DtKcrsT9bmN0XoRxITlXwWTufYqUnmS+YkAuk+ TLCtUin7OdaS2uU6Ata3PLQSeM2ZsUQMmYmHPwB9rmf+q2I005AJ9Q1SPQ2KNg/8xOGxo13S VuaSqYRQdpV93RuCOzg4vuXtR+gP0KQrus/P2ZCEPvU9cXF/2MIhXgOz207lv3iE2zGyNXld /n8spvWk+0bH5Zqd9Wcba/rGcBhmX9NKKDARZqjkv/zVEP1X97w1HsNYeUFNcg2lk9zQKb4v l1jx/Uz8ukzH2QNhU4R39dbF/4AwWuSVkGW6bTxHJqGs6YimbfdQqxTzmqFwz3JP0OtXX5q/ 6D4pHwcmJwEiDNzsBLl6skPSQ0Xyq3pua/qAP8MVm+YxCxJQITqZ8qjDLzoe7s9X6FLLC/DA L9kxl5saVSfDbuI3usH/emdtn0NA9/M7nfgih92zD92sl1yQXHT6BDa8xW1j+RU4P+E0wyd7 zgB2UeYgrp2IIcfG+xX2uFG5MJQ/nYfBoiALb0+dQHNHDtFnNGY3Oe8z1M9c5aDG3/s29QbJ +w7hEKKo9YMAEQEAAYkCJQQYAQgADwUCWj1QMgIbDAUJCZQmAAAKCRBasvrxexcr6qwvD/9b Rek3kfN8Q+jGrKl8qwY8HC5s4mhdDJZI/JP2FImf5J2+d5/e8UJ4fcsT79E0/FqX3Z9wZr6h sofPqLh1/YzDsYkZDHTYSGrlWGP/I5kXwUmFnBZHzM3WGrL3S7ZmCYMdudhykxXXjq7M6Do1 oxM8JofrXGtwBTLv5wfvvygJouVCVe87Ge7mCeY5vey1eUi4zSSF1zPpR6gg64w2g4TXM5qt SwkZVOv1g475LsGlYWRuJV8TA67yp1zJI7HkNqCo8KyHX0DPOh9c+Sd9ZX4aqKfqH9HIpnCL AYEgj7vofeix7gM3kQQmwynqq32bQGQBrKJEYp2vfeO30VsVx4dzuuiC5lyjUccVmw5D72J0 FlGrfEm0kw6D1qwyBg0SAMqamKN6XDdjhNAtXIaoA2UMZK/vZGGUKbqTgDdk0fnzOyb2zvXK CiPFKqIPAqKaDHg0JHdGI3KpQdRNLLzgx083EqEc6IAwWA6jSz+6lZDV6XDgF0lYqAYIkg3+ 6OUXUv6plMlwSHquiOc/MQXHfgUP5//Ra5JuiuyCj954FD+MBKIj8eWROfnzyEnBplVHGSDI ZLzL3pvV14dcsoajdeIH45i8DxnVm64BvEFHtLNlnliMrLOrk4shfmWyUqNlzilXN2BTFVFH 4MrnagFdcFnWYp1JPh96ZKjiqBwMv/H0kw==
X-Forwarded-Message-Id: <156053223475.31498.16975787393043418766.idtracker@ietfa.amsl.com>
Message-ID: <67fc12bb-5804-cc9c-1be9-6e748b6f0da3@cs.tcd.ie>
Date: Fri, 14 Jun 2019 20:32:12 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0
MIME-Version: 1.0
In-Reply-To: <156053223475.31498.16975787393043418766.idtracker@ietfa.amsl.com>
Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="zfdFMFWtsGwR1e5bJSq3pZliubXfHBeZJ"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/GkHwcu_d_U3jvoctHBInyrBIs1g>
Subject: [Secdispatch] Fwd: New Non-WG Mailing List: lake
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 14 Jun 2019 19:32:24 -0000

