
From nobody Tue Jul 18 02:02:48 2017
Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C539612009C for <fud@ietfa.amsl.com>; Tue, 18 Jul 2017 02:02:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.921
X-Spam-Level: 
X-Spam-Status: No, score=-1.921 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8Mi57Hx6-jdy for <fud@ietfa.amsl.com>; Tue, 18 Jul 2017 02:02:44 -0700 (PDT)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-ve1eur01on0078.outbound.protection.outlook.com [104.47.1.78]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 380F31317A1 for <fud@ietf.org>; Tue, 18 Jul 2017 02:02:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;  s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=9mIMhOQ6N83rr6eyzaVUJrwAHRpgr05cH9xV2fb1LYg=; b=Wne5iTjf9yXA5ssKgkTUB0nvVJCjvxXnh2+mjTron29SS1Abev6x3lG5WjwtboclWGRY9R/p/NKLnfoKO4DH+cDTU6bwkn2e0zYiuQz8GZxnZR1R7cZNXHa+Falgy75xDYxL7AJqKxG8WD8s4eO6yBFs3F2KLkS3G5ueQmvag4U=
Received: from VI1PR0801MB2717.eurprd08.prod.outlook.com (10.166.198.22) by VI1PR0801MB2718.eurprd08.prod.outlook.com (10.166.198.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1261.13; Tue, 18 Jul 2017 09:02:41 +0000
Received: from VI1PR0801MB2717.eurprd08.prod.outlook.com ([fe80::c00b:8c05:ce98:b43e]) by VI1PR0801MB2717.eurprd08.prod.outlook.com ([fe80::c00b:8c05:ce98:b43e%13]) with mapi id 15.01.1261.024; Tue, 18 Jul 2017 09:02:41 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: "fud@ietf.org" <fud@ietf.org>
Thread-Topic: First drafts about the firmware update description
Thread-Index: AdL/o5fG1P5LG5QFRNqtErh1nfEeLQ==
Date: Tue, 18 Jul 2017 09:02:40 +0000
Message-ID: <VI1PR0801MB27170D8000D92D0939FFDD3EFAA10@VI1PR0801MB2717.eurprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=arm.com;
x-originating-ip: [2001:67c:370:128:b417:884d:9c49:4ad4]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR0801MB2718; 7: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
x-ms-office365-filtering-correlation-id: 23327c4e-7b7e-4fea-7cbd-08d4cdbbbee9
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(48565401081)(300000503095)(300135400095)(2017052603031)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:VI1PR0801MB2718; 
x-ms-traffictypediagnostic: VI1PR0801MB2718:
x-exchange-antispam-report-test: UriScan:(151999592597050)(278178393323532)(26388249023172)(236129657087228)(148574349560750)(21748063052155)(167848164394848)(209349559609743);
x-microsoft-antispam-prvs: <VI1PR0801MB27188F1D32AEB91E9FBCA08EFAA10@VI1PR0801MB2718.eurprd08.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(8121501046)(2017060910075)(10201501046)(93006095)(93001095)(100000703101)(100105400095)(3002001)(6055026)(6041248)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123555025)(20161123562025)(20161123564025)(20161123558100)(20161123560025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:VI1PR0801MB2718; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:VI1PR0801MB2718; 
x-forefront-prvs: 037291602B
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(6009001)(39410400002)(39850400002)(39450400003)(39840400002)(39400400002)(39860400002)(53754006)(40434004)(54356999)(110136004)(2420400007)(50986999)(38730400002)(74316002)(8676002)(15650500001)(5630700001)(25786009)(86362001)(8936002)(14454004)(1730700003)(2351001)(81166006)(6916009)(2900100001)(33656002)(189998001)(2501003)(5890100001)(5250100002)(5640700003)(6506006)(966005)(6436002)(10710500007)(2906002)(5660300001)(7110500001)(54896002)(9686003)(6306002)(53936002)(99286003)(3280700002)(3660700001)(55016002)(478600001)(72206003)(7736002)(7696004)(102836003)(6116002)(790700001); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR0801MB2718; H:VI1PR0801MB2717.eurprd08.prod.outlook.com; FPR:; SPF:None; MLV:ovrnspm; PTR:InfoNoRecords; LANG:en; 
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR0801MB27170D8000D92D0939FFDD3EFAA10VI1PR0801MB2717_"
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Jul 2017 09:02:40.8921 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB2718
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/T_y7YaYFVGBbFhxqN9WdrOpailQ>
Subject: [Fud] First drafts about the firmware update description
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2017 09:02:47 -0000

--_000_VI1PR0801MB27170D8000D92D0939FFDD3EFAA10VI1PR0801MB2717_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi all,

It took a little bit of time to put a write-up about the work we have been =
doing at ARM in the area of firmware updates together. We finally managed t=
o submit the IETF drafts.

There are two documents:


1)      The first document describes the high-level architecture of a firmw=
are update service for IoT devices, see
https://tools.ietf.org/html/draft-moran-fud-architecture-00


2)      The second document focuses on specifying the firmware update descr=
iption. We call this the "manifest".
https://tools.ietf.org/html/draft-moran-fud-manifest-00

We would like to have the IETF community to work on a standard for a manife=
st. Silicon partners and those developing IoT operating systems have develo=
ped their own formats and we hope they can also share what they have been d=
oing.

Feedback on the documents is appreciated!

Ciao
Hannes

IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose, or store or copy the information in =
any medium. Thank you.

--_000_VI1PR0801MB27170D8000D92D0939FFDD3EFAA10VI1PR0801MB2717_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1308704669;
	mso-list-type:hybrid;
	mso-list-template-ids:-1386160262 134807569 134807577 134807579 134807567 =
134807577 134807579 134807567 134807577 134807579;}
@list l0:level1
	{mso-level-text:"%1\)";
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level2
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level3
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level4
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level5
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level6
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
@list l0:level7
	{mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level8
	{mso-level-number-format:alpha-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-18.0pt;}
@list l0:level9
	{mso-level-number-format:roman-lower;
	mso-level-tab-stop:none;
	mso-level-number-position:right;
	text-indent:-9.0pt;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-GB" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Hi all, <o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">It took a little bit of time to put a write-up about=
 the work we have been doing at ARM in the area of firmware updates togethe=
r. We finally managed to submit the IETF drafts.
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">There are two documents: <o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span style=3D"mso-list:Ignore">1)<span style=
=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]>The first document describes the high-level archite=
cture of a firmware update service for IoT devices, see
<o:p></o:p></p>
<p class=3D"MsoNormal">https://tools.ietf.org/html/draft-moran-fud-architec=
ture-00<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-18.0pt;mso-list:l0 leve=
l1 lfo1"><![if !supportLists]><span style=3D"mso-list:Ignore">2)<span style=
=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><![endif]>The second document focuses on specifying the firmw=
are update description. We call this the &#8220;manifest&#8221;.
<o:p></o:p></p>
<p class=3D"MsoNormal">https://tools.ietf.org/html/draft-moran-fud-manifest=
-00<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">We would like to have the IETF community to work on =
a standard for a manifest. Silicon partners and those developing IoT operat=
ing systems have developed their own formats and we hope they can also shar=
e what they have been doing.
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Feedback on the documents is appreciated! <o:p></o:p=
></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Ciao<o:p></o:p></p>
<p class=3D"MsoNormal">Hannes<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose,
 or store or copy the information in any medium. Thank you.
</body>
</html>

--_000_VI1PR0801MB27170D8000D92D0939FFDD3EFAA10VI1PR0801MB2717_--


From nobody Tue Jul 18 04:11:24 2017
Return-Path: <francisco.acosta@inria.fr>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B54971317A9 for <fud@ietfa.amsl.com>; Tue, 18 Jul 2017 04:11:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.9
X-Spam-Level: 
X-Spam-Status: No, score=-6.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Aze70nEfaZmZ for <fud@ietfa.amsl.com>; Tue, 18 Jul 2017 04:11:20 -0700 (PDT)
Received: from mail2-relais-roc.national.inria.fr (mail2-relais-roc.national.inria.fr [192.134.164.83]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 112021317C3 for <fud@ietf.org>; Tue, 18 Jul 2017 04:11:16 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="5.40,377,1496095200";  d="scan'208,217";a="283856087"
Received: from ip5f5af22e.dynamic.kabel-deutschland.de (HELO snake.fritz.box.mail) ([95.90.242.46]) by mail2-relais-roc.national.inria.fr with ESMTP/TLS/AES256-GCM-SHA384; 18 Jul 2017 13:11:15 +0200
Date: Tue, 18 Jul 2017 13:11:14 +0200
From: Francisco Javier Acosta Padilla <francisco.acosta@inria.fr>
To: Hannes Tschofenig <hannes.tschofenig@arm.com>,  "=?utf-8?Q?fud=40ietf.org?=" <fud@ietf.org>
Message-ID: <etPan.596decd2.789439a5.204@inria.fr>
In-Reply-To: <VI1PR0801MB27170D8000D92D0939FFDD3EFAA10@VI1PR0801MB2717.eurprd08.prod.outlook.com>
References: <VI1PR0801MB27170D8000D92D0939FFDD3EFAA10@VI1PR0801MB2717.eurprd08.prod.outlook.com>
X-Mailer: Airmail (419)
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="596decd2_3e7a072a_204"
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/S859sPc3_isoft7w3CR7S6lTECI>
Subject: Re: [Fud] First drafts about the firmware update description
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2017 11:11:23 -0000

--596decd2_3e7a072a_204
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

Hi Hannes=21 Thanks a lot for the submission.

I=E2=80=99m looking at the documents, for now I only have grammar and syn=
tax feedback (small nitpicks), but I=E2=80=99ll try to give more feedback=
 on the contents. However, how and/or where can we submit the feedback=3F=


Best,

--=C2=A0
=46rancisco Javier Acosta Padilla
Research Engineer at INRIA Saclay
IN=46INE Team

On 18 July 2017 at 11:02:53, Hannes Tschofenig (hannes.tschofenig=40arm.c=
om) wrote:

Hi all,

=C2=A0

It took a little bit of time to put a write-up about the work we have bee=
n doing at ARM in the area of firmware updates together. We finally manag=
ed to submit the IET=46 drafts.

=C2=A0

There are two documents:

=C2=A0

1)=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 The first document describes the high-le=
vel architecture of a firmware update service for IoT devices, see

https://tools.ietf.org/html/draft-moran-fud-architecture-00

=C2=A0

2)=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0 The second document focuses on specifyin=
g the firmware update description. We call this the =E2=80=9Cmanifest=E2=80=
=9D.

https://tools.ietf.org/html/draft-moran-fud-manifest-00

=C2=A0

We would like to have the IET=46 community to work on a standard for a ma=
nifest. Silicon partners and those developing IoT operating systems have =
developed their own formats and we hope they can also share what they hav=
e been doing.

=C2=A0

=46eedback on the documents is appreciated=21

=C2=A0

Ciao

Hannes

=C2=A0

IMPORTANT NOTICE: The contents of this email and any attachments are conf=
idential and may also be privileged. If you are not the intended recipien=
t, please notify the sender immediately and do not disclose the contents =
to any other person, use it for any purpose, or store or copy the informa=
tion in any medium. Thank you. =5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F =20
=46ud mailing list =20
=46ud=40ietf.org =20
https://www.ietf.org/mailman/listinfo/fud =20

--596decd2_3e7a072a_204
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: inline

<html><head><style>body=7Bfont-family:Helvetica,Arial;font-size:13px=7D</=
style></head><body style=3D=22word-wrap: break-word; -webkit-nbsp-mode: s=
pace; -webkit-line-break: after-white-space;=22><div id=3D=22bloop=5Fcust=
omfont=22 style=3D=22font-family:Helvetica,Arial;font-size:13px; color: r=
gba(0,0,0,1.0); margin: 0px; line-height: auto;=22>Hi Hannes=21 Thanks a =
lot for the submission.</div><div id=3D=22bloop=5Fcustomfont=22 style=3D=22=
font-family:Helvetica,Arial;font-size:13px; color: rgba(0,0,0,1.0); margi=
n: 0px; line-height: auto;=22><br></div><div id=3D=22bloop=5Fcustomfont=22=
 style=3D=22font-family:Helvetica,Arial;font-size:13px; color: rgba(0,0,0=
,1.0); margin: 0px; line-height: auto;=22>I=E2=80=99m looking at the docu=
ments, for now I only have grammar and syntax feedback (small nitpicks), =
but I=E2=80=99ll try to give more feedback on the contents. However, how =
and/or where can we submit the feedback=3F</div><div id=3D=22bloop=5Fcust=
omfont=22 style=3D=22font-family:Helvetica,Arial;font-size:13px; color: r=
gba(0,0,0,1.0); margin: 0px; line-height: auto;=22><br></div><div id=3D=22=
bloop=5Fcustomfont=22 style=3D=22font-family:Helvetica,Arial;font-size:13=
px; color: rgba(0,0,0,1.0); margin: 0px; line-height: auto;=22>Best,</div=
> <br> <div id=3D=22bloop=5Fsign=5F1500376088041211136=22 class=3D=22bloo=
p=5Fsign=22><div style=3D=22font-family:helvetica,arial;font-size:13px=22=
>--&nbsp;<br>=46rancisco Javier Acosta Padilla<br>Research Engineer at IN=
RIA Saclay</div><div style=3D=22font-family:helvetica,arial;font-size:13p=
x=22>IN=46INE Team</div></div> <br><p class=3D=22airmail=5Fon=22>On 18 Ju=
ly 2017 at 11:02:53, Hannes Tschofenig (<a href=3D=22mailto:hannes.tschof=
enig=40arm.com=22>hannes.tschofenig=40arm.com</a>) wrote:</p> <blockquote=
 type=3D=22cite=22 class=3D=22clean=5Fbq=22><span><div lang=3D=22EN-GB=22=
 link=3D=22blue=22 vlink=3D=22purple=22><div></div><div>



<=21--=5Bif gte mso 9=5D><xml>
<o:shapedefaults v:ext=3D=22edit=22 spidmax=3D=221026=22 />
</xml><=21=5Bendif=5D--><=21--=5Bif gte mso 9=5D><xml>
<o:shapelayout v:ext=3D=22edit=22>
<o:idmap v:ext=3D=22edit=22 data=3D=221=22 />
</o:shapelayout></xml><=21=5Bendif=5D-->


<div class=3D=22WordSection1=22>
<p class=3D=22MsoNormal=22>Hi all, <o:p></o:p></p>
<p class=3D=22MsoNormal=22><o:p>&nbsp;</o:p></p>
<p class=3D=22MsoNormal=22>It took a little bit of time to put a write-up=
 about the work we have been doing at ARM in the area of firmware updates=
 together. We finally managed to submit the IET=46 drafts.
<o:p></o:p></p>
<p class=3D=22MsoNormal=22><o:p>&nbsp;</o:p></p>
<p class=3D=22MsoNormal=22>There are two documents: <o:p></o:p></p>
<p class=3D=22MsoNormal=22><o:p>&nbsp;</o:p></p>
<p class=3D=22MsoListParagraph=22 style=3D=22text-indent:-18.0pt;mso-list=
:l0 level1 lfo1=22><=21--=5Bif =21supportLists=5D--><span style=3D=22mso-=
list:Ignore=22>1)<span style=3D=22font:7.0pt &quot;Times New Roman&quot;=22=
>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><=21--=5Bendif=5D-->The first document describes the high-l=
evel architecture of a firmware update service for IoT devices, see
<o:p></o:p></p>
<p class=3D=22MsoNormal=22>https://tools.ietf.org/html/draft-moran-fud-ar=
chitecture-00<o:p></o:p></p>
<p class=3D=22MsoNormal=22><o:p>&nbsp;</o:p></p>
<p class=3D=22MsoListParagraph=22 style=3D=22text-indent:-18.0pt;mso-list=
:l0 level1 lfo1=22><=21--=5Bif =21supportLists=5D--><span style=3D=22mso-=
list:Ignore=22>2)<span style=3D=22font:7.0pt &quot;Times New Roman&quot;=22=
>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span><=21--=5Bendif=5D-->The second document focuses on specifyi=
ng the firmware update description. We call this the =E2=80=9Cmanifest=E2=
=80=9D.
<o:p></o:p></p>
<p class=3D=22MsoNormal=22>https://tools.ietf.org/html/draft-moran-fud-ma=
nifest-00<o:p></o:p></p>
<p class=3D=22MsoNormal=22><o:p>&nbsp;</o:p></p>
<p class=3D=22MsoNormal=22>We would like to have the IET=46 community to =
work on a standard for a manifest. Silicon partners and those developing =
IoT operating systems have developed their own formats and we hope they c=
an also share what they have been doing.
<o:p></o:p></p>
<p class=3D=22MsoNormal=22><o:p>&nbsp;</o:p></p>
<p class=3D=22MsoNormal=22>=46eedback on the documents is appreciated=21 =
<o:p></o:p></p>
<p class=3D=22MsoNormal=22><o:p>&nbsp;</o:p></p>
<p class=3D=22MsoNormal=22>Ciao<o:p></o:p></p>
<p class=3D=22MsoNormal=22>Hannes<o:p></o:p></p>
<p class=3D=22MsoNormal=22><o:p>&nbsp;</o:p></p>
</div>
IMPORTANT NOTICE: The contents of this email and any attachments are conf=
idential and may also be privileged. If you are not the intended recipien=
t, please notify the sender immediately and do not disclose the contents =
to any other person, use it for any purpose,
 or store or copy the information in any medium. Thank you.


=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F
<br>=46ud mailing list
<br>=46ud=40ietf.org
<br>https://www.ietf.org/mailman/listinfo/fud
<br></div></div></span></blockquote></body></html>
--596decd2_3e7a072a_204--


From nobody Tue Jul 18 07:08:38 2017
Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8EC8C12FEE2 for <fud@ietfa.amsl.com>; Tue, 18 Jul 2017 07:08:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.921
X-Spam-Level: 
X-Spam-Status: No, score=-1.921 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1I_5PpTeVrWx for <fud@ietfa.amsl.com>; Tue, 18 Jul 2017 07:08:34 -0700 (PDT)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-ve1eur01on0089.outbound.protection.outlook.com [104.47.1.89]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A99741286B2 for <fud@ietf.org>; Tue, 18 Jul 2017 07:08:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;  s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=YjN4EO3QUWcy3zTD13T6f7ay4spUlUcBkDpVPUsd6Qo=; b=coFS7nAdiEGjhPZF+atIaj6UyXEVEtWbWJhtHKFZjdh93JBQrg/j/hbzsCO1cbw1Kvjk3Z9JSnZHNH5L4HTNHLv9Bcw92PqL8rkCmb1X6a6Mwz250c85yQkphhqUa93gXVzib6CrQDUz1S4a9mzj9COk9OE95/VDFa6TE6XNPOU=
Received: from VI1PR0801MB2717.eurprd08.prod.outlook.com (10.166.198.22) by VI1PR0801MB2718.eurprd08.prod.outlook.com (10.166.198.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1261.13; Tue, 18 Jul 2017 14:08:30 +0000
Received: from VI1PR0801MB2717.eurprd08.prod.outlook.com ([fe80::c00b:8c05:ce98:b43e]) by VI1PR0801MB2717.eurprd08.prod.outlook.com ([fe80::c00b:8c05:ce98:b43e%13]) with mapi id 15.01.1261.024; Tue, 18 Jul 2017 14:08:30 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Francisco Javier Acosta Padilla <francisco.acosta@inria.fr>, "fud@ietf.org" <fud@ietf.org>
Thread-Topic: [Fud] First drafts about the firmware update description
Thread-Index: AdL/o5fG1P5LG5QFRNqtErh1nfEeLQAEvngAAAYrUhA=
Date: Tue, 18 Jul 2017 14:08:30 +0000
Message-ID: <VI1PR0801MB27178D88C734F7A8B12422AFFAA10@VI1PR0801MB2717.eurprd08.prod.outlook.com>
References: <VI1PR0801MB27170D8000D92D0939FFDD3EFAA10@VI1PR0801MB2717.eurprd08.prod.outlook.com> <etPan.596decd2.789439a5.204@inria.fr>
In-Reply-To: <etPan.596decd2.789439a5.204@inria.fr>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: inria.fr; dkim=none (message not signed) header.d=none;inria.fr; dmarc=none action=none header.from=arm.com;
x-originating-ip: [31.133.137.21]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR0801MB2718; 7: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
x-ms-office365-filtering-correlation-id: af97b288-b5b8-4b0b-35c5-08d4cde67819
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(48565401081)(300000503095)(300135400095)(2017052603031)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:VI1PR0801MB2718; 
x-ms-traffictypediagnostic: VI1PR0801MB2718:
x-exchange-antispam-report-test: UriScan:(151999592597050)(278178393323532)(180628864354917)(26388249023172)(236129657087228)(48057245064654)(148574349560750)(21748063052155)(167848164394848)(209349559609743);
x-microsoft-antispam-prvs: <VI1PR0801MB2718521C6C6749FFB201273CFAA10@VI1PR0801MB2718.eurprd08.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(8121501046)(2017060910075)(100000703101)(100105400095)(93006095)(93001095)(10201501046)(3002001)(6055026)(6041248)(20161123564025)(20161123555025)(20161123562025)(20161123558100)(20161123560025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:VI1PR0801MB2718; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:VI1PR0801MB2718; 
x-forefront-prvs: 037291602B
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(39400400002)(39850400002)(39410400002)(39840400002)(39450400003)(40434004)(53754006)(24454002)(5250100002)(5890100001)(189998001)(66066001)(33656002)(2900100001)(478600001)(72206003)(102836003)(6116002)(790700001)(3846002)(9686003)(7696004)(2906002)(236005)(5660300001)(7110500001)(6306002)(54896002)(606006)(2501003)(6506006)(966005)(6436002)(10710500007)(55016002)(99286003)(53936002)(3280700002)(7736002)(3660700001)(38730400002)(15650500001)(8676002)(74316002)(76176999)(54356999)(50986999)(6246003)(2420400007)(229853002)(9326002)(81166006)(2950100002)(53546010)(86362001)(25786009)(8936002)(14454004); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR0801MB2718; H:VI1PR0801MB2717.eurprd08.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en; 
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR0801MB27178D88C734F7A8B12422AFFAA10VI1PR0801MB2717_"
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Jul 2017 14:08:30.5611 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB2718
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/TyTfpPwGmqrWaZKnAV3WK6jqLFs>
Subject: Re: [Fud] First drafts about the firmware update description
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2017 14:08:37 -0000

