
From nobody Thu Mar  3 10:54:29 2022
Return-Path: <ietf-secretariat@ietf.org>
X-Original-To: scitt@ietf.org
Delivered-To: scitt@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 578F83A0AA3; Thu,  3 Mar 2022 10:54:26 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: IETF Secretariat <ietf-secretariat@ietf.org>
To: "IETF Announcement List" <ietf-announce@ietf.org>
Cc: henk.birkholz@sit.fraunhofer.de, Maik.Riechert@microsoft.com, scitt@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 7.46.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: ietf@ietf.org
Message-ID: <164633366633.28393.3588660921470357255@ietfa.amsl.com>
Date: Thu, 03 Mar 2022 10:54:26 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/a7K7zIKLe-pZnsE1lyz85iEiVSI>
Subject: [Scitt] New Non-WG Mailing List: scitt
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
List-Id: "Supply-Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 03 Mar 2022 18:54:27 -0000

A new IETF non-working group email list has been created.

List address: scitt@ietf.org
Archive: https://mailarchive.ietf.org/arch/browse/scitt/
To subscribe: https://www.ietf.org/mailman/listinfo/scitt

Purpose:
In the exchange of artifacts across end-to-end supply chains, it is
often the case that receiving entities require evidence to verify
the suitability of artifacts for an intended use. Key questions are
how the authenticity of entities, evidence, policy and artifacts can
be assured and how the evidence provided by entities can be
guaranteed to be authorized, transparent, immutable and auditable.

The Supply Chain Integrity, Transparency, and Trust (SCITT) mailing
list is a place to present, exchange, and discuss common practice,
emerging mechanisms, and converging terminology in the domain of
SCITT. This includes pointers to state-of-the art documents,
leveraging existing IETF work, or requests for public review.

This list belongs IETF area: SEC

For additional information, please contact the list administrators.


From nobody Mon Mar  7 01:33:26 2022
Return-Path: <kayw@microsoft.com>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8C3533A0C38 for <scitt@ietfa.amsl.com>; Sat,  5 Mar 2022 12:50:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.113
X-Spam-Level: 
X-Spam-Status: No, score=-0.113 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URI_TRY_3LD=1.997] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6sdNqcrUL71n for <scitt@ietfa.amsl.com>; Sat,  5 Mar 2022 12:50:42 -0800 (PST)
Received: from na01-obe.outbound.protection.outlook.com (mail-cusazlp170100000.outbound.protection.outlook.com [IPv6:2a01:111:f403:c111::]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9D5983A0C36 for <scitt@ietf.org>; Sat,  5 Mar 2022 12:50:39 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=OxPvD41b5TJBY4aApptxGBOHvDwtgnYnW1mk1bbkfuKUd4gixrC05ydAjAJ8o7NGl3C6gfayhPPsDnB5STEIRKMl51CqqwgrbdqLcVmnlxPrOc7YQ5OA8u5+4lCXGEICWbZykfIqi0OOUsc21aCGUtsH/H0g3GaoxrOPNe60oasNTe/edwynqWZT4vSyklnx6os6lZGHTHp5Dk+9a1h/0biBR53DS1N+f3smHog6wHbZxN2ubbVmy+oWeh9wnhwQbRETQeIFY/+DtTd4TZQ+OYmp6WOf9+1/KQJif+12gjM9eW7Won/nvTGk9/fB5G+2RFcbsibxPLcsBeMWdt4+fQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=bxbtHmiGOlUNlcTDrbW/KAJ1NK9zVjZSbNOAjyRPNLM=; b=QgdN0+KbjlDfqTfpK5FrXO8oOHUTHmRTrQCub8fZ2NQLQCL42mbxjv7QvocyJgZgUV4f0f5irpYs0F6XB1uEQcsZz/FKBCfxR9ylX9BsXCITNuP8yX8x3OD+8k8i03MKWNmRMfds7Nqefqto7AuGoQgQLk3KaC0GSnr5qmW5h2uW+F71NRuFd2zqg6rvi5FEUO4SAufhR99OlGg5piuEl0eHmluOOR9w/7U4gbB3fJR3zp0+meUgc+mRAjgArqVRxKAMnwE5h9Sg/ef5poDpsA1H3NNKRQqvWR3pptlyN0yX5C+mrqGumeUwlMnE8vx6CFCVHhxwqOCrzbQcMep/DQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=bxbtHmiGOlUNlcTDrbW/KAJ1NK9zVjZSbNOAjyRPNLM=; b=E3vtfcyeHVgMTIZO8/4Ke5DQ8K7bNYjuY2lu5zAWW1KF6qbE8ZG2EkJG/pXUN6wNGS36kLviyz2+W4V1CFkk2pJmeVbEU8I52jEyPhJvCJ4766OK2ysPcKz7OKselQlZ4RieQs5UCG11PiAhQEH4IpwTiA7AIiA9ocyO140hRo0=
Received: from DM6PR21MB1148.namprd21.prod.outlook.com (2603:10b6:5:16d::28) by SN6PR2101MB1118.namprd21.prod.outlook.com (2603:10b6:805:6::32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.4; Sat, 5 Mar 2022 20:50:31 +0000
Received: from DM6PR21MB1148.namprd21.prod.outlook.com ([fe80::6c2e:c18e:10f9:4cbd]) by DM6PR21MB1148.namprd21.prod.outlook.com ([fe80::6c2e:c18e:10f9:4cbd%5]) with mapi id 15.20.5061.008; Sat, 5 Mar 2022 20:50:31 +0000
From: Kay Williams <kayw@microsoft.com>
To: Robert A Martin <ramartin@mitre.org>, "santiagotorres@purdue.edu" <santiagotorres@purdue.edu>, "William Bartholomew (CELA)" <willbar@microsoft.com>, Sylvan Clebsch <Sylvan.Clebsch@microsoft.com>, Maik Riechert <Maik.Riechert@microsoft.com>, Stephen Provine <stephpr@microsoft.com>, Allen Stewart <Allen.Stewart@microsoft.com>, "Birkholz, Henk" <henk.birkholz@sit.fraunhofer.de>, Aeva Black <aeva.black@microsoft.com>, "nsen@qti.qualcomm.com" <nsen@qti.qualcomm.com>, Steve Lasker <Steve.Lasker@microsoft.com>, Bhuvaneshwari Krishnamurthi <bhkrishn@microsoft.com>, "scitt@ietf.org" <scitt@ietf.org>
CC: George Ringer <George.Ringer@microsoft.com>, "Manoj Prasad (HE/HIM)" <maprasa@microsoft.com>, EDGS Platform LT <edgsplatformlt@microsoft.com>, Daniel Dawson <dadawson@microsoft.com>, Jeromy Statia <Jeromy.Statia@microsoft.com>, Yogesh Deshpande <Yogesh.Deshpande@arm.com>, Chris Blask <chris@cybeats.com>, "dmitry@cybeats.com" <dmitry@cybeats.com>, "John Scott (john.scott@ionchannel.io)" <john.scott@ionchannel.io>, JC Herz <jc.herz@ionchannel.io>, "Entezari, Mehdi" <Mehdi.Entezari@unisys.com>, Christopher Hamula <chamula@microsoft.com>, "Panchamia, Sanket A" <sanket.panchamia@in.unisys.com>, Hector Linares <Hector.Linares@microsoft.com>, Brian Knight <brianknight@microsoft.com>, Cedric Fournet <fournet@microsoft.com>, Antoine Delignat-Lavaud <antdl@microsoft.com>, Rajkumar Purushothaman <Rajkumar.Purushothaman@microsoft.com>
Thread-Topic: SCITT Community Meeting Agenda
Thread-Index: Adgw0iL4LTpWPmgxSNq1EFoTCHh3MA==
Date: Sat, 5 Mar 2022 20:50:31 +0000
Message-ID: <DM6PR21MB11480273B06612C1520F1E19C5069@DM6PR21MB1148.namprd21.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2022-03-05T20:46:36Z;  MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=4bf4be12-873d-46b9-9501-7e476fb6086e; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b13a8854-7701-4277-0b5a-08d9fee9c9ac
x-ms-traffictypediagnostic: SN6PR2101MB1118:EE_
x-ld-processed: 72f988bf-86f1-41af-91ab-2d7cd011db47,ExtAddr
x-ms-exchange-atpmessageproperties: SA|SL
x-microsoft-antispam-prvs: <SN6PR2101MB1118B3C052E13AFE716CC504C5069@SN6PR2101MB1118.namprd21.prod.outlook.com>
x-o365-sonar-daas-pilot: True
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:DM6PR21MB1148.namprd21.prod.outlook.com; PTR:; CAT:NONE;  SFS:(13230001)(4636009)(366004)(316002)(6506007)(53546011)(7696005)(66476007)(64756008)(66946007)(66556008)(66446008)(76116006)(8676002)(4326008)(9686003)(508600001)(10290500003)(71200400001)(83380400001)(55016003)(107886003)(21615005)(186003)(110136005)(54906003)(2906002)(40140700001)(33656002)(52536014)(8936002)(5660300002)(7416002)(8990500004)(82960400001)(3480700007)(82950400001)(122000001)(38100700002)(921005)(86362001)(166002)(38070700005)(15940465004); DIR:OUT; SFP:1102; 
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?BSOIa2VnHUabBrD1pDsxUAW8V5Nq6nIeZ5ohpy08og9FW9SlNx/2CCHuSwnR?= =?us-ascii?Q?FZVW8ljDqpZKQrKY4uuLhsW6W1SnBY+2Dtn1coPIddQW6963BA+Oq706jPBK?= =?us-ascii?Q?7Z3wtYNX6o1qDoEfXM8tpo1LAted4a2cG5kb/VBB6zWY1NngG9THHL9IANbp?= =?us-ascii?Q?z+pAuCvva9qJ055kXTgl2IAZOK8/BbFlhsa5ksjRyJuKstPSrD9DiKkNDmKo?= =?us-ascii?Q?u05+UTUpx9xTo9WIpu4lP3cb+Uo3dmhj/oBHgNmzNvas7dlUm+fP0CZue9M3?= =?us-ascii?Q?AbgBG8FB+iwhmoHwsldDj8ceqj+Zte5UH8DMJDXaH0o9dcXTMaVLj3dDQi+G?= =?us-ascii?Q?yk9/nxuj9KcE7GrEQBBf7cRxBAIrNPN15Kl+EwgoDQPrwU0iGC2kabDXETYw?= =?us-ascii?Q?i3m+O0fO6CJRDXaFO/hwTvnzAEm7WKO1QWca83JzdffD2XsqOQ7Zhba+lpow?= =?us-ascii?Q?gT92BcnbHKteUr5RaQhaMbSrWiEGC0QpnKYK19PlKyHoGsXrt8JlPwThuTQv?= =?us-ascii?Q?crnIDhDoqAxNryeeZ734lWQ1OWQVSNYS11rv9iY33kaTHjMu1npB8jfj8I9W?= =?us-ascii?Q?ct1SD3YHRLuFww+3+1HKC4/ond7s2ggcZWiqXyUBB2GgQFAUz7OtIDPhoW9D?= =?us-ascii?Q?BSt1mcJzTROPhpWbG2KkzlCkJ5+mxM+CBqSUh1ZGSiI/I1UbLTK0ij0TBMff?= =?us-ascii?Q?x5lv/cWXnK26jvCgv+sJl8MYKycv+aHbj2JFhnDvE2OxA1xop0Ojr7wXKl+W?= =?us-ascii?Q?OvQjEEcImx0IPk0eEZ9N2tdCRlKXeZ1jUkzA4obMjCW8x5Hm3KqGUlA1LJx4?= =?us-ascii?Q?f5GbSTY97LknT5mA/+0Bht2lNtRZ1BBXD4F1n5qCEt+mbBfPRMawszxRBNzV?= =?us-ascii?Q?ruwEb8Q7sJf1r0nHtnYlk8gXNtRKpb/MeEYyTRbB3TEZw3UsdaJRo9l5l+n9?= =?us-ascii?Q?LkRSKLJ6CkcqZMhRkC4UUNBzo7aJXO9ObV/Vl+kqsRbXXPpyDybKSyN2ZfR3?= =?us-ascii?Q?6GMThS2HK1p5kKKRvwMQL0zlcv26ssSa8IQdltSN/G6uTV7scr7PcyxsgY3A?= =?us-ascii?Q?HX57j0lFm5AwyBOSz1Umli/JGtn8KHlOyBzGD6SJ7uhPKyWuoHtHnThODXCe?= =?us-ascii?Q?B1jSzcKJ/VEVR5Ozv7hcAsvgejL6QaICZTgPZxEUThstt4rJ2fcXxor966Qt?= =?us-ascii?Q?1kaybMk1FS35ViUKqVMzIJTZbV+jtMJk7BDG/Xz2mPiJXjynvxRmOGNshh3A?= =?us-ascii?Q?ql6kRbSVPJ50pWgPHQNufIv1K3XcUDSqhuqpmNE+16Fi6VzMR0ohKf3um5Ek?= =?us-ascii?Q?jUpCUYPpa3K2zPpblMqIThOAs1KPk7DdN8OKR3laGYeqAWJ09/n2Ooo6AjMv?= =?us-ascii?Q?Sd8uCmmfAeoZjctOFh0ewS6jtlwJW7a8IamsBvrweBEHdAD76Iodn4kbkzoi?= =?us-ascii?Q?WheWyadaWxVzwyQ2Z+F26WaCgwB1Ax+DXfvrkfANsqu3DTb3sSgTbEo6YXtH?= =?us-ascii?Q?a812wyjt3mPjixEV1qlQNwt7rx/5+SPDdzxM?=
Content-Type: multipart/alternative; boundary="_000_DM6PR21MB11480273B06612C1520F1E19C5069DM6PR21MB1148namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR21MB1148.namprd21.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b13a8854-7701-4277-0b5a-08d9fee9c9ac
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Mar 2022 20:50:31.2266 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: zXnpVGS/2jdorQl43iYtjUvxzdotYBmdcHovSPvg/yH8aY3mCipPYwBoAfKJM1wgWZPMlRiO49mwsfCOtvOyyg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR2101MB1118
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/NgkcZAMgEWQUNNpigx2KXYTGPTk>
X-Mailman-Approved-At: Mon, 07 Mar 2022 01:33:20 -0800
Subject: [SCITT] SCITT Community Meeting Agenda
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 05 Mar 2022 20:50:48 -0000

--_000_DM6PR21MB11480273B06612C1520F1E19C5069DM6PR21MB1148namp_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi all, here is our agenda<https://docs.google.com/document/d/1vf-EliXByhg5=
HZfgVbTqZhfaJFCmvMdQuZ4tC-Eq6wg/edit> for the next SCITT (formerly SCIM) co=
mmunity meeting on Monday 3/7 at 4pm UTC.


  *   Guest Presentation - Parsec<https://github.com/parallaxsecond/parsec>=
 (Paul Howard)
     *   Paul Howard is a Principal System Solutions Architect in the Archi=
tecture and Technology Group at Arm, based in Cambridge, UK. He focuses on =
end-to-end solutions that see hardware and software combine across cloud, e=
dge and IoT. Paul is a co-founder and maintainer of Parsec, and he acts as =
a technical lead for Arm's ongoing contributions into this project.
     *   Parsec is an open-source CNCF Sandbox security project. Its aim is=
 to make hardware-backed security simple to use and hard to get wrong. Pars=
ec provides uniform and convenient software interfaces to the hardware secu=
rity features of multiple platforms, and in a variety of programming langua=
ges.
  *   Signing Envelope Comparison (COSE/DSSE/etc.)
     *   Discussed at OpenSSF Supply Chain WG 3/2, but low attendance
     *   Discuss again at next meeting on 3/16 at 9 AM Pacific
     *   Several comments already in the document:
        *    Supply Chain Artifact Signing Envelope Format Comparison - Goo=
gle Docs<https://docs.google.com/document/d/18YVGA4mq45wfUkWrAqWkymzdHRcXxl=
wINKXnEp86L0w/edit#heading=3Dh.3v6vw85pjg5e>
  *   SCITT Mailing List
     *   Mailing list active - subscribe at SCITT Info Page (ietf.org)<http=
s://www.ietf.org/mailman/listinfo/scitt>
     *   All future email discussions, announcements, meeting agendas, etc.=
 should go to this list
  *   SCITT Proposal to Security Dispatch (secdispatch<https://datatracker.=
ietf.org/wg/secdispatch/about/>) WG
     *   Architecture document status (Henk)
        *   An Architecture for Trustworthy Digital Supply Chain Transparen=
cy Services (ietf-scitt.github.io)<https://ietf-scitt.github.io/draft-birkh=
olz-scitt-architecture/draft-birkholz-scitt-architecture.html>
     *   Meeting on 3/22 at 9:30 AM Eastern / 6:30 AM Pacific
        *   Additional meeting details TBD
        *   Registration at IETF Registration<https://registration.ietf.org=
/113/>
        *   One day remote pass - $125

-----Original Appointment-----
From: Kay Williams
Sent: Friday, May 28, 2021 12:43 PM
To: Kay Williams; Robert A. Martin; Santiago Torres Arias; William Bartholo=
mew (CELA); Sylvan Clebsch; Maik Riechert; Stephen Provine; Allen Stewart; =
henk.birkholz@sit.fraunhofer.de; Aeva Black; nsen@qti.qualcomm.com; Steve L=
asker; Bhuvaneshwari Krishnamurthi
Cc: George Ringer; Manoj Prasad (HE/HIM); EDGS Platform LT; Daniel Dawson; =
Jeromy Statia; Yogesh Deshpande; Chris Blask; dmitry@cybeats.com; John Scot=
t (john.scott@ionchannel.io); JC Herz; Entezari, Mehdi; Christopher Hamula;=
 Panchamia, Sanket A; Hector Linares; Brian Knight; Cedric Fournet; Antoine=
 Delignat-Lavaud; Rajkumar Purushothaman; Syed Wali Hamza
Subject: SCIM Community Meeting
When: Monday, February 28, 2022 8:05 AM-8:55 AM (UTC-08:00) Pacific Time (U=
S & Canada).
Where: Microsoft Teams Meeting

Steve, I am inviting you to the weekly SCIM community meetings for context.

-----------------------
Updating the time to 8:05 to 8:55 Pacific (from 8:00 to 9:00 Pacific)

Weekly SCIM Community Meeting

GitHub: microsoft/scim: Supply Chain Integrity Model (github.com)<https://g=
ithub.com/microsoft/SCIM>
Meeting agenda and notes: SCIM Project Weekly Meeting Agenda and Notes - Go=
ogle Docs<https://docs.google.com/document/d/1vf-EliXByhg5HZfgVbTqZhfaJFCmv=
MdQuZ4tC-Eq6wg/edit>
___________________________________________________________________________=
_____
Microsoft Teams meeting
Join on your computer or mobile app
Click here to join the meeting<https://teams.microsoft.com/l/meetup-join/19=
%3ameeting_YWI2YzM0YmYtYmJkOC00ODg2LWI1MmItYmJmZWM1OTI4Y2Ex%40thread.v2/0?c=
ontext=3D%7b%22Tid%22%3a%2272f988bf-86f1-41af-91ab-2d7cd011db47%22%2c%22Oid=
%22%3a%22531852bd-66b0-45f7-abad-b1e0ad3b3a32%22%7d>
Join with a video conferencing device
813878896@t.plcm.vc<mailto:813878896@t.plcm.vc>
Video Conference ID: 112 827 551 0
Alternate VTC dialing instructions<https://dialin.plcm.vc/teams/?key=3D8138=
78896&conf=3D1128275510>
Or call in (audio only)
+1 425-616-0754,,203402542#<tel:+14256160754,,203402542#>   United States, =
Seattle
Phone Conference ID: 203 402 542#
Find a local number<https://dialin.teams.microsoft.com/8551f4c1-bea3-441a-8=
738-69aa517a91c5?id=3D203402542> | Reset PIN<https://mysettings.lync.com/ps=
tnconferencing>
Learn More<https://aka.ms/JoinTeamsMeeting> | Meeting options<https://teams=
.microsoft.com/meetingOptions/?organizerId=3D531852bd-66b0-45f7-abad-b1e0ad=
3b3a32&tenantId=3D72f988bf-86f1-41af-91ab-2d7cd011db47&threadId=3D19_meetin=
g_YWI2YzM0YmYtYmJkOC00ODg2LWI1MmItYmJmZWM1OTI4Y2Ex@thread.v2&messageId=3D0&=
language=3Den-US>
___________________________________________________________________________=
_____


--_000_DM6PR21MB11480273B06612C1520F1E19C5069DM6PR21MB1148namp_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"Segoe UI";
	panose-1:2 11 5 2 4 2 4 2 2 3;}
@font-face
	{font-family:"Segoe UI Semibold";
	panose-1:2 11 7 2 4 2 4 2 2 3;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1753971362;
	mso-list-template-ids:-543359634;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72" style=3D"word-wrap:=
break-word">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Hi all, here is our <a href=3D"https://docs.google.c=
om/document/d/1vf-EliXByhg5HZfgVbTqZhfaJFCmvMdQuZ4tC-Eq6wg/edit">
agenda</a> for the next SCITT (formerly SCIM) community meeting on Monday 3=
/7 at 4pm UTC.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<ul style=3D"margin-top:0in" type=3D"disc">
<li style=3D"color:black;margin-top:0in;margin-bottom:0in;mso-list:l0 level=
1 lfo1;vertical-align:baseline">
<span style=3D"font-family:&quot;Arial&quot;,sans-serif">Guest Presentation=
 - <a href=3D"https://github.com/parallaxsecond/parsec">
<span style=3D"color:#1155CC">Parsec</span></a> (Paul Howard)<o:p></o:p></s=
pan></li><ul style=3D"margin-top:0in;padding-inline-start:48px" type=3D"cir=
cle">
<li style=3D"color:black;margin-top:0in;margin-bottom:0in;mso-list:l0 level=
2 lfo1;vertical-align:baseline">
<span style=3D"font-family:&quot;Arial&quot;,sans-serif;color:#333E48;backg=
round:white">Paul Howard is a Principal System Solutions Architect in the A=
rchitecture and Technology Group at Arm, based in Cambridge, UK. He focuses=
 on end-to-end solutions that see hardware and
 software combine across cloud, edge and IoT. Paul is a co-founder and main=
tainer of
<b>Parsec</b>, and he acts as a technical lead for Arm's ongoing contributi=
ons into this project.</span><span style=3D"font-family:&quot;Arial&quot;,s=
ans-serif"><o:p></o:p></span></li><li style=3D"color:black;margin-top:0in;m=
argin-bottom:0in;mso-list:l0 level2 lfo1;vertical-align:baseline">
<span style=3D"font-family:&quot;Arial&quot;,sans-serif">Parsec is an open-=
source CNCF Sandbox security project. Its aim is to make hardware-backed se=
curity simple to use and hard to get wrong. Parsec provides uniform and con=
venient software interfaces to the hardware
 security features of multiple platforms, and in a variety of programming l=
anguages.<o:p></o:p></span></li></ul>
<li style=3D"color:black;margin-top:0in;margin-bottom:0in;mso-list:l0 level=
1 lfo1;vertical-align:baseline">
<span style=3D"font-family:&quot;Arial&quot;,sans-serif">Signing Envelope C=
omparison (COSE/DSSE/etc.)<o:p></o:p></span></li><ul style=3D"margin-top:0i=
n;padding-inline-start:48px" type=3D"circle">
<li style=3D"color:black;margin-top:0in;margin-bottom:0in;mso-list:l0 level=
2 lfo1;vertical-align:baseline">
<span style=3D"font-family:&quot;Arial&quot;,sans-serif">Discussed at OpenS=
SF Supply Chain WG 3/2, but low attendance<o:p></o:p></span></li><li style=
=3D"color:black;margin-top:0in;margin-bottom:0in;mso-list:l0 level2 lfo1;ve=
rtical-align:baseline">
<span style=3D"font-family:&quot;Arial&quot;,sans-serif">Discuss again at n=
ext meeting on 3/16 at 9 AM Pacific<o:p></o:p></span></li><li style=3D"colo=
r:black;margin-top:0in;margin-bottom:0in;mso-list:l0 level2 lfo1;vertical-a=
lign:baseline">
<span style=3D"font-family:&quot;Arial&quot;,sans-serif">Several comments a=
lready in the document:<o:p></o:p></span></li><ul style=3D"margin-top:0in;p=
adding-inline-start:48px" type=3D"square">
<li style=3D"color:black;margin-top:0in;margin-bottom:0in;mso-list:l0 level=
3 lfo1;vertical-align:baseline">
<span style=3D"font-family:&quot;Arial&quot;,sans-serif">&nbsp;<a href=3D"h=
ttps://docs.google.com/document/d/18YVGA4mq45wfUkWrAqWkymzdHRcXxlwINKXnEp86=
L0w/edit#heading=3Dh.3v6vw85pjg5e"><span style=3D"color:#1155CC">Supply Cha=
in Artifact Signing Envelope Format Comparison - Google
 Docs</span></a><o:p></o:p></span></li></ul>
</ul>
<li style=3D"color:black;margin-top:0in;margin-bottom:0in;mso-list:l0 level=
1 lfo1;vertical-align:baseline">
<span style=3D"font-family:&quot;Arial&quot;,sans-serif">SCITT Mailing List=
<o:p></o:p></span></li><ul style=3D"margin-top:0in;padding-inline-start:48p=
x" type=3D"circle">
<li style=3D"color:black;margin-top:0in;margin-bottom:0in;mso-list:l0 level=
2 lfo1;vertical-align:baseline">
<span style=3D"font-family:&quot;Arial&quot;,sans-serif">Mailing list activ=
e - subscribe at <a href=3D"https://www.ietf.org/mailman/listinfo/scitt">
<span style=3D"color:#1155CC">SCITT Info Page (ietf.org)</span></a><o:p></o=
:p></span></li><li style=3D"color:black;margin-top:0in;margin-bottom:0in;ms=
o-list:l0 level2 lfo1;vertical-align:baseline">
<span style=3D"font-family:&quot;Arial&quot;,sans-serif">All future email d=
iscussions, announcements, meeting agendas, etc. should go to this list<o:p=
></o:p></span></li></ul>
<li style=3D"color:black;margin-top:0in;margin-bottom:0in;mso-list:l0 level=
1 lfo1;vertical-align:baseline">
<span style=3D"font-family:&quot;Arial&quot;,sans-serif">SCITT Proposal to =
Security Dispatch (<a href=3D"https://datatracker.ietf.org/wg/secdispatch/a=
bout/"><span style=3D"color:#1155CC">secdispatch</span></a>) WG<o:p></o:p><=
/span></li><ul style=3D"margin-top:0in;padding-inline-start:48px" type=3D"c=
ircle">
<li style=3D"color:black;margin-top:0in;margin-bottom:0in;mso-list:l0 level=
2 lfo1;vertical-align:baseline">
<span style=3D"font-family:&quot;Arial&quot;,sans-serif">Architecture docum=
ent status (Henk)<o:p></o:p></span></li><ul style=3D"margin-top:0in;padding=
-inline-start:48px" type=3D"square">
<li style=3D"color:black;margin-top:0in;margin-bottom:0in;mso-list:l0 level=
3 lfo1;vertical-align:baseline">
<span style=3D"font-family:&quot;Arial&quot;,sans-serif"><a href=3D"https:/=
/ietf-scitt.github.io/draft-birkholz-scitt-architecture/draft-birkholz-scit=
t-architecture.html"><span style=3D"color:#1155CC">An Architecture for Trus=
tworthy Digital Supply Chain Transparency Services
 (ietf-scitt.github.io)</span></a><o:p></o:p></span></li></ul>
<li style=3D"color:black;margin-top:0in;margin-bottom:0in;mso-list:l0 level=
2 lfo1;vertical-align:baseline">
<span style=3D"font-family:&quot;Arial&quot;,sans-serif">Meeting on 3/22 at=
 9:30 AM Eastern / 6:30 AM Pacific<o:p></o:p></span></li><ul style=3D"margi=
n-top:0in;padding-inline-start:48px" type=3D"square">
<li style=3D"color:black;margin-top:0in;margin-bottom:0in;mso-list:l0 level=
3 lfo1;vertical-align:baseline">
<span style=3D"font-family:&quot;Arial&quot;,sans-serif">Additional meeting=
 details TBD<o:p></o:p></span></li><li style=3D"color:black;margin-top:0in;=
margin-bottom:0in;mso-list:l0 level3 lfo1;vertical-align:baseline">
<span style=3D"font-family:&quot;Arial&quot;,sans-serif">Registration at <a=
 href=3D"https://registration.ietf.org/113/">
<span style=3D"color:#1155CC">IETF Registration</span></a><o:p></o:p></span=
></li><li style=3D"color:black;margin-top:0in;margin-bottom:0in;mso-list:l0=
 level3 lfo1;vertical-align:baseline">
<span style=3D"font-family:&quot;Arial&quot;,sans-serif">One day remote pas=
s - $125<o:p></o:p></span></li></ul>
</ul>
</ul>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal">-----Original Appointment-----<br>
<b>From:</b> Kay Williams <br>
<b>Sent:</b> Friday, May 28, 2021 12:43 PM<br>
<b>To:</b> Kay Williams; Robert A. Martin; Santiago Torres Arias; William B=
artholomew (CELA); Sylvan Clebsch; Maik Riechert; Stephen Provine; Allen St=
ewart; henk.birkholz@sit.fraunhofer.de; Aeva Black; nsen@qti.qualcomm.com; =
Steve Lasker; Bhuvaneshwari Krishnamurthi<br>
<b>Cc:</b> George Ringer; Manoj Prasad (HE/HIM); EDGS Platform LT; Daniel D=
awson; Jeromy Statia; Yogesh Deshpande; Chris Blask; dmitry@cybeats.com; Jo=
hn Scott (john.scott@ionchannel.io); JC Herz; Entezari, Mehdi; Christopher =
Hamula; Panchamia, Sanket A; Hector
 Linares; Brian Knight; Cedric Fournet; Antoine Delignat-Lavaud; Rajkumar P=
urushothaman; Syed Wali Hamza<br>
<b>Subject:</b> SCIM Community Meeting<br>
<b>When:</b> Monday, February 28, 2022 8:05 AM-8:55 AM (UTC-08:00) Pacific =
Time (US &amp; Canada).<br>
<b>Where:</b> Microsoft Teams Meeting<o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Steve, I am inviting you to the weekly SCIM communit=
y meetings for context.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">-----------------------<o:p></o:p></p>
<p class=3D"MsoNormal">Updating the time to 8:05 to 8:55 Pacific (from 8:00=
 to 9:00 Pacific)<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Weekly SCIM Community Meeting<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">GitHub: <a href=3D"https://github.com/microsoft/SCIM=
">microsoft/scim: Supply Chain Integrity Model (github.com)</a><o:p></o:p><=
/p>
<p class=3D"MsoNormal">Meeting agenda and notes: <a href=3D"https://docs.go=
ogle.com/document/d/1vf-EliXByhg5HZfgVbTqZhfaJFCmvMdQuZ4tC-Eq6wg/edit">
SCIM Project Weekly Meeting Agenda and Notes - Google Docs</a><o:p></o:p></=
p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#5F5F5F">______________________=
__________________________________________________________</span>
<o:p></o:p></p>
</div>
<div>
<div style=3D"margin-top:.25in;margin-bottom:15.0pt">
<p class=3D"MsoNormal"><span style=3D"font-size:18.0pt;font-family:&quot;Se=
goe UI&quot;,sans-serif;color:#252424">Microsoft Teams meeting</span><span =
style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;color:#252424">
<o:p></o:p></span></p>
</div>
<div style=3D"margin-bottom:15.0pt">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.5pt;font-family:&quot=
;Segoe UI&quot;,sans-serif;color:#252424">Join on your computer or mobile a=
pp</span></b><b><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;=
color:#252424">
<o:p></o:p></span></b></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Segoe UI&quot;,sans=
-serif;color:#252424"><a href=3D"https://teams.microsoft.com/l/meetup-join/=
19%3ameeting_YWI2YzM0YmYtYmJkOC00ODg2LWI1MmItYmJmZWM1OTI4Y2Ex%40thread.v2/0=
?context=3D%7b%22Tid%22%3a%2272f988bf-86f1-41af-91ab-2d7cd011db47%22%2c%22O=
id%22%3a%22531852bd-66b0-45f7-abad-b1e0ad3b3a32%22%7d" target=3D"_blank"><s=
pan style=3D"font-size:10.5pt;font-family:&quot;Segoe UI Semibold&quot;,san=
s-serif;color:#6264A7">Click
 here to join the meeting</span></a> <o:p></o:p></span></p>
</div>
<div style=3D"margin-bottom:3.0pt">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.5pt;font-family:&quot=
;Segoe UI&quot;,sans-serif;color:#252424">Join with a video conferencing de=
vice</span></b><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;c=
olor:#252424">
<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Se=
goe UI&quot;,sans-serif;color:#252424"><a href=3D"mailto:813878896@t.plcm.v=
c">813878896@t.plcm.vc</a>
<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Se=
goe UI&quot;,sans-serif;color:#252424">Video Conference ID:
</span><span style=3D"font-size:12.0pt;font-family:&quot;Segoe UI&quot;,san=
s-serif;color:#252424">112 827 551 0
</span><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;color:#25=
2424"><o:p></o:p></span></p>
</div>
<div style=3D"margin-bottom:15.0pt">
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Se=
goe UI&quot;,sans-serif;color:#252424"><a href=3D"https://dialin.plcm.vc/te=
ams/?key=3D813878896&amp;conf=3D1128275510"><span style=3D"color:#6264A7">A=
lternate VTC dialing instructions</span></a>
<o:p></o:p></span></p>
</div>
<div style=3D"margin-bottom:3.0pt">
<div style=3D"margin-bottom:3.0pt">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.5pt;font-family:&quot=
;Segoe UI&quot;,sans-serif;color:#252424">Or call in (audio only)</span></b=
><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;color:#252424">
<o:p></o:p></span></p>
</div>
<div style=3D"margin-bottom:3.0pt">
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Segoe UI&quot;,sans=
-serif;color:#252424"><a href=3D"tel:+14256160754,,203402542# "><span style=
=3D"font-size:10.5pt;color:#6264A7">+1 425-616-0754,,203402542#</span></a>
</span><span style=3D"font-size:10.5pt;font-family:&quot;Segoe UI&quot;,san=
s-serif;color:#252424">&nbsp; United States, Seattle
</span><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;color:#25=
2424"><o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Se=
goe UI&quot;,sans-serif;color:#252424">Phone Conference ID:
</span><span style=3D"font-size:12.0pt;font-family:&quot;Segoe UI&quot;,san=
s-serif;color:#252424">203 402 542#
</span><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;color:#25=
2424"><o:p></o:p></span></p>
<div style=3D"margin-bottom:15.0pt">
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Segoe UI&quot;,sans=
-serif;color:#252424"><a href=3D"https://dialin.teams.microsoft.com/8551f4c=
1-bea3-441a-8738-69aa517a91c5?id=3D203402542" target=3D"_blank"><span style=
=3D"font-size:10.5pt;color:#6264A7">Find a local number</span></a>
 | <a href=3D"https://mysettings.lync.com/pstnconferencing" target=3D"_blan=
k"><span style=3D"font-size:10.5pt;color:#6264A7">Reset PIN</span></a>
<o:p></o:p></span></p>
</div>
<div style=3D"margin-top:15.0pt;margin-bottom:.25in">
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Segoe UI&quot;,sans=
-serif;color:#252424"><a href=3D"https://aka.ms/JoinTeamsMeeting" target=3D=
"_blank"><span style=3D"font-size:10.5pt;color:#6264A7">Learn More</span></=
a> |
<a href=3D"https://teams.microsoft.com/meetingOptions/?organizerId=3D531852=
bd-66b0-45f7-abad-b1e0ad3b3a32&amp;tenantId=3D72f988bf-86f1-41af-91ab-2d7cd=
011db47&amp;threadId=3D19_meeting_YWI2YzM0YmYtYmJkOC00ODg2LWI1MmItYmJmZWM1O=
TI4Y2Ex@thread.v2&amp;messageId=3D0&amp;language=3Den-US" target=3D"_blank"=
>
<span style=3D"font-size:10.5pt;color:#6264A7">Meeting options</span></a> <=
o:p></o:p></span></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#5F5F5F">______________________=
__________________________________________________________</span>
<o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_DM6PR21MB11480273B06612C1520F1E19C5069DM6PR21MB1148namp_--


