From scott.mansfield@ericsson.com Mon Oct 14 06:29:42 2013 Return-Path: X-Original-To: saag@ietfa.amsl.com Delivered-To: saag@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EA79F21F9D94 for ; Mon, 14 Oct 2013 06:29:42 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=-0.001, BAYES_00=-2.599, HTML_MESSAGE=0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EEzpWIz5lo5A for ; Mon, 14 Oct 2013 06:29:37 -0700 (PDT) Received: from usevmg21.ericsson.net (usevmg21.ericsson.net [198.24.6.65]) by ietfa.amsl.com (Postfix) with ESMTP id 83ADB21F9AD2 for ; Mon, 14 Oct 2013 06:28:56 -0700 (PDT) X-AuditID: c6180641-b7fe28e000000d82-f3-525bf1938933 Received: from EUSAAHC008.ericsson.se (Unknown_Domain [147.117.188.96]) by usevmg21.ericsson.net (Symantec Mail Security) with SMTP id 25.ED.03458.491FB525; Mon, 14 Oct 2013 15:28:52 +0200 (CEST) Received: from EUSAAMB105.ericsson.se ([147.117.188.122]) by EUSAAHC008.ericsson.se ([147.117.188.96]) with mapi id 14.02.0328.009; Mon, 14 Oct 2013 09:28:51 -0400 From: Scott Mansfield To: "saag@ietf.org" Thread-Topic: Approval of ITU-T X.ipv6-secguide Thread-Index: Ac7I4VAtnICuhieZQXiXIaGpvoqwlQ== Date: Mon, 14 Oct 2013 13:28:50 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [147.117.188.134] Content-Type: multipart/alternative; boundary="_000_EF35EE4B92789843B1DECBC0E245586411ADEE34eusaamb105erics_" MIME-Version: 1.0 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFtrOLMWRmVeSWpSXmKPExsUyuXRPgu6Uj9FBBsceilpM6e9kcmD0WLLk J1MAYxSXTUpqTmZZapG+XQJXxrtdP5gKlstVbH97mbmB8YNUFyMnh4SAicThz0/YIGwxiQv3 1gPZXBxCAkcZJS4/P8IE4SxnlOie2c0EUsUG1LF113RGEFtEQFli+Z/n7CC2sICWxITtz9gg 4voSqxZ+Yoew9SSu/boEFmcRUJX4N3E3UC8HB6+Ar8Sr674gYUagxd9PrQEbzywgLnHryXwm iIMEJJbsOc8MYYtKvHz8jxXCVpZY8mQ/C0R9vsSX1u9g5/AKCEqcnPmEZQKj0Cwko2YhKZuF pAwiriOxYPcnNghbW2LZwtfMMPaZA4+ZkMUXMLKvYuQoLU4ty003MtzECAz8YxJsjjsYF3yy PMQozcGiJM775a1zkJBAemJJanZqakFqUXxRaU5q8SFGJg5OqQbGuTUnT3D+73J6aXbb2G3b 1RK3onurT3fe5dv0ul9ccQnPmg9vog4FFK5PTV9R+OBd0ROZqFnbjJevE211mhaQX3HhhsS+ t2X/Hd5vumBUltnxf4vR7nCLHTcdUn7khbqyLF+ZdWr6VJZuef4tP0/3x12Xv1hutvCexbqT dnPSmHX4o8M9ONYrKrEUZyQaajEXFScCAKvBj1FKAgAA Subject: [saag] Approval of ITU-T X.ipv6-secguide X-BeenThere: saag@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Security Area Advisory Group List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 14 Oct 2013 13:29:43 -0000 --_000_EF35EE4B92789843B1DECBC0E245586411ADEE34eusaamb105erics_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable I received an announcement that X.1037 is now considered approved. There w= ere no comments received during the Additional Review period. The public a= nnouncement will go out on 16 October. http://www.itu.int/itu-t/workprog/wp_item.aspx?isn=3D9421 Even though the text is approved, the final publication of the document has= not been released yet. The text was liaised to the IETF on 7 May see (htt= ps://datatracker.ietf.org/liaison/1255/ ). Regards, -scott. Scott Mansfield Ericsson Inc. +1 724 931 9316 --_000_EF35EE4B92789843B1DECBC0E245586411ADEE34eusaamb105erics_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

 

I received an announcement that X.1037 is now consid= ered approved.  There were no comments received during the Additional = Review period.  The public announcement will go out on 16 October.

 

http://www.itu.int/itu-t/workprog/wp_item.aspx?isn=3D9421=

 

Even though the text is approved, the final publicat= ion of the document has not been released yet.  The text was liaised t= o the IETF on 7 May see (https://datatracker.ietf.org/liaison/1255/ ).

 

Regards,

-scott.

 

 

Scott Mansfield

Ericsson Inc.

+1 724 931 9316

 

--_000_EF35EE4B92789843B1DECBC0E245586411ADEE34eusaamb105erics_-- From scott.mansfield@ericsson.com Mon Oct 14 07:09:48 2013 Return-Path: X-Original-To: saag@ietfa.amsl.com Delivered-To: saag@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D1DD021F94FF for ; Mon, 14 Oct 2013 07:09:48 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.598 X-Spam-Level: X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[AWL=-0.000, BAYES_00=-2.599, HTML_MESSAGE=0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id I8U0EsrdLmqQ for ; Mon, 14 Oct 2013 07:09:39 -0700 (PDT) Received: from usevmg20.ericsson.net (usevmg20.ericsson.net [198.24.6.45]) by ietfa.amsl.com (Postfix) with ESMTP id 8CEC921F83EF for ; Mon, 14 Oct 2013 07:09:39 -0700 (PDT) X-AuditID: c618062d-b7fda8e0000024c6-27-525bfb22a4c3 Received: from EUSAAHC005.ericsson.se (Unknown_Domain [147.117.188.87]) by usevmg20.ericsson.net (Symantec Mail Security) with SMTP id CB.71.09414.22BFB525; Mon, 14 Oct 2013 16:09:38 +0200 (CEST) Received: from EUSAAMB105.ericsson.se ([147.117.188.122]) by EUSAAHC005.ericsson.se ([147.117.188.87]) with mapi id 14.02.0328.009; Mon, 14 Oct 2013 10:09:37 -0400 From: Scott Mansfield To: "saag@ietf.org" Thread-Topic: X.csi (Guideline for cybersecurity index) Thread-Index: Ac7I5wErXWxqgAALTAWeArFPeDKnDA== Date: Mon, 14 Oct 2013 14:09:36 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [147.117.188.134] Content-Type: multipart/alternative; boundary="_000_EF35EE4B92789843B1DECBC0E245586411ADEFAAeusaamb105erics_" MIME-Version: 1.0 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFtrOLMWRmVeSWpSXmKPExsUyuXRPuK7S7+ggg/l9uhZT+juZHBg9liz5 yRTAGMVlk5Kak1mWWqRvl8CV8eItW8Eu8YrJK/awNjC+Fuli5OSQEDCR+Nr3jQ3CFpO4cG89 kM3FISRwlFFiWu8edghnOaPE+85edpAqNqCOrbumM4LYIgLKEsv/PAeLCwsYSUxZeJwNIm4u seD7fqgaPYnv54+ygNgsAqoSuydOA6vnFfCVmPh0IVicEWjz91NrmEBsZgFxiVtP5jNBXCQg sWTPeWYIW1Ti5eN/rBC2ssSSJ/tZIOrzJba+WM0MMVNQ4uTMJywTGIVmIRk1C0nZLCRlEHEd iQW7P7FB2NoSyxa+Zoaxzxx4zIQsvoCRfRUjR2lxalluupHBJkZg4B+TYNPdwbjnpeUhRmkO FiVx3i9vnYOEBNITS1KzU1MLUovii0pzUosPMTJxcEo1MEZesJ/FuzX8yjyhqDfqk1++f9Vl 9bG0devfJUtl9Nrmify6cLv00Z2NPf6LZc/kPbD45PxCJMnCx7Nh1fs/36RuuwUJeG0/FNIx 9fCK3tf3nSR3Pt9/Lmpl7N2Hcw8fUY7lfOKwond1qP7a9eqsIuF199+oCR2XzD045fbezk9d f33bag/+zNNRYinOSDTUYi4qTgQAy0ZZNEoCAAA= Subject: [saag] X.csi (Guideline for cybersecurity index) X-BeenThere: saag@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Security Area Advisory Group List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 14 Oct 2013 14:09:49 -0000 --_000_EF35EE4B92789843B1DECBC0E245586411ADEFAAeusaamb105erics_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable X.1208 (X.csi) was not approved at the last ITU-T SG17 meeting. Two Member= States (Countries) objected. I will provide more details once the meeting= report is available. Regards, -scott. Scott Mansfield Ericsson Inc. +1 724 931 9316 --_000_EF35EE4B92789843B1DECBC0E245586411ADEFAAeusaamb105erics_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

X.1208 (X.csi) was not approved at the last ITU-T SG= 17 meeting.  Two Member States (Countries) objected.  I will prov= ide more details once the meeting report is available.

 

Regards,

-scott.

 

 

 

Scott Mansfield

Ericsson Inc.

+1 724 931 9316

 

--_000_EF35EE4B92789843B1DECBC0E245586411ADEFAAeusaamb105erics_-- From ogud@ogud.com Tue Oct 15 05:53:49 2013 Return-Path: X-Original-To: saag@ietfa.amsl.com Delivered-To: saag@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A42E511E81ED for ; Tue, 15 Oct 2013 05:53:49 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.437 X-Spam-Level: X-Spam-Status: No, score=-102.437 tagged_above=-999 required=5 tests=[AWL=0.161, BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FXakdsiytv-z for ; Tue, 15 Oct 2013 05:53:45 -0700 (PDT) Received: from smtp96.ord1c.emailsrvr.com (smtp96.ord1c.emailsrvr.com [108.166.43.96]) by ietfa.amsl.com (Postfix) with ESMTP id C3ACB11E81E9 for ; Tue, 15 Oct 2013 05:53:44 -0700 (PDT) Received: from localhost (localhost.localdomain [127.0.0.1]) by smtp5.relay.ord1c.emailsrvr.com (SMTP Server) with ESMTP id 68AAD1B06FA for ; Tue, 15 Oct 2013 08:53:44 -0400 (EDT) X-Virus-Scanned: OK Received: by smtp5.relay.ord1c.emailsrvr.com (Authenticated sender: ogud-AT-ogud.com) with ESMTPSA id 352C51B0296 for ; Tue, 15 Oct 2013 08:53:44 -0400 (EDT) From: Olafur Gudmundsson Content-Type: multipart/alternative; boundary="Apple-Mail=_8DBEB0F6-9587-4412-A1EF-DF204E75543E" Message-Id: Date: Tue, 15 Oct 2013 08:53:46 -0400 To: saag@ietf.org Mime-Version: 1.0 (Mac OS X Mail 6.6 \(1510\)) X-Mailer: Apple Mail (2.1510) X-Mailman-Approved-At: Tue, 15 Oct 2013 08:02:04 -0700 Subject: [saag] Nominations for IESG wanted X-BeenThere: saag@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Security Area Advisory Group List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 15 Oct 2013 12:53:49 -0000 --Apple-Mail=_8DBEB0F6-9587-4412-A1EF-DF204E75543E Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=us-ascii Please look around and think about who you think might be a good = candidate for IESG.=20 Nomcom needs more qualified candidates in many area's.=20 In particular think about candidates that would increase diversity Olafur (nomcom member)=20 ------- Nominations for the IESG, IAB, and IAOC are due to the Nomcom by Friday, = 18 October, 2013. Is there someone you work with at IETF who has leadership potential and = a growing track record? Please read the Nomcom call for nominations and = consider nominating her or him. Or several folks! Deadline for = nominations is October 18. Nominate soon to give your nominee(s) plenty = time to fill in the questionnaire. Information about the desired = expertise for positions is here:=20 https://datatracker.ietf.org/nomcom/2013/expertise Lots more, including which positions are open, how to make a nomination, = and how to=20 send us your feedback on the desired expertise, follows. IETFers, let's hear from you! Make nominations, accept nominations! If you have any questions about the process, feel free to get in touch = with me. Best regards, Allison for the Nomcom Allison Mankin=20 Nomcom Chair 2013-14 ----- The Info You Need for Nominating ----- The 2013-14 Nominating Committee (Nomcom) is seeking nominations from now until October 18, 2013. The open positions being considered by this year's Nomcom can be found later in this section, and also on this year's Nomcom website:=20 https://datatracker.ietf.org/nomcom/2013/ Nominations may be made by selecting the Nominate link at the top of the Nomcom 2013 home page, or by visiting the following URL:=20 https://datatracker.ietf.org/nomcom/2013/nominate/ Note that nominations made using the web tool require an ietf.org=20 datatracker account. You can create a datatracker ietf.org account=20 if you don't have one already by visiting the following URL: https://datatracker.ietf.org/accounts/create/ Nominations may also be made by email to nomcom13 at ietf.org. If you nominate by email, please include the word "Nominate" in the = Subject and indicate in the email who is being nominated, their email address = (to confirm acceptance of the nomination), and the position for which you are making the nomination. If you use email, please use a separate email = for each person you nominate, and for each position (if you are nominating = one person for multiple positions). Self-nomination is welcome! No need to be shy. Nomcom 2013-14 will follow the policy for "Open Disclosure of Willing Nominees" described in RFC 5680. As stated in RFC 5680: "The list of nominees willing to be considered for positions under review in the current Nomcom cycle is not confidential". Willing nominees for each position will be listed in a publicly accessible way - anyone with a datatracker account may access the lists. In all other ways, the=20 confidentiality requirements of RFC 3777/BCP10 remain in effect. All feedback and all Nomcom deliberations will remain confidential and will not be disclosed. =20 In order to ensure time to collect sufficient community feedback about each of the willing nominees, nominations must be received by the=20 Nomcom on or before October 18, 2013. Please submit your nominations =20= as early as possible for the sake of your nominees, as we've set the=20 questionnaire submission deadline for October 25, 2013. The list of people and posts whose terms end with the March 2014 IETF = meeting,=20 and thus the positions for which we are accepting nominations: =20 IAOC Chris Griffiths IAB Bernard Aboba Marc Blanchet Ross Callon Eliot Lear Hannes Tschofenig IESG Barry Leiba (Applications) Brian Haberman (Internet) Benoit Claise (Operations and Management) Gonzalo Camarillo (RAI) Stewart Bryant (Routing) Sean Turner (Security) Martin Stiemerling (Transport) Please be resourceful in identifying possible candidates for these positions, as developing our talent is a very crucial requirement for the IETF. Also, please give serious consideration to accepting = nominations you receive. =20 The summaries of the desired expertise for the positions, developed by = the=20 respective bodies, are found at: https://datatracker.ietf.org/nomcom/2013/expertise/ In addition to nominations, the Nomcom seeks community input on=20 the positions themselves. We need and welcome the community's=20 views and input on the jobs within each organization. If you=20 have ideas on the positions' responsibilities (more, less,=20 different), please let us know. You can send us email about this to nomcom13 at ietf.org, and we will use this feedback actively. Thank you for your help in nominating a great pool of strong and = interesting nominees! --Apple-Mail=_8DBEB0F6-9587-4412-A1EF-DF204E75543E Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=us-ascii Olafur (nomcom = member) 