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--zfdFMFWtsGwR1e5bJSq3pZliubXfHBeZJ
Content-Type: multipart/mixed; boundary="WqVAigssPfqb1NJaq09WGLVONuA4amgod";
 protected-headers="v1"
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
To: "saag@ietf.org" <saag@ietf.org>,
 "secdispatch@ietf.org" <secdispatch@ietf.org>
Cc: Yoav Nir <ynir.ietf@gmail.com>
Message-ID: <67fc12bb-5804-cc9c-1be9-6e748b6f0da3@cs.tcd.ie>
Subject: Fwd: New Non-WG Mailing List: lake
References: <156053223475.31498.16975787393043418766.idtracker@ietfa.amsl.com>
In-Reply-To: <156053223475.31498.16975787393043418766.idtracker@ietfa.amsl.com>

--WqVAigssPfqb1NJaq09WGLVONuA4amgod
Content-Type: multipart/mixed;
 boundary="------------DF2A30551DB6394651C59543"
Content-Language: en-GB

This is a multi-part message in MIME format.
--------------DF2A30551DB6394651C59543
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable


Hiya,

There's a new mailing list for discussion of lightweight
authenticated key exchange, which has previously been
discussed here in various edhoc threads. There's a BoF
on this topic planned for IETF 105 as well. [1] Yoav and
I are down to chair that at the moment.

So if you're interested in that topic please sign up.
We'll try kick off some pre-BoF discussion once people
have had a chance to get onto the new list and Yoav
and I have had a chance to chat about it all.

Cheers,
S.

[1] https://trac.tools.ietf.org/bof/trac/wiki#LAKE


-------- Forwarded Message --------
Subject: New Non-WG Mailing List: lake
Date: Fri, 14 Jun 2019 10:10:34 -0700
From: IETF Secretariat <ietf-secretariat@ietf.org>
Reply-To: ietf@ietf.org
To: IETF Announcement List <ietf-announce@ietf.org>
CC: stephen.farrell@cs.tcd.ie, ynir.ietf@gmail.com

A new IETF non-working group email list has been created.

List address: lake@ietf.org
Archive: https://mailarchive.ietf.org/arch/browse/lake/
To subscribe: https://www.ietf.org/mailman/listinfo/lake

Purpose:
Constrained environments using OSCORE in network environments such as
NB-IoT, 6TiSCH, and LoRaWAN need a 'lightweight' authenticated key
exchange (LAKE) that enables forward security. 'Lightweight' refers to
resource consumption, measured by bytes on the wire, wall-clock time to
complete, or power consumption; and the amount of new code required on
end systems which already have an OSCORE stack.
This list belong IETF area: SEC

For additional information, please contact the list administrators.


--------------DF2A30551DB6394651C59543
Content-Type: application/pgp-keys;
 name="0x5AB2FAF17B172BEA.asc"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
 filename="0x5AB2FAF17B172BEA.asc"

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=3DYzQY
-----END PGP PUBLIC KEY BLOCK-----

--------------DF2A30551DB6394651C59543--

--WqVAigssPfqb1NJaq09WGLVONuA4amgod--

--zfdFMFWtsGwR1e5bJSq3pZliubXfHBeZJ
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=awCj
-----END PGP SIGNATURE-----