From nobody Mon Mar  7 10:43:38 2022
Return-Path: <orie@transmute.industries>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 66E643A154F for <scitt@ietfa.amsl.com>; Mon,  7 Mar 2022 10:43:11 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.097
X-Spam-Level: 
X-Spam-Status: No, score=-1.097 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, DOTGOV_IMAGE=1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=transmute.industries
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GOmoTNK9XblI for <scitt@ietfa.amsl.com>; Mon,  7 Mar 2022 10:43:06 -0800 (PST)
Received: from mail-lf1-x132.google.com (mail-lf1-x132.google.com [IPv6:2a00:1450:4864:20::132]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 646EA3A0125 for <scitt@ietf.org>; Mon,  7 Mar 2022 10:41:25 -0800 (PST)
Received: by mail-lf1-x132.google.com with SMTP id 3so9224495lfr.7 for <scitt@ietf.org>; Mon, 07 Mar 2022 10:41:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=transmute.industries; s=google; h=mime-version:from:date:message-id:subject:to:cc; bh=fwu26yDj4ABPCLsdFl5dX9uDuR7TEmSXrOxVECzRvgI=; b=FCMfbXurZEd2WiAXFlCf4ez9fSZSjGxB2DRPRecQdx9HL71+TcmNERFTdgkxPadjG4 xbRCa643uJyJKYw7s3NnWMkLSN3PxTPuf08X+nXHhZTBMgjMtlIMT3lirHyP1UZQPBy9 1/RjUXGV+d049u6c6yTUeQI7vKINNgYzpb0gap4GZMmYkjNg7k1ba+lfyZrZqVXdwEQ+ xIOimDlkgxg1neiGiJc56voxA9qkUCMPD//ZO31HZEMHc9Ok7sOIV5H9Xbq/OQ7v4B0N FlcGSOs1r4fMo59UQ+UDeY6C2br528f6icAjqLYvMdBX3dgz4yR3E/hfNlTU9SkdIhJu XqXw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:from:date:message-id:subject:to:cc; bh=fwu26yDj4ABPCLsdFl5dX9uDuR7TEmSXrOxVECzRvgI=; b=V0e3qdhbyppTza9avCDXA5JSoMjKUUtiedGyqt3JYwGpRBvo31nr6Do+c4cjSbPqic RtN3Ih6L5vBBl4SYFTHxDmCWafb3b/xTHRmLi2WN3q3q9V1MqOGhzPdieDDThljzRKsv uB0+NsRt8QCtbuYesyO7s0GhPgUPK+tYTP0sy1ZAnUkNXV29L6hP5/Z4sfQETftT0Ga9 IYVSgL7+FDW+Jdv3W3Ic6cfwfWdy2JLaAmObJfkAfcl2ulTuazii5+0a/yxDRHq4BhXU XaHjvkd36sd41/5WrpWMZYUe736v/b5XJyTeRrd78OCx9DP1PSY1x53TqI00VERSN15y 73bw==
X-Gm-Message-State: AOAM530jEBNi28v/D+qJDZZIurdg9B089XYuQDgNg+dSCwGA3g4xo34T wF/yOiO+FX8al9QdZn4CYTNmWDHPKnqCU3PFeceD8L/WvZI=
X-Google-Smtp-Source: ABdhPJykJubHjE06mZWCQHmjm0NtyWAGjoyxcF0gyP6sqpkw7FVD2KMkz8ybCvaSyO7GSf5lFkwC+3z6/aKXUgNCTFY=
X-Received: by 2002:a19:dc13:0:b0:448:3735:776b with SMTP id t19-20020a19dc13000000b004483735776bmr1581612lfg.77.1646678482483; Mon, 07 Mar 2022 10:41:22 -0800 (PST)
MIME-Version: 1.0
From: Orie Steele <orie@transmute.industries>
Date: Mon, 7 Mar 2022 12:41:11 -0600
Message-ID: <CAN8C-_K9KBg2DhKOHUf8EMXo5wmTnrEc011e3Q7Y8zFOJsZ-1Q@mail.gmail.com>
To: scitt@ietf.org
Cc: Sapan Narang <sapan@transmute.industries>
Content-Type: multipart/alternative; boundary="000000000000020f0305d9a5367b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/E_CsSLibibxLzIBYIKx7DO3C3Lo>
Subject: [SCITT] GitHub DIDs & VCs for Supply Chain Traceability
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 07 Mar 2022 18:43:19 -0000

--000000000000020f0305d9a5367b
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hello,

I'm Orie, I work on identifier and credentialing standards at W3C and IETF.

My company Transmute
<https://streaklinks.com/A9ifQyqiYqEgkF4xWgxA5Ast/https%3A%2F%2Ftransmute.i=
ndustries%2F>
applies these standards to supply traceability (both physical and software)=
.

Some of our work is funded by DHS SVIP
<https://streaklinks.com/A9ifQyqNTelooObAhwFx98Nw/https%3A%2F%2Fwww.dhs.gov=
%2Fscience-and-technology%2Fsvip>,
including our work on applying DIDs and VCs to physical supply chain issues
associated with global trade and imports and exports.

If you are interested in that work it can be found here:
https://w3id.org/traceability
<https://streaklinks.com/A9ifQy2fH6UWEI23iw-vWGEG/https%3A%2F%2Fw3id.org%2F=
traceability>
.

I wanted to share some very recent (experimental and unstable) work we've
done to enable Decentralized Identifiers
<https://streaklinks.com/A9ifQyqX11lXlzLvQgPI070Q/https%3A%2F%2Fwww.w3.org%=
2FTR%2Fdid-core%2F>
and Verifiable Credentials
<https://streaklinks.com/A9ifQymDA7VYHe95RgZjMZKI/https%3A%2F%2Fwww.w3.org%=
2FTR%2Fvc-data-model%2F>
to assist with the software supply chain.

Here are the links:

- https://github.com/transmute-industries/verifiable-actions
<https://streaklinks.com/A9ifQyqXl4mGukfBcw_Wj_Q8/https%3A%2F%2Fgithub.com%=
2Ftransmute-industries%2Fverifiable-actions>
-
https://github.com/transmute-industries/public-credential-registry-template
<https://streaklinks.com/A9ifQyuHh9DtUHodDwKXtBBB/https%3A%2F%2Fgithub.com%=
2Ftransmute-industries%2Fpublic-credential-registry-template>

The key idea is to enable github actions to sign and verify credentials
that conform to the W3C Verifiable Credentials standard (which in turn
supports various envelope formats including JOSE, COSE and PGP).

The issuers are identified with W3C Decentralized Identifiers, which
provide a layer of interoperability for public key identifier registries.
The key value of this standard is the ability to support both traditional
public key based identifiers, web resource based identifiers and
blockchain based identifiers in the same data model.

The examples in the repository links above demonstrate support for these
standards using did:key
<https://streaklinks.com/A9ifQyuGxqSDtSpdZABx8eMt/https%3A%2F%2Fw3c-ccg.git=
hub.io%2Fdid-method-key%2F>
and
did:web
<https://streaklinks.com/A9ifQyqsLGN-htS74QXmSanv/https%3A%2F%2Fgithub.com%=
2Fw3c-ccg%2Fdid-method-web>,

however I am one of the editors of the Sidetree Protocol
<https://streaklinks.com/A9ifQyuu7nlpbor7UAurwtjs/https%3A%2F%2Fgithub.com%=
2Fdecentralized-identity%2Fsidetree>
which
is what powers did:ion
<https://streaklinks.com/A9ifQyuxcXKIp3hEOgkQqHLh/https%3A%2F%2Ftechcommuni=
ty.microsoft.com%2Ft5%2Fidentity-standards-blog%2Fion-we-have-liftoff%2Fba-=
p%2F1441555>
which
is being developed by Microsoft and other DIF members...
The GitHub examples I provided will also work with did:ion.

Feel free to raise issues on any of the repositories linked, or ask me
questions directly by email if you are not comfortable commenting on a
public repo.

Regards,

OS

--=20
*ORIE STEELE*
Chief Technical Officer
www.transmute.industries

<https://streaklinks.com/A9ifQyqJyZSff0skfwnnG7JR/https%3A%2F%2Fwww.transmu=
te.industries>
=E1=90=A7

--000000000000020f0305d9a5367b
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hello,<br><br>I&#39;m Orie, I work on identifier and crede=
ntialing standards at W3C and IETF.<br><br>My company <a href=3D"https://st=
reaklinks.com/A9ifQyqiYqEgkF4xWgxA5Ast/https%3A%2F%2Ftransmute.industries%2=
F" target=3D"_blank">Transmute</a> applies these standards to supply tracea=
bility (both physical=C2=A0and software).<br><br>Some of our work is funded=
 by <a href=3D"https://streaklinks.com/A9ifQyqNTelooObAhwFx98Nw/https%3A%2F=
%2Fwww.dhs.gov%2Fscience-and-technology%2Fsvip" target=3D"_blank">DHS SVIP<=
/a>, including our work on applying DIDs and VCs to physical supply chain=
=C2=A0issues associated with global trade and imports and exports.<br><br>I=
f you are interested in that work it can be found here:=C2=A0<a href=3D"htt=
ps://streaklinks.com/A9ifQy2fH6UWEI23iw-vWGEG/https%3A%2F%2Fw3id.org%2Ftrac=
eability" target=3D"_blank">https://w3id.org/traceability</a>.<br><br>I wan=
ted to share some very recent (experimental and unstable) work we&#39;ve do=
ne to enable <a href=3D"https://streaklinks.com/A9ifQyqX11lXlzLvQgPI070Q/ht=
tps%3A%2F%2Fwww.w3.org%2FTR%2Fdid-core%2F" target=3D"_blank">Decentralized =
Identifiers</a> and <a href=3D"https://streaklinks.com/A9ifQymDA7VYHe95RgZj=
MZKI/https%3A%2F%2Fwww.w3.org%2FTR%2Fvc-data-model%2F" target=3D"_blank">Ve=
rifiable Credentials</a> to assist with the software supply chain.<br><br>H=
ere are the links:<br><br>-=C2=A0<a href=3D"https://streaklinks.com/A9ifQyq=
Xl4mGukfBcw_Wj_Q8/https%3A%2F%2Fgithub.com%2Ftransmute-industries%2Fverifia=
ble-actions" target=3D"_blank">https://github.com/transmute-industries/veri=
fiable-actions</a><br>-=C2=A0<a href=3D"https://streaklinks.com/A9ifQyuHh9D=
tUHodDwKXtBBB/https%3A%2F%2Fgithub.com%2Ftransmute-industries%2Fpublic-cred=
ential-registry-template" target=3D"_blank">https://github.com/transmute-in=
dustries/public-credential-registry-template</a><br><br>The key idea is to =
enable github actions to sign and verify credentials that conform to the W3=
C Verifiable Credentials standard (which in turn supports various envelope =
formats including JOSE, COSE and PGP).<br><br>The issuers are identified=C2=
=A0with W3C Decentralized Identifiers, which provide a layer of interoperab=
ility for public key identifier=C2=A0registries. <br>The key value of this =
standard is the ability to support both traditional public key based identi=
fiers, web resource based identifiers and blockchain=C2=A0based identifiers=
 in the same data model.<br><br>The examples in the repository links above =
demonstrate support for these standards using <a href=3D"https://streaklink=
s.com/A9ifQyuGxqSDtSpdZABx8eMt/https%3A%2F%2Fw3c-ccg.github.io%2Fdid-method=
-key%2F" target=3D"_blank">did:key</a>=C2=A0and <a href=3D"https://streakli=
nks.com/A9ifQyqsLGN-htS74QXmSanv/https%3A%2F%2Fgithub.com%2Fw3c-ccg%2Fdid-m=
ethod-web" target=3D"_blank">did:web</a>, <br>however I am one of the edito=
rs of the=C2=A0<a href=3D"https://streaklinks.com/A9ifQyuu7nlpbor7UAurwtjs/=
https%3A%2F%2Fgithub.com%2Fdecentralized-identity%2Fsidetree" target=3D"_bl=
ank">Sidetree Protocol</a>=C2=A0which is what powers <a href=3D"https://str=
eaklinks.com/A9ifQyuxcXKIp3hEOgkQqHLh/https%3A%2F%2Ftechcommunity.microsoft=
.com%2Ft5%2Fidentity-standards-blog%2Fion-we-have-liftoff%2Fba-p%2F1441555"=
 target=3D"_blank">did:ion</a>=C2=A0which is being developed by Microsoft a=
nd other DIF members... <br>The GitHub examples I provided will also work w=
ith did:ion.<br><br>Feel free to raise issues on any of the repositories li=
nked, or ask me questions directly by email if you are not comfortable comm=
enting on a public repo.<br><br>Regards,<br><br>OS<br clear=3D"all"><div><b=
r></div>-- <br><div dir=3D"ltr" data-smartmail=3D"gmail_signature"><div dir=
=3D"ltr"><div><div dir=3D"ltr"><div><div dir=3D"ltr"><div><div dir=3D"ltr">=
<div><div dir=3D"ltr"><font face=3D"tahoma, sans-serif" size=3D"2" color=3D=
"#351c75"><b style=3D"background-color:rgb(255,255,255)">ORIE STEELE</b></f=
ont><div><font size=3D"2" face=3D"arial narrow, sans-serif" style=3D"backgr=
ound-color:rgb(255,255,255)" color=3D"#351c75">Chief Technical Officer</fon=
t></div><div><font style=3D"background-color:rgb(255,255,255)" color=3D"#35=
1c75" face=3D"arial, helvetica, sans-serif" size=3D"1">www.transmute.indust=
ries</font></div><div><font size=3D"2" face=3D"arial narrow, sans-serif"><b=
r></font></div><div><font size=3D"2" face=3D"arial narrow, sans-serif"><a h=
ref=3D"https://streaklinks.com/A9ifQyqJyZSff0skfwnnG7JR/https%3A%2F%2Fwww.t=
ransmute.industries" target=3D"_blank"><img src=3D"https://drive.google.com=
/a/transmute.industries/uc?id=3D1hbftCJoB5KdeV_kzj4eeyS28V3zS9d9c&amp;expor=
t=3Ddownload" width=3D"96" height=3D"23"></a><br></font></div></div></div><=
/div></div></div></div></div></div></div></div></div><div hspace=3D"streak-=
pt-mark" style=3D"max-height:1px"><img alt=3D"" style=3D"width:0px;max-heig=
ht:0px;overflow:hidden" src=3D"https://mailfoogae.appspot.com/t?sender=3Dab=
3JpZUB0cmFuc211dGUuaW5kdXN0cmllcw%3D%3D&amp;type=3Dzerocontent&amp;guid=3D7=
6629253-3770-41de-9267-75822572b3a6"><font color=3D"#ffffff" size=3D"1">=E1=
=90=A7</font></div>