-------
Nominations for = the IESG, IAB, and IAOC are due to the Nomcom by Friday, 18 October, = 2013.

Is there someone you work with at IETF who has leadership = potential and a growing track record? Please read the Nomcom call for = nominations and consider nominating her or him. Or several folks! = Deadline for nominations is October 18.  Nominate soon to give your = nominee(s) plenty time to fill in the questionnaire. Information about = the desired expertise for positions is = here: 
          = ;https://datatr= acker.ietf.org/nomcom/2013/expertise

Lots more, including = which positions are open, how to make a nomination, and how = to 
send us your feedback on the desired expertise, = follows.

IETFers, let's hear from you!  Make nominations, = accept nominations!

If you have any questions about the process, = feel free to get in touch with me.

Best regards,

Allison = for the Nomcom

Allison Mankin 
Nomcom Chair = 2013-14

----- The Info You Need for Nominating -----

The = 2013-14 Nominating Committee (Nomcom) is seeking nominations
from now = until October 18, 2013. The open positions being considered
by this = year's Nomcom can be found later in this section, and also on
this = year's Nomcom website: 

https://datatracker.iet= f.org/nomcom/2013/

Nominations may be made by selecting the = Nominate link at the top of
the Nomcom 2013 home page, or by visiting = the following URL: 

https://datatr= acker.ietf.org/nomcom/2013/nominate/

Note that nominations = made using the web tool require an ietf.org 
datatracker account. You = can create a datatracker ietf.org account 
if you = don't have one already by visiting the following URL:

https://datatracker= .ietf.org/accounts/create/

Nominations may also be made by = email to nomcom13 at ietf.org.
If= you nominate by email, please include the word "Nominate" in the = Subject
and indicate in the email who is being nominated, their email = address (to
confirm acceptance of the nomination), and the position = for which you
are making the nomination. If you use email, please use = a separate email for
each person you nominate, and for each position = (if you are nominating one
person for multiple = positions).

Self-nomination is welcome!  No need to be = shy.

Nomcom 2013-14 will follow the policy for "Open Disclosure = of Willing
Nominees" described in RFC 5680.  As stated in RFC = 5680: "The list of
nominees willing to be considered for positions = under review in the
current Nomcom cycle is not confidential". = Willing nominees for each
position will be listed in a publicly = accessible way - anyone with a
datatracker account may access the = lists.  In all other ways, the 
confidentiality = requirements of RFC 3777/BCP10 remain in effect.  All
feedback = and all Nomcom deliberations will remain confidential and will
not be = disclosed.  

In order to ensure time to collect sufficient = community feedback about
each of the willing nominees, nominations = must be received by the 
Nomcom on or before October 18, 2013. =  Please submit your nominations  
as early as possible for = the sake of your nominees, as we've set the 
questionnaire = submission deadline for October 25, 2013.

The list of people and = posts whose terms end with the March 2014 IETF meeting, 
and = thus the positions for which we are accepting nominations: =  

IAOC
Chris Griffiths

IAB
Bernard = Aboba
Marc Blanchet
Ross Callon
Eliot Lear
Hannes = Tschofenig

IESG
Barry Leiba (Applications)
Brian Haberman = (Internet)
Benoit Claise (Operations and Management)
Gonzalo = Camarillo (RAI)
Stewart Bryant (Routing)
Sean Turner = (Security)
Martin Stiemerling (Transport)

Please be = resourceful in identifying possible candidates for these
positions, = as developing our talent is a very crucial requirement for
the IETF. =  Also, please give serious consideration to accepting = nominations
you receive.  

The summaries of the desired = expertise for the positions, developed by the 
respective = bodies, are found at:

https://datat= racker.ietf.org/nomcom/2013/expertise/

In addition to = nominations, the Nomcom seeks community input on 
the positions = themselves.  We need and welcome the community's 
views and = input on the jobs within each organization. If you 
have ideas = on the positions' responsibilities (more, less, 
different), = please let us know.  You can send us email about this = to
nomcom13 at ietf.org, and we = will use this feedback actively.

Thank you for your help in = nominating a great pool of strong and = interesting
nominees!

= --Apple-Mail=_8DBEB0F6-9587-4412-A1EF-DF204E75543E-- From weihaw@google.com Tue Oct 15 22:26:58 2013 Return-Path: X-Original-To: saag@ietfa.amsl.com Delivered-To: saag@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 95C1821F9FBA for ; Tue, 15 Oct 2013 22:26:58 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.977 X-Spam-Level: X-Spam-Status: No, score=-1.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jeyxG2mopmdA for ; Tue, 15 Oct 2013 22:26:58 -0700 (PDT) Received: from mail-qe0-x235.google.com (mail-qe0-x235.google.com [IPv6:2607:f8b0:400d:c02::235]) by ietfa.amsl.com (Postfix) with ESMTP id 7E3F911E80D9 for ; Tue, 15 Oct 2013 22:26:54 -0700 (PDT) Received: by mail-qe0-f53.google.com with SMTP id cy11so214249qeb.12 for ; Tue, 15 Oct 2013 22:26:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:from:date:message-id:subject:to:content-type; bh=OxFHgUNHgPFL7bl1SH2eFrqlLUVae8FnYijG4T3Iw68=; b=QXhBVQ3R4ULSK8VGYrCm0v97legVWSj52NQ/tzWKk+zihuBzakRTNdq3smLW4MCjQO nWu0k5+1UXvRyV61DIT3Sxv+COdfwd3Lfl++SMJM7VFIDQf28ZL+ey6PmY4v+vaWBaIk E9HlWyBE3UAgHPrudBLetR1To1L/ilmkfkYn4HOaNj9KBx37Ek4ZJn+hFKYIamcwU30d UNvHIxn3fnQF709CgpNA0qA7vcrrHlCAeTgixIapXt9rb/90uM+QoMBUc4u7MWlQRNq4 fpKYlOlfTvaEm/QnDH8cgYdhGoyMCH9yu/xZuP6xJmTp1odmxQHj8QMH/ytVBRUSivBu ZSeQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:from:date:message-id:subject:to :content-type; bh=OxFHgUNHgPFL7bl1SH2eFrqlLUVae8FnYijG4T3Iw68=; b=k74f2I+KWzyUc6Ar9dz6DcEoB15J/62ljPv9quy6MYGKnV9qKkrQByX5bctnTHj4Ah toYvZfVIxlQmhd+a4MOY6cZnxGy8l68EzCc9eX+FrC9AIcCJy1rUcIIlhExbCJYqA7ty GdMIUHggKyyy2tdk3N9Fr+okfQFPYYCnTcCXLpaDHnbN3lLxMPHdvQtsghOGxGJlpjKm kOiBtYPUTIDVHf1s3kFUtWt3SIUN4CIQ4PnbvUhtoYj5PZAgB8Mnw9bhgTaV9B6Ma6zn wpMO+H3Qov2rQwXYUTf5H2kFB5rcgDhA9SHP6NwupCTh+kKL+to5RT80e8mVRAEVBXZ2 VfXQ== X-Gm-Message-State: ALoCoQl5GCCyOsscMRIC7IjESwF70OM1xkqqeJ7epWNfpubswQvllaIaV+a5AxPQ/xOVeeBNr46T5D0TIn1WKts6Gm0OiJQEcxEaVKnwDohctWchO9TwT26EGWFAn7AGU+KdH79CTiak2MPKfEd6w2gRswoZhmmpp8DLGQMab96c1c0+GORQkWSr/fRyOF5fYXrI48rHBzWg X-Received: by 10.49.110.36 with SMTP id hx4mr1072164qeb.93.1381901211679; Tue, 15 Oct 2013 22:26:51 -0700 (PDT) MIME-Version: 1.0 Received: by 10.229.183.132 with HTTP; Tue, 15 Oct 2013 22:26:31 -0700 (PDT) From: Wei Chuang Date: Tue, 15 Oct 2013 22:26:31 -0700 Message-ID: To: saag Content-Type: multipart/alternative; boundary=047d7bdc94ccd663bc04e8d4f2d5 Subject: [saag] Request for discussion of Mandatory Secure Mail Delivery proposal (draft-wchuang-msmd) X-BeenThere: saag@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Security Area Advisory Group List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 16 Oct 2013 05:26:58 -0000 --047d7bdc94ccd663bc04e8d4f2d5 Content-Type: text/plain; charset=ISO-8859-1 Hi saag, (resend) Request for discussion (draft-wchuang-msmd) of a proposal to secure mail from eavesdropping and MitM attacks. I posted the primary thread to ietf-smtp@and request that all discussion go to that list . Here's the abstract: Opportunistic SMTP TLS does not enforce electronic mail delivery using TLS leading to potential loss of privacy and security. We propose an optional mail header extension "mandatory-secure-mail- delivery:" and SMTP EHLO response extension "MSMD" that indicates mail must be delivered privately using TLS and with integrity using DKIM, and thereby provide a security guarantee to the user. When mail is sent with the header indicating privacy and integrity and if the receiving party does not support this, the mail is instead bounced. To protect the mail after delivery, the destination SMTP server must advertise its capabilities as part of the EHLO response, and the sender can choose whether the destination is able to honor the privacy requirements specified on the mail header. Link to the proposal here: http://datatracker.ietf.org/doc/draft-wchuang-msmd/ -Wei PS Pardon for any IETF formatting or etiquette errors as I'm very new to the IETF process. --047d7bdc94ccd663bc04e8d4f2d5 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
Hi saag,

(resend)

Request for discussion (draft-= wchuang-msmd) of a proposal to secure mail=A0from eavesdropping and MitM attacks. =A0I pos= ted the primary thread to ietf-smtp@ and request that all discussion go to = that list.

Her= e's the abstract:

   Opportunistic SMTP TLS does not enforce electronic mail delivery
   using TLS leading to potential loss of privacy and security.  We
   propose an optional mail header extension "mandatory-secure-mail-
   delivery:" and SMTP EHLO response extension "MSMD" that i=
ndicates
   mail must be delivered privately using TLS and with integrity using
   DKIM, and thereby provide a security guarantee to the user.  When
   mail is sent with the header indicating privacy and integrity and if
   the receiving party does not support this, the mail is instead
   bounced.  To protect the mail after delivery, the destination SMTP
   server must advertise its capabilities as part of the EHLO response,
   and the sender can choose whether the destination is able to honor
   the privacy requirements specified on the mail header.
<= span style=3D"font-family:arial,sans-serif;font-size:13px">
Link to t= he proposal here:

-Wei

PS Pardon for any IETF formatting or etiquette errors as I'm very ne= w to the IETF process.