--zfdFMFWtsGwR1e5bJSq3pZliubXfHBeZJ--


From nobody Wed Jun 19 06:38:41 2019
Return-Path: <mcr+ietf@sandelman.ca>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9C5D41204AD for <secdispatch@ietfa.amsl.com>; Wed, 19 Jun 2019 06:38:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hqBsyI1ZNeK8 for <secdispatch@ietfa.amsl.com>; Wed, 19 Jun 2019 06:38:37 -0700 (PDT)
Received: from tuna.sandelman.ca (tuna.sandelman.ca [209.87.249.19]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7C4751204AA for <secdispatch@ietf.org>; Wed, 19 Jun 2019 06:38:36 -0700 (PDT)
Received: from sandelman.ca (obiwan.sandelman.ca [209.87.249.21]) by tuna.sandelman.ca (Postfix) with ESMTP id 3892F380BE for <secdispatch@ietf.org>; Wed, 19 Jun 2019 09:37:01 -0400 (EDT)
Received: by sandelman.ca (Postfix, from userid 179) id 9D7E4E9E; Wed, 19 Jun 2019 09:38:34 -0400 (EDT)
Received: from sandelman.ca (localhost [127.0.0.1]) by sandelman.ca (Postfix) with ESMTP id 9AFC0E47 for <secdispatch@ietf.org>; Wed, 19 Jun 2019 09:38:34 -0400 (EDT)
From: Michael Richardson <mcr+ietf@sandelman.ca>
To: secdispatch@ietf.org
In-Reply-To: <040a01d5263c$6c51efa0$44f5cee0$@augustcellars.com>
References: <6535.1560786935@dooku.sandelman.ca> <10505.1560789112@dooku.sandelman.ca> <12718.1560790704@dooku.sandelman.ca> <040a01d5263c$6c51efa0$44f5cee0$@augustcellars.com>
X-Mailer: MH-E 8.6; nmh 1.7+dev; GNU Emacs 24.5.1
X-Face: $\n1pF)h^`}$H>Hk{L"x@)JS7<%Az}5RyS@k9X%29-lHB$Ti.V>2bi.~ehC0; <'$9xN5Ub# z!G,p`nR&p7Fz@^UXIn156S8.~^@MJ*mMsD7=QFeq%AL4m<nPbLgmtKK-5dC@#:k
MIME-Version: 1.0
Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha256; protocol="application/pgp-signature"
Date: Wed, 19 Jun 2019 09:38:34 -0400
Message-ID: <16160.1560951514@localhost>
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/plIOeAt8FKl0Csd33THkuMh4-zY>
Subject: [Secdispatch] addressing Content-Type-Encoding errata on EST / RFC7030
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jun 2019 13:38:39 -0000

--=-=-=
Content-Type: text/plain


Dear secdispatch Chairs,

I have written draft-richardson-lamps-rfc7030est-clarify-02 to deal with
the errata:
   https://www.rfc-editor.org/errata/eid5107

it turns out that deployed code prevents us from having a signal that
would let us remove the needless base64 encoding, but at least we can
remove the deprecated CTE header which was not being used anyway.

I believe that we can deal with:
    https://www.rfc-editor.org/errata/eid4384
    https://www.rfc-editor.org/errata/eid5108

in this document as well, although I haven't yet done that.  The result would
be a standards track document that Updates RFC7030.

As an aside, I think that the errata needs to move from reported to accepted.

--
Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
 -= IPv6 IoT consulting =-




--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEbsyLEzg/qUTA43uogItw+93Q3WUFAl0KOtoACgkQgItw+93Q
3WW80Af/U1r8kLlYikD/yCkjyjcww8MD+6BVTwfcf7u5p2vr7v4Sj/MfYXY/zD90
DCLy/jvbzyeWXOCQmxqOaDb+KsAveQp1lxyJzvfLoMgRqqV1lS0LM4UkC61Odtbu
CnjHJdKTd0whMKOHvksYc9kgbA+Mn8LWJ/idYdJQoacRfReIij+7uBeIpE6EbNb+
TKwap7qNR+1s5lrIh2iBqa/q1bxpo97B9QYYYNS6BW/70SLR2upmLwVUdciMft36
bpjkGFxNTgxjqLSbRs6ULQETrVPjg8kX9XJ4sb6roiKxKlt8SYDJOLrp45ZMQfwF
dcHRuTPwSGOh4JpJ2Qz+IV123iTSIg==
=6ZaI
-----END PGP SIGNATURE-----
--=-=-=--