--000000000000020f0305d9a5367b--


From nobody Wed Mar  9 13:50:03 2022
Return-Path: <henk.birkholz@sit.fraunhofer.de>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BBCFA3A0DCF for <scitt@ietfa.amsl.com>; Wed,  9 Mar 2022 13:49:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level: 
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=fraunhofer.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L7f0EOJex4p3 for <scitt@ietfa.amsl.com>; Wed,  9 Mar 2022 13:49:54 -0800 (PST)
Received: from mail-edgeKA27.fraunhofer.de (mail-edgeka27.fraunhofer.de [153.96.1.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 069093A0D70 for <scitt@ietf.org>; Wed,  9 Mar 2022 13:49:51 -0800 (PST)
IronPort-SDR: rVgBl7igQ9YCmdFWnYNJcqBzlUc5f3mRMDU0UXTA7uAMHnH3R/jPGr0TRTMZbRNlzNGI1ZNgOc rIkpSaV6nxsCZgPat9wwJDOyCaX2Cp9FIjFjbkV7dq06bK+AqE/IfUIbLJrgNsVTOgAjIzqvvF K460SFvNo/LY3DRtGiUI4g2GIsAqS9Kw7wDQYhxDr628e9vOLjSU0YogorBZtX0KeOAZOrUCd3 8g5nCvbVTLzHdXSfqmwhZZ3twvlrBBUwOTWkoO8iO/aiz+HDs/OmGiqa8MhsFvop28IStNHD/I HPg=
X-IPAS-Result: =?us-ascii?q?A2E2CgBRICli/xmkZsBagQmBXIF+KH6BVYRVjhaCVC4Dm?= =?us-ascii?q?zGCUwMYFiYLAQEBAQEBAQEBCAE3CgQBAQMEhQAChCQmOBMBAgQBAQEBAwIDA?= =?us-ascii?q?QEBAQUBAQYBAQEBAQEFBAICgRiFLzkNQAEMAYIiY00GNQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQUCDTQeKQwyAQEBAgEjDwEFCAEBO?= =?us-ascii?q?AQLCRQIAiYCAjIXDgYNBgIBAReCaQGCZQMNMJIzmxJ6gTGBAYIIAQEGBASBN?= =?us-ascii?q?wETQUiCNxhcgVsDBgkBgQYsAYMQgwNWh143gVVEgTwPhhUCA4Iqgk2CZZdXI?= =?us-ascii?q?hkYgTSBNAcIkXWteDQHghKBOgWBNQYLiT+UTAYULoNzjCyGKJFrlAKCU40Tj?= =?us-ascii?q?x6FECCEbwIEAgQFAg4IgXiBf00kT4I1AQEyURkPj0YBCIJDhRSFS3Q4AgYBC?= =?us-ascii?q?gEBAwmHJopJAQE?=
IronPort-PHdr: A9a23:KdAAQR0y7/EjxCPAsmDPp1BlVkEcU/3cMg0U788hjLRDOuSm8o/5N UPSrfNqkBfSXIrd5v4F7oies63pVWEap5rUtncEfc9AUhYfgpAQmAotSMeOFUz8KqvsaCo3V MRPXVNo5Te1K09QTd3/exvcuHSv6z4VFBjlcwZ4dYzI
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.90,168,1643670000"; d="scan'208";a="40306212"
Received: from mail-mtaf25.fraunhofer.de ([192.102.164.25]) by mail-edgeKA27.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 Mar 2022 22:49:48 +0100
IronPort-SDR: +k7xENVy/j5IWY5BQ20Qq9yj11YFM7aaiP97V8Ow5MSMxezRTW/kgprfU2HA7MhNkWB5HDgvJ+ CXhkg+xT9s32GpMKkDBKCTOvru5abZVEY=
X-IPAS-Result: =?us-ascii?q?A0CaAgCnHylimD6wYZlagQkJgVOBUC4oflkmVoRUg0sBA?= =?us-ascii?q?YU5hRBdAYF2LgM4AZp4glMDVAsBAwEBAQEBCAE3CgQBAYUHAoQhAiY4EwECB?= =?us-ascii?q?AEBAQEDAgMBAQEBBQEBBQEBAQIBAQUEFAEBAQEBAQEBCRQHBgwFDhA7Bl4Ga?= =?us-ascii?q?IFPgWETCzQNQAEMAYV1AQEBAgESEQ8BBQgBARQkBAsJFAgCJgICMgcQDgYNB?= =?us-ascii?q?gIBARcHgmIBgmUDDSABAQ6SMo82AYE6AoofeoExgQGCCAEBBgQEgTcBE0FIg?= =?us-ascii?q?jcYXIFbAwYJAYEGLAGDEIMDVodeN4FVRIE8D4YVAgOCKoJNgmWXVyIZGIE0g?= =?us-ascii?q?TQHCJF1rXg0B4ISgToFgTUGC4k/lEwGFC6Dc4wshiiRa5QCglONE48ehRAgh?= =?us-ascii?q?G8CBAIEBQIOAQEGgXiBfk0kT4I1AQEyTgECAQINAQICAwECAQIJAQECjjaBD?= =?us-ascii?q?QEIgkOFFIVLQjI4AgYBCgEBAwmHJopJAQE?=
IronPort-PHdr: A9a23:qPDUehNVMRINr1EbUGsl6ncLWUAX0o4cdiYZ6Zsi3rRJdKnrv5HvJ 1fW6vgliljVFZ7a5PRJh6uz0ejgVGUM7IzHvCUEd5pBBBMAgN8dygonBsPNAEbnLfnsOio9G skKVFJs83yhd0ZPH8OrfFzO5HOo5CMUGhLxOBAzKummcrM=
IronPort-Data: A9a23:jCxmjqyH6txVJNtry3V6t+drwCrEfRIJ4+MujC+fZmUNrF6WrkVVy GofCDjQOfmMN2OjfNgkbo2x9k4FsMLRxtFlSVFp/FhgHilAwSbn6Xt1DatQ0we6dJCroJdPt p1GAjX4BJlvCCKa+n9BC5C5xZVG/fjgqoHUVaiVYkideSc+EH170Uk7yrZi6mJVqYHR7z2l6 YuaT/L3ZQfNNw5cagr4PIra9XuDFNyr0N8plgRWicJj5TcypFFJZH4rHpxdGlOjKmVi8k5Wc M6YpF2x1juxEx7AkbpJmJ6jGqEBaua60QRjFhO6VoD66iWuqBDe3Y4jH+Mfc0Fl0gmtkopf1 NoO7c2/Ryoma/ikdOQ1C3G0EgllOLFevrLXKnj5v9aa0kvGdHXh2bNiASnaP6VBp70xUD4Ir KNGbm5XBvyAr7reLLaTSuRqhYIpLdPoPIQbqFl7zC2fA+wvXJbDRKvH/5lU0V/cg+gXQ6aDO pVAOGIHgBLoRRZjAkUzOaMFsvrxrFvuVTAHkk2RjP9ii4TU5FYoi+G2YIu9lsaxbd5en1qEj mPL42q/BQsVXOFz0hLcrynp17CKxHylHdxIUqO9sPUsjkea22oTDxMbTx23rJFVl3JSRfpHA FUX4Cwc9JQW+RaFUta+B0y3rlOL60t0t8VrL8U27wSEy6zx6gmfB3QZQjMpVDDAnJNtLdDN/ gLR9+4FFQCDo5XIECjMp+z8QSeaaHREdDdqiTosF1Ndi+QPtr3fmTrjY75e/EOd14CuXGCvh mnV8m1g3fMNiIgAkauh9E3BgzWiq4KPQgNdCuTrsoCNsF0RiG2NPdfABb3nARBod9rxor6p5 ylspiRmxLpSZaxhbhClTuQXB62O7P2YKjDailMHN8B/q2r9pib9JdgMvGwWyKJV3iAsJ2KBj Kj75lo52XOvFCH1NcebnqruWp91lfK8fTgbfqyMN4QeCnSOSON31Hs3PhfLjzGFfLkEnawiJ YyQccu3RXgdE79szCewSPwb3KM5rh3SNkuMLa0XOy+PiOLEDFbMEO9tGALXMogRsfPVyC2Io o03H5bblH13DrakCgGJqtF7ELz/BSVhbbjstddtf/KOSiI/XjlJ5wn5m+1xIuSIXs19y4/1w 51KchQBmQSl2iGfd1nih7IKQOqHYKuTZEkTZUQEVWtEEVB6CWp2xKtAJZYxY5c98+lvkax9Q /UfIprSGfVTDDrd8ikbbZ7zoZYkeBny3VCCOC+sYT4eeZ98RlWVq4G+IVa1rHEDXnitqM8zg 7y8zQeFE5ANcARVCpqEYvyYyV7s72MWn/h/XheTL9QKIBfs/YFmJjbflPgyJ81QexzPyiHDi FSNAAteq/PEvok199fEn+aIot7xQed5G0NbGUjd7Kq3bHWLoDD8nNUYCOvRJGLTTmL5/qmmd N559fCkPa1VhktOvqp9D61vk/A06ezvkLkGnA5qK3PGMgawAbR6L3jahsRCu/EfxrJdvgfqC EuD9sMAYueSPd/9VlMBLwpjYP6KyPcUnTff97I5LRyitiNw+bOGV2RUPgWN0XAMcuEqbdl9m epx6tQL7wGfiwYxNorUhC5j8WnRfGcLVL8qt81HDYK32BAnzEpOPc7VBiPsu8vdMogXdxh1Z 2bL2u+c3fJCwwzJNXQpHGXL3e1TiI5ItB0TlA0OIFGAm9zkgP4r3UQNoGptEVkPlk1Kg7BpJ 2xmF0xpPqHSrT1ms85OAjK3EAZbCRzFp0H8xjPlToECo5VEi4AVEFAABA==
IronPort-HdrOrdr: A9a23:2fDqO6kK6OwO5Fh9ZODgKYWHwSbpDfJM3DAbv31ZSRFFG/Fw9v rCoBx4vSWftN9/YhAdcLy7V5VoIkmxyXcd2+B4VotKNzOHhILHFu9f0bc=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.90,168,1643670000"; d="scan'208";a="168557190"
Received: from 153-97-176-62.vm.c.fraunhofer.de (HELO smtp.exch.fraunhofer.de) ([153.97.176.62]) by mail-mtaF25.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 Mar 2022 22:49:46 +0100
Received: from XCH-HYBRID-02.ads.fraunhofer.de (10.225.8.59) by XCH-HYBRID-01.ads.fraunhofer.de (10.225.8.57) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.15; Wed, 9 Mar 2022 22:49:45 +0100
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (104.47.12.59) by XCH-HYBRID-02.ads.fraunhofer.de (10.225.8.59) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.15 via Frontend Transport; Wed, 9 Mar 2022 22:49:45 +0100
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jHpLer1z4f27IMXyXagaIVJHKftL3GTEgR2BmTsuYA/Eym43kqTa5mjW1CneyVoAY2DFi33a5x0oXDuj5uCUEguf0Gm5bn8AWmdZ/dpzDrbvkTKHE6lWXDQqRjKDrHCHIDlEGAcl6eVlQ4ASGYo8vnIwszsohb1DrVtOsYP0OLvudTyzK4n8vcaVLxhYKcd8mcqYGAiiyBCC3gEWRI3X6v1VFYu3aUdJdeswSzT5IHJnD2e+Nj1qW/LCLhTPhqQoZ7sgDtA7iw8+ZhfkB3LDxtVxbVg7fdyWJ3aoYA/7O/BP2NTifDtcxS22pX3dVwuebpbUIOm0R/eN+/mcg55WDA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=HPUI10d2n1KhOs6qkqltfzXOejlekdbchb/0X67lSS0=; b=jcNtMKZfQlItZDICg4EQ8wlXqnjS6HG1AeXHyssxyZI43T5NO16wqyxzhJ1BdD6gVzt0ikt03SOU/4BC7ZDOziShJtBUm5eHaUJ/N8GEpe7B1Sm9XCemN5LZAtWXTtv9m/PZili2n0ZqIhnKLZzsc27YOrKCTeBv1nE586EFwdwJ5A1RNIb6Yzl0gqAF6ilJ8QP5dtXS6XE3iQ5JHLlgHvjS/OxtVh9wlOzMiW3i7aFwAVDsGM9jFuDLEe7QBOrG/Gyb110WZaEWovMaTxEDAMzsECNc/1APTt3PRA2M5wQnyxWbE1BDvivtZTg5BKkI1xJp6QTTbg4aP0Bh2Zm19g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=sit.fraunhofer.de; dmarc=pass action=none header.from=sit.fraunhofer.de; dkim=pass header.d=sit.fraunhofer.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fraunhofer.onmicrosoft.com; s=selector2-fraunhofer-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HPUI10d2n1KhOs6qkqltfzXOejlekdbchb/0X67lSS0=; b=XeQlKegPgosxWyvZKTZDz66wNxazqw+WVxdMEIKnQYs2kbHryvZSVxH4tHlyxMrLsh+vbYJQ8+bDu489UVmkeFEts2K5Mv/Z3n+t0NNmbY1KBL1Q8mMODXZaU1xJxjvFDbudARap6wywpqtpG+w0CJ7a/w/+6PmfGnCE8czAt/E=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=sit.fraunhofer.de;
Received: from DU2P194MB1709.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:276::9) by DB6P194MB0087.EURP194.PROD.OUTLOOK.COM (2603:10a6:4:c5::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.16; Wed, 9 Mar 2022 21:49:39 +0000
Received: from DU2P194MB1709.EURP194.PROD.OUTLOOK.COM ([fe80::ec87:f3dc:70f7:2421]) by DU2P194MB1709.EURP194.PROD.OUTLOOK.COM ([fe80::ec87:f3dc:70f7:2421%5]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022 21:49:39 +0000
Message-ID: <2f81748d-4e80-55f5-77c4-0b87b91c25e1@sit.fraunhofer.de>
Date: Wed, 9 Mar 2022 22:49:34 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0
Content-Language: en-US
To: <scitt@ietf.org>
References: <CAN8C-_K9KBg2DhKOHUf8EMXo5wmTnrEc011e3Q7Y8zFOJsZ-1Q@mail.gmail.com>
From: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
In-Reply-To: <CAN8C-_K9KBg2DhKOHUf8EMXo5wmTnrEc011e3Q7Y8zFOJsZ-1Q@mail.gmail.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: AS8PR04CA0094.eurprd04.prod.outlook.com (2603:10a6:20b:31e::9) To DU2P194MB1709.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:276::9)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 1fadcab8-68eb-48e0-f42f-08da0216b60b
X-MS-TrafficTypeDiagnostic: DB6P194MB0087:EE_
X-Microsoft-Antispam-PRVS: <DB6P194MB0087759AE1A9F53505B7AD19A80A9@DB6P194MB0087.EURP194.PROD.OUTLOOK.COM>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: UyLlrQ0nh8mvntREjZFz9dpfWtk/oXZj2EZZqLV5PaYYTjC+b16Yx4g0FYqMBi6kItjCnP2ZXHEPNaOT5Y4nC5uNvgvqOckRjX2cpthOgVWJEgoaJ2ZL1pc0OUdKAeY6HO3s8uEnHa8ibtaaFAPFGpRyy1MyvIcTYvkFfZgW8IK4xT5C83xuTtVBP2InO9Ch7rilNXsIV2Pd1tYjANkuyDhHQnQsRgsVpDyvOh+HyYJ4hY1/P41HDthv33Z6tbSlufjV086I2i01+U5DqlVWb+kySWo6osXfmXzTDzV58RiUvs/yvPOLsVo0pOfIIdHV8QQ1kG6hMRfJU6+pnDgfPY6tvw4mzM/h6hFzXMenIYrhqrGCKabOfG3jeVRVVApoQ7amzLC2oliuMXaAkigJJGxt13/rnYTEPFryW+6XG8l7sGzLZFvIOX9nj1fahGNF6oaN12dqZUgYErThZq/R8itPH/s+umIY9ZW0HKBgsPZdPiyiXkQWuHZfVTu1TII1Rsjq+A7XiDZIrKH2B7BrCYNsohHJJPUQqx4oA5gIWIuVWb2/A/tctCn9ZgfkwigMSFJ3LPrSC9DzP1+i4MnHueSI8ceg6N+8biO6iqjgitwPzZw8PCdX8tBnv6DFBeXXSjgxgQkfu51UgGcPssnkJIlDQTVTOZAbA9M+x0Yl4e/1GSDFtfEYCJx7D5hUWpB0hoYJzOxv9mRwAiQbPX57+8u3IzezGftr38I8C/ASzNaAOHonNsIzusLgh3s3z7J8tqpnGPDYu12MYUWUBcbC3VsKJuXofurCjUMPi/a2kSAg8hu4PCJrmikVvqO8EjXZqjYP8O1pQN6Wl3drDKhlP+FnQLPpGvFO8OWnNrn0a8Vc8P6oRZln2eNoPMtXAZi8
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:DU2P194MB1709.EURP194.PROD.OUTLOOK.COM; PTR:; CAT:NONE;  SFS:(13230001)(366004)(6506007)(2906002)(2616005)(186003)(6916009)(316002)(26005)(6666004)(82960400001)(6512007)(52116002)(38350700002)(38100700002)(86362001)(508600001)(44832011)(6486002)(966005)(83380400001)(5660300002)(31686004)(8676002)(8936002)(66556008)(66476007)(66946007)(31696002)(45980500001)(43740500002); DIR:OUT; SFP:1102; 
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?NU0zcDhmWkZwSllaMjZKNjg2cFQ3Q0R2ZXRmc1U2QmF3WjBNeUVQWHlMRUtZ?= =?utf-8?B?NEFQUmJmZ01ub0t3U2poNExTbGpxZHhRTjQ5UURQeXVtMWVrRjRXdWpPV1Z1?= =?utf-8?B?cjJtNXRYMUx0TFRkMGI3bGtpaVk3QjRDcFVPbXJuSnIrWUd0YnIwd01tOVox?= =?utf-8?B?citBangvSGZRNncybUtFWFliTithUnE1ZnRCZ2FQc1EvNHFOWlRXMUVvYUFJ?= =?utf-8?B?Y2VRek42MWQ5UjZYUzlHQ3RkTm9hTkVSRGZFN2JzMUduSkp3eFFPWGRjRGdq?= =?utf-8?B?ZGttRkR6RnYrcUgrcFpFTk1VbTIwaWk5SkpWcGR0MEdrbXlGR2Q2aG9zZjhC?= =?utf-8?B?R0txS2FVY0hEZktnSnlUUUpnbllWa3EzRjUyOEZvS3YwODJCQUdXTlJUU2kr?= =?utf-8?B?eGVyMU1JSkgwZTBJYU8xcWVBNmo0TWJBOGtkaUtlRjBEWSt6TGdibmdiUGtx?= =?utf-8?B?S0lOK2JXcSs0MHl6amRBZVJrdTAzVG0yQnhtbTJLaWwzZFJwOE5DOU5nd0V4?= =?utf-8?B?YkhtYW15eWhIM1lYdTduRGRRZHV6SVpwTndqdTd5K2oyQnhvbndSbXZUZytw?= =?utf-8?B?ME9kVlBLampoZHB3TmtIZXBEaVNSdDVKWXpEamRNODlWZXVIZUJpUlo2V2p2?= =?utf-8?B?NU9qVGVEbFpHQzJ0QnAvc3F2ZDVnM1FuUDBwV2JTMGF2VDZwVDhxdVVJb3pv?= =?utf-8?B?TXM1NTZpNWxwMWpYeVRPNTNPRlRJRERNRlZhQ2NmalhJT1BmdDQ4akVGUUZn?= =?utf-8?B?MkMwUWdFY1hsK3p4YTMxYThtYXphNW5vcjdjMzk2NHNPSjlaSUdRVExuQVZC?= =?utf-8?B?YTl6QUg5c3JaREZSc05EeTFwTzlTU3dURG1zZDVzbC8zRHFEZHFRMjNCMk0y?= =?utf-8?B?TVhVNFhBM2hMK2xHSk5KemhQRm1iYlJReHZjdHBUZlJFM1EvbEtnaHl0UW5n?= =?utf-8?B?MVRnTlpwUDBKM0RldlFObTlxMzFmNGJQSWZmWll3eVRQZndzR2RsZVRyOUp6?= =?utf-8?B?MWQ0eDd6ZEc4MmlDNG9TV3pEYnZjdlRvOUZxQkJkRmVRUWZJQjh2YmRuc3hz?= =?utf-8?B?dXpHU0lqUUZEdXRFTkMrdmZvUFYxb004K1FJZUlZZnMvM3RoMkJGYStIbDRX?= =?utf-8?B?VUhkclRJV1NGWU9vR0YwbnhUTFF2a0N0aCs1aWora2d0eGg4K2xWUExab1hz?= =?utf-8?B?R09VMGQzRDltczFhY0xnRXczYzA3dzEwOWdsOWt6T0ZJVDBJVWhuTUpNb2pY?= =?utf-8?B?blY3dStUM1BNQStVN2Jja0pMaDhwbnBNb0tUaHpYUXFrenJCSmU2QVRKMTll?= =?utf-8?B?VjlxS3JQcnR4eDE2SURiTC8yRC9uVHRhQStuZHFmWDRoQnBaK2IxMExaZUlX?= =?utf-8?B?ZFdBTTRIVFNKSGRYZkhlelNUck5sOTlEY0FLTFdsSXg0Vi82M0J3NFRocnhz?= =?utf-8?B?RnlVUm5VUjFyZ252SEVyNWdnbE90QzEyOVRRN0pBWHc1V0NXMmpqaXE2U3Jm?= =?utf-8?B?cVpPNnlGS3AwMDdXaU1uc2hHUkdteHFPMkVTOXFQeG9LYUp4Skt4cmlpdXcy?= =?utf-8?B?Qlp3TEE0NHgxTDJ6VTBYT1JFdTVDOU1RWTlxOWpxZzkxcnhrSkxXUHlmbFdu?= =?utf-8?B?ZFI0bzBmbkZxV0p6Q3V2RkhURVQ1WEdYckdXVVh6ZVl5NHdsMG96TjBld1lD?= =?utf-8?B?NnJnMURJYUszNHdVVFQxanZ4Ukw0MkFGL1BzQmY3TXdQL2NFWUpEaUFXcU55?= =?utf-8?B?VTN3b0RMbDdPekJMOGdDQmtnd3Bpbmp4ZTdtZnNYQ25NOVFsblJDdzl6OEor?= =?utf-8?B?QmpwdXNFNDRObmJlYUtBekdPVmlWL0hvQkVpMWxMU25uWjgwVnZ2MFR6L0Vv?= =?utf-8?B?WFhOWVY1bXpDU0h1akRRT3Z5TVZjZEdtaThibjJYWlcwTDhWTUVUeEkyV2E0?= =?utf-8?B?c1I1NitMclRUK2ordFZlN1pmek9SNHJuazluWi9JQU5lK0E2azEza1pzMkdh?= =?utf-8?B?cHFoZUVYZHJoNkF5cjVDeUFCSUs3NEZ6QWVEOWk2Tk15SHI1K2RBZU1xckta?= =?utf-8?B?WEdTQklYUExyRGtkdlRpbUtKQXVaam5vWUNMQXdtWmVjZytUS1dIWXRvL3dv?= =?utf-8?B?MG02N3pQOEk3eHV6TE1HV0ZFTjBrdWtyZ2w5N3JJVlFuc2hZcFIzZWZybjN6?= =?utf-8?B?NklKbHlhUzVoTjZCMHpReEVCSVl6TmRDSStmek1DempNcUV1bi9BeFlmRGll?= =?utf-8?B?ZmpieWpIK2o5a3N2SkZ3TzJ3RXRnPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 1fadcab8-68eb-48e0-f42f-08da0216b60b
X-MS-Exchange-CrossTenant-AuthSource: DU2P194MB1709.EURP194.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 21:49:39.4369 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f930300c-c97d-4019-be03-add650a171c4
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: mfhC9wBgcaKE/xePMgGGOk8bKEfMH4dL7vVqbhx4z7fQdphbc5ZPGivAULP7M8PypXXB9VaHVaDFkF8XiBQug/I6ayKg7kQk58DJPiOAuRw=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6P194MB0087
X-OriginatorOrg: sit.fraunhofer.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/FblY3IT9MWerHC68s5V7qphdUIw>
Subject: [SCITT] Welcome to the SCITT list
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Mar 2022 21:50:00 -0000

Hello global supply chain enthusiasts,

as a quick recap, the purpose of this list is stated in its initial 
message here:

> https://mailarchive.ietf.org/arch/msg/scitt/a7K7zIKLe-pZnsE1lyz85iEiVSI/

Kay already announced that weekly recurring discussions on all topics 
about Supply Chain Integrity, Transparency, and Trust happen Mondays 4pm 
UTC, currently. Details on how to join these are in her message can be 
found here:

> https://mailarchive.ietf.org/arch/msg/scitt/NgkcZAMgEWQUNNpigx2KXYTGPTk/

Now - there has been some initial work on how suitable IETF buildings
blocks could be used in the SCITT context. As a result, there are 
currently two I-Ds in the SCITT space":

> https://datatracker.ietf.org/doc/draft-birkholz-scitt-architecture/

and

> https://datatracker.ietf.org/doc/draft-birkholz-scitt-receipts/

Both of them reflect work that happens live on github in an
IETF-minded github organization:

> https://github.com/ietf-scitt

Next, we'll request secdispatch agenda time for the two I-Ds mentioned 
above and will see how that goes. Please expect cross-posts between 
secdispatch@ietf.org and scitt@ietf.org.

Independently, well... this is the place. If you'd like to chime in, 
have an opinion of what is feasible or not for SCITT, how that clashes 
with the highlighted proposals or not, and how to build resilient and 
useful solutions for SCITT in the IETF space, please voice your point of 
view here.

Viele Grüße,

Henk


p.s. if you feel that this message or one of the I-Ds highlighted is 
interesting to your IETF WG, please feel free to relay or cross-post.


From nobody Wed Mar  9 14:39:52 2022
Return-Path: <henk.birkholz@sit.fraunhofer.de>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A81D83A10E2; Wed,  9 Mar 2022 14:39:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level: 
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=fraunhofer.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cdUWkXvBE-gt; Wed,  9 Mar 2022 14:39:39 -0800 (PST)
Received: from mail-edgeKA27.fraunhofer.de (mail-edgeka27.fraunhofer.de [153.96.1.27]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 515503A10E5; Wed,  9 Mar 2022 14:39:35 -0800 (PST)
IronPort-SDR: hJq0STXYpMQsY8JSUW36Sr+74J97vL8ips9AnFFLg7Gw8iFopCwfFSfiumbkWHwbsiWacGKjDO 0O5qk87w8TE8auJEiKWmmfmHfZpy6jGnu3NUpilCjaVZ96aI+/19QrA+CB/iNNkwuFwHTH2F4r 2FoVoNYNnw2mCLOaN0ENwER7D9En9MrLma9GAbSsJbT66N2qA2W0/y0m7ylW8GRfeDDMT5uIx6 3qU/VS02nvBDzh++h8okQMSaJPR+oXntcrw/7EqYWaD4om5qHqCsdho1sDQpnCL235VFRdzEKa aWQ=
X-IPAS-Result: =?us-ascii?q?A2GqDgAHLCli/xoBYJlaHgEBCxIMQIFPCwKCJn6BVYRVj?= =?us-ascii?q?haCVC4DmzGBLhSBEQMYMQsLAQEBAQEBAQEBCAEqCwwEAQEDBIQ7RQKEJCY2B?= =?us-ascii?q?w4BAgQBAQEBAwIDAQEBAQUBAQYBAQEBAQEFBAICgRiFLzkNQAEBBAsBgwFNO?= =?us-ascii?q?wEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQUCQUcMMQEBA?= =?us-ascii?q?QECAQEBIQ8BBQgBASwMBAsJFAYCAiYCAicLFw4GAQwGAgEBgwABgmUDDTCSO?= =?us-ascii?q?JsSeoExgQGCCAEBBgQEgTcBE0FIgjcYXIFbAwYJAYEGLAGDEIoYgR83gVVEg?= =?us-ascii?q?RUnD4JEMIEpGgGBXQEBA4Ejg1SCZZV+gS8nA1MURwsfE4EUCwMDOpFhKo1vn?= =?us-ascii?q?3M0B4ISgToFgTUGC4k/lEwGFC6Dc4wshiiQe3BDkz+CUyCMc5ROAYRuAgQCB?= =?us-ascii?q?AUCDgiBaAiCB00kT4JpURkPjiAXg1uFFIVJAnQCNgIGAQoBAQMJjWItgRotg?= =?us-ascii?q?hkBAQ?=
IronPort-PHdr: A9a23:RCfXBRxh5QtOXRjXCzPRngc9DxPP8534PQ8Qv5wgjb8GMqGu5I/rM 0GX4/JxxETIUoPW57Mh6aLWvqnsVHZG7cOHt3YPI5BJXgUO3MMRmQFoCcWZCEr9efjtaSFyH MlLWFJ/uX+hNk0AA8fiIVPIq2C07TkcFw+5OQcmTtk=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.90,168,1643670000"; d="scan'208";a="40306610"
Received: from mail-mtaka26.fraunhofer.de ([153.96.1.26]) by mail-edgeKA27.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 Mar 2022 23:39:32 +0100
IronPort-SDR: KeUaWdiq9e/hX+D3GWn58CWeU6FdlRoreWWPxGX6lfN7oITogY1tkEqO0V9EX7mnapn7w51VxW /jtMJpzFboADR4FKqN+M1z8YhqxleWWvA=
X-IPAS-Result: =?us-ascii?q?A0BwAABILClimH+zYZlaHQEBAQEJARIBBQUBQAmBPwYBC?= =?us-ascii?q?wEBgVBWflkmVoRUg0sBAYU5hRBdAYF2LgM4AZp4gS4UgREDVAsBAwEBAQEBC?= =?us-ascii?q?AEqCwwEAQGEQkUChCECJjYHDgECBAEBAQEDAgMBAQEBBQEBBQEBAQIBAQUEF?= =?us-ascii?q?AEBAQEBAQEBCRQHBgwTEDsGXgZogU+BYRMLNA1AAQEECwGFcAEBAQECAQEBE?= =?us-ascii?q?BEPAQUIAQEUGAwECwkUBgICJgICJwsHEA4GAQwGAgEBHoJiAYJlAw0gAQEOk?= =?us-ascii?q?jmPNgGBOgKKH3qBMYEBgggBAQYEBIE3ARNBSII3GFyBWwMGCQGBBiwBgxCKG?= =?us-ascii?q?IEfN4FVRIEVJw+CRDCBKRoBgV0BAQOBI4NUgmWVfoEvJwNTFEcLHxOBFAsDA?= =?us-ascii?q?zqRYSqNb59zNAeCEoE6BYE1BguJP5RMBhQug3OMLIYokHtwQ5M/glMgjHOUT?= =?us-ascii?q?gGEbgIEAgQFAg4BAQaBaAiCBk0kT4JpTgECAQINAQICAwECAQIJAQECjh0XA?= =?us-ascii?q?oNZhRSFSQJCMgI2AgYBCgEBAwmNYi2BGi2CGQEB?=
IronPort-PHdr: A9a23:oxC2sBAmGj7v7z3nzo7+UyQVYBdPi9zP1kY95pkmjudIdaKut9TnM VfE7PpgxFnOQc3A6v1ChuaX1sKoWWEJ7Zub9nxXdptKWkwJjMwMlFkmB8iIQUTwMP/taXk8G 8JPHF9o9n22Kw5bAsH7MkbTvju89zcPHBX4OwdvYOj4Sebv
IronPort-Data: A9a23:bRO18KtyNrScymCsMJTygygB/OfnVDdYMUV32f8akzHdYApBsoF/q tZmKTzUMveIZ2anft8nbom19RtUvJ7QnIBjSlc6+C4wE3hBgMeUXt7xwmUckM+xwm0vaGo9s q3yv/GZdJhcokf0/0zrb/69xZVF/fngqoDUUYYoAQgsA148IMsdoUg7wbRh2dY52YPR7z6l4 LseneWPYDdJ5BYpagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDf3Zw0/Df2VhNrXSq 9AvbF2O1jixEx8FUrtJm1tgG6EAaua60QOm0hK6V0U+6/RPjnRa70o1CBYTQURFtGrOrttf8 8livI73e0BxFYbFld1IBnG0EwkmVUFH0KTCPWD5vNyYzwvIaXLxxfVpAkwse4EVkgp1KTgTr rpJd3ZUMUHF3rjpqF64YrEEasALLMTtP8UVu2tjzTbdH949QIyFTb/D+NlY2zk9nIZCEJ4yY uJAMms0Mk2QOnWjPH86F8hhts2H3EPGdgRHrAO+t6YT3zHqmVkZPL/FaoOOI4faFK25hH2wv W/N82XiGhgGP9y3yDeZ/DSrnOCntTjwWZ4OPLy16vAsh0ecrlH/EzVPCAD+8Kb80xHvHosFd AoK/2wl66Yo/VGtTt7zUgf+rHPsUgMgt8R4EP8Ft0a8wYTv/ymQFC82CWZqQ9UrjZpjLdA17 WOhk9TsDD1plbSaT3OB67uZxQ9e3wBJdgfuggdZFWM4D8nfTJIb00uVH4c4eEKhpoypSGioq 9yfhHJm390uYdg3O7KT0X2vvt5BjsGUFUtkuUCOATPgt1kmIpCgIYfu50LS8PBAK4iUVB+Ns RDoevRyDshTXflhdwTXG43h+Y1FAd7eaFUwZnY0TvEcG8yFoSLLQGypyGgWyL1VGsgFYyT1R 0TYpBlc4pReVFPzM/MpM9/pVZxykfS9fTgAahwyRoQTCnSWXFDelByCmWbKgDiFfLUEzvBkZ s/BLa5A815GUf05nFJauNvxIZdxn3tnnjOCLXwK5xiqzKaFb36YUv8LN0GVZeAk6qyfpgjJ4 b5i2ziilH1ivBnFSnCOqeY7dAlWRVBmVcGeg5EGLYarf1s5cEl/UKW56e16JORYc1F9y72gE oeVABEIkTISRBTvdG23V5yUQOi2DMgl8i5jY3BE0JTB8yFLXLtDJZw3L/MfFYTLPsQ6pRKtZ /VaKciGHNpVTTHLp2YUYZXn9dMwbxW3wwyUNjejYD8xcoQmSwGQoo3oeQ7m9S8vCCurtJJi8 uP6iV6BGcIOF1Z4EcLbSPOz1Ffv73ITr+JFWReaKNdkfkixopNhLDb8j6NsLsxVcUfDyzKW2 hy4GxAdoeWR8YY5/MOQ2vKfrpvvHfF3A0xaGGfW9/C6OHCCrGakxIZBVseOfCzcDT+lpv/9O L8Nl/ylaa8JhldHtYZ4Ao1H96Nm6ou9vaJewyRlAG7PMQahBIRgFX/aj8NBgatAm+1CsgysV 0PTodRXNOnbOM7hF1JNdgMpYv7ZjqMPnyXKq/klK0W86jV+4byHVktfJV+AhXUFfrdyNYokx 8YnudIXslDu1EB1b4ze1i0EpX6RKnEgUrk8ss1ICoHcjAd2mEpJZobRC3Or7ZzTOc9ANFImf m2diKbY3O8OnxeZNitsUCGSjK8E38tIphUMxxkMPV2UnNrCiPItmhFcqGxlQgNQxxRB8uRyJ mkyaxwrf/rTpW8wiZgRRX2oFiFAGAadph77xWwPmTCLVEKvTGHMcDAwNOvlEJr1KI6AkuW3J I2l9Vs=
IronPort-HdrOrdr: A9a23:Y4ZIBaNUh00FtsBcTyD155DYdb4zR+YMi2TDiHofdfUFSKClfp 6V8cjztSWUtN9jYgBHpTnmAtj9fZq8z+8J3WB1B9mftWbdyQ6Vxe1ZnPDfKnjbalfDH41mpN ZdmspFeb/N5DFB5K6QimnIcOrIguP3iJxA7d2usUuFJjsaDJ2IgT0JczpzXncGIDWvUvECZe WhD4d81nKdUEVSSv7+KmgOXuDFqdGOvJX6YSQeDxpizAWVlzun5JPzDhDdh34lInly6IZn1V KAvx3y562lvf3+4hjA11XL55ATvNf60NNMCOGFl8BQADTxjQSDYphnRtS5zXsIidDqzGxvvM jHoh8mMcg2w3TNflutqR+o4AXk2CZG0Q6U9XaoxV/Y5eDpTjMzDMRMwahDdAHC1kYmtNZglI pWwmOwrfNsfFz9tRW4w+KNewBhl0Kyr3Znu/UUlWZjXYwXb6IUhZAD/XlSDIwLEEvBmcwa+d FVfYDhDcttABOnhyizhBgt/DXsZAV/Iv6+eDlNhiTPuAIm3kyQzCMjtbgidzk7hdcAoqJ/lp f525RT5cFzp/AtHNBA7cc6ML2K4z/2MFvx2Fz7GyWTKEhAAQOIl6LK
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.90,168,1643670000"; d="scan'208";a="13936181"
Received: from 153-97-179-127.vm.c.fraunhofer.de (HELO smtp.exch.fraunhofer.de) ([153.97.179.127]) by mail-mtaKA26.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 Mar 2022 23:39:22 +0100
Received: from XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) by XCH-HYBRID-03.ads.fraunhofer.de (10.225.9.57) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.15; Wed, 9 Mar 2022 23:39:22 +0100
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (104.47.13.59) by XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.15 via Frontend Transport; Wed, 9 Mar 2022 23:39:22 +0100
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=RT6ujmRgT9JVxhxT+MP/7EZIbSKImgeyq7rcSIqYGZybCZlq0rT2X0TX4gq8JTiW75zpaSANuZnhx1wS4Ii0doaRgC62xbPniOSoC+t5qePENYQzFWWcZnsoUwLSsbHKbStNfmzG2H7e9nZN8zrbuIkKte6BkOkfO1RVgS/DZuTVTX/OdwPXnOe3dPrglm9Prja2HNrP7dTNtN5/LuUl7vcNXj3nSq8NWlGHHGvFWKjGscyZ+MpR/0COPwN+UNEyqYWNntWt+nD058RORN3d5zHG/RnC8kNxHaxrQ/8+MgHkB19Qy/Qx8Xu6JgOIOJMWIm14wMnX50jetre++j6I5A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=shRKD9HYUmiEBeXpUMZu3LA9uuQ3oR9fWy3D2x9ajx0=; b=bSPCBZ26PSWN88JpKgrd7omTzyYIuRVMuiERBf2Nwp6nj662iFzGL9aMAPDWg+9knRRNb+FiE9Z43r6Z45mFAC846E+NYjs9Uw6LwJSiVyCYv0Fjyehu4ABV7+do2CmTI99xP/KBmLEcsxsU+kjglXa/ZAro0UyXdLZmQIABdIBIm3NMk/8zUf7QHJPEsdwxXnrGnguNqzg+KOreupWtZzPc0Czw2K4yLvThgIzD+ORrMm4UXd4Ycv0BwLktA89PZv9vWQ1wA//G0PLZ29wbbSgcvgHMzmCFYdU4cU61nynr+huFQzSS6GiDDjssZzrDljq45fRRw2amUbInbR3kHw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=sit.fraunhofer.de; dmarc=pass action=none header.from=sit.fraunhofer.de; dkim=pass header.d=sit.fraunhofer.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fraunhofer.onmicrosoft.com; s=selector2-fraunhofer-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=shRKD9HYUmiEBeXpUMZu3LA9uuQ3oR9fWy3D2x9ajx0=; b=dJz7JH9sAis8lxbfela7UeOVOT5Hdla3jjTsCiF3LI25H6BRUmRYjAEn9U+zs+/63YM5QdayOaHGozl3YrM1Y6k9SUpkRYV68lrTMXfWfUpjPTeziZw+s6c9PFvtyxJ8gh7I4kHWYexbDp1SVLTBSDIR7laC/Ex2dkzvUqzu+2o=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=sit.fraunhofer.de;
Received: from DU2P194MB1709.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:276::9) by AM0P194MB0291.EURP194.PROD.OUTLOOK.COM (2603:10a6:208:62::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5038.16; Wed, 9 Mar 2022 22:39:20 +0000
Received: from DU2P194MB1709.EURP194.PROD.OUTLOOK.COM ([fe80::ec87:f3dc:70f7:2421]) by DU2P194MB1709.EURP194.PROD.OUTLOOK.COM ([fe80::ec87:f3dc:70f7:2421%5]) with mapi id 15.20.5038.027; Wed, 9 Mar 2022 22:39:20 +0000
Message-ID: <5b97a678-eba1-09c3-7e70-c71dd98db8a9@sit.fraunhofer.de>
Date: Wed, 9 Mar 2022 23:39:18 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0
Content-Language: en-US
To: <secdispatch@ietf.org>, <scitt@ietf.org>
References: <164583895227.24617.1939040203283436909@ietfa.amsl.com>
From: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
In-Reply-To: <164583895227.24617.1939040203283436909@ietfa.amsl.com>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: AM6P191CA0060.EURP191.PROD.OUTLOOK.COM (2603:10a6:209:7f::37) To DU2P194MB1709.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:276::9)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 2faac14b-59ee-4d38-406c-08da021da6fd
X-MS-TrafficTypeDiagnostic: AM0P194MB0291:EE_
X-Microsoft-Antispam-PRVS: <AM0P194MB0291E1B7E4F950828C7EF0C1A80A9@AM0P194MB0291.EURP194.PROD.OUTLOOK.COM>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:DU2P194MB1709.EURP194.PROD.OUTLOOK.COM; PTR:; CAT:NONE;  SFS:(13230001)(366004)(2616005)(52116002)(6512007)(5660300002)(38350700002)(38100700002)(31686004)(26005)(186003)(86362001)(316002)(6506007)(66574015)(31696002)(44832011)(53546011)(2906002)(66946007)(66476007)(966005)(66556008)(6486002)(83380400001)(8676002)(82960400001)(8936002)(508600001)(450100002)(45980500001)(43740500002); DIR:OUT; SFP:1102; 
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?M25HMW40SjQxSkdaMWtOTnVoZW5WMkJQMjlVeGdjMXd0VFBsMWlhYTdKdk82?= =?utf-8?B?ckVJN3V0NXZtWlBTRVdVaUFERlF2MGNSWWkwU2dXRmN1NFpBNnU2SkZTYzd4?= =?utf-8?B?clRSMjFLZmI4UVpHZENUYVhOUkVkeFpucnJHanROaW9DbGRxWHJKNHp5aVRL?= =?utf-8?B?bElrN09DMURKOXhTQ295bDMyZEtMWmtHcXJzZWxMRmEwb21aRHFld2Q1TE52?= =?utf-8?B?N3RCdTAyeHZPV3UybDgyYmcxaGtKZ2EzWTZRZGt2VStMeDM5OVJZR1lKMWZS?= =?utf-8?B?L3lFSXE5TDBKQUFGNXNYSzYzcW1hQlN1RnE4K05YRHZwQ2Q0U1BKd1FnQm9u?= =?utf-8?B?eVl1OHRSWHlGMkpCaE1VeTZiRjBJZFg0THNYUHFvYkNRUnpRcSt1V0hVbHlF?= =?utf-8?B?RW9qUnVId0c3bmpRci9HRnNjN2JuNUx5aFp1akZsek9QRFc1VDdqV1VmYXlP?= =?utf-8?B?NTR2dmFnMEhZSktzRWZhT1pBL2NBeDlzd1VZd1FEUXFlU0FKYlMxT0xqSUF3?= =?utf-8?B?YVp4eTRFSVYyVmFZQkRMR0Y3MjNBM2dONFZBa2lqQTUyWk1WeTN1WkRsVDFn?= =?utf-8?B?Mk5leTNtSzFNakJqTGpETXZsalVRU1lkR2dPd2wzVHl4K2RxeGFxZzB5eG5T?= =?utf-8?B?dmxOUVhCVkxDbW0yMmJScGpzSFl2NUJoYkdML25XR3V0UUczelhFNUloNGVn?= =?utf-8?B?WmVEK01hSE04b2E1YmpIeC9UOHVwTDBoeUhOeVlYNENyVDdnWTZBNkNxSEMw?= =?utf-8?B?dUEzM2huYTh2RWxGWVcweFp5VGFsQ2c3RG9WcmF3ckkxbWR6ek9ZY01VNXht?= =?utf-8?B?Q1krVW5BbVhqS0lKSEg1YlMxSjZ6dHRyMjdFWjlWalFuKytDMXk3cFJIK0Nn?= =?utf-8?B?S1lZT0tVTHJ2RVJhcTJZNlg1RytIdzdib3hJTk10UCt0VERnU1FidzN4L25R?= =?utf-8?B?WVR4Yk9FUXVPV2xWdzlWUEU1enFYbWpWbDVUQTMvdnIrTDB3SGI4bnBUMitx?= =?utf-8?B?MGFpQTQrM0NUZmtzRTBwSG1EdGxucHAvOS9nZTBzbkdycDJFNEMrT0lvMGty?= =?utf-8?B?MFE2TzJXTkxvZGQ4enhseG15SW1rclA4d3FTU3ZxTjhOMythdGtkMGJ2MklG?= =?utf-8?B?YnNIK2VYOUgxTisrMElCSTlCd2tyaWJyRWNRL0lla1BSaEhUNXovbytmcVc2?= =?utf-8?B?dEpJM3JGR3YvY05wL0FVVjBzZWtRVUNNZVY2MGVTRTNVaitMRzBnMmxTYitX?= =?utf-8?B?eE1uSEUrS1RyZStuQzB1Zk1wZzBPcXhXNjdwNGQ5UWdIMWN2bENpMWpqQ2o0?= =?utf-8?B?WnFwVTB1MW40Q0pHcFpRMGZzNE5EeWtTR1l6V3lvZzJjR2RSZFZ3RTVZYWtz?= =?utf-8?B?dEhIUU9Yek9FaW9XaWJnVzNkcThiSTdnQ3N3MGI5akJUbVY4QUlSRk1vd3J0?= =?utf-8?B?UmRjajQ3YUZxMWpBYUhlRlF1NVRPbUdjVWViNE5VcXJBbS9jWFV5Qmx6N2xE?= =?utf-8?B?bDNRV1NFZHVzMnRKb2ltdmpXanBoOHd4ZWNrUTN1REQ0N0JaNzdMLzVQTFJL?= =?utf-8?B?MG5DSkh1YW5YeU5JWmRKTUsvWE5IVDh5OS9TWlBYaHBESmgrL2kxM0U2dmQ0?= =?utf-8?B?YXRsY2ZmTXJFVVkramYvN3FPdDloc1hnTVhOUDVXMStuYnZNZ3pZdkJrdlNX?= =?utf-8?B?Tk5yN2lyR0NwbmV0Umc2bkRkK0RqTTh5Q0h1RHZyL05nb2lQZm43Vmo4N0dB?= =?utf-8?B?V3kvN00zZkNXbU10QmFkaDBzN2xsNW14REJqQkQ1Q3RhMWRRYTg5QU01ZXh5?= =?utf-8?B?bmVab3dGVExVbk1ZYVNKUC9ZcWptcFRzT0poZE81TFdQYXJPN2ZkbXlMWmtV?= =?utf-8?B?dE9lWFYvR3QzU3lvQmZjUGFRS1MrVnZGT2pyWTZ2cWFvODRNNnJFOFUzT3Y4?= =?utf-8?B?SW93U3kvSUhxcHhiNmh1aENhYlljeXlRdFAyMTJFMlhuOXNqVlVuT0R5aWMy?= =?utf-8?B?Nmh3UzgyYVNLT2U0RHY4eW4rWHpzM1J3N3dmVzVYUTdoR1NabklsbHZKSFZO?= =?utf-8?B?UjlTaHhwdlpkQmNZWkNYVVhmS1IraHppM1NmOFVCRVVoZHRaM0haWnBNdG1G?= =?utf-8?B?OEVFUStscisyUmJyZU5yM0RJUmFzME54REkyY0NiYWRKZU42bERCTHJFNVc2?= =?utf-8?B?SlBGQmFSTzdZUHg5RGN1Q3J5TzB5bjNGZmIyeVBhdWVXdk1xZWhyNVpYL3h5?= =?utf-8?B?Y3Rvd0FNUU5sUnpMd1ZncEdJNnNRPT0=?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 2faac14b-59ee-4d38-406c-08da021da6fd
X-MS-Exchange-CrossTenant-AuthSource: DU2P194MB1709.EURP194.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Mar 2022 22:39:20.6830 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f930300c-c97d-4019-be03-add650a171c4
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: lIBU62sho3pQggGYuDw0JqwDVNEe7Lt2ZMOUA9FvdBMPXK6zFgNbCbERd3Yr1Fc4PelBVbxp4rpTX7EdWInss6AKy9K+DG85b4jJMEayvl0=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0P194MB0291
X-OriginatorOrg: sit.fraunhofer.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/9ke0lxzOuLIFXMhvproNTHqnQzg>
Subject: [SCITT] Request for session at IETF 113
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Mar 2022 22:39:50 -0000