--047d7bdc94ccd663bc04e8d4f2d5-- From weihaw@google.com Tue Oct 15 12:35:47 2013 Return-Path: X-Original-To: saag@ietfa.amsl.com Delivered-To: saag@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C9B5711E8166 for ; Tue, 15 Oct 2013 12:35:47 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.977 X-Spam-Level: X-Spam-Status: No, score=-1.977 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FM_FORGED_GMAIL=0.622, HTML_MESSAGE=0.001, NO_RELAYS=-0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hK8lQABljwZq for ; Tue, 15 Oct 2013 12:35:47 -0700 (PDT) Received: from mail-qa0-x22f.google.com (mail-qa0-x22f.google.com [IPv6:2607:f8b0:400d:c00::22f]) by ietfa.amsl.com (Postfix) with ESMTP id DE59D21F9BAB for ; Tue, 15 Oct 2013 12:35:46 -0700 (PDT) Received: by mail-qa0-f47.google.com with SMTP id k15so3519304qaq.20 for ; Tue, 15 Oct 2013 12:35:46 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:from:date:message-id:subject:to:content-type; bh=XP5Yw9nVKfruYacdmea5P5zIPW1R/BDR8w1kPUeIDqo=; b=RZom+PonusmqhGAhbsJzl5+bRpYG5hQOGvMD20biQ6BrKAVuR2b9AEXkQ7h/VmYOeZ 0AEGDRov8rbjMCeuLw0mHNusDKhjhIXE1Bl2hZmuIEN4foQ71G+S/zi1CcHnv9GWUIj2 uIKTv4/HbilmZhseib2Q9sRCwXj+YWMX0AJ7sPe/93wzZjsULPTz6RGKTYwRPGPR+lpS nCgFUwvGRRBdU5HA+LNaEncEt4J8eIAbufTT3hUhKIx8L7Vz+fMPY+BLxa5X56YLfFj1 8rx9gEd0iak2Sf1j+m2KN4X9Z2vDMdmfUddKkLCbEHTIDh8JMxxqkRF5IJd1+JDmcs0X 388g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:from:date:message-id:subject:to :content-type; bh=XP5Yw9nVKfruYacdmea5P5zIPW1R/BDR8w1kPUeIDqo=; b=HWE7AMgtHy6AGTHaAwZ910VLKK1Ic3p5jz592UCod7IkJC8DR9HoAGl2ginck3G/9P UwRdhwMHa9iPLfBIDGTIADDIqsHZoNQqUDJ2ZflsMp25O2Z4FPoSR5Mjc0o3JeGZDDaC 1k3X2t6Vq9eIhJVonTl9AaAPbYw4DIbiMMZM9u+ruJ0aa+e0kRQMNAtL3k82nos6tfUT 8x3/P0WvPV3jH0QEoIY/oEdZnjVz1TtihE8EVjzq880mCeHN6HkqAU0/pgwkX19KyoEp +OeLI4vAHkX9ywrqTsxQSwbBAt9ZG0froWMbB1hA8ZXHPhtAwyZsSp+VBJmyONA9f4AE hzcA== X-Gm-Message-State: ALoCoQnNCaFkHhCsx+f7HxUQlBOlpdZdoGE1iKUI1YNHVtAq0aqyNTjnIDdNDlTHIxRQPpEHXK0H1dPHkuuYtD1w2ra8DKkXkgcKV0juiZjuJ+Vww4C3u4QTYBF8WEh+SUVHDA/oUDuaOeONQYaKkdUr6xDDm4FsEw+hWXdmumfhjtKfA66G7/2sLWeeDcVMfv+S3AyTnVju X-Received: by 10.224.138.4 with SMTP id y4mr27044589qat.65.1381865746272; Tue, 15 Oct 2013 12:35:46 -0700 (PDT) MIME-Version: 1.0 Received: by 10.229.183.132 with HTTP; Tue, 15 Oct 2013 12:35:26 -0700 (PDT) From: Wei Chuang Date: Tue, 15 Oct 2013 12:35:26 -0700 Message-ID: To: apps-discuss@ietf.org, saag@ietf.org Content-Type: multipart/alternative; boundary=001a11c29f4cef29ed04e8ccb059 X-Mailman-Approved-At: Wed, 16 Oct 2013 08:02:50 -0700 Subject: [saag] Request for discussion of Mandatory Secure Mail Delivery proposal (draft-wchuang-msmd) X-BeenThere: saag@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Security Area Advisory Group List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 15 Oct 2013 19:38:25 -0000 --001a11c29f4cef29ed04e8ccb059 Content-Type: text/plain; charset=ISO-8859-1 Hi apps-discuss and saag, Request for discussion (draft-wchuang-msmd) of a proposal to secure mail from eavesdropping and MitM attacks. I posted the primary thread to ietf-smtp@and request that all discussion go to that list . Here's the abstract: Opportunistic SMTP TLS does not enforce electronic mail delivery using TLS leading to potential loss of privacy and security. We propose an optional mail header extension "mandatory-secure-mail- delivery:" and SMTP EHLO response extension "MSMD" that indicates mail must be delivered privately using TLS and with integrity using DKIM, and thereby provide a security guarantee to the user. When mail is sent with the header indicating privacy and integrity and if the receiving party does not support this, the mail is instead bounced. To protect the mail after delivery, the destination SMTP server must advertise its capabilities as part of the EHLO response, and the sender can choose whether the destination is able to honor the privacy requirements specified on the mail header. Link to the proposal here: http://datatracker.ietf.org/doc/draft-wchuang-msmd/ -Wei PS Pardon for any IETF formatting or etiquette errors as I'm very new to the IETF process. --001a11c29f4cef29ed04e8ccb059 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
Hi apps-discus= s and saag,

Request for discussion (draft-wchuang-msmd) = of a proposal to secure mail=A0from eavesdropping and MitM attacks. =A0I posted the primar= y thread to ietf-smtp@ and request that all discussion go to that list.

Her= e's the abstract:

   Opportunistic SMTP TLS does not enforce electronic mail delivery
   using TLS leading to potential loss of privacy and security.  We
   propose an optional mail header extension "mandatory-secure-mail-
   delivery:" and SMTP EHLO response extension "MSMD" that i=
ndicates
   mail must be delivered privately using TLS and with integrity using
   DKIM, and thereby provide a security guarantee to the user.  When
   mail is sent with the header indicating privacy and integrity and if
   the receiving party does not support this, the mail is instead
   bounced.  To protect the mail after delivery, the destination SMTP
   server must advertise its capabilities as part of the EHLO response,
   and the sender can choose whether the destination is able to honor
   the privacy requirements specified on the mail header.
<= span style=3D"font-family:arial,sans-serif;font-size:13px">
Link to t= he proposal here:
<= div>
-Wei

PS Pardon for any IETF formatting or etiquette errors as I'm very ne= w to the IETF process.

--001a11c29f4cef29ed04e8ccb059-- From wmills@yahoo-inc.com Thu Oct 17 11:33:55 2013 Return-Path: X-Original-To: saag@ietfa.amsl.com Delivered-To: saag@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 94B8011E82AF for ; Thu, 17 Oct 2013 11:33:55 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -18.598 X-Spam-Level: X-Spam-Status: No, score=-18.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, USER_IN_DEF_WHITELIST=-15] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ylrUn9QO4jv9 for ; Thu, 17 Oct 2013 11:33:51 -0700 (PDT) Received: from mrout1.yahoo.com (mrout1.yahoo.com [216.145.54.171]) by ietfa.amsl.com (Postfix) with ESMTP id EB83611E8191 for ; Thu, 17 Oct 2013 11:33:50 -0700 (PDT) Received: from BF1-EX10-CAHT08.y.corp.yahoo.com (bf1-ex10-caht08.corp.bf1.yahoo.com [10.74.209.196]) by mrout1.yahoo.com (8.14.4/8.14.4/y.out) with ESMTP id r9HIWuEL027086 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL) for ; Thu, 17 Oct 2013 11:32:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=yahoo-inc.com; s=cobra; t=1382034778; bh=k6ChyKBeCWOB7C3hWWuK6KE9vA8hBqcKCRWL1Ov5msU=; h=References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To: MIME-Version:Content-Type; b=S9pKgfRoSauotSDnq3cAPppbc1b9hq9vga8728p9Lg6Ti8sszKayilDDiqloV0/sq 6dC6qKNLqm2He9qGTWBfR0XqutxGcPi4y7AzhQUwLG+wPSWcOHa/N88kumwVg6zmg7 TTGHolbz1kBTYvIFDU6h9GEipG5l5iiUkgDSG+uA= Received: from omp1073.mail.ne1.yahoo.com (98.138.101.162) by BF1-EX10-CAHT08.y.corp.yahoo.com (10.74.209.170) with Microsoft SMTP Server (TLS) id 14.3.158.1; Thu, 17 Oct 2013 14:32:50 -0400 Received: (qmail 41974 invoked by uid 1000); 17 Oct 2013 18:32:55 -0000 Received: (qmail 18563 invoked by uid 60001); 17 Oct 2013 18:32:55 -0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo-inc.com; s=ginc1024; t=1382034775; bh=faMBVIBnGMkualGNnw89NPu//OAEghZDX1MSieeSIBE=; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=T+M33dBmQaiJ0d1VDFuy9Ef/AUoT2ttOHcQia0hfT4LBv23w/rXVt8tKLTyeCgamyiUo4FZ+C/BDksX52k5/h/ZXDELRp1Ybh5W3kKzCH0sMgNofgH6lbumiGuyojF6L7eFXnrPEzY97Bu41t5CdinvsLJOk93Tfu36CYjJTos4= DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws; s=ginc1024; d=yahoo-inc.com; h=X-YMail-OSG:Received:X-Rocket-MIMEInfo:X-Mailer:References:Message-ID:Date:From:Reply-To:Subject:To:In-Reply-To:MIME-Version:Content-Type; b=chWQO8ql1WDx63Y+wkB6oXTkmZ4/FXsNW1cEHFOZb6IpZZlxt2FjlBTNre+21oqH1QRIwD/ZRNltbf1SN4wG87IkyLMbZauL9Mfuktdy//ez6YzhemvbTK25XQJAfoncHVOGCdMxziGk40izzkHub6akFiliW9ItYrl6IixZxSI=; X-YMail-OSG: iLC0w2sVM1nojY8jlx3BEKk7krU_F2ZkBeCXKt.AalQQLJb 4h2q905hbVTnX_SAHK6ezGX_chHUB8OzH9ab6vDUdSzhy22F3EgVzn5IXDlR HLOZ4NMod32J.q47HcnukQ8TykSDJ6q2wAD2kEK4QGv163uxQXQl1vOQaX7H maFCi1EHf9vxZHTT8lbsLk6vk8Peu2fpIwWmri6aEoV7iUtUFuEFnR_MsPHC PJrP2otwHytIwy_tiHtAE_1XOOMHjM9Jy7nUdEWxKEKY2furFP_Kvq_Fodza rAFR0IWAuVH3UP2sYuTk3BFuC Received: from [66.228.162.40] by web125603.mail.ne1.yahoo.com via HTTP; Thu, 17 Oct 2013 11:32:55 PDT X-Rocket-MIMEInfo: 002.001, MSkgSWYgdGhlIHNlbmRlciB3YW50cyB0byBlbmZvcmNlIHRoaXMgdGhleSBjYW4gc2ltcGx5IHJlZnVzZSB0byBzZW5kIHVubGVzcyBTVEFSVFRMUyBpcyBhdmFpbGFibGU_CgoyKSBIb3cgbyB5b3UgZW5zdXJlIHRoYXQgYWxsIGhvcHMgdG8gdGhlIGRlc3RpbmF0aW9uIGFyZSBjb3ZlcmVkIGJ5IFRMUz8KCsKgCi1iaWxsCgoKCi0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tCldpbGxpYW0gSi4gTWlsbHMKIlBhcmFub2lkIiBZYWhvbyEKCgoKCgpPbiBUdWVzZGF5LCBPY3RvYmVyIDE1LCAyMDEzIDEBMAEBAQE- X-Mailer: YahooMailWebService/0.8.160.587 References: Message-ID: <1382034775.16463.YahooMailNeo@web125603.mail.ne1.yahoo.com> Date: Thu, 17 Oct 2013 11:32:55 -0700 From: Bill Mills To: Wei Chuang , "apps-discuss@ietf.org" , "saag@ietf.org" In-Reply-To: MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="933233344-1249971505-1382034775=:16463" X-Milter-Version: master.31+4-gbc07cd5+ X-CLX-ID: 034777009 X-Mailman-Approved-At: Fri, 18 Oct 2013 08:04:22 -0700 Subject: Re: [saag] [apps-discuss] Request for discussion of Mandatory Secure Mail Delivery proposal (draft-wchuang-msmd) X-BeenThere: saag@ietf.org X-Mailman-Version: 2.1.12 Precedence: list Reply-To: Bill Mills List-Id: Security Area Advisory Group List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 17 Oct 2013 18:33:55 -0000 --933233344-1249971505-1382034775=:16463 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable 1) If the sender wants to enforce this they can simply refuse to send unles= s STARTTLS is available?=0A=0A2) How o you ensure that all hops to the dest= ination are covered by TLS?=0A=0A=A0=0A-bill=0A=0A=0A=0A-------------------= -------------=0AWilliam J. Mills=0A"Paranoid" Yahoo!=0A=0A=0A=0A=0A=0AOn Tu= esday, October 15, 2013 12:35 PM, Wei Chuang wrote:=0A = =0AHi apps-discuss and saag,=0A=0ARequest for discussion (draft-wchuang-msm= d) of a proposal to secure mail=A0from eavesdropping and MitM attacks. =A0I= posted the primary thread to ietf-smtp@ and request that all discussion go= to that list.=0A=0AHere's the abstract:=0AOpportunistic SMTP TLS does not = enforce electronic mail delivery using TLS leading to potential loss of pri= vacy and security. We propose an optional mail header extension "mandatory= -secure-mail- delivery:" and SMTP EHLO response extension "MSMD" that indic= ates mail must be delivered privately using TLS and with integrity using DK= IM, and thereby provide a security guarantee to the user. When mail is sen= t with the header indicating privacy and integrity and if the receiving par= ty does not support this, the mail is instead bounced. To protect the mail= after delivery, the destination SMTP server must advertise its capabilitie= s as part of the EHLO response, and the sender can choose whether the desti= nation is able to honor the privacy requirements specified on the mail head= er.=0A=0ALink to the proposal here:=0Ahttp://datatracker.ietf.org/doc/draft= -wchuang-msmd/=0A=0A=0A-Wei=0A=0APS Pardon for any IETF formatting or etiqu= ette errors as I'm very new to the IETF process.=0A=0A_____________________= __________________________=0Aapps-discuss mailing list=0Aapps-discuss@ietf.= org=0Ahttps://www.ietf.org/mailman/listinfo/apps-discuss --933233344-1249971505-1382034775=:16463 Content-Type: text/html; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable
1) If the sender wants to enforce this they can si= mply refuse to send unless STARTTLS is available?

