
From scott.mansfield@ericsson.com  Mon Oct 14 06:29:42 2013
Return-Path: <scott.mansfield@ericsson.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA79F21F9D94 for <saag@ietfa.amsl.com>; Mon, 14 Oct 2013 06:29:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=-0.001, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EEzpWIz5lo5A for <saag@ietfa.amsl.com>; Mon, 14 Oct 2013 06:29:37 -0700 (PDT)
Received: from usevmg21.ericsson.net (usevmg21.ericsson.net [198.24.6.65]) by ietfa.amsl.com (Postfix) with ESMTP id 83ADB21F9AD2 for <saag@ietf.org>; Mon, 14 Oct 2013 06:28:56 -0700 (PDT)
X-AuditID: c6180641-b7fe28e000000d82-f3-525bf1938933
Received: from EUSAAHC008.ericsson.se (Unknown_Domain [147.117.188.96]) by usevmg21.ericsson.net (Symantec Mail Security) with SMTP id 25.ED.03458.491FB525; Mon, 14 Oct 2013 15:28:52 +0200 (CEST)
Received: from EUSAAMB105.ericsson.se ([147.117.188.122]) by EUSAAHC008.ericsson.se ([147.117.188.96]) with mapi id 14.02.0328.009; Mon, 14 Oct 2013 09:28:51 -0400
From: Scott Mansfield <scott.mansfield@ericsson.com>
To: "saag@ietf.org" <saag@ietf.org>
Thread-Topic: Approval of ITU-T X.ipv6-secguide
Thread-Index: Ac7I4VAtnICuhieZQXiXIaGpvoqwlQ==
Date: Mon, 14 Oct 2013 13:28:50 +0000
Message-ID: <EF35EE4B92789843B1DECBC0E245586411ADEE34@eusaamb105.ericsson.se>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [147.117.188.134]
Content-Type: multipart/alternative; boundary="_000_EF35EE4B92789843B1DECBC0E245586411ADEE34eusaamb105erics_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFtrOLMWRmVeSWpSXmKPExsUyuXRPgu6Uj9FBBsceilpM6e9kcmD0WLLk J1MAYxSXTUpqTmZZapG+XQJXxrtdP5gKlstVbH97mbmB8YNUFyMnh4SAicThz0/YIGwxiQv3 1gPZXBxCAkcZJS4/P8IE4SxnlOie2c0EUsUG1LF113RGEFtEQFli+Z/n7CC2sICWxITtz9gg 4voSqxZ+Yoew9SSu/boEFmcRUJX4N3E3UC8HB6+Ar8Sr674gYUagxd9PrQEbzywgLnHryXwm iIMEJJbsOc8MYYtKvHz8jxXCVpZY8mQ/C0R9vsSX1u9g5/AKCEqcnPmEZQKj0Cwko2YhKZuF pAwiriOxYPcnNghbW2LZwtfMMPaZA4+ZkMUXMLKvYuQoLU4ty003MtzECAz8YxJsjjsYF3yy PMQozcGiJM775a1zkJBAemJJanZqakFqUXxRaU5q8SFGJg5OqQbGuTUnT3D+73J6aXbb2G3b 1RK3onurT3fe5dv0ul9ccQnPmg9vog4FFK5PTV9R+OBd0ROZqFnbjJevE211mhaQX3HhhsS+ t2X/Hd5vumBUltnxf4vR7nCLHTcdUn7khbqyLF+ZdWr6VJZuef4tP0/3x12Xv1hutvCexbqT dnPSmHX4o8M9ONYrKrEUZyQaajEXFScCAKvBj1FKAgAA
Subject: [saag] Approval of ITU-T X.ipv6-secguide
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Oct 2013 13:29:43 -0000

--_000_EF35EE4B92789843B1DECBC0E245586411ADEE34eusaamb105erics_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable


I received an announcement that X.1037 is now considered approved.  There w=
ere no comments received during the Additional Review period.  The public a=
nnouncement will go out on 16 October.

http://www.itu.int/itu-t/workprog/wp_item.aspx?isn=3D9421

Even though the text is approved, the final publication of the document has=
 not been released yet.  The text was liaised to the IETF on 7 May see (htt=
ps://datatracker.ietf.org/liaison/1255/ ).

Regards,
-scott.


Scott Mansfield
Ericsson Inc.
+1 724 931 9316


--_000_EF35EE4B92789843B1DECBC0E245586411ADEE34eusaamb105erics_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" xmlns:m=3D"http://schema=
s.microsoft.com/office/2004/12/omml" xmlns=3D"http://www.w3.org/TR/REC-html=
40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I received an announcement that X.1037 is now consid=
ered approved.&nbsp; There were no comments received during the Additional =
Review period.&nbsp; The public announcement will go out on 16 October.<o:p=
></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><a href=3D"http://www.itu.int/itu-t/workprog/wp_item=
.aspx?isn=3D9421">http://www.itu.int/itu-t/workprog/wp_item.aspx?isn=3D9421=
</a><o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Even though the text is approved, the final publicat=
ion of the document has not been released yet.&nbsp; The text was liaised t=
o the IETF on 7 May see (<a href=3D"https://datatracker.ietf.org/liaison/12=
55/">https://datatracker.ietf.org/liaison/1255/</a>
 ). <o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Regards,<o:p></o:p></p>
<p class=3D"MsoNormal">-scott.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Scott Mansfield<o:p></o:p></p>
<p class=3D"MsoNormal">Ericsson Inc.<o:p></o:p></p>
<p class=3D"MsoNormal">&#43;1 724 931 9316<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_EF35EE4B92789843B1DECBC0E245586411ADEE34eusaamb105erics_--

From scott.mansfield@ericsson.com  Mon Oct 14 07:09:48 2013
Return-Path: <scott.mansfield@ericsson.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D1DD021F94FF for <saag@ietfa.amsl.com>; Mon, 14 Oct 2013 07:09:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.598
X-Spam-Level: 
X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I8U0EsrdLmqQ for <saag@ietfa.amsl.com>; Mon, 14 Oct 2013 07:09:39 -0700 (PDT)
Received: from usevmg20.ericsson.net (usevmg20.ericsson.net [198.24.6.45]) by ietfa.amsl.com (Postfix) with ESMTP id 8CEC921F83EF for <saag@ietf.org>; Mon, 14 Oct 2013 07:09:39 -0700 (PDT)
X-AuditID: c618062d-b7fda8e0000024c6-27-525bfb22a4c3
Received: from EUSAAHC005.ericsson.se (Unknown_Domain [147.117.188.87]) by usevmg20.ericsson.net (Symantec Mail Security) with SMTP id CB.71.09414.22BFB525; Mon, 14 Oct 2013 16:09:38 +0200 (CEST)
Received: from EUSAAMB105.ericsson.se ([147.117.188.122]) by EUSAAHC005.ericsson.se ([147.117.188.87]) with mapi id 14.02.0328.009; Mon, 14 Oct 2013 10:09:37 -0400
From: Scott Mansfield <scott.mansfield@ericsson.com>
To: "saag@ietf.org" <saag@ietf.org>
Thread-Topic: X.csi (Guideline for cybersecurity index)
Thread-Index: Ac7I5wErXWxqgAALTAWeArFPeDKnDA==
Date: Mon, 14 Oct 2013 14:09:36 +0000
Message-ID: <EF35EE4B92789843B1DECBC0E245586411ADEFAA@eusaamb105.ericsson.se>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [147.117.188.134]
Content-Type: multipart/alternative; boundary="_000_EF35EE4B92789843B1DECBC0E245586411ADEFAAeusaamb105erics_"
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFtrOLMWRmVeSWpSXmKPExsUyuXRPuK7S7+ggg/l9uhZT+juZHBg9liz5 yRTAGMVlk5Kak1mWWqRvl8CV8eItW8Eu8YrJK/awNjC+Fuli5OSQEDCR+Nr3jQ3CFpO4cG89 kM3FISRwlFFiWu8edghnOaPE+85edpAqNqCOrbumM4LYIgLKEsv/PAeLCwsYSUxZeJwNIm4u seD7fqgaPYnv54+ygNgsAqoSuydOA6vnFfCVmPh0IVicEWjz91NrmEBsZgFxiVtP5jNBXCQg sWTPeWYIW1Ti5eN/rBC2ssSSJ/tZIOrzJba+WM0MMVNQ4uTMJywTGIVmIRk1C0nZLCRlEHEd iQW7P7FB2NoSyxa+Zoaxzxx4zIQsvoCRfRUjR2lxalluupHBJkZg4B+TYNPdwbjnpeUhRmkO FiVx3i9vnYOEBNITS1KzU1MLUovii0pzUosPMTJxcEo1MEZesJ/FuzX8yjyhqDfqk1++f9Vl 9bG0devfJUtl9Nrmify6cLv00Z2NPf6LZc/kPbD45PxCJMnCx7Nh1fs/36RuuwUJeG0/FNIx 9fCK3tf3nSR3Pt9/Lmpl7N2Hcw8fUY7lfOKwond1qP7a9eqsIuF199+oCR2XzD045fbezk9d f33bag/+zNNRYinOSDTUYi4qTgQAy0ZZNEoCAAA=
Subject: [saag] X.csi (Guideline for cybersecurity index)
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Oct 2013 14:09:49 -0000

--_000_EF35EE4B92789843B1DECBC0E245586411ADEFAAeusaamb105erics_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

X.1208 (X.csi) was not approved at the last ITU-T SG17 meeting.  Two Member=
 States (Countries) objected.  I will provide more details once the meeting=
 report is available.

Regards,
-scott.



Scott Mansfield
Ericsson Inc.
+1 724 931 9316


--_000_EF35EE4B92789843B1DECBC0E245586411ADEFAAeusaamb105erics_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:x=3D"urn:schemas-microsoft-com:office:excel" xmlns:m=3D"http://schema=
s.microsoft.com/office/2004/12/omml" xmlns=3D"http://www.w3.org/TR/REC-html=
40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">X.1208 (X.csi) was not approved at the last ITU-T SG=
17 meeting.&nbsp; Two Member States (Countries) objected.&nbsp; I will prov=
ide more details once the meeting report is available.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Regards,<o:p></o:p></p>
<p class=3D"MsoNormal">-scott.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Scott Mansfield<o:p></o:p></p>
<p class=3D"MsoNormal">Ericsson Inc.<o:p></o:p></p>
<p class=3D"MsoNormal">&#43;1 724 931 9316<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_EF35EE4B92789843B1DECBC0E245586411ADEFAAeusaamb105erics_--

From ogud@ogud.com  Tue Oct 15 05:53:49 2013
Return-Path: <ogud@ogud.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A42E511E81ED for <saag@ietfa.amsl.com>; Tue, 15 Oct 2013 05:53:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.437
X-Spam-Level: 
X-Spam-Status: No, score=-102.437 tagged_above=-999 required=5 tests=[AWL=0.161, BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FXakdsiytv-z for <saag@ietfa.amsl.com>; Tue, 15 Oct 2013 05:53:45 -0700 (PDT)
Received: from smtp96.ord1c.emailsrvr.com (smtp96.ord1c.emailsrvr.com [108.166.43.96]) by ietfa.amsl.com (Postfix) with ESMTP id C3ACB11E81E9 for <saag@ietf.org>; Tue, 15 Oct 2013 05:53:44 -0700 (PDT)
Received: from localhost (localhost.localdomain [127.0.0.1]) by smtp5.relay.ord1c.emailsrvr.com (SMTP Server) with ESMTP id 68AAD1B06FA for <saag@ietf.org>; Tue, 15 Oct 2013 08:53:44 -0400 (EDT)
X-Virus-Scanned: OK
Received: by smtp5.relay.ord1c.emailsrvr.com (Authenticated sender: ogud-AT-ogud.com) with ESMTPSA id 352C51B0296 for <saag@ietf.org>; Tue, 15 Oct 2013 08:53:44 -0400 (EDT)
From: Olafur Gudmundsson <ogud@ogud.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_8DBEB0F6-9587-4412-A1EF-DF204E75543E"
Message-Id: <C7BC653E-E82D-43B0-A070-38FDF7496C89@ogud.com>
Date: Tue, 15 Oct 2013 08:53:46 -0400
To: saag@ietf.org
Mime-Version: 1.0 (Mac OS X Mail 6.6 \(1510\))
X-Mailer: Apple Mail (2.1510)
X-Mailman-Approved-At: Tue, 15 Oct 2013 08:02:04 -0700
Subject: [saag] Nominations for IESG wanted
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Oct 2013 12:53:49 -0000

--Apple-Mail=_8DBEB0F6-9587-4412-A1EF-DF204E75543E
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii


Please look around and think about who you think might be a good =
candidate for IESG.=20
Nomcom needs more qualified candidates in many area's.=20
In particular think about candidates that would increase diversity

	Olafur (nomcom member)=20

-------
Nominations for the IESG, IAB, and IAOC are due to the Nomcom by Friday, =
18 October, 2013.