Hi secdispatch,
(hi scitt),

emerging work on the topic of Supply Chain Integrity, Transparency, 
Trust has taken some shape recently.

The work combines existing IETF building blocks to facilitate useful 
Internet-based support of global supply chain interoperability.

Current contributions focus on the definition of Transparency Services 
based on Internet technology (using CBOR/CDDL/COSE) to achieve 
unambiguous, scaleable, and resilient integration with common devops and 
secops requirements.

I'd like to request secdispatch agenda time for two documents that are 
currently submitted:
  > https://datatracker.ietf.org/doc/draft-birkholz-scitt-architecture/

and

> https://datatracker.ietf.org/doc/draft-birkholz-scitt-receipts/

These two contributions are in -00 state. Yet, they already address 
essential requirements, such as, air-gapped validation when being 
offline, integration of remote attestation, efficient and crypto-agile 
signing prescriptions for out-of-the-box interoperability, and - in 
essence - long-long-term guarantees in support of various types of 
supply chains requirements.

We’d be happy to present this emerging work in secdispatch with the goal 
of discussing whether it might fit into the IETF space and how to 
progress it together.

Viele Grüße,

Henk



On 26.02.22 02:29, "IETF Secretariat" wrote:
> Dear Mohit Sethi,
> 
> The session(s) that you have requested have been scheduled.
> Below is the scheduled session information followed by
> the original request.
> 
> 
>      secdispatch Session 1 (2:00 requested)
>      Tuesday, 22 March 2022, Afternoon Session II 1430-1630
>      Room Name: Grand Park Hall 3 size: 250
>      ---------------------------------------------
> 
> 
> iCalendar: https://datatracker.ietf.org/meeting/113/sessions/secdispatch.ics
> 
> Request Information:
> 
> 
> ---------------------------------------------------------
> Working Group Name: Security Dispatch
> Area Name: Security Area
> Session Requester: Mohit Sethi
> 
> 
> Number of Sessions: 1
> Length of Session(s):
> Number of Attendees: 200
> Conflicts to Avoid:
> 
>         
> 
> 
> People who must be present:
>    Benjamin Kaduk
>    Kathleen Moriarty
>    Mohit Sethi
>    Paul Wouters
>    Richard Barnes
>    Roman Danyliw
> 
> Resources Requested:
> 
> Special Requests:
>    Please avoid conflict with any Security related BoF.
> ---------------------------------------------------------
> 
> 
> _______________________________________________
> Secdispatch mailing list
> Secdispatch@ietf.org
> https://www.ietf.org/mailman/listinfo/secdispatch


From nobody Thu Mar 10 05:17:24 2022
Return-Path: <mprorock@mesur.io>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9EE043A0064 for <scitt@ietfa.amsl.com>; Thu, 10 Mar 2022 05:17:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.907
X-Spam-Level: 
X-Spam-Status: No, score=-1.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mesur-io.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zXAI6Tid1E4S for <scitt@ietfa.amsl.com>; Thu, 10 Mar 2022 05:17:16 -0800 (PST)
Received: from mail-vs1-xe2f.google.com (mail-vs1-xe2f.google.com [IPv6:2607:f8b0:4864:20::e2f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D6A703A0028 for <scitt@ietf.org>; Thu, 10 Mar 2022 05:17:15 -0800 (PST)
Received: by mail-vs1-xe2f.google.com with SMTP id u124so5840256vsb.10 for <scitt@ietf.org>; Thu, 10 Mar 2022 05:17:15 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mesur-io.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=HnwUgp510EXk5Mn1rvsAHIxl3/xxo/99Xmnuq0nGe+o=; b=K8GPNUlOkPIMMV42JtZjPuU7QRA4H4Zqw1+LFFF+olTIRumbDiygx6DnnNrMva2LqM GBP6Egy4Bi735nw0qt0hjbOhooR3ENHKIATLnAIlOQpG5LHpkegw/Br/x/oedZWbXYOA v+llfnN+aZ49Qagr71hn5H2cuuMDpxrybpJXdVcG9EywiKsw1/jQcSfT6JCct4uNKuMs ZBb89ewpu2Xar9IIQPJYPvNWLYQsI0ilAgIVwf75/nGnQYMMfoOz1qmfOVV/7iLRMFvb 0/dMkYnwnJygArqHoiFfHDvj7nrt1p15s9nnI/b6XRSsJi31wYThLLiviL5G39j0E4r7 wUPg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=HnwUgp510EXk5Mn1rvsAHIxl3/xxo/99Xmnuq0nGe+o=; b=xQiWSSDCLZY0smuhY0boApl4aofLJ0DgJ/4JcN0JVD9TIBbZRSjXkWpGCbF+sY762c 6zCyuYIDREW2m7bXGbVrtM/nN3BViewzl4AFtt+Udrx3dwspgY5RuTUdTMlJwdRWA3Ds GBhyuAaYP0JJGR4kbG8tzaJsZw8ud7EWlub32oxgrd8+G6VdLzFvgc8sMwtNmGOmYI8F Too9KLPzblQdhK9pFPe5OD3gQ8OPll4J/m5jSas8D+J44cAFTGtenYqWxL+yEaqcsHyK ivVqHrFr3j9qF5Wvni2wzn0eintowTWH11G0dlrCRf5oYw994ZWulKCqCn1waz2Qm7h5 NGbw==
X-Gm-Message-State: AOAM533iwMEcTQZGHLX9aZrTQOEim5/0Co3yM5vTkkIOuyEqj1Iv80Zt Q1AflevmZ5Nrh/HDsRTCgjfByQuOG0mdIv2Hx+rd
X-Google-Smtp-Source: ABdhPJyyXXFio6tv2Hy2GMILsp3LjZ/jt9JyjguM0dXMuvt095bjRC3q2I1dO3cw2x5/G95wdhMY90Kda+uOux+IAV4=
X-Received: by 2002:a67:6f87:0:b0:322:79bc:2603 with SMTP id k129-20020a676f87000000b0032279bc2603mr2305226vsc.19.1646918234361; Thu, 10 Mar 2022 05:17:14 -0800 (PST)
MIME-Version: 1.0
References: <164583895227.24617.1939040203283436909@ietfa.amsl.com> <5b97a678-eba1-09c3-7e70-c71dd98db8a9@sit.fraunhofer.de>
In-Reply-To: <5b97a678-eba1-09c3-7e70-c71dd98db8a9@sit.fraunhofer.de>
From: Mike Prorock <mprorock@mesur.io>
Date: Thu, 10 Mar 2022 08:17:03 -0500
Message-ID: <CAGJKSNTwh9VoCkmMtuR72YcaVgpeCbGoLRgDWabWBsvVY3b2=Q@mail.gmail.com>
To: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Cc: secdispatch@ietf.org, scitt@ietf.org, Orie <orie@transmute.industries>
Content-Type: multipart/alternative; boundary="00000000000055711b05d9dd0856"
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/0TT9hCl_7qsK2cW-q40jORoovsE>
Subject: Re: [SCITT] Request for session at IETF 113
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2022 13:17:21 -0000

--00000000000055711b05d9dd0856
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Henk,
Thanks so much for sharing this out.  I would definitely be interested in
this topic.

Mike Prorock
CTO, Founder
https://mesur.io/



On Wed, Mar 9, 2022 at 5:39 PM Henk Birkholz <
henk.birkholz@sit.fraunhofer.de> wrote:

> Hi secdispatch,
> (hi scitt),
>
> emerging work on the topic of Supply Chain Integrity, Transparency,
> Trust has taken some shape recently.
>
> The work combines existing IETF building blocks to facilitate useful
> Internet-based support of global supply chain interoperability.
>
> Current contributions focus on the definition of Transparency Services
> based on Internet technology (using CBOR/CDDL/COSE) to achieve
> unambiguous, scaleable, and resilient integration with common devops and
> secops requirements.
>
> I'd like to request secdispatch agenda time for two documents that are
> currently submitted:
>   > https://datatracker.ietf.org/doc/draft-birkholz-scitt-architecture/
>
> and
>
> > https://datatracker.ietf.org/doc/draft-birkholz-scitt-receipts/
>
> These two contributions are in -00 state. Yet, they already address
> essential requirements, such as, air-gapped validation when being
> offline, integration of remote attestation, efficient and crypto-agile
> signing prescriptions for out-of-the-box interoperability, and - in
> essence - long-long-term guarantees in support of various types of
> supply chains requirements.
>
> We=E2=80=99d be happy to present this emerging work in secdispatch with t=
he goal
> of discussing whether it might fit into the IETF space and how to
> progress it together.
>
> Viele Gr=C3=BC=C3=9Fe,
>
> Henk
>
>
>
> On 26.02.22 02:29, "IETF Secretariat" wrote:
> > Dear Mohit Sethi,
> >
> > The session(s) that you have requested have been scheduled.
> > Below is the scheduled session information followed by
> > the original request.
> >
> >
> >      secdispatch Session 1 (2:00 requested)
> >      Tuesday, 22 March 2022, Afternoon Session II 1430-1630
> >      Room Name: Grand Park Hall 3 size: 250
> >      ---------------------------------------------
> >
> >
> > iCalendar:
> https://datatracker.ietf.org/meeting/113/sessions/secdispatch.ics
> >
> > Request Information:
> >
> >
> > ---------------------------------------------------------
> > Working Group Name: Security Dispatch
> > Area Name: Security Area
> > Session Requester: Mohit Sethi
> >
> >
> > Number of Sessions: 1
> > Length of Session(s):
> > Number of Attendees: 200
> > Conflicts to Avoid:
> >
> >
> >
> >
> > People who must be present:
> >    Benjamin Kaduk
> >    Kathleen Moriarty
> >    Mohit Sethi
> >    Paul Wouters
> >    Richard Barnes
> >    Roman Danyliw
> >
> > Resources Requested:
> >
> > Special Requests:
> >    Please avoid conflict with any Security related BoF.
> > ---------------------------------------------------------
> >
> >
> > _______________________________________________
> > Secdispatch mailing list
> > Secdispatch@ietf.org
> > https://www.ietf.org/mailman/listinfo/secdispatch
>
> --
> SCITT mailing list
> SCITT@ietf.org
> https://www.ietf.org/mailman/listinfo/scitt
>

--00000000000055711b05d9dd0856
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Henk,<div>Thanks so much for sharing this out.=C2=A0 I wou=
ld definitely be interested in this topic.</div><div><br clear=3D"all"><div=
><div dir=3D"ltr" class=3D"gmail_signature" data-smartmail=3D"gmail_signatu=
re"><div dir=3D"ltr">Mike Prorock<div>CTO, Founder</div><div><a href=3D"htt=
ps://mesur.io/" target=3D"_blank">https://mesur.io/</a></div><div><br></div=
></div></div></div><br></div></div><br><div class=3D"gmail_quote"><div dir=
=3D"ltr" class=3D"gmail_attr">On Wed, Mar 9, 2022 at 5:39 PM Henk Birkholz =
&lt;<a href=3D"mailto:henk.birkholz@sit.fraunhofer.de">henk.birkholz@sit.fr=
aunhofer.de</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=
=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding=
-left:1ex">Hi secdispatch,<br>
(hi scitt),<br>
<br>
emerging work on the topic of Supply Chain Integrity, Transparency, <br>
Trust has taken some shape recently.<br>
<br>
The work combines existing IETF building blocks to facilitate useful <br>
Internet-based support of global supply chain interoperability.<br>
<br>
Current contributions focus on the definition of Transparency Services <br>
based on Internet technology (using CBOR/CDDL/COSE) to achieve <br>
unambiguous, scaleable, and resilient integration with common devops and <b=
r>
secops requirements.<br>
<br>
I&#39;d like to request secdispatch agenda time for two documents that are =
<br>
currently submitted:<br>
=C2=A0 &gt; <a href=3D"https://datatracker.ietf.org/doc/draft-birkholz-scit=
t-architecture/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.i=
etf.org/doc/draft-birkholz-scitt-architecture/</a><br>
<br>
and<br>
<br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/draft-birkholz-scitt-recei=
pts/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/doc=
/draft-birkholz-scitt-receipts/</a><br>
<br>
These two contributions are in -00 state. Yet, they already address <br>
essential requirements, such as, air-gapped validation when being <br>
offline, integration of remote attestation, efficient and crypto-agile <br>
signing prescriptions for out-of-the-box interoperability, and - in <br>
essence - long-long-term guarantees in support of various types of <br>
supply chains requirements.<br>
<br>
We=E2=80=99d be happy to present this emerging work in secdispatch with the=
 goal <br>
of discussing whether it might fit into the IETF space and how to <br>
progress it together.<br>
<br>
Viele Gr=C3=BC=C3=9Fe,<br>
<br>
Henk<br>
<br>
<br>
<br>
On 26.02.22 02:29, &quot;IETF Secretariat&quot; wrote:<br>
&gt; Dear Mohit Sethi,<br>
&gt; <br>
&gt; The session(s) that you have requested have been scheduled.<br>
&gt; Below is the scheduled session information followed by<br>
&gt; the original request.<br>
&gt; <br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 secdispatch Session 1 (2:00 requested)<br>
&gt;=C2=A0 =C2=A0 =C2=A0 Tuesday, 22 March 2022, Afternoon Session II 1430-=
1630<br>
&gt;=C2=A0 =C2=A0 =C2=A0 Room Name: Grand Park Hall 3 size: 250<br>
&gt;=C2=A0 =C2=A0 =C2=A0 ---------------------------------------------<br>
&gt; <br>
&gt; <br>
&gt; iCalendar: <a href=3D"https://datatracker.ietf.org/meeting/113/session=
s/secdispatch.ics" rel=3D"noreferrer" target=3D"_blank">https://datatracker=
.ietf.org/meeting/113/sessions/secdispatch.ics</a><br>
&gt; <br>
&gt; Request Information:<br>
&gt; <br>
&gt; <br>
&gt; ---------------------------------------------------------<br>
&gt; Working Group Name: Security Dispatch<br>
&gt; Area Name: Security Area<br>
&gt; Session Requester: Mohit Sethi<br>
&gt; <br>
&gt; <br>
&gt; Number of Sessions: 1<br>
&gt; Length of Session(s):<br>
&gt; Number of Attendees: 200<br>
&gt; Conflicts to Avoid:<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0<br>
&gt; <br>
&gt; <br>
&gt; People who must be present:<br>
&gt;=C2=A0 =C2=A0 Benjamin Kaduk<br>
&gt;=C2=A0 =C2=A0 Kathleen Moriarty<br>
&gt;=C2=A0 =C2=A0 Mohit Sethi<br>
&gt;=C2=A0 =C2=A0 Paul Wouters<br>
&gt;=C2=A0 =C2=A0 Richard Barnes<br>
&gt;=C2=A0 =C2=A0 Roman Danyliw<br>
&gt; <br>
&gt; Resources Requested:<br>
&gt; <br>
&gt; Special Requests:<br>
&gt;=C2=A0 =C2=A0 Please avoid conflict with any Security related BoF.<br>
&gt; ---------------------------------------------------------<br>
&gt; <br>
&gt; <br>
&gt; _______________________________________________<br>
&gt; Secdispatch mailing list<br>
&gt; <a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank">Secdispatch@=
ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/secdispatch" rel=3D"n=
oreferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/secdispa=
tch</a><br>
<br>
-- <br>
SCITT mailing list<br>
<a href=3D"mailto:SCITT@ietf.org" target=3D"_blank">SCITT@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/scitt" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/scitt</a><br>
</blockquote></div>