2) How o you ensure that all hops to the destination are c= overed by TLS?

 
-bill


--= ------------------------------
William J. Mills
"Paranoid" Yahoo!
=

=

On Tuesday, October 15, 2013 12:35 PM, Wei Chuang <weihaw@google= .com> wrote:
Hi apps-discuss and saag,

Request for = discussion (draft-wchuang-msmd) of a proposal to secure mail from eavesdropping and MitM atta= cks.  I posted the primary thread to ietf-smtp@ and request that all d= iscussion go to that list.
=0A=0A=0A

Here's the abstract:
  =
 Opportunistic SMTP TLS does not enforce electronic mail delivery=0A   usin=
g TLS leading to potential loss of privacy and security.  We=0A   propose a=
n optional mail header extension "mandatory-secure-mail-=0A   delivery:" an=
d SMTP EHLO response extension "MSMD" that indicates=0A   mail must be deli=
vered privately using TLS and with integrity using=0A   DKIM, and thereby p=
rovide a security guarantee to the user.  When=0A   mail is sent with the h=
eader indicating privacy and integrity and if=0A   the receiving party does=
 not support this, the mail is instead=0A   bounced.  To protect the mail a=
fter delivery, the destination SMTP=0A   server must advertise its capabili=
ties as part of the EHLO response,=0A   and the sender can choose whether t=
he destination is able to honor=0A   the privacy requirements specified on =
the mail header.

Link to the proposal here:
=0A=0A= =0A
http://datatracker.ietf.org/doc/draft-wchuang-msmd/
=0A=0A=0A
<= /div>

<= /div>
-We= i

=0A=0A
PS Pardon for any IETF formatting or eti= quette errors as I'm very new to the IETF process.
=0A
=0A=


_______________________________________________apps-discuss mailing list
apps-discuss@ietf.org
h= ttps://www.ietf.org/mailman/listinfo/apps-discuss