Is there someone you work with at IETF who has leadership potential and =
a growing track record? Please read the Nomcom call for nominations and =
consider nominating her or him. Or several folks! Deadline for =
nominations is October 18.  Nominate soon to give your nominee(s) plenty =
time to fill in the questionnaire. Information about the desired =
expertise for positions is here:=20
          https://datatracker.ietf.org/nomcom/2013/expertise

Lots more, including which positions are open, how to make a nomination, =
and how to=20
send us your feedback on the desired expertise, follows.

IETFers, let's hear from you!  Make nominations, accept nominations!

If you have any questions about the process, feel free to get in touch =
with me.

Best regards,

Allison for the Nomcom

Allison Mankin=20
Nomcom Chair 2013-14

----- The Info You Need for Nominating -----

The 2013-14 Nominating Committee (Nomcom) is seeking nominations
from now until October 18, 2013. The open positions being considered
by this year's Nomcom can be found later in this section, and also on
this year's Nomcom website:=20

https://datatracker.ietf.org/nomcom/2013/

Nominations may be made by selecting the Nominate link at the top of
the Nomcom 2013 home page, or by visiting the following URL:=20

https://datatracker.ietf.org/nomcom/2013/nominate/

Note that nominations made using the web tool require an ietf.org=20
datatracker account. You can create a datatracker ietf.org account=20
if you don't have one already by visiting the following URL:

https://datatracker.ietf.org/accounts/create/

Nominations may also be made by email to nomcom13 at ietf.org.
If you nominate by email, please include the word "Nominate" in the =
Subject
and indicate in the email who is being nominated, their email address =
(to
confirm acceptance of the nomination), and the position for which you
are making the nomination. If you use email, please use a separate email =
for
each person you nominate, and for each position (if you are nominating =
one
person for multiple positions).

Self-nomination is welcome!  No need to be shy.

Nomcom 2013-14 will follow the policy for "Open Disclosure of Willing
Nominees" described in RFC 5680.  As stated in RFC 5680: "The list of
nominees willing to be considered for positions under review in the
current Nomcom cycle is not confidential". Willing nominees for each
position will be listed in a publicly accessible way - anyone with a
datatracker account may access the lists.  In all other ways, the=20
confidentiality requirements of RFC 3777/BCP10 remain in effect.  All
feedback and all Nomcom deliberations will remain confidential and will
not be disclosed. =20

In order to ensure time to collect sufficient community feedback about
each of the willing nominees, nominations must be received by the=20
Nomcom on or before October 18, 2013.  Please submit your nominations =20=

as early as possible for the sake of your nominees, as we've set the=20
questionnaire submission deadline for October 25, 2013.

The list of people and posts whose terms end with the March 2014 IETF =
meeting,=20
and thus the positions for which we are accepting nominations: =20

IAOC
Chris Griffiths

IAB
Bernard Aboba
Marc Blanchet
Ross Callon
Eliot Lear
Hannes Tschofenig

IESG
Barry Leiba (Applications)
Brian Haberman (Internet)
Benoit Claise (Operations and Management)
Gonzalo Camarillo (RAI)
Stewart Bryant (Routing)
Sean Turner (Security)
Martin Stiemerling (Transport)

Please be resourceful in identifying possible candidates for these
positions, as developing our talent is a very crucial requirement for
the IETF.  Also, please give serious consideration to accepting =
nominations
you receive. =20

The summaries of the desired expertise for the positions, developed by =
the=20
respective bodies, are found at:

https://datatracker.ietf.org/nomcom/2013/expertise/

In addition to nominations, the Nomcom seeks community input on=20
the positions themselves.  We need and welcome the community's=20
views and input on the jobs within each organization. If you=20
have ideas on the positions' responsibilities (more, less,=20
different), please let us know.  You can send us email about this to
nomcom13 at ietf.org, and we will use this feedback actively.

Thank you for your help in nominating a great pool of strong and =
interesting
nominees!


--Apple-Mail=_8DBEB0F6-9587-4412-A1EF-DF204E75543E
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; =
"><div><br></div><div><div>Please look around and think about who you =
think might be a good candidate for IESG.&nbsp;</div><div>Nomcom needs =
more qualified candidates in many area's.&nbsp;</div><div>In particular =
think about candidates that would increase =
diversity</div><div><br></div><div><span class=3D"Apple-tab-span" =
style=3D"white-space: pre; ">	</span>Olafur (nomcom =
member)&nbsp;</div><div><br></div><div>-------</div><div>Nominations for =
the IESG, IAB, and IAOC are due to the Nomcom by Friday, 18 October, =
2013.<br><br>Is there someone you work with at IETF who has leadership =
potential and a growing track record? Please read the Nomcom call for =
nominations and consider nominating her or him. Or several folks! =
Deadline for nominations is October 18. &nbsp;Nominate soon to give your =
nominee(s) plenty time to fill in the questionnaire. Information about =
the desired expertise for positions is =
here:&nbsp;<br>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;<a =
href=3D"https://datatracker.ietf.org/nomcom/2013/expertise">https://datatr=
acker.ietf.org/nomcom/2013/expertise</a><br><br>Lots more, including =
which positions are open, how to make a nomination, and how =
to&nbsp;<br>send us your feedback on the desired expertise, =
follows.<br><br>IETFers, let's hear from you! &nbsp;Make nominations, =
accept nominations!<br><br>If you have any questions about the process, =
feel free to get in touch with me.<br><br>Best regards,<br><br>Allison =
for the Nomcom<br><br>Allison Mankin&nbsp;<br>Nomcom Chair =
2013-14<br><br>----- The Info You Need for Nominating -----<br><br>The =
2013-14 Nominating Committee (Nomcom) is seeking nominations<br>from now =
until October 18, 2013. The open positions being considered<br>by this =
year's Nomcom can be found later in this section, and also on<br>this =
year's Nomcom website:&nbsp;<br><br><a =
href=3D"https://datatracker.ietf.org/nomcom/2013/">https://datatracker.iet=
f.org/nomcom/2013/</a><br><br>Nominations may be made by selecting the =
Nominate link at the top of<br>the Nomcom 2013 home page, or by visiting =
the following URL:&nbsp;<br><br><a =
href=3D"https://datatracker.ietf.org/nomcom/2013/nominate/">https://datatr=
acker.ietf.org/nomcom/2013/nominate/</a><br><br>Note that nominations =
made using the web tool require an&nbsp;<a =
href=3D"http://ietf.org/">ietf.org</a>&nbsp;<br>datatracker account. You =
can create a datatracker&nbsp;<a =
href=3D"http://ietf.org/">ietf.org</a>&nbsp;account&nbsp;<br>if you =
don't have one already by visiting the following URL:<br><br><a =
href=3D"https://datatracker.ietf.org/accounts/create/">https://datatracker=
.ietf.org/accounts/create/</a><br><br>Nominations may also be made by =
email to nomcom13 at&nbsp;<a href=3D"http://ietf.org/">ietf.org</a>.<br>If=
 you nominate by email, please include the word "Nominate" in the =
Subject<br>and indicate in the email who is being nominated, their email =
address (to<br>confirm acceptance of the nomination), and the position =
for which you<br>are making the nomination. If you use email, please use =
a separate email for<br>each person you nominate, and for each position =
(if you are nominating one<br>person for multiple =
positions).<br><br>Self-nomination is welcome! &nbsp;No need to be =
shy.<br><br>Nomcom 2013-14 will follow the policy for "Open Disclosure =
of Willing<br>Nominees" described in RFC 5680. &nbsp;As stated in RFC =
5680: "The list of<br>nominees willing to be considered for positions =
under review in the<br>current Nomcom cycle is not confidential". =
Willing nominees for each<br>position will be listed in a publicly =
accessible way - anyone with a<br>datatracker account may access the =
lists. &nbsp;In all other ways, the&nbsp;<br>confidentiality =
requirements of RFC 3777/BCP10 remain in effect. &nbsp;All<br>feedback =
and all Nomcom deliberations will remain confidential and will<br>not be =
disclosed. &nbsp;<br><br>In order to ensure time to collect sufficient =
community feedback about<br>each of the willing nominees, nominations =
must be received by the&nbsp;<br>Nomcom on or before October 18, 2013. =
&nbsp;Please submit your nominations &nbsp;<br>as early as possible for =
the sake of your nominees, as we've set the&nbsp;<br>questionnaire =
submission deadline for October 25, 2013.<br><br>The list of people and =
posts whose terms end with the March 2014 IETF meeting,&nbsp;<br>and =
thus the positions for which we are accepting nominations: =
&nbsp;<br><br>IAOC<br>Chris Griffiths<br><br>IAB<br>Bernard =
Aboba<br>Marc Blanchet<br>Ross Callon<br>Eliot Lear<br>Hannes =
Tschofenig<br><br>IESG<br>Barry Leiba (Applications)<br>Brian Haberman =
(Internet)<br>Benoit Claise (Operations and Management)<br>Gonzalo =
Camarillo (RAI)<br>Stewart Bryant (Routing)<br>Sean Turner =
(Security)<br>Martin Stiemerling (Transport)<br><br>Please be =
resourceful in identifying possible candidates for these<br>positions, =
as developing our talent is a very crucial requirement for<br>the IETF. =
&nbsp;Also, please give serious consideration to accepting =
nominations<br>you receive. &nbsp;<br><br>The summaries of the desired =
expertise for the positions, developed by the&nbsp;<br>respective =
bodies, are found at:<br><br><a =
href=3D"https://datatracker.ietf.org/nomcom/2013/expertise/">https://datat=
racker.ietf.org/nomcom/2013/expertise/</a><br><br>In addition to =
nominations, the Nomcom seeks community input on&nbsp;<br>the positions =
themselves. &nbsp;We need and welcome the community's&nbsp;<br>views and =
input on the jobs within each organization. If you&nbsp;<br>have ideas =
on the positions' responsibilities (more, less,&nbsp;<br>different), =
please let us know. &nbsp;You can send us email about this =
to<br>nomcom13 at&nbsp;<a href=3D"http://ietf.org/">ietf.org</a>, and we =
will use this feedback actively.<br><br>Thank you for your help in =
nominating a great pool of strong and =
interesting<br>nominees!<br><br></div></div></body></html>=

--Apple-Mail=_8DBEB0F6-9587-4412-A1EF-DF204E75543E--

From weihaw@google.com  Tue Oct 15 22:26:58 2013
Return-Path: <weihaw@google.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 95C1821F9FBA for <saag@ietfa.amsl.com>; Tue, 15 Oct 2013 22:26:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.977
X-Spam-Level: 
X-Spam-Status: No, score=-1.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jeyxG2mopmdA for <saag@ietfa.amsl.com>; Tue, 15 Oct 2013 22:26:58 -0700 (PDT)
Received: from mail-qe0-x235.google.com (mail-qe0-x235.google.com [IPv6:2607:f8b0:400d:c02::235]) by ietfa.amsl.com (Postfix) with ESMTP id 7E3F911E80D9 for <saag@ietf.org>; Tue, 15 Oct 2013 22:26:54 -0700 (PDT)
Received: by mail-qe0-f53.google.com with SMTP id cy11so214249qeb.12 for <saag@ietf.org>; Tue, 15 Oct 2013 22:26:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:from:date:message-id:subject:to:content-type; bh=OxFHgUNHgPFL7bl1SH2eFrqlLUVae8FnYijG4T3Iw68=; b=QXhBVQ3R4ULSK8VGYrCm0v97legVWSj52NQ/tzWKk+zihuBzakRTNdq3smLW4MCjQO nWu0k5+1UXvRyV61DIT3Sxv+COdfwd3Lfl++SMJM7VFIDQf28ZL+ey6PmY4v+vaWBaIk E9HlWyBE3UAgHPrudBLetR1To1L/ilmkfkYn4HOaNj9KBx37Ek4ZJn+hFKYIamcwU30d UNvHIxn3fnQF709CgpNA0qA7vcrrHlCAeTgixIapXt9rb/90uM+QoMBUc4u7MWlQRNq4 fpKYlOlfTvaEm/QnDH8cgYdhGoyMCH9yu/xZuP6xJmTp1odmxQHj8QMH/ytVBRUSivBu ZSeQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:from:date:message-id:subject:to :content-type; bh=OxFHgUNHgPFL7bl1SH2eFrqlLUVae8FnYijG4T3Iw68=; b=k74f2I+KWzyUc6Ar9dz6DcEoB15J/62ljPv9quy6MYGKnV9qKkrQByX5bctnTHj4Ah toYvZfVIxlQmhd+a4MOY6cZnxGy8l68EzCc9eX+FrC9AIcCJy1rUcIIlhExbCJYqA7ty GdMIUHggKyyy2tdk3N9Fr+okfQFPYYCnTcCXLpaDHnbN3lLxMPHdvQtsghOGxGJlpjKm kOiBtYPUTIDVHf1s3kFUtWt3SIUN4CIQ4PnbvUhtoYj5PZAgB8Mnw9bhgTaV9B6Ma6zn wpMO+H3Qov2rQwXYUTf5H2kFB5rcgDhA9SHP6NwupCTh+kKL+to5RT80e8mVRAEVBXZ2 VfXQ==
X-Gm-Message-State: ALoCoQl5GCCyOsscMRIC7IjESwF70OM1xkqqeJ7epWNfpubswQvllaIaV+a5AxPQ/xOVeeBNr46T5D0TIn1WKts6Gm0OiJQEcxEaVKnwDohctWchO9TwT26EGWFAn7AGU+KdH79CTiak2MPKfEd6w2gRswoZhmmpp8DLGQMab96c1c0+GORQkWSr/fRyOF5fYXrI48rHBzWg
X-Received: by 10.49.110.36 with SMTP id hx4mr1072164qeb.93.1381901211679; Tue, 15 Oct 2013 22:26:51 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.229.183.132 with HTTP; Tue, 15 Oct 2013 22:26:31 -0700 (PDT)
From: Wei Chuang <weihaw@google.com>
Date: Tue, 15 Oct 2013 22:26:31 -0700
Message-ID: <CAAFsWK01QBwCuMjvtgXNqD9WY34xsvf00ytadSZTSGPsreAqbg@mail.gmail.com>
To: saag <saag@ietf.org>
Content-Type: multipart/alternative; boundary=047d7bdc94ccd663bc04e8d4f2d5
Subject: [saag] Request for discussion of Mandatory Secure Mail Delivery proposal (draft-wchuang-msmd)
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 16 Oct 2013 05:26:58 -0000

--047d7bdc94ccd663bc04e8d4f2d5
Content-Type: text/plain; charset=ISO-8859-1

Hi saag,

(resend)

Request for discussion (draft-wchuang-msmd) of a proposal to secure mail from
eavesdropping and MitM attacks.  I posted the primary thread to
ietf-smtp@and request that all discussion go to that list
.