--00000000000055711b05d9dd0856--


From nobody Fri Mar 11 14:59:23 2022
Return-Path: <kayw@microsoft.com>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2C5533A11C2 for <scitt@ietfa.amsl.com>; Fri, 11 Mar 2022 14:59:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.098
X-Spam-Level: 
X-Spam-Status: No, score=-1.098 tagged_above=-999 required=5 tests=[AC_DIV_BONANZA=0.001, BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, DOTGOV_IMAGE=1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vr-HZ9mvn4EN for <scitt@ietfa.amsl.com>; Fri, 11 Mar 2022 14:59:16 -0800 (PST)
Received: from na01-obe.outbound.protection.outlook.com (mail-cusazlp170100000.outbound.protection.outlook.com [IPv6:2a01:111:f403:c111::]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 58C433A1184 for <scitt@ietf.org>; Fri, 11 Mar 2022 14:59:16 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=g5irzgBEmi1mDiyHqHwUmNhEcrSADMQvR5OCnXeqPo3dmkTUZ0pFizB8POE9vVOHEce2krEfIk86eE5vMBgRLfdkyATV7PnHiIGiglEff7/CrNre4gUKwk+6Ez/X0qc71k7yTpwurl6azLtztKWpS0X2VFeCC9IVAm2MPS9wm2Q4cgpcA0GMNui5mL8/39yL+TM1PPxeTIJUbyNgsS4FPT+n8lQt70+fdEuAH7IwXg0hLKK8RmvyVkyv7fXFoh8FF1JIYW1WFM09Mi2wj+cl3fH5Me1/HQx62E/2R3DGgEbVT6Gb0Von2jHYxtqD8T786TJkMxNjQYfGq7K1dFgVpA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=bQnK9RiaEDy6yiwFlHG9hq3YRrpfRPJbvyHw9WEHDwI=; b=oUuSFZoSfgCozzMxpPFmJsxFrSOfk0TP5Ycbe9xgzlrxmkjdX+bqI9zftFG78OCP+aEyYiakQ1sMGgKAISIZKA3W85HFyqJvLY8QcSRWv+W0U/lv9XLQTvEPoTMcl2GGkELSX4UhphuHOFo7GqsYIN5NosDMWsjS6ky/vOTHz6EZVsb52LN9tp2IYbAvMTNhjpKX4uP83HIFA+i6gsz/JdwrsABDYku/x9/2iOVLy6o+Kluox8vd8CWURYvuEms7Ng0BFHtYsGOp6KAXlvKuhc1w3AOhbnIlwcIp2GYVCqIwPGiYsI32iWXToxO6CXX0bsO9oCiOMXJmEkHMP8XJsg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=bQnK9RiaEDy6yiwFlHG9hq3YRrpfRPJbvyHw9WEHDwI=; b=N+aNKwwEQEZm0piY92lk5oA32u4zigZ6dzcZyDe6RB/hufnhp3QnoJAPOmyf+/HgAMtaU2bBehJt9ajCuvHoyHRJ43PeG2PziIvtuC+f9X2/wTA+BvODS11fQYv2SE+X56hVTGk8IubjGeG1GPw1n7FWuMz9rdAyNvDG0eTv2Hc=
Received: from DM6PR21MB1148.namprd21.prod.outlook.com (2603:10b6:5:16d::28) by CY4PR21MB0471.namprd21.prod.outlook.com (2603:10b6:903:db::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.10; Fri, 11 Mar 2022 22:59:07 +0000
Received: from DM6PR21MB1148.namprd21.prod.outlook.com ([fe80::6c2e:c18e:10f9:4cbd]) by DM6PR21MB1148.namprd21.prod.outlook.com ([fe80::6c2e:c18e:10f9:4cbd%5]) with mapi id 15.20.5081.010; Fri, 11 Mar 2022 22:59:06 +0000
From: Kay Williams <kayw@microsoft.com>
To: Orie Steele <orie@transmute.industries>, "scitt@ietf.org" <scitt@ietf.org>
CC: Sapan Narang <sapan@transmute.industries>
Thread-Topic: [SCITT] GitHub DIDs & VCs for Supply Chain Traceability
Thread-Index: AQHYMlPnVgCpNpbVrEuoPnW8lzo4cKy60Uxw
Date: Fri, 11 Mar 2022 22:59:06 +0000
Message-ID: <DM6PR21MB1148265AA4232ED71CC0D7D8C50C9@DM6PR21MB1148.namprd21.prod.outlook.com>
References: <CAN8C-_K9KBg2DhKOHUf8EMXo5wmTnrEc011e3Q7Y8zFOJsZ-1Q@mail.gmail.com>
In-Reply-To: <CAN8C-_K9KBg2DhKOHUf8EMXo5wmTnrEc011e3Q7Y8zFOJsZ-1Q@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2022-03-11T22:54:34Z;  MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=87762de9-8206-4464-8e7c-bc0084086bf0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ae4c3aef-4547-4d2f-bde6-08da03b2bef2
x-ms-traffictypediagnostic: CY4PR21MB0471:EE_
x-ms-exchange-atpmessageproperties: SA|SL
x-microsoft-antispam-prvs: <CY4PR21MB04712F1C184BFFDD75B1DC78C50C9@CY4PR21MB0471.namprd21.prod.outlook.com>
x-o365-sonar-daas-pilot: True
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:DM6PR21MB1148.namprd21.prod.outlook.com; PTR:; CAT:NONE;  SFS:(13230001)(4636009)(366004)(451199009)(83380400001)(2906002)(55016003)(7696005)(8990500004)(186003)(166002)(9686003)(6506007)(53546011)(107886003)(38100700002)(52536014)(66946007)(66556008)(86362001)(66476007)(64756008)(66446008)(4326008)(8676002)(122000001)(38070700005)(8936002)(82960400001)(82950400001)(5660300002)(316002)(508600001)(966005)(71200400001)(10290500003)(76236003)(76116006)(33656002)(110136005)(99710200001); DIR:OUT; SFP:1102; 
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?TUZPWTNrVkwxTHR3VENoY1U0cHc1bGtlWGlCUmU0VGx6MVdNblNwd0pld085?= =?utf-8?B?TFlLM0pSeFhveXpwbGx0MVR5ZUEwY1VaREpCWDlOUjM4elBwL25jcUJvWkJK?= =?utf-8?B?NlFaSmhDaVVMbGxWQjBzZExYUnJteit6cjlyUFRGNTBHTy9uSVZwVkM5ekNT?= =?utf-8?B?SllIdHRZY0FXdTRYeER5L2hWTll1QzFBblQzRlg2Q2c0dFhKM1B6dWpsNzVL?= =?utf-8?B?N3NkcjNFdzI3TzdCdncyN0E3Nk9TWWgwN3JlaVRnajdVNEZRSm5WRVJDZEJy?= =?utf-8?B?TkUxaFp5dlhFemlmOEo0UEJlM3dRTVJqK1VwT2lTZE5Hb1loZzZqUmRPTWlJ?= =?utf-8?B?NUw0Rlc4ZGFyRU9ZSWFKOVhqUUd5dVUwWjFzS3pkYTVpS0M0eHNPcThwWU9C?= =?utf-8?B?U1pJd2FoVEFjNU1tVEEySHlWS0tKNnFFSGxZRkRkSGRHaEI2eUhzYXo3TklL?= =?utf-8?B?eUQwaExyTHJtS3k4LzR3bUJ5eUYveVg1L1JCUml2RmpIbTB6V0NzdE8rRUZl?= =?utf-8?B?TjR2cGl6aExWbU5iRjdXenI3NWpTa2VPMCtPT1IwVG9BVEt2Z1AwZWpibVov?= =?utf-8?B?ejRvNWRsa015Y0hUZ2dHMzNBTjZ4NHp0ZWNuOHFoRlpoYnlyT3V0eHl5bGVZ?= =?utf-8?B?TS9ad2JLaThlS0Rpd0xCVW1qUGhrSlZDMjlsdlpxVy9NbWdhOW5heUdWUTND?= =?utf-8?B?emJRQVZiZzJHbGxPMGpuZEJadTQycStUOG5HZzUzNENaRGxBZWkzZlhmakgv?= =?utf-8?B?Yy9Rb3daQmhJSU1VQ3p3eGo1Um1OUkh1TWVkUldsU2YwRUk0azQxS1VJWWxU?= =?utf-8?B?cllEQUEwcXZtUEpnMEg3V0tjTHR5K1pRaGdidWllQTJlRmRySlJXdnZFc3I1?= =?utf-8?B?ck14RXd0TFdRN2g2cENVWlYxL0FhZUJObHd2dmFBRURJdklkVzR5dEN6ZEN1?= =?utf-8?B?WHI2cUpXL3A3bDVERnNmWHJxTEY3akt3cThCa2RhQ2RQaTlkWEErT09kUmdE?= =?utf-8?B?OVE3U3dBNEEvM1ZzeVQ0amZQN3llY1dyV0Rzc2RYUDBMamdGQXdVTGdkKzdk?= =?utf-8?B?N2lDck96R1Bjb1hLYzdPL3dBZCtPZDRYSENHdlgvSDF5ay9MOVE3L1Q5dzhK?= =?utf-8?B?UnBmT3hSWkIyWkJRQktwanpWYmxwMTF0Z1Z6UmZwMW90RXpXSTJpNG43dUhJ?= =?utf-8?B?VVQrdlFRaHFmRkw0TXk0dlE0TldLSGl4bnd3SzFFU3VsTDlhU0pqV3l5Y2Qw?= =?utf-8?B?cGUxb0d1VWFvOFgzZkwzNXRZL1BhTHo4MmdXczAwNjdQbVdReTE0anYyN0Q1?= =?utf-8?B?NVRrZnZWcGFzZm9Ja3o1YmkwMUNSUTVxMTVJZENHYy8rWTNyN3JGOWpQNmN5?= =?utf-8?B?SGZiVlIwZUIvQW5wRkdQdll2UXNIdEN1QVNwRHl0YndCaXRpK3piN0F0Ynoy?= =?utf-8?B?a1htbncrSkYxZkxvbEtwTUt1T2xucEdPS0o3aEt4algydTRIWTUxblo5WDd6?= =?utf-8?B?SFdNTDBleldXbEh0K0ZEUExwUzVGSVJRYmd3TENmQnByaTF2eVJqUkJwcHkz?= =?utf-8?B?eU5NYjNsQnJqQXFOM0t1ZnNEYVVjWVMrUDJyb2VQeWRaV2pLQVhVUmdodU05?= =?utf-8?B?VkZMOEtlQ2plemNqWU5wWFE3emFhNWFhdmtUcEJQc3RzUE5SL3dMSlNPSjc2?= =?utf-8?B?V2J4MjVENEMzQ1RQVDBpT09Wb01SVUl3RW9ZV3g4N1hab1BmeitvL2hkTGVJ?= =?utf-8?B?cnVCYTJpR3NYdXJlNzVEL3lienA3SE9MT0NGWGxjNUJmYzdBWFcyUkdYUk80?= =?utf-8?B?ZlF5dGhFVmRYT0VGalFGUnVvZUJKVTgwRXhyMDB6R3pVTW9ZcWd5MDdta1ZW?= =?utf-8?B?WUhEUlJNaTArNzdkL1dpRjF1SE1QZnkvN3drK0JBODNJd29seUdkcWpSSmEx?= =?utf-8?B?UEl1Rm1MNllPT0hhUHNZRDVHM0x4ZSt6U2FpakhXcEVNcHdWOXVtSUVaeGV4?= =?utf-8?B?QUpqWndham85NC9BY2k2Z3NsV3JqQmo2SGJPUzhheStIQm5VY0FWODBibkVz?= =?utf-8?Q?p6JqeT?=
Content-Type: multipart/alternative; boundary="_000_DM6PR21MB1148265AA4232ED71CC0D7D8C50C9DM6PR21MB1148namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR21MB1148.namprd21.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ae4c3aef-4547-4d2f-bde6-08da03b2bef2
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Mar 2022 22:59:06.7587 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: em9osmLdqUu96MdoPCZebRbygy8oayMF3GRj66pS3x+xIujxrRxx3maxYx2ytEcwCmDmBRvrGbvIitPwQ2bHfA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR21MB0471
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/XJBZ2voZuxz16yDNdqzchLI80v4>
Subject: Re: [SCITT] GitHub DIDs & VCs for Supply Chain Traceability
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Mar 2022 22:59:21 -0000

--_000_DM6PR21MB1148265AA4232ED71CC0D7D8C50C9DM6PR21MB1148namp_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_DM6PR21MB1148265AA4232ED71CC0D7D8C50C9DM6PR21MB1148namp_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_DM6PR21MB1148265AA4232ED71CC0D7D8C50C9DM6PR21MB1148namp_--


From nobody Fri Mar 11 16:10:17 2022
Return-Path: <kayw@microsoft.com>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0B5D73A13B3 for <scitt@ietfa.amsl.com>; Fri, 11 Mar 2022 16:10:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.114
X-Spam-Level: 
X-Spam-Status: No, score=-0.114 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URI_TRY_3LD=1.997] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id laLwJrsG9FR9 for <scitt@ietfa.amsl.com>; Fri, 11 Mar 2022 16:10:10 -0800 (PST)
Received: from na01-obe.outbound.protection.outlook.com (mail-centralusazon11021019.outbound.protection.outlook.com [52.101.62.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3B0DB3A0902 for <scitt@ietf.org>; Fri, 11 Mar 2022 16:10:09 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FB9ygg3RJj8MQXT2NdIWWdfgHfLoLQ1ZCcyykuqflUWcRdCDo8jYnlEsUtU3S9XZtniY8BdagTkuov4v1jS8CDuwnNFcv7b5MGX71nItDO4wlwrDsX5ZXcIj1AWR78a6rV3O12WW0mLlISHsJKK6T2vR8tQAH5D4AXqqXtw27gaWp6IuoR+liEms1tJgUF8ol8D7xhhr5rmuGf21fXr1AxT+00vrRLThop9kFiHQyhZJctc3+4zj/pMzRIbmAMIYOkdcuelTwrmFJ9m490MTk3s9QrUalA5MCzySBfje0+JoXXzoPgkdxBNm6WG+5Shu8MFcqKfBoq43pLvQbp0GWw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=RKAF0SUVjHwDSls0GMRiG0UToNt/t4Y+YREVHpmvUFk=; b=HKa5s3JgbQ3mHCtKOoyTes1CXt9Fcmvt+lljXWfm8tudBxDDBhWxaWX23R1t6c+Ti5C21Sh5Y1uGxmOJ8YBselEDDqrgn3smoIM5ndRwu5DSCV4pQi6Vy2qhZOyHraePQr3hC1TIpXJJrLZ2Cgsu1/Vn7A5C/5bPcUXvJJWQs1cxadC5pgsmC90+E46vSxnq6g7g+5B+NGVm44/osLlaW3dLDlbHFdId1/UXzhWb3CY/u36e0aimfxuenjGN2bwUBPHRqG4eKOZMTtdO9VBD23XqUyc7L7KJ5MiPTaK4OCAtmKxElccVuw7rztIdsaFWvaZuyvaCh9Tyru+AIS47aw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RKAF0SUVjHwDSls0GMRiG0UToNt/t4Y+YREVHpmvUFk=; b=jyBSXX31sDT2zuqZ/eYmAdjAlp8g8eZP4UKSxvrk9RXNvOCC1bq5GYinW2qMbddTpycoEsrtmq9Zzieb271yfvy2avlYsnRd52Y7RtDsxoSrCpluu4j2t8W9HeceuECF//0YbfDpQDouw0b7M7ttwkaKfBk4crRmAPY3l9q38B8=
Received: from DM6PR21MB1148.namprd21.prod.outlook.com (2603:10b6:5:16d::28) by MN2PR21MB1373.namprd21.prod.outlook.com (2603:10b6:208:3e::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.10; Sat, 12 Mar 2022 00:10:05 +0000
Received: from DM6PR21MB1148.namprd21.prod.outlook.com ([fe80::6c2e:c18e:10f9:4cbd]) by DM6PR21MB1148.namprd21.prod.outlook.com ([fe80::6c2e:c18e:10f9:4cbd%5]) with mapi id 15.20.5081.010; Sat, 12 Mar 2022 00:10:05 +0000
From: Kay Williams <kayw@microsoft.com>
To: "scitt@ietf.org" <scitt@ietf.org>
Thread-Topic: SCIM Community Meeting
Thread-Index: AQHYNaWG6fGdFHXjt06nmMkSNuloiw==
Date: Sat, 12 Mar 2022 00:10:04 +0000
Message-ID: <DM6PR21MB114869AD57C2A452C6B47DBFC50D9@DM6PR21MB1148.namprd21.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-ms-publictraffictype: Email
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-exchange-calendar-series-instance-id: BAAAAIIA4AB0xbcQGoLgCAfmAw6AQ2ePvlPXAQAAAAAAAAAAEAAAAPESaES+IEpFqLaSAzwj7FI=
x-ms-traffictypediagnostic: DM6PR21MB1148:EE_MeetingMessage|MN2PR21MB1373:EE_MeetingMessage
x-ms-office365-filtering-correlation-id: 755cbe2b-8e68-429f-8445-08da03bca914
x-ms-exchange-atpmessageproperties: SA|SL
x-microsoft-antispam-prvs: <MN2PR21MB1373921371CEFF4046C40F20C50D9@MN2PR21MB1373.namprd21.prod.outlook.com>
x-o365-sonar-daas-pilot: True
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:DM6PR21MB1148.namprd21.prod.outlook.com; PTR:; CAT:NONE;  SFS:(13230001)(4636009)(366004)(451199009)(66946007)(6916009)(52536014)(76116006)(86362001)(55016003)(64756008)(66556008)(66446008)(316002)(7116003)(186003)(8676002)(9686003)(122000001)(6506007)(7696005)(508600001)(38100700002)(966005)(166002)(71200400001)(66476007)(10290500003)(38070700005)(2906002)(8990500004)(40140700001)(5660300002)(83380400001)(3480700007)(82950400001)(33656002)(8936002)(82960400001)(15940465004); DIR:OUT; SFP:1102; 
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?4hVnW3OJ7NQVhmsX8kYYt9tRnD5qk0LEHICyrPoyyF+SBagK7j8q0Wmryh?= =?iso-8859-1?Q?ss/gq7iW3ZviRkf8vG6AA0N5ZErEsqh3c3TCzG0Dz+jm4IMUitWgLp/bPa?= =?iso-8859-1?Q?PCZGE2Wzj6ofHakLu/znS2YkiDHRqRb58L01YB5+E785TRJlNSMHnRELkS?= =?iso-8859-1?Q?CQOUmtFFE5GIpWiXkhdwmJPO8JWe+/t/yqy3oI4q+07Mm0YM5NwzLHEa9P?= =?iso-8859-1?Q?RqIrPgceURyTxCAwsJWznhGtqjV6xg+zf2qS3kEBpwWqmgaDnmPCevKW/v?= =?iso-8859-1?Q?tt/Fp2Y7Slwc/Exrg1b8xQGOC2rtXKF1teyWxlnK0hGlrJ5ZGhAthjF/+Q?= =?iso-8859-1?Q?8LKUM5Bel0pTp/DuLqqhHROF2SZPzvLbDy5QAScUa+AGy/WUI1Q9MiqONP?= =?iso-8859-1?Q?dMzzQuEeThPowjdgjMaqhPoVgRQ+247RLkl2N9TCKvRBODTu0uWczNcDlY?= =?iso-8859-1?Q?hrAbkDVF9GiT/EjxykY2TvPSAYqHEnKpPZmV3l/2yKsdz9Xuv7oMNM/VCk?= =?iso-8859-1?Q?5PFQ0yktltyTDp1F33CWkVbwQPl6P6qOMVpopvj7NN/mcG5UNB0kWAXQ+J?= =?iso-8859-1?Q?BNsjtkVCVNETNNwjjsz1/28Ni5zWdUaYqT57/O/V1EcmKVkAJCwYDEw1xF?= =?iso-8859-1?Q?HBhRIyERwJvQA362/AjqWpo/B0tP6hUiQwS77eYk0XPkAHQQKB/ERF3Ats?= =?iso-8859-1?Q?uQi9IJzGZ7rcaeqFWO6KYRK5vKWnK+/ryMQdgaFXKnWemeKnr4DJsgRcIr?= =?iso-8859-1?Q?zgqzK3tx5boNKrUz1EJHlN86yrFn7+NG2445OZ1KcfVS3yaXYqWsbuWX+X?= =?iso-8859-1?Q?lbnmvcwCmC3VlLdy71Lu1JyuRVwgQ4vcLCS6Y5CiNPbgIeHOJYem+uL3FP?= =?iso-8859-1?Q?jskuqiI6pEUewTE0+PJ3H/mBlXMKDFxdx0zO8N/bewEZgvAHVwPwLVFxXs?= =?iso-8859-1?Q?skXJoxojoKx7N0P3DGs02QBWAQL6HNWlY+d/2hyVk97T0FGspWz9vY/q1A?= =?iso-8859-1?Q?eh/LWygXYj6YHGEBfGUbbyVYJ1dQ8W3bDd8fpFgcPZ+ziyTfS3sH0SCWIk?= =?iso-8859-1?Q?uVkQCSmwkhSMARtBbvb36c4k0Gc7iAvjMUFwfqq+3w5nseGfKsuOEvrmvu?= =?iso-8859-1?Q?xQ/he1/kLQcW0f6+AJKllQEi2f3Bsekvy3ezLB7I7cO/wmxPt0JL+cZhfG?= =?iso-8859-1?Q?0DA0+Zd48UWU+C7eyyc2c/5Xu/mOzulyyqfLf060UPBDOftcb9nGugWcWZ?= =?iso-8859-1?Q?JTsa6MjYdofdVDLZF3dA6U4HIfQ2TvrpGiPDbj8hmxvGBQrdRX+FMf/GKI?= =?iso-8859-1?Q?PfDEi+RbPAc9bodwilAs9Ya0hFc3EfYV19GKpO8Dmayx4UhAIIBj5ebG8O?= =?iso-8859-1?Q?RxSjDqYEodR0md8BQsSMV3eIrhwmd/yLJqEyf0IZgxk/lG40fYFuBCwD/+?= =?iso-8859-1?Q?tdUmZE5FHkw23DfWy9FHx/WOm2qd+TcSPrtN8zohUD7qQLlvvLwU52sYF/?= =?iso-8859-1?Q?qPfg+a+QycNkg4ZLNmPMkwGpkuNSzbGP/Q6/5fZiN0EoAOr+xH1X2r3Z1C?= =?iso-8859-1?Q?ZVTNZu5B/WiU+edfDLkw6WS4llg6?=
Content-Type: multipart/alternative; boundary="_000_DM6PR21MB114869AD57C2A452C6B47DBFC50D9DM6PR21MB1148namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR21MB1148.namprd21.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 755cbe2b-8e68-429f-8445-08da03bca914
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Mar 2022 00:10:04.8825 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Uvh3dzWMbR12qoKZkHKgBem/ArDKU98GzRatt745sepYPxcNy7MNz/yL1KR8fIbs9QnZMA+CpDu/ZWEU11uWbw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR21MB1373
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/D_rd0Rmrn2AXC5U9QT4U3enAGGI>
Subject: [SCITT] SCIM Community Meeting
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 12 Mar 2022 00:10:15 -0000

--_000_DM6PR21MB114869AD57C2A452C6B47DBFC50D9DM6PR21MB1148namp_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi SCITT community members,

Our next meeting will be in Monday 3/14 at 4:05 PM UTC.  See the bottom of =
this message for meeting details. We have a light agenda this week.  Please=
 reach out with any additional items.


  *   IETF Update (Henk)
     *   Welcome email<https://mailarchive.ietf.org/arch/msg/scitt/FblY3IT9=
MWerHC68s5V7qphdUIw/> to ietf-scitt list
     *   Agenda item request<https://mailarchive.ietf.org/arch/msg/scitt/9k=
e0lxzOuLIFXMhvproNTHqnQzg/> email to secdispatch
     *   Document contributors, reviewers
  *   COSE Update
     *   go-cose/gluecose 3/11 meeting notes<https://veraison.zulipchat.com=
/#narrow/stream/317999-go-cose-meetings> (Yogesh, Henk, Steve Lasker)
     *   Upcoming OpenSSF Meeting (Kay)
        *   Weds 3/16 5 PM UTC
        *   Meeting link: https://zoom.us/j/99431695008
  *   Other topics?

Kay

-----------------------
Updating the time to 8:05 to 8:55 Pacific (from 8:00 to 9:00 Pacific)

Weekly SCIM Community Meeting

GitHub: microsoft/scim: Supply Chain Integrity Model (github.com)<https://g=
ithub.com/microsoft/SCIM>
Meeting agenda and notes: SCIM Project Weekly Meeting Agenda and Notes - Go=
ogle Docs<https://docs.google.com/document/d/1vf-EliXByhg5HZfgVbTqZhfaJFCmv=
MdQuZ4tC-Eq6wg/edit>
___________________________________________________________________________=
_____
Microsoft Teams meeting
Join on your computer or mobile app
Click here to join the meeting<https://teams.microsoft.com/l/meetup-join/19=
%3ameeting_YWI2YzM0YmYtYmJkOC00ODg2LWI1MmItYmJmZWM1OTI4Y2Ex%40thread.v2/0?c=
ontext=3D%7b%22Tid%22%3a%2272f988bf-86f1-41af-91ab-2d7cd011db47%22%2c%22Oid=
%22%3a%22531852bd-66b0-45f7-abad-b1e0ad3b3a32%22%7d>
Join with a video conferencing device
813878896@t.plcm.vc<mailto:813878896@t.plcm.vc>
Video Conference ID: 112 827 551 0
Alternate VTC dialing instructions<https://dialin.plcm.vc/teams/?key=3D8138=
78896&conf=3D1128275510>
Or call in (audio only)
+1 425-616-0754,,203402542#<tel:+14256160754,,203402542#>   United States, =
Seattle
Phone Conference ID: 203 402 542#
Find a local number<https://dialin.teams.microsoft.com/8551f4c1-bea3-441a-8=
738-69aa517a91c5?id=3D203402542> | Reset PIN<https://mysettings.lync.com/ps=
tnconferencing>
Learn More<https://aka.ms/JoinTeamsMeeting> | Meeting options<https://teams=
.microsoft.com/meetingOptions/?organizerId=3D531852bd-66b0-45f7-abad-b1e0ad=
3b3a32&tenantId=3D72f988bf-86f1-41af-91ab-2d7cd011db47&threadId=3D19_meetin=
g_YWI2YzM0YmYtYmJkOC00ODg2LWI1MmItYmJmZWM1OTI4Y2Ex@thread.v2&messageId=3D0&=
language=3Den-US>
___________________________________________________________________________=
_____


--_000_DM6PR21MB114869AD57C2A452C6B47DBFC50D9DM6PR21MB1148namp_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"Segoe UI";
	panose-1:2 11 5 2 4 2 4 2 2 3;}
@font-face
	{font-family:"Segoe UI Semibold";
	panose-1:2 11 7 2 4 2 4 2 2 3;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
span.EmailStyle18
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:446169262;
	mso-list-template-ids:-1778091042;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1
	{mso-list-id:1000699570;
	mso-list-template-ids:-993476642;}
@list l1:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l1:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l1:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l1:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72" style=3D"word-wrap:=
break-word">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Hi SCITT community members,<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Our next meeting will be in Monday 3/14 at 4:05 PM U=
TC.&nbsp; See the bottom of this message for meeting details. We have a lig=
ht agenda this week.&nbsp; Please reach out with any additional items.<o:p>=
</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<ul style=3D"margin-top:0in" type=3D"disc">
<li class=3D"MsoNormal" style=3D"mso-list:l1 level1 lfo3">IETF Update (Henk=
)<o:p></o:p></li><ul style=3D"margin-top:0in" type=3D"circle">
<li class=3D"MsoNormal" style=3D"mso-list:l1 level2 lfo3"><a href=3D"https:=
//mailarchive.ietf.org/arch/msg/scitt/FblY3IT9MWerHC68s5V7qphdUIw/">Welcome=
 email</a> to ietf-scitt list<o:p></o:p></li><li class=3D"MsoNormal" style=
=3D"mso-list:l1 level2 lfo3"><a href=3D"https://mailarchive.ietf.org/arch/m=
sg/scitt/9ke0lxzOuLIFXMhvproNTHqnQzg/">Agenda item request</a> email to sec=
dispatch<o:p></o:p></li><li class=3D"MsoNormal" style=3D"mso-list:l1 level2=
 lfo3">Document contributors, reviewers<o:p></o:p></li></ul>
<li class=3D"MsoNormal" style=3D"mso-list:l1 level1 lfo3">COSE Update<o:p><=
/o:p></li><ul style=3D"margin-top:0in" type=3D"circle">
<li class=3D"MsoNormal" style=3D"mso-list:l1 level2 lfo3">go-cose/gluecose =
3/11 <a href=3D"https://veraison.zulipchat.com/#narrow/stream/317999-go-cos=
e-meetings">
meeting notes</a> (Yogesh, Henk, Steve Lasker)<o:p></o:p></li><li class=3D"=
MsoNormal" style=3D"mso-list:l1 level2 lfo3">Upcoming OpenSSF Meeting (Kay)=
<o:p></o:p></li><ul style=3D"margin-top:0in" type=3D"square">
<li class=3D"MsoNormal" style=3D"mso-list:l1 level3 lfo3">Weds 3/16 5 PM UT=
C<o:p></o:p></li><li class=3D"MsoNormal" style=3D"mso-list:l1 level3 lfo3">=
Meeting link: <a href=3D"https://zoom.us/j/99431695008">
https://zoom.us/j/99431695008</a><o:p></o:p></li></ul>
</ul>
<li class=3D"MsoNormal" style=3D"mso-list:l1 level1 lfo3">Other topics?<o:p=
></o:p></li></ul>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Kay<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">-----------------------<o:p></o:p></p>
<p class=3D"MsoNormal">Updating the time to 8:05 to 8:55 Pacific (from 8:00=
 to 9:00 Pacific)<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Weekly SCIM Community Meeting<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">GitHub: <a href=3D"https://github.com/microsoft/SCIM=
">microsoft/scim: Supply Chain Integrity Model (github.com)</a><o:p></o:p><=
/p>
<p class=3D"MsoNormal">Meeting agenda and notes: <a href=3D"https://docs.go=
ogle.com/document/d/1vf-EliXByhg5HZfgVbTqZhfaJFCmvMdQuZ4tC-Eq6wg/edit">
SCIM Project Weekly Meeting Agenda and Notes - Google Docs</a><o:p></o:p></=
p>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#5F5F5F">______________________=
__________________________________________________________</span>
<o:p></o:p></p>
</div>
<div>
<div style=3D"margin-top:.25in;margin-bottom:15.0pt">
<p class=3D"MsoNormal"><span style=3D"font-size:18.0pt;font-family:&quot;Se=
goe UI&quot;,sans-serif;color:#252424">Microsoft Teams meeting</span><span =
style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;color:#252424">
<o:p></o:p></span></p>
</div>
<div style=3D"margin-bottom:15.0pt">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.5pt;font-family:&quot=
;Segoe UI&quot;,sans-serif;color:#252424">Join on your computer or mobile a=
pp</span></b><b><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;=
color:#252424">
<o:p></o:p></span></b></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Segoe UI&quot;,sans=
-serif;color:#252424"><a href=3D"https://teams.microsoft.com/l/meetup-join/=
19%3ameeting_YWI2YzM0YmYtYmJkOC00ODg2LWI1MmItYmJmZWM1OTI4Y2Ex%40thread.v2/0=
?context=3D%7b%22Tid%22%3a%2272f988bf-86f1-41af-91ab-2d7cd011db47%22%2c%22O=
id%22%3a%22531852bd-66b0-45f7-abad-b1e0ad3b3a32%22%7d" target=3D"_blank"><s=
pan style=3D"font-size:10.5pt;font-family:&quot;Segoe UI Semibold&quot;,san=
s-serif;color:#6264A7">Click
 here to join the meeting</span></a> <o:p></o:p></span></p>
</div>
<div style=3D"margin-bottom:3.0pt">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.5pt;font-family:&quot=
;Segoe UI&quot;,sans-serif;color:#252424">Join with a video conferencing de=
vice</span></b><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;c=
olor:#252424">
<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Se=
goe UI&quot;,sans-serif;color:#252424"><a href=3D"mailto:813878896@t.plcm.v=
c">813878896@t.plcm.vc</a>
<o:p></o:p></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Se=
goe UI&quot;,sans-serif;color:#252424">Video Conference ID:
</span><span style=3D"font-size:12.0pt;font-family:&quot;Segoe UI&quot;,san=
s-serif;color:#252424">112 827 551 0
</span><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;color:#25=
2424"><o:p></o:p></span></p>
</div>
<div style=3D"margin-bottom:15.0pt">
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Se=
goe UI&quot;,sans-serif;color:#252424"><a href=3D"https://dialin.plcm.vc/te=
ams/?key=3D813878896&amp;conf=3D1128275510"><span style=3D"color:#6264A7">A=
lternate VTC dialing instructions</span></a>
<o:p></o:p></span></p>
</div>
<div style=3D"margin-bottom:3.0pt">
<div style=3D"margin-bottom:3.0pt">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.5pt;font-family:&quot=
;Segoe UI&quot;,sans-serif;color:#252424">Or call in (audio only)</span></b=
><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;color:#252424">
<o:p></o:p></span></p>
</div>
<div style=3D"margin-bottom:3.0pt">
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Segoe UI&quot;,sans=
-serif;color:#252424"><a href=3D"tel:+14256160754,,203402542# "><span style=
=3D"font-size:10.5pt;color:#6264A7">+1 425-616-0754,,203402542#</span></a>
</span><span style=3D"font-size:10.5pt;font-family:&quot;Segoe UI&quot;,san=
s-serif;color:#252424">&nbsp; United States, Seattle
</span><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;color:#25=
2424"><o:p></o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Se=
goe UI&quot;,sans-serif;color:#252424">Phone Conference ID:
</span><span style=3D"font-size:12.0pt;font-family:&quot;Segoe UI&quot;,san=
s-serif;color:#252424">203 402 542#
</span><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;color:#25=
2424"><o:p></o:p></span></p>
<div style=3D"margin-bottom:15.0pt">
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Segoe UI&quot;,sans=
-serif;color:#252424"><a href=3D"https://dialin.teams.microsoft.com/8551f4c=
1-bea3-441a-8738-69aa517a91c5?id=3D203402542" target=3D"_blank"><span style=
=3D"font-size:10.5pt;color:#6264A7">Find a local number</span></a>
 | <a href=3D"https://mysettings.lync.com/pstnconferencing" target=3D"_blan=
k"><span style=3D"font-size:10.5pt;color:#6264A7">Reset PIN</span></a>
<o:p></o:p></span></p>
</div>
<div style=3D"margin-top:15.0pt;margin-bottom:.25in">
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Segoe UI&quot;,sans=
-serif;color:#252424"><a href=3D"https://aka.ms/JoinTeamsMeeting" target=3D=
"_blank"><span style=3D"font-size:10.5pt;color:#6264A7">Learn More</span></=
a> |
<a href=3D"https://teams.microsoft.com/meetingOptions/?organizerId=3D531852=
bd-66b0-45f7-abad-b1e0ad3b3a32&amp;tenantId=3D72f988bf-86f1-41af-91ab-2d7cd=
011db47&amp;threadId=3D19_meeting_YWI2YzM0YmYtYmJkOC00ODg2LWI1MmItYmJmZWM1O=
TI4Y2Ex@thread.v2&amp;messageId=3D0&amp;language=3Den-US" target=3D"_blank"=
>
<span style=3D"font-size:10.5pt;color:#6264A7">Meeting options</span></a> <=
o:p></o:p></span></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:#5F5F5F">______________________=
__________________________________________________________</span>
<o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_DM6PR21MB114869AD57C2A452C6B47DBFC50D9DM6PR21MB1148namp_
Content-Type: text/calendar; charset="utf-8"; method=REQUEST
Content-Transfer-Encoding: base64
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--_000_DM6PR21MB114869AD57C2A452C6B47DBFC50D9DM6PR21MB1148namp_--