--_000_VI1PR0801MB27178D88C734F7A8B12422AFFAA10VI1PR0801MB2717_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_VI1PR0801MB27178D88C734F7A8B12422AFFAA10VI1PR0801MB2717_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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=

--_000_VI1PR0801MB27178D88C734F7A8B12422AFFAA10VI1PR0801MB2717_--


From nobody Tue Jul 18 08:26:19 2017
Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E664312EC19 for <fud@ietfa.amsl.com>; Tue, 18 Jul 2017 08:26:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.921
X-Spam-Level: 
X-Spam-Status: No, score=-1.921 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6JQ4TJwZ-ONT for <fud@ietfa.amsl.com>; Tue, 18 Jul 2017 08:26:16 -0700 (PDT)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-db5eur01on0079.outbound.protection.outlook.com [104.47.2.79]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8E67F131A7E for <fud@ietf.org>; Tue, 18 Jul 2017 08:26:15 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;  s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=KXTFfMIyE1uhsWqtrNHLZJbTDhbTyJSakN6Tzo3QC6Q=; b=dFtXqLF1CU1nVQ5fOagdnr0BIEbz6sUT5/Wx58dFKoF0psTGuRyj/E/c34dlQAG+1HLuTfaW2RobtOIKsHmqYTwRXe+9wQZhtzhRBraNKjpFKRuaSVjurQBc/YFBxKOTqMUEiVRjQCGVATT8iUsQcMobk5XCgNSNy/ja4wXMGg8=
Received: from VI1PR0801MB2717.eurprd08.prod.outlook.com (10.166.198.22) by VI1PR0801MB2720.eurprd08.prod.outlook.com (10.166.198.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1261.13; Tue, 18 Jul 2017 15:26:12 +0000
Received: from VI1PR0801MB2717.eurprd08.prod.outlook.com ([fe80::c00b:8c05:ce98:b43e]) by VI1PR0801MB2717.eurprd08.prod.outlook.com ([fe80::c00b:8c05:ce98:b43e%13]) with mapi id 15.01.1261.024; Tue, 18 Jul 2017 15:26:12 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: "fud@ietf.org" <fud@ietf.org>
Thread-Topic: FUD Side Meeting @ Prague IETF
Thread-Index: AdL/2XWXyTHPquvtRz2BTV1/fA5nsQ==
Date: Tue, 18 Jul 2017 15:26:12 +0000
Message-ID: <VI1PR0801MB2717EBEB0B4401C2E8C795D4FAA10@VI1PR0801MB2717.eurprd08.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=arm.com;
x-originating-ip: [31.133.137.21]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; VI1PR0801MB2720; 7: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
x-ms-office365-filtering-correlation-id: eabfe3ff-7f6b-41de-a76e-08d4cdf1529d
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(48565401081)(300000503095)(300135400095)(2017052603031)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:VI1PR0801MB2720; 
x-ms-traffictypediagnostic: VI1PR0801MB2720:
x-exchange-antispam-report-test: UriScan:(151999592597050)(26388249023172)(236129657087228)(148574349560750)(21748063052155)(209349559609743);
x-microsoft-antispam-prvs: <VI1PR0801MB2720B4FFFF50E0289981A481FAA10@VI1PR0801MB2720.eurprd08.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(8121501046)(2017060910075)(10201501046)(93006095)(93001095)(3002001)(100000703101)(100105400095)(6055026)(6041248)(20161123560025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123562025)(20161123564025)(20161123555025)(20161123558100)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:VI1PR0801MB2720; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:VI1PR0801MB2720; 
x-forefront-prvs: 037291602B
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(6009001)(39840400002)(39450400003)(39860400002)(39850400002)(39400400002)(39410400002)(53824002)(53754006)(40434004)(7696004)(478600001)(189998001)(14454004)(72206003)(2351001)(2900100001)(1730700003)(5890100001)(81166006)(74316002)(3660700001)(2906002)(86362001)(5660300001)(7736002)(3280700002)(8676002)(8936002)(5250100002)(2501003)(54356999)(53936002)(38730400002)(50986999)(6436002)(25786009)(6506006)(110136004)(9686003)(5630700001)(5640700003)(66066001)(6916009)(54896002)(99286003)(55016002)(6306002)(102836003)(790700001)(3846002)(6116002)(33656002); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR0801MB2720; H:VI1PR0801MB2717.eurprd08.prod.outlook.com; FPR:; SPF:None; MLV:ovrnspm; PTR:InfoNoRecords; LANG:en; 
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_VI1PR0801MB2717EBEB0B4401C2E8C795D4FAA10VI1PR0801MB2717_"
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Jul 2017 15:26:12.0596 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR0801MB2720
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/T8QpaCdzrCItzxQIYtdGutHVl_0>
Subject: [Fud] FUD Side Meeting @ Prague IETF
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2017 15:26:18 -0000

--_000_VI1PR0801MB2717EBEB0B4401C2E8C795D4FAA10VI1PR0801MB2717_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi all,

I have been asked by a few IETF participants whether we should get together=
 this week to talk about firmware updates for IoT devices (as a follow-up o=
f what we did at the Chicago IETF meeting).

I am proposing to meet Thursday, 9:30am in the Istanbul room (at the L leve=
l). I have reserved the room till 12:00.

Ciao
Hannes

IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose, or store or copy the information in =
any medium. Thank you.

--_000_VI1PR0801MB2717EBEB0B4401C2E8C795D4FAA10VI1PR0801MB2717_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0cm;
	margin-right:0cm;
	margin-bottom:0cm;
	margin-left:36.0pt;
	margin-bottom:.0001pt;
	font-size:11.0pt;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri","sans-serif";
	mso-fareast-language:EN-US;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:987900439;
	mso-list-type:hybrid;
	mso-list-template-ids:-1084435668 1656110064 134807555 134807557 134807553=
 134807555 134807557 134807553 134807555 134807557;}
@list l0:level1
	{mso-level-start-at:0;
	mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:20.5pt;
	text-indent:-18.0pt;
	font-family:Symbol;
	mso-fareast-font-family:Calibri;
	mso-bidi-font-family:"Times New Roman";}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:56.5pt;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:92.5pt;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:128.5pt;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:164.5pt;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:200.5pt;
	text-indent:-18.0pt;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:236.5pt;
	text-indent:-18.0pt;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:272.5pt;
	text-indent:-18.0pt;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	margin-left:308.5pt;
	text-indent:-18.0pt;
	font-family:Wingdings;}
ol
	{margin-bottom:0cm;}
ul
	{margin-bottom:0cm;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-GB" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Hi all, <o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I have been asked by a few IETF participants whether=
 we should get together this week to talk about firmware updates for IoT de=
vices (as a follow-up of what we did at the Chicago IETF meeting).<o:p></o:=
p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">I am proposing to meet <span style=3D"color:red">Thu=
rsday, 9:30am</span> in the
<span style=3D"color:red">Istanbul room</span> (at the L level). I have res=
erved the room till 12:00.
<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Ciao<o:p></o:p></p>
<p class=3D"MsoNormal">Hannes<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose,
 or store or copy the information in any medium. Thank you.
</body>
</html>

--_000_VI1PR0801MB2717EBEB0B4401C2E8C795D4FAA10VI1PR0801MB2717_--


From nobody Tue Jul 18 08:30:38 2017
Return-Path: <emmanuel.baccelli@gmail.com>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 423B2131AA9 for <fud@ietfa.amsl.com>; Tue, 18 Jul 2017 08:30:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.699
X-Spam-Level: 
X-Spam-Status: No, score=-1.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.199, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ILlRmT-m7zvK for <fud@ietfa.amsl.com>; Tue, 18 Jul 2017 08:30:34 -0700 (PDT)
Received: from mail-ua0-x22f.google.com (mail-ua0-x22f.google.com [IPv6:2607:f8b0:400c:c08::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 35F11131B26 for <fud@ietf.org>; Tue, 18 Jul 2017 08:30:34 -0700 (PDT)
Received: by mail-ua0-x22f.google.com with SMTP id z22so27357868uah.1 for <fud@ietf.org>; Tue, 18 Jul 2017 08:30:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to; bh=+OupY3jLV0rjcJCU48fNYOFwtOAXrpAdEyBdtIL5fik=; b=aSl/458FTuOk+ZsuEK+Xk30XyQ0WMU/cT5LnUUso5u7sfJbsgrMf/BAMvBYgEgvBlQ CdOv0pfnPLKT5+9dBVZs37+RGCRNAr4dbdbdsPPwfoGV6cro9aSO+MVsUJQXLqOAQ+Hw O0yma7DBxUnAWaSmtNTmUJkGJp5yUEmT3wfsmjH4bjBZN5DaLU0EBFMaaOMge1lZf3bX YyBIwUKkNbHG5qimbp1WEZdkgGHE2nXFpGaF62oR6WgDybG4mTQHZ3CN0aBrNqXQgLrV T6Ba8iFp4sZiQXKAzW8ZdcpS/0s/sJysh/uBEfg+GNvnWXb0zpOrYv3cVpE6vqbHdbkw CWEA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to; bh=+OupY3jLV0rjcJCU48fNYOFwtOAXrpAdEyBdtIL5fik=; b=UoBD9PpPw8iKTGHiT4Fxgw1k5t/lXbQmD9Zot5GTrh6GGfemAOCCiGtdiM2uvVUVKq 0/RzzxKHD0s/aDkyW7/QDKoe3BbCAqYBwH6/ViVh44F8Su1jXx9KSR9/snlbgkJ7l/xl 0szYmBEFthBGCqysFcaCycqECT+LKQTBtQn9gCUHvY1GNaV9flnEjDs9STS2zhSS4O7s A+FEM5UcpE50Hj18E7tjIKjgplQ+ib7tSaADWG2Rv2pLssm15d4lzZ+BmPTZBzpWly9V rqsDOZtiRj37ISh8ebJIiCPpG7c0d7aAaG8iW8MCBK9w/rNmS0BogtApytwtCGxaVQKO 0dkA==
X-Gm-Message-State: AIVw111aXhd8mL9soCdiQyMHZM1RuDaRhPDwnvSnD/d2hu2aTD7kaw9L oSnwExcL0RsDdn20ETfgI4SCNOoRtg==
X-Received: by 10.31.178.88 with SMTP id b85mr1109811vkf.4.1500391832230; Tue, 18 Jul 2017 08:30:32 -0700 (PDT)
MIME-Version: 1.0
Sender: emmanuel.baccelli@gmail.com
Received: by 10.176.76.211 with HTTP; Tue, 18 Jul 2017 08:30:11 -0700 (PDT)
In-Reply-To: <VI1PR0801MB2717EBEB0B4401C2E8C795D4FAA10@VI1PR0801MB2717.eurprd08.prod.outlook.com>
References: <VI1PR0801MB2717EBEB0B4401C2E8C795D4FAA10@VI1PR0801MB2717.eurprd08.prod.outlook.com>
From: Emmanuel Baccelli <Emmanuel.Baccelli@inria.fr>
Date: Tue, 18 Jul 2017 17:30:11 +0200
X-Google-Sender-Auth: 6BAURRVjUtOWpkGU_Zey-04z8bA
Message-ID: <CANK0pbYxZO9gh5nYDuYdjxktNvQujkhF4Ejo9XnY-RhtsuD=Pw@mail.gmail.com>
To: fud@ietf.org
Content-Type: multipart/alternative; boundary="001a1143fa262f265e0554993221"
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/OPfucGXCP6D-FzYf-r5hEzxqCB8>
Subject: Re: [Fud] FUD Side Meeting @ Prague IETF
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2017 15:30:36 -0000

--001a1143fa262f265e0554993221
Content-Type: text/plain; charset="UTF-8"

Hi Hannes,
thanks for the initiative. I could join at that time.
Best,
Emmanuel

On Tue, Jul 18, 2017 at 5:26 PM, Hannes Tschofenig <
Hannes.Tschofenig@arm.com> wrote:

> Hi all,
>
>
>
> I have been asked by a few IETF participants whether we should get
> together this week to talk about firmware updates for IoT devices (as a
> follow-up of what we did at the Chicago IETF meeting).
>
>
>
> I am proposing to meet Thursday, 9:30am in the Istanbul room (at the L
> level). I have reserved the room till 12:00.
>
>
>
> Ciao
>
> Hannes
>
>
> IMPORTANT NOTICE: The contents of this email and any attachments are
> confidential and may also be privileged. If you are not the intended
> recipient, please notify the sender immediately and do not disclose the
> contents to any other person, use it for any purpose, or store or copy the
> information in any medium. Thank you.
>
> _______________________________________________
> Fud mailing list
> Fud@ietf.org
> https://www.ietf.org/mailman/listinfo/fud
>
>

--001a1143fa262f265e0554993221
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Hannes,<div>thanks for the initiative. I could join at =
that time.</div><div>Best,</div><div>Emmanuel</div></div><div class=3D"gmai=
l_extra"><br><div class=3D"gmail_quote">On Tue, Jul 18, 2017 at 5:26 PM, Ha=
nnes Tschofenig <span dir=3D"ltr">&lt;<a href=3D"mailto:Hannes.Tschofenig@a=
rm.com" target=3D"_blank">Hannes.Tschofenig@arm.com</a>&gt;</span> wrote:<b=
r><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:=
1px #ccc solid;padding-left:1ex">





<div lang=3D"EN-GB" link=3D"blue" vlink=3D"purple">
<div class=3D"m_7885367213438901327WordSection1">
<p class=3D"MsoNormal">Hi all, <u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">I have been asked by a few IETF participants whether=
 we should get together this week to talk about firmware updates for IoT de=
vices (as a follow-up of what we did at the Chicago IETF meeting).<u></u><u=
></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">I am proposing to meet <span style=3D"color:red">Thu=
rsday, 9:30am</span> in the
<span style=3D"color:red">Istanbul room</span> (at the L level). I have res=
erved the room till 12:00.
<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">Ciao<u></u><u></u></p>
<p class=3D"MsoNormal">Hannes<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose,
 or store or copy the information in any medium. Thank you.
</div>

<br>______________________________<wbr>_________________<br>
Fud mailing list<br>
<a href=3D"mailto:Fud@ietf.org">Fud@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/fud" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/fud</a><br>
<br></blockquote></div><br></div>

--001a1143fa262f265e0554993221--


From nobody Tue Jul 18 13:47:53 2017
Return-Path: <cabo@tzi.org>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8F837131899 for <fud@ietfa.amsl.com>; Tue, 18 Jul 2017 13:47:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rdbzeHP67mZt for <fud@ietfa.amsl.com>; Tue, 18 Jul 2017 13:47:49 -0700 (PDT)
Received: from mailhost.informatik.uni-bremen.de (mailhost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 373DE131A64 for <fud@ietf.org>; Tue, 18 Jul 2017 13:47:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at informatik.uni-bremen.de
Received: from submithost.informatik.uni-bremen.de (submithost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::b]) by mailhost.informatik.uni-bremen.de (8.14.5/8.14.5) with ESMTP id v6IKlhPb017091; Tue, 18 Jul 2017 22:47:43 +0200 (CEST)
Received: from surfer-172-30-2-218-hotspot.internet-for-guests.com (107.223.broadband2.iol.cz [83.208.223.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by submithost.informatik.uni-bremen.de (Postfix) with ESMTPSA id 3xBsg26kcwz3Zxw; Tue, 18 Jul 2017 22:47:42 +0200 (CEST)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <VI1PR0801MB2717EBEB0B4401C2E8C795D4FAA10@VI1PR0801MB2717.eurprd08.prod.outlook.com>
Date: Tue, 18 Jul 2017 22:47:35 +0200
Cc: "fud@ietf.org" <fud@ietf.org>
X-Mao-Original-Outgoing-Id: 522103655.343792-3ca3085c5b4a8ecc2ed7026b8631daf1
Content-Transfer-Encoding: quoted-printable
Message-Id: <7C8270AE-B90A-48D8-8EBD-21E3229FEA3B@tzi.org>
References: <VI1PR0801MB2717EBEB0B4401C2E8C795D4FAA10@VI1PR0801MB2717.eurprd08.prod.outlook.com>
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
X-Mailer: Apple Mail (2.3273)
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/q6viXID545C54SnlwXQ-ZlColCQ>
Subject: Re: [Fud] FUD Side Meeting @ Prague IETF
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Jul 2017 20:47:51 -0000

This is the same time that YOT (Yang of Things) happens in Tyrolka.
But maybe all the people who won=E2=80=99t fit into that room can go to =
Istanbul :-)

Gr=C3=BC=C3=9Fe, Carsten


> On Jul 18, 2017, at 17:26, Hannes Tschofenig =
<Hannes.Tschofenig@arm.com> wrote:
>=20
> Hi all,=20
> =20
> I have been asked by a few IETF participants whether we should get =
together this week to talk about firmware updates for IoT devices (as a =
follow-up of what we did at the Chicago IETF meeting).
> =20
> I am proposing to meet Thursday, 9:30am in the Istanbul room (at the L =
level). I have reserved the room till 12:00.
> =20
> Ciao
> Hannes
> =20
> IMPORTANT NOTICE: The contents of this email and any attachments are =
confidential and may also be privileged. If you are not the intended =
recipient, please notify the sender immediately and do not disclose the =
contents to any other person, use it for any purpose, or store or copy =
the information in any medium. Thank you. =
_______________________________________________
> Fud mailing list
> Fud@ietf.org
> https://www.ietf.org/mailman/listinfo/fud