--933233344-1249971505-1382034775=:16463-- From iesg-secretary@ietf.org Mon Oct 21 06:04:18 2013 Return-Path: X-Original-To: saag@ietfa.amsl.com Delivered-To: saag@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 45DEA11E8512; Mon, 21 Oct 2013 06:04:18 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.422 X-Spam-Level: X-Spam-Status: No, score=-102.422 tagged_above=-999 required=5 tests=[AWL=0.178, BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id YoO+T0gYRUYB; Mon, 21 Oct 2013 06:04:17 -0700 (PDT) Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id D8AE411E82DA; Mon, 21 Oct 2013 06:03:40 -0700 (PDT) Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: The IESG To: IETF-Announce , smime@ietf.org, saag@ietf.org X-Test-IDTracker: no X-IETF-IDTracker: 4.80.p3 Auto-Submitted: auto-generated Precedence: bulk Sender: Message-ID: <20131021130340.29482.96263.idtracker@ietfa.amsl.com> Date: Mon, 21 Oct 2013 06:03:40 -0700 X-Mailman-Approved-At: Mon, 21 Oct 2013 08:02:27 -0700 Subject: [saag] Last Call: (Object Identifier Registry for the S/MIME Mail Security Working Group) to Informational RFC X-BeenThere: saag@ietf.org X-Mailman-Version: 2.1.12 Reply-To: ietf@ietf.org List-Id: Security Area Advisory Group List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 21 Oct 2013 13:04:18 -0000 The IESG has received a request from an individual submitter to consider the following document: - 'Object Identifier Registry for the S/MIME Mail Security Working Group' as Informational RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the ietf@ietf.org mailing lists by 2013-11-18. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract When the S/MIME Mail Security Working Group was chartered, an object identifier arc was donated by RSA Data Security for use by that working group. This document describes the object identifiers that were assigned in that donated arc, it transfers control of that arc to IANA, and it establishes IANA allocation policies for any future assignments within that arc. The file can be obtained via http://datatracker.ietf.org/doc/draft-housley-smime-oids/ IESG discussion can be tracked via http://datatracker.ietf.org/doc/draft-housley-smime-oids/ballot/ No IPR declarations have been submitted directly on this I-D. From kathleen.moriarty@emc.com Mon Oct 21 10:55:49 2013 Return-Path: X-Original-To: saag@ietfa.amsl.com Delivered-To: saag@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EBA5311E8377; Mon, 21 Oct 2013 10:55:39 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.024 X-Spam-Level: X-Spam-Status: No, score=-2.024 tagged_above=-999 required=5 tests=[AWL=0.575, BAYES_00=-2.599] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ddRFF-ftdU0y; Mon, 21 Oct 2013 10:55:30 -0700 (PDT) Received: from mailuogwdur.emc.com (mailuogwdur.emc.com [128.221.224.79]) by ietfa.amsl.com (Postfix) with ESMTP id 8A6CF11E832C; Mon, 21 Oct 2013 10:55:27 -0700 (PDT) Received: from maildlpprd54.lss.emc.com (maildlpprd54.lss.emc.com [10.106.48.158]) by mailuogwprd52.lss.emc.com (Sentrion-MTA-4.3.0/Sentrion-MTA-4.3.0) with ESMTP id r9LHtPTV004933 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 21 Oct 2013 13:55:25 -0400 X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd52.lss.emc.com r9LHtPTV004933 DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=emc.com; s=jan2013; t=1382378125; bh=blsitGAzF5pKhj0VYduguxpQj5A=; h=From:To:Date:Subject:Message-ID:References:In-Reply-To: Content-Type:Content-Transfer-Encoding:MIME-Version; b=lNhOyduR5HsE3uONITOY22orVZ5AJ/qB4UJ81aH6cqJFnAvosU9z0RmXFzCufS89x h8Ht8C0mInBk11i6kqq7H5loo6LnSjBMFw3fDDaOQTWnRMx8bbvuetrh9GiY3IIN6I gOJJIRzy4jzglVGY59o6DbXrts0aGst7iQ13VKqs= X-DKIM: OpenDKIM Filter v2.4.3 mailuogwprd52.lss.emc.com r9LHtPTV004933 Received: from mailusrhubprd01.lss.emc.com (mailusrhubprd01.lss.emc.com [10.253.24.19]) by maildlpprd54.lss.emc.com (RSA Interceptor); Mon, 21 Oct 2013 13:55:15 -0400 Received: from mxhub35.corp.emc.com (mxhub35.corp.emc.com [10.254.93.83]) by mailusrhubprd01.lss.emc.com (Sentrion-MTA-4.3.0/Sentrion-MTA-4.3.0) with ESMTP id r9LHtE8Z027442 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 21 Oct 2013 13:55:14 -0400 Received: from mx15a.corp.emc.com ([169.254.1.46]) by mxhub35.corp.emc.com ([::1]) with mapi; Mon, 21 Oct 2013 13:55:14 -0400 From: "Moriarty, Kathleen" To: "perpass@ietf.org" , "saag@ietf.org" Date: Mon, 21 Oct 2013 13:55:11 -0400 Thread-Topic: New Version Notification - draft-moriarty-pkcs12v1-1-02.txt Thread-Index: Ac7Ohmeo9EZJYnCeR+6bFr4bHWwQXwAABy7g Message-ID: References: <20131021175237.32469.2938.idtracker@ietfa.amsl.com> In-Reply-To: <20131021175237.32469.2938.idtracker@ietfa.amsl.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 MIME-Version: 1.0 X-Sentrion-Hostname: mailusrhubprd01.lss.emc.com X-RSA-Classifications: DLM_1, public Subject: [saag] FW: New Version Notification - draft-moriarty-pkcs12v1-1-02.txt X-BeenThere: saag@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Security Area Advisory Group List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 21 Oct 2013 17:55:50 -0000 RllJIC0NCg0KLS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCkZyb206IGludGVybmV0LWRyYWZ0 c0BpZXRmLm9yZyBbbWFpbHRvOmludGVybmV0LWRyYWZ0c0BpZXRmLm9yZ10gDQpTZW50OiBNb25k YXksIE9jdG9iZXIgMjEsIDIwMTMgMTo1MyBQTQ0KVG86IE1vcmlhcnR5LCBLYXRobGVlbjsgbW55 c3Ryb21AbWljcm9zb2Z0LmNvbTsgUGFya2luc29uLCBTZWFuOyBSdXNjaCwgQW5kcmVhczsgU2Nv dHQsIE1pY2hhZWwyOyBkcmFmdC1tb3JpYXJ0eS1wa2NzMTJ2MS0xQHRvb2xzLmlldGYub3JnOyB0 dXJuZXJzQGllY2EuY29tDQpTdWJqZWN0OiBOZXcgVmVyc2lvbiBOb3RpZmljYXRpb24gLSBkcmFm dC1tb3JpYXJ0eS1wa2NzMTJ2MS0xLTAyLnR4dA0KDQoNCkEgbmV3IHZlcnNpb24gKC0wMikgaGFz IGJlZW4gc3VibWl0dGVkIGZvciBkcmFmdC1tb3JpYXJ0eS1wa2NzMTJ2MS0xOg0KaHR0cDovL3d3 dy5pZXRmLm9yZy9pbnRlcm5ldC1kcmFmdHMvZHJhZnQtbW9yaWFydHktcGtjczEydjEtMS0wMi50 eHQNCg0KDQpUaGUgSUVURiBkYXRhdHJhY2tlciBwYWdlIGZvciB0aGlzIEludGVybmV0LURyYWZ0 IGlzOg0KaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvZHJhZnQtbW9yaWFydHktcGtj czEydjEtMS8NCg0KRGlmZiBmcm9tIHByZXZpb3VzIHZlcnNpb246DQpodHRwOi8vd3d3LmlldGYu b3JnL3JmY2RpZmY/dXJsMj1kcmFmdC1tb3JpYXJ0eS1wa2NzMTJ2MS0xLTAyDQoNClBsZWFzZSBu b3RlIHRoYXQgaXQgbWF5IHRha2UgYSBjb3VwbGUgb2YgbWludXRlcyBmcm9tIHRoZSB0aW1lIG9m IHN1Ym1pc3Npb24gdW50aWwgdGhlIGh0bWxpemVkIHZlcnNpb24gYW5kIGRpZmYgYXJlIGF2YWls YWJsZSBhdCB0b29scy5pZXRmLm9yZy4NCg0KSUVURiBTZWNyZXRhcmlhdC4NCg0KDQo= From Jeff.Hodges@KingsMountain.com Wed Oct 23 08:28:13 2013 Return-Path: X-Original-To: saag@ietfa.amsl.com Delivered-To: saag@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B2F5011E83CF for ; Wed, 23 Oct 2013 08:28:13 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -95.081 X-Spam-Level: X-Spam-Status: No, score=-95.081 tagged_above=-999 required=5 tests=[BAYES_60=1, GB_I_INVITATION=-2, GB_I_LETTER=-2, GB_SUMOF=5, MANGLED_BACK=2.3, RCVD_IN_SORBS_WEB=0.619, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KRgUOuCzYXVh for ; Wed, 23 Oct 2013 08:28:09 -0700 (PDT) Received: from outbound-ss-1194.bluehost.com (outbound-ss-1194.bluehost.com [74.220.211.4]) by ietfa.amsl.com (Postfix) with SMTP id DCC2A11E83F0 for ; Wed, 23 Oct 2013 08:28:08 -0700 (PDT) Received: (qmail 12725 invoked by uid 0); 23 Oct 2013 15:27:46 -0000 Received: from unknown (HELO box514.bluehost.com) (74.220.219.114) by oproxy1.mail.unifiedlayer.com with SMTP; 23 Oct 2013 15:27:45 -0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=kingsmountain.com; s=default; h=Content-Transfer-Encoding:Content-Type:Subject:To:MIME-Version:From:Date:Message-ID; bh=IQ35VM01a56YxgL2y3t7z8nvPz9S4zXSa45c77z2VgE=; b=wQkBkSJ8n1VNnkRqsb/i0vknf9/fOS8nvADgZu5V1TRgliEzFZFnP8j1aGkiuIR7bD0scSfFoIXS6JY5YNzJsFDdgXrxgWqbzggT/W/Bd0ji05kLFpZ8xkKcxMLQTfYg; Received: from [216.113.168.128] (port=63916 helo=[10.244.137.220]) by box514.bluehost.com with esmtpsa (TLSv1:CAMELLIA256-SHA:256) (Exim 4.80) (envelope-from ) id 1VZ0LY-0000CZ-U4; Wed, 23 Oct 2013 09:27:45 -0600 Message-ID: <5267EAF2.2000608@KingsMountain.com> Date: Wed, 23 Oct 2013 08:27:46 -0700 From: =JeffH User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130330 Thunderbird/17.0.5 MIME-Version: 1.0 To: IETF Security Area Advisory Group , perpass Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Identified-User: {11025:box514.bluehost.com:kingsmou:kingsmountain.com} {sentby:smtp auth 216.113.168.128 authed with jeff.hodges+kingsmountain.com} Subject: [saag] fyi: Dan Geer: Tradeoffs in Cyber Security [9 October 13, UNCC[ X-BeenThere: saag@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Security Area Advisory Group List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 23 Oct 2013 15:28:13 -0000 .Tradeoffs in Cyber Security .Dan Geer, 9 October 13, UNCC Thank you for the invitation to speak with you today, which, let me be clear, is me speaking as myself and not for anybody or anything else. As you know, I work the cybersecurity trade, and I am gratified that ten days ago the U.S. National Academy of Sciences, on behalf of the Department of Homeland Security, concluded that cybersecurity should be seen as an occupation and not a profession because the rate of change is too great to consider professionalization.[1] That rate of change is why cybersecurity is perhaps the most intellectually demanding occupation on the planet. In writing this essay, the breadth of tradeoffs in cyber security and that fundamental intellectual challenge in those tradeoffs caused me to choose to narrow my focus to one class of tradeoffs in cyber security rather than them all; looking at the state of the current world, I decided to focus on personal data and the government. I am not yet old in chronologic years when compared to the life expectancies that obtain in the United States of 2013, but measured in Internet years I'm an ancient. Ancient-ness makes it tempting to just tell stories that begin with "In my day" which, if nothing else, proves that you are no longer in the century in which you actually belong. Stories are good, but as economist Roger Brinner so succinctly said, "The plural of anecdote is not data." Except that maybe it, or something like it, is. In a gathering of this size you can play a game that I'll just describe rather than play. Ask for an audience volunteer willing to answer a mildly embarrassing question, something as mild as "How many pairs of never-used underwear do you own?" Then see if that volunteer will take a second question, and make it similarly mild such as "Have you ever had an evil grin while wrapping a birthday gift?" If you keep going at this game, the volunteer will become uneasy and no one will get to the proverbial "twenty questions." Why? Because the subject realizes that you are publicly triangulating them, that data fusion of even mild, innocuous questions has the effect of painting a picture. In this game, the questions cannot be mild enough to be innocuous in sum. In point of fact, the more inane the questions are, the more inane the picture painted becomes. If you get to pick the questions and the subject is sufficiently willing to keep answering them, then you can pretty much box in your subject however you like. Politicians know that the surest way to win an argument is, as they say, to "frame the question" by which they mean painting a picture that their opposition has to work to overcome. The better practitioners at the political version of this game can impose a considerable work factor on their opponents, one that is not unlike what we here call a denial of service. Every time there is a televised debate where some self-important interlocutor asks a question that is impossible to answer succinctly, and then gives the candidate sixty seconds of airtime, painting into a corner by way of selective disclosure is what is happening. I previously worked for a data protection company. Our product was, and I believe still is, the most thorough on the market. By "thorough" I mean the dictionary definition, "careful about doing something in an accurate and exact way." To this end, installing our product instrumented every system call on the target machine. Data did not and could not move in any sense of the word "move" without detection. Every data operation was caught and monitored. It was total surveillance data protection. Its customers were companies that don't accept half-measures. What made this product stick out was that very thoroughness, but here is the point: Unless you fully instrument your data handling, it is not possible for you to say what did not happen. With total surveillance, and total surveillance alone, it is possible to treat the absence of evidence as the evidence of absence. Only when you know everything that *did* happen with your data can you say what did *not* happen with your data. The alternative to total surveillance of data handling is to answer more narrow questions, questions like "Can the user steal data with a USB stick?" or "Does this outbound e-mail have a Social Security Number in it?" Answering direct questions is exactly what a defensive mindset says you must do, and that is "never make the same mistake twice." In other words, if someone has lost data because of misuse of some facility on the computer, then you either disable that facility or you wrap it in some kind of perimeter. Lather, rinse, and repeat. This extends all the way to such trivial matters as timer-based screen locking. The difficulty with the defensive mindset is that it leaves in place the fundamental strategic asymmetry of cybersecurity, namely that while the workfactor for the offender is the price of finding a new method of attack, the workfactor for the defender is the cumulative cost of forever defending against all attack methods yet discovered. Over time, the curve for the cost of finding a new attack and the curve for the cost of defending against all attacks to date cross. Once those curves cross, the offender never has to worry about being out of the money. I believe that that crossing occurred some time ago. The total surveillance strategy is, to my mind, an offensive strategy used for defensive purposes. It says "I don't know what the opposition is going to try, so everything is forbidden unless we know it is good." In that sense, it is like whitelisting applications. Taking either the application whitelisting or the total data surveillance approach is saying "That which is not permitted is forbidden." The essential character of a free society is this: That which is not forbidden is permitted. The essential character of an unfree society is the inverse, that which is not permitted is forbidden. The U.S. began as a free society without question; the weight of regulation, whether open or implicit, can only push it toward being unfree. Under the pressure to defend against offenders with a permanent structural advantage, defenders who opt for forbidding anything that is not expressly permitted are encouraging a computing environment that does not embody the freedom with which we are heretofore familiar. This brings us to the larger question. No one in this room needs to be told that more and more data is collected and more and more of that data is in play. The general dynamics of change are these: Moore's Law continues to give us two orders of magnitude in compute power per dollar per decade while storage grows at three orders of magnitude and bandwidth at four. These are top-down economic drivers. As such, the future is increasingly dense with stored data but, paradoxically, despite the massive growth of data volume, that data becomes more mobile with time. Everyone here knows the terminology "attack surface" and knows that one of the defender's highest goals is to minimize the attack surface wherever possible. Every coder adhering to a security-cognizant software lifecycle program does this. Every company or research group engaged in static analysis of binaries does this. Every agency enforcing a need-to-know regime for data access does this. Every individual who reserves one low-limit