From nobody Mon Mar 14 08:22:19 2022
Return-Path: <orie@transmute.industries>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8F0323A0891 for <scitt@ietfa.amsl.com>; Mon, 14 Mar 2022 08:22:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.096
X-Spam-Level: 
X-Spam-Status: No, score=-1.096 tagged_above=-999 required=5 tests=[AC_DIV_BONANZA=0.001, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, DOTGOV_IMAGE=1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=transmute.industries
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HPsINsUDc2wG for <scitt@ietfa.amsl.com>; Mon, 14 Mar 2022 08:22:10 -0700 (PDT)
Received: from mail-lj1-x236.google.com (mail-lj1-x236.google.com [IPv6:2a00:1450:4864:20::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 56D5F3A15F0 for <scitt@ietf.org>; Mon, 14 Mar 2022 08:22:10 -0700 (PDT)
Received: by mail-lj1-x236.google.com with SMTP id q10so22417906ljc.7 for <scitt@ietf.org>; Mon, 14 Mar 2022 08:22:09 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=transmute.industries; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=XdZ5jEVFrkX3dWomzycZ+idq9yCKwiBamtkZ2Y2p4QA=; b=KJ5vLbbR1HabPsuLgoBPfSf4mjd5jHx48eCquyEG5zGY0egaXL4mWEq8KsT8ZWsXFB Vxxcs8fiwdIqV6w2mpSk/WHRQBScmsOFFEk7evZthueHB3E4Payel0UofEkprEYPkG3M ap3dauxMjQPQC4eqBb+JvUHRLlvAjz9vkviefsXzUFXSXhqeKdvaqFg7ZuPz4lPbKY8+ LXtMe0vwb8vstHcfE2+mTjeeIK+x0jH9eg5+JVqFX5ypZqQYB+ivVVgaxi4S5XYl/XaP o1vDCE57Z9xBWzcwbQQynSVYslOquhxhlIhAhtmEZX69GtwohHQ5kCnmE7RkwWyl+xqK aBcw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=XdZ5jEVFrkX3dWomzycZ+idq9yCKwiBamtkZ2Y2p4QA=; b=hdEe2NzfBDij6BWUYrYyk2A+a2raqeqMiyPJgKFWcKlVCSOUouEUKiCxKOZHAmvQO8 q/RhFeIpl0NTHQ7Lm6WXVQpCVrQ7H5ShQ34kddTf9PC7mbPgQUIDXlJEBjMcjwQUEMFu MZkr00Pf/VSCnUSmkbZ/UmlFm+/gtJbPIt5AkFFKi1fsy4Jzd3BmTwjv8Zt3jFd1tgFn gA1lxgeDFTP0Qebzl3sLxc9EPQiEIvkV28dGAHIJRgq4G4dnOB5DB8eBXpxtVxdBxai5 +0zP4FrpwYwg9lVfHyLuRrOy6abgO9vaZME4q8kjRce1mS5jCxEtmIOIGI2GIqpoBqXD d8Vg==
X-Gm-Message-State: AOAM530+yZ1RuytJ1V17pwYwt9NYicX+DHb7wUJqPst7DwMk3bOC1JNt 77W6XQll6Sojq/JOKYQhcFvR1xvt2bux6B9dXyLFk6aLnNw=
X-Google-Smtp-Source: ABdhPJx+/o/mCQg2ZrQWMlBAksICAYKh4TaW8+lZfbhMR0B8K8//tL7KEiEdlDCaIQXQumYsC8Bobp2jUpJo9ZU4C0M=
X-Received: by 2002:a2e:99cf:0:b0:249:3cc7:2225 with SMTP id l15-20020a2e99cf000000b002493cc72225mr2076723ljj.287.1647271327697; Mon, 14 Mar 2022 08:22:07 -0700 (PDT)
MIME-Version: 1.0
References: <CAN8C-_K9KBg2DhKOHUf8EMXo5wmTnrEc011e3Q7Y8zFOJsZ-1Q@mail.gmail.com> <DM6PR21MB1148265AA4232ED71CC0D7D8C50C9@DM6PR21MB1148.namprd21.prod.outlook.com>
In-Reply-To: <DM6PR21MB1148265AA4232ED71CC0D7D8C50C9@DM6PR21MB1148.namprd21.prod.outlook.com>
From: Orie Steele <orie@transmute.industries>
Date: Mon, 14 Mar 2022 10:21:56 -0500
Message-ID: <CAN8C-_J8tThmo2mdMyydP-5A1h9aHReftPDRVD_cZjMnd8=2hA@mail.gmail.com>
To: Kay Williams <kayw@microsoft.com>
Cc: "scitt@ietf.org" <scitt@ietf.org>, Sapan Narang <sapan@transmute.industries>
Content-Type: multipart/alternative; boundary="0000000000005621b805da2f3e49"
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/mGATRQ0zmDeh9mv1Ubvruxm839k>
Subject: Re: [SCITT] GitHub DIDs & VCs for Supply Chain Traceability
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 14 Mar 2022 15:22:16 -0000

--0000000000005621b805da2f3e49
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Sorry I got to this late.

I can prepare something for the next meeting.

Regards,

OS

On Fri, Mar 11, 2022 at 4:59 PM Kay Williams <kayw@microsoft.com> wrote:

> Hi Orie (and Sapan),
>
>
>
> Apologies for my late response to your email.  It landed in my spam
> folder, and I am just now seeing it.  (As a side note, I have now unblock=
ed
> all email from ietf.org.)
>
>
>
> Thank you for sharing this work.  Would you be interested in taking a few
> minutes on the agenda at our Monday 3/14 4 PM UTC meeting, or a future
> meeting, to provide an overview an entertain discussion?
>
>
>
> Kay
>
>
>
> *From:* SCITT <scitt-bounces@ietf.org> *On Behalf Of * Orie Steele
> *Sent:* Monday, March 7, 2022 10:41 AM
> *To:* scitt@ietf.org
> *Cc:* Sapan Narang <sapan@transmute.industries>
> *Subject:* [SCITT] GitHub DIDs & VCs for Supply Chain Traceability
>
>
>
> Hello,
>
> I'm Orie, I work on identifier and credentialing standards at W3C and IET=
F.
>
> My company Transmute
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqiYqEgkF4xWgxA5Ast%2Fhttps%253A%252F%252Ftransmute.indu=
stries%252F&data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08d=
a006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822756956101386%7=
CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwi=
LCJXVCI6Mn0%3D%7C2000&sdata=3D9R5j2qoK1Pwv2blibs6LsjcrxOH6r4wGLA%2Bej0QTowE=
%3D&reserved=3D0>
> applies these standards to supply traceability (both physical and softwar=
e).
>
> Some of our work is funded by DHS SVIP
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqNTelooObAhwFx98Nw%2Fhttps%253A%252F%252Fwww.dhs.gov%25=
2Fscience-and-technology%252Fsvip&data=3D04%7C01%7Ckayw%40microsoft.com%7C4=
fa261ad2e11431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%=
7C637822756956151382%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2=
luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=3DaIJmd5v43klp8sTVCwfzXaj=
%2FYaTDlZzcbfUTiEsIULQ%3D&reserved=3D0>,
> including our work on applying DIDs and VCs to physical supply chain issu=
es
> associated with global trade and imports and exports.
>
> If you are interested in that work it can be found here:
> https://w3id.org/traceability
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQy2fH6UWEI23iw-vWGEG%2Fhttps%253A%252F%252Fw3id.org%252Ft=
raceability&data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08d=
a006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822756956151382%7=
CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwi=
LCJXVCI6Mn0%3D%7C2000&sdata=3DyFaOJyKbjDNmQcAiqsQavv3CSSDpb8xJ1IIP1Iax7jk%3=
D&reserved=3D0>
> .
>
> I wanted to share some very recent (experimental and unstable) work we've
> done to enable Decentralized Identifiers
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqX11lXlzLvQgPI070Q%2Fhttps%253A%252F%252Fwww.w3.org%252=
FTR%252Fdid-core%252F&data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e114=
31b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378227569=
56151382%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTi=
I6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=3DnRWgY1i%2BR1f7bPsZqjbBsnCzWE99473A7=
KfBFnq31C8%3D&reserved=3D0>
> and Verifiable Credentials
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQymDA7VYHe95RgZjMZKI%2Fhttps%253A%252F%252Fwww.w3.org%252=
FTR%252Fvc-data-model%252F&data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad=
2e11431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63782=
2756956151382%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiL=
CJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=3Dyow6DrPjnCMJ8nNo4bdnC2aQqnK2VE=
aoz%2FNMaAEhjPk%3D&reserved=3D0>
> to assist with the software supply chain.
>
> Here are the links:
>
> - https://github.com/transmute-industries/verifiable-actions
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqXl4mGukfBcw_Wj_Q8%2Fhttps%253A%252F%252Fgithub.com%252=
Ftransmute-industries%252Fverifiable-actions&data=3D04%7C01%7Ckayw%40micros=
oft.com%7C4fa261ad2e11431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db=
47%7C1%7C0%7C637822756956151382%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDA=
iLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=3D8NnTSuiG7Euv=
wPW8HSFqdgwsEHNGOvVGjGSMsbQ5iWo%3D&reserved=3D0>
> -
> https://github.com/transmute-industries/public-credential-registry-templa=
te
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyuHh9DtUHodDwKXtBBB%2Fhttps%253A%252F%252Fgithub.com%252=
Ftransmute-industries%252Fpublic-credential-registry-template&data=3D04%7C0=
1%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08da006aaec3%7C72f988bf86f14=
1af91ab2d7cd011db47%7C1%7C0%7C637822756956151382%7CUnknown%7CTWFpbGZsb3d8ey=
JWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sda=
ta=3DzNRyp1Amaglk7M5KtAAAre0g0p4COR2B4MnNw3HyXdA%3D&reserved=3D0>
>
> The key idea is to enable github actions to sign and verify credentials
> that conform to the W3C Verifiable Credentials standard (which in turn
> supports various envelope formats including JOSE, COSE and PGP).
>
> The issuers are identified with W3C Decentralized Identifiers, which
> provide a layer of interoperability for public key identifier registries.
> The key value of this standard is the ability to support both traditional
> public key based identifiers, web resource based identifiers and
> blockchain based identifiers in the same data model.
>
> The examples in the repository links above demonstrate support for these
> standards using did:key
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyuGxqSDtSpdZABx8eMt%2Fhttps%253A%252F%252Fw3c-ccg.github=
.io%252Fdid-method-key%252F&data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261a=
d2e11431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378=
22756956151382%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIi=
LCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=3DZ8q%2B%2B%2B5un6kXFtoJco8Zq%2=
FFQ0SkbAbEA6rIln4Icoik%3D&reserved=3D0> and
> did:web
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqsLGN-htS74QXmSanv%2Fhttps%253A%252F%252Fgithub.com%252=
Fw3c-ccg%252Fdid-method-web&data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261a=
d2e11431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378=
22756956151382%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIi=
LCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=3Duk%2FI2jVLWPstJ8BPNC48FwX%2BS=
IkL7JpkLQSoGZp5R10%3D&reserved=3D0>,
>
> however I am one of the editors of the Sidetree Protocol
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyuu7nlpbor7UAurwtjs%2Fhttps%253A%252F%252Fgithub.com%252=
Fdecentralized-identity%252Fsidetree&data=3D04%7C01%7Ckayw%40microsoft.com%=
7C4fa261ad2e11431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7=
C0%7C637822756956151382%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo=
iV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=3Dx46LrtTjutTQOlGxvgOf=
SssV0lt%2FGw3tT2WMOmOOEEQ%3D&reserved=3D0> which
> is what powers did:ion
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyuxcXKIp3hEOgkQqHLh%2Fhttps%253A%252F%252Ftechcommunity.=
microsoft.com%252Ft5%252Fidentity-standards-blog%252Fion-we-have-liftoff%25=
2Fba-p%252F1441555&data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b=
18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378227569562=
01387%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6I=
k1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=3DO%2FYemSxT96Ju3GxGpQphQCkUixMRci3cvSfl=
SRufHdk%3D&reserved=3D0> which
> is being developed by Microsoft and other DIF members...
> The GitHub examples I provided will also work with did:ion.
>
> Feel free to raise issues on any of the repositories linked, or ask me
> questions directly by email if you are not comfortable commenting on a
> public repo.
>
> Regards,
>
> OS
>
>
>
> --
>
> *ORIE STEELE*
>
> Chief Technical Officer
>
> www.transmute.industries
>
>
>
>
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqJyZSff0skfwnnG7JR%2Fhttps%253A%252F%252Fwww.transmute.=
industries&data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08da=
006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822756956201387%7C=
Unknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiL=
CJXVCI6Mn0%3D%7C2000&sdata=3D78P89eUSJMqceWK1Pfkl1xZ%2F9MfwbkRUhu12F0EqlFE%=
3D&reserved=3D0>
>
> =E1=90=A7
>


--=20
*ORIE STEELE*
Chief Technical Officer
www.transmute.industries

<https://www.transmute.industries>

--0000000000005621b805da2f3e49
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Sorry I got to this late.<br><br>I can prepare something f=
or the next meeting.<br><br>Regards,<br><br>OS</div><br><div class=3D"gmail=
_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Fri, Mar 11, 2022 at 4:59 =
PM Kay Williams &lt;<a href=3D"mailto:kayw@microsoft.com">kayw@microsoft.co=
m</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin=
:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"=
>





<div lang=3D"EN-US" style=3D"overflow-wrap: break-word;">
<div class=3D"gmail-m_-5074551428348721590WordSection1">
<p class=3D"MsoNormal">Hi Orie (and Sapan),<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">Apologies for my late response to your email.=C2=A0 =
It landed in my spam folder, and I am just now seeing it.=C2=A0 (As a side =
note, I have now unblocked all email from <a href=3D"http://ietf.org" targe=
t=3D"_blank">ietf.org</a>.)<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">Thank you for sharing this work.=C2=A0 Would you be =
interested in taking a few minutes on the agenda at our Monday 3/14 4 PM UT=
C meeting, or a future meeting, to provide an overview an entertain discuss=
ion?<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">Kay<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(225,225,225);padding:3pt 0in 0in">
<p class=3D"MsoNormal"><b>From:</b> SCITT &lt;<a href=3D"mailto:scitt-bounc=
es@ietf.org" target=3D"_blank">scitt-bounces@ietf.org</a>&gt; <b>On Behalf =
Of </b>
Orie Steele<br>
<b>Sent:</b> Monday, March 7, 2022 10:41 AM<br>
<b>To:</b> <a href=3D"mailto:scitt@ietf.org" target=3D"_blank">scitt@ietf.o=
rg</a><br>
<b>Cc:</b> Sapan Narang &lt;sapan@transmute.industries&gt;<br>
<b>Subject:</b> [SCITT] GitHub DIDs &amp; VCs for Supply Chain Traceability=
<u></u><u></u></p>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">Hello,<br>
<br>
I&#39;m Orie, I work on identifier and credentialing standards at W3C and I=
ETF.<br>
<br>
My company <a href=3D"https://nam06.safelinks.protection.outlook.com/?url=
=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyqiYqEgkF4xWgxA5Ast%2Fhttps%253A%25=
2F%252Ftransmute.industries%252F&amp;data=3D04%7C01%7Ckayw%40microsoft.com%=
7C4fa261ad2e11431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7=
C0%7C637822756956101386%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo=
iV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=3D9R5j2qoK1Pwv2bli=
bs6LsjcrxOH6r4wGLA%2Bej0QTowE%3D&amp;reserved=3D0" target=3D"_blank">
Transmute</a> applies these standards to supply traceability (both physical=
=C2=A0and software).<br>
<br>
Some of our work is funded by <a href=3D"https://nam06.safelinks.protection=
.outlook.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyqNTelooObAhwFx98N=
w%2Fhttps%253A%252F%252Fwww.dhs.gov%252Fscience-and-technology%252Fsvip&amp=
;data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08da006aaec3%7=
C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822756956151382%7CUnknown%7C=
TWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0=
%3D%7C2000&amp;sdata=3DaIJmd5v43klp8sTVCwfzXaj%2FYaTDlZzcbfUTiEsIULQ%3D&amp=
;reserved=3D0" target=3D"_blank">
DHS SVIP</a>, including our work on applying DIDs and VCs to physical suppl=
y chain=C2=A0issues associated with global trade and imports and exports.<b=
r>
<br>
If you are interested in that work it can be found here:=C2=A0<a href=3D"ht=
tps://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstreaklin=
ks.com%2FA9ifQy2fH6UWEI23iw-vWGEG%2Fhttps%253A%252F%252Fw3id.org%252Ftracea=
bility&amp;data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08da=
006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822756956151382%7C=
Unknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiL=
CJXVCI6Mn0%3D%7C2000&amp;sdata=3DyFaOJyKbjDNmQcAiqsQavv3CSSDpb8xJ1IIP1Iax7j=
k%3D&amp;reserved=3D0" target=3D"_blank">https://w3id.org/traceability</a>.=
<br>
<br>
I wanted to share some very recent (experimental and unstable) work we&#39;=
ve done to enable
<a href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2=
F%2Fstreaklinks.com%2FA9ifQyqX11lXlzLvQgPI070Q%2Fhttps%253A%252F%252Fwww.w3=
.org%252FTR%252Fdid-core%252F&amp;data=3D04%7C01%7Ckayw%40microsoft.com%7C4=
fa261ad2e11431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%=
7C637822756956151382%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2=
luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=3DnRWgY1i%2BR1f7bPsZq=
jbBsnCzWE99473A7KfBFnq31C8%3D&amp;reserved=3D0" target=3D"_blank">
Decentralized Identifiers</a> and <a href=3D"https://nam06.safelinks.protec=
tion.outlook.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQymDA7VYHe95RgZ=
jMZKI%2Fhttps%253A%252F%252Fwww.w3.org%252FTR%252Fvc-data-model%252F&amp;da=
ta=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08da006aaec3%7C72=
f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822756956151382%7CUnknown%7CTWF=
pbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D=
%7C2000&amp;sdata=3Dyow6DrPjnCMJ8nNo4bdnC2aQqnK2VEaoz%2FNMaAEhjPk%3D&amp;re=
served=3D0" target=3D"_blank">
Verifiable Credentials</a> to assist with the software supply chain.<br>
<br>
Here are the links:<br>
<br>
-=C2=A0<a href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhtt=
ps%3A%2F%2Fstreaklinks.com%2FA9ifQyqXl4mGukfBcw_Wj_Q8%2Fhttps%253A%252F%252=
Fgithub.com%252Ftransmute-industries%252Fverifiable-actions&amp;data=3D04%7=
C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08da006aaec3%7C72f988bf86f=
141af91ab2d7cd011db47%7C1%7C0%7C637822756956151382%7CUnknown%7CTWFpbGZsb3d8=
eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&a=
mp;sdata=3D8NnTSuiG7EuvwPW8HSFqdgwsEHNGOvVGjGSMsbQ5iWo%3D&amp;reserved=3D0"=
 target=3D"_blank">https://github.com/transmute-industries/verifiable-actio=
ns</a><br>
-=C2=A0<a href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhtt=
ps%3A%2F%2Fstreaklinks.com%2FA9ifQyuHh9DtUHodDwKXtBBB%2Fhttps%253A%252F%252=
Fgithub.com%252Ftransmute-industries%252Fpublic-credential-registry-templat=
e&amp;data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08da006aa=
ec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822756956151382%7CUnkno=
wn%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVC=
I6Mn0%3D%7C2000&amp;sdata=3DzNRyp1Amaglk7M5KtAAAre0g0p4COR2B4MnNw3HyXdA%3D&=
amp;reserved=3D0" target=3D"_blank">https://github.com/transmute-industries=
/public-credential-registry-template</a><br>
<br>
The key idea is to enable github actions to sign and verify credentials tha=
t conform to the W3C Verifiable Credentials standard (which in turn support=
s various envelope formats including JOSE, COSE and PGP).<br>
<br>
The issuers are identified=C2=A0with W3C Decentralized Identifiers, which p=
rovide a layer of interoperability for public key identifier=C2=A0registrie=
s.
<br>
The key value of this standard is the ability to support both traditional p=
ublic key based identifiers, web resource based identifiers and blockchain=
=C2=A0based identifiers in the same data model.<br>
<br>
The examples in the repository links above demonstrate support for these st=
andards using
<a href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2=
F%2Fstreaklinks.com%2FA9ifQyuGxqSDtSpdZABx8eMt%2Fhttps%253A%252F%252Fw3c-cc=
g.github.io%252Fdid-method-key%252F&amp;data=3D04%7C01%7Ckayw%40microsoft.c=
om%7C4fa261ad2e11431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C=
1%7C0%7C637822756956151382%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQ=
IjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=3DZ8q%2B%2B%2B5=
un6kXFtoJco8Zq%2FFQ0SkbAbEA6rIln4Icoik%3D&amp;reserved=3D0" target=3D"_blan=
k">
did:key</a>=C2=A0and <a href=3D"https://nam06.safelinks.protection.outlook.=
com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyqsLGN-htS74QXmSanv%2Fhttps=
%253A%252F%252Fgithub.com%252Fw3c-ccg%252Fdid-method-web&amp;data=3D04%7C01=
%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08da006aaec3%7C72f988bf86f141=
af91ab2d7cd011db47%7C1%7C0%7C637822756956151382%7CUnknown%7CTWFpbGZsb3d8eyJ=
WIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;=
sdata=3Duk%2FI2jVLWPstJ8BPNC48FwX%2BSIkL7JpkLQSoGZp5R10%3D&amp;reserved=3D0=
" target=3D"_blank">
did:web</a>, <br>
however I am one of the editors of the=C2=A0<a href=3D"https://nam06.safeli=
nks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyuu7=
nlpbor7UAurwtjs%2Fhttps%253A%252F%252Fgithub.com%252Fdecentralized-identity=
%252Fsidetree&amp;data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b1=
8be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63782275695615=
1382%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik=
1haWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=3Dx46LrtTjutTQOlGxvgOfSssV0lt%2FGw3tT=
2WMOmOOEEQ%3D&amp;reserved=3D0" target=3D"_blank">Sidetree
 Protocol</a>=C2=A0which is what powers <a href=3D"https://nam06.safelinks.=
protection.outlook.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyuxcXKIp=
3hEOgkQqHLh%2Fhttps%253A%252F%252Ftechcommunity.microsoft.com%252Ft5%252Fid=
entity-standards-blog%252Fion-we-have-liftoff%252Fba-p%252F1441555&amp;data=
=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08da006aaec3%7C72f9=
88bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822756956201387%7CUnknown%7CTWFpb=
GZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7=
C2000&amp;sdata=3DO%2FYemSxT96Ju3GxGpQphQCkUixMRci3cvSflSRufHdk%3D&amp;rese=
rved=3D0" target=3D"_blank">
did:ion</a>=C2=A0which is being developed by Microsoft and other DIF member=
s... <br>
The GitHub examples I provided will also work with did:ion.<br>
<br>
Feel free to raise issues on any of the repositories linked, or ask me ques=
tions directly by email if you are not comfortable commenting on a public r=
epo.<br>
<br>
Regards,<br>
<br>
OS<br clear=3D"all">
<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<p class=3D"MsoNormal">-- <u></u><u></u></p>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10pt;font-family:Tahoma,=
sans-serif;color:rgb(53,28,117);background:white">ORIE STEELE</span></b><u>=
</u><u></u></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10pt;font-family:&quot;Aria=
l Narrow&quot;,sans-serif;color:rgb(53,28,117);background:white">Chief Tech=
nical Officer</span><u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.5pt;font-family:Arial,san=
s-serif;color:rgb(53,28,117);background:white"><a href=3D"http://www.transm=
ute.industries" target=3D"_blank">www.transmute.industries</a></span><u></u=
><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><a href=3D"https://nam06.safelinks.protection.outloo=
k.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyqJyZSff0skfwnnG7JR%2Fhtt=
ps%253A%252F%252Fwww.transmute.industries&amp;data=3D04%7C01%7Ckayw%40micro=
soft.com%7C4fa261ad2e11431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011d=
b47%7C1%7C0%7C637822756956201387%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMD=
AiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=3D78P89eU=
SJMqceWK1Pfkl1xZ%2F9MfwbkRUhu12F0EqlFE%3D&amp;reserved=3D0" target=3D"_blan=
k"><span style=3D"font-size:10pt;font-family:&quot;Arial Narrow&quot;,sans-=
serif;text-decoration:none"><img border=3D"0" width=3D"96" height=3D"23" st=
yle=3D"width: 1in; height: 0.243in;" id=3D"gmail-m_-5074551428348721590_x00=
00_i1026" src=3D"https://drive.google.com/a/transmute.industries/uc?id=3D1h=
bftCJoB5KdeV_kzj4eeyS28V3zS9d9c&amp;export=3Ddownload"></span></a><u></u><u=
></u></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal"><img border=3D"0" width=3D"1" height=3D"1" style=3D"=
width: 0.0138in; height: 0.0138in;" id=3D"gmail-m_-5074551428348721590_x000=
0_i1025" src=3D"https://mailfoogae.appspot.com/t?sender=3Dab3JpZUB0cmFuc211=
dGUuaW5kdXN0cmllcw%3D%3D&amp;type=3Dzerocontent&amp;guid=3D76629253-3770-41=
de-9267-75822572b3a6"><span style=3D"font-size:7.5pt;font-family:Gadugi,san=
s-serif;color:white">=E1=90=A7</span><u></u><u></u></p>
</div>
</div>
</div>