Here's the abstract:


   Opportunistic SMTP TLS does not enforce electronic mail delivery
   using TLS leading to potential loss of privacy and security.  We
   propose an optional mail header extension "mandatory-secure-mail-
   delivery:" and SMTP EHLO response extension "MSMD" that indicates
   mail must be delivered privately using TLS and with integrity using
   DKIM, and thereby provide a security guarantee to the user.  When
   mail is sent with the header indicating privacy and integrity and if
   the receiving party does not support this, the mail is instead
   bounced.  To protect the mail after delivery, the destination SMTP
   server must advertise its capabilities as part of the EHLO response,
   and the sender can choose whether the destination is able to honor
   the privacy requirements specified on the mail header.


Link to the proposal here:
http://datatracker.ietf.org/doc/draft-wchuang-msmd/

-Wei

PS Pardon for any IETF formatting or etiquette errors as I'm very new to
the IETF process.

--047d7bdc94ccd663bc04e8d4f2d5
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_quote"><div dir=3D"ltr"><div class=3D"=
gmail_quote"><div dir=3D"ltr">Hi saag,</div><div dir=3D"ltr"><br></div><div=
 dir=3D"ltr">(resend)<br><div><br></div><div>Request for discussion (draft-=
wchuang-msmd) of a proposal to secure mail<span style=3D"font-family:arial,=
sans-serif;font-size:13px">=A0from eavesdropping and MitM attacks. =A0I pos=
ted the primary thread to ietf-smtp@ and request that all discussion go to =
that list</span><span style=3D"font-family:arial,sans-serif">.</span></div>



<div><span style=3D"font-family:arial,sans-serif;font-size:13px"><br></span=
></div><div><span style=3D"font-family:arial,sans-serif;font-size:13px">Her=
e&#39;s the abstract:</span></div><div><pre style=3D"line-height:1.2em;font=
-size:13px;margin-bottom:0px;margin-top:0px">

   Opportunistic SMTP TLS does not enforce electronic mail delivery
   using TLS leading to potential loss of privacy and security.  We
   propose an optional mail header extension &quot;mandatory-secure-mail-
   delivery:&quot; and SMTP EHLO response extension &quot;MSMD&quot; that i=
ndicates
   mail must be delivered privately using TLS and with integrity using
   DKIM, and thereby provide a security guarantee to the user.  When
   mail is sent with the header indicating privacy and integrity and if
   the receiving party does not support this, the mail is instead
   bounced.  To protect the mail after delivery, the destination SMTP
   server must advertise its capabilities as part of the EHLO response,
   and the sender can choose whether the destination is able to honor
   the privacy requirements specified on the mail header.</pre></div><div><=
span style=3D"font-family:arial,sans-serif;font-size:13px"><br></span></div=
><div><span style=3D"font-family:arial,sans-serif;font-size:13px">Link to t=
he proposal here:</span></div>



<div><a href=3D"http://datatracker.ietf.org/doc/draft-wchuang-msmd/" style=
=3D"font-family:arial,sans-serif;font-size:13px" target=3D"_blank">http://d=
atatracker.ietf.org/doc/draft-wchuang-msmd/</a><span class=3D"HOEnZb"><font=
 color=3D"#888888"><span><font color=3D"#888888"><span style=3D"font-family=
:arial,sans-serif;font-size:13px"><br>



</span></font></span></font></span></div><span class=3D"HOEnZb"><font color=
=3D"#888888"><span><font color=3D"#888888"><div><br></div><div><span style=
=3D"font-family:arial,sans-serif;font-size:13px">-Wei</span></div></font></=
span></font></span><div>

<span style=3D"font-family:arial,sans-serif;font-size:13px"><br>
</span></div><div><span style=3D"font-family:arial,sans-serif;font-size:13p=
x">PS Pardon for any IETF formatting or etiquette errors as I&#39;m very ne=
w to the IETF process.</span></div>
</div>
</div><br></div>
</div><br></div>

--047d7bdc94ccd663bc04e8d4f2d5--

From weihaw@google.com  Tue Oct 15 12:35:47 2013
Return-Path: <weihaw@google.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C9B5711E8166 for <saag@ietfa.amsl.com>; Tue, 15 Oct 2013 12:35:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.977
X-Spam-Level: 
X-Spam-Status: No, score=-1.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, NO_RELAYS=-0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hK8lQABljwZq for <saag@ietfa.amsl.com>; Tue, 15 Oct 2013 12:35:47 -0700 (PDT)
Received: from mail-qa0-x22f.google.com (mail-qa0-x22f.google.com [IPv6:2607:f8b0:400d:c00::22f]) by ietfa.amsl.com (Postfix) with ESMTP id DE59D21F9BAB for <saag@ietf.org>; Tue, 15 Oct 2013 12:35:46 -0700 (PDT)
Received: by mail-qa0-f47.google.com with SMTP id k15so3519304qaq.20 for <saag@ietf.org>; Tue, 15 Oct 2013 12:35:46 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:from:date:message-id:subject:to:content-type; bh=XP5Yw9nVKfruYacdmea5P5zIPW1R/BDR8w1kPUeIDqo=; b=RZom+PonusmqhGAhbsJzl5+bRpYG5hQOGvMD20biQ6BrKAVuR2b9AEXkQ7h/VmYOeZ 0AEGDRov8rbjMCeuLw0mHNusDKhjhIXE1Bl2hZmuIEN4foQ71G+S/zi1CcHnv9GWUIj2 uIKTv4/HbilmZhseib2Q9sRCwXj+YWMX0AJ7sPe/93wzZjsULPTz6RGKTYwRPGPR+lpS nCgFUwvGRRBdU5HA+LNaEncEt4J8eIAbufTT3hUhKIx8L7Vz+fMPY+BLxa5X56YLfFj1 8rx9gEd0iak2Sf1j+m2KN4X9Z2vDMdmfUddKkLCbEHTIDh8JMxxqkRF5IJd1+JDmcs0X 388g==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:from:date:message-id:subject:to :content-type; bh=XP5Yw9nVKfruYacdmea5P5zIPW1R/BDR8w1kPUeIDqo=; b=HWE7AMgtHy6AGTHaAwZ910VLKK1Ic3p5jz592UCod7IkJC8DR9HoAGl2ginck3G/9P UwRdhwMHa9iPLfBIDGTIADDIqsHZoNQqUDJ2ZflsMp25O2Z4FPoSR5Mjc0o3JeGZDDaC 1k3X2t6Vq9eIhJVonTl9AaAPbYw4DIbiMMZM9u+ruJ0aa+e0kRQMNAtL3k82nos6tfUT 8x3/P0WvPV3jH0QEoIY/oEdZnjVz1TtihE8EVjzq880mCeHN6HkqAU0/pgwkX19KyoEp +OeLI4vAHkX9ywrqTsxQSwbBAt9ZG0froWMbB1hA8ZXHPhtAwyZsSp+VBJmyONA9f4AE hzcA==
X-Gm-Message-State: ALoCoQnNCaFkHhCsx+f7HxUQlBOlpdZdoGE1iKUI1YNHVtAq0aqyNTjnIDdNDlTHIxRQPpEHXK0H1dPHkuuYtD1w2ra8DKkXkgcKV0juiZjuJ+Vww4C3u4QTYBF8WEh+SUVHDA/oUDuaOeONQYaKkdUr6xDDm4FsEw+hWXdmumfhjtKfA66G7/2sLWeeDcVMfv+S3AyTnVju
X-Received: by 10.224.138.4 with SMTP id y4mr27044589qat.65.1381865746272; Tue, 15 Oct 2013 12:35:46 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.229.183.132 with HTTP; Tue, 15 Oct 2013 12:35:26 -0700 (PDT)
From: Wei Chuang <weihaw@google.com>
Date: Tue, 15 Oct 2013 12:35:26 -0700
Message-ID: <CAAFsWK0n8Xa1zHcU-eD4ngrMA6_5NfCcJa8OuimA=q6gfSkAPw@mail.gmail.com>
To: apps-discuss@ietf.org, saag@ietf.org
Content-Type: multipart/alternative; boundary=001a11c29f4cef29ed04e8ccb059
X-Mailman-Approved-At: Wed, 16 Oct 2013 08:02:50 -0700
Subject: [saag] Request for discussion of Mandatory Secure Mail Delivery proposal (draft-wchuang-msmd)
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 15 Oct 2013 19:38:25 -0000

--001a11c29f4cef29ed04e8ccb059
Content-Type: text/plain; charset=ISO-8859-1

Hi apps-discuss and saag,

Request for discussion (draft-wchuang-msmd) of a proposal to secure mail from
eavesdropping and MitM attacks.  I posted the primary thread to
ietf-smtp@and request that all discussion go to that list
.

Here's the abstract:


   Opportunistic SMTP TLS does not enforce electronic mail delivery
   using TLS leading to potential loss of privacy and security.  We
   propose an optional mail header extension "mandatory-secure-mail-
   delivery:" and SMTP EHLO response extension "MSMD" that indicates
   mail must be delivered privately using TLS and with integrity using
   DKIM, and thereby provide a security guarantee to the user.  When
   mail is sent with the header indicating privacy and integrity and if
   the receiving party does not support this, the mail is instead
   bounced.  To protect the mail after delivery, the destination SMTP
   server must advertise its capabilities as part of the EHLO response,
   and the sender can choose whether the destination is able to honor
   the privacy requirements specified on the mail header.


Link to the proposal here:
http://datatracker.ietf.org/doc/draft-wchuang-msmd/

-Wei

PS Pardon for any IETF formatting or etiquette errors as I'm very new to
the IETF process.