From nobody Wed Jun 19 06:50:13 2019
Return-Path: <lear@cisco.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2268B1204ED for <secdispatch@ietfa.amsl.com>; Wed, 19 Jun 2019 06:50:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level: 
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nQKGHumhjgVm for <secdispatch@ietfa.amsl.com>; Wed, 19 Jun 2019 06:50:09 -0700 (PDT)
Received: from aer-iport-3.cisco.com (aer-iport-3.cisco.com [173.38.203.53]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DA9BA12013D for <secdispatch@ietf.org>; Wed, 19 Jun 2019 06:50:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2237; q=dns/txt; s=iport; t=1560952209; x=1562161809; h=from:message-id:mime-version:subject:date:in-reply-to:cc: to:references; bh=ZqWnQr1qrYjUulLuvJPMqPLy08tg7qEn6eqshCYlVPM=; b=W3Yqt3X2VvioN2ap7mKQ7ql00Iocg+zLbm9kSLcgAfrD+1nojPAyv9J7 LvtmgHUaICSixdZgEG489uL/h0FSO5omQiSFysbG8qLGShFheY8KilK+c 7gHDD0cU8z0Jvo+4KCsYkZauA5oRz8CER0E3CTpXc4Bv0nbtJl8vWj7lc A=;
X-Files: signature.asc : 488
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AFAACyPApd/xbLJq1mGQEBAQEBAQE?= =?us-ascii?q?BAQEBAQcBAQEBAQGBVAMBAQEBAQsBghZHI1EBIBIohBaIe4tgJZhkFIFnAgc?= =?us-ascii?q?BAQEJAwEBIwwBAYFLgnUCgns1CA4BAwEBBAEBAgEFbYo3DIVKAQEBAQIBI1Y?= =?us-ascii?q?FCwsYKgICVwYTgyIBgXsPD6sPgTGFR4RcCgaBNAGBUIokgX+BOAwTgkw+gQS?= =?us-ascii?q?DCINCMoImBJQtlTgJghOCG4EHkDEblzSgfIMIAgQGBQIVgVIDM4FYMxoIGxV?= =?us-ascii?q?lAYJBPoIbiGyFQT0DMI9yAQE?=
X-IronPort-AV: E=Sophos;i="5.63,392,1557187200";  d="asc'?scan'208";a="13282253"
Received: from aer-iport-nat.cisco.com (HELO aer-core-4.cisco.com) ([173.38.203.22]) by aer-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 19 Jun 2019 13:50:06 +0000
Received: from dhcp-10-61-102-117.cisco.com (dhcp-10-61-102-117.cisco.com [10.61.102.117]) by aer-core-4.cisco.com (8.15.2/8.15.2) with ESMTPS id x5JDo5Fw018145 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 19 Jun 2019 13:50:06 GMT
From: Eliot Lear <lear@cisco.com>
Message-Id: <B3E0038E-C4CC-4628-A46D-B929F4CB3055@cisco.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_6E865BDF-0B30-43FD-ABD3-7AC7398D4092"; protocol="application/pgp-signature"; micalg=pgp-sha256
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Wed, 19 Jun 2019 15:50:05 +0200
In-Reply-To: <16160.1560951514@localhost>
Cc: secdispatch@ietf.org
To: Michael Richardson <mcr+ietf@sandelman.ca>
References: <6535.1560786935@dooku.sandelman.ca> <10505.1560789112@dooku.sandelman.ca> <12718.1560790704@dooku.sandelman.ca> <040a01d5263c$6c51efa0$44f5cee0$@augustcellars.com> <16160.1560951514@localhost>
X-Mailer: Apple Mail (2.3445.104.11)
X-Outbound-SMTP-Client: 10.61.102.117, dhcp-10-61-102-117.cisco.com
X-Outbound-Node: aer-core-4.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/2FYCJPCK1Tf8ULrFrL0jCKEND9M>
Subject: Re: [Secdispatch] addressing Content-Type-Encoding errata on EST / RFC7030
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jun 2019 13:50:11 -0000

--Apple-Mail=_6E865BDF-0B30-43FD-ABD3-7AC7398D4092
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

I will just add that if we=E2=80=99re doing a correction, one other =
possibility would be to add new restless endpoints that are the same as =
the old ones but deal with encoding correctly, and then deprecate the =
old endpoints.