</blockquote></div><br clear=3D"all"><div><br></div>-- <br><div dir=3D"ltr"=
 class=3D"gmail_signature"><div dir=3D"ltr"><div><div dir=3D"ltr"><div><div=
 dir=3D"ltr"><div><div dir=3D"ltr"><div><div dir=3D"ltr"><font face=3D"taho=
ma, sans-serif" size=3D"2" color=3D"#351c75"><b style=3D"background-color:r=
gb(255,255,255)">ORIE STEELE</b></font><div><font size=3D"2" face=3D"arial =
narrow, sans-serif" style=3D"background-color:rgb(255,255,255)" color=3D"#3=
51c75">Chief Technical Officer</font></div><div><font style=3D"background-c=
olor:rgb(255,255,255)" color=3D"#351c75" face=3D"arial, helvetica, sans-ser=
if" size=3D"1">www.transmute.industries</font></div><div><font size=3D"2" f=
ace=3D"arial narrow, sans-serif"><br></font></div><div><font size=3D"2" fac=
e=3D"arial narrow, sans-serif"><a href=3D"https://www.transmute.industries"=
 target=3D"_blank"><img src=3D"https://drive.google.com/a/transmute.industr=
ies/uc?id=3D1hbftCJoB5KdeV_kzj4eeyS28V3zS9d9c&amp;export=3Ddownload" width=
=3D"96" height=3D"23"></a><br></font></div></div></div></div></div></div></=
div></div></div></div></div>

--0000000000005621b805da2f3e49--


From nobody Fri Mar 18 07:20:01 2022
Return-Path: <orie@transmute.industries>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 958583A0ADE for <scitt@ietfa.amsl.com>; Fri, 18 Mar 2022 07:19:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.096
X-Spam-Level: 
X-Spam-Status: No, score=-1.096 tagged_above=-999 required=5 tests=[AC_DIV_BONANZA=0.001, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, DOTGOV_IMAGE=1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=transmute.industries
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EbijAx_gwGXZ for <scitt@ietfa.amsl.com>; Fri, 18 Mar 2022 07:19:52 -0700 (PDT)
Received: from mail-lf1-x12c.google.com (mail-lf1-x12c.google.com [IPv6:2a00:1450:4864:20::12c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 500B83A00B2 for <scitt@ietf.org>; Fri, 18 Mar 2022 07:19:51 -0700 (PDT)
Received: by mail-lf1-x12c.google.com with SMTP id w7so14339039lfd.6 for <scitt@ietf.org>; Fri, 18 Mar 2022 07:19:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=transmute.industries; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=QXQYTVhHszSU5+E8ABx0qvlajSo0DaCNXSsfPWuTi40=; b=VhsCzgsPDDSKADtmH1mW6ajWVhzqDMJyenmoN7FtmP+i77n2aMqBlNzwUb9YaFOzdq iheSizrCdPy5pkJnv8EydLicImSgF2XtU1sh09/Xg8eiRhhC/E1E+Sm56nJIEaCdeS0n toTUtKdlL207Z3FNBYDIicvPEdI27X8k2ZWW4W5rfyxE77+PdmqCVvaUqOTDXYyR+i1P +sVRlg0TSn021LUGnYYfYUxmSaNmes+GLjenuy3srDU5nnmleRoIekoL47HyetoielYy MJeRJitTiEzlcZP6M9euZo1Xq1qIaCEosbgf/bg52oWeov7apVebrd2RFO40/coBNXCh 3gUQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=QXQYTVhHszSU5+E8ABx0qvlajSo0DaCNXSsfPWuTi40=; b=iyeFyH9KaTdpV9Fac3WT8xcxKOrFgORL8KhYtPwHV9Jb53GIBH2XfXUjs8D+DjpeN2 ZG7Umb64L1H6NDoJaSnz0qf89FrvTjfGO+hfejKAtTkdyodr0zsxy0OGeN+ewrhvnDZ8 eDcjGTRQ81BTDqRcT7BpNvWiFzAWyVnFp/qlAtrZWXjiVWnbw4BMAtJrkfw1yjZvBbgX FozJj+7bvbhzzzVvNX1TFG0yFvweIURYlx/rJ6KzWWih3bfWnjEawLWk8WRNUr7vQr0b m94podKaAZJ1tPeezVKW7PkcH/UzbaNi5oVy9zBVMgxJxk1YsJz5yAFOt3v6X5Uw8ntK RfVg==
X-Gm-Message-State: AOAM530O1Rcjfy6NWrVf87BfyfGFlCeLGQFukJ17u9ZPn2dx+x5WAIki yfwB5cFtKlpp0zsTUX90D0K2+7Vfh1M0ufg7Ts1s/worcms=
X-Google-Smtp-Source: ABdhPJwPUjiHMO/PkgI2e+GWJW+IrQjtwLdT3yOOKcVjWzlYzAKuH2a96woiMe8+oBMjDo+dNm4NgMVvKTohoL8swOM=
X-Received: by 2002:a19:dc13:0:b0:448:3735:776b with SMTP id t19-20020a19dc13000000b004483735776bmr5830001lfg.77.1647613189689; Fri, 18 Mar 2022 07:19:49 -0700 (PDT)
MIME-Version: 1.0
References: <CAN8C-_K9KBg2DhKOHUf8EMXo5wmTnrEc011e3Q7Y8zFOJsZ-1Q@mail.gmail.com> <DM6PR21MB1148265AA4232ED71CC0D7D8C50C9@DM6PR21MB1148.namprd21.prod.outlook.com> <CAN8C-_J8tThmo2mdMyydP-5A1h9aHReftPDRVD_cZjMnd8=2hA@mail.gmail.com>
In-Reply-To: <CAN8C-_J8tThmo2mdMyydP-5A1h9aHReftPDRVD_cZjMnd8=2hA@mail.gmail.com>
From: Orie Steele <orie@transmute.industries>
Date: Fri, 18 Mar 2022 09:19:38 -0500
Message-ID: <CAN8C-_KGz83+-giHgt9foheLU8rM+jd7mN92PJ+4pKVYbSXbHA@mail.gmail.com>
To: Kay Williams <kayw@microsoft.com>
Cc: "scitt@ietf.org" <scitt@ietf.org>, Sapan Narang <sapan@transmute.industries>
Content-Type: multipart/alternative; boundary="000000000000e62f0b05da7ed61b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/ypAmSiU_-xxyxol38pFy76KN8NM>
Subject: Re: [SCITT] GitHub DIDs & VCs for Supply Chain Traceability
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Mar 2022 14:19:58 -0000

--000000000000e62f0b05da7ed61b
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

I am prepared to present, can you confirm a time.

Regards,

OS

On Mon, Mar 14, 2022 at 10:21 AM Orie Steele <orie@transmute.industries>
wrote:

> Sorry I got to this late.
>
> I can prepare something for the next meeting.
>
> Regards,
>
> OS
>
> On Fri, Mar 11, 2022 at 4:59 PM Kay Williams <kayw@microsoft.com> wrote:
>
>> Hi Orie (and Sapan),
>>
>>
>>
>> Apologies for my late response to your email.  It landed in my spam
>> folder, and I am just now seeing it.  (As a side note, I have now unbloc=
ked
>> all email from ietf.org.)
>>
>>
>>
>> Thank you for sharing this work.  Would you be interested in taking a fe=
w
>> minutes on the agenda at our Monday 3/14 4 PM UTC meeting, or a future
>> meeting, to provide an overview an entertain discussion?
>>
>>
>>
>> Kay
>>
>>
>>
>> *From:* SCITT <scitt-bounces@ietf.org> *On Behalf Of * Orie Steele
>> *Sent:* Monday, March 7, 2022 10:41 AM
>> *To:* scitt@ietf.org
>> *Cc:* Sapan Narang <sapan@transmute.industries>
>> *Subject:* [SCITT] GitHub DIDs & VCs for Supply Chain Traceability
>>
>>
>>
>> Hello,
>>
>> I'm Orie, I work on identifier and credentialing standards at W3C and
>> IETF.
>>
>> My company Transmute
>> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstr=
eaklinks.com%2FA9ifQyqiYqEgkF4xWgxA5Ast%2Fhttps%253A%252F%252Ftransmute.ind=
ustries%252F&data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08=
da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822756956101386%=
7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWw=
iLCJXVCI6Mn0%3D%7C2000&sdata=3D9R5j2qoK1Pwv2blibs6LsjcrxOH6r4wGLA%2Bej0QTow=
E%3D&reserved=3D0>
>> applies these standards to supply traceability (both physical and softwa=
re).
>>
>> Some of our work is funded by DHS SVIP
>> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstr=
eaklinks.com%2FA9ifQyqNTelooObAhwFx98Nw%2Fhttps%253A%252F%252Fwww.dhs.gov%2=
52Fscience-and-technology%252Fsvip&data=3D04%7C01%7Ckayw%40microsoft.com%7C=
4fa261ad2e11431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0=
%7C637822756956151382%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV=
2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=3DaIJmd5v43klp8sTVCwfzXa=
j%2FYaTDlZzcbfUTiEsIULQ%3D&reserved=3D0>,
>> including our work on applying DIDs and VCs to physical supply chain iss=
ues
>> associated with global trade and imports and exports.
>>
>> If you are interested in that work it can be found here:
>> https://w3id.org/traceability
>> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstr=
eaklinks.com%2FA9ifQy2fH6UWEI23iw-vWGEG%2Fhttps%253A%252F%252Fw3id.org%252F=
traceability&data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08=
da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822756956151382%=
7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWw=
iLCJXVCI6Mn0%3D%7C2000&sdata=3DyFaOJyKbjDNmQcAiqsQavv3CSSDpb8xJ1IIP1Iax7jk%=
3D&reserved=3D0>
>> .
>>
>> I wanted to share some very recent (experimental and unstable) work we'v=
e
>> done to enable Decentralized Identifiers
>> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstr=
eaklinks.com%2FA9ifQyqX11lXlzLvQgPI070Q%2Fhttps%253A%252F%252Fwww.w3.org%25=
2FTR%252Fdid-core%252F&data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11=
431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822756=
956151382%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBT=
iI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=3DnRWgY1i%2BR1f7bPsZqjbBsnCzWE99473A=
7KfBFnq31C8%3D&reserved=3D0>
>> and Verifiable Credentials
>> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstr=
eaklinks.com%2FA9ifQymDA7VYHe95RgZjMZKI%2Fhttps%253A%252F%252Fwww.w3.org%25=
2FTR%252Fvc-data-model%252F&data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261a=
d2e11431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378=
22756956151382%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIi=
LCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=3Dyow6DrPjnCMJ8nNo4bdnC2aQqnK2V=
Eaoz%2FNMaAEhjPk%3D&reserved=3D0>
>> to assist with the software supply chain.
>>
>> Here are the links:
>>
>> - https://github.com/transmute-industries/verifiable-actions
>> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstr=
eaklinks.com%2FA9ifQyqXl4mGukfBcw_Wj_Q8%2Fhttps%253A%252F%252Fgithub.com%25=
2Ftransmute-industries%252Fverifiable-actions&data=3D04%7C01%7Ckayw%40micro=
soft.com%7C4fa261ad2e11431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011d=
b47%7C1%7C0%7C637822756956151382%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMD=
AiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=3D8NnTSuiG7Eu=
vwPW8HSFqdgwsEHNGOvVGjGSMsbQ5iWo%3D&reserved=3D0>
>> -
>> https://github.com/transmute-industries/public-credential-registry-templ=
ate
>> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstr=
eaklinks.com%2FA9ifQyuHh9DtUHodDwKXtBBB%2Fhttps%253A%252F%252Fgithub.com%25=
2Ftransmute-industries%252Fpublic-credential-registry-template&data=3D04%7C=
01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08da006aaec3%7C72f988bf86f1=
41af91ab2d7cd011db47%7C1%7C0%7C637822756956151382%7CUnknown%7CTWFpbGZsb3d8e=
yJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sd=
ata=3DzNRyp1Amaglk7M5KtAAAre0g0p4COR2B4MnNw3HyXdA%3D&reserved=3D0>
>>
>> The key idea is to enable github actions to sign and verify credentials
>> that conform to the W3C Verifiable Credentials standard (which in turn
>> supports various envelope formats including JOSE, COSE and PGP).
>>
>> The issuers are identified with W3C Decentralized Identifiers, which
>> provide a layer of interoperability for public key identifier registries=
.
>> The key value of this standard is the ability to support both traditiona=
l
>> public key based identifiers, web resource based identifiers and
>> blockchain based identifiers in the same data model.
>>
>> The examples in the repository links above demonstrate support for these
>> standards using did:key
>> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstr=
eaklinks.com%2FA9ifQyuGxqSDtSpdZABx8eMt%2Fhttps%253A%252F%252Fw3c-ccg.githu=
b.io%252Fdid-method-key%252F&data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261=
ad2e11431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637=
822756956151382%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzI=
iLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=3DZ8q%2B%2B%2B5un6kXFtoJco8Zq%=
2FFQ0SkbAbEA6rIln4Icoik%3D&reserved=3D0> and
>> did:web
>> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstr=
eaklinks.com%2FA9ifQyqsLGN-htS74QXmSanv%2Fhttps%253A%252F%252Fgithub.com%25=
2Fw3c-ccg%252Fdid-method-web&data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261=
ad2e11431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637=
822756956151382%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzI=
iLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=3Duk%2FI2jVLWPstJ8BPNC48FwX%2B=
SIkL7JpkLQSoGZp5R10%3D&reserved=3D0>,
>>
>> however I am one of the editors of the Sidetree Protocol
>> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstr=
eaklinks.com%2FA9ifQyuu7nlpbor7UAurwtjs%2Fhttps%253A%252F%252Fgithub.com%25=
2Fdecentralized-identity%252Fsidetree&data=3D04%7C01%7Ckayw%40microsoft.com=
%7C4fa261ad2e11431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%=
7C0%7C637822756956151382%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIj=
oiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=3Dx46LrtTjutTQOlGxvgO=
fSssV0lt%2FGw3tT2WMOmOOEEQ%3D&reserved=3D0> which
>> is what powers did:ion
>> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstr=
eaklinks.com%2FA9ifQyuxcXKIp3hEOgkQqHLh%2Fhttps%253A%252F%252Ftechcommunity=
.microsoft.com%252Ft5%252Fidentity-standards-blog%252Fion-we-have-liftoff%2=
52Fba-p%252F1441555&data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431=
b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822756956=
201387%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6=
Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=3DO%2FYemSxT96Ju3GxGpQphQCkUixMRci3cvSf=
lSRufHdk%3D&reserved=3D0> which
>> is being developed by Microsoft and other DIF members...
>> The GitHub examples I provided will also work with did:ion.
>>
>> Feel free to raise issues on any of the repositories linked, or ask me
>> questions directly by email if you are not comfortable commenting on a
>> public repo.
>>
>> Regards,
>>
>> OS
>>
>>
>>
>> --
>>
>> *ORIE STEELE*
>>
>> Chief Technical Officer
>>
>> www.transmute.industries
>>
>>
>>
>>
>> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstr=
eaklinks.com%2FA9ifQyqJyZSff0skfwnnG7JR%2Fhttps%253A%252F%252Fwww.transmute=
.industries&data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08d=
a006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822756956201387%7=
CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwi=
LCJXVCI6Mn0%3D%7C2000&sdata=3D78P89eUSJMqceWK1Pfkl1xZ%2F9MfwbkRUhu12F0EqlFE=
%3D&reserved=3D0>
>>
>> =E1=90=A7
>>
>
>
> --
> *ORIE STEELE*
> Chief Technical Officer
> www.transmute.industries
>
> <https://www.transmute.industries>
>


--=20
*ORIE STEELE*
Chief Technical Officer
www.transmute.industries

<https://www.transmute.industries>

--000000000000e62f0b05da7ed61b
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">I am prepared to present, can you confirm a time.<br><br>R=
egards,<br><br>OS</div><br><div class=3D"gmail_quote"><div dir=3D"ltr" clas=
s=3D"gmail_attr">On Mon, Mar 14, 2022 at 10:21 AM Orie Steele &lt;orie@tran=
smute.industries&gt; wrote:<br></div><blockquote class=3D"gmail_quote" styl=
e=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);paddin=
g-left:1ex"><div dir=3D"ltr">Sorry I got to this late.<br><br>I can prepare=
 something for the next meeting.<br><br>Regards,<br><br>OS</div><br><div cl=
ass=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Fri, Mar 11, 2=
022 at 4:59 PM Kay Williams &lt;<a href=3D"mailto:kayw@microsoft.com" targe=
t=3D"_blank">kayw@microsoft.com</a>&gt; wrote:<br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rg=
b(204,204,204);padding-left:1ex">





<div lang=3D"EN-US">
<div>
<p class=3D"MsoNormal">Hi Orie (and Sapan),<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">Apologies for my late response to your email.=C2=A0 =
It landed in my spam folder, and I am just now seeing it.=C2=A0 (As a side =
note, I have now unblocked all email from <a href=3D"http://ietf.org" targe=
t=3D"_blank">ietf.org</a>.)<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">Thank you for sharing this work.=C2=A0 Would you be =
interested in taking a few minutes on the agenda at our Monday 3/14 4 PM UT=
C meeting, or a future meeting, to provide an overview an entertain discuss=
ion?<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal">Kay<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(225,225,225);padding:3pt 0in 0in">
<p class=3D"MsoNormal"><b>From:</b> SCITT &lt;<a href=3D"mailto:scitt-bounc=
es@ietf.org" target=3D"_blank">scitt-bounces@ietf.org</a>&gt; <b>On Behalf =
Of </b>
Orie Steele<br>
<b>Sent:</b> Monday, March 7, 2022 10:41 AM<br>
<b>To:</b> <a href=3D"mailto:scitt@ietf.org" target=3D"_blank">scitt@ietf.o=
rg</a><br>
<b>Cc:</b> Sapan Narang &lt;sapan@transmute.industries&gt;<br>
<b>Subject:</b> [SCITT] GitHub DIDs &amp; VCs for Supply Chain Traceability=
<u></u><u></u></p>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<p class=3D"MsoNormal">Hello,<br>
<br>
I&#39;m Orie, I work on identifier and credentialing standards at W3C and I=
ETF.<br>
<br>
My company <a href=3D"https://nam06.safelinks.protection.outlook.com/?url=
=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyqiYqEgkF4xWgxA5Ast%2Fhttps%253A%25=
2F%252Ftransmute.industries%252F&amp;data=3D04%7C01%7Ckayw%40microsoft.com%=
7C4fa261ad2e11431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7=
C0%7C637822756956101386%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo=
iV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=3D9R5j2qoK1Pwv2bli=
bs6LsjcrxOH6r4wGLA%2Bej0QTowE%3D&amp;reserved=3D0" target=3D"_blank">
Transmute</a> applies these standards to supply traceability (both physical=
=C2=A0and software).<br>
<br>
Some of our work is funded by <a href=3D"https://nam06.safelinks.protection=
.outlook.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyqNTelooObAhwFx98N=
w%2Fhttps%253A%252F%252Fwww.dhs.gov%252Fscience-and-technology%252Fsvip&amp=
;data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08da006aaec3%7=
C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822756956151382%7CUnknown%7C=
TWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0=
%3D%7C2000&amp;sdata=3DaIJmd5v43klp8sTVCwfzXaj%2FYaTDlZzcbfUTiEsIULQ%3D&amp=
;reserved=3D0" target=3D"_blank">
DHS SVIP</a>, including our work on applying DIDs and VCs to physical suppl=
y chain=C2=A0issues associated with global trade and imports and exports.<b=
r>
<br>
If you are interested in that work it can be found here:=C2=A0<a href=3D"ht=
tps://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstreaklin=
ks.com%2FA9ifQy2fH6UWEI23iw-vWGEG%2Fhttps%253A%252F%252Fw3id.org%252Ftracea=
bility&amp;data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08da=
006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822756956151382%7C=
Unknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiL=
CJXVCI6Mn0%3D%7C2000&amp;sdata=3DyFaOJyKbjDNmQcAiqsQavv3CSSDpb8xJ1IIP1Iax7j=
k%3D&amp;reserved=3D0" target=3D"_blank">https://w3id.org/traceability</a>.=
<br>
<br>
I wanted to share some very recent (experimental and unstable) work we&#39;=
ve done to enable
<a href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2=
F%2Fstreaklinks.com%2FA9ifQyqX11lXlzLvQgPI070Q%2Fhttps%253A%252F%252Fwww.w3=
.org%252FTR%252Fdid-core%252F&amp;data=3D04%7C01%7Ckayw%40microsoft.com%7C4=
fa261ad2e11431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%=
7C637822756956151382%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2=
luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=3DnRWgY1i%2BR1f7bPsZq=
jbBsnCzWE99473A7KfBFnq31C8%3D&amp;reserved=3D0" target=3D"_blank">
Decentralized Identifiers</a> and <a href=3D"https://nam06.safelinks.protec=
tion.outlook.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQymDA7VYHe95RgZ=
jMZKI%2Fhttps%253A%252F%252Fwww.w3.org%252FTR%252Fvc-data-model%252F&amp;da=
ta=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08da006aaec3%7C72=
f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822756956151382%7CUnknown%7CTWF=
pbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D=
%7C2000&amp;sdata=3Dyow6DrPjnCMJ8nNo4bdnC2aQqnK2VEaoz%2FNMaAEhjPk%3D&amp;re=
served=3D0" target=3D"_blank">
Verifiable Credentials</a> to assist with the software supply chain.<br>
<br>
Here are the links:<br>
<br>
-=C2=A0<a href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhtt=
ps%3A%2F%2Fstreaklinks.com%2FA9ifQyqXl4mGukfBcw_Wj_Q8%2Fhttps%253A%252F%252=
Fgithub.com%252Ftransmute-industries%252Fverifiable-actions&amp;data=3D04%7=
C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08da006aaec3%7C72f988bf86f=
141af91ab2d7cd011db47%7C1%7C0%7C637822756956151382%7CUnknown%7CTWFpbGZsb3d8=
eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&a=
mp;sdata=3D8NnTSuiG7EuvwPW8HSFqdgwsEHNGOvVGjGSMsbQ5iWo%3D&amp;reserved=3D0"=
 target=3D"_blank">https://github.com/transmute-industries/verifiable-actio=
ns</a><br>
-=C2=A0<a href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhtt=
ps%3A%2F%2Fstreaklinks.com%2FA9ifQyuHh9DtUHodDwKXtBBB%2Fhttps%253A%252F%252=
Fgithub.com%252Ftransmute-industries%252Fpublic-credential-registry-templat=
e&amp;data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08da006aa=
ec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822756956151382%7CUnkno=
wn%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVC=
I6Mn0%3D%7C2000&amp;sdata=3DzNRyp1Amaglk7M5KtAAAre0g0p4COR2B4MnNw3HyXdA%3D&=
amp;reserved=3D0" target=3D"_blank">https://github.com/transmute-industries=
/public-credential-registry-template</a><br>
<br>
The key idea is to enable github actions to sign and verify credentials tha=
t conform to the W3C Verifiable Credentials standard (which in turn support=
s various envelope formats including JOSE, COSE and PGP).<br>
<br>
The issuers are identified=C2=A0with W3C Decentralized Identifiers, which p=
rovide a layer of interoperability for public key identifier=C2=A0registrie=
s.
<br>
The key value of this standard is the ability to support both traditional p=
ublic key based identifiers, web resource based identifiers and blockchain=
=C2=A0based identifiers in the same data model.<br>
<br>
The examples in the repository links above demonstrate support for these st=
andards using
<a href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2=
F%2Fstreaklinks.com%2FA9ifQyuGxqSDtSpdZABx8eMt%2Fhttps%253A%252F%252Fw3c-cc=
g.github.io%252Fdid-method-key%252F&amp;data=3D04%7C01%7Ckayw%40microsoft.c=
om%7C4fa261ad2e11431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C=
1%7C0%7C637822756956151382%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQ=
IjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=3DZ8q%2B%2B%2B5=
un6kXFtoJco8Zq%2FFQ0SkbAbEA6rIln4Icoik%3D&amp;reserved=3D0" target=3D"_blan=
k">
did:key</a>=C2=A0and <a href=3D"https://nam06.safelinks.protection.outlook.=
com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyqsLGN-htS74QXmSanv%2Fhttps=
%253A%252F%252Fgithub.com%252Fw3c-ccg%252Fdid-method-web&amp;data=3D04%7C01=
%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08da006aaec3%7C72f988bf86f141=
af91ab2d7cd011db47%7C1%7C0%7C637822756956151382%7CUnknown%7CTWFpbGZsb3d8eyJ=
WIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;=
sdata=3Duk%2FI2jVLWPstJ8BPNC48FwX%2BSIkL7JpkLQSoGZp5R10%3D&amp;reserved=3D0=
" target=3D"_blank">
did:web</a>, <br>
however I am one of the editors of the=C2=A0<a href=3D"https://nam06.safeli=
nks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyuu7=
nlpbor7UAurwtjs%2Fhttps%253A%252F%252Fgithub.com%252Fdecentralized-identity=
%252Fsidetree&amp;data=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b1=
8be08da006aaec3%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63782275695615=
1382%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik=
1haWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=3Dx46LrtTjutTQOlGxvgOfSssV0lt%2FGw3tT=
2WMOmOOEEQ%3D&amp;reserved=3D0" target=3D"_blank">Sidetree
 Protocol</a>=C2=A0which is what powers <a href=3D"https://nam06.safelinks.=
protection.outlook.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyuxcXKIp=
3hEOgkQqHLh%2Fhttps%253A%252F%252Ftechcommunity.microsoft.com%252Ft5%252Fid=
entity-standards-blog%252Fion-we-have-liftoff%252Fba-p%252F1441555&amp;data=
=3D04%7C01%7Ckayw%40microsoft.com%7C4fa261ad2e11431b18be08da006aaec3%7C72f9=
88bf86f141af91ab2d7cd011db47%7C1%7C0%7C637822756956201387%7CUnknown%7CTWFpb=
GZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7=
C2000&amp;sdata=3DO%2FYemSxT96Ju3GxGpQphQCkUixMRci3cvSflSRufHdk%3D&amp;rese=
rved=3D0" target=3D"_blank">
did:ion</a>=C2=A0which is being developed by Microsoft and other DIF member=
s... <br>
The GitHub examples I provided will also work with did:ion.<br>
<br>
Feel free to raise issues on any of the repositories linked, or ask me ques=
tions directly by email if you are not comfortable commenting on a public r=
epo.<br>
<br>
Regards,<br>
<br>
OS<br clear=3D"all">
<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<p class=3D"MsoNormal">-- <u></u><u></u></p>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10pt;font-family:Tahoma,=
sans-serif;color:rgb(53,28,117);background:white">ORIE STEELE</span></b><u>=
</u><u></u></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10pt;font-family:&quot;Aria=
l Narrow&quot;,sans-serif;color:rgb(53,28,117);background:white">Chief Tech=
nical Officer</span><u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.5pt;font-family:Arial,san=
s-serif;color:rgb(53,28,117);background:white"><a href=3D"http://www.transm=
ute.industries" target=3D"_blank">www.transmute.industries</a></span><u></u=
><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><a href=3D"https://nam06.safelinks.protection.outloo=
k.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyqJyZSff0skfwnnG7JR%2Fhtt=
ps%253A%252F%252Fwww.transmute.industries&amp;data=3D04%7C01%7Ckayw%40micro=
soft.com%7C4fa261ad2e11431b18be08da006aaec3%7C72f988bf86f141af91ab2d7cd011d=
b47%7C1%7C0%7C637822756956201387%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMD=
AiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&amp;sdata=3D78P89eU=
SJMqceWK1Pfkl1xZ%2F9MfwbkRUhu12F0EqlFE%3D&amp;reserved=3D0" target=3D"_blan=
k"><span style=3D"font-size:10pt;font-family:&quot;Arial Narrow&quot;,sans-=
serif;text-decoration:none"><img border=3D"0" width=3D"96" height=3D"23" st=
yle=3D"width: 1in; height: 0.243in;" id=3D"gmail-m_-9073946800994513343gmai=
l-m_-5074551428348721590_x0000_i1026" src=3D"https://drive.google.com/a/tra=
nsmute.industries/uc?id=3D1hbftCJoB5KdeV_kzj4eeyS28V3zS9d9c&amp;export=3Ddo=
wnload"></span></a><u></u><u></u></p>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal"><img border=3D"0" width=3D"1" height=3D"1" style=3D"=
width: 0.0138in; height: 0.0138in;" id=3D"gmail-m_-9073946800994513343gmail=
-m_-5074551428348721590_x0000_i1025" src=3D"https://mailfoogae.appspot.com/=
t?sender=3Dab3JpZUB0cmFuc211dGUuaW5kdXN0cmllcw%3D%3D&amp;type=3Dzerocontent=
&amp;guid=3D76629253-3770-41de-9267-75822572b3a6"><span style=3D"font-size:=
7.5pt;font-family:Gadugi,sans-serif;color:white">=E1=90=A7</span><u></u><u>=
</u></p>
</div>
</div>
</div>