--001a11c29f4cef29ed04e8ccb059
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_quote"><div dir=3D"ltr">Hi apps-discus=
s and saag,<div><br></div><div>Request for discussion (draft-wchuang-msmd) =
of a proposal to secure mail<span style=3D"font-family:arial,sans-serif;fon=
t-size:13px">=A0from eavesdropping and MitM attacks. =A0I posted the primar=
y thread to ietf-smtp@ and request that all discussion go to that list</spa=
n><span style=3D"font-family:arial,sans-serif">.</span></div>


<div><span style=3D"font-family:arial,sans-serif;font-size:13px"><br></span=
></div><div><span style=3D"font-family:arial,sans-serif;font-size:13px">Her=
e&#39;s the abstract:</span></div><div><pre style=3D"line-height:1.2em;font=
-size:13px;margin-bottom:0px;margin-top:0px">

   Opportunistic SMTP TLS does not enforce electronic mail delivery
   using TLS leading to potential loss of privacy and security.  We
   propose an optional mail header extension &quot;mandatory-secure-mail-
   delivery:&quot; and SMTP EHLO response extension &quot;MSMD&quot; that i=
ndicates
   mail must be delivered privately using TLS and with integrity using
   DKIM, and thereby provide a security guarantee to the user.  When
   mail is sent with the header indicating privacy and integrity and if
   the receiving party does not support this, the mail is instead
   bounced.  To protect the mail after delivery, the destination SMTP
   server must advertise its capabilities as part of the EHLO response,
   and the sender can choose whether the destination is able to honor
   the privacy requirements specified on the mail header.</pre></div><div><=
span style=3D"font-family:arial,sans-serif;font-size:13px"><br></span></div=
><div><span style=3D"font-family:arial,sans-serif;font-size:13px">Link to t=
he proposal here:</span></div>


<div><a href=3D"http://datatracker.ietf.org/doc/draft-wchuang-msmd/" style=
=3D"font-family:arial,sans-serif;font-size:13px" target=3D"_blank">http://d=
atatracker.ietf.org/doc/draft-wchuang-msmd/</a><span class=3D"HOEnZb"><font=
 color=3D"#888888"><span style=3D"font-family:arial,sans-serif;font-size:13=
px"><br>


</span></font></span></div><span class=3D"HOEnZb"><font color=3D"#888888"><=
div><br></div><div><span style=3D"font-family:arial,sans-serif;font-size:13=
px">-Wei</span></div></font></span><div><span style=3D"font-family:arial,sa=
ns-serif;font-size:13px"><br>

</span></div><div><span style=3D"font-family:arial,sans-serif;font-size:13p=
x">PS Pardon for any IETF formatting or etiquette errors as I&#39;m very ne=
w to the IETF process.</span></div>
</div>
</div><br></div>

--001a11c29f4cef29ed04e8ccb059--

From wmills@yahoo-inc.com  Thu Oct 17 11:33:55 2013
Return-Path: <wmills@yahoo-inc.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 94B8011E82AF for <saag@ietfa.amsl.com>; Thu, 17 Oct 2013 11:33:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -18.598
X-Spam-Level: 
X-Spam-Status: No, score=-18.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, USER_IN_DEF_WHITELIST=-15]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ylrUn9QO4jv9 for <saag@ietfa.amsl.com>; Thu, 17 Oct 2013 11:33:51 -0700 (PDT)
Received: from mrout1.yahoo.com (mrout1.yahoo.com [216.145.54.171]) by ietfa.amsl.com (Postfix) with ESMTP id EB83611E8191 for <saag@ietf.org>; Thu, 17 Oct 2013 11:33:50 -0700 (PDT)
Received: from BF1-EX10-CAHT08.y.corp.yahoo.com (bf1-ex10-caht08.corp.bf1.yahoo.com [10.74.209.196]) by mrout1.yahoo.com (8.14.4/8.14.4/y.out) with ESMTP id r9HIWuEL027086 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL) for <saag@ietf.org>; Thu, 17 Oct 2013 11:32:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=yahoo-inc.com; s=cobra; t=1382034778; bh=k6ChyKBeCWOB7C3hWWuK6KE9vA8hBqcKCRWL1Ov5msU=; h=References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To: MIME-Version:Content-Type; b=S9pKgfRoSauotSDnq3cAPppbc1b9hq9vga8728p9Lg6Ti8sszKayilDDiqloV0/sq 6dC6qKNLqm2He9qGTWBfR0XqutxGcPi4y7AzhQUwLG+wPSWcOHa/N88kumwVg6zmg7 TTGHolbz1kBTYvIFDU6h9GEipG5l5iiUkgDSG+uA=
Received: from omp1073.mail.ne1.yahoo.com (98.138.101.162) by BF1-EX10-CAHT08.y.corp.yahoo.com (10.74.209.170) with Microsoft SMTP Server (TLS) id 14.3.158.1; Thu, 17 Oct 2013 14:32:50 -0400
Received: (qmail 41974 invoked by uid 1000); 17 Oct 2013 18:32:55 -0000
Received: (qmail 18563 invoked by uid 60001); 17 Oct 2013 18:32:55 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo-inc.com; s=ginc1024; t=1382034775; bh=faMBVIBnGMkualGNnw89NPu//OAEghZDX1MSieeSIBE=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=T+M33dBmQaiJ0d1VDFuy9Ef/AUoT2ttOHcQia0hfT4LBv23w/rXVt8tKLTyeCgamyiUo4FZ+C/BDksX52k5/h/ZXDELRp1Ybh5W3kKzCH0sMgNofgH6lbumiGuyojF6L7eFXnrPEzY97Bu41t5CdinvsLJOk93Tfu36CYjJTos4=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=ginc1024; d=yahoo-inc.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=chWQO8ql1WDx63Y+wkB6oXTkmZ4/FXsNW1cEHFOZb6IpZZlxt2FjlBTNre+21oqH1QRIwD/ZRNltbf1SN4wG87IkyLMbZauL9Mfuktdy//ez6YzhemvbTK25XQJAfoncHVOGCdMxziGk40izzkHub6akFiliW9ItYrl6IixZxSI=;
X-YMail-OSG: iLC0w2sVM1nojY8jlx3BEKk7krU_F2ZkBeCXKt.AalQQLJb 4h2q905hbVTnX_SAHK6ezGX_chHUB8OzH9ab6vDUdSzhy22F3EgVzn5IXDlR HLOZ4NMod32J.q47HcnukQ8TykSDJ6q2wAD2kEK4QGv163uxQXQl1vOQaX7H maFCi1EHf9vxZHTT8lbsLk6vk8Peu2fpIwWmri6aEoV7iUtUFuEFnR_MsPHC PJrP2otwHytIwy_tiHtAE_1XOOMHjM9Jy7nUdEWxKEKY2furFP_Kvq_Fodza rAFR0IWAuVH3UP2sYuTk3BFuC
Received: from [66.228.162.40] by web125603.mail.ne1.yahoo.com via HTTP; Thu, 17 Oct 2013 11:32:55 PDT
X-Rocket-MIMEInfo: 002.001, MSkgSWYgdGhlIHNlbmRlciB3YW50cyB0byBlbmZvcmNlIHRoaXMgdGhleSBjYW4gc2ltcGx5IHJlZnVzZSB0byBzZW5kIHVubGVzcyBTVEFSVFRMUyBpcyBhdmFpbGFibGU_CgoyKSBIb3cgbyB5b3UgZW5zdXJlIHRoYXQgYWxsIGhvcHMgdG8gdGhlIGRlc3RpbmF0aW9uIGFyZSBjb3ZlcmVkIGJ5IFRMUz8KCsKgCi1iaWxsCgoKCi0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tCldpbGxpYW0gSi4gTWlsbHMKIlBhcmFub2lkIiBZYWhvbyEKCgoKCgpPbiBUdWVzZGF5LCBPY3RvYmVyIDE1LCAyMDEzIDEBMAEBAQE-
X-Mailer: YahooMailWebService/0.8.160.587
References: <CAAFsWK0n8Xa1zHcU-eD4ngrMA6_5NfCcJa8OuimA=q6gfSkAPw@mail.gmail.com>
Message-ID: <1382034775.16463.YahooMailNeo@web125603.mail.ne1.yahoo.com>
Date: Thu, 17 Oct 2013 11:32:55 -0700
From: Bill Mills <wmills@yahoo-inc.com>
To: Wei Chuang <weihaw@google.com>, "apps-discuss@ietf.org" <apps-discuss@ietf.org>, "saag@ietf.org" <saag@ietf.org>
In-Reply-To: <CAAFsWK0n8Xa1zHcU-eD4ngrMA6_5NfCcJa8OuimA=q6gfSkAPw@mail.gmail.com>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="933233344-1249971505-1382034775=:16463"
X-Milter-Version: master.31+4-gbc07cd5+
X-CLX-ID: 034777009
X-Mailman-Approved-At: Fri, 18 Oct 2013 08:04:22 -0700
Subject: Re: [saag] [apps-discuss] Request for discussion of Mandatory Secure Mail	Delivery proposal (draft-wchuang-msmd)
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
Reply-To: Bill Mills <wmills@yahoo-inc.com>
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Oct 2013 18:33:55 -0000

--933233344-1249971505-1382034775=:16463
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

1) If the sender wants to enforce this they can simply refuse to send unles=
s STARTTLS is available?=0A=0A2) How o you ensure that all hops to the dest=
ination are covered by TLS?=0A=0A=A0=0A-bill=0A=0A=0A=0A-------------------=
-------------=0AWilliam J. Mills=0A"Paranoid" Yahoo!=0A=0A=0A=0A=0A=0AOn Tu=
esday, October 15, 2013 12:35 PM, Wei Chuang <weihaw@google.com> wrote:=0A =
=0AHi apps-discuss and saag,=0A=0ARequest for discussion (draft-wchuang-msm=
d) of a proposal to secure mail=A0from eavesdropping and MitM attacks. =A0I=
 posted the primary thread to ietf-smtp@ and request that all discussion go=
 to that list.=0A=0AHere's the abstract:=0AOpportunistic SMTP TLS does not =
enforce electronic mail delivery using TLS leading to potential loss of pri=
vacy and security.  We propose an optional mail header extension "mandatory=
-secure-mail- delivery:" and SMTP EHLO response extension "MSMD" that indic=
ates mail must be delivered privately using TLS and with integrity using DK=
IM, and thereby provide a security guarantee to the user.  When mail is sen=
t with the header indicating privacy and integrity and if the receiving par=
ty does not support this, the mail is instead bounced.  To protect the mail=
 after delivery, the destination SMTP server must advertise its capabilitie=
s as part of the EHLO response, and the sender can choose whether the desti=
nation is able to honor the privacy requirements specified on the mail head=
er.=0A=0ALink to the proposal here:=0Ahttp://datatracker.ietf.org/doc/draft=
-wchuang-msmd/=0A=0A=0A-Wei=0A=0APS Pardon for any IETF formatting or etiqu=
ette errors as I'm very new to the IETF process.=0A=0A_____________________=
__________________________=0Aapps-discuss mailing list=0Aapps-discuss@ietf.=
org=0Ahttps://www.ietf.org/mailman/listinfo/apps-discuss
--933233344-1249971505-1382034775=:16463
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html><body><div style=3D"color:#000; background-color:#fff; font-family:He=
lveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, sans-serif;fo=
nt-size:12pt"><div><span>1) If the sender wants to enforce this they can si=
mply refuse to send unless STARTTLS is available?</span></div><div style=3D=
"color: rgb(0, 0, 0); font-size: 16px; font-family: HelveticaNeue,Helvetica=
 Neue,Helvetica,Arial,Lucida Grande,sans-serif; background-color: transpare=
nt; font-style: normal;"><br><span></span></div><div style=3D"color: rgb(0,=
 0, 0); font-size: 16px; font-family: HelveticaNeue,Helvetica Neue,Helvetic=
a,Arial,Lucida Grande,sans-serif; background-color: transparent; font-style=
: normal;"><span>2) How o you ensure that all hops to the destination are c=
overed by TLS?</span></div><div style=3D"color: rgb(0, 0, 0); font-size: 16=
px; font-family: HelveticaNeue,Helvetica Neue,Helvetica,Arial,Lucida Grande=
,sans-serif; background-color: transparent; font-style:
 normal;"><br><span></span></div><div>&nbsp;</div><div>-bill<br><br><br></d=
iv><div style=3D"font-size:13px;font-family:arial, helvetica, clean, sans-s=
erif;background-color:transparent;font-style:normal;color:rgb(0, 0, 0);">--=
------------------------------<br>William J. Mills<br>"Paranoid" Yahoo!<br>=
</div><div><br></div><div style=3D"display: block;" class=3D"yahoo_quoted">=
 <br> <br> <div style=3D"font-family: HelveticaNeue, Helvetica Neue, Helvet=
ica, Arial, Lucida Grande, sans-serif; font-size: 12pt;"> <div style=3D"fon=
t-family: HelveticaNeue, Helvetica Neue, Helvetica, Arial, Lucida Grande, s=
ans-serif; font-size: 12pt;"> <div dir=3D"ltr"> <font face=3D"Arial" size=
=3D"2"> On Tuesday, October 15, 2013 12:35 PM, Wei Chuang &lt;weihaw@google=
.com&gt; wrote:<br> </font> </div>  <div class=3D"y_msg_container"><div id=
=3D"yiv4048114791"><div dir=3D"ltr"><div class=3D"yiv4048114791gmail_quote"=
><div dir=3D"ltr">Hi apps-discuss and saag,<div><br></div><div>Request for =
discussion
 (draft-wchuang-msmd) of a proposal to secure mail<span style=3D"font-famil=
y:arial, sans-serif;font-size:13px;">&nbsp;from eavesdropping and MitM atta=
cks. &nbsp;I posted the primary thread to ietf-smtp@ and request that all d=
iscussion go to that list</span><span style=3D"font-family:arial, sans-seri=
f;">.</span></div>=0A=0A=0A<div><span style=3D"font-family:arial, sans-seri=
f;font-size:13px;"><br></span></div><div><span style=3D"font-family:arial, =
sans-serif;font-size:13px;">Here's the abstract:</span></div><div><pre styl=
e=3D"line-height:1.2em;font-size:13px;margin-bottom:0px;margin-top:0px;">  =
 Opportunistic SMTP TLS does not enforce electronic mail delivery=0A   usin=
g TLS leading to potential loss of privacy and security.  We=0A   propose a=
n optional mail header extension "mandatory-secure-mail-=0A   delivery:" an=
d SMTP EHLO response extension "MSMD" that indicates=0A   mail must be deli=
vered privately using TLS and with integrity using=0A   DKIM, and thereby p=
rovide a security guarantee to the user.  When=0A   mail is sent with the h=
eader indicating privacy and integrity and if=0A   the receiving party does=
 not support this, the mail is instead=0A   bounced.  To protect the mail a=
fter delivery, the destination SMTP=0A   server must advertise its capabili=
ties as part of the EHLO response,=0A   and the sender can choose whether t=
he destination is able to honor=0A   the privacy requirements specified on =
the mail header.</pre></div><div><span style=3D"font-family:arial, sans-ser=
if;font-size:13px;"><br></span></div><div><span style=3D"font-family:arial,=
 sans-serif;font-size:13px;">Link to the proposal here:</span></div>=0A=0A=
=0A<div><a rel=3D"nofollow" target=3D"_blank" href=3D"http://datatracker.ie=
tf.org/doc/draft-wchuang-msmd/" style=3D"font-family:arial, sans-serif;font=
-size:13px;">http://datatracker.ietf.org/doc/draft-wchuang-msmd/</a><span c=
lass=3D"yiv4048114791HOEnZb"><font color=3D"#888888"><span style=3D"font-fa=
mily:arial, sans-serif;font-size:13px;"><br>=0A=0A=0A</span></font></span><=
/div><span class=3D"yiv4048114791HOEnZb"><font color=3D"#888888"><div><br><=
/div><div><span style=3D"font-family:arial, sans-serif;font-size:13px;">-We=
i</span></div></font></span><div><span style=3D"font-family:arial, sans-ser=
if;font-size:13px;"><br>=0A=0A</span></div><div><span style=3D"font-family:=
arial, sans-serif;font-size:13px;">PS Pardon for any IETF formatting or eti=
quette errors as I'm very new to the IETF process.</span></div>=0A</div>=0A=
</div><br></div></div><br>_______________________________________________<b=
r>apps-discuss mailing list<br><a ymailto=3D"mailto:apps-discuss@ietf.org" =
href=3D"mailto:apps-discuss@ietf.org">apps-discuss@ietf.org</a><br><a href=
=3D"https://www.ietf.org/mailman/listinfo/apps-discuss" target=3D"_blank">h=
ttps://www.ietf.org/mailman/listinfo/apps-discuss</a><br><br><br></div>  </=
div> </div>  </div> </div></body></html>
--933233344-1249971505-1382034775=:16463--