Eliot

> On 19 Jun 2019, at 15:38, Michael Richardson <mcr+ietf@sandelman.ca> =
wrote:
>=20
> Signed PGP part
>=20
> Dear secdispatch Chairs,
>=20
> I have written draft-richardson-lamps-rfc7030est-clarify-02 to deal =
with
> the errata:
>   https://www.rfc-editor.org/errata/eid5107
>=20
> it turns out that deployed code prevents us from having a signal that
> would let us remove the needless base64 encoding, but at least we can
> remove the deprecated CTE header which was not being used anyway.
>=20
> I believe that we can deal with:
>    https://www.rfc-editor.org/errata/eid4384
>    https://www.rfc-editor.org/errata/eid5108
>=20
> in this document as well, although I haven't yet done that.  The =
result would
> be a standards track document that Updates RFC7030.
>=20
> As an aside, I think that the errata needs to move from reported to =
accepted.
>=20
> --
> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
> -=3D IPv6 IoT consulting =3D-
>=20
>=20
>=20
>=20
>=20


--Apple-Mail=_6E865BDF-0B30-43FD-ABD3-7AC7398D4092
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEmNC9kEYdsJKnsmEdh7ZrRtnSejMFAl0KPY0ACgkQh7ZrRtnS
ejPiXQf/SCVwBxOkDn/Qx2pdShjkABZqqjvf/ao889A1PDFX9+a2LShR7OPZBPro
KZIkWhuqBlsDVssorwOR+KUkSi2pUPWRD+4YDZeWDdrnPYE3UcOEATbcv0/DU0o4
rbLBDFaoKcFTBkOuSW0oBjnFdmYJeUAiTwP+CIvjxMygbHEEZtQXKLxI5qhqS5Rv
OSlbpEd6yEgRbRmFe6qHIVC+whi1QHBMXb3A3ihDrXa2eA/E/muRexplbzvMcq+w
3OLGne7sYGTDJZWFHk08uI/kTegoXm14SxORb/4iGx9YZRTt+DcfUbbL7IxEhqiG
Vaxgu36CWGUfM9jTONCw1BTD6yZwsw==
=eMMC
-----END PGP SIGNATURE-----