From nobody Wed Jul 19 00:57:16 2017
Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4C76C131C08 for <fud@ietfa.amsl.com>; Wed, 19 Jul 2017 00:57:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.921
X-Spam-Level: 
X-Spam-Status: No, score=-1.921 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C_Mwqt-V0Rje for <fud@ietfa.amsl.com>; Wed, 19 Jul 2017 00:56:54 -0700 (PDT)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-db5eur01on0059.outbound.protection.outlook.com [104.47.2.59]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6E040131BFE for <fud@ietf.org>; Wed, 19 Jul 2017 00:56:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com;  s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=Lul8kdTY4ACjfho5r2JEk5sNSPVlJxSdsvAfs0CTK4w=; b=maWwYvlnsdUEXc7Gqn++fAdzeK4SU8N1O32+zRAtRyToYUvPVhkcdLErxmsMfZHA23JUQoHT1tSIko/zIfzC2ruFtjcNaEWSrZESByFoLoUSFj76dlnX+iopa8g9wp7UATBISxe3uOM1qyGjuNOZP5xkM3FZoJQs8MViitiozMA=
Received: from AM4PR0801MB2706.eurprd08.prod.outlook.com (10.167.90.148) by AM4PR0801MB2708.eurprd08.prod.outlook.com (10.167.90.150) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1282.10; Wed, 19 Jul 2017 07:56:48 +0000
Received: from AM4PR0801MB2706.eurprd08.prod.outlook.com ([fe80::101e:636f:8916:d3e9]) by AM4PR0801MB2706.eurprd08.prod.outlook.com ([fe80::101e:636f:8916:d3e9%13]) with mapi id 15.01.1282.011; Wed, 19 Jul 2017 07:56:48 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Carsten Bormann <cabo@tzi.org>
CC: "fud@ietf.org" <fud@ietf.org>
Thread-Topic: [Fud] FUD Side Meeting @ Prague IETF
Thread-Index: AdL/2XWXyTHPquvtRz2BTV1/fA5nsQALZ/yAABdXI+A=
Date: Wed, 19 Jul 2017 07:56:48 +0000
Message-ID: <AM4PR0801MB27061BFE28E7128F07E0DA0CFAA60@AM4PR0801MB2706.eurprd08.prod.outlook.com>
References: <VI1PR0801MB2717EBEB0B4401C2E8C795D4FAA10@VI1PR0801MB2717.eurprd08.prod.outlook.com> <7C8270AE-B90A-48D8-8EBD-21E3229FEA3B@tzi.org>
In-Reply-To: <7C8270AE-B90A-48D8-8EBD-21E3229FEA3B@tzi.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: tzi.org; dkim=none (message not signed) header.d=none;tzi.org; dmarc=none action=none header.from=arm.com;
x-originating-ip: [2001:67c:370:128:acb5:4815:527c:9664]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; AM4PR0801MB2708; 7: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
x-ms-office365-filtering-correlation-id: a353d57b-7925-48af-fcfc-08d4ce7bb573
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(300000503095)(300135400095)(48565401081)(2017052603031)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:AM4PR0801MB2708; 
x-ms-traffictypediagnostic: AM4PR0801MB2708:
x-exchange-antispam-report-test: UriScan:(180628864354917)(236129657087228)(209349559609743); 
x-microsoft-antispam-prvs: <AM4PR0801MB2708AF741CF15CF791C69F22FAA60@AM4PR0801MB2708.eurprd08.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(8121501046)(2017060910075)(5005006)(100000703101)(100105400095)(93006095)(93001095)(10201501046)(3002001)(6055026)(6041248)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123564025)(20161123555025)(20161123562025)(20161123560025)(20161123558100)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:AM4PR0801MB2708; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:AM4PR0801MB2708; 
x-forefront-prvs: 0373D94D15
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(6009001)(39410400002)(39400400002)(39850400002)(39840400002)(39450400003)(53824002)(40434004)(53754006)(24454002)(13464003)(4326008)(102836003)(6116002)(25786009)(7696004)(99286003)(55016002)(53546010)(305945005)(81166006)(7736002)(76176999)(50986999)(54356999)(86362001)(2906002)(8936002)(3280700002)(5890100001)(5250100002)(3660700001)(8676002)(33656002)(72206003)(966005)(2950100002)(14454004)(6916009)(189998001)(6436002)(74316002)(9686003)(6306002)(53936002)(478600001)(38730400002)(110136004)(229853002)(5660300001)(6506006)(2900100001)(6246003); DIR:OUT; SFP:1101; SCL:1; SRVR:AM4PR0801MB2708; H:AM4PR0801MB2706.eurprd08.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en; 
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Jul 2017 07:56:48.5458 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM4PR0801MB2708
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/0GjyAlJGsX_OK4_hNedQ8EtPhW0>
Subject: Re: [Fud] FUD Side Meeting @ Prague IETF
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jul 2017 07:57:07 -0000
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From nobody Wed Jul 19 02:03:07 2017
Return-Path: <spencerdawkins.ietf@gmail.com>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 41370131A5F for <fud@ietfa.amsl.com>; Wed, 19 Jul 2017 02:03:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level: 
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QP-ve7e6vsT3 for <fud@ietfa.amsl.com>; Wed, 19 Jul 2017 02:03:02 -0700 (PDT)
Received: from mail-yw0-x22c.google.com (mail-yw0-x22c.google.com [IPv6:2607:f8b0:4002:c05::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8ACAB1317AD for <fud@ietf.org>; Wed, 19 Jul 2017 02:03:02 -0700 (PDT)
Received: by mail-yw0-x22c.google.com with SMTP id x125so17658838ywa.0 for <fud@ietf.org>; Wed, 19 Jul 2017 02:03:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=TSaOTCFXJ1doVe1hJ0RdiqLScjpgcdn4gjpFLtypJK0=; b=U4nwgP9XKyhexDQFnazoQL/GZsWJnnF9+vZeFUHJ0cARNEpO0w5ZnU8nX+EsTrWGR0 7BWAbcTE0MMlc+lYtc6qVuGeQ+dWoZ2so+wcHkbhet+C9PJOgXqdLhehSS/uy2owi58X Nafct/3TEeabGeRwApN41qC6bWCmBFwFM5pc0gF3BBbHPg4VRHs1dvsUpGPt/vgKWcK0 fsFBqTjaO37DiVrrlttyzl+2eA32vp0f2q+/l8WnN6a7NW1SPRU6FKnbOsSa5fpjqU7s WybPqfad/YQ3GmlXE+IoGmh2fSEg/yedq2m8CHMm2MaRiTQUsdZ5olak7fTCsPVRYh7K Jlcg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=TSaOTCFXJ1doVe1hJ0RdiqLScjpgcdn4gjpFLtypJK0=; b=XIHY5vDtBM1sFtMEOuBhEfitazE0JF7RbqxZOkKPHmgmwIAoEVV7wSP3Ee6P0LdxHh T9IAugEzKv1dEJxj4TQOMdBynFkIaYUsZAznDxo4UybIHjRNMB4vbwFoiX7oQ0tBO7gv kSDMVRkXCHPfUVMraLGCayEEw5l6aJabXsjZFD1VBZ/lskETwVuWfb6/bPkf9DZfWzw3 e8dA79AlMbb/S5/+ypZBDlHsohMheoDl8SltGThcIADQ1erzqveNghTJWrCLzZ/+MJto /vXPw8xVGaOvFCjR4/Vsps0vvRSoa8deyxUztO8dljBXw85/WYsvPgBDnzWoHvaTa7Su /AXg==
X-Gm-Message-State: AIVw111+z2103omeTptR6378WXCjgOphfmd4iRv0sXyRlTTly2Y4luDP zPU0PCFpRVLPTPloH1ZqcNgP8NPlTg==
X-Received: by 10.13.219.194 with SMTP id d185mr1423654ywe.158.1500454981639;  Wed, 19 Jul 2017 02:03:01 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.37.45.101 with HTTP; Wed, 19 Jul 2017 02:03:01 -0700 (PDT)
In-Reply-To: <AM4PR0801MB27061BFE28E7128F07E0DA0CFAA60@AM4PR0801MB2706.eurprd08.prod.outlook.com>
References: <VI1PR0801MB2717EBEB0B4401C2E8C795D4FAA10@VI1PR0801MB2717.eurprd08.prod.outlook.com> <7C8270AE-B90A-48D8-8EBD-21E3229FEA3B@tzi.org> <AM4PR0801MB27061BFE28E7128F07E0DA0CFAA60@AM4PR0801MB2706.eurprd08.prod.outlook.com>
From: Spencer Dawkins at IETF <spencerdawkins.ietf@gmail.com>
Date: Wed, 19 Jul 2017 11:03:01 +0200
Message-ID: <CAKKJt-c5xn=_9BajSWr4we5bZDeTZ7JUdBiAeaqFsSw=f1j3vw@mail.gmail.com>
To: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
Cc: Carsten Bormann <cabo@tzi.org>, "fud@ietf.org" <fud@ietf.org>
Content-Type: multipart/alternative; boundary="001a114fc0fe2ea4ed0554a7e649"
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/2Il3FKIv2yZy4AWJ4MBK6nO56WQ>
Subject: Re: [Fud] FUD Side Meeting @ Prague IETF
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jul 2017 09:03:05 -0000

--001a114fc0fe2ea4ed0554a7e649
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi, Hannes,

On Wed, Jul 19, 2017 at 9:56 AM, Hannes Tschofenig <
Hannes.Tschofenig@arm.com> wrote:

> It is difficult to find a timeslot that does has no conflict at an IETF
> meeting, as you know.
>

Tell me about it. I won't be in either FUD or YoT, and I'm still
double-booked!

Best wishes, and please do send a summary of your conversation to the list,
for those of us with prior commitments.

Spencer


> I guess I will have to catch up on the Yang of Things afterwards.
>
> Ciao
> Hannes
>
>
> -----Original Message-----
> From: Carsten Bormann [mailto:cabo@tzi.org]
> Sent: 18 July 2017 22:48
> To: Hannes Tschofenig
> Cc: fud@ietf.org
> Subject: Re: [Fud] FUD Side Meeting @ Prague IETF
>
> This is the same time that YOT (Yang of Things) happens in Tyrolka.
> But maybe all the people who won=E2=80=99t fit into that room can go to I=
stanbul
> :-)
>
> Gr=C3=BC=C3=9Fe, Carsten
>
>
> > On Jul 18, 2017, at 17:26, Hannes Tschofenig <Hannes.Tschofenig@arm.com=
>
> wrote:
> >
> > Hi all,
> >
> > I have been asked by a few IETF participants whether we should get
> together this week to talk about firmware updates for IoT devices (as a
> follow-up of what we did at the Chicago IETF meeting).
> >
> > I am proposing to meet Thursday, 9:30am in the Istanbul room (at the L
> level). I have reserved the room till 12:00.
> >
> > Ciao
> > Hannes
> >
> > IMPORTANT NOTICE: The contents of this email and any attachments are
> confidential and may also be privileged. If you are not the intended
> recipient, please notify the sender immediately and do not disclose the
> contents to any other person, use it for any purpose, or store or copy th=
e
> information in any medium. Thank you. ______________________________
> _________________
> > Fud mailing list
> > Fud@ietf.org
> > https://www.ietf.org/mailman/listinfo/fud
>
> IMPORTANT NOTICE: The contents of this email and any attachments are
> confidential and may also be privileged. If you are not the intended
> recipient, please notify the sender immediately and do not disclose the
> contents to any other person, use it for any purpose, or store or copy th=
e
> information in any medium. Thank you.
> _______________________________________________
> Fud mailing list
> Fud@ietf.org
> https://www.ietf.org/mailman/listinfo/fud
>

--001a114fc0fe2ea4ed0554a7e649
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi, Hannes,<div class=3D"gmail_extra"><br><div class=3D"gm=
ail_quote">On Wed, Jul 19, 2017 at 9:56 AM, Hannes Tschofenig <span dir=3D"=
ltr">&lt;<a href=3D"mailto:Hannes.Tschofenig@arm.com" target=3D"_blank">Han=
nes.Tschofenig@arm.com</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_=
quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1=
ex">It is difficult to find a timeslot that does has no conflict at an IETF=
 meeting, as you know.<br></blockquote><div><br></div><div>Tell me about it=
. I won&#39;t be in either FUD or YoT, and I&#39;m still double-booked!=C2=
=A0</div><div><br></div><div>Best wishes, and please do send a summary of y=
our conversation to the list, for those of us with prior commitments.</div>=
<div><br></div><div>Spencer</div><div>=C2=A0</div><blockquote class=3D"gmai=
l_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left=
:1ex">
I guess I will have to catch up on the Yang of Things afterwards.<br>
<br>
Ciao<br>
<span class=3D"HOEnZb"><font color=3D"#888888">Hannes<br>
</font></span><div class=3D"HOEnZb"><div class=3D"h5"><br>
<br>
-----Original Message-----<br>
From: Carsten Bormann [mailto:<a href=3D"mailto:cabo@tzi.org">cabo@tzi.org<=
/a>]<br>
Sent: 18 July 2017 22:48<br>
To: Hannes Tschofenig<br>
Cc: <a href=3D"mailto:fud@ietf.org">fud@ietf.org</a><br>
Subject: Re: [Fud] FUD Side Meeting @ Prague IETF<br>
<br>
This is the same time that YOT (Yang of Things) happens in Tyrolka.<br>
But maybe all the people who won=E2=80=99t fit into that room can go to Ist=
anbul :-)<br>
<br>
Gr=C3=BC=C3=9Fe, Carsten<br>
<br>
<br>
&gt; On Jul 18, 2017, at 17:26, Hannes Tschofenig &lt;<a href=3D"mailto:Han=
nes.Tschofenig@arm.com">Hannes.Tschofenig@arm.com</a>&gt; wrote:<br>
&gt;<br>
&gt; Hi all,<br>
&gt;<br>
&gt; I have been asked by a few IETF participants whether we should get tog=
ether this week to talk about firmware updates for IoT devices (as a follow=
-up of what we did at the Chicago IETF meeting).<br>
&gt;<br>
&gt; I am proposing to meet Thursday, 9:30am in the Istanbul room (at the L=
 level). I have reserved the room till 12:00.<br>
&gt;<br>
&gt; Ciao<br>
&gt; Hannes<br>
&gt;<br>
&gt; IMPORTANT NOTICE: The contents of this email and any attachments are c=
onfidential and may also be privileged. If you are not the intended recipie=
nt, please notify the sender immediately and do not disclose the contents t=
o any other person, use it for any purpose, or store or copy the informatio=
n in any medium. Thank you. ______________________________<wbr>____________=
_____<br>
&gt; Fud mailing list<br>
&gt; <a href=3D"mailto:Fud@ietf.org">Fud@ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/fud" rel=3D"noreferre=
r" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/fud</a><br>
<br>
IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose, or store or copy the information in =
any medium. Thank you.<br>
______________________________<wbr>_________________<br>
Fud mailing list<br>
<a href=3D"mailto:Fud@ietf.org">Fud@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/fud" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/fud</a><br>
</div></div></blockquote></div><br></div></div>

--001a114fc0fe2ea4ed0554a7e649--


From nobody Wed Jul 19 02:13:57 2017
Return-Path: <henk.birkholz@sit.fraunhofer.de>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ED186131C4D for <fud@ietfa.amsl.com>; Wed, 19 Jul 2017 02:13:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.9
X-Spam-Level: 
X-Spam-Status: No, score=-6.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_HI=-5, RP_MATCHES_RCVD=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pd2bGpCo1xTE for <fud@ietfa.amsl.com>; Wed, 19 Jul 2017 02:13:50 -0700 (PDT)
Received: from mailext.sit.fraunhofer.de (mailext.sit.fraunhofer.de [141.12.72.89]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 61025131C4A for <fud@ietf.org>; Wed, 19 Jul 2017 02:13:50 -0700 (PDT)
Received: from mail.sit.fraunhofer.de (mail.sit.fraunhofer.de [141.12.84.171]) by mailext.sit.fraunhofer.de (8.14.4/8.14.4/Debian-4.1ubuntu1) with ESMTP id v6J9Dlp9012517 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for <fud@ietf.org>; Wed, 19 Jul 2017 11:13:48 +0200
Received: from [31.133.128.168] (31.133.128.168) by mail.sit.fraunhofer.de (141.12.84.171) with Microsoft SMTP Server (TLS) id 14.3.361.1; Wed, 19 Jul 2017 11:13:42 +0200
To: <fud@ietf.org>
References: <VI1PR0801MB2717EBEB0B4401C2E8C795D4FAA10@VI1PR0801MB2717.eurprd08.prod.outlook.com>
From: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Message-ID: <7081cb17-2e39-1351-ae39-bcc31378b8b1@sit.fraunhofer.de>
Date: Wed, 19 Jul 2017 11:13:40 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.1.1
MIME-Version: 1.0
In-Reply-To: <VI1PR0801MB2717EBEB0B4401C2E8C795D4FAA10@VI1PR0801MB2717.eurprd08.prod.outlook.com>
Content-Type: text/plain; charset="windows-1252"; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-Originating-IP: [31.133.128.168]
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/BVRyTWxPGlAtwiTI2yEoVP-Sf7U>
Subject: Re: [Fud] FUD Side Meeting @ Prague IETF
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jul 2017 09:13:56 -0000

Hello FUD'ler,

again I am sorry that I cannot join, but I am in a session where I have 
3 presentation at that time.

If you actually deciding to meeting at this session slot, I would like 
to ask you to have a extensive look at:

> https://tools.ietf.org/html/draft-ietf-sacm-coswid-02#page-14

"CoSWID Attributes for Firmware "

There is a resource description type for firmware that can even include 
the corresponding firmware and act as a transport container. It - of 
course -  includes the complete expressiveness of ISO-19770-2:2015 and 
is therefore inter-operable in regard to the corresponding metadata that 
overlaps with "normal software" and can be processed by any system that 
already understands the semantics of ISO SWID documents.

Viele Grüße,

Henk

On 07/18/2017 05:26 PM, Hannes Tschofenig wrote:
> Hi all,
> 
> I have been asked by a few IETF participants whether we should get 
> together this week to talk about firmware updates for IoT devices (as a 
> follow-up of what we did at the Chicago IETF meeting).
> 
> I am proposing to meet Thursday, 9:30am in the Istanbul room (at the L 
> level). I have reserved the room till 12:00.
> 
> Ciao
> 
> Hannes
> 
> IMPORTANT NOTICE: The contents of this email and any attachments are 
> confidential and may also be privileged. If you are not the intended 
> recipient, please notify the sender immediately and do not disclose the 
> contents to any other person, use it for any purpose, or store or copy 
> the information in any medium. Thank you.
> 
> 
> _______________________________________________
> Fud mailing list
> Fud@ietf.org
> https://www.ietf.org/mailman/listinfo/fud
> 


From nobody Wed Jul 19 11:33:51 2017
Return-Path: <emmanuel.baccelli@gmail.com>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CDA94131B3E for <fud@ietfa.amsl.com>; Wed, 19 Jul 2017 11:33:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.699
X-Spam-Level: 
X-Spam-Status: No, score=-1.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.199, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gCafLjb5MPv7 for <fud@ietfa.amsl.com>; Wed, 19 Jul 2017 11:33:48 -0700 (PDT)
Received: from mail-ua0-x231.google.com (mail-ua0-x231.google.com [IPv6:2607:f8b0:400c:c08::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1A1C9131A62 for <fud@ietf.org>; Wed, 19 Jul 2017 11:33:48 -0700 (PDT)
Received: by mail-ua0-x231.google.com with SMTP id 80so6206291uas.0 for <fud@ietf.org>; Wed, 19 Jul 2017 11:33:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:sender:from:date:message-id:subject:to; bh=orHqRaw2mLGb6Ut46RuXeuxwFEtnhjwezrp1m6wCz8Y=; b=uVnkLxqOHAgaKQzqC3lZBhySUIpp+OZVZcCpA1QgzINir7VTajSp1X3sQuEVHuJyoc hXRXxRpkmQ//ZPUL9tnVF0oFJIQ9eCUPNaQYw6QgidJVt2bmv+o5dMHafTX2JnGNRC/3 KJ6CYTUqtY1rrOKuUqBFE3rDqHbaUOCAXwSQgMgBoHc9bU/jtDFv7Lc+v9M/4GLv9Nci I8qTDN3ncBeq4+n4Sv+EjsCjovhddOvcIY6BKSDQ4q2gY7qXDhGybOHyXs28RRWvd5Zk jd8FXPc1tjPMZF7QoAM4F3amJ/BsFSSQ64tq4dYnactEpR+gvKwkawZRJxyi6vTe4J5D 29uw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:from:date:message-id:subject :to; bh=orHqRaw2mLGb6Ut46RuXeuxwFEtnhjwezrp1m6wCz8Y=; b=Zosuor7DiVyLJXYKoZG/hweIg55fGr1ZXXl8Ax27jIbsUMJ0KL2Yr8hsuUVQOtHBUY d7e4z4yd4r67FGJiljsDmn6jeRf57ITPzoGAt12KmoOWy1ryoeGTwmw4fL1a7CFNffa+ bxeoWrBH2+22ITdMmFSdx4G0JSZCihfT69g4ZsIdnfrIpZdAoe1IHcMbCVi0RTlk6A8/ rGAtHVKyG3dvDv2WQAYqSiXkOQOQNNjCoaTLIidpHNS/rAFbU9ey94ab8HngN3JOtgJQ POQkMW4Khys8inYOBxnJNcm0LHvEt4q2UTCHmqcjIJK8HhlGa9JKJ1ge36g++znoItIa Cz0w==
X-Gm-Message-State: AIVw112FSXhftNi8Aykh/RgwfXtuLcM836NjPK93x2XZL81lZt3YBOc2 +BF5O+lusl64NeQQnuUA8Gc/Ub5CLbnB
X-Received: by 10.159.60.111 with SMTP id w47mr592148uah.207.1500489227060; Wed, 19 Jul 2017 11:33:47 -0700 (PDT)
MIME-Version: 1.0
Sender: emmanuel.baccelli@gmail.com
Received: by 10.176.76.211 with HTTP; Wed, 19 Jul 2017 11:33:26 -0700 (PDT)
From: Emmanuel Baccelli <Emmanuel.Baccelli@inria.fr>
Date: Wed, 19 Jul 2017 20:33:26 +0200
X-Google-Sender-Auth: RybPJC8cefF2SdotSGeGGA50-Xo
Message-ID: <CANK0pbYAHH79nRWkD5LkpJApJvYH4Ds563jg-uh0ir0F1QcN3w@mail.gmail.com>
To: fud@ietf.org
Content-Type: multipart/alternative; boundary="f403043649d45e4caa0554afdfdf"
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/WbC9-HK8sH9ftYlCgYai867BiE4>
Subject: [Fud] (quick) review of draft-moran-fud-architecture-00
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jul 2017 18:33:50 -0000

--f403043649d45e4caa0554afdfdf
Content-Type: text/plain; charset="UTF-8"

Hi everyone,

thanks for the draft.

to prepare tomorrow's meeting, I read the drafts as fast as I could ( I
hope note too fast ;)

It reads well already, and it is actually pretty close to what
we are doing in RIOT.