From iesg-secretary@ietf.org  Mon Oct 21 06:04:18 2013
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45DEA11E8512; Mon, 21 Oct 2013 06:04:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.422
X-Spam-Level: 
X-Spam-Status: No, score=-102.422 tagged_above=-999 required=5 tests=[AWL=0.178, BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YoO+T0gYRUYB; Mon, 21 Oct 2013 06:04:17 -0700 (PDT)
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id D8AE411E82DA; Mon, 21 Oct 2013 06:03:40 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: IETF-Announce <ietf-announce@ietf.org>, smime@ietf.org, saag@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 4.80.p3
Auto-Submitted: auto-generated
Precedence: bulk
Sender: <iesg-secretary@ietf.org>
Message-ID: <20131021130340.29482.96263.idtracker@ietfa.amsl.com>
Date: Mon, 21 Oct 2013 06:03:40 -0700
X-Mailman-Approved-At: Mon, 21 Oct 2013 08:02:27 -0700
Subject: [saag] Last Call: <draft-housley-smime-oids-00.txt> (Object Identifier	Registry for the S/MIME Mail Security Working Group) to	Informational RFC
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.12
Reply-To: ietf@ietf.org
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Oct 2013 13:04:18 -0000

The IESG has received a request from an individual submitter to consider
the following document:
- 'Object Identifier Registry for the S/MIME Mail Security Working Group'
  <draft-housley-smime-oids-00.txt> as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits
final comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2013-11-18. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the
beginning of the Subject line to allow automated sorting.

Abstract


   When the S/MIME Mail Security Working Group was chartered, an object
   identifier arc was donated by RSA Data Security for use by that
   working group.  This document describes the object identifiers that
   were assigned in that donated arc, it transfers control of that arc
   to IANA, and it establishes IANA allocation policies for any future
   assignments within that arc.




The file can be obtained via
http://datatracker.ietf.org/doc/draft-housley-smime-oids/

IESG discussion can be tracked via
http://datatracker.ietf.org/doc/draft-housley-smime-oids/ballot/


No IPR declarations have been submitted directly on this I-D.



From kathleen.moriarty@emc.com  Mon Oct 21 10:55:49 2013
Return-Path: <kathleen.moriarty@emc.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EBA5311E8377; Mon, 21 Oct 2013 10:55:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.024
X-Spam-Level: 
X-Spam-Status: No, score=-2.024 tagged_above=-999 required=5 tests=[AWL=0.575,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ddRFF-ftdU0y; Mon, 21 Oct 2013 10:55:30 -0700 (PDT)
Received: from mailuogwdur.emc.com (mailuogwdur.emc.com [128.221.224.79]) by ietfa.amsl.com (Postfix) with ESMTP id 8A6CF11E832C; Mon, 21 Oct 2013 10:55:27 -0700 (PDT)
Received: from maildlpprd54.lss.emc.com (maildlpprd54.lss.emc.com [10.106.48.158]) by mailuogwprd52.lss.emc.com (Sentrion-MTA-4.3.0/Sentrion-MTA-4.3.0) with ESMTP id r9LHtPTV004933 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 21 Oct 2013 13:55:25 -0400
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd52.lss.emc.com r9LHtPTV004933
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=emc.com; s=jan2013; t=1382378125; bh=blsitGAzF5pKhj0VYduguxpQj5A=; h=From:To:Date:Subject:Message-ID:References:In-Reply-To: Content-Type:Content-Transfer-Encoding:MIME-Version; b=lNhOyduR5HsE3uONITOY22orVZ5AJ/qB4UJ81aH6cqJFnAvosU9z0RmXFzCufS89x h8Ht8C0mInBk11i6kqq7H5loo6LnSjBMFw3fDDaOQTWnRMx8bbvuetrh9GiY3IIN6I gOJJIRzy4jzglVGY59o6DbXrts0aGst7iQ13VKqs=
X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd52.lss.emc.com r9LHtPTV004933
Received: from mailusrhubprd01.lss.emc.com (mailusrhubprd01.lss.emc.com [10.253.24.19]) by maildlpprd54.lss.emc.com (RSA Interceptor); Mon, 21 Oct 2013 13:55:15 -0400
Received: from mxhub35.corp.emc.com (mxhub35.corp.emc.com [10.254.93.83]) by mailusrhubprd01.lss.emc.com (Sentrion-MTA-4.3.0/Sentrion-MTA-4.3.0) with ESMTP id r9LHtE8Z027442 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 21 Oct 2013 13:55:14 -0400
Received: from mx15a.corp.emc.com ([169.254.1.46]) by mxhub35.corp.emc.com ([::1]) with mapi; Mon, 21 Oct 2013 13:55:14 -0400
From: "Moriarty, Kathleen" <kathleen.moriarty@emc.com>
To: "perpass@ietf.org" <perpass@ietf.org>, "saag@ietf.org" <saag@ietf.org>
Date: Mon, 21 Oct 2013 13:55:11 -0400
Thread-Topic: New Version Notification - draft-moriarty-pkcs12v1-1-02.txt
Thread-Index: Ac7Ohmeo9EZJYnCeR+6bFr4bHWwQXwAABy7g
Message-ID: <F5063677821E3B4F81ACFB7905573F24049E8BCDCD@MX15A.corp.emc.com>
References: <20131021175237.32469.2938.idtracker@ietfa.amsl.com>
In-Reply-To: <20131021175237.32469.2938.idtracker@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
acceptlanguage: en-US
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Sentrion-Hostname: mailusrhubprd01.lss.emc.com
X-RSA-Classifications: DLM_1, public
Subject: [saag] FW: New Version Notification - draft-moriarty-pkcs12v1-1-02.txt
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Oct 2013 17:55:50 -0000
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=

From Jeff.Hodges@KingsMountain.com  Wed Oct 23 08:28:13 2013
Return-Path: <Jeff.Hodges@KingsMountain.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B2F5011E83CF for <saag@ietfa.amsl.com>; Wed, 23 Oct 2013 08:28:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -95.081
X-Spam-Level: 
X-Spam-Status: No, score=-95.081 tagged_above=-999 required=5 tests=[BAYES_60=1, GB_I_INVITATION=-2, GB_I_LETTER=-2, GB_SUMOF=5, MANGLED_BACK=2.3, RCVD_IN_SORBS_WEB=0.619, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KRgUOuCzYXVh for <saag@ietfa.amsl.com>; Wed, 23 Oct 2013 08:28:09 -0700 (PDT)
Received: from outbound-ss-1194.bluehost.com (outbound-ss-1194.bluehost.com [74.220.211.4]) by ietfa.amsl.com (Postfix) with SMTP id DCC2A11E83F0 for <saag@ietf.org>; Wed, 23 Oct 2013 08:28:08 -0700 (PDT)
Received: (qmail 12725 invoked by uid 0); 23 Oct 2013 15:27:46 -0000
Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by oproxy1.mail.unifiedlayer.com with SMTP; 23 Oct 2013 15:27:45 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default;  h=Content-Transfer-Encoding:Content-Type:Subject:To:MIME-Version:From:Date:Message-ID; bh=IQ35VM01a56YxgL2y3t7z8nvPz9S4zXSa45c77z2VgE=;  b=wQkBkSJ8n1VNnkRqsb/i0vknf9/fOS8nvADgZu5V1TRgliEzFZFnP8j1aGkiuIR7bD0scSfFoIXS6JY5YNzJsFDdgXrxgWqbzggT/W/Bd0ji05kLFpZ8xkKcxMLQTfYg;
Received: from [216.113.168.128] (port=63916 helo=[10.244.137.220]) by box514.bluehost.com with esmtpsa (TLSv1:CAMELLIA256-SHA:256) (Exim 4.80) (envelope-from <Jeff.Hodges@KingsMountain.com>) id 1VZ0LY-0000CZ-U4; Wed, 23 Oct 2013 09:27:45 -0600
Message-ID: <5267EAF2.2000608@KingsMountain.com>
Date: Wed, 23 Oct 2013 08:27:46 -0700
From: =JeffH <Jeff.Hodges@KingsMountain.com>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130330 Thunderbird/17.0.5
MIME-Version: 1.0
To: IETF Security Area Advisory Group <saag@ietf.org>,  perpass <perpass@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 216.113.168.128 authed with jeff.hodges+kingsmountain.com}
Subject: [saag] fyi: Dan Geer: Tradeoffs in Cyber Security [9 October 13, UNCC[
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Oct 2013 15:28:13 -0000

.Tradeoffs in Cyber Security
.Dan Geer, 9 October 13, UNCC
<http://geer.tinho.net/geer.uncc.9x13.txt>

Thank you for the invitation to speak with you today, which, let
me be clear, is me speaking as myself and not for anybody or anything
else.  As you know, I work the cybersecurity trade, and I am gratified
that ten days ago the U.S. National Academy of Sciences, on behalf
of the Department of Homeland Security, concluded that cybersecurity
should be seen as an occupation and not a profession because the
rate of change is too great to consider professionalization.[1]
That rate of change is why cybersecurity is perhaps the most
intellectually demanding occupation on the planet.  In writing this
essay, the breadth of tradeoffs in cyber security and that fundamental
intellectual challenge in those tradeoffs caused me to choose to
narrow my focus to one class of tradeoffs in cyber security rather
than them all; looking at the state of the current world, I decided
to focus on personal data and the government.

I am not yet old in chronologic years when compared to the life
expectancies that obtain in the United States of 2013, but measured
in Internet years I'm an ancient.  Ancient-ness makes it tempting
to just tell stories that begin with "In my day" which, if nothing
else, proves that you are no longer in the century in which you
actually belong.  Stories are good, but as economist Roger Brinner
so succinctly said, "The plural of anecdote is not data."

Except that maybe it, or something like it, is.  In a gathering of
this size you can play a game that I'll just describe rather than
play.  Ask for an audience volunteer willing to answer a mildly
embarrassing question, something as mild as "How many pairs of
never-used underwear do you own?"  Then see if that volunteer will
take a second question, and make it similarly mild such as "Have
you ever had an evil grin while wrapping a birthday gift?"  If you
keep going at this game, the volunteer will become uneasy and no
one will get to the proverbial "twenty questions."  Why?  Because
the subject realizes that you are publicly triangulating them, that
data fusion of even mild, innocuous questions has the effect of
painting a picture.  In this game, the questions cannot be mild
enough to be innocuous in sum.  In point of fact, the more inane
the questions are, the more inane the picture painted becomes.

If you get to pick the questions and the subject is sufficiently
willing to keep answering them, then you can pretty much box in
your subject however you like.  Politicians know that the surest
way to win an argument is, as they say, to "frame the question" by
which they mean painting a picture that their opposition has to
work to overcome.  The better practitioners at the political version
of this game can impose a considerable work factor on their opponents,
one that is not unlike what we here call a denial of service.  Every
time there is a televised debate where some self-important interlocutor
asks a question that is impossible to answer succinctly, and then
gives the candidate sixty seconds of airtime, painting into a corner
by way of selective disclosure is what is happening.