--Apple-Mail=_6E865BDF-0B30-43FD-ABD3-7AC7398D4092--


From nobody Wed Jun 19 07:01:42 2019
Return-Path: <lear@cisco.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 626F51204BF for <secdispatch@ietfa.amsl.com>; Wed, 19 Jun 2019 07:01:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.51
X-Spam-Level: 
X-Spam-Status: No, score=-14.51 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_DKIMWL_WL_MED=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FMlYO9mfkxOr for <secdispatch@ietfa.amsl.com>; Wed, 19 Jun 2019 07:01:39 -0700 (PDT)
Received: from aer-iport-3.cisco.com (aer-iport-3.cisco.com [173.38.203.53]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5A5B012008B for <secdispatch@ietf.org>; Wed, 19 Jun 2019 07:01:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=2147; q=dns/txt; s=iport; t=1560952899; x=1562162499; h=from:message-id:mime-version:subject:date:in-reply-to:cc: to:references; bh=iabVkYYksBOVDZDekLRXAJlEj55whfgO8Z8y/TgKABQ=; b=M7YK22bPEGU9Mi69NChJ+OR7cA2f1JiGRD0CFerU5OgSwpovYBcrpDnC 1WLUpzxjn3do5lGZAXaIoas8HiOxtWEQ+giNwtz/RDcvv0rnY2zxPalaJ vXkwsIGuPWRsybRkHzbN5o03uYC3SD3nlTyJlYKT1dwg91okOxP3o3Czo 8=;
X-Files: signature.asc : 195
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0AHAAAkPwpd/xbLJq1mGQEBAQEBAQE?= =?us-ascii?q?BAQEBAQcBAQEBAQGBVQIBAQEBAQsBghZHI1EBIBIohBaIe4wFmGQUgWcCBwE?= =?us-ascii?q?BAQkDAQEjDAEBgUuCdQKCezYHDgEDAQEEAQECAQVtijcMhUoBAQEBAgEjVgU?= =?us-ascii?q?LCxgqAgJXBhODIgGBew8PqxiBMYVHhFwKBoE0AYFQiiSBf4E4H4JMPoEEgwi?= =?us-ascii?q?DQjKCJgSULZU4CYITghuBB5AxG5c0oHyDCAIEBgUCFYFXBiuBWDMaCBsVZQG?= =?us-ascii?q?CQT6CG4hshUE9AzCPcgEB?=
X-IronPort-AV: E=Sophos;i="5.63,392,1557187200";  d="asc'?scan'208";a="13282514"
Received: from aer-iport-nat.cisco.com (HELO aer-core-3.cisco.com) ([173.38.203.22]) by aer-iport-3.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 19 Jun 2019 14:01:37 +0000
Received: from dhcp-10-61-102-117.cisco.com (dhcp-10-61-102-117.cisco.com [10.61.102.117]) by aer-core-3.cisco.com (8.15.2/8.15.2) with ESMTPS id x5JE1Z7W002798 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 19 Jun 2019 14:01:37 GMT
From: Eliot Lear <lear@cisco.com>
Message-Id: <6209DCAD-52D3-40DD-B0EE-81CF353487B0@cisco.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_D8D276BE-CF25-4FCD-9423-595FC911541B"; protocol="application/pgp-signature"; micalg=pgp-sha1
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Wed, 19 Jun 2019 16:01:35 +0200
In-Reply-To: <B3E0038E-C4CC-4628-A46D-B929F4CB3055@cisco.com>
Cc: secdispatch@ietf.org
To: Michael Richardson <mcr+ietf@sandelman.ca>
References: <6535.1560786935@dooku.sandelman.ca> <10505.1560789112@dooku.sandelman.ca> <12718.1560790704@dooku.sandelman.ca> <040a01d5263c$6c51efa0$44f5cee0$@augustcellars.com> <16160.1560951514@localhost> <B3E0038E-C4CC-4628-A46D-B929F4CB3055@cisco.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-Outbound-SMTP-Client: 10.61.102.117, dhcp-10-61-102-117.cisco.com
X-Outbound-Node: aer-core-3.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/QDsm5P8z7CFcA2ZVpfqcl9ZoYvI>
Subject: Re: [Secdispatch] addressing Content-Type-Encoding errata on EST / RFC7030
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jun 2019 14:01:41 -0000

--Apple-Mail=_D8D276BE-CF25-4FCD-9423-595FC911541B
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8



> On 19 Jun 2019, at 15:50, Eliot Lear <lear@cisco.com> wrote:
>=20
> Signed PGP part

Erm.

> I will just add that if we=E2=80=99re doing a correction, one other =
possibility would be to add new restless endpoints

I was autoINcorrected.  That should be RESTful.

> that are the same as the old ones but deal with encoding correctly, =
and then deprecate the old endpoints.
>=20
> Eliot
>=20
>> On 19 Jun 2019, at 15:38, Michael Richardson <mcr+ietf@sandelman.ca> =
wrote:
>>=20
>> Signed PGP part
>>=20
>> Dear secdispatch Chairs,
>>=20
>> I have written draft-richardson-lamps-rfc7030est-clarify-02 to deal =
with
>> the errata:
>>  https://www.rfc-editor.org/errata/eid5107
>>=20
>> it turns out that deployed code prevents us from having a signal that
>> would let us remove the needless base64 encoding, but at least we can
>> remove the deprecated CTE header which was not being used anyway.
>>=20
>> I believe that we can deal with:
>>   https://www.rfc-editor.org/errata/eid4384
>>   https://www.rfc-editor.org/errata/eid5108
>>=20
>> in this document as well, although I haven't yet done that.  The =
result would
>> be a standards track document that Updates RFC7030.
>>=20
>> As an aside, I think that the errata needs to move from reported to =
accepted.
>>=20
>> --
>> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
>> -=3D IPv6 IoT consulting =3D-
>>=20
>>=20
>>=20
>>=20
>>=20
>=20
>=20