See below some comments, questions and suggestions.

=====
General comments:
=====

1. In the proposed architecture some trust is required in the storage
element, which is assumed to correctly:
- serve the latest manifest/firmware (if the device pulls)
- pushe/signal newer manifests to the device (if the author pushes)

2. What is specific to firmware in the document so far?
It seems to me that this could apply to any software module on an IoT
device, not necessarily a firmware.
For instance it could be "application" logic (We have use cases where we
are updating some software, but not the firmware).
Why not generalize somehow the terminology to something more generic like
"software update" or something similar?


=====
Some more detailed comments:
=====

# in Section 3:
why/how/what small bootloader?

why/how friendly to broadcast => no TLS, Object security
but: are we really going to broadcast a (relatively large) firmware?


# in Section 3.4:

"the device is required to provide a minimum of two storage locations for
firmware and one bootable location for firmware."

Is reliability possible only with this approach?
This seems out of scope of the generic architecture.


# in Section 3.5:
How about rephrasing like:
"The approach must not require a large bootloader"


# in Section 3.6
Here I think the draft should reference examples of what "existing firmware
formats" are alluded to.
In my opinion, this section could be removed for two reasons:
1. because the metadata is anyways separate from the actual firmware,
2. the software might not be firmware, but just a software module (as per
my comment above)


# in Section 3.7
I would suggest to have this document focus primarily on single MCU devices.
Ideally: extensions to cover multi-firmware devices would either be in a
later part of the document or in a separate document.

At this point in the document it is obscure what the distinctions are
between:
Author, Store, Apply, Approve, Qualify

# in Section 4:
How about being more assertive here, such as:

The firmware image MAY be encrypted and MUST be integrity protected AS WELL
AS AUTHENTICATED/AUTHORIZED.
The meta-data MUST integrity protected and AUTHENTICATED.


# in Section 5:

   -  When should the device apply the update?
   out of scope?

   -  How should the device apply the update?
   out of scope?

   -  What kind of firmware binary is it?
   is this different from the question "should it apply the firmware"?

   -  Where should the update be obtained?
   if we are not making the assumption that metadata and firmware are
stored in difference places, is this redundant?

   -  Where should the firmware be stored?
   out of scope?


# in Section 6:
"information about when the firmware update has to be applied".
I guess the default should be "as soon as possible".
However, in cases when the time is no synchronized, I'm wondering how the
device
could interpret this "when" indication.



# in Section 7:

Typically the author will produce/transfer a new firmware and its
(manifest) metadata in one go.
In practice, firmware and manifest might even be bundled in a single file
(?).
Hence I would suggest to invert the order of the steps "Upload Firmware"
 and "Create Manifest".

--f403043649d45e4caa0554afdfdf
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi everyone,<div><br></div><div>thanks for the draft.=C2=
=A0<br></div><div><br></div><div>to prepare tomorrow&#39;s meeting, I read =
the drafts as fast as I could ( I hope note too fast ;)</div><div><br></div=
><div><div>It reads well already, and it is actually pretty close to what</=
div><div>we are doing in RIOT.</div><div><br></div><div>See below some comm=
ents, questions and suggestions.</div><div><br></div><div>=3D=3D=3D=3D=3D</=
div><div>General comments:</div><div>=3D=3D=3D=3D=3D</div><div><br></div><d=
iv>1. In the proposed architecture some trust is required in the storage el=
ement, which is assumed to correctly:</div><div>- serve the latest manifest=
/firmware (if the device pulls)</div><div>- pushe/signal newer manifests to=
 the device (if the author pushes)</div><div><br></div><div>2. What is spec=
ific to firmware in the document so far?</div><div>It seems to me that this=
 could apply to any software module on an IoT device, not necessarily a fir=
mware.</div><div>For instance it could be &quot;application&quot; logic (We=
 have use cases where we are updating some software, but not the firmware).=
</div><div>Why not generalize somehow the terminology to something more gen=
eric like &quot;software update&quot; or something similar?</div><div><br><=
/div><div><br></div><div>=3D=3D=3D=3D=3D</div><div>Some more detailed comme=
nts:</div><div>=3D=3D=3D=3D=3D</div><div><br></div><div># in Section 3:=C2=
=A0</div><div>why/how/what small bootloader?</div><div><br></div><div>why/h=
ow friendly to broadcast =3D&gt; no TLS, Object security</div><div>but: are=
 we really going to broadcast a (relatively large) firmware?</div><div><br>=
</div><div><br></div><div># in Section 3.4:</div><div><br></div><div>&quot;=
the device is required to provide a minimum of two storage locations for</d=
iv><div>firmware and one bootable location for firmware.&quot;</div><div><b=
r></div><div>Is reliability possible only with this approach?</div><div>Thi=
s seems out of scope of the generic architecture.</div><div><br></div><div>=
<br></div><div># in Section 3.5:</div><div>How about rephrasing like:</div>=
<div>&quot;The approach must not require a large bootloader&quot;</div><div=
><br></div><div><br></div><div># in Section 3.6</div><div>Here I think the =
draft should reference examples of what &quot;existing firmware formats&quo=
t; are alluded to.</div><div>In my opinion, this section could be removed f=
or two reasons:</div><div>1. because the metadata is anyways separate from =
the actual firmware,</div><div>2. the software might not be firmware, but j=
ust a software module (as per my comment above)</div><div><br></div><div><b=
r></div><div># in Section 3.7</div><div>I would suggest to have this docume=
nt focus primarily on single MCU devices.</div><div>Ideally: extensions to =
cover multi-firmware devices would either be in a later part of the documen=
t or in a separate document.</div><div><br></div><div>At this point in the =
document it is obscure what the distinctions are between:</div><div>Author,=
 Store, Apply, Approve, Qualify</div><div><br></div><div># in Section 4:</d=
iv><div>How about being more assertive here, such as:</div><div><br></div><=
div>The firmware image MAY be encrypted and MUST be integrity protected AS =
WELL AS AUTHENTICATED/AUTHORIZED.</div><div>The meta-data MUST integrity pr=
otected and AUTHENTICATED.</div><div><br></div><div><br></div><div># in Sec=
tion 5:</div><div><br></div><div>=C2=A0 =C2=A0- =C2=A0When should the devic=
e apply the update?</div><div>=C2=A0 =C2=A0out of scope?</div><div>=C2=A0 =
=C2=A0</div><div>=C2=A0 =C2=A0- =C2=A0How should the device apply the updat=
e?</div><div>=C2=A0 =C2=A0out of scope?</div><div>=C2=A0 =C2=A0</div><div>=
=C2=A0 =C2=A0- =C2=A0What kind of firmware binary is it?</div><div>=C2=A0 =
=C2=A0is this different from the question &quot;should it apply the firmwar=
e&quot;?</div><div>=C2=A0 =C2=A0</div><div>=C2=A0 =C2=A0- =C2=A0Where shoul=
d the update be obtained?</div><div>=C2=A0 =C2=A0if we are not making the a=
ssumption that metadata and firmware are stored in difference places, is th=
is redundant?</div><div>=C2=A0 =C2=A0</div><div>=C2=A0 =C2=A0- =C2=A0Where =
should the firmware be stored?</div><div>=C2=A0 =C2=A0out of scope?</div><d=
iv>=C2=A0 =C2=A0</div><div>=C2=A0 =C2=A0</div><div># in Section 6:</div><di=
v>&quot;information about when the firmware update has to be applied&quot;.=
</div><div>I guess the default should be &quot;as soon as possible&quot;.</=
div><div>However, in cases when the time is no synchronized, I&#39;m wonder=
ing how the device</div><div>could interpret this &quot;when&quot; indicati=
on.</div><div><br></div><div><br></div><div><br></div><div># in Section 7:<=
/div><div><br></div><div>Typically the author will produce/transfer a new f=
irmware and its (manifest) metadata in one go.</div><div>In practice, firmw=
are and manifest might even be bundled in a single file (?).</div><div>Henc=
e I would suggest to invert the order of the steps &quot;Upload Firmware&qu=
ot; =C2=A0and &quot;Create Manifest&quot;.</div><div><br></div><div><br></d=
iv><div><br></div></div></div>

--f403043649d45e4caa0554afdfdf--


From nobody Wed Jul 19 11:37:16 2017
Return-Path: <emmanuel.baccelli@gmail.com>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 18C9812EAB0 for <fud@ietfa.amsl.com>; Wed, 19 Jul 2017 11:37:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.698
X-Spam-Level: 
X-Spam-Status: No, score=-1.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.199, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K3fQ2Vbsejeg for <fud@ietfa.amsl.com>; Wed, 19 Jul 2017 11:37:13 -0700 (PDT)
Received: from mail-ua0-x22a.google.com (mail-ua0-x22a.google.com [IPv6:2607:f8b0:400c:c08::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 40F7412711E for <fud@ietf.org>; Wed, 19 Jul 2017 11:37:13 -0700 (PDT)
Received: by mail-ua0-x22a.google.com with SMTP id f9so6190874uaf.4 for <fud@ietf.org>; Wed, 19 Jul 2017 11:37:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:sender:from:date:message-id:subject:to; bh=cF7qi5TggVqLn6KlJiscloE7Y+4qtihcmiQ4ReEgU5A=; b=Vw9y9qx8vYMXKySp5YUKgJRsqH1UN8gGmI+q1tQVfaQHqOcJRYUbS5GFq8Z8RVgs8v /pqoi0rORcH5MMOioBK5nSm9TcHNIySWVCo8vLQ5zPO2uM+tGug9/1fL0m3LQw5UvHuH K/MaCwnH6RCy3K5lZv0mBZYfGqJtPbo4hraU7XrZcSUxJM/IUDYYeSLSrqNJa1GnBCTq NZVianMeeWwFJRM963eOGfSOYnZuqyT2WIWRSyAeYQhleVyMXCR6Mzv8fAm3SbkdUm1G SNXWjeY0RrSUf2wLpdUZprITiGd3Bl01TCZNOsPbzHzsn5NrxI4Qhp//xeUqUjZUL7By 3sQA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:from:date:message-id:subject :to; bh=cF7qi5TggVqLn6KlJiscloE7Y+4qtihcmiQ4ReEgU5A=; b=IOnw/ha0Q/2F2ipw/BDOxybRU5awsvmGIhZuPotOuoVVkSXn4OF7SU7A2uDCQgXXRB Jzx5kfRjtjCA3goAhYNA13mWPl2fAM7FoSJFcPvac9KoDX5Y+aiL5MwuVDJyqWsno993 zLj0s18sT5WfN7SfbfKCslxlsWJOuTLr4QgmcnVk8aM9pt67ce6GPzFnDnkBpdHsDgf4 FS5R/1ORipNinsJblQVQMYclDFkeLMK/OSPCSEAUAgOKiehUGCwSkpfnsHXByjqzxM8T wxslDyLI0R7S6mWh73QTj6cvYesQVbMQqBfcsem5WrNF+HKA74bwSb7c7CYVlcCrGW1J XRXQ==
X-Gm-Message-State: AIVw112DlTTCYCjGtTRtQR+gfpAOyjMXCdRFGXIUS8dLC49QlcOeu70Q nxTaJjmTQ8AQ6CP6Kr3rXRqmBDcaAyjL
X-Received: by 10.176.94.131 with SMTP id y3mr539633uag.21.1500489432120; Wed, 19 Jul 2017 11:37:12 -0700 (PDT)
MIME-Version: 1.0
Sender: emmanuel.baccelli@gmail.com
Received: by 10.176.76.211 with HTTP; Wed, 19 Jul 2017 11:36:51 -0700 (PDT)
From: Emmanuel Baccelli <Emmanuel.Baccelli@inria.fr>
Date: Wed, 19 Jul 2017 20:36:51 +0200
X-Google-Sender-Auth: hLnnaRACmQ2GtJeRw1lp9T8zZu0
Message-ID: <CANK0pbYZnHyrDp_KoWp3xhtXmMGpUwHrWhmatgnsVRhdqpY8qw@mail.gmail.com>
To: fud@ietf.org
Content-Type: multipart/alternative; boundary="f403043c51c097438c0554afeb25"
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/MMNkNWGGpF30BLqGxKDnTbtYzBU>
Subject: [Fud] initial comments on draft-moran-fud-manifest-00
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jul 2017 18:37:15 -0000

--f403043c51c097438c0554afeb25
Content-Type: text/plain; charset="UTF-8"

Hi again,

another quick review heading towards tomorrow.

Do you have an open source implementation of this somewhere,
running on IoT devices?
If so, could you point us to this code, and tell us which devices you
tested this on?

See below some comments, questions and suggestions.

=====
General comments:
=====

Let's make sure that a minimalistic version of the manifest format is
applicable
easily to low-end IoT devices:
 - class 1 devices (RFC7228) with a single MCU,
 - very low bandwidth network connection,
 - may not have an "interoperable" notion of absolute time,
 - ...

As additional reference points, let's also look out the (work-in-progress)
metadata format
of RIOT images [1], and of MCUBoot images [2] which
In particular, the whole metadata of a RIOT image fits in less than 200
bytes.
A nice goal could thus be that we aim to fit a minimal (but compliant)
format
of the manifest within 256bytes.


[1] RIOT Image Metadata (work in progress)
https://github.com/RIOT-OS/RIOT/wiki/%5BWIP%5D-Draft-RIOT-Image-Metadata
[2] MCUBoot Image Metadata (work in progress)
https://github.com/runtimeco/mcuboot/blob/master/doc/design.txt

=====
Some more detailed comments:
=====

# In section 3.1

timestamp:
If we want to cover the cases when the device has no notion of "now",
(i.e. is not time-synchronized with the author/server/storage)
the device will only be able to interpret this field as some kind of
sequence number. This does not bringing much more information compared to
the version number field.
In particular, I'm wondering why the timestamp actually protects from
downgrade attacks:
I suppose we trust that newer software will have newer version numbers.
Is it to cover the case when the version number "wraps around"?


# In section 3.2

I would suggest we add the format type "script".
We have use cases where modules might be scripts.

nonce:
I'm not sure the case of "producing manifests too quickly" with the same
time-stamp
is realistic.
Even if it was, since a nonce is random, the nonce would not help to decide
which
firmware is newer.
However, we could assume that the version number would be lexicographically
greater
in the newest firmware.
Hence, I am unsure what is the function of the nonce.

storageIdentifier:
as per my comments to the architecture draft, I suggest we focus first on
the case
where there is only one MCU.
Should this field be optional?



# In section 3.3

"Apply an update only to devices that match the vendorId, classId, deviceId
attributes"
is this condition not necessary in all cases?

Conditions on absolute time:
see my above comments on absolute time, and time synchronization
requirements that might
not be met in low-end IoT devices.

# In section 3.4

Here again I propose to focus on single MCU cases first.

# In section 3.5.2

make it optional?

# In section 4.

Do you have an estimate as how many bytes this is over the air for the
manifest?

--f403043c51c097438c0554afeb25
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi again,<div><br></div><div>another quick review heading =
towards tomorrow.</div><div><br></div><div><div>Do you have an open source =
implementation of this somewhere,</div><div>running on IoT devices?</div><d=
iv>If so, could you point us to this code, and tell us which devices you te=
sted this on?</div><div><br></div><div>See below some comments, questions a=
nd suggestions.</div><div><br></div><div>=3D=3D=3D=3D=3D</div><div>General =
comments:</div><div>=3D=3D=3D=3D=3D</div><div><br></div><div>Let&#39;s make=
 sure that a minimalistic version of the manifest format is applicable</div=
><div>easily to low-end IoT devices:</div><div>=C2=A0- class 1 devices (RFC=
7228) with a single MCU,=C2=A0</div><div>=C2=A0- very low bandwidth network=
 connection,</div><div>=C2=A0- may not have an &quot;interoperable&quot; no=
tion of absolute time,</div><div>=C2=A0- ...</div><div><br></div><div>As ad=
ditional reference points, let&#39;s also look out the (work-in-progress) m=
etadata format</div><div>of RIOT images [1], and of MCUBoot images [2] whic=
h</div><div>In particular, the whole metadata of a RIOT image fits in less =
than 200 bytes.</div><div>A nice goal could thus be that we aim to fit a mi=
nimal (but compliant) format</div><div>of the manifest within 256bytes.</di=
v><div><br></div><div><br></div><div>[1] RIOT Image Metadata (work in progr=
ess) <a href=3D"https://github.com/RIOT-OS/RIOT/wiki/%5BWIP%5D-Draft-RIOT-I=
mage-Metadata">https://github.com/RIOT-OS/RIOT/wiki/%5BWIP%5D-Draft-RIOT-Im=
age-Metadata</a></div><div>[2] MCUBoot Image Metadata (work in progress) <a=
 href=3D"https://github.com/runtimeco/mcuboot/blob/master/doc/design.txt">h=
ttps://github.com/runtimeco/mcuboot/blob/master/doc/design.txt</a></div><di=
v><br></div><div>=3D=3D=3D=3D=3D</div><div>Some more detailed comments:</di=
v><div>=3D=3D=3D=3D=3D</div><div><br></div><div># In section 3.1</div><div>=
<br></div><div>timestamp:=C2=A0</div><div>If we want to cover the cases whe=
n the device has no notion of &quot;now&quot;,</div><div>(i.e. is not time-=
synchronized with the author/server/storage)</div><div>the device will only=
 be able to interpret this field as some kind of=C2=A0</div><div>sequence n=
umber. This does not bringing much more information compared to the version=
 number field.</div><div>In particular, I&#39;m wondering why the timestamp=
 actually protects from downgrade attacks:</div><div>I suppose we trust tha=
t newer software will have newer version numbers.</div><div>Is it to cover =
the case when the version number &quot;wraps around&quot;?</div><div><br></=
div><div><br></div><div># In section 3.2</div><div><br></div><div>I would s=
uggest we add the format type &quot;script&quot;.=C2=A0</div><div>We have u=
se cases where modules might be scripts.</div><div><br></div><div>nonce:</d=
iv><div>I&#39;m not sure the case of &quot;producing manifests too quickly&=
quot; with the same time-stamp</div><div>is realistic.=C2=A0</div><div>Even=
 if it was, since a nonce is random, the nonce would not help to decide whi=
ch</div><div>firmware is newer.</div><div>However, we could assume that the=
 version number would be lexicographically greater</div><div>in the newest =
firmware.</div><div>Hence, I am unsure what is the function of the nonce.</=
div><div><br></div><div>storageIdentifier:</div><div>as per my comments to =
the architecture draft, I suggest we focus first on the case</div><div>wher=
e there is only one MCU.</div><div>Should this field be optional?</div><div=
><br></div><div><br></div><div><br></div><div># In section 3.3</div><div><b=
r></div><div>&quot;Apply an update only to devices that match the vendorId,=
 classId, deviceId attributes&quot;</div><div>is this condition not necessa=
ry in all cases?</div><div><br></div><div>Conditions on absolute time:</div=
><div>see my above comments on absolute time, and time synchronization requ=
irements that might</div><div>not be met in low-end IoT devices.</div><div>=
<br></div><div># In section 3.4</div><div><br></div><div>Here again I propo=
se to focus on single MCU cases first.</div><div><br></div><div># In sectio=
n 3.5.2</div><div><br></div><div>make it optional?</div><div><br></div><div=
># In section 4.</div><div><br></div><div>Do you have an estimate as how ma=
ny bytes this is over the air for the manifest?</div></div></div>