I previously worked for a data protection company.  Our product
was, and I believe still is, the most thorough on the market.  By
"thorough" I mean the dictionary definition, "careful about doing
something in an accurate and exact way."  To this end, installing
our product instrumented every system call on the target machine.
Data did not and could not move in any sense of the word "move"
without detection.  Every data operation was caught and monitored.
It was total surveillance data protection.  Its customers were
companies that don't accept half-measures.  What made this product
stick out was that very thoroughness, but here is the point: Unless
you fully instrument your data handling, it is not possible for you
to say what did not happen.  With total surveillance, and total
surveillance alone, it is possible to treat the absence of evidence
as the evidence of absence.  Only when you know everything that
*did* happen with your data can you say what did *not* happen with
your data.

The alternative to total surveillance of data handling is to answer
more narrow questions, questions like "Can the user steal data with
a USB stick?" or "Does this outbound e-mail have a Social Security
Number in it?"  Answering direct questions is exactly what a defensive
mindset says you must do, and that is "never make the same mistake
twice."  In other words, if someone has lost data because of misuse
of some facility on the computer, then you either disable that
facility or you wrap it in some kind of perimeter.  Lather, rinse,
and repeat.  This extends all the way to such trivial matters as
timer-based screen locking.

The difficulty with the defensive mindset is that it leaves in place
the fundamental strategic asymmetry of cybersecurity, namely that
while the workfactor for the offender is the price of finding a new
method of attack, the workfactor for the defender is the cumulative
cost of forever defending against all attack methods yet discovered.
Over time, the curve for the cost of finding a new attack and the
curve for the cost of defending against all attacks to date cross.
Once those curves cross, the offender never has to worry about being
out of the money.  I believe that that crossing occurred some time
ago.

The total surveillance strategy is, to my mind, an offensive strategy
used for defensive purposes.  It says "I don't know what the
opposition is going to try, so everything is forbidden unless we
know it is good."  In that sense, it is like whitelisting applications.
Taking either the application whitelisting or the total data
surveillance approach is saying "That which is not permitted is
forbidden."

The essential character of a free society is this: That which is
not forbidden is permitted.  The essential character of an unfree
society is the inverse, that which is not permitted is forbidden.
The U.S. began as a free society without question; the weight of
regulation, whether open or implicit, can only push it toward being
unfree.  Under the pressure to defend against offenders with a
permanent structural advantage, defenders who opt for forbidding
anything that is not expressly permitted are encouraging a computing
environment that does not embody the freedom with which we are
heretofore familiar.

This brings us to the larger question.  No one in this room needs
to be told that more and more data is collected and more and more
of that data is in play.  The general dynamics of change are these:
Moore's Law continues to give us two orders of magnitude in compute
power per dollar per decade while storage grows at three orders of
magnitude and bandwidth at four.  These are top-down economic
drivers.  As such, the future is increasingly dense with stored
data but, paradoxically, despite the massive growth of data volume,
that data becomes more mobile with time.

Everyone here knows the terminology "attack surface" and knows that
one of the defender's highest goals is to minimize the attack surface
wherever possible.  Every coder adhering to a security-cognizant
software lifecycle program does this.  Every company or research
group engaged in static analysis of binaries does this.  Every
agency enforcing a need-to-know regime for data access does this.
Every individual who reserves one low-limit credit card for their
Internet purchases does this.  I might otherwise say that any person
who encrypts their e-mail to their closest counterparties does this,
but because consistent e-mail encryption is so rare, encrypting
one's e-mail marks it for collection and indefinite retention by
those entities in a position to do so, regardless of what country
you live in.

Data retention for observable data is growing by legislative fiat
seemingly everywhere.  The narrow logic is sound, namely if data
has passed through your hands then that you retain it has no new
risk for the transmitter and may contain valuable protections against
malfeasance.  In parallel with the game I proposed at the outset,
neither you nor I would be concerned with some entity having access
to one of our transmitted messages, but 1000 of them is a different
story, and all-of-them forever is a different world.

I have not yet said the phrase that is the title of this talk, which
is "Tradeoffs in Cyber Security."  Perhaps you will soon see why
I am slow to do so.  As is frequently noted, in the United States
90+% of the critical infrastructure is in private hands.  With each
passing day Internet-dependent services become more essential to
what I will for the moment call "normal life."  As we have seen,
the Government's response to the growing pervasiveness of Internet
services held in private hands is deputize the owners of those
services against their will.  The entire imbroglio around ISPs, the
NSA, and so forth and so on comes down to that -- if the government
does not itself own the critical infrastructure, those that do own
it can and will be compelled to become government agents.  In the
21st century, we have a physical army of volunteers but a digital
army of conscripts.

At the core of it all there is data.  The great majority of attacks
target data acquisition.  The work of surveillance is, per se,
targeted data acquisition.  There is considerable irony in the
Federal Communications Commission classifying the Internet as an
information service and not as a communications service insofar as
while that may have been a gambit to relieve ISPs of telephone-era
regulation, the value of the Internet is ever more the bits it
carries, not the carriage of those bits.  The FCC decisions are
both several and now old, the FCC classified cable as an information
service in 2002, classified DSL as an information service in 2005,
classified wireless broadband as an information service in 2007,
and classified broadband over power lines as an information service
in 2008.  A decision by the D.C. Circuit Court of Appeals on this
very point is pending as we speak: Is the Internet a telecommunications
service or an information service?

If I ran the zoo, I would call up the ISPs and say

   Hello, Uncle Sam here.

   You can charge whatever you like based on the contents of what
   you are carrying, but you are responsible for that content if it
   is illegal; inspecting brings with it a responsibility for what
   you learn.
    -or-
   You can enjoy common carrier protections at all times, but you
   can neither inspect nor act on the contents of what you are
   carrying and can only charge for carriage itself.  Bits are bits.

   Choose wisely.  No refunds or exchanges at this window.

We humans can design systems more complex than we can then operate.
The financial sector's "flash crashes" are an example of that;
perhaps the fifty interlocked insurance exchanges for Obamacare
will soon be another.  Above some threshold of system complexity,
it is no longer possible to test, it is only possible to react to
emergent behavior.  Even the lowliest Internet user is involved --
one web page can easily touch scores of different domains.  While
writing this, the top level page from cnn.com had 400 out-references
to 85 unique domains each of which is likely to be similarly
constructed and all of which move data one way or another.  If you
leave those pages up and they have an auto-refresh, then moving to
a new network signals to every one of those ad networks that you
have done so.

We have known for some time that traffic analysis is more powerful
than content analysis.  If I know everything about to whom you
communicate including when, where, with what inter-message latency
and at what length, then I know you.  If all I have is the undated,
unaddressed text of your messages, then I am an archaeologist, not
a case officer.  The soothing mendacity of proxies for the President
saying "It's only metadata" relies on the ignorance of the listener.

But this is not an attack on the business of intelligence.  The
Intelligence Community is operating under the rules it knows, most
of which you, too, know, and the goal states it has been tasked to
achieve.  The center of gravity for policy is those goal states.

We all know the truism, that knowledge is power.  We all know that
there is a subtle yet important distinction between information and
knowledge.  We all know that a negative declaration like "X did not
happen" can only proven true if you have the enumeration of
*everything* that did happen and can show that X is not in it.  We
all know that when a President says "Never again" he is asking for
the kind of outcome for which proving a negative, lots of negatives,
is categorically essential.  Proving a negative requires omniscience.
Omniscience requires god-like powers.

Perhaps the point is that the more technologic the society becomes,
the greater the dynamic range of possible failures.  When you live
in a cave, starvation, predators, disease, and lightning are about
the full range of failures that end life as you know it and you are
well familiar with all of them.  When you live in a technologic
society where everybody and everything is optimized in some way
akin to just-in-time delivery, the dynamic range of failures is
incomprehensibly larger and largely incomprehensible.  The wider
the dynamic range of failure, the more prevention is the watchword.
Cadres of people charged with defending masses of other people must
focus on prevention, and prevention is all about proving negatives.
Therefore, one must conclude that as technologic society grows more
interdependent within itself, the more it must rely on prediction
based on data collected in broad ways, not targeted ways.

Spoken of in this manner, intelligence agencies that hoover up
everything are reacting rationally to the demand that they ensure
"Never again" comes true.  Not only that, the more complex the
society they are charged with protecting becomes, the more they
must surveil, the more they must analyze, the more data fusion
becomes their only focus.

Part of the picture is that it is categorically true that technology
is today far more democratically available than it was yesterday
and less than it will be tomorrow.  3D printing, the whole "maker"
community, DIY biology, micro-drones, search, constant contact with
whomever you choose to be in constant contact with -- these are all
examples of democratizing technology.  This is perhaps our last
fundamental tradeoff before the Singularity occurs: Do we, as a
society, want the comfort and convenience of increasingly technologic,
invisible digital integration enough to pay for those benefits with
the liberties that must be given up to be protected from the downsides
of that integration?

This is not a Chicken Little talk, it is an attempt to preserve if
not make a choice while choice is still relevant.  We are ever more
a service economy, but every time an existing service disappears
into the cloud, our vulnerability to its absence increases.  Every
time we ask the government to provide goodnesses that can only be
done with more data, we are asking government to collect more data.
Let me ask a yesterday question: How do you feel about traffic jam
detection based on the handoff rate between cell towers of those
cell phones in use in cars on the road?  Let me ask a today question:
How do you feel about auto insurance that is priced from a daily
readout of your automobile's black box?  Let me ask a tomorrow
question: In what calendar year will compulsory auto insurance be
more expensive for the driver who insists on driving their car
themselves rather than letting a robot do it?  How do you feel about
public health surveillance done by requiring Google and Bing to
report on searches for cold remedies and the like?  How do you feel
about a Smart Grid that reduces your power costs and greens the
atmosphere but reports minute-by-minute what is on and what is off
in your home?  Have you or would you install that toilet that does
a urinalysis with every use?

How do you feel about using standoff biometrics as a solution to
authentication?  At this moment in time, facial recognition is
possible at 500 meters, iris recognition is possible at 50 meters,
and heart-beat recognition is possible at 5 meters.  Your dog can
identify you by smell; so, too, can an electronic dog's nose.  Your
cell phone's accelerometer is plenty sensitive enough to identify
you by gait analysis.  There are 3+ billion new photos online each
month, and even if you've never uploaded photos of yourself someone
else has.  All of these are data dependent, cheap, convenient, and
none of them reveal anything that is a secret as we currently
understand the term "secret" yet the sum of them is greater than
the parts.

Everyone in this room knows how and why passwords are a problem.
At the same time, passwords may be flatly essential for a reason
that requires I read a paragraph from Marcia Hofmann's September
12th piece in Wired[2]

    If the police try to force you to divulge the combination to a
    wall safe, your response would reveal the contents of your mind
    and so would implicate the Fifth Amendment.  (If you've written
    down the combination on a piece of paper and the police demand
    that you give it to them, that may be a different story.)

    To invoke Fifth Amendment protection, there may be a difference
    between things we have or are -- and things we know.  The important
    feature about PINs and passwords is that they're generally
    something we know.  These memory-based authenticators are the
    type of fact that benefit from strong Fifth Amendment protection
    should the government try to make us turn them over against our
    will.  Indeed, last year a federal appeals court held that a man
    could not be forced by the government to decrypt data.

    But if we move toward authentication systems based solely on
    physical tokens or biometrics -- things we have or things we
    are, rather than things we remember -- the government could
    demand that we produce them without implicating anything we know.
    Which would make it less likely that a valid privilege against
    self-incrimination would apply.

As Hofmann notes, a Court could find otherwise and set a different
precedent, but her analysis is cautionary.  Perhaps a balance of
power requires the individual actually does have some secrets.  But
is having some secrets the same as having some privacy?

No society, no people need rules against things which are impossible.
Today I observe a couple fornicating on a roof top in circumstances
where I can never know who the couple are.  Do they have privacy?
The answer is "no" if your definition of privacy is the absence of
observability.  The answer is "yes" if your definition of privacy
is the absence of identifiability.

Technical progress in image acquisition guarantees observability
pretty much everywhere now.  Those standoff biometrics are delivering
multi-factor identifiability at ever greater distances.  We will
soon live in a society where identity is not an assertion like "My
name is Dan," but rather an observable like "Sensors confirm that
is Dan."  With enough sensors, concentration camps don't need to
tatoo their inmates.  How many sensors are we installing in normal
life?

If data kills both privacy as impossible-to-observe and privacy as
impossible-to-identify, then what might be an alternative?  If you
are an optimist or an apparatchik, then your answer will tend toward
rules of procedure administered by a government you trust or control.
If you are a pessimist or a hacker/maker, then your answer will
tend towards the operational, and your definition of a state of
privacy will be mine: the effective capacity to misrepresent yourself.