--Apple-Mail=_D8D276BE-CF25-4FCD-9423-595FC911541B
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP

-----BEGIN PGP SIGNATURE-----

iF0EARECAB0WIQTgo4LlIIJ5lIBumWpugA9nE248uAUCXQpAPwAKCRBugA9nE248
uK+sAJsF8ON1UBFrU8ThvrxajjxCwfCsQgCg+9SALmqWMukyVCrZrj6c8vkjl1E=
=PQc2
-----END PGP SIGNATURE-----

--Apple-Mail=_D8D276BE-CF25-4FCD-9423-595FC911541B--


From nobody Wed Jun 26 11:55:34 2019
Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: secdispatch@ietfa.amsl.com
Delivered-To: secdispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C8E2120660 for <secdispatch@ietfa.amsl.com>; Wed, 26 Jun 2019 11:55:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IVLOQc80G65X for <secdispatch@ietfa.amsl.com>; Wed, 26 Jun 2019 11:55:27 -0700 (PDT)
Received: from mail-oi1-x231.google.com (mail-oi1-x231.google.com [IPv6:2607:f8b0:4864:20::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DEBAA12068C for <secdispatch@ietf.org>; Wed, 26 Jun 2019 11:55:26 -0700 (PDT)
Received: by mail-oi1-x231.google.com with SMTP id m206so2725814oib.12 for <secdispatch@ietf.org>; Wed, 26 Jun 2019 11:55:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=QCPIwFABWJnJLhPfWBq32fDP8cEWDoqmd7r2dT7Fi+s=; b=Y4hGCMfys3oaAZ4bpm4+W5vg+mEwjwdZ28sJYVLAsgBb0zo9VBxF5OfS63l9fSvVU1 9uPe+OLgquHBNvaDuT7mFkoRnRw96M6nDHO81A6qp/Knj6yV13aMPw10bqlObt2swave Pd7WvuCuhhIQOjHr3C4Oj2FRNER+WHICTc/JEvQ0x5thXHpMqj0zirz4JObnf0EdhZ4N MC4Blu5Iy8jCVD131PkL/PJfAFM4wZ17IbWnn0StFm+sSesMnPS0qKi067Z8uDVcO70J 5GKh3NadJR+WyDUPhrAyTwqyiuJ2BOehTQrjj2ILRGc9zzdve2jD34mGsgmK2jSG18i3 /Luw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=QCPIwFABWJnJLhPfWBq32fDP8cEWDoqmd7r2dT7Fi+s=; b=UQLPqxmbYjpFYLYB0pjanct21u3uEgFSsqCD7DtIZucZbtiUy5tXiT3r+KZ1Ttx7lt VJaq/xU4Ic08pTbeD8ONSDTl0kNakF4vBIZYZYLsIipSP3oXoCKSxs+8cYQEJLmkLgUJ rdS820XEARjrPUjLRpS5behcYov3KjtpxPM90GP0BvM9bAc1yUP0e+HFc4LUKLm99if9 MBrVyb7IwH+FSLehzyoixUAGKfJSjVPnUC3wTpn+GSoYYWD83FAUDT7MzoOpUyTTXKcm 2i/W2uC8bTon18vny1XUJ1Tq4hMX/Gpc2lYhWyhj08Xgtk6i/NZJxuYf0/Rk3+JX45BB m92Q==
X-Gm-Message-State: APjAAAXmIf2ybgViodNFrG8jE+7S5yAsWD/5JXXvUeU6HZ0J0Poh0kR6 vjnFqtGpTY7x3vjsDtE+nCdaFYlUnasnYUU1oBvp2XIz
X-Google-Smtp-Source: APXvYqzlSFRqq/2UcSCYJ4TDN03AQAhfwWPayl/evfbOprSId6vKL3WUihBcvdCw14YjkLrvCAagG6UhiJ8PSsvW1Ls=
X-Received: by 2002:aca:3809:: with SMTP id f9mr332050oia.119.1561575326062; Wed, 26 Jun 2019 11:55:26 -0700 (PDT)
MIME-Version: 1.0
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Date: Wed, 26 Jun 2019 14:55:04 -0400
Message-ID: <CAHbuEH7eHTdbAJsGJ0_A2pSEBFq-3nq8e+5Fqw_JaSaXTh=fTQ@mail.gmail.com>
To: IETF SecDispatch <secdispatch@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000999be5058c3e9602"
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/I_K7v_-bf20YD0Ec57Se9r6IHUM>
Subject: [Secdispatch] Call for Agenda items
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Jun 2019 18:55:33 -0000