--f403043c51c097438c0554afeb25--


From tk47@nyu.edu  Wed Jul 19 11:39:45 2017
Return-Path: <tk47@nyu.edu>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5EC73131B3E for <fud@ietfa.amsl.com>; Wed, 19 Jul 2017 11:39:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=nyu-edu.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GuypnKIiqfG2 for <fud@ietfa.amsl.com>; Wed, 19 Jul 2017 11:39:41 -0700 (PDT)
Received: from mail-io0-x230.google.com (mail-io0-x230.google.com [IPv6:2607:f8b0:4001:c06::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 60E4A131BAC for <fud@ietf.org>; Wed, 19 Jul 2017 11:39:37 -0700 (PDT)
Received: by mail-io0-x230.google.com with SMTP id 5so3753699iow.0 for <fud@ietf.org>; Wed, 19 Jul 2017 11:39:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nyu-edu.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=hfMUGt7TxKTPuJAE1Vd99h/FJd4TBZwaJqh6zVrY6A0=; b=VkzTY6FvKx2wE6grj3GE7J+VTLBHEMzLQTkctojXGYYUGF7NL1EtqJXPZcdMFF9pcj Pro0e0EOgdjlDe6bcARvRIPuiYpaNAaxRbyXow7FWlygci3ALpFuRLX8tuVVE7+ft1cV GREIK9ITkqgKyzUWwXolOJ49nEIFW/CL1kmih2dmKNLncoJ2XAi4V9HsCr9DUodbnqkV 1c0SwUg96eqgNdVVs42+Z9AIl2woCYQtmlosaIlUh6d4JN28ZU/BjRgX5FcGWeM0UAIU Cc4O5JNHSykso+tyN5nh01PyxSKKVqPnoTQNwtVXT3AqSfAm2HLlFM2e+GDaJonl6kix U1hA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=hfMUGt7TxKTPuJAE1Vd99h/FJd4TBZwaJqh6zVrY6A0=; b=O2s3x9dmPdU3AlbAy0CfGiPCfLGPSaTbARRhWNoPk0JTfEEWCA9ECtVyBed/oiO1MS UN4R+4reN+Ol9daiKv/hTnz3NLs51+29KTn15JUoxtwnHE7akKSY7opwOjvRi4FUQK7L mjgouCz4vdLSazVu/atk83xnVEwPJ+yQDcOY7n2qspD6uww3YsldQkGROce02E/304vu dScLBoy3snvyRJWVVse8cWPKR5G6WZCVxWdUB5KZjv+9Ms9j8ntyAZbjsRYQZTN5DURn 2BsWuwkwb1amTMuqgJbuCHr5BevKLLgt0V/HIGydz5kKcD/PRwg9cpaiHzZ6liXFpsCo Oa9Q==
X-Gm-Message-State: AIVw113AwsR4+pcamfx8q8mMtv1tRit1YCOPMdXsSjQPFG7fKEFY1ku1 zPhZ+wJpxy/QZh1gtE5G0IZMGxA4w1JfbKOf8g==
X-Received: by 10.107.46.230 with SMTP id u99mr1203377iou.52.1500489576606; Wed, 19 Jul 2017 11:39:36 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.79.34.39 with HTTP; Wed, 19 Jul 2017 11:38:56 -0700 (PDT)
In-Reply-To: <7081cb17-2e39-1351-ae39-bcc31378b8b1@sit.fraunhofer.de>
References: <VI1PR0801MB2717EBEB0B4401C2E8C795D4FAA10@VI1PR0801MB2717.eurprd08.prod.outlook.com> <7081cb17-2e39-1351-ae39-bcc31378b8b1@sit.fraunhofer.de>
From: Trishank Karthik Kuppusamy <trishank@nyu.edu>
Date: Wed, 19 Jul 2017 14:38:56 -0400
Message-ID: <CAJa2m-pFAix3YHCCpxYHRF=AyXHfiSQXz_TJfGsaZ-OwcQuBew@mail.gmail.com>
To: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Cc: fud@ietf.org, Justin Cappos <jcappos@nyu.edu>, Shikhar Sakhuja <ss9131@nyu.edu>, Ariella C Feuchtwanger <acf469@nyu.edu>
Content-Type: multipart/alternative; boundary="001a11c16a9633ff470554aff4fb"
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/w7dAM-V68ysN1-yKKrpmmV5nYU8>
Subject: Re: [Fud] FUD Side Meeting @ Prague IETF
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 19 Jul 2017 18:41:00 -0000

--001a11c16a9633ff470554aff4fb
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hello everyone,

We're from The Update Framework (TUF) project [
https://theupdateframework.github.io/], where we are concerned with
attackers who compromise the software repository used to host and
distribute software updates, and thus distribute and install malware onto
millions of devices at once.

Would it be possible for us to join this meeting remotely? We are in the
EST time zone. Thanks in advance!

Regards,
Trishank

On Wed, Jul 19, 2017 at 5:13 AM, Henk Birkholz <
henk.birkholz@sit.fraunhofer.de> wrote:

> Hello FUD'ler,
>
> again I am sorry that I cannot join, but I am in a session where I have 3
> presentation at that time.
>
> If you actually deciding to meeting at this session slot, I would like to
> ask you to have a extensive look at:
>
> https://tools.ietf.org/html/draft-ietf-sacm-coswid-02#page-14
>>
>
> "CoSWID Attributes for Firmware "
>
> There is a resource description type for firmware that can even include
> the corresponding firmware and act as a transport container. It - of cour=
se
> -  includes the complete expressiveness of ISO-19770-2:2015 and is
> therefore inter-operable in regard to the corresponding metadata that
> overlaps with "normal software" and can be processed by any system that
> already understands the semantics of ISO SWID documents.
>
> Viele Gr=C3=BC=C3=9Fe,
>
> Henk
>
>
> On 07/18/2017 05:26 PM, Hannes Tschofenig wrote:
>
>> Hi all,
>>
>> I have been asked by a few IETF participants whether we should get
>> together this week to talk about firmware updates for IoT devices (as a
>> follow-up of what we did at the Chicago IETF meeting).
>>
>> I am proposing to meet Thursday, 9:30am in the Istanbul room (at the L
>> level). I have reserved the room till 12:00.
>>
>> Ciao
>>
>> Hannes
>>
>> IMPORTANT NOTICE: The contents of this email and any attachments are
>> confidential and may also be privileged. If you are not the intended
>> recipient, please notify the sender immediately and do not disclose the
>> contents to any other person, use it for any purpose, or store or copy t=
he
>> information in any medium. Thank you.
>>
>>
>> _______________________________________________
>> Fud mailing list
>> Fud@ietf.org
>> https://www.ietf.org/mailman/listinfo/fud
>>
>>
> _______________________________________________
> Fud mailing list
> Fud@ietf.org
> https://www.ietf.org/mailman/listinfo/fud
>

--001a11c16a9633ff470554aff4fb
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hello everyone,<div><br></div><div>We&#39;re from The Upda=
te Framework (TUF) project [<a href=3D"https://theupdateframework.github.io=
/">https://theupdateframework.github.io/</a>], where we are concerned with =
attackers who compromise the software repository used to host and distribut=
e software updates, and thus distribute and install malware onto millions o=
f devices at once.</div><div><br></div><div>Would it be possible for us to =
join this meeting remotely? We are in the EST time zone. Thanks in advance!=
</div><div><br></div><div>Regards,</div><div>Trishank</div></div><div class=
=3D"gmail_extra"><br><div class=3D"gmail_quote">On Wed, Jul 19, 2017 at 5:1=
3 AM, Henk Birkholz <span dir=3D"ltr">&lt;<a href=3D"mailto:henk.birkholz@s=
it.fraunhofer.de" target=3D"_blank">henk.birkholz@sit.fraunhofer.de</a>&gt;=
</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .=
8ex;border-left:1px #ccc solid;padding-left:1ex">Hello FUD&#39;ler,<br>
<br>
again I am sorry that I cannot join, but I am in a session where I have 3 p=
resentation at that time.<br>
<br>
If you actually deciding to meeting at this session slot, I would like to a=
sk you to have a extensive look at:<br>
<br>
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">
<a href=3D"https://tools.ietf.org/html/draft-ietf-sacm-coswid-02#page-14" r=
el=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/dr<wbr>aft-=
ietf-sacm-coswid-02#page-<wbr>14</a><br>
</blockquote>
<br>
&quot;CoSWID Attributes for Firmware &quot;<br>
<br>
There is a resource description type for firmware that can even include the=
 corresponding firmware and act as a transport container. It - of course -=
=C2=A0 includes the complete expressiveness of ISO-19770-2:2015 and is ther=
efore inter-operable in regard to the corresponding metadata that overlaps =
with &quot;normal software&quot; and can be processed by any system that al=
ready understands the semantics of ISO SWID documents.<br>
<br>
Viele Gr=C3=BC=C3=9Fe,<br>
<br>
Henk<div><div class=3D"h5"><br>
<br>
On 07/18/2017 05:26 PM, Hannes Tschofenig wrote:<br>
</div></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bo=
rder-left:1px #ccc solid;padding-left:1ex"><div><div class=3D"h5">
Hi all,<br>
<br>
I have been asked by a few IETF participants whether we should get together=
 this week to talk about firmware updates for IoT devices (as a follow-up o=
f what we did at the Chicago IETF meeting).<br>
<br>
I am proposing to meet Thursday, 9:30am in the Istanbul room (at the L leve=
l). I have reserved the room till 12:00.<br>
<br>
Ciao<br>
<br>
Hannes<br>
<br>
IMPORTANT NOTICE: The contents of this email and any attachments are confid=
ential and may also be privileged. If you are not the intended recipient, p=
lease notify the sender immediately and do not disclose the contents to any=
 other person, use it for any purpose, or store or copy the information in =
any medium. Thank you.<br>
<br>
<br></div></div><span class=3D"">
______________________________<wbr>_________________<br>
Fud mailing list<br>
<a href=3D"mailto:Fud@ietf.org" target=3D"_blank">Fud@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/fud" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/fud</a><br>
<br>
</span></blockquote><div class=3D"HOEnZb"><div class=3D"h5">
<br>
______________________________<wbr>_________________<br>
Fud mailing list<br>
<a href=3D"mailto:Fud@ietf.org" target=3D"_blank">Fud@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/fud" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/fud</a><br>
</div></div></blockquote></div><br></div>

--001a11c16a9633ff470554aff4fb--


From nobody Thu Jul 20 00:42:56 2017
Return-Path: <olshansky@isoc.org>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 32A62126557 for <fud@ietfa.amsl.com>; Thu, 20 Jul 2017 00:42:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.021
X-Spam-Level: 
X-Spam-Status: No, score=-2.021 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=isoc.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WHLw9q9Ye2V8 for <fud@ietfa.amsl.com>; Thu, 20 Jul 2017 00:42:53 -0700 (PDT)
Received: from NAM02-CY1-obe.outbound.protection.outlook.com (mail-cys01nam02on0060.outbound.protection.outlook.com [104.47.37.60]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C7689126B72 for <fud@ietf.org>; Thu, 20 Jul 2017 00:42:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=isoc.org; s=selector1;  h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=QllRkxE5j8mPbUZIdHu792e9eXrqiZ5w/DSQcuidTJQ=; b=ZNRDTlAuHluEsfglhdcZDMDt7PE7F/QepA6NWJNMXo9Xs27sqz6hBcHN8sjMH0NpbTsZmXw1ELaHaVgOAQjSDsgby15llMIW7phfX24+ra1FW0Ur5ePICEzApEHseYwjnynIBn5gwk9cVdqptC6SEm55zqPcFe6JdC2A2LeRBlo=
Received: from MWHPR06MB3181.namprd06.prod.outlook.com (10.174.248.143) by MWHPR06MB3184.namprd06.prod.outlook.com (10.174.248.146) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1261.13; Thu, 20 Jul 2017 07:42:52 +0000
Received: from MWHPR06MB3181.namprd06.prod.outlook.com ([10.174.248.143]) by MWHPR06MB3181.namprd06.prod.outlook.com ([10.174.248.143]) with mapi id 15.01.1261.024; Thu, 20 Jul 2017 07:42:52 +0000
From: Steve Olshansky <olshansky@isoc.org>
To: "fud@ietf.org" <fud@ietf.org>
Thread-Topic: (US NTIA) Multistakeholder Process; Internet of Things (IoT) Security Upgradability and Patching 
Thread-Index: AQHTASvKsx5+nDZgfUCkI0DSihpT6Q==
Date: Thu, 20 Jul 2017 07:42:51 +0000
Message-ID: <MWHPR06MB3181B6174EBC153A92C7D897CEA70@MWHPR06MB3181.namprd06.prod.outlook.com>
References: <mailman.2688.1500489230.4234.fud@ietf.org>
In-Reply-To: <mailman.2688.1500489230.4234.fud@ietf.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=isoc.org;
x-originating-ip: [159.203.162.118]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; MWHPR06MB3184; 7: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
x-ms-office365-filtering-correlation-id: 76d8a9fc-70e0-4fdf-e432-08d4cf42ed3b
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(300000503095)(300135400095)(2017052603031)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:MWHPR06MB3184; 
x-ms-traffictypediagnostic: MWHPR06MB3184:
x-exchange-antispam-report-test: UriScan:(151999592597050)(236129657087228)(192374486261705)(48057245064654); 
x-microsoft-antispam-prvs: <MWHPR06MB318476CEF58E8DB7ABC64ED1CEA70@MWHPR06MB3184.namprd06.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(5005006)(8121501046)(2017060910075)(93006095)(93001095)(100000703101)(100105400095)(10201501046)(3002001)(6041248)(20161123555025)(20161123558100)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123560025)(20161123562025)(20161123564025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:MWHPR06MB3184; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:MWHPR06MB3184; 
x-forefront-prvs: 0374433C81
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(6009001)(39450400003)(39830400002)(39410400002)(39400400002)(81166006)(74316002)(33656002)(6916009)(54356999)(102836003)(6116002)(76176999)(50986999)(3846002)(189998001)(5640700003)(6506006)(2950100002)(55016002)(6436002)(38730400002)(19627405001)(25786009)(2351001)(6606003)(110136004)(53936002)(2900100001)(77096006)(99286003)(2906002)(966005)(6306002)(3280700002)(8936002)(54896002)(14454004)(478600001)(86362001)(9686003)(1730700003)(3660700001)(8676002)(5660300001)(4743002)(7736002)(7696004)(15650500001)(2501003)(66066001); DIR:OUT; SFP:1101; SCL:1; SRVR:MWHPR06MB3184; H:MWHPR06MB3181.namprd06.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en; 
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_MWHPR06MB3181B6174EBC153A92C7D897CEA70MWHPR06MB3181namp_"
MIME-Version: 1.0
X-OriginatorOrg: isoc.org
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Jul 2017 07:42:51.8967 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 89f84dfb-7285-4810-bc4d-8b9b5794554f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR06MB3184
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/niTGdTRmjE_CqeN4Zp62suZac84>
Subject: [Fud] (US NTIA) Multistakeholder Process; Internet of Things (IoT) Security Upgradability and Patching
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jul 2017 07:42:55 -0000

--_000_MWHPR06MB3181B6174EBC153A92C7D897CEA70MWHPR06MB3181namp_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

For anyone interested, in case you were not aware:
https://www.ntia.doc.gov/other-publication/2016/multistakeholder-process-io=
t-security

They  are very open to participation from anyone interested, including  out=
side the US. I am happy to make an introduction to the fellow leading  this=
 effort - Allan Friedman (Director of Cybersecurity Initiatives,  NTIA Offi=
ce of Policy Analysis and Development), but feel free to reach  out on your=
 own to get involved or to learn more.

Their past meetings are archived and notes are posted.
     Steve



--

Steve Olshansky
Internet Technology Program Manager
Internet Society
www.internetsociety.org

--_000_MWHPR06MB3181B6174EBC153A92C7D897CEA70MWHPR06MB3181namp_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<style type=3D"text/css" style=3D"display:none;"><!-- P {margin-top:0;margi=
n-bottom:0;} --></style>
</head>
<body dir=3D"ltr">
<div id=3D"divtagdefaultwrapper" style=3D"font-size:12pt;color:#000000;font=
-family:Calibri,Helvetica,sans-serif;" dir=3D"ltr">
<p></p>
<div>For anyone interested, in case you were not aware:<br>
https://www.ntia.doc.gov/other-publication/2016/multistakeholder-process-io=
t-security<br>
<br>
They&nbsp; are very open to participation from anyone interested, including=
&nbsp; outside the US. I am happy to make an introduction to the fellow lea=
ding&nbsp; this effort - Allan Friedman (Director of Cybersecurity Initiati=
ves,&nbsp; NTIA Office of Policy&nbsp;Analysis and Development),
 but feel free to reach&nbsp; out on your own to get involved or to learn m=
ore.<br>
<br>
Their past meetings are archived and notes are posted.<br>
&nbsp;&nbsp;&nbsp;&nbsp; Steve</div>
<br>
<p></p>
<p><br>
</p>
<div id=3D"Signature">
<div id=3D"divtagdefaultwrapper" dir=3D"ltr" style=3D"font-size: 12pt; colo=
r: rgb(0, 0, 0); background-color: rgb(255, 255, 255); font-family: Calibri=
,Arial,Helvetica,sans-serif,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&q=
uot;,&quot;Segoe UI Emoji&quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,=
&quot;Android Emoji&quot;,EmojiSymbols;">
<p class=3D"p1">--<br>
</p>
<p class=3D"p1"></p>
<div>Steve Olshansky</div>
<div>Internet Technology Program Manager</div>
<div>Internet Society</div>
<div>www.internetsociety.org</div>
<p></p>
</div>
</div>
</div>
</body>
</html>

--_000_MWHPR06MB3181B6174EBC153A92C7D897CEA70MWHPR06MB3181namp_--


From nobody Thu Jul 20 05:41:26 2017
Return-Path: <emmanuel.baccelli@gmail.com>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 111DD1317D5 for <fud@ietfa.amsl.com>; Thu, 20 Jul 2017 05:41:25 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.699
X-Spam-Level: 
X-Spam-Status: No, score=-1.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.199, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z7FYyEua3cc4 for <fud@ietfa.amsl.com>; Thu, 20 Jul 2017 05:41:24 -0700 (PDT)
Received: from mail-ua0-x22c.google.com (mail-ua0-x22c.google.com [IPv6:2607:f8b0:400c:c08::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0032D131771 for <fud@ietf.org>; Thu, 20 Jul 2017 05:41:23 -0700 (PDT)
Received: by mail-ua0-x22c.google.com with SMTP id 80so21980816uas.0 for <fud@ietf.org>; Thu, 20 Jul 2017 05:41:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:sender:from:date:message-id:subject:to; bh=Eeywr+q6jnNHCx4DnJqRHCxz62iPjy3dW3MUMFINLVo=; b=nRILeqQO0UE3tAx9DuGP81JFutoDSQzeenKubpHjsbvmdYUbE7LtXetBBlCzxkLBVi XbP8HhEoS3GQGnipYoATXQWotTpDaKc8dESn8HdjSNk7QAqasvfyI95bGPimKo//5j10 HXYNkpznFGXqg68Szn4vwRvVntfAV86QT7GlWoUz6jxajqCUcZHjH6Lak5qe0o2diYOT Gtm26oLdt4FTkGIW4VdumT6xcB2tnoFxrkdNMPY35msqyYdOn7oXxrYVLx/zOXacljDn 8xF5DJnhQ9sWrB0cTlZuQG6sthFmyJ0uqoApX3LVwhCsn2kSJ7fGnaK0S2shTy/LhEdZ Y6Lw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:from:date:message-id:subject :to; bh=Eeywr+q6jnNHCx4DnJqRHCxz62iPjy3dW3MUMFINLVo=; b=gM9fNuXz0/Z6h0BS5qRSQL15kIg4+OC9PJ9yQXGcp3lhTNLxp0CXZXkI9gGeUwJtrF qHvccq61AfBk416cfG9iwQL0BVxqWpS3dLoTq9cbQ6VjBVzPg85MikV6nZnyvCc2A3rN HF+UUK3ifXPTeTaVszGw/y5vvLAsvs8UCsGcnGof+35/R+dFzF/2r069fVzd8NFlvUZo jrihUpVt4kZhxjl8SWs7ofV1GaT79U0Rzau6KRNBb0JhiPSEX4yZmTQ8jWuN6KnGdnka h5AJPudQOYadfBBjS000rYZh0Fd3Wo3yYUxvYiii/vPRSDgtqxEgeQbEvHsS3nLiC+Ih AQsg==
X-Gm-Message-State: AIVw112bUqkZ2J8T+ZJVV9Z4uWUnxUYdbxgGKWj6qgtIybm8cJ9ywF3A tb+pp1fFfrEoj6b9Aco41n5WGNA4jQ==
X-Received: by 10.31.86.70 with SMTP id k67mr1929406vkb.112.1500554483029; Thu, 20 Jul 2017 05:41:23 -0700 (PDT)
MIME-Version: 1.0
Sender: emmanuel.baccelli@gmail.com
Received: by 10.176.76.211 with HTTP; Thu, 20 Jul 2017 05:41:02 -0700 (PDT)
From: Emmanuel Baccelli <Emmanuel.Baccelli@inria.fr>
Date: Thu, 20 Jul 2017 14:41:02 +0200
X-Google-Sender-Auth: vKS-RdeR-lxayttYSNAuHHfaQjQ
Message-ID: <CANK0pbaPs+Uipqfsg7eKLCSYahNQ_G3Uk5PPOoLLbcvC4YNknQ@mail.gmail.com>
To: fud@ietf.org, Hannes Tschofenig <Hannes.Tschofenig@arm.com>
Content-Type: multipart/alternative; boundary="001a114e23cced5a020554bf105b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/FZS1I2Q-9kfbtuN5sggqUwkEJHY>
Subject: [Fud] broadcast update
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jul 2017 12:41:25 -0000

--001a114e23cced5a020554bf105b
Content-Type: text/plain; charset="UTF-8"

Hi Hannes,

you mentioned a demo about that over LoRa (if I recall correctly) this
morning.
Can you send us a pointer to that stuff?