Misrepresentation is using disinformation to frustrate data fusion
on the part of whomever it is that is watching you.  Misrepresentation
means paying your therapist in cash under an assumed name.
Misrepresentation means arming yourself not at Walmart but in living
rooms.  Misrepresentation means swapping affinity cards at random
with like-minded folks.  Misrepresentation means keeping an inventory
of misconfigured webservers to proxy through.  Misrepresentation
means putting a motor-generator between you and the Smart Grid.
Misrepresentation means using Tor for no reason at all.  Misrepresentation
means hiding in plain sight when there is nowhere else to hide.
Misrepresentation means having not one digital identity that you
cherish, burnish, and protect, but having as many as you can.  Your
identity is not a question unless you work to make it be.

The Obama administration's issuance of a National Strategy for
Trusted Identities in Cyberspace is case-in-point; it "calls for
the development of interoperable technology standards and policies
-- an 'Identity Ecosystem' -- where individuals, organizations, and
underlying infrastructure -- such as routers and servers -- can be
authoritatively authenticated."  If you can trust a digital identity,
that is because it can't be faked.  Why does the government care
about this?  It cares because it wants to digitally deliver government
services and it wants attribution.  Is having a non-fake-able digital
identity for government services worth the registration of your
remaining secrets with that government?  Is there any real difference
between a system that permits easy, secure, identity-based services
and a surveillance system?  Do you trust those who hold surveillance
data on you over the long haul by which I mean the indefinite
retention of transactional data between government services and
you, the individual required to proffer a non-fake-able identity
to engage in those transactions?  If you are building authentication
systems today, then you are playing in this league.

Standoff biometry by itself terminates the argument over whether
security and privacy are a zero sum game -- the sum is nowhere near
that good, and it is the surveilled who are capitalizing the system.
As with my game, entirely innocuous things become problematic when
surveilled.  Shoshana Zuboff, Harvard Business School Emerita,
called this "anticipatory conformity" and said:

    [W]e anticipate surveillance and we conform, and we do that with
    awareness. We know, for example, when we're going through the
    security line at the airport not to make jokes about terrorists
    or we'll get nailed, and nobody wants to get nailed for cracking
    a joke.  It's within our awareness to self-censor.  And that
    self-censorship represents a diminution of our freedom.  We
    self-censor not only to follow the rules, but also to avoid the
    shame of being publicly singled out.  Once anticipatory conformity
    becomes second nature, it becomes progressively easier for people
    to adapt to new impositions on their privacy, their freedoms.
    The habit has been set.

Leonard Downie, the former executive editor of The Washington Post,
wrote in that very paper on October 4th:

    Many reporters covering national security and government policy
    in Washington these days are taking precautions to keep their
    sources from becoming casualties in the Obama administration's
    war on leaks.  They and their remaining government sources often
    avoid telephone conversations and e-mail exchanges, arranging
    furtive one-on-one meetings instead.  A few news organizations
    have even set up separate computer networks and safe rooms for
    journalists trained in encryption and other ways to thwart
    surveillance.[3]

Once again, this is all about data and, to the exact point, about
fused data from many sources.  Do you like it?  Do you not like it?
All you engineers know that for the engineer, it is "fast, cheap,
reliable: choose two."  I am here to argue that for policy makers
working the cybersecurity beat, it is "freedom, security, convenience:
choose two."  But so long as policy makers in a democracy eventually
come around to the people's desires, my argument, such as it is,
is with the public at large, not with those who are trying to deliver
failure-proof protection to an impatient, risk-averse, gadget-addicted
population.

We learned in the financial crisis that there are levels of achievable
financial return that require levels of unsustainable financial
risk.  We learned that lesson on the large scale and on the small,
on the national scale and on the personal one.  I would like us to
not have to learn the parallel lesson with respect to data that
powers the good versus data that powers the bad.  If we can, for
the moment, think of data as a kind of money, then investing too
much our own data in an institution too big to influence is just
as insensate as investing too much of our own money in an institution
too big to fail.

I have become convinced that all security tools and all the data
that they acquire are, as they say in the military, dual use -- the
security tools and their data can be used for good or for ill.  I
am similarly convinced that the root cause, the wellspring of risk
is dependence, especially dependence on expectations of system
state.  If you would accept that you are most at risk from the
things you most depend upon, then damping dependence is the cheapest,
most straightforward, lowest latency way to damp risk.  This is,
in further analogy, just like the proven fact that the fastest and
most reliable way to put more money on the bottom line is through
cost control.  John Gilmore famously said, "Never give a government
a power you wouldn't want a despot to have."  I might amend that
to read "Never demand the government have a power you wouldn't want
a despot to have."

I have also become convinced that a state of security is one in
which there is no unmitigatable surprise, that is to say that you
have reached a state of security when you can mitigate the surprises
you will face.  Note that I did not say a state of security is the
absence of surprise, but rather the absence of unmitigatable surprise.
California Senate Bill 1386, the first of the state-level data
breach laws, did not criminalize losing credit card data; rather,
it prescribed the actions that a firm which has lost the credit
card data of its customers must take.  SB1386 is wise in that regard.

But only rarely do we ask our Legislatures to make mitigation
effective.  Instead, over and over again we ask our Legislatures
to make failure impossible.  When you embark on making failure
impossible, and that includes delivering on statements like "Never
again," you are forced into cost-benefit analyses where at least
one of the variables is infinite.  It is not heartless to say that
if every human life is actually priceless, then it follows that
there will never be enough money.  One is not anti-government to
say that doing a good job at preventing terrorism is better than
doing a perfect job.

And there is the Gordian Knot of this discussion: As society becomes
more technologic, even the mundane comes to depend on distant digital
perfection.  Our food pipeline contains less than a week's supply,
just to take one example, and that pipeline depends on digital
services for everything from GPS driven tractors to robot vegetable
sorting machinery to coast-to-coast logistics to RFID-tagged
livestock.  Is all the technologic dependency and the data that
fuels it making us more resilient or more fragile?

In cybersecurity practice, in which most of us here work, we seem
to be getting better and better.  We have better tools, we have
better understood practices, and we have more colleagues.  That's
the plus side.  But I'm interested in the ratio of skill to challenge,
and as far as I can estimate, we are expanding the society-wide
attack surface faster than we are expanding our collection of tools,
practices, and colleagues.  If you are growing more food, that's
great.  If your population is growing faster than your improvements
in food production can keep up, that's bad.  As with most decision
making under uncertainty, statistics have a role, particularly ratio
statistics that magnify trends so that the latency of feedback from
policy changes is more quickly clear.  Yet statistics, too, require
data.

In medicine, we have well established rules about medical privacy.
Those rules are helpful.  Those rules also have holes big enough
to drive a truck through.  Regardless, when you check into the
hospital there is an accountability-based, need-to-know regime that
governs your data most days.  However, if you check in with Bubonic
Plague or Anthrax, you will have zero privacy as those are mandatory
data reporting conditions.  So I ask you, would it make sense in a
public health of the Internet way to have a mandatory reporting
regime for cybersecurity failures?  Do you favor having to report
penetrations of your firm or household to the government or face
criminal charges for failing to make that report?  Is that data
that you want to share?  Sharing it can only harm you.  It might
help others.

This is not, in fact, about you personally.  Even Julian Assange,
in his book _Cypherpunks_, said "Individual targeting is not the
threat."  It is about a culture where personal data is increasingly
public data, and assembled en masse.  All we have to go on now is
the hopeful phrase "A reasonable expectation of privacy" but what
is reasonable when one inch block letters can be read from orbit?
What is reasonable when all of your financial or medical life is
digitized and available primarily over the Internet?  Do you want
ISPs to retain e-mails when you are asking your doctor a medical
question (or, for that matter, do you want those e-mails to become
part of your Electronic Health Record)?  Who owns your medical data
anyway?  Until the 1970s, it was the patient but regulations then
made it the provider.  With an Electronic Health Record, it is
likely to revert to patient ownership but if the EHR belongs to
you, do you get to surveil the use that is made of it by medical
providers and those that they outsource to?  And if not, why not?

Observability is fast extending to devices.  Some of it has already
appeared, such as the fact that any newish car is broadcasting four
unique Bluetooth radio IDs, one for each tire's valve stem.  Some
of it is in a daily progression, such as training our youngsters
to accept surveillance by stuffing a locator beacon in their backpack
as soon as they go off to Kindergarten.  Some of it is newly
technologic, like through the wall imaging, and some of it is simply
that we are now surrounded by cameras that we can't even see where
no one camera is important but they are important in the aggregate
when their data is fused.  Anything that has "wireless" in its name
creates an opportunity for traffic analysis.

In the days of radio, there was Sarnoff's Law, namely that the value
of a broadcast network was proportional to N, the number of listeners.
Then came packetized network communications and Metcalfe's Law,
that the value of a network was proportional to N squared, the
number of possible two-way conversations.  We are now in the era
of Reed's Law where the value of a network is proportional to the
number of groups that can form in it, that is to say 2 to the power
N.  Reed's Law is the new reality because it fits the age of social
networks.  In tune with my claim that everything is dual use, any
entity (such as a government) that can acquire the entirety of all
social media transactions learns nearly everything there is to
learn, and all in one place, and all courtesy of the participants
themselves.  The growth of social networks is a surveiller's dream
come true.

Total system complexity from a security person's point of view is
essentially just geometry.  Security is non-composable -- we can
get insecure results even when our systems are assembled from secure
components.  The more components, the less likely a secure result.
Might the same be said of data?  Of course it can -- search for the
term "reidentification" and you'll find that incomplete data, even
intentionally anonymized data, can be put together if there is
enough of it, and what is enough seems to be a lower hurdle every
year.  Put differently, if you share one fact each with ten different
people, how many of the ten have to be compromised before you are
exposed?

Howard Brin was the first to suggest that if you lose control over
what data is collected on you, the only freedom-preserving alternative
is that if everyone else does, too.  If the government or the
corporation can surveil you without asking, then the balance of
power is preserved when you can surveil them without asking.  Bruce
Schneier countered that preserving the balance of power doesn't
mean much if the effect of new information is non-linear, that is
to say if new information is the exponent in an equation, not one
more factor in a linear sum.[4]  Solving that debate requires you
have a strong opinion on what data fusion means operationally to
you, to others, to society.

There is some axiom of Nature at work here.  Decision making under
uncertainty is what we do in the small, and what policy makers do
in the large.  Uncertainty is partial information, so it is natural
to want information that is less partial.  We are closing in on
having more information than we can use.  The Intelligence Community
has felt the heat of too much information to handle for some time.
The business community is feeling it now insofar as it is far cheaper
to keep everything than it is to do careful selective deletion.
The individual is feeling pretty warm, too, as evidenced by something
as simple as how much they depend on the ability to search their
e-mail rather than folderizing it after reading.

I have amassed all the fortune I am going to amass.  I have raised
all the children I am going to raise.  I have made all the commitments
I am going to make.  I am old enough that I can opt out of many of
the corporate data collection schemes and live out the remainder
of my days unaffected by what I might be missing out on.  That those
corporations are agents of government data collection means that
for now I am opting out of some of that as well.  Anyone under 40
has no such option, or at least no such easy option.  Everything I
am talking about here is a young person's problem, just like the
National Debt, which the young will soon inherit.  It is your choice
and responsibility whether to demand protections and conveniences
and services that can only be done with pervasive data.  It is your
choice and responsibility whether to fear only fear itself or to
fear the absence of fear.  It is your choice and responsibility to
be part of the problem or part of the solution.

Any finite tolerance for risk caps the amount of information you
will want in play.  This has nothing whatsoever to do with whether
you have anything to hide, and therefore it is your choice and
responsibility to make it understood that just as "..there is nothing
sinister in so arranging one's affairs as to [minimize] taxes"[5]
neither is there anything sinister in minimizing the data collectible
from you.  The price of freedom is the probability of crime.  But
as technology progresses, your choice will not be between Big Brother
or no Big Brother, rather it is already between one Big Brother and
lots of Little Brothers.  Think carefully, yours is the last
generation that will have a choice.


As Dylan Thomas wrote, "Do not go gentle into that good night//
Rage, rage against the dying of the light."

Thank you for hearing me out.



--------------

[1] "Professionalizing the Nation's Cyber Workforce?"
www.nap.edu/openbook.php?record_id=18446

[2] "Fingerprint ID May Mean You Can't 'Take the Fifth'," Marcia Hofmann
www.wired.com/opinion/2013/09/the-unexpected-result-of-fingerprint-authentication-that-you-cant-take-the-fifth

[3] "In Obama's War on Leaks, Reporters Fight Back," Leonard Downie
www.washingtonpost.com/opinions/in-obamas-war-on-leaks-reporters-fight-b
ack/2013/10/04/70231e1c-2aeb-11e3-b139-029811dbb57f_print.html

[4a] "The Myth of the 'Transparent Society'," Bruce Schneier
www.wired.com/politics/security/commentary/securitymatters/2008/03/securitymatters_0306
[4b] "Rebuttal," David Brin
www.wired.com/politics/security/news/2008/03/brin_rebuttal

[5] Judge Learned Hand, COMMISSIONER V. NEWMAN, 159 F.2D 848, 850-851
(CA2 1947): "Over and over again, the courts have said there is
nothing sinister in so arranging one's affairs as to keep taxes as
low as possible.  Everybody does so, rich and poor, and all do
right, for nobody owes any duty to pay more tax than the law demands.
Taxes are enforced exactions, not voluntary contributions.  To
demand more in the name of morals is mere cant."