credit card for their Internet purchases does this. I might otherwise say that any person who encrypts their e-mail to their closest counterparties does this, but because consistent e-mail encryption is so rare, encrypting one's e-mail marks it for collection and indefinite retention by those entities in a position to do so, regardless of what country you live in. Data retention for observable data is growing by legislative fiat seemingly everywhere. The narrow logic is sound, namely if data has passed through your hands then that you retain it has no new risk for the transmitter and may contain valuable protections against malfeasance. In parallel with the game I proposed at the outset, neither you nor I would be concerned with some entity having access to one of our transmitted messages, but 1000 of them is a different story, and all-of-them forever is a different world. I have not yet said the phrase that is the title of this talk, which is "Tradeoffs in Cyber Security." Perhaps you will soon see why I am slow to do so. As is frequently noted, in the United States 90+% of the critical infrastructure is in private hands. With each passing day Internet-dependent services become more essential to what I will for the moment call "normal life." As we have seen, the Government's response to the growing pervasiveness of Internet services held in private hands is deputize the owners of those services against their will. The entire imbroglio around ISPs, the NSA, and so forth and so on comes down to that -- if the government does not itself own the critical infrastructure, those that do own it can and will be compelled to become government agents. In the 21st century, we have a physical army of volunteers but a digital army of conscripts. At the core of it all there is data. The great majority of attacks target data acquisition. The work of surveillance is, per se, targeted data acquisition. There is considerable irony in the Federal Communications Commission classifying the Internet as an information service and not as a communications service insofar as while that may have been a gambit to relieve ISPs of telephone-era regulation, the value of the Internet is ever more the bits it carries, not the carriage of those bits. The FCC decisions are both several and now old, the FCC classified cable as an information service in 2002, classified DSL as an information service in 2005, classified wireless broadband as an information service in 2007, and classified broadband over power lines as an information service in 2008. A decision by the D.C. Circuit Court of Appeals on this very point is pending as we speak: Is the Internet a telecommunications service or an information service? If I ran the zoo, I would call up the ISPs and say Hello, Uncle Sam here. You can charge whatever you like based on the contents of what you are carrying, but you are responsible for that content if it is illegal; inspecting brings with it a responsibility for what you learn. -or- You can enjoy common carrier protections at all times, but you can neither inspect nor act on the contents of what you are carrying and can only charge for carriage itself. Bits are bits. Choose wisely. No refunds or exchanges at this window. We humans can design systems more complex than we can then operate. The financial sector's "flash crashes" are an example of that; perhaps the fifty interlocked insurance exchanges for Obamacare will soon be another. Above some threshold of system complexity, it is no longer possible to test, it is only possible to react to emergent behavior. Even the lowliest Internet user is involved -- one web page can easily touch scores of different domains. While writing this, the top level page from cnn.com had 400 out-references to 85 unique domains each of which is likely to be similarly constructed and all of which move data one way or another. If you leave those pages up and they have an auto-refresh, then moving to a new network signals to every one of those ad networks that you have done so. We have known for some time that traffic analysis is more powerful than content analysis. If I know everything about to whom you communicate including when, where, with what inter-message latency and at what length, then I know you. If all I have is the undated, unaddressed text of your messages, then I am an archaeologist, not a case officer. The soothing mendacity of proxies for the President saying "It's only metadata" relies on the ignorance of the listener. But this is not an attack on the business of intelligence. The Intelligence Community is operating under the rules it knows, most of which you, too, know, and the goal states it has been tasked to achieve. The center of gravity for policy is those goal states. We all know the truism, that knowledge is power. We all know that there is a subtle yet important distinction between information and knowledge. We all know that a negative declaration like "X did not happen" can only proven true if you have the enumeration of *everything* that did happen and can show that X is not in it. We all know that when a President says "Never again" he is asking for the kind of outcome for which proving a negative, lots of negatives, is categorically essential. Proving a negative requires omniscience. Omniscience requires god-like powers. Perhaps the point is that the more technologic the society becomes, the greater the dynamic range of possible failures. When you live in a cave, starvation, predators, disease, and lightning are about the full range of failures that end life as you know it and you are well familiar with all of them. When you live in a technologic society where everybody and everything is optimized in some way akin to just-in-time delivery, the dynamic range of failures is incomprehensibly larger and largely incomprehensible. The wider the dynamic range of failure, the more prevention is the watchword. Cadres of people charged with defending masses of other people must focus on prevention, and prevention is all about proving negatives. Therefore, one must conclude that as technologic society grows more interdependent within itself, the more it must rely on prediction based on data collected in broad ways, not targeted ways. Spoken of in this manner, intelligence agencies that hoover up everything are reacting rationally to the demand that they ensure "Never again" comes true. Not only that, the more complex the society they are charged with protecting becomes, the more they must surveil, the more they must analyze, the more data fusion becomes their only focus. Part of the picture is that it is categorically true that technology is today far more democratically available than it was yesterday and less than it will be tomorrow. 3D printing, the whole "maker" community, DIY biology, micro-drones, search, constant contact with whomever you choose to be in constant contact with -- these are all examples of democratizing technology. This is perhaps our last fundamental tradeoff before the Singularity occurs: Do we, as a society, want the comfort and convenience of increasingly technologic, invisible digital integration enough to pay for those benefits with the liberties that must be given up to be protected from the downsides of that integration? This is not a Chicken Little talk, it is an attempt to preserve if not make a choice while choice is still relevant. We are ever more a service economy, but every time an existing service disappears into the cloud, our vulnerability to its absence increases. Every time we ask the government to provide goodnesses that can only be done with more data, we are asking government to collect more data. Let me ask a yesterday question: How do you feel about traffic jam detection based on the handoff rate between cell towers of those cell phones in use in cars on the road? Let me ask a today question: How do you feel about auto insurance that is priced from a daily readout of your automobile's black box? Let me ask a tomorrow question: In what calendar year will compulsory auto insurance be more expensive for the driver who insists on driving their car themselves rather than letting a robot do it? How do you feel about public health surveillance done by requiring Google and Bing to report on searches for cold remedies and the like? How do you feel about a Smart Grid that reduces your power costs and greens the atmosphere but reports minute-by-minute what is on and what is off in your home? Have you or would you install that toilet that does a urinalysis with every use? How do you feel about using standoff biometrics as a solution to authentication? At this moment in time, facial recognition is possible at 500 meters, iris recognition is possible at 50 meters, and heart-beat recognition is possible at 5 meters. Your dog can identify you by smell; so, too, can an electronic dog's nose. Your cell phone's accelerometer is plenty sensitive enough to identify you by gait analysis. There are 3+ billion new photos online each month, and even if you've never uploaded photos of yourself someone else has. All of these are data dependent, cheap, convenient, and none of them reveal anything that is a secret as we currently understand the term "secret" yet the sum of them is greater than the parts. Everyone in this room knows how and why passwords are a problem. At the same time, passwords may be flatly essential for a reason that requires I read a paragraph from Marcia Hofmann's September 12th piece in Wired[2] If the police try to force you to divulge the combination to a wall safe, your response would reveal the contents of your mind and so would implicate the Fifth Amendment. (If you've written down the combination on a piece of paper and the police demand that you give it to them, that may be a different story.) To invoke Fifth Amendment protection, there may be a difference between things we have or are -- and things we know. The important feature about PINs and passwords is that they're generally something we know. These memory-based authenticators are the type of fact that benefit from strong Fifth Amendment protection should the government try to make us turn them over against our will. Indeed, last year a federal appeals court held that a man could not be forced by the government to decrypt data. But if we move toward authentication systems based solely on physical tokens or biometrics -- things we have or things we are, rather than things we remember -- the government could demand that we produce them without implicating anything we know. Which would make it less likely that a valid privilege against self-incrimination would apply. As Hofmann notes, a Court could find otherwise and set a different precedent, but her analysis is cautionary. Perhaps a balance of power requires the individual actually does have some secrets. But is having some secrets the same as having some privacy? No society, no people need rules against things which are impossible. Today I observe a couple fornicating on a roof top in circumstances where I can never know who the couple are. Do they have privacy? The answer is "no" if your definition of privacy is the absence of observability. The answer is "yes" if your definition of privacy is the absence of identifiability. Technical progress in image acquisition guarantees observability pretty much everywhere now. Those standoff biometrics are delivering multi-factor identifiability at ever greater distances. We will soon live in a society where identity is not an assertion like "My name is Dan," but rather an observable like "Sensors confirm that is Dan." With enough sensors, concentration camps don't need to tatoo their inmates. How many sensors are we installing in normal life? If data kills both privacy as impossible-to-observe and privacy as impossible-to-identify, then what might be an alternative? If you are an optimist or an apparatchik, then your answer will tend toward rules of procedure administered by a government you trust or control. If you are a pessimist or a hacker/maker, then your answer will tend towards the operational, and your definition of a state of privacy will be mine: the effective capacity to misrepresent yourself. Misrepresentation is using disinformation to frustrate data fusion on the part of whomever it is that is watching you. Misrepresentation means paying your therapist in cash under an assumed name. Misrepresentation means arming yourself not at Walmart but in living rooms. Misrepresentation means swapping affinity cards at random with like-minded folks. Misrepresentation means keeping an inventory of misconfigured webservers to proxy through. Misrepresentation means putting a motor-generator between you and the Smart Grid. Misrepresentation means using Tor for no reason at all. Misrepresentation means hiding in plain sight when there is nowhere else to hide. Misrepresentation means having not one digital identity that you cherish, burnish, and protect, but having as many as you can. Your identity is not a question unless you work to make it be. The Obama administration's issuance of a National Strategy for Trusted Identities in Cyberspace is case-in-point; it "calls for the development of interoperable technology standards and policies -- an 'Identity Ecosystem' -- where individuals, organizations, and underlying infrastructure -- such as routers and servers -- can be authoritatively authenticated." If you can trust a digital identity, that is because it can't be faked. Why does the government care about this? It cares because it wants to digitally deliver government services and it wants attribution. Is having a non-fake-able digital identity for government services worth the registration of your remaining secrets with that government? Is there any real difference between a system that permits easy, secure, identity-based services and a surveillance system? Do you trust those who hold surveillance data on you over the long haul by which I mean the indefinite retention of transactional data between government services and you, the individual required to proffer a non-fake-able identity to engage in those transactions? If you are building authentication systems today, then you are playing in this league. Standoff biometry by itself terminates the argument over whether security and privacy are a zero sum game -- the sum is nowhere near that good, and it is the surveilled who are capitalizing the system. As with my game, entirely innocuous things become problematic when surveilled. Shoshana Zuboff, Harvard Business School Emerita, called this "anticipatory conformity" and said: [W]e anticipate surveillance and we conform, and we do that with awareness. We know, for example, when we're going through the security line at the airport not to make jokes about terrorists or we'll get nailed, and nobody wants to get nailed for cracking a joke. It's within our awareness to self-censor. And that self-censorship represents a diminution of our freedom. We self-censor not only to follow the rules, but also to avoid the shame of being publicly singled out. Once anticipatory conformity becomes second nature, it becomes progressively easier for people to adapt to new impositions on their privacy, their freedoms. The habit has been set. Leonard Downie, the former executive editor of The Washington Post, wrote in that very paper on October 4th: Many reporters covering national security and government policy in Washington these days are taking precautions to keep their sources from becoming casualties in the Obama administration's war on leaks. They and their remaining government sources often avoid telephone conversations and e-mail exchanges, arranging furtive one-on-one meetings instead. A few news organizations have even set up separate computer networks and safe rooms for journalists trained in encryption and other ways to thwart surveillance.