Thanks

Emmanuel

--001a114e23cced5a020554bf105b
Content-Type: text/html; charset="UTF-8"

<div dir="ltr">Hi Hannes,<div><br></div><div>you mentioned a demo about that over LoRa (if I recall correctly) this morning.</div><div>Can you send us a pointer to that stuff?</div><div><br></div><div>Thanks</div><div><br></div><div>Emmanuel</div></div>

--001a114e23cced5a020554bf105b--


From nobody Thu Jul 20 05:51:09 2017
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9B22612EB99 for <fud@ietfa.amsl.com>; Thu, 20 Jul 2017 05:51:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.901
X-Spam-Level: 
X-Spam-Status: No, score=-4.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-2.8, RCVD_IN_SORBS_SPAM=0.5, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DFqpqib5nurV for <fud@ietfa.amsl.com>; Thu, 20 Jul 2017 05:51:01 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 081841317A7 for <fud@ietf.org>; Thu, 20 Jul 2017 05:51:00 -0700 (PDT)
Received: from [192.168.91.199] ([31.133.137.21]) by mail.gmx.com (mrgmx102 [212.227.17.168]) with ESMTPSA (Nemesis) id 0Meduu-1dETGq00UK-00OIrg; Thu, 20 Jul 2017 14:50:56 +0200
To: Emmanuel Baccelli <Emmanuel.Baccelli@inria.fr>, fud@ietf.org, Hannes Tschofenig <Hannes.Tschofenig@arm.com>
References: <CANK0pbaPs+Uipqfsg7eKLCSYahNQ_G3Uk5PPOoLLbcvC4YNknQ@mail.gmail.com>
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Openpgp: id=071A97A9ECBADCA8E31E678554D9CEEF4D776BC9
Message-ID: <752a3d82-6ffa-c792-cc26-a0dc747cdb46@gmx.net>
Date: Thu, 20 Jul 2017 14:50:55 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1
MIME-Version: 1.0
In-Reply-To: <CANK0pbaPs+Uipqfsg7eKLCSYahNQ_G3Uk5PPOoLLbcvC4YNknQ@mail.gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-Provags-ID: V03:K0:oZky6tBipj6QS25nYmZjg9xpPyr9kDd9kY+0HKt9TJ2CYZ1ERI9 BodGZXqD7WLbgpMRcmsrwvtyfujxMgGNNu+fijayXU2RPLT3qJ51KdGevgCMLu8gzxho3TX 7uEmrlCkFZjWLRF85kNZhWbFN1SZC+IBOPvNBKNLj8ujyQdl/mZrloZgkxH314QNg81NCpf QViKzhFeYLcMDgXQyPZFw==
X-UI-Out-Filterresults: notjunk:1;V01:K0:HOWUwgnvWgg=:q2NkW9IJo0ll2d6BVzAA9P MUh4RLP8D+0B6CzHtci0GHPb6SN2yb8Vj7tCf4PvPfu6cZlgsawCKmMH5Pb1mk4w+1Ozk+Z1n dKYL3+uXbVtQ0gKJLZpZ4dLPHxiZbgjBdSlKd8QyEIqLZXLnd4U54q5jiATMNB46qSW0lo0y9 Uq2fwJWne074RdISb3mn0tSM4N5Vi1I9uCglkCzsjEOA2nB3dSbi4LelFdATQUuZykH282X0t r+oTOcAYNK1yXJMSVCM2jySGjcBSYLCwe/gn6aZ6zaSFvCYRL+5esCjeGw2cIC97eZvvREoNn HOGweEa90aO+MxK4SsrIAxN3mx11tVOIwCXkbc+tOMULB0rrcXhdlOo3kF1seW1OpeCBSVRAb 2VKt5B/dWwQVZoq7nCdaIAcWs8h6qZ509/wMueKgnKAW8wJoOKWEQWjadDo6UTd7WLSS8NwHt y0sF1GU8VzF3qHp+9gyV3TiyKfcCki++wpMOaVFTluFVg2a24lm0Dn8beqZRp/krkV0iu5uwt cW4JGzqtL0ME4E6LwKIEcg9TMhvUdWe50AsNvo+7qlCGSKWkj4HOsg8tizZWSaCte2+24h4GJ /tkwNy9Ad6dlHmLMfM/sStRIDMchQ7ukcjo/3exfeXb8yE/nBp9dlXXtFsBZa95VjLgkK6gUO buDdus+/sOIv9hNiuMAYZVaYhjCOyVyXW8GuK42qoB3sTiAEbv7NKIzlLAUtuJW79IO/o34xz Py/6AmThAXvfZ+IQ0DveI3OWlZVxD7ODI78kOe8QkuH5zKK90479rY5ukQ7infBL4zpjUbtc7 vXeWpcdNAaC2XkrpA/UMwILJViqYpxh8igf2CBogIvl3GCV7o0=
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/s-Q_RmA-LQisoaAMIeAX_9eSsEQ>
Subject: Re: [Fud] broadcast update
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jul 2017 12:51:09 -0000

I mentioned firmware updates on LoRa networks, which is described at
https://developer.mbed.org/blog/entry/firmware-updates-over-lpwan-lora/

Ciao
Hannes

On 07/20/2017 02:41 PM, Emmanuel Baccelli wrote:
> Hi Hannes,
> 
> you mentioned a demo about that over LoRa (if I recall correctly) this
> morning.
> Can you send us a pointer to that stuff?
> 
> Thanks
> 
> Emmanuel
> 
> 
> _______________________________________________
> Fud mailing list
> Fud@ietf.org
> https://www.ietf.org/mailman/listinfo/fud
> 


From nobody Thu Jul 20 05:55:00 2017
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20FEF12EB99 for <fud@ietfa.amsl.com>; Thu, 20 Jul 2017 05:54:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.901
X-Spam-Level: 
X-Spam-Status: No, score=-4.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H2=-2.8, RCVD_IN_SORBS_SPAM=0.5, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XKCnvxzEPUom for <fud@ietfa.amsl.com>; Thu, 20 Jul 2017 05:54:57 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D551A126E3A for <fud@ietf.org>; Thu, 20 Jul 2017 05:54:56 -0700 (PDT)
Received: from [192.168.91.199] ([31.133.137.21]) by mail.gmx.com (mrgmx101 [212.227.17.168]) with ESMTPSA (Nemesis) id 0LkTSx-1eAFwv2j3j-00cQlM; Thu, 20 Jul 2017 14:54:50 +0200
To: Trishank Karthik Kuppusamy <trishank@nyu.edu>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Cc: Shikhar Sakhuja <ss9131@nyu.edu>, Justin Cappos <jcappos@nyu.edu>, fud@ietf.org, Ariella C Feuchtwanger <acf469@nyu.edu>
References: <VI1PR0801MB2717EBEB0B4401C2E8C795D4FAA10@VI1PR0801MB2717.eurprd08.prod.outlook.com> <7081cb17-2e39-1351-ae39-bcc31378b8b1@sit.fraunhofer.de> <CAJa2m-pFAix3YHCCpxYHRF=AyXHfiSQXz_TJfGsaZ-OwcQuBew@mail.gmail.com>
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Openpgp: id=071A97A9ECBADCA8E31E678554D9CEEF4D776BC9
Message-ID: <a35bb33c-ea17-a95a-71c9-0e4b525a17ce@gmx.net>
Date: Thu, 20 Jul 2017 14:54:49 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1
MIME-Version: 1.0
In-Reply-To: <CAJa2m-pFAix3YHCCpxYHRF=AyXHfiSQXz_TJfGsaZ-OwcQuBew@mail.gmail.com>
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 8bit
X-Provags-ID: V03:K0:bEmAy+6oQ2nWl+4YGmUk67wDL0l3X8A4+xwrGFcso2xEn0ulrHD 8D9vYAJpumxMkTrh2MK+A7pVhoBqPAOnxMNFeg64hT1wXCLXlJOqfAY/BpxD0NvQjI2LkgU pjy+eXPtHzFZ3SFqhcQDBbFIuVHn6mjKjlAMqcnRfVeOR/MhWInVw4o/BPbK9KJVx+FrxH5 zzHAnFt99pCKWm3XTuuSw==
X-UI-Out-Filterresults: notjunk:1;V01:K0:RyLur+4OkFE=:nHvaoKkCcMbpMDwXlKHVnP XVqt3wP5fIM8CqjoS0OFY+mNN1SXowBruZb9dF49/JVxPLKVQFPK/9tgIr0Lkzd9xZoko1Z+y G5SVp64MBxAMEybkf/6SIWrWnepURbTiyvNPIcSrvUGGD/VqLZtszLJyVAijW5S+pdOuLE4U3 QfK1MfC2dJvcMj5H4wq0HruKN4Vz4GYwr+njG0X+ftH2Sydtawr6k3NfSAbIIEx8oIFwWdVVN VSnmD7wrGzH76aypU9uSbgtyWkG1ofUzlHuNGu0yEA/iR37EP1nj6uKEZ7yk/5rjN9IXya5Wx tiZvYuHebrLPFvQGgCSmDG7lfV3K1UyoAyULO0JX0ELu74+C+CU2JaKORMW+BUP+ZyEWbkg38 AlVr1Ke1wpOlb9L+RXSUoYJYxq/uNZ7gEktbph3PIuGtNZlVJvlBzi2SPyZT4Saeuv79zwTup 0aUCOqsqu4GWy92b0O8d8H//cUp+l3Gf21cEB18ZQQdNnTLZFFfL6dgVPR+oA7w+NSqpmvDw3 rDlY5GNDEYW32LGKGnmWVFh1rX2r+vHHUE1JC2AgQF+SaLyL54vR/n8fsrq3y861Bc5VPVDAT a5Gd20o/RDZCXaanUFjEXNNcXniwGywlf+HrZfv7k3FcrgzecxVoqNvYZhGfW39bd+aQe8usY OhgdO++rkvz18vKayhOZa1QCmoBGfVcVGx9wrDTRm3vrK4DY35M2let41Ui6e6rjvBPdZzi/R 7vSOsjbFAKUAtaqUkcdYm/SCfBpu0mi719ft7QIELAlXBJ8zuUnupDqLhQ1EZ4j0cB16QhOAU G3d/K8GDQAxrh5ATA5YyWCXicbVtQnUq8d17ZS3dhjrX6FmOQc=
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/u5HAbbgeePdu5Xh-5G_nWrrouSw>
Subject: Re: [Fud] FUD Side Meeting @ Prague IETF
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jul 2017 12:54:59 -0000

Hi Trishank,

thanks for sharing the pointer to your work with this group. I will read
through asap.

Regarding this specific meeting: it was just an informal chat among
interested parties attending the IETF meeting. So, we had no remote
participation capabilities but I will share a few notes with the group.

The plan is to have an official session at the next IETF meeting where
we will be able to offer remote participation capabilities.

Ciao
Hannes


On 07/19/2017 08:38 PM, Trishank Karthik Kuppusamy wrote:
> Hello everyone,
> 
> We're from The Update Framework (TUF) project
> [https://theupdateframework.github.io/], where we are concerned with
> attackers who compromise the software repository used to host and
> distribute software updates, and thus distribute and install malware
> onto millions of devices at once.
> 
> Would it be possible for us to join this meeting remotely? We are in the
> EST time zone. Thanks in advance!
> 
> Regards,
> Trishank
> 
> On Wed, Jul 19, 2017 at 5:13 AM, Henk Birkholz
> <henk.birkholz@sit.fraunhofer.de
> <mailto:henk.birkholz@sit.fraunhofer.de>> wrote:
> 
>     Hello FUD'ler,
> 
>     again I am sorry that I cannot join, but I am in a session where I
>     have 3 presentation at that time.
> 
>     If you actually deciding to meeting at this session slot, I would
>     like to ask you to have a extensive look at:
> 
>         https://tools.ietf.org/html/draft-ietf-sacm-coswid-02#page-14
>         <https://tools.ietf.org/html/draft-ietf-sacm-coswid-02#page-14>
> 
> 
>     "CoSWID Attributes for Firmware "
> 
>     There is a resource description type for firmware that can even
>     include the corresponding firmware and act as a transport container.
>     It - of course -  includes the complete expressiveness of
>     ISO-19770-2:2015 and is therefore inter-operable in regard to the
>     corresponding metadata that overlaps with "normal software" and can
>     be processed by any system that already understands the semantics of
>     ISO SWID documents.
> 
>     Viele GrÃ¼ÃŸe,
> 
>     Henk
> 
> 
>     On 07/18/2017 05:26 PM, Hannes Tschofenig wrote:
> 
>         Hi all,
> 
>         I have been asked by a few IETF participants whether we should
>         get together this week to talk about firmware updates for IoT
>         devices (as a follow-up of what we did at the Chicago IETF meeting).
> 
>         I am proposing to meet Thursday, 9:30am in the Istanbul room (at
>         the L level). I have reserved the room till 12:00.
> 
>         Ciao
> 
>         Hannes
> 
>         IMPORTANT NOTICE: The contents of this email and any attachments
>         are confidential and may also be privileged. If you are not the
>         intended recipient, please notify the sender immediately and do
>         not disclose the contents to any other person, use it for any
>         purpose, or store or copy the information in any medium. Thank you.
> 
> 
>         _______________________________________________
>         Fud mailing list
>         Fud@ietf.org <mailto:Fud@ietf.org>
>         https://www.ietf.org/mailman/listinfo/fud
>         <https://www.ietf.org/mailman/listinfo/fud>
> 
> 
>     _______________________________________________
>     Fud mailing list
>     Fud@ietf.org <mailto:Fud@ietf.org>
>     https://www.ietf.org/mailman/listinfo/fud
>     <https://www.ietf.org/mailman/listinfo/fud>
> 
> 
> 
> 
> _______________________________________________
> Fud mailing list
> Fud@ietf.org
> https://www.ietf.org/mailman/listinfo/fud
> 


From nobody Thu Jul 20 07:26:47 2017
Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3AD02131761 for <fud@ietfa.amsl.com>; Thu, 20 Jul 2017 07:26:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QNgrwPfyP_Ki for <fud@ietfa.amsl.com>; Thu, 20 Jul 2017 07:26:44 -0700 (PDT)
Received: from mail-pf0-x22e.google.com (mail-pf0-x22e.google.com [IPv6:2607:f8b0:400e:c00::22e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E0E6313188F for <fud@ietf.org>; Thu, 20 Jul 2017 07:26:43 -0700 (PDT)
Received: by mail-pf0-x22e.google.com with SMTP id q85so12976248pfq.1 for <fud@ietf.org>; Thu, 20 Jul 2017 07:26:43 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=uMfkRniXIhK+Dkx2hVHghCtqBOqC6sLNvPZRITM574U=; b=EfLLqoJ1p2GyR90y4/llXKrbFg+R54mCnkSeTJ1Nv5NNSCWqa8Yza2Njzw17VMjBqS NOO/8Gn1agJ8jNzrVyozpjPQTqwdFoDrjc0HKwqO7+OLLLaksRrr1vA9SQzx0QO6Lhh4 B/vgRz6J/eonxY01abj/OPba+td8ri046FraVs2Fxwh3+UWgzY3+5A2go7Ha7eX8eRwS uFmvj5zRfCealv+pxOh7jmZc4mzPg+jjDT0LPnWM8KR3aalv2uMV8m1j/Vc3oyPBW3gl ue4ORvkzx+3tJujgAB7P2tWjOZwcOni+OaPLdrqJWi3YwhzCLf0qh44p8jq6O7bRjnOE 36OA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=uMfkRniXIhK+Dkx2hVHghCtqBOqC6sLNvPZRITM574U=; b=Ka+I+a0MzdkvBjVIz/dv1905UlaEG8dpoQyTAJuRx6lmgMZlfJaFWvZlGoRw+sFbIk oM/9Mfx/ZktUSm3AN+tondupeCDQEbM9wPWmlQtTw3UzEdU/WvKAkAw7vsmpZH3Vbcxj W1CwXkKLgzRMJKU1WI/3KX8gumoW6M10fiePyw5q15SNS8xl2QrJL09x+oFOgHJF1vVv W86ZLbyhxaGwEVamybrw06F4UClKb3zXl9dSdqF0bNDYYIvJey95TLdlbF1bF6b8QzMx rm1wkXySoVT059tDQtvM7qzXVvDvwb5ODbxOhnNEf+rPKsuITw+9KvgI6oDWKwkSuPBw 2n+w==
X-Gm-Message-State: AIVw112Wvx+GgwSa4wekQWrnfVFwOgBRw4+FvMWxV1L0KLWsN+EmCmtp P2x8TW0Kcd3lIJ+g/TKhlkFvsq41eA==
X-Received: by 10.98.18.69 with SMTP id a66mr4155559pfj.33.1500560803382; Thu, 20 Jul 2017 07:26:43 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.100.180.193 with HTTP; Thu, 20 Jul 2017 07:26:02 -0700 (PDT)
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Date: Thu, 20 Jul 2017 10:26:02 -0400
Message-ID: <CAHbuEH4+3M=DKTMAWxpK48quL4MBWU7_y=Hc5nGpQbhKAqnQpA@mail.gmail.com>
To: fud@ietf.org
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/qKJ7dpXDhmDVZGnY7ynbv2eoNFg>
Subject: [Fud] Chairs
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jul 2017 14:26:45 -0000

Hello,

Without fear, uncertainty. or doubt, Russ Housley and David Waltermire
have agreed to chair the Firmware UpDate (FUD) effort and shepherd it
toward a working group.  Thank you both for your efforts to assist the
proponents drive this important work forward.

If the work is scoped well, the problem statement is clear with a well
defined charter, and agreed upon set of work, it is possible to move
directly to a working group.  If a BoF is needed, we'll try for that
at the next meeting in November.  It is also possible to hold a
virtual BoF if that is desired as well.  Time slips quickly, so active
efforts to drive this work is necessary to have a successful BoF in
November (or to exceed that goal).

Thank you all in advance.