---
end

From scott.brim@gmail.com  Wed Oct 23 10:08:55 2013
Return-Path: <scott.brim@gmail.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2AA1A11E8170; Wed, 23 Oct 2013 10:08:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.589
X-Spam-Level: 
X-Spam-Status: No, score=-102.589 tagged_above=-999 required=5 tests=[AWL=0.010, BAYES_00=-2.599, HTML_MESSAGE=0.001, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PO2zFVj98yqh; Wed, 23 Oct 2013 10:08:53 -0700 (PDT)
Received: from mail-ob0-x22d.google.com (mail-ob0-x22d.google.com [IPv6:2607:f8b0:4003:c01::22d]) by ietfa.amsl.com (Postfix) with ESMTP id 5EC9911E81DC; Wed, 23 Oct 2013 10:08:49 -0700 (PDT)
Received: by mail-ob0-f173.google.com with SMTP id gq1so1099511obb.18 for <multiple recipients>; Wed, 23 Oct 2013 10:08:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=3XAFIOIhAyuWyFdodRlBIGMa0eEmeybO1rxeot9rgXE=; b=dnaoNmPG52xPZBlg3Qnai+qwKh5hNNOpAy0ePL5DkhJbhHzxp3WOrF2Y22P4cdHcS7 Y2vL4fIkDNTmbfbBFMMDNwMbP2NS6dL8XtCio7VooFGH4yEOqm6cYODo3+Ru1v4eT3IS 90Cjeynpxc3YgkAPPuSkNkWA+J/zpvbSOQm7GqylGugqPxx87L4x90fU75OoaMUXf9De ThHKzRJh6QYBzw26mB+kRy1kHN+9TFviUTHCkMwks89HjaKLDnyBvOzyXiDLffujCOf3 dlNrKycDYvENkQFBdpaLUJvsY2rrsC9pPN6HF9GXJHMAhoW9mnIrOh+aC31Rk2EJmMsD FwAA==
X-Received: by 10.60.42.203 with SMTP id q11mr2704061oel.54.1382548127677; Wed, 23 Oct 2013 10:08:47 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.182.2.134 with HTTP; Wed, 23 Oct 2013 10:08:27 -0700 (PDT)
In-Reply-To: <5267EAF2.2000608@KingsMountain.com>
References: <5267EAF2.2000608@KingsMountain.com>
From: Scott Brim <scott.brim@gmail.com>
Date: Wed, 23 Oct 2013 13:08:27 -0400
Message-ID: <CAPv4CP-mxR5whK+yW6Gjrs20nJ+3zZ7Wwyn3_ZRdUw-bS0y2Mg@mail.gmail.com>
To: "=JeffH" <Jeff.Hodges@kingsmountain.com>
Content-Type: multipart/alternative; boundary=001a11c207f009049404e96b9276
X-Mailman-Approved-At: Fri, 25 Oct 2013 08:02:08 -0700
Cc: perpass <perpass@ietf.org>, IETF Security Area Advisory Group <saag@ietf.org>
Subject: Re: [saag] [perpass] fyi: Dan Geer: Tradeoffs in Cyber Security [9 October 13, UNCC[
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 23 Oct 2013 17:08:55 -0000

--001a11c207f009049404e96b9276
Content-Type: text/plain; charset=ISO-8859-1

This is fantastic.  Thanks.

It illumines something: Surveillance by governments is not the biggest of
our problems. Privacy in the ordinary operation of a technology-based
society is significantly bigger. Criminals, big business ... but also
businesses and casual individuals have access to data you wish they didn't.
Yes the IETF needs to do better with crypto and authentication, but the
fundamental designs of the protocols they are being added to need to
support them.  From the bottom up, we need to proactively (not reactively)
make sure that IETF protocol designs take privacy into consideration.

Scott

--001a11c207f009049404e96b9276
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_extra">This is fantastic. =A0Thanks.</=
div><div class=3D"gmail_extra"><br></div><div class=3D"gmail_extra">It illu=
mines something: Surveillance by governments is not the biggest of our prob=
lems. Privacy in the ordinary operation of a technology-based society is si=
gnificantly bigger. Criminals, big business ... but also businesses and cas=
ual individuals have access to data you wish they didn&#39;t. Yes the IETF =
needs to do better with crypto and authentication, but the fundamental desi=
gns of the protocols they are being added to need to support them. =A0From =
the bottom up, we need to proactively (not reactively) make sure that IETF =
protocol designs take privacy into consideration.=A0</div>

<div class=3D"gmail_extra"><br></div><div class=3D"gmail_extra">Scott</div>=
</div>

--001a11c207f009049404e96b9276--

From stephen.farrell@cs.tcd.ie  Wed Oct 30 07:39:43 2013
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4BE3B21E80F9; Wed, 30 Oct 2013 07:39:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level: 
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HOzBzmbvB-dw; Wed, 30 Oct 2013 07:39:38 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) by ietfa.amsl.com (Postfix) with ESMTP id D36E521E80F1; Wed, 30 Oct 2013 07:38:59 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id E2E0BBE5C; Wed, 30 Oct 2013 14:38:57 +0000 (GMT)
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y7pfOS+ln-BH; Wed, 30 Oct 2013 14:38:57 +0000 (GMT)
Received: from [134.226.36.180] (stephen-think.dsg.cs.tcd.ie [134.226.36.180]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id AC477BE63; Wed, 30 Oct 2013 14:38:55 +0000 (GMT)
Message-ID: <527119FF.9070009@cs.tcd.ie>
Date: Wed, 30 Oct 2013 14:38:55 +0000
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux i686 on x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.0.1
MIME-Version: 1.0
To: "saag@ietf.org" <saag@ietf.org>, smime@ietf.org
References: <522509AC.6040907@cs.tcd.ie>
In-Reply-To: <522509AC.6040907@cs.tcd.ie>
X-Enigmail-Version: 1.6
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
Subject: Re: [saag] some s/mime related drafts I've been asked to AD sponsor
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 Oct 2013 14:39:43 -0000

Hiya,

So I've not seen any negative feedback on these so you should
see last calls issuing for 'em shortly.

S

On 09/02/2013 10:57 PM, Stephen Farrell wrote:
> 
> Folks,
> 
> Sean, Russ and Jim have authored three s/mime related drafts [1,2,3]
> and asked me to sponsor them for publication. I've read them and
> they seem like reasonable additions to the set of s/mime RFCs to
> me, but I'd like to check that nobody has any issue with that
> before starting IETF LC in a week or so.
> 
> I'd specifically be interested in hearing from anyone who'd
> likely implement these. I'll send my own comments (which are
> minor) during the IETF LC.
> 
> Thanks,
> S.
> 
> [1] http://tools.ietf.org/html/draft-turner-application-cms-media-type
> [2]
> http://tools.ietf.org/html/draft-housley-ct-keypackage-receipt-n-error
> [3]
> http://tools.ietf.org/html/draft-turner-ct-keypackage-receipt-n-error-algs
> 
> _______________________________________________
> saag mailing list
> saag@ietf.org
> https://www.ietf.org/mailman/listinfo/saag
> 
> 

From paul.hoffman@vpnc.org  Thu Oct 31 13:23:05 2013
Return-Path: <paul.hoffman@vpnc.org>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 33E3B11E8155 for <saag@ietfa.amsl.com>; Thu, 31 Oct 2013 13:23:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.591
X-Spam-Level: 
X-Spam-Status: No, score=-102.591 tagged_above=-999 required=5 tests=[AWL=0.008, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oc3pR8MKuHCu for <saag@ietfa.amsl.com>; Thu, 31 Oct 2013 13:23:04 -0700 (PDT)
Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id E4F0211E8195 for <saag@ietf.org>; Thu, 31 Oct 2013 13:23:02 -0700 (PDT)
Received: from [10.20.30.90] (50-0-66-41.dsl.dynamic.sonic.net [50.0.66.41]) (authenticated bits=0) by hoffman.proper.com (8.14.7/8.14.7) with ESMTP id r9VKMxuc047343 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for <saag@ietf.org>; Thu, 31 Oct 2013 13:23:01 -0700 (MST) (envelope-from paul.hoffman@vpnc.org)
X-Authentication-Warning: hoffman.proper.com: Host 50-0-66-41.dsl.dynamic.sonic.net [50.0.66.41] claimed to be [10.20.30.90]
From: Paul Hoffman <paul.hoffman@vpnc.org>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Message-Id: <468658C2-D6C8-41C0-B68D-7483102D2D60@vpnc.org>
Date: Thu, 31 Oct 2013 13:22:59 -0700
To: saag Group <saag@ietf.org>
Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1816\))
X-Mailer: Apple Mail (2.1816)
Subject: [saag] Reminder of the security-focused meeting of the httbis WG
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 Oct 2013 20:23:05 -0000

Greetings again. People here who care about the intersection of HTTP and =
security should note that next week's Tuesday morning session of the =
httpbis WG is focused on security. See the agenda at =
<http://www.ietf.org/proceedings/88/agenda/agenda-88-httpbis> for more =
details.

--Paul Hoffman=

From dev+ietf@seantek.com  Thu Oct 31 21:31:21 2013
Return-Path: <dev+ietf@seantek.com>
X-Original-To: saag@ietfa.amsl.com
Delivered-To: saag@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0D7C11E81FD; Thu, 31 Oct 2013 21:31:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.599
X-Spam-Level: 
X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lOICdnewWAc3; Thu, 31 Oct 2013 21:31:14 -0700 (PDT)
Received: from mxout-08.mxes.net (mxout-08.mxes.net [216.86.168.183]) by ietfa.amsl.com (Postfix) with ESMTP id BDEA721E80A6; Thu, 31 Oct 2013 21:31:09 -0700 (PDT)
Received: from [192.168.123.7] (unknown [76.173.239.154]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.mxes.net (Postfix) with ESMTPSA id 5ACCC509B5; Fri,  1 Nov 2013 00:31:07 -0400 (EDT)
Message-ID: <52732E6D.3000409@seantek.com>
Date: Thu, 31 Oct 2013 21:30:37 -0700
From: Sean Leonard <dev+ietf@seantek.com>
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20130307 Thunderbird/17.0.4
MIME-Version: 1.0
To: smime@ietf.org, "pkix@ietf.org" <pkix@ietf.org>, saag@ietf.org
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms050608020504040403020808"
Subject: [saag] New Version for PKIX Textual (02)
X-BeenThere: saag@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Security Area Advisory Group <saag.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/saag>, <mailto:saag-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/saag>
List-Post: <mailto:saag@ietf.org>
List-Help: <mailto:saag-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/saag>, <mailto:saag-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 01 Nov 2013 04:31:24 -0000

This is a cryptographically signed message in MIME format.

--------------ms050608020504040403020808
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: quoted-printable

Greetings S/MIME, PKIX, and SAAG lists:

A revised draft of PKIX text encodings has been published. The changes=20
are largely editorial rather than technical. However, the ABNF has been=20
beefed up to include stricter and more accurate encoding rules.

Please provide any additional comments before we move it to the next=20
phases of publication.

Kind regards,

Sean Leonard

-------- Original Message --------
Subject:     New Version Notification for=20
draft-josefsson-pkix-textual-02.txt
Date:     Mon, 21 Oct 2013 15:24:56 -0700
From: internet-drafts@ietf.org
To:     Simon Josefsson <simon@josefsson.org>, Sean Leonard
<dev+ietf@seantek.com>



A new version of I-D, draft-josefsson-pkix-textual-02.txt
has been successfully submitted by Simon Josefsson and posted to the
IETF repository.

Filename:     draft-josefsson-pkix-textual
Revision:     02
Title:         Text Encodings of PKIX and CMS Structures
Creation date:     2013-10-22
Group:         Individual Submission
Number of pages: 14
URL:http://www.ietf.org/internet-drafts/draft-josefsson-pkix-textual-02.t=
xt
Status:http://datatracker.ietf.org/doc/draft-josefsson-pkix-textual
Htmlized:http://tools.ietf.org/html/draft-josefsson-pkix-textual-02
Diff:http://www.ietf.org/rfcdiff?url2=3Ddraft-josefsson-pkix-textual-02

Abstract:
     This document describes and discuss the text encodings of Public-Key=

     Infrastructure using X.509 (PKIX) Certificates, PKIX Certificate
     Revocation Lists (CRLs), PKCS #10 Certification Request Syntax, PKCS=

     #7 structures, Cryptographic Message Syntax (CMS), PKCS #8 Private-
     Key Information Syntax, and Attribute Certificates.  The text
     encodings are well-known, are implemented by several applications an=
d
     libraries, and are widely deployed.  This document is intended to
     articulate the de-facto rules that existing implementations operate
     by, and to give recommendations that will promote interoperability
     going forward.





--------------ms050608020504040403020808
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms050608020504040403020808--