[3] Once again, this is all about data and, to the exact point, about fused data from many sources. Do you like it? Do you not like it? All you engineers know that for the engineer, it is "fast, cheap, reliable: choose two." I am here to argue that for policy makers working the cybersecurity beat, it is "freedom, security, convenience: choose two." But so long as policy makers in a democracy eventually come around to the people's desires, my argument, such as it is, is with the public at large, not with those who are trying to deliver failure-proof protection to an impatient, risk-averse, gadget-addicted population. We learned in the financial crisis that there are levels of achievable financial return that require levels of unsustainable financial risk. We learned that lesson on the large scale and on the small, on the national scale and on the personal one. I would like us to not have to learn the parallel lesson with respect to data that powers the good versus data that powers the bad. If we can, for the moment, think of data as a kind of money, then investing too much our own data in an institution too big to influence is just as insensate as investing too much of our own money in an institution too big to fail. I have become convinced that all security tools and all the data that they acquire are, as they say in the military, dual use -- the security tools and their data can be used for good or for ill. I am similarly convinced that the root cause, the wellspring of risk is dependence, especially dependence on expectations of system state. If you would accept that you are most at risk from the things you most depend upon, then damping dependence is the cheapest, most straightforward, lowest latency way to damp risk. This is, in further analogy, just like the proven fact that the fastest and most reliable way to put more money on the bottom line is through cost control. John Gilmore famously said, "Never give a government a power you wouldn't want a despot to have." I might amend that to read "Never demand the government have a power you wouldn't want a despot to have." I have also become convinced that a state of security is one in which there is no unmitigatable surprise, that is to say that you have reached a state of security when you can mitigate the surprises you will face. Note that I did not say a state of security is the absence of surprise, but rather the absence of unmitigatable surprise. California Senate Bill 1386, the first of the state-level data breach laws, did not criminalize losing credit card data; rather, it prescribed the actions that a firm which has lost the credit card data of its customers must take. SB1386 is wise in that regard. But only rarely do we ask our Legislatures to make mitigation effective. Instead, over and over again we ask our Legislatures to make failure impossible. When you embark on making failure impossible, and that includes delivering on statements like "Never again," you are forced into cost-benefit analyses where at least one of the variables is infinite. It is not heartless to say that if every human life is actually priceless, then it follows that there will never be enough money. One is not anti-government to say that doing a good job at preventing terrorism is better than doing a perfect job. And there is the Gordian Knot of this discussion: As society becomes more technologic, even the mundane comes to depend on distant digital perfection. Our food pipeline contains less than a week's supply, just to take one example, and that pipeline depends on digital services for everything from GPS driven tractors to robot vegetable sorting machinery to coast-to-coast logistics to RFID-tagged livestock. Is all the technologic dependency and the data that fuels it making us more resilient or more fragile? In cybersecurity practice, in which most of us here work, we seem to be getting better and better. We have better tools, we have better understood practices, and we have more colleagues. That's the plus side. But I'm interested in the ratio of skill to challenge, and as far as I can estimate, we are expanding the society-wide attack surface faster than we are expanding our collection of tools, practices, and colleagues. If you are growing more food, that's great. If your population is growing faster than your improvements in food production can keep up, that's bad. As with most decision making under uncertainty, statistics have a role, particularly ratio statistics that magnify trends so that the latency of feedback from policy changes is more quickly clear. Yet statistics, too, require data. In medicine, we have well established rules about medical privacy. Those rules are helpful. Those rules also have holes big enough to drive a truck through. Regardless, when you check into the hospital there is an accountability-based, need-to-know regime that governs your data most days. However, if you check in with Bubonic Plague or Anthrax, you will have zero privacy as those are mandatory data reporting conditions. So I ask you, would it make sense in a public health of the Internet way to have a mandatory reporting regime for cybersecurity failures? Do you favor having to report penetrations of your firm or household to the government or face criminal charges for failing to make that report? Is that data that you want to share? Sharing it can only harm you. It might help others. This is not, in fact, about you personally. Even Julian Assange, in his book _Cypherpunks_, said "Individual targeting is not the threat." It is about a culture where personal data is increasingly public data, and assembled en masse. All we have to go on now is the hopeful phrase "A reasonable expectation of privacy" but what is reasonable when one inch block letters can be read from orbit? What is reasonable when all of your financial or medical life is digitized and available primarily over the Internet? Do you want ISPs to retain e-mails when you are asking your doctor a medical question (or, for that matter, do you want those e-mails to become part of your Electronic Health Record)? Who owns your medical data anyway? Until the 1970s, it was the patient but regulations then made it the provider. With an Electronic Health Record, it is likely to revert to patient ownership but if the EHR belongs to you, do you get to surveil the use that is made of it by medical providers and those that they outsource to? And if not, why not? Observability is fast extending to devices. Some of it has already appeared, such as the fact that any newish car is broadcasting four unique Bluetooth radio IDs, one for each tire's valve stem. Some of it is in a daily progression, such as training our youngsters to accept surveillance by stuffing a locator beacon in their backpack as soon as they go off to Kindergarten. Some of it is newly technologic, like through the wall imaging, and some of it is simply that we are now surrounded by cameras that we can't even see where no one camera is important but they are important in the aggregate when their data is fused. Anything that has "wireless" in its name creates an opportunity for traffic analysis. In the days of radio, there was Sarnoff's Law, namely that the value of a broadcast network was proportional to N, the number of listeners. Then came packetized network communications and Metcalfe's Law, that the value of a network was proportional to N squared, the number of possible two-way conversations. We are now in the era of Reed's Law where the value of a network is proportional to the number of groups that can form in it, that is to say 2 to the power N. Reed's Law is the new reality because it fits the age of social networks. In tune with my claim that everything is dual use, any entity (such as a government) that can acquire the entirety of all social media transactions learns nearly everything there is to learn, and all in one place, and all courtesy of the participants themselves. The growth of social networks is a surveiller's dream come true. Total system complexity from a security person's point of view is essentially just geometry. Security is non-composable -- we can get insecure results even when our systems are assembled from secure components. The more components, the less likely a secure result. Might the same be said of data? Of course it can -- search for the term "reidentification" and you'll find that incomplete data, even intentionally anonymized data, can be put together if there is enough of it, and what is enough seems to be a lower hurdle every year. Put differently, if you share one fact each with ten different people, how many of the ten have to be compromised before you are exposed? Howard Brin was the first to suggest that if you lose control over what data is collected on you, the only freedom-preserving alternative is that if everyone else does, too. If the government or the corporation can surveil you without asking, then the balance of power is preserved when you can surveil them without asking. Bruce Schneier countered that preserving the balance of power doesn't mean much if the effect of new information is non-linear, that is to say if new information is the exponent in an equation, not one more factor in a linear sum.[4] Solving that debate requires you have a strong opinion on what data fusion means operationally to you, to others, to society. There is some axiom of Nature at work here. Decision making under uncertainty is what we do in the small, and what policy makers do in the large. Uncertainty is partial information, so it is natural to want information that is less partial. We are closing in on having more information than we can use. The Intelligence Community has felt the heat of too much information to handle for some time. The business community is feeling it now insofar as it is far cheaper to keep everything than it is to do careful selective deletion. The individual is feeling pretty warm, too, as evidenced by something as simple as how much they depend on the ability to search their e-mail rather than folderizing it after reading. I have amassed all the fortune I am going to amass. I have raised all the children I am going to raise. I have made all the commitments I am going to make. I am old enough that I can opt out of many of the corporate data collection schemes and live out the remainder of my days unaffected by what I might be missing out on. That those corporations are agents of government data collection means that for now I am opting out of some of that as well. Anyone under 40 has no such option, or at least no such easy option. Everything I am talking about here is a young person's problem, just like the National Debt, which the young will soon inherit. It is your choice and responsibility whether to demand protections and conveniences and services that can only be done with pervasive data. It is your choice and responsibility whether to fear only fear itself or to fear the absence of fear. It is your choice and responsibility to be part of the problem or part of the solution. Any finite tolerance for risk caps the amount of information you will want in play. This has nothing whatsoever to do with whether you have anything to hide, and therefore it is your choice and responsibility to make it understood that just as "..there is nothing sinister in so arranging one's affairs as to [minimize] taxes"[5] neither is there anything sinister in minimizing the data collectible from you. The price of freedom is the probability of crime. But as technology progresses, your choice will not be between Big Brother or no Big Brother, rather it is already between one Big Brother and lots of Little Brothers. Think carefully, yours is the last generation that will have a choice. As Dylan Thomas wrote, "Do not go gentle into that good night// Rage, rage against the dying of the light." Thank you for hearing me out. -------------- [1] "Professionalizing the Nation's Cyber Workforce?" www.nap.edu/openbook.php?record_id=18446 [2] "Fingerprint ID May Mean You Can't 'Take the Fifth'," Marcia Hofmann www.wired.com/opinion/2013/09/the-unexpected-result-of-fingerprint-authentication-that-you-cant-take-the-fifth [3] "In Obama's War on Leaks, Reporters Fight Back," Leonard Downie www.washingtonpost.com/opinions/in-obamas-war-on-leaks-reporters-fight-b ack/2013/10/04/70231e1c-2aeb-11e3-b139-029811dbb57f_print.html [4a] "The Myth of the 'Transparent Society'," Bruce Schneier www.wired.com/politics/security/commentary/securitymatters/2008/03/securitymatters_0306 [4b] "Rebuttal," David Brin www.wired.com/politics/security/news/2008/03/brin_rebuttal [5] Judge Learned Hand, COMMISSIONER V. NEWMAN, 159 F.2D 848, 850-851 (CA2 1947): "Over and over again, the courts have said there is nothing sinister in so arranging one's affairs as to keep taxes as low as possible. Everybody does so, rich and poor, and all do right, for nobody owes any duty to pay more tax than the law demands. Taxes are enforced exactions, not voluntary contributions. To demand more in the name of morals is mere cant." --- end From scott.brim@gmail.com Wed Oct 23 10:08:55 2013 Return-Path: X-Original-To: saag@ietfa.amsl.com Delivered-To: saag@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2AA1A11E8170; Wed, 23 Oct 2013 10:08:55 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.589 X-Spam-Level: X-Spam-Status: No, score=-102.589 tagged_above=-999 required=5 tests=[AWL=0.010, BAYES_00=-2.599, HTML_MESSAGE=0.001, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PO2zFVj98yqh; Wed, 23 Oct 2013 10:08:53 -0700 (PDT) Received: from mail-ob0-x22d.google.com (mail-ob0-x22d.google.com [IPv6:2607:f8b0:4003:c01::22d]) by ietfa.amsl.com (Postfix) with ESMTP id 5EC9911E81DC; Wed, 23 Oct 2013 10:08:49 -0700 (PDT) Received: by mail-ob0-f173.google.com with SMTP id gq1so1099511obb.18 for ; Wed, 23 Oct 2013 10:08:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=3XAFIOIhAyuWyFdodRlBIGMa0eEmeybO1rxeot9rgXE=; b=dnaoNmPG52xPZBlg3Qnai+qwKh5hNNOpAy0ePL5DkhJbhHzxp3WOrF2Y22P4cdHcS7 Y2vL4fIkDNTmbfbBFMMDNwMbP2NS6dL8XtCio7VooFGH4yEOqm6cYODo3+Ru1v4eT3IS 90Cjeynpxc3YgkAPPuSkNkWA+J/zpvbSOQm7GqylGugqPxx87L4x90fU75OoaMUXf9De ThHKzRJh6QYBzw26mB+kRy1kHN+9TFviUTHCkMwks89HjaKLDnyBvOzyXiDLffujCOf3 dlNrKycDYvENkQFBdpaLUJvsY2rrsC9pPN6HF9GXJHMAhoW9mnIrOh+aC31Rk2EJmMsD FwAA== X-Received: by 10.60.42.203 with SMTP id q11mr2704061oel.54.1382548127677; Wed, 23 Oct 2013 10:08:47 -0700 (PDT) MIME-Version: 1.0 Received: by 10.182.2.134 with HTTP; Wed, 23 Oct 2013 10:08:27 -0700 (PDT) In-Reply-To: <5267EAF2.2000608@KingsMountain.com> References: <5267EAF2.2000608@KingsMountain.com> From: Scott Brim Date: Wed, 23 Oct 2013 13:08:27 -0400 Message-ID: To: "=JeffH" Content-Type: multipart/alternative; boundary=001a11c207f009049404e96b9276 X-Mailman-Approved-At: Fri, 25 Oct 2013 08:02:08 -0700 Cc: perpass , IETF Security Area Advisory Group Subject: Re: [saag] [perpass] fyi: Dan Geer: Tradeoffs in Cyber Security [9 October 13, UNCC[ X-BeenThere: saag@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Security Area Advisory Group List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 23 Oct 2013 17:08:55 -0000 --001a11c207f009049404e96b9276 Content-Type: text/plain; charset=ISO-8859-1 This is fantastic. Thanks. It illumines something: Surveillance by governments is not the biggest of our problems. Privacy in the ordinary operation of a technology-based society is significantly bigger. Criminals, big business ... but also businesses and casual individuals have access to data you wish they didn't. Yes the IETF needs to do better with crypto and authentication, but the fundamental designs of the protocols they are being added to need to support them. From the bottom up, we need to proactively (not reactively) make sure that IETF protocol designs take privacy into consideration. Scott --001a11c207f009049404e96b9276 Content-Type: text/html; charset=ISO-8859-1 Content-Transfer-Encoding: quoted-printable
This is fantastic. =A0Thanks.