-- 

Best regards,
Kathleen


From nobody Thu Jul 20 08:11:26 2017
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 59716131CFC for <fud@ietfa.amsl.com>; Thu, 20 Jul 2017 08:11:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.621
X-Spam-Level: 
X-Spam-Status: No, score=-2.621 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PX0GgtbVHlhB for <fud@ietfa.amsl.com>; Thu, 20 Jul 2017 08:11:22 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F0C84131CD1 for <fud@ietf.org>; Thu, 20 Jul 2017 08:11:21 -0700 (PDT)
Received: from [192.168.91.200] ([31.133.137.21]) by mail.gmx.com (mrgmx103 [212.227.17.168]) with ESMTPSA (Nemesis) id 0LeNGL-1dxhAL07ht-00qBb8 for <fud@ietf.org>; Thu, 20 Jul 2017 17:11:20 +0200
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Openpgp: id=071A97A9ECBADCA8E31E678554D9CEEF4D776BC9
To: fud@ietf.org
Message-ID: <ad75252e-1e87-6efa-6a46-b3994a1c7535@gmx.net>
Date: Thu, 20 Jul 2017 17:11:19 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-Provags-ID: V03:K0:BPsH4+pLGoDv1rvk/SUYfU6HPG7Oy4fJB/ZZlo1PMI26eVuYrUz 1SyeRhe1vYSvMTl8NPoAU0yi9aB98GsGb0g0CgsCtE728vOcVFL0/giHDhmfM1ABv62XCCO N3l/KtgAweRYUJEBUUU3rGYkyKPuVzx7fLo0Ql02DMQaUeaVrDKOUPrxW6WzIrFnYh93YNS zaD5Kw17Ltd8+DiGk5EbQ==
X-UI-Out-Filterresults: notjunk:1;V01:K0:CJeoRPNN1hw=:6evbJpVM3ZoumI2mON7JzI 3qM8Unn06TYOgvocDRbdhZCwFRbaXbLj0BOXvZkMWDVPzKRvnd4g+mfVcKLQyNVaFtoMxaa7R 762oA0DfP6WFl+PbqvNooReXpiJh6XfgpcfBzvlWsYbC4bQZVO3ohDTHm2yMnoge5zbGBPQaA Rdc4EKJuVWSxbhPE6SJaK2HBUMyiM6VXJA3ftKJhXPnGwkOtzFh6WJEeTVzGaEuc6UEpb+Uoc 3fmSSAHcokKXzkyBLemRoQkA4lbeH75IE3JStzvoJrNaUieOILhzj/rptCjKzh9ipN7FTVrcU Emzd5SVMKjUIcRtJKS3lN3wA0DqqRC1awe3sDpznAXluSuvCCOQiP55ycCDowpLVaTNmJvADB SqG9gi1nX+XvLScl1h1u8jcUpUZQCjY8lClVQJ50Ej0O5xljQDc6HkzNTc6aa3nE+hiwCzP41 i7lkYT00cPQh3Ejs3BhPn+6mygPx9RRqqB2yK9pH0CXFjqtKS9tOclO11eeMy8H9ujj547pQ5 lueHq2yE0aEqdkRq0EMhE1+0LdJsGQVeR0wcOsbOnpnaT24GA4MqWMu7XqvfhMzo1chMixatu X/EogwLQ0DC3ErYXxyu57UxgB5hdu0gX5bADVSQ/ttOkRmrd1pS6uLQ0ZI74lIoXC4Yjd4X0G rgwb6aplCj/lPKX9N4J2uZ8MUiYO8VBjqQ7azZLh8i+Xt6YFYqVEPQ4R8VRQHOJmrSvgSqFTj N/jIRWVYp3aFLmkYdiA4NwyyltXMBQbooA97T7tiaNWn1rNQGe5wATqwDpvFr7hGQ847t1FoP +IQm5I8jc300B5cHID4aNKt1YAmvwd16avBu4JDqQluYkNhXw8=
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/mj8d4t-mUD6QJJ8Fekfq8aLYRIU>
Subject: [Fud] My notes
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jul 2017 15:11:24 -0000

A small group attended the informal FUD meeting today and I started with
an explanation of what we had been doing with firmware updates at ARM by
going through the two documents I recently submitted. The manifest
format is inspired by RFC 4108, uses asymmetric crypto only, and an
ASN.1-based encoding. (Not in the scope of the standardization effort in
FUD is the actual delivery mechanism but we have been using LwM2M.)

We spoke about the difference between a software update mechanism and
firmware updates and Emmanuel (working on the RIOT OS) mentioned that
they have use cases where IoT devices run an embedded version of
JavaScript and need to also get code/scripts in addition to the firmware
and he wants to have that use case covered as well.

In this context the issue of the class of IoT devices we are targeting
and Emmanuel argued that we should aim for class #1 devices (based on
RFC 7228). This means ~ 10 KiB RAM and ~ 100 KiB flash. There have been
doubts whether this is possible.

Henk posted a link to the mailing list pointing to the firmware manifest
description based on RFC 4108. Here is the document:
https://tools.ietf.org/html/draft-ietf-sacm-coswid-02#appendix-B
So, we looked at the SACM COSWID work and were wondering about the need
to also support alternative encoding formats for the manifest (in
addition to an ASN.1 format), such as CBOR.

Erik Nordmark asked for a more detailed threat description and we talked
about the threat where an attacker blocks access to the update server.
This lead to a discussion about what we should cover in the architecture
document even if it is outside the scope of the standardization effort
of the manifest format itself.

Russ suggested to also take hash-based signatures into account (see
https://tools.ietf.org/html/draft-housley-cms-mts-hash-sig-07 and
https://tools.ietf.org/html/draft-mcgrew-hash-sigs-07), as it was
already suggested at the IOTSU workshop. There was an agreement among
the participants that we should explore this option. Russ argued that
the performance is for verifier is good. The signature size is rather
large in comparison to an ECDSA signature but given that the firmware
image size it may not matter much.

Steve mentioned ongoing activities by NTIA about firmware/software
updates that are relevant to this effort, namely "Multistakeholder
Process; Internet of Things (IoT) Security Upgradability and Patching"
https://www.ntia.doc.gov/other-publication/2016/multistakeholder-process-iot-security

We talked a bit about the use case where a device consists of multiple
microcontrollers that all need to be updated and how the individual
components are identified and how this use case is captured within the
manifest. The 'dependencies' attribute was used in the
draft-moran-fud-manifest-00.

Finally, we spoke about the next steps, namely

(1) reaching out to various IoT OS developers and middleware providers.
We need more implementers of this technology in the group. Emanuel
promised to send a message to the folks from the Contiki OS and the
MCUBoot project (see https://github.com/runtimeco/mcuboot). I will reach
out to the guys from the IAB IOTSU workshop and to ARM partners.

(2) starting to draft a charter text with the focus of standarding a
manifest and to capture the overall architecture.

The plan is to charter a working group before the next IETF meeting.



From nobody Thu Jul 20 08:23:14 2017
Return-Path: <david.waltermire@nist.gov>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 04108131C43 for <fud@ietfa.amsl.com>; Thu, 20 Jul 2017 08:23:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nistgov.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3NQdkjqSYUne for <fud@ietfa.amsl.com>; Thu, 20 Jul 2017 08:23:10 -0700 (PDT)
Received: from gcc01-dm2-obe.outbound.protection.outlook.com (mail-dm2gcc01on0133.outbound.protection.outlook.com [23.103.201.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 20C0C131CE6 for <fud@ietf.org>; Thu, 20 Jul 2017 08:23:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nistgov.onmicrosoft.com; s=selector1-nist-gov; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=LmSh4S46Up6WPXExaP4//HiqaVKWPVlbztT+N8bnwUY=; b=YKanAUe/rE6TpPGGGU1pTXCphbe60ypnlFfL9glzUj2//y1cTsjXY89JXv3jN9W4WWx9QU0tSGl5BZWSNkumrfs24BybBGZUcYlIkd56S/RWu5XiH3AbvN37OtuBmZmfV/pyVM6s6HalmWVRhqGhv3yMlRBYqaC//iXAny/NqHA=
Received: from MWHPR09MB1440.namprd09.prod.outlook.com (10.173.50.14) by MWHPR09MB1438.namprd09.prod.outlook.com (10.173.50.12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1261.13; Thu, 20 Jul 2017 15:23:08 +0000
Received: from MWHPR09MB1440.namprd09.prod.outlook.com ([10.173.50.14]) by MWHPR09MB1440.namprd09.prod.outlook.com ([10.173.50.14]) with mapi id 15.01.1261.024; Thu, 20 Jul 2017 15:23:08 +0000
From: "Waltermire, David A. (Fed)" <david.waltermire@nist.gov>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>, "fud@ietf.org" <fud@ietf.org>
Thread-Topic: [Fud] My notes
Thread-Index: AQHTAWp8EkyFkNMNIU2E7nW5X9HxBaJc1SdF
Date: Thu, 20 Jul 2017 15:23:08 +0000
Message-ID: <MWHPR09MB1440667DAD8CBE9AC9DDCC45F0A70@MWHPR09MB1440.namprd09.prod.outlook.com>
References: <ad75252e-1e87-6efa-6a46-b3994a1c7535@gmx.net>
In-Reply-To: <ad75252e-1e87-6efa-6a46-b3994a1c7535@gmx.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: gmx.net; dkim=none (message not signed) header.d=none;gmx.net; dmarc=none action=none header.from=nist.gov;
x-originating-ip: [2001:67c:370:128:b5a6:c156:31d7:2673]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; MWHPR09MB1438; 7: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
x-ms-office365-filtering-correlation-id: b6c13b40-4152-4298-cb4a-08d4cf8339f5
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(300000503095)(300135400095)(48565401081)(2017052603031)(201703131423075)(201703031133081)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:MWHPR09MB1438; 
x-ms-traffictypediagnostic: MWHPR09MB1438:
x-exchange-antispam-report-test: UriScan:(278178393323532)(158342451672863)(133145235818549)(166708455590820)(26388249023172)(236129657087228)(192374486261705)(248736688235697)(167848164394848);
x-microsoft-antispam-prvs: <MWHPR09MB143849627D1FA339814BB387F0A70@MWHPR09MB1438.namprd09.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(8121501046)(5005006)(2017060910075)(3002001)(10201501046)(93006095)(93001095)(100000703101)(100105400095)(6055026)(6041248)(20161123560025)(20161123562025)(20161123555025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123558100)(20161123564025)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:MWHPR09MB1438; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:MWHPR09MB1438; 
x-forefront-prvs: 0374433C81
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39840400002)(39850400002)(39400400002)(39860400002)(39410400002)(39450400003)(377454003)(76176999)(50986999)(99286003)(55016002)(9686003)(236005)(6506006)(86362001)(38730400002)(2950100002)(74316002)(3280700002)(2906002)(6436002)(53546010)(77096006)(33656002)(5660300001)(606006)(6246003)(54356999)(8676002)(7736002)(54896002)(478600001)(229853002)(2501003)(81166006)(3660700001)(6116002)(25786009)(2900100001)(53936002)(14454004)(966005)(7696004)(8936002)(6306002)(189998001)(102836003); DIR:OUT; SFP:1102; SCL:1; SRVR:MWHPR09MB1438; H:MWHPR09MB1440.namprd09.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en; 
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_MWHPR09MB1440667DAD8CBE9AC9DDCC45F0A70MWHPR09MB1440namp_"
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Jul 2017 15:23:08.4126 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR09MB1438
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/NUYU5k9IDFtcjHt3HBxioDrRjSE>
Subject: Re: [Fud] My notes
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jul 2017 15:23:13 -0000

--_000_MWHPR09MB1440667DAD8CBE9AC9DDCC45F0A70MWHPR09MB1440namp_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Thanks Hannes!


Dave

________________________________
From: Fud <fud-bounces@ietf.org> on behalf of Hannes Tschofenig <hannes.tsc=
hofenig@gmx.net>
Sent: Thursday, July 20, 2017 11:11:19 AM
To: fud@ietf.org
Subject: [Fud] My notes

A small group attended the informal FUD meeting today and I started with
an explanation of what we had been doing with firmware updates at ARM by
going through the two documents I recently submitted. The manifest
format is inspired by RFC 4108, uses asymmetric crypto only, and an
ASN.1-based encoding. (Not in the scope of the standardization effort in
FUD is the actual delivery mechanism but we have been using LwM2M.)

We spoke about the difference between a software update mechanism and
firmware updates and Emmanuel (working on the RIOT OS) mentioned that
they have use cases where IoT devices run an embedded version of
JavaScript and need to also get code/scripts in addition to the firmware
and he wants to have that use case covered as well.

In this context the issue of the class of IoT devices we are targeting
and Emmanuel argued that we should aim for class #1 devices (based on
RFC 7228). This means ~ 10 KiB RAM and ~ 100 KiB flash. There have been
doubts whether this is possible.

Henk posted a link to the mailing list pointing to the firmware manifest
description based on RFC 4108. Here is the document:
https://tools.ietf.org/html/draft-ietf-sacm-coswid-02#appendix-B
So, we looked at the SACM COSWID work and were wondering about the need
to also support alternative encoding formats for the manifest (in
addition to an ASN.1 format), such as CBOR.

Erik Nordmark asked for a more detailed threat description and we talked
about the threat where an attacker blocks access to the update server.
This lead to a discussion about what we should cover in the architecture
document even if it is outside the scope of the standardization effort
of the manifest format itself.

Russ suggested to also take hash-based signatures into account (see
https://tools.ietf.org/html/draft-housley-cms-mts-hash-sig-07 and
https://tools.ietf.org/html/draft-mcgrew-hash-sigs-07), as it was
already suggested at the IOTSU workshop. There was an agreement among
the participants that we should explore this option. Russ argued that
the performance is for verifier is good. The signature size is rather
large in comparison to an ECDSA signature but given that the firmware
image size it may not matter much.

Steve mentioned ongoing activities by NTIA about firmware/software
updates that are relevant to this effort, namely "Multistakeholder
Process; Internet of Things (IoT) Security Upgradability and Patching"
https://www.ntia.doc.gov/other-publication/2016/multistakeholder-process-io=
t-security

We talked a bit about the use case where a device consists of multiple
microcontrollers that all need to be updated and how the individual
components are identified and how this use case is captured within the
manifest. The 'dependencies' attribute was used in the
draft-moran-fud-manifest-00.

Finally, we spoke about the next steps, namely

(1) reaching out to various IoT OS developers and middleware providers.
We need more implementers of this technology in the group. Emanuel
promised to send a message to the folks from the Contiki OS and the
MCUBoot project (see https://github.com/runtimeco/mcuboot). I will reach
out to the guys from the IAB IOTSU workshop and to ARM partners.

(2) starting to draft a charter text with the focus of standarding a
manifest and to capture the overall architecture.

The plan is to charter a working group before the next IETF meeting.


_______________________________________________
Fud mailing list
Fud@ietf.org
https://www.ietf.org/mailman/listinfo/fud

--_000_MWHPR09MB1440667DAD8CBE9AC9DDCC45F0A70MWHPR09MB1440namp_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Exchange Server">
<!-- converted from text --><style><!-- .EmailQuote { margin-left: 1pt; pad=
ding-left: 4pt; border-left: #800000 2px solid; } --></style>
</head>
<body>
<meta content=3D"text/html; charset=3DUTF-8">
<style type=3D"text/css" style=3D"">
<!--
p
	{margin-top:0;
	margin-bottom:0}
-->
</style>
<div dir=3D"ltr">
<div id=3D"x_divtagdefaultwrapper" dir=3D"ltr" style=3D"font-size:12pt; col=
or:#000000; font-family:Calibri,Helvetica,sans-serif">
<p>Thanks Hannes!</p>
<p><br>
</p>
<p>Dave<br>
</p>
</div>
<hr tabindex=3D"-1" style=3D"display:inline-block; width:98%">
<div id=3D"x_divRplyFwdMsg" dir=3D"ltr"><font face=3D"Calibri, sans-serif" =
color=3D"#000000" style=3D"font-size:11pt"><b>From:</b> Fud &lt;fud-bounces=
@ietf.org&gt; on behalf of Hannes Tschofenig &lt;hannes.tschofenig@gmx.net&=
gt;<br>
<b>Sent:</b> Thursday, July 20, 2017 11:11:19 AM<br>
<b>To:</b> fud@ietf.org<br>
<b>Subject:</b> [Fud] My notes</font>
<div>&nbsp;</div>
</div>
</div>
<font size=3D"2"><span style=3D"font-size:10pt;">
<div class=3D"PlainText">A small group attended the informal FUD meeting to=
day and I started with<br>
an explanation of what we had been doing with firmware updates at ARM by<br=
>
going through the two documents I recently submitted. The manifest<br>
format is inspired by RFC 4108, uses asymmetric crypto only, and an<br>
ASN.1-based encoding. (Not in the scope of the standardization effort in<br=
>
FUD is the actual delivery mechanism but we have been using LwM2M.)<br>
<br>
We spoke about the difference between a software update mechanism and<br>
firmware updates and Emmanuel (working on the RIOT OS) mentioned that<br>
they have use cases where IoT devices run an embedded version of<br>
JavaScript and need to also get code/scripts in addition to the firmware<br=
>
and he wants to have that use case covered as well.<br>
<br>
In this context the issue of the class of IoT devices we are targeting<br>
and Emmanuel argued that we should aim for class #1 devices (based on<br>
RFC 7228). This means ~ 10 KiB RAM and ~ 100 KiB flash. There have been<br>
doubts whether this is possible.<br>
<br>
Henk posted a link to the mailing list pointing to the firmware manifest<br=
>
description based on RFC 4108. Here is the document:<br>
<a href=3D"https://tools.ietf.org/html/draft-ietf-sacm-coswid-02#appendix-B=
">https://tools.ietf.org/html/draft-ietf-sacm-coswid-02#appendix-B</a><br>
So, we looked at the SACM COSWID work and were wondering about the need<br>
to also support alternative encoding formats for the manifest (in<br>
addition to an ASN.1 format), such as CBOR.<br>
<br>
Erik Nordmark asked for a more detailed threat description and we talked<br=
>
about the threat where an attacker blocks access to the update server.<br>
This lead to a discussion about what we should cover in the architecture<br=
>
document even if it is outside the scope of the standardization effort<br>
of the manifest format itself.<br>
<br>
Russ suggested to also take hash-based signatures into account (see<br>
<a href=3D"https://tools.ietf.org/html/draft-housley-cms-mts-hash-sig-07">h=
ttps://tools.ietf.org/html/draft-housley-cms-mts-hash-sig-07</a> and<br>
<a href=3D"https://tools.ietf.org/html/draft-mcgrew-hash-sigs-07">https://t=
ools.ietf.org/html/draft-mcgrew-hash-sigs-07</a>), as it was<br>
already suggested at the IOTSU workshop. There was an agreement among<br>
the participants that we should explore this option. Russ argued that<br>
the performance is for verifier is good. The signature size is rather<br>
large in comparison to an ECDSA signature but given that the firmware<br>
image size it may not matter much.<br>
<br>
Steve mentioned ongoing activities by NTIA about firmware/software<br>
updates that are relevant to this effort, namely &quot;Multistakeholder<br>
Process; Internet of Things (IoT) Security Upgradability and Patching&quot;=
<br>
<a href=3D"https://www.ntia.doc.gov/other-publication/2016/multistakeholder=
-process-iot-security">https://www.ntia.doc.gov/other-publication/2016/mult=
istakeholder-process-iot-security</a><br>
<br>
We talked a bit about the use case where a device consists of multiple<br>
microcontrollers that all need to be updated and how the individual<br>
components are identified and how this use case is captured within the<br>
manifest. The 'dependencies' attribute was used in the<br>
draft-moran-fud-manifest-00.<br>
<br>
Finally, we spoke about the next steps, namely<br>
<br>
(1) reaching out to various IoT OS developers and middleware providers.<br>
We need more implementers of this technology in the group. Emanuel<br>
promised to send a message to the folks from the Contiki OS and the<br>
MCUBoot project (see <a href=3D"https://github.com/runtimeco/mcuboot">https=
://github.com/runtimeco/mcuboot</a>). I will reach<br>
out to the guys from the IAB IOTSU workshop and to ARM partners.<br>
<br>
(2) starting to draft a charter text with the focus of standarding a<br>
manifest and to capture the overall architecture.<br>
<br>
The plan is to charter a working group before the next IETF meeting.<br>
<br>
<br>
_______________________________________________<br>
Fud mailing list<br>
Fud@ietf.org<br>
<a href=3D"https://www.ietf.org/mailman/listinfo/fud">https://www.ietf.org/=
mailman/listinfo/fud</a><br>
</div>
</span></font>
</body>
</html>