--000000000000999be5058c3e9602
Content-Type: text/plain; charset="UTF-8"

Hello,

If you wish to present at SecDispatch in Montreal, please send a message to
the chairs and preferably to the list with the draft link that you plan to
present.

Thank you.

-- 

Best regards,
Kathleen

--000000000000999be5058c3e9602
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hello,<div><br></div><div>If you wish to present at SecDis=
patch in Montreal, please send a message to the chairs and preferably to th=
e list with the draft link that you plan to present.</div><div><br></div><d=
iv>Thank you.<br clear=3D"all"><div><br></div>-- <br><div dir=3D"ltr" class=
=3D"gmail_signature" data-smartmail=3D"gmail_signature"><div dir=3D"ltr"><b=
r><div>Best regards,</div><div>Kathleen</div></div></div></div></div>

--000000000000999be5058c3e9602--


From nobody Fri Jun 28 16:02:04 2019
Return-Path: <agenda@ietf.org>
X-Original-To: secdispatch@ietf.org
Delivered-To: secdispatch@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 5010012030B; Fri, 28 Jun 2019 15:57:57 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: "\"IETF Secretariat\"" <agenda@ietf.org>
To: <Kathleen.Moriarty.ietf@gmail.com>, <secdispatch-chairs@ietf.org>
Cc: rdd@cert.org, secdispatch@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.98.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <156176267731.11015.11411331506584066253.idtracker@ietfa.amsl.com>
Date: Fri, 28 Jun 2019 15:57:57 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/secdispatch/9U94kfwOv7p9rCBtX0bKgRkpqzw>
Subject: [Secdispatch] secdispatch - Requested session has been scheduled for IETF 105
X-BeenThere: secdispatch@ietf.org
X-Mailman-Version: 2.1.29
List-Id: Security Dispatch <secdispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/secdispatch/>
List-Post: <mailto:secdispatch@ietf.org>
List-Help: <mailto:secdispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/secdispatch>, <mailto:secdispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 28 Jun 2019 22:58:11 -0000

Dear Kathleen Moriarty,

The session(s) that you have requested have been scheduled.
Below is the scheduled session information followed by
the original request. 


    secdispatch Session 1 (2:00 requested)
    Monday, 22 July 2019, Afternoon Session I 1330-1530
    Room Name: Place du Canada size: 300
    ---------------------------------------------


iCalendar: https://datatracker.ietf.org/meeting/105/sessions/secdispatch.ics

Request Information:


---------------------------------------------------------
Working Group Name: Security Dispatch
Area Name: Security Area
Session Requester: Kathleen Moriarty

Number of Sessions: 1
Length of Session(s):  2 Hours
Number of Attendees: 200
Conflicts to Avoid: 
 First Priority: saag dispatch ace acme cose curdle dots i2nsf ipsecme lamps mile oauth rats sacm secevent suit teep tls tokbind
 Second Priority: httpbis rtcweb



People who must be present:
  Kathleen Moriarty
  Roman Danyliw
  Richard Barnes

Resources Requested:

Special Requests:
  I may have missed listing some WGs that Richard chairs not knowing his full list, please include those as conflicts.

---------------------------------------------------------