It illu= mines something: Surveillance by governments is not the biggest of our prob= lems. Privacy in the ordinary operation of a technology-based society is si= gnificantly bigger. Criminals, big business ... but also businesses and cas= ual individuals have access to data you wish they didn't. Yes the IETF = needs to do better with crypto and authentication, but the fundamental desi= gns of the protocols they are being added to need to support them. =A0From = the bottom up, we need to proactively (not reactively) make sure that IETF = protocol designs take privacy into consideration.=A0

Scott
=
--001a11c207f009049404e96b9276-- From stephen.farrell@cs.tcd.ie Wed Oct 30 07:39:43 2013 Return-Path: X-Original-To: saag@ietfa.amsl.com Delivered-To: saag@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4BE3B21E80F9; Wed, 30 Oct 2013 07:39:43 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.599 X-Spam-Level: X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HOzBzmbvB-dw; Wed, 30 Oct 2013 07:39:38 -0700 (PDT) Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) by ietfa.amsl.com (Postfix) with ESMTP id D36E521E80F1; Wed, 30 Oct 2013 07:38:59 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id E2E0BBE5C; Wed, 30 Oct 2013 14:38:57 +0000 (GMT) Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y7pfOS+ln-BH; Wed, 30 Oct 2013 14:38:57 +0000 (GMT) Received: from [134.226.36.180] (stephen-think.dsg.cs.tcd.ie [134.226.36.180]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id AC477BE63; Wed, 30 Oct 2013 14:38:55 +0000 (GMT) Message-ID: <527119FF.9070009@cs.tcd.ie> Date: Wed, 30 Oct 2013 14:38:55 +0000 From: Stephen Farrell User-Agent: Mozilla/5.0 (X11; Linux i686 on x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.0.1 MIME-Version: 1.0 To: "saag@ietf.org" , smime@ietf.org References: <522509AC.6040907@cs.tcd.ie> In-Reply-To: <522509AC.6040907@cs.tcd.ie> X-Enigmail-Version: 1.6 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Subject: Re: [saag] some s/mime related drafts I've been asked to AD sponsor X-BeenThere: saag@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Security Area Advisory Group List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Oct 2013 14:39:43 -0000 Hiya, So I've not seen any negative feedback on these so you should see last calls issuing for 'em shortly. S On 09/02/2013 10:57 PM, Stephen Farrell wrote: > > Folks, > > Sean, Russ and Jim have authored three s/mime related drafts [1,2,3] > and asked me to sponsor them for publication. I've read them and > they seem like reasonable additions to the set of s/mime RFCs to > me, but I'd like to check that nobody has any issue with that > before starting IETF LC in a week or so. > > I'd specifically be interested in hearing from anyone who'd > likely implement these. I'll send my own comments (which are > minor) during the IETF LC. > > Thanks, > S. > > [1] http://tools.ietf.org/html/draft-turner-application-cms-media-type > [2] > http://tools.ietf.org/html/draft-housley-ct-keypackage-receipt-n-error > [3] > http://tools.ietf.org/html/draft-turner-ct-keypackage-receipt-n-error-algs > > _______________________________________________ > saag mailing list > saag@ietf.org > https://www.ietf.org/mailman/listinfo/saag > > From paul.hoffman@vpnc.org Thu Oct 31 13:23:05 2013 Return-Path: X-Original-To: saag@ietfa.amsl.com Delivered-To: saag@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 33E3B11E8155 for ; Thu, 31 Oct 2013 13:23:05 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.591 X-Spam-Level: X-Spam-Status: No, score=-102.591 tagged_above=-999 required=5 tests=[AWL=0.008, BAYES_00=-2.599, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oc3pR8MKuHCu for ; Thu, 31 Oct 2013 13:23:04 -0700 (PDT) Received: from hoffman.proper.com (IPv6.Hoffman.Proper.COM [IPv6:2605:8e00:100:41::81]) by ietfa.amsl.com (Postfix) with ESMTP id E4F0211E8195 for ; Thu, 31 Oct 2013 13:23:02 -0700 (PDT) Received: from [10.20.30.90] (50-0-66-41.dsl.dynamic.sonic.net [50.0.66.41]) (authenticated bits=0) by hoffman.proper.com (8.14.7/8.14.7) with ESMTP id r9VKMxuc047343 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO) for ; Thu, 31 Oct 2013 13:23:01 -0700 (MST) (envelope-from paul.hoffman@vpnc.org) X-Authentication-Warning: hoffman.proper.com: Host 50-0-66-41.dsl.dynamic.sonic.net [50.0.66.41] claimed to be [10.20.30.90] From: Paul Hoffman Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable Message-Id: <468658C2-D6C8-41C0-B68D-7483102D2D60@vpnc.org> Date: Thu, 31 Oct 2013 13:22:59 -0700 To: saag Group Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1816\)) X-Mailer: Apple Mail (2.1816) Subject: [saag] Reminder of the security-focused meeting of the httbis WG X-BeenThere: saag@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Security Area Advisory Group List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 20:23:05 -0000 Greetings again. People here who care about the intersection of HTTP and = security should note that next week's Tuesday morning session of the = httpbis WG is focused on security. See the agenda at = for more = details. --Paul Hoffman= From dev+ietf@seantek.com Thu Oct 31 21:31:21 2013 Return-Path: X-Original-To: saag@ietfa.amsl.com Delivered-To: saag@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0D7C11E81FD; Thu, 31 Oct 2013 21:31:19 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lOICdnewWAc3; Thu, 31 Oct 2013 21:31:14 -0700 (PDT) Received: from mxout-08.mxes.net (mxout-08.mxes.net [216.86.168.183]) by ietfa.amsl.com (Postfix) with ESMTP id BDEA721E80A6; Thu, 31 Oct 2013 21:31:09 -0700 (PDT) Received: from [192.168.123.7] (unknown [76.173.239.154]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by smtp.mxes.net (Postfix) with ESMTPSA id 5ACCC509B5; Fri, 1 Nov 2013 00:31:07 -0400 (EDT) Message-ID: <52732E6D.3000409@seantek.com> Date: Thu, 31 Oct 2013 21:30:37 -0700 From: Sean Leonard User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20130307 Thunderbird/17.0.4 MIME-Version: 1.0 To: smime@ietf.org, "pkix@ietf.org" , saag@ietf.org Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha1; boundary="------------ms050608020504040403020808" Subject: [saag] New Version for PKIX Textual (02) X-BeenThere: saag@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Security Area Advisory Group List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 01 Nov 2013 04:31:24 -0000 This is a cryptographically signed message in MIME format. --------------ms050608020504040403020808 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: quoted-printable Greetings S/MIME, PKIX, and SAAG lists: A revised draft of PKIX text encodings has been published. The changes=20 are largely editorial rather than technical. However, the ABNF has been=20 beefed up to include stricter and more accurate encoding rules. Please provide any additional comments before we move it to the next=20 phases of publication. Kind regards, Sean Leonard -------- Original Message -------- Subject: New Version Notification for=20 draft-josefsson-pkix-textual-02.txt Date: Mon, 21 Oct 2013 15:24:56 -0700 From: internet-drafts@ietf.org To: Simon Josefsson , Sean Leonard A new version of I-D, draft-josefsson-pkix-textual-02.txt has been successfully submitted by Simon Josefsson and posted to the IETF repository. Filename: draft-josefsson-pkix-textual Revision: 02 Title: Text Encodings of PKIX and CMS Structures Creation date: 2013-10-22 Group: Individual Submission Number of pages: 14 URL:http://www.ietf.org/internet-drafts/draft-josefsson-pkix-textual-02.t= xt Status:http://datatracker.ietf.org/doc/draft-josefsson-pkix-textual Htmlized:http://tools.ietf.org/html/draft-josefsson-pkix-textual-02 Diff:http://www.ietf.org/rfcdiff?url2=3Ddraft-josefsson-pkix-textual-02 Abstract: This document describes and discuss the text encodings of Public-Key= Infrastructure using X.509 (PKIX) Certificates, PKIX Certificate Revocation Lists (CRLs), PKCS #10 Certification Request Syntax, PKCS= #7 structures, Cryptographic Message Syntax (CMS), PKCS #8 Private- Key Information Syntax, and Attribute Certificates. The text encodings are well-known, are implemented by several applications an= d libraries, and are widely deployed. This document is intended to articulate the de-facto rules that existing implementations operate by, and to give recommendations that will promote interoperability going forward. --------------ms050608020504040403020808 Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" Content-Description: S/MIME Cryptographic Signature MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIKSzCC BRowggQCoAMCAQICEG0Z6qcZT2ozIuYiMnqqcd4wDQYJKoZIhvcNAQEFBQAwga4xCzAJBgNV BAYTAlVTMQswCQYDVQQIEwJVVDEXMBUGA1UEBxMOU2FsdCBMYWtlIENpdHkxHjAcBgNVBAoT FVRoZSBVU0VSVFJVU1QgTmV0d29yazEhMB8GA1UECxMYaHR0cDovL3d3dy51c2VydHJ1c3Qu Y29tMTYwNAYDVQQDEy1VVE4tVVNFUkZpcnN0LUNsaWVudCBBdXRoZW50aWNhdGlvbiBhbmQg RW1haWwwHhcNMTEwNDI4MDAwMDAwWhcNMjAwNTMwMTA0ODM4WjCBkzELMAkGA1UEBhMCR0Ix GzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UEBxMHU2FsZm9yZDEaMBgGA1UE ChMRQ09NT0RPIENBIExpbWl0ZWQxOTA3BgNVBAMTMENPTU9ETyBDbGllbnQgQXV0aGVudGlj YXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoC ggEBAJKEhFtLV5jUXi+LpOFAyKNTWF9mZfEyTvefMn1V0HhMVbdClOD5J3EHxcZppLkyxPFA GpDMJ1Zifxe1cWmu5SAb5MtjXmDKokH2auGj/7jfH0htZUOMKi4rYzh337EXrMLaggLW1DJq 1GdvIBOPXDX65VSAr9hxCh03CgJQU2yVHakQFLSZlVkSMf8JotJM3FLb3uJAAVtIaN3FSrTg 7SQfOq9xXwfjrL8UO7AlcWg99A/WF1hGFYE8aIuLgw9teiFX5jSw2zJ+40rhpVJyZCaRTqWS D//gsWD9Gm9oUZljjRqLpcxCm5t9ImPTqaD8zp6Q30QZ9FxbNboW86eb/8ECAwEAAaOCAUsw ggFHMB8GA1UdIwQYMBaAFImCZ33EnSZwAEu0UEh83j2uBG59MB0GA1UdDgQWBBR6E04AdFvG eGNkJ8Ev4qBbvHnFezAOBgNVHQ8BAf8EBAMCAQYwEgYDVR0TAQH/BAgwBgEB/wIBADARBgNV HSAECjAIMAYGBFUdIAAwWAYDVR0fBFEwTzBNoEugSYZHaHR0cDovL2NybC51c2VydHJ1c3Qu Y29tL1VUTi1VU0VSRmlyc3QtQ2xpZW50QXV0aGVudGljYXRpb25hbmRFbWFpbC5jcmwwdAYI KwYBBQUHAQEEaDBmMD0GCCsGAQUFBzAChjFodHRwOi8vY3J0LnVzZXJ0cnVzdC5jb20vVVRO QWRkVHJ1c3RDbGllbnRfQ0EuY3J0MCUGCCsGAQUFBzABhhlodHRwOi8vb2NzcC51c2VydHJ1 c3QuY29tMA0GCSqGSIb3DQEBBQUAA4IBAQCF1r54V1VtM39EUv5C1QaoAQOAivsNsv1Kv/av QUn1G1rF0q0bc24+6SZ85kyYwTAo38v7QjyhJT4KddbQPTmGZtGhm7VNm2+vKGwdr+XqdFqo 2rHA8XV6L566k3nK/uKRHlZ0sviN0+BDchvtj/1gOSBH+4uvOmVIPJg9pSW/ve9g4EnlFsjr P0OD8ODuDcHTzTNfm9C9YGqzO/761Mk6PB/tm/+bSTO+Qik5g+4zaS6CnUVNqGnagBsePdIa XXxHmaWbCG0SmYbWXVcHG6cwvktJRLiQfsrReTjrtDP6oDpdJlieYVUYtCHVmdXgQ0BCML7q peeU0rD+83X5f27nMIIFKTCCBBGgAwIBAgIQZ6sVlrTEYjwLaBPoxUwEaTANBgkqhkiG9w0B AQUFADCBkzELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4G A1UEBxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxOTA3BgNVBAMTMENP TU9ETyBDbGllbnQgQXV0aGVudGljYXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQTAeFw0xMjEx MjkwMDAwMDBaFw0xMzExMjkyMzU5NTlaMCUxIzAhBgkqhkiG9w0BCQEWFGRlditpZXRmQHNl YW50ZWsuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAz4n20qAOzUtC1oNz 5zgTny0JRBE1mJZszV2s6EurahKPvku7E+utnLhcaNahAWr2oZgeCK9uhEqijaC4qLZHnGt/ +lnbsQtjmMJrcFCzhDZjDOJdYzmuS2cUvZqY7YwzCG6jSfs4gwNh+29MS6faY6ucncbnfO9r BB0xu5GIdI3BzsPNYnACNlBYU7w4X4GA0/MwNAabNhDgxU2Tw1fl5w1Vt+6xRTXBk6V93LyV ZN9wBIOpr2MuhoCJLHZrLirv/mbQE5ao4pkJLR/syYhS1Ko4MSiJmR3ugKPkxEo6DZkuJrfc k36hLmtMo3yuzi7hkXmDzPKkdLlNj+Xek1GWtwIDAQABo4IB5DCCAeAwHwYDVR0jBBgwFoAU ehNOAHRbxnhjZCfBL+KgW7x5xXswHQYDVR0OBBYEFBpm5d7y8PBT6NqnIVbfNK8hbpPGMA4G A1UdDwEB/wQEAwIFoDAMBgNVHRMBAf8EAjAAMCAGA1UdJQQZMBcGCCsGAQUFBwMEBgsrBgEE AbIxAQMFAjARBglghkgBhvhCAQEEBAMCBSAwRgYDVR0gBD8wPTA7BgwrBgEEAbIxAQIBAQEw KzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLm5ldC9DUFMwVwYDVR0fBFAw TjBMoEqgSIZGaHR0cDovL2NybC5jb21vZG9jYS5jb20vQ09NT0RPQ2xpZW50QXV0aGVudGlj YXRpb25hbmRTZWN1cmVFbWFpbENBLmNybDCBiAYIKwYBBQUHAQEEfDB6MFIGCCsGAQUFBzAC hkZodHRwOi8vY3J0LmNvbW9kb2NhLmNvbS9DT01PRE9DbGllbnRBdXRoZW50aWNhdGlvbmFu ZFNlY3VyZUVtYWlsQ0EuY3J0MCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5j b20wHwYDVR0RBBgwFoEUZGV2K2lldGZAc2VhbnRlay5jb20wDQYJKoZIhvcNAQEFBQADggEB AAY3GfgX0pLsz6qEOOG191EgYXSCpKW70wSFgSe+7AenZT88d/m8w0YtfOFVD7+94dNULDnH 4P6sD70hday7/ke4uYfgURxygemKN26KV3T7wBw8WbZSTmYJphzSoqUK5ISsQNwLaKf4yTmp Ae9IR1AjZXP3oAZvsRvpZDtiaULQ+HfFTypLDsnrA7sTtoVtirJdImGBTHsVtZ+GEQlhuuJ6 G1cInzNxIbxgnLdn4pFF82FP60SsZxaW2VRqDK7CbHJX4LUH+oJ6kp9qxF5I/RIAhRHd3lMe Xmq6vZPbnMUNhJyUC6TbYipe11+VDFPGiHZE/+y6RMSuRnepJzE4PLAxggQZMIIEFQIBATCB qDCBkzELMAkGA1UEBhMCR0IxGzAZBgNVBAgTEkdyZWF0ZXIgTWFuY2hlc3RlcjEQMA4GA1UE BxMHU2FsZm9yZDEaMBgGA1UEChMRQ09NT0RPIENBIExpbWl0ZWQxOTA3BgNVBAMTMENPTU9E TyBDbGllbnQgQXV0aGVudGljYXRpb24gYW5kIFNlY3VyZSBFbWFpbCBDQQIQZ6sVlrTEYjwL aBPoxUwEaTAJBgUrDgMCGgUAoIICRTAYBgkqhkiG9w0BCQMxCwYJKoZIhvcNAQcBMBwGCSqG SIb3DQEJBTEPFw0xMzExMDEwNDMwMzdaMCMGCSqGSIb3DQEJBDEWBBSFs8vL7htHdDC03lwX yxnektIghTBsBgkqhkiG9w0BCQ8xXzBdMAsGCWCGSAFlAwQBKjALBglghkgBZQMEAQIwCgYI KoZIhvcNAwcwDgYIKoZIhvcNAwICAgCAMA0GCCqGSIb3DQMCAgFAMAcGBSsOAwIHMA0GCCqG SIb3DQMCAgEoMIG5BgkrBgEEAYI3EAQxgaswgagwgZMxCzAJBgNVBAYTAkdCMRswGQYDVQQI ExJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcTB1NhbGZvcmQxGjAYBgNVBAoTEUNPTU9E TyBDQSBMaW1pdGVkMTkwNwYDVQQDEzBDT01PRE8gQ2xpZW50IEF1dGhlbnRpY2F0aW9uIGFu ZCBTZWN1cmUgRW1haWwgQ0ECEGerFZa0xGI8C2gT6MVMBGkwgbsGCyqGSIb3DQEJEAILMYGr oIGoMIGTMQswCQYDVQQGEwJHQjEbMBkGA1UECBMSR3JlYXRlciBNYW5jaGVzdGVyMRAwDgYD VQQHEwdTYWxmb3JkMRowGAYDVQQKExFDT01PRE8gQ0EgTGltaXRlZDE5MDcGA1UEAxMwQ09N T0RPIENsaWVudCBBdXRoZW50aWNhdGlvbiBhbmQgU2VjdXJlIEVtYWlsIENBAhBnqxWWtMRi PAtoE+jFTARpMA0GCSqGSIb3DQEBAQUABIIBAE/frMlqdxe/10uzmtQ5Wr0B9qw94bcWGjKK K3Wrixjsh/rbZHdiNipRUJfpnr8t+2J62B3J16zEApVLf1yJm+MTni1o7XMhL2xVFFs+1zcs 9haaxtwTWi/HPxmTXAr3ytu7v79bVl80esSPFznUPmKQjy3zN38JT/zt70EiTNlvs23imgEZ csKPLCqYffshrtqnjVq8I1VPLUdGUcy0DXJEzpCZxF2RKsOqEr0O219hOJFixv+PIad+DNtU 3Ch3QbMn6ZaYEwuUJVMMD5EU/7lyDel/AEmmxUIHi2JFiIN3z6mSt4m28OgM3sUt0udDrbTN ip2Vd9ydWG8d1hDF+isAAAAAAAA= --------------ms050608020504040403020808--