--_000_MWHPR09MB1440667DAD8CBE9AC9DDCC45F0A70MWHPR09MB1440namp_--


From nobody Fri Jul 21 14:53:03 2017
Return-Path: <hannes.tschofenig@gmx.net>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CFCF21201F2 for <fud@ietfa.amsl.com>; Fri, 21 Jul 2017 14:53:02 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.621
X-Spam-Level: 
X-Spam-Status: No, score=-2.621 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KgDp7vfywWdt for <fud@ietfa.amsl.com>; Fri, 21 Jul 2017 14:53:01 -0700 (PDT)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ED69C124B0A for <fud@ietf.org>; Fri, 21 Jul 2017 14:53:00 -0700 (PDT)
Received: from [192.168.91.200] ([80.92.121.224]) by mail.gmx.com (mrgmx102 [212.227.17.168]) with ESMTPSA (Nemesis) id 0MEtba-1dN4zI3FCk-00G3iE for <fud@ietf.org>; Fri, 21 Jul 2017 23:52:58 +0200
To: fud@ietf.org
From: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Openpgp: id=071A97A9ECBADCA8E31E678554D9CEEF4D776BC9
Message-ID: <8f8528da-d1eb-08c7-b3fe-b1f4febed595@gmx.net>
Date: Fri, 21 Jul 2017 23:52:40 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.2.1
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-Provags-ID: V03:K0:00x4nnI0uOiI9DlNLt2ExYEnoqCN8h5BadoN/h1LDr9FmT1iFso RQEf0QeMLYvn4UASG/hpXnig0ZrD0ktPFfSjeGu2JQTD1c1DW3QpjzMIwur6Ii2yRtnHXZZ sSii5/z1zUsba1IG/6zOqDVVRs4gaxrF7uspysf3r56+F1U4Kglry18rGtzSJCZPS+1TKXn U/KVubW0Wv1wRgR1hvKcg==
X-UI-Out-Filterresults: notjunk:1;V01:K0:GoYiBjFXnrk=:90mEgt4nc04JfI8SAF+MQ6 0h6arULtbhAOuFsDBVhoS2iDivGsS9nVJMvj8aEygwNg+eWGpZkKoYr174IfZC3Yf5R32/wwS 7jnFlfTxjWlbNvGeeWQBIBxlpXU/WyOw2JzuYydK+WSxj+psWGKkeDx970Gs15UhAfLcJL0Oz XUHxS37brvFRSSZY0jbQYC0tQD99VSmoKEeNtEIGIyF93dJVH8nx/nwJwr+kEW2CW+QHfUVR+ jQDOf9coM5BNSEh5gvULEJXCyRwqaZfrNgxbsRR+VV85WPxDD8ZdkzWw1B8vaY6iSFBzogvaX MY6QFuAs3XE0lAFxcELU1hL6ir6+Ax+v5ByS7lDyqVf5q/9Sn+b/Oix4mcTbb/eQ6SahcXRZZ HqKcriI8m4KWlnABPj3PBs1JV2DSXyFg4O/fWSLdfMyvILtJvBGKkZ6MMcrDxHxcxJmY51T9E U9126Tz11gUsBUHHF/+wxklCNXzoTgjMjsjNVH+OLhGAIrtxi7Awm3kbKgLPLpClRtch1CIMJ pwXBo4iIooBxXNiMZ069VxbtTkKP9nSZaFbIEg6dfZWD+k13sjhug5Q2qienf7XK+G68Hg6rm RNKhN6X8FZrCqAq3w2ikfRtSiKsu7utWW2dpOsjT59iHtMrREBBHQkK0r3tm8iL1cajvkRN1D CwriLZtaxXzWMScu+0MwWz6jHGcM/FExIPlv7GH5KY8dZSdM5599+fjzLDM005UgryYS0thef 0U23/opr6uwxlC+P1jGl6vK3diJio6sr7PwF0Q1npuYoeY+dAjPgKWB8fKBdG5Pb+5C/U7ary 3eQF3bX3Nel2d8yM4YnwfFzoYMITMnVXuAdruty9043JqCS1Mc=
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/0kzIEC0xwZWeZP18-zSfCODuq50>
Subject: [Fud] Charter Text
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 21 Jul 2017 21:53:03 -0000

Here is a strawman proposal for a charter text. Suggestions welcome!

----

Firmware Updating Description (FUD)

Vulnerabilities with Internet of Things (IoT) devices have raised the
need for a secure firmware update mechanism that is also suitable for
constrained devices. Security experts, researchers and regulators
recommend that all IoT devices are equipped with such a mechanism. While
there are many proprietary firmware update mechanisms in use today there
is a lack of an modern interoperable approach of securely updating IoT
devices.

A firmware update solution consists of several components, including a
mechanism to transport firmware images to IoT devices and a manifest
that provides meta-data about the firmware image as well as
cryptographic information for protecting the firmware image in an
end-to-end fashion. With RFC 4018 the IETF standardized a manifest
format that uses the Cryptographic Message Syntax (CMS) to protect
firmware packages.

Since the publication of RFC 4108 more than 10 years have passed and
more experience with IoT deployments have lead to additional
functionality requiring the work done with RFC 4108 to be revisited. The
purpose of this group is to standardize a version 2 of RFC 4108 that
reflects best current practices. This group will not define any
transport mechanism.

In 2016 the Internet Architecture Board organized a workshop on
'Internet of Things (IoT) Software Update (IOTSU)', which took place at
Trinity College Dublin, Ireland on the 13th and 14th of June, 2016. The
main goal of the workshop was to foster a discussion on requirements,
challenges and solutions for bringing software and firmware updates to
IoT devices. This workshop also made clear that there are challenges
with lack of regulatory requirements, and misaligned incentives. It is
nevertheless seen as important to standardize the building blocks that
help interested parties to implement and deploy a solid firmware update
mechanism.

In particular this group aims to publish two documents, namely
 * an IoT firmware update architecture that includes a description of
the involved entities, security threats and assumptions, and
 * the manifest format itself.

This group does not aim to standardize a generic software update
mechanism used by rich operating systems, like Linux, but instead
focuses on software development practices in the embedded industry.

This group will aim to develop a close relationship with silicon vendors
and OEMs that develop IoT operating systems.

Milestones

Dec 2017     Submit "Architecture" document as WG item.

Dec 2017     Submit "Manifest Format" specification as WG item.

Jul 2018    Submit "Architecture" to the IESG for publication as an
Informational RFC.

Nov 2018     Submit "Manifest Format" to the IESG for publication as a
Proposed Standard.


Additional calendar items:

Mar 2018     Release initial version of the manifest creation tools as
open source.

Apr 2018     Release first version of manifest test tool suite as open
source.

Jun 2018     Release first IoT OS implementation of firmware update
mechanisms as open source.


From nobody Sat Jul 22 00:57:58 2017
Return-Path: <emmanuel.baccelli@gmail.com>
X-Original-To: fud@ietfa.amsl.com
Delivered-To: fud@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A310F131C4F for <fud@ietfa.amsl.com>; Sat, 22 Jul 2017 00:57:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.699
X-Spam-Level: 
X-Spam-Status: No, score=-1.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, FREEMAIL_FORGED_FROMDOMAIN=0.199, FREEMAIL_FROM=0.001, HEADER_FROM_DIFFERENT_DOMAINS=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oDSfessxDyGh for <fud@ietfa.amsl.com>; Sat, 22 Jul 2017 00:57:55 -0700 (PDT)
Received: from mail-ua0-x22d.google.com (mail-ua0-x22d.google.com [IPv6:2607:f8b0:400c:c08::22d]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CC89912714F for <fud@ietf.org>; Sat, 22 Jul 2017 00:57:54 -0700 (PDT)
Received: by mail-ua0-x22d.google.com with SMTP id 80so56737253uas.0 for <fud@ietf.org>; Sat, 22 Jul 2017 00:57:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc; bh=a1wskhaSIbRjMbLMrqMnoiQ41lpHQ0ItRueyXDewPFY=; b=HKsp3rhgoCGY9LwsupGAGCko5OBsbZCq+pXy2WsUxAAG5M60DEX+uimga4JFx9bcrk gxwHQ7PIa/lMs7bv1/U6RBllobL1X6MOXCHAdGqaOgDIGjoysbb34iHK2oL1Orm1i+An 6Ks1f1z4aHzKJPMp+x41W26p+wpL3k7lzlfO7VDgV5Lq0a71GZtesF6fks9hej/0uNt6 ecgTTTIqyD8LfW/W3yN5rqgW1r9FLQWszkfQVjXoLB31EqhxVnLpp4VtL1+MEXNbJuHu idjDYWxHDnQYpkhsqkjkfGclh+jwoFqfIOlyfeeabVMXmVYbzBJgsZMsFAHkBSCfsn3H +33A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc; bh=a1wskhaSIbRjMbLMrqMnoiQ41lpHQ0ItRueyXDewPFY=; b=MqbTD6E0IDiRCehCo9zUZx6DS5V7yg8XtS2cvvH8F56luDFxkCSD8/UvVE2DABLf40 XM/lOxfbYbi89GHNaWxMDLUQmi+ha1YIXuzvsVKLr+aQEhns6YFhmmcCfOsHAihE7ROg uHgAlsY/VbJvfykFQESeYnDMxSJRpVym3cLaDyn9mp6ZBf9Fd0rNQtAhoF2YuU9/96Qj Z6RcUXdnyzKHs1EB5pz2gD6MrZqsREab1qya8DAf/cxNDfUVvzdcyAzabAvbws7CADuu RYkar2zRUGw89hhyu9hbpmTbX8vnR1hzInwcLck0cmxIdDiVxjmrNmLGRgAowNZNPh2g I1hA==
X-Gm-Message-State: AIVw110NIhmik+1hO8J/l+B1lFArGgFushCIrfaNf8KNIbSTRNe3AsXw Z/4z9MFMdVydfu91XFWVvkhy2BRk/w==
X-Received: by 10.159.37.37 with SMTP id 34mr2811637uaz.5.1500710273848; Sat, 22 Jul 2017 00:57:53 -0700 (PDT)
MIME-Version: 1.0
Sender: emmanuel.baccelli@gmail.com
Received: by 10.176.76.211 with HTTP; Sat, 22 Jul 2017 00:57:33 -0700 (PDT)
In-Reply-To: <8f8528da-d1eb-08c7-b3fe-b1f4febed595@gmx.net>
References: <8f8528da-d1eb-08c7-b3fe-b1f4febed595@gmx.net>
From: Emmanuel Baccelli <Emmanuel.Baccelli@inria.fr>
Date: Sat, 22 Jul 2017 09:57:33 +0200
X-Google-Sender-Auth: h07wLfHuEsF-T70ggvehBz25Bhs
Message-ID: <CANK0pbbbgEONiCeuQGOuRO9Gq62RpAVhh53xLxd5JOMQtJg-_g@mail.gmail.com>
To: fud@ietf.org
Cc: Hannes Tschofenig <hannes.tschofenig@gmx.net>
Content-Type: multipart/alternative; boundary="94eb2c122e54c899ef0554e3564f"
Archived-At: <https://mailarchive.ietf.org/arch/msg/fud/PbSo0UeegBuOF_J9ajbfqNgZOCE>
Subject: Re: [Fud] Charter Text
X-BeenThere: fud@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: FUD - Firmware Updating Description <fud.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/fud>, <mailto:fud-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/fud/>
List-Post: <mailto:fud@ietf.org>
List-Help: <mailto:fud-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/fud>, <mailto:fud-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 22 Jul 2017 07:57:56 -0000

--94eb2c122e54c899ef0554e3564f
Content-Type: text/plain; charset="UTF-8"

Hi Hannes,

thanks a lot for the strawman! Reads well in my opinion.

At high level, I have the following comments & suggestions:

- we have the case of software updates, not only firmware updates, so I'd
rather we talk about the more general case of software updates. Is there a
strong reason against this?

- many people think IoT= RaspberryPi, so I think we should be very very
clear that we are also targeting constrained devices as defined in RFC7228.
In particular, I'm convinced we can (and should) explicitly include Class 1
devices as also being a target for such software updates.

- FUD is quite an unfortunate acronym. Here's an alternative name proposal
for the working group: how about SUIT (Software Updates for Internet of
Things).

(there is a heavy similarity between the above comments and the ones I put
forward during the f2f meeting in Prague, as well as with the comments I
posted on the manifest+arch drafts you submitted this week ;)

Cheers,

Emmanuel



On Fri, Jul 21, 2017 at 11:52 PM, Hannes Tschofenig <
hannes.tschofenig@gmx.net> wrote:

> Here is a strawman proposal for a charter text. Suggestions welcome!
>
> ----
>
> Firmware Updating Description (FUD)
>
> Vulnerabilities with Internet of Things (IoT) devices have raised the
> need for a secure firmware update mechanism that is also suitable for
> constrained devices. Security experts, researchers and regulators
> recommend that all IoT devices are equipped with such a mechanism. While
> there are many proprietary firmware update mechanisms in use today there
> is a lack of an modern interoperable approach of securely updating IoT
> devices.
>
> A firmware update solution consists of several components, including a
> mechanism to transport firmware images to IoT devices and a manifest
> that provides meta-data about the firmware image as well as
> cryptographic information for protecting the firmware image in an
> end-to-end fashion. With RFC 4018 the IETF standardized a manifest
> format that uses the Cryptographic Message Syntax (CMS) to protect
> firmware packages.
>
> Since the publication of RFC 4108 more than 10 years have passed and
> more experience with IoT deployments have lead to additional
> functionality requiring the work done with RFC 4108 to be revisited. The
> purpose of this group is to standardize a version 2 of RFC 4108 that
> reflects best current practices. This group will not define any
> transport mechanism.
>
> In 2016 the Internet Architecture Board organized a workshop on
> 'Internet of Things (IoT) Software Update (IOTSU)', which took place at
> Trinity College Dublin, Ireland on the 13th and 14th of June, 2016. The
> main goal of the workshop was to foster a discussion on requirements,
> challenges and solutions for bringing software and firmware updates to
> IoT devices. This workshop also made clear that there are challenges
> with lack of regulatory requirements, and misaligned incentives. It is
> nevertheless seen as important to standardize the building blocks that
> help interested parties to implement and deploy a solid firmware update
> mechanism.
>
> In particular this group aims to publish two documents, namely
>  * an IoT firmware update architecture that includes a description of
> the involved entities, security threats and assumptions, and
>  * the manifest format itself.
>
> This group does not aim to standardize a generic software update
> mechanism used by rich operating systems, like Linux, but instead
> focuses on software development practices in the embedded industry.
>
> This group will aim to develop a close relationship with silicon vendors
> and OEMs that develop IoT operating systems.
>
> Milestones
>
> Dec 2017     Submit "Architecture" document as WG item.
>
> Dec 2017     Submit "Manifest Format" specification as WG item.
>
> Jul 2018    Submit "Architecture" to the IESG for publication as an
> Informational RFC.
>
> Nov 2018     Submit "Manifest Format" to the IESG for publication as a
> Proposed Standard.
>
>
> Additional calendar items:
>
> Mar 2018     Release initial version of the manifest creation tools as
> open source.
>
> Apr 2018     Release first version of manifest test tool suite as open
> source.
>
> Jun 2018     Release first IoT OS implementation of firmware update
> mechanisms as open source.
>
> _______________________________________________
> Fud mailing list
> Fud@ietf.org
> https://www.ietf.org/mailman/listinfo/fud
>

--94eb2c122e54c899ef0554e3564f
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Hannes,<div><br></div><div>thanks a lot for the strawma=
n! Reads well in my opinion.=C2=A0</div><div><br></div><div>At high level, =
I have the following comments &amp; suggestions:</div><div><br></div><div>-=
 we have the case of software updates, not only firmware updates, so I&#39;=
d rather we talk about the more general case of software updates. Is there =
a strong reason against this?</div><div><br></div><div>- many people think =
IoT=3D RaspberryPi, so I think we should be very very clear that we are als=
o targeting constrained devices as defined in RFC7228.</div><div>In particu=
lar, I&#39;m convinced we can (and should) explicitly include Class 1 devic=
es as also being a target for such software updates.</div><div><br></div><d=
iv>- FUD is quite an unfortunate acronym. Here&#39;s an alternative name pr=
oposal for the working group: how about SUIT (Software Updates for Internet=
 of Things).</div><div><br></div><div>(there is a heavy similarity between =
the above comments and the ones I put forward during the f2f meeting in Pra=
gue, as well as with the comments I posted on the manifest+arch drafts you =
submitted this week ;)<br></div><div><br></div><div>Cheers,</div><div><br><=
/div><div>Emmanuel</div><div><br></div><div><br></div><div class=3D"gmail_e=
xtra"><br><div class=3D"gmail_quote">On Fri, Jul 21, 2017 at 11:52 PM, Hann=
es Tschofenig <span dir=3D"ltr">&lt;<a href=3D"mailto:hannes.tschofenig@gmx=
.net" target=3D"_blank">hannes.tschofenig@gmx.net</a>&gt;</span> wrote:<br>=
<blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1p=
x #ccc solid;padding-left:1ex">Here is a strawman proposal for a charter te=
xt. Suggestions welcome!<br>
<br>
----<br>
<br>
Firmware Updating Description (FUD)<br>
<br>
Vulnerabilities with Internet of Things (IoT) devices have raised the<br>
need for a secure firmware update mechanism that is also suitable for<br>
constrained devices. Security experts, researchers and regulators<br>
recommend that all IoT devices are equipped with such a mechanism. While<br=
>
there are many proprietary firmware update mechanisms in use today there<br=
>
is a lack of an modern interoperable approach of securely updating IoT<br>
devices.<br>
<br>
A firmware update solution consists of several components, including a<br>
mechanism to transport firmware images to IoT devices and a manifest<br>
that provides meta-data about the firmware image as well as<br>
cryptographic information for protecting the firmware image in an<br>
end-to-end fashion. With RFC 4018 the IETF standardized a manifest<br>
format that uses the Cryptographic Message Syntax (CMS) to protect<br>
firmware packages.<br>
<br>
Since the publication of RFC 4108 more than 10 years have passed and<br>
more experience with IoT deployments have lead to additional<br>
functionality requiring the work done with RFC 4108 to be revisited. The<br=
>
purpose of this group is to standardize a version 2 of RFC 4108 that<br>
reflects best current practices. This group will not define any<br>
transport mechanism.<br>
<br>
In 2016 the Internet Architecture Board organized a workshop on<br>
&#39;Internet of Things (IoT) Software Update (IOTSU)&#39;, which took plac=
e at<br>
Trinity College Dublin, Ireland on the 13th and 14th of June, 2016. The<br>
main goal of the workshop was to foster a discussion on requirements,<br>
challenges and solutions for bringing software and firmware updates to<br>
IoT devices. This workshop also made clear that there are challenges<br>
with lack of regulatory requirements, and misaligned incentives. It is<br>
nevertheless seen as important to standardize the building blocks that<br>
help interested parties to implement and deploy a solid firmware update<br>
mechanism.<br>
<br>
In particular this group aims to publish two documents, namely<br>
=C2=A0* an IoT firmware update architecture that includes a description of<=
br>
the involved entities, security threats and assumptions, and<br>
=C2=A0* the manifest format itself.<br>
<br>
This group does not aim to standardize a generic software update<br>
mechanism used by rich operating systems, like Linux, but instead<br>
focuses on software development practices in the embedded industry.<br>
<br>
This group will aim to develop a close relationship with silicon vendors<br=
>
and OEMs that develop IoT operating systems.<br>
<br>
Milestones<br>
<br>
Dec 2017=C2=A0 =C2=A0 =C2=A0Submit &quot;Architecture&quot; document as WG =
item.<br>
<br>
Dec 2017=C2=A0 =C2=A0 =C2=A0Submit &quot;Manifest Format&quot; specificatio=
n as WG item.<br>
<br>
Jul 2018=C2=A0 =C2=A0 Submit &quot;Architecture&quot; to the IESG for publi=
cation as an<br>
Informational RFC.<br>
<br>
Nov 2018=C2=A0 =C2=A0 =C2=A0Submit &quot;Manifest Format&quot; to the IESG =
for publication as a<br>
Proposed Standard.<br>
<br>
<br>
Additional calendar items:<br>
<br>
Mar 2018=C2=A0 =C2=A0 =C2=A0Release initial version of the manifest creatio=
n tools as<br>
open source.<br>
<br>
Apr 2018=C2=A0 =C2=A0 =C2=A0Release first version of manifest test tool sui=
te as open<br>
source.<br>
<br>
Jun 2018=C2=A0 =C2=A0 =C2=A0Release first IoT OS implementation of firmware=
 update<br>
mechanisms as open source.<br>
<br>
______________________________<wbr>_________________<br>
Fud mailing list<br>
<a href=3D"mailto:Fud@ietf.org" target=3D"_blank">Fud@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/fud" rel=3D"noreferrer" ta=
rget=3D"_blank">https://www.ietf.org/mailman/l<wbr>istinfo/fud</a><br>
</blockquote></div><br></div></div>

--94eb2c122e54c899ef0554e3564f--