</blockquote></div><br clear=3D"all"><div><br></div>-- <br><div dir=3D"ltr"=
><div dir=3D"ltr"><div><div dir=3D"ltr"><div><div dir=3D"ltr"><div><div dir=
=3D"ltr"><div><div dir=3D"ltr"><font face=3D"tahoma, sans-serif" size=3D"2"=
 color=3D"#351c75"><b style=3D"background-color:rgb(255,255,255)">ORIE STEE=
LE</b></font><div><font size=3D"2" face=3D"arial narrow, sans-serif" style=
=3D"background-color:rgb(255,255,255)" color=3D"#351c75">Chief Technical Of=
ficer</font></div><div><font style=3D"background-color:rgb(255,255,255)" co=
lor=3D"#351c75" face=3D"arial, helvetica, sans-serif" size=3D"1">www.transm=
ute.industries</font></div><div><font size=3D"2" face=3D"arial narrow, sans=
-serif"><br></font></div><div><font size=3D"2" face=3D"arial narrow, sans-s=
erif"><a href=3D"https://www.transmute.industries" target=3D"_blank"><img s=
rc=3D"https://drive.google.com/a/transmute.industries/uc?id=3D1hbftCJoB5Kde=
V_kzj4eeyS28V3zS9d9c&amp;export=3Ddownload" width=3D"96" height=3D"23"></a>=
<br></font></div></div></div></div></div></div></div></div></div></div></di=
v>
</blockquote></div><br clear=3D"all"><div><br></div>-- <br><div dir=3D"ltr"=
 class=3D"gmail_signature"><div dir=3D"ltr"><div><div dir=3D"ltr"><div><div=
 dir=3D"ltr"><div><div dir=3D"ltr"><div><div dir=3D"ltr"><font face=3D"taho=
ma, sans-serif" size=3D"2" color=3D"#351c75"><b style=3D"background-color:r=
gb(255,255,255)">ORIE STEELE</b></font><div><font size=3D"2" face=3D"arial =
narrow, sans-serif" style=3D"background-color:rgb(255,255,255)" color=3D"#3=
51c75">Chief Technical Officer</font></div><div><font style=3D"background-c=
olor:rgb(255,255,255)" color=3D"#351c75" face=3D"arial, helvetica, sans-ser=
if" size=3D"1">www.transmute.industries</font></div><div><font size=3D"2" f=
ace=3D"arial narrow, sans-serif"><br></font></div><div><font size=3D"2" fac=
e=3D"arial narrow, sans-serif"><a href=3D"https://www.transmute.industries"=
 target=3D"_blank"><img src=3D"https://drive.google.com/a/transmute.industr=
ies/uc?id=3D1hbftCJoB5KdeV_kzj4eeyS28V3zS9d9c&amp;export=3Ddownload" width=
=3D"96" height=3D"23"></a><br></font></div></div></div></div></div></div></=
div></div></div></div></div>

--000000000000e62f0b05da7ed61b--


From nobody Fri Mar 18 09:54:31 2022
Return-Path: <antdl@microsoft.com>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 90CC63A0D32 for <scitt@ietfa.amsl.com>; Fri, 18 Mar 2022 09:54:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.098
X-Spam-Level: 
X-Spam-Status: No, score=-6.098 tagged_above=-999 required=5 tests=[AC_DIV_BONANZA=0.001, BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, DOTGOV_IMAGE=1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4BMtlIMzqOiH for <scitt@ietfa.amsl.com>; Fri, 18 Mar 2022 09:54:23 -0700 (PDT)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-db5eur03on0710.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe0a::710]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E3C323A0D1D for <scitt@ietf.org>; Fri, 18 Mar 2022 09:54:22 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Ms2f0oN3WDUvug0rs3nsTDFllpruwFSxXlTHeODiHQ+9zv8/DtInnVUE+cIq0tecHoBc7YlMu/ZAw0fqhv1cFQ49DGY4se2tc4DMf9rlErEjNF3yAkaPiZqvM/6fOS2zjkvEA+TrUx07G7XHNQlugsAWb86sk3BiRbyINO3roplECNYp5a7WN0XyTBxJhGVVKl9Nf5A9KcK+bxXhnVHPSiSwhFMDmLpcszZYz7cyyc86dwCS89a1uhD6kyGydznqkBcWPkp63fLhBVkHTp37EjAk61T/YrUvpPJWWdJzHa1V1swILZCfA9jF5Mx1i9wEGmQzOLWIiNGVJ8JmWA3D4A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Tp1sZd2V01MQIe1f+sz0+hdYtX+Lcro3ZFR9i/U//4U=; b=AP/TwbjVRZ7ymIB5Z3CWcXMgDFQR9L6QTU0L4JF39k2T4+YKT51xiIu9PpV5E+DlbOlp/qxPmph1jIT2YTiIPvE375MFtk+MBC1qmHABBtaTZnKpnEnIKu9lEDsNgc7b4Y/6MFd6pa/iv5m9Qf4TURP0YJj05QfjDgyH2bfTyJCGjLbfbFBSylbCgPdheE6GPZOh6TPPRaSw3pmN0UkUykI92bXy4b0Nsrm46ek6YeFH+CuhHSpTPLSZk9k3P6NIZEXQdOskDt94kdIXpYYlflzhAxOw6GT7Fm8tBvpxDuarFgNUHDmbNOIx7nQmqwDntKFXqdxrKAdoGzV91E/5CA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Tp1sZd2V01MQIe1f+sz0+hdYtX+Lcro3ZFR9i/U//4U=; b=PnepHulTFoOIw5soGls3WYN6P4KcIH/QIjk3GDgV1Vzi5om99GIx6ssalQ7UbjXPc+wUxkNqwrzOIBNRcADbQfmbQwl7HGemi+aouMjz6kBKlijCvTBVdM7fEXiMtRJY+84gqPyWZEgOFri/MFXNq5ducqYqMA1hS4UioSbEqZE=
Received: from AM5PR83MB0372.EURPRD83.prod.outlook.com (2603:10a6:206:25::13) by AM5PR83MB0195.EURPRD83.prod.outlook.com (2603:10a6:224:e::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.1; Fri, 18 Mar 2022 16:54:15 +0000
Received: from AM5PR83MB0372.EURPRD83.prod.outlook.com ([fe80::2522:e346:6a88:d4f]) by AM5PR83MB0372.EURPRD83.prod.outlook.com ([fe80::2522:e346:6a88:d4f%3]) with mapi id 15.20.5102.012; Fri, 18 Mar 2022 16:54:15 +0000
From: Antoine Delignat-Lavaud <antdl@microsoft.com>
To: Orie Steele <orie@transmute.industries>, Kay Williams <kayw@microsoft.com>
CC: Sapan Narang <sapan@transmute.industries>, "scitt@ietf.org" <scitt@ietf.org>
Thread-Topic: [EXTERNAL] Re: [SCITT] GitHub DIDs & VCs for Supply Chain Traceability
Thread-Index: AQHYNZut+Hm/BawUW0a6HN1SAg8FcKy/A0MAgAY37ACAACbAIA==
Date: Fri, 18 Mar 2022 16:54:14 +0000
Message-ID: <AM5PR83MB03726CB108BDE97A152E91D3B2139@AM5PR83MB0372.EURPRD83.prod.outlook.com>
References: <CAN8C-_K9KBg2DhKOHUf8EMXo5wmTnrEc011e3Q7Y8zFOJsZ-1Q@mail.gmail.com> <DM6PR21MB1148265AA4232ED71CC0D7D8C50C9@DM6PR21MB1148.namprd21.prod.outlook.com> <CAN8C-_J8tThmo2mdMyydP-5A1h9aHReftPDRVD_cZjMnd8=2hA@mail.gmail.com> <CAN8C-_KGz83+-giHgt9foheLU8rM+jd7mN92PJ+4pKVYbSXbHA@mail.gmail.com>
In-Reply-To: <CAN8C-_KGz83+-giHgt9foheLU8rM+jd7mN92PJ+4pKVYbSXbHA@mail.gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=9f7cadd2-0be0-4abd-9320-f44eaa23947f; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2022-03-18T16:38:19Z;  MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47;
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 5bbd7250-494f-49a5-31e9-08da08ffef5e
x-ms-traffictypediagnostic: AM5PR83MB0195:EE_
x-ms-exchange-atpmessageproperties: SA|SL
x-microsoft-antispam-prvs: <AM5PR83MB0195148CB8808281339F1E50B2139@AM5PR83MB0195.EURPRD83.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:AM5PR83MB0372.EURPRD83.prod.outlook.com; PTR:; CAT:NONE;  SFS:(13230001)(4636009)(366004)(451199009)(54906003)(110136005)(6636002)(316002)(8676002)(508600001)(186003)(9686003)(7696005)(6506007)(966005)(26005)(53546011)(71200400001)(10290500003)(76236003)(2906002)(55016003)(38070700005)(52536014)(5660300002)(8990500004)(86362001)(83380400001)(99936003)(82960400001)(82950400001)(166002)(76116006)(4326008)(66446008)(64756008)(66556008)(66476007)(66946007)(33656002)(9326002)(8936002)(122000001)(38100700002)(99710200001)(10090945011); DIR:OUT; SFP:1102; 
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?cCtpVzVtWkk4TGNiMm9RUmF2WFo1UVpybWdzbUdBWXhFc2tISC9rdUh1aW9P?= =?utf-8?B?d2JZcjFvdnZOcmIwTldwMTNsSVRzaDJqTTdpUHZGUlREVkttYUI0Z2Myb0xR?= =?utf-8?B?cFREK0lPWVJxWktZUlBxaXNZUHBLcjU5SndLT0N3b0d3VDhISlpCWWpNb3N4?= =?utf-8?B?YUJCQTZ1ejhIOVYvTmR2MFhNdzVYMkhGTG5zUTM2RjhGVTZIcG9OOE94Ylly?= =?utf-8?B?VU04N0w0VEhGUGtiLzJDK295RTNnTkpVVXFRUnMrRDNFTmdwR09KYWpieFpU?= =?utf-8?B?ZHcvY2NnRWFMTTZ1ZjVMbE9LZjl0N2U4dXZkSlJnU2YxRlo4aGRacVBGVnE2?= =?utf-8?B?L0xIMkxVenhrbnpxdWtCSHBQUUdhOCtNd1FjY3h6R05mU29pdFJYaWl0bzVk?= =?utf-8?B?bXZKVGk3NGl4bEM4Sys4V09UYVpRSGNmQ3VsRmI5Mkh5aVlrNDZzMEJNaml1?= =?utf-8?B?REZUOU5KU1FxOUdtdnVwdm56VTJKUC9wN29SaWY5U1hRUWgyaU94NGxrKzF3?= =?utf-8?B?czA5K0FRczVNQVpNREx6eTVXUDg2LzRBakdaZ0dFOS84N29WUCtNaTNINCsv?= =?utf-8?B?YXRBOEpNR0JndjFkRXlTRUJueStmeXRvRVZqNlFOZS9Fc3JSUytFVHhzMlFl?= =?utf-8?B?eFAxZytQeE0wU1FyVGFGTGdneTh3cFhROUlMZncwUnc4NnRuWHVISFBEQWlD?= =?utf-8?B?UE1lRm5rVnlJc1hwVGQwQU9BKzNVaGJBT0t1NzUrbkR4SCtZbEIyZHFjcU5t?= =?utf-8?B?RHgzeXFvS0xlYTVlZzRGVCttdEphRk9DVmJtZjhxdkVMSUNUTVFXN1VMY2J6?= =?utf-8?B?dm9kUzBDRkowamRmeEp4bXhQdFdWVG5yVDA2Q2UzMjRlS0UxNGdTekJ4eGZh?= =?utf-8?B?V1lCeEtDbjVybTZ1UVNuUEkzdkpLZjZkRGVZZk1pTVBjZlJ2QVRwbHdXOUpT?= =?utf-8?B?SXFkc3ZCTVJCSFFLeDFvTVE1MFB2SVZ5MmhUOXQzdk9RWUNUeTRQckxzay9n?= =?utf-8?B?N1hBaEQ1VlZyUUppTm8xbWhFdncwZitPempNTThXZUVqN2psdVFMWWNmQ2hC?= =?utf-8?B?OVZtVWxtRmFJT0tsYmVFZXNQc1ErZkJZRWhhYzhodFd4RzlQU3VoZUNPbEpN?= =?utf-8?B?YlNodHNHNkJEZFFLRUo5OXNRUW90dCtsUHhUaFhKKzdiWVdNNWg4NTVvbHNv?= =?utf-8?B?TVpsNnh3VGVqb3dmamUvdVBUMUoxemVUWkl4dHo3VTJwR3FXeVNCelkxRzJI?= =?utf-8?B?bkRRbWFyZEJ1ci9NMVVnSVJOUFl3WnJDQ2MxMGdjOXpFWnFCZ3d3M0RSTFZY?= =?utf-8?B?c2N3ckJremtaZmNkdXlHb0MvU2tDYkNHRGNhMTZZWmRGam9mWTRlMnpubUZp?= =?utf-8?B?RWtPSnIxdiszT3NRK2NqVGJsNlQrYlRVZmNWZWNqRllubmdmeGFmUENNaWln?= =?utf-8?B?cnU0dC93MHc4ZFJnQTY2QWV2THhGa2t2N1J2amdGeFVNVkl4Q0JIcU5WSEJs?= =?utf-8?B?b0ZhVitOSGdua2w2YWtibXY0VldZMVNnSGx3VDdEd3JRYnlmdzUwcDUwd1NX?= =?utf-8?B?NmR1RVVUaXdzNUFDdUkzR1o4S1RTNFdzY1NwR3lieStyaVpzd25kSmJTblZ2?= =?utf-8?B?eTZLUFJna1lmMHF0aDQ0RUlGOHFhV2ZhZlVpbHpvZFdnR055NVd5MExqVmN3?= =?utf-8?B?MGI2R0UrSVJmTTh4cCtwRitLTW5wbmZIODR0SmJmVEg3Qm9Pa3dQWEl2SEtD?= =?utf-8?B?Sm9EeWdVa1YxN09uUFhCbnJpTFBLbUtCaFVMTXBvSFNoY05sSHVITTM0YzhP?= =?utf-8?B?MGF4T0JSZTFxcnl2UnVlMDIrSE1iSlptNU5jSzBUYWNRZ1lDQkRTWmxVei9J?= =?utf-8?B?ek5oQnJ1bkcxTlVPZXpWZGdMa01UemFTUDN3bHJqdW5OYS9SYkdCVUgzaDB5?= =?utf-8?B?b3A3cmQ1dTBNZ2dBTVZwcm5Bb1d4Y3BDcGJTNEhqUHc2QnlZN0tVanA1bU5V?= =?utf-8?B?Yjl3bzlMa0V3U0ZJMHdGMHltVXMyKytJSEZJT3dyVTR1UkVJbVR2WmE0Mkg4?= =?utf-8?B?aC9XZFlHWmhxdzNFUmVWMTgvUFRYODZRbi9RMnRJSnNDbCsxN2w5UDEvWlpn?= =?utf-8?B?eCtnMStUcitkb2JGWTF6SzNWLzNTM21wR09CQnFuU3Bmc3JyNHoraTh6SU0y?= =?utf-8?B?bEV0ZlpOdFpHa0I5S2hMczYvZzU4QzBGbzdqa3d4cDBHaExyS0pUaVYrNDQy?= =?utf-8?B?cGduN3Fmc1VyL0VEQVAvVW1qN2dxVzMzSm40c2FiNS9PVzNTNExoUitSOXFk?= =?utf-8?B?MHJDMmxGUnNhMWtySEd5bTRCb2FFdUltamR2aTZ5eFdLWm4vOUV0QT09?=
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_001D_01D83AE8.CBEB9FB0"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM5PR83MB0372.EURPRD83.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5bbd7250-494f-49a5-31e9-08da08ffef5e
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Mar 2022 16:54:15.0007 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: zaQpnEs2KZnpcKiN8YCV/LDrG2ur7GDOVO3OedGb7jdHPiHoCBJRF2jwcL8UZ53jhOecybur2V5y6UKkUiE0zA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR83MB0195
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/EomRFIEXZOWEHK5hlRTzz2xg8KM>
Subject: Re: [SCITT] [EXTERNAL] Re: GitHub DIDs & VCs for Supply Chain Traceability
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Mar 2022 16:54:29 -0000

------=_NextPart_000_001D_01D83AE8.CBEB9FB0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_001E_01D83AE8.CBEB9FB0"


------=_NextPart_001_001E_01D83AE8.CBEB9FB0
Content-Type: text/plain;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

Hi Orie,

=20

Is there any follow up to the W3C Traceability Vocabulary document? It =
has some good context and terminology on supply chain security but =
doesn=E2=80=99t seem to offer any concrete solution or improvement.=20

=20

Antoine

=20

From: SCITT <scitt-bounces@ietf.org> On Behalf Of Orie Steele
Sent: 18 March 2022 14:20
To: Kay Williams <kayw@microsoft.com>
Cc: Sapan Narang <sapan@transmute.industries>; scitt@ietf.org
Subject: [EXTERNAL] Re: [SCITT] GitHub DIDs & VCs for Supply Chain =
Traceability

=20

=09
Some people who received this message don't often get email from =
orie@transmute.industries <mailto:orie@transmute.industries> . Learn why =
this is important <http://aka.ms/LearnAboutSenderIdentification>=20

=09

I am prepared to present, can you confirm a time.

Regards,

OS

=20

On Mon, Mar 14, 2022 at 10:21 AM Orie Steele <orie@transmute.industries =
<mailto:orie@transmute.industries> > wrote:

Sorry I got to this late.

I can prepare something for the next meeting.

Regards,

OS

=20

On Fri, Mar 11, 2022 at 4:59 PM Kay Williams <kayw@microsoft.com =
<mailto:kayw@microsoft.com> > wrote:

Hi Orie (and Sapan),

=20

Apologies for my late response to your email.  It landed in my spam =
folder, and I am just now seeing it.  (As a side note, I have now =
unblocked all email from ietf.org =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fietf.=
org%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc634008538808da0=
8ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832101843394128%7=
CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haW=
wiLCJXVCI6Mn0%3D%7C3000&sdata=3DZYSZJV0zxzL3rq%2FSEi7Zvc8KyOPbN3p0hHhizva=
AMBo%3D&reserved=3D0> .)

=20

Thank you for sharing this work.  Would you be interested in taking a =
few minutes on the agenda at our Monday 3/14 4 PM UTC meeting, or a =
future meeting, to provide an overview an entertain discussion?

=20

Kay

=20

From: SCITT <scitt-bounces@ietf.org <mailto:scitt-bounces@ietf.org> > On =
Behalf Of Orie Steele
Sent: Monday, March 7, 2022 10:41 AM
To: scitt@ietf.org <mailto:scitt@ietf.org>=20
Cc: Sapan Narang <sapan@transmute.industries =
<mailto:sapan@transmute.industries> >
Subject: [SCITT] GitHub DIDs & VCs for Supply Chain Traceability

=20

Hello,

I'm Orie, I work on identifier and credentialing standards at W3C and =
IETF.

My company Transmute =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqiYqEgkF4xWgxA5Ast%2Fhttps%253A%252F%252Ftransmute.in=
dustries%252F&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc63400853=
8808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378321018433=
94128%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI=
6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D6thfhO%2FamDDW8VGe3vWFAMtCgRberjlJ=
SnsK3U7nS%2BI%3D&reserved=3D0>  applies these standards to supply =
traceability (both physical and software).

Some of our work is funded by DHS SVIP =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqNTelooObAhwFx98Nw%2Fhttps%253A%252F%252Fwww.dhs.gov%=
252Fscience-and-technology%252Fsvip&data=3D04%7C01%7Cantdl%40microsoft.co=
m%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7=
C1%7C0%7C637832101843394128%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiL=
CJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DPNClBX7s6LJw=
TCK58IWoeCknvUmXb%2BuU5bprqb%2BXHDY%3D&reserved=3D0> , including our =
work on applying DIDs and VCs to physical supply chain issues associated =
with global trade and imports and exports.

If you are interested in that work it can be found here: =
https://w3id.org/traceability =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQy2fH6UWEI23iw-vWGEG%2Fhttps%253A%252F%252Fw3id.org%252=
Ftraceability&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc63400853=
8808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378321018435=
94123%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI=
6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DjgUMxbIp3iypuGXzrGuBiuxsGd76ky1o%2=
FhQ0iCt5%2Fco%3D&reserved=3D0> .

I wanted to share some very recent (experimental and unstable) work =
we've done to enable Decentralized Identifiers =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqX11lXlzLvQgPI070Q%2Fhttps%253A%252F%252Fwww.w3.org%2=
52FTR%252Fdid-core%252F&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4=
fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637=
832101843594123%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luM=
zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DhUDex2umg%2BhGKce2k%2FwM=
ryNpSPu7v2VRlUVGiZd%2F6%2F0%3D&reserved=3D0>  and Verifiable Credentials =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQymDA7VYHe95RgZjMZKI%2Fhttps%253A%252F%252Fwww.w3.org%2=
52FTR%252Fvc-data-model%252F&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f=
0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%=
7C637832101843594123%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoi=
V2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DHho%2BgX2VaeoztUkVX=
kLF67fxrmgDKFw6FrlNnEM0d60%3D&reserved=3D0>  to assist with the software =
supply chain.

Here are the links:

- https://github.com/transmute-industries/verifiable-actions =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqXl4mGukfBcw_Wj_Q8%2Fhttps%253A%252F%252Fgithub.com%2=
52Ftransmute-industries%252Fverifiable-actions&data=3D04%7C01%7Cantdl%40m=
icrosoft.com%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7=
cd011db47%7C1%7C0%7C637832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC=
4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D0=
BNa54C%2BKPAm5nma%2BUSqMZAGyabQwEzkjc3Z0itYA1A%3D&reserved=3D0>=20
- =
https://github.com/transmute-industries/public-credential-registry-templa=
te

The key idea is to enable github actions to sign and verify credentials =
that conform to the W3C Verifiable Credentials standard (which in turn =
supports various envelope formats including JOSE, COSE and PGP).

The issuers are identified with W3C Decentralized Identifiers, which =
provide a layer of interoperability for public key identifier =
registries.=20
The key value of this standard is the ability to support both =
traditional public key based identifiers, web resource based identifiers =
and blockchain based identifiers in the same data model.

The examples in the repository links above demonstrate support for these =
standards using did:key =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyuGxqSDtSpdZABx8eMt%2Fhttps%253A%252F%252Fw3c-ccg.gith=
ub.io%252Fdid-method-key%252F&data=3D04%7C01%7Cantdl%40microsoft.com%7C93=
f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0=
%7C637832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo=
iV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D%2BAomrNyRCdpgcDwt=
BVsOpofiATZOz7ff%2Fvj%2Bs7bk%2B%2F4%3D&reserved=3D0>  and did:web =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqsLGN-htS74QXmSanv%2Fhttps%253A%252F%252Fgithub.com%2=
52Fw3c-ccg%252Fdid-method-web&data=3D04%7C01%7Cantdl%40microsoft.com%7C93=
f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0=
%7C637832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo=
iV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DVzdlDZTCiJBVFv1mok=
eAoxf14VKj9Jd13jrM%2FYCgW3w%3D&reserved=3D0> ,=20
however I am one of the editors of the Sidetree Protocol =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyuu7nlpbor7UAurwtjs%2Fhttps%253A%252F%252Fgithub.com%2=
52Fdecentralized-identity%252Fsidetree&data=3D04%7C01%7Cantdl%40microsoft=
.com%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db4=
7%7C1%7C0%7C637832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMD=
AiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DpKAHmQOym=
eq1gquTJPcxijcBxuAc%2FkRrWi6UpUxIWhs%3D&reserved=3D0>  which is what =
powers did:ion which is being developed by Microsoft and other DIF =
members...=20
The GitHub examples I provided will also work with did:ion.

Feel free to raise issues on any of the repositories linked, or ask me =
questions directly by email if you are not comfortable commenting on a =
public repo.

Regards,

OS


=20

--=20

ORIE STEELE

Chief Technical Officer

www.transmute.industries =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.t=
ransmute.industries%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4f=
c634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378=
32101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMz=
IiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3Dpv3xaPyy8Uw4RynudDGggy7dl=
HtWZgjLUIQx5rWK%2F8I%3D&reserved=3D0>=20

=20

 =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqJyZSff0skfwnnG7JR%2Fhttps%253A%252F%252Fwww.transmut=
e.industries&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc634008538=
808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63783210184364=
4104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6=
Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DC3QvbpZsKWPV8FA2TfnHHF5O%2FNZfJv8Sx=
CoSSuVA3wk%3D&reserved=3D0>=20

  =
<https://mailfoogae.appspot.com/t?sender=3Dab3JpZUB0cmFuc211dGUuaW5kdXN0c=
mllcw%3D%3D&type=3Dzerocontent&guid=3D76629253-3770-41de-9267-75822572b3a=
6> =E1=90=A7




=20

--=20

ORIE STEELE=20

Chief Technical Officer

www.transmute.industries <http://www.transmute.industries>=20

=20

 =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.=
transmute.industries%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4=
fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637=
832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luM=
zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D3M8AJs5OxbUjF13cqJx9TLay=
J2wdxuNAx1QG6dXk6vc%3D&reserved=3D0>=20




=20

--=20

ORIE STEELE=20

Chief Technical Officer

www.transmute.industries <http://www.transmute.industries>=20

=20

 =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.=
transmute.industries%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4=
fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637=
832101843694104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luM=
zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3Dwl7DU8CV3SPJb5xgqdl3MRYz=
wK4bBeux16YPNbmcPus%3D&reserved=3D0>=20


------=_NextPart_001_001E_01D83AE8.CBEB9FB0
Content-Type: text/html;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta =
name=3DGenerator content=3D"Microsoft Word 15 (filtered medium)"><!--[if =
!mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Gadugi;
	panose-1:2 11 5 2 4 2 4 2 2 3;}
@font-face
	{font-family:"Segoe UI";
	panose-1:2 11 5 2 4 2 4 2 2 3;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Arial Narrow";
	panose-1:2 11 6 6 2 2 2 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-GB link=3Dblue =
vlink=3Dpurple style=3D'word-wrap:break-word'><div =
class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'mso-fareast-language:EN-US'>Hi Orie,<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'mso-fareast-language:EN-US'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span style=3D'mso-fareast-language:EN-US'>Is there =
any follow up to the W3C Traceability Vocabulary document? It has some =
good context and terminology on supply chain security but =
doesn=E2=80=99t seem to offer any concrete solution or improvement. =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'mso-fareast-language:EN-US'><o:p>&nbsp;</o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'mso-fareast-language:EN-US'>Antoine<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'mso-fareast-language:EN-US'><o:p>&nbsp;</o:p></span></p><div><di=
v style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0cm =
0cm 0cm'><p class=3DMsoNormal><b><span =
lang=3DEN-US>From:</span></b><span lang=3DEN-US> SCITT =
&lt;scitt-bounces@ietf.org&gt; <b>On Behalf Of </b>Orie =
Steele<br><b>Sent:</b> 18 March 2022 14:20<br><b>To:</b> Kay Williams =
&lt;kayw@microsoft.com&gt;<br><b>Cc:</b> Sapan Narang =
&lt;sapan@transmute.industries&gt;; scitt@ietf.org<br><b>Subject:</b> =
[EXTERNAL] Re: [SCITT] GitHub DIDs &amp; VCs for Supply Chain =
Traceability<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><table class=3DMsoNormalTable =
border=3D0 cellspacing=3D0 cellpadding=3D0 align=3Dleft width=3D"100%" =
style=3D'width:100.0%'><tr><td =
style=3D'background:#A6A6A6;padding:5.25pt 1.5pt 5.25pt 1.5pt'></td><td =
width=3D"100%" style=3D'width:100.0%;background:#EAEAEA;padding:5.25pt =
3.75pt 5.25pt 11.25pt'><div><p class=3DMsoNormal =
style=3D'mso-element:frame;mso-element-frame-hspace:2.25pt;mso-element-wr=
ap:around;mso-element-anchor-vertical:paragraph;mso-element-anchor-horizo=
ntal:column;mso-height-rule:exactly'><span =
style=3D'font-size:9.0pt;font-family:"Segoe =
UI",sans-serif;color:#212121'>Some people who received this message =
don't often get email from <a =
href=3D"mailto:orie@transmute.industries">orie@transmute.industries</a>. =
<a href=3D"http://aka.ms/LearnAboutSenderIdentification">Learn why this =
is important</a><o:p></o:p></span></p></div></td><td width=3D75 =
style=3D'width:56.25pt;background:#EAEAEA;padding:5.25pt 3.75pt 5.25pt =
3.75pt;align:left'></td></tr></table><div><div><p class=3DMsoNormal>I am =
prepared to present, can you confirm a =
time.<br><br>Regards,<br><br>OS<o:p></o:p></p></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><p class=3DMsoNormal>On =
Mon, Mar 14, 2022 at 10:21 AM Orie Steele &lt;<a =
href=3D"mailto:orie@transmute.industries">orie@transmute.industries</a>&g=
t; wrote:<o:p></o:p></p></div><blockquote =
style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0cm 0cm 0cm =
6.0pt;margin-left:4.8pt;margin-right:0cm'><div><p =
class=3DMsoNormal>Sorry I got to this late.<br><br>I can prepare =
something for the next =
meeting.<br><br>Regards,<br><br>OS<o:p></o:p></p></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><p class=3DMsoNormal>On =
Fri, Mar 11, 2022 at 4:59 PM Kay Williams &lt;<a =
href=3D"mailto:kayw@microsoft.com" =
target=3D"_blank">kayw@microsoft.com</a>&gt; =
wrote:<o:p></o:p></p></div><blockquote =
style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0cm 0cm 0cm =
6.0pt;margin-left:4.8pt;margin-right:0cm'><div><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>Hi Orie (and Sapan),<o:p></o:p></span></p><p =
class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>&nbsp;<o:p></o:p></span></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>Apologies for my late response to your email.&nbsp; It =
landed in my spam folder, and I am just now seeing it.&nbsp; (As a side =
note, I have now unblocked all email from <a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%=
2Fietf.org%2F&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc6340=
08538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832101=
843394128%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJ=
BTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DZYSZJV0zxzL3rq%2FSEi7Zvc8K=
yOPbN3p0hHhizvaAMBo%3D&amp;reserved=3D0" =
target=3D"_blank">ietf.org</a>.)<o:p></o:p></span></p><p =
class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>&nbsp;<o:p></o:p></span></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>Thank you for sharing this work.&nbsp; Would you be =
interested in taking a few minutes on the agenda at our Monday 3/14 4 PM =
UTC meeting, or a future meeting, to provide an overview an entertain =
discussion?<o:p></o:p></span></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>&nbsp;<o:p></o:p></span></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>Kay<o:p></o:p></span></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>&nbsp;<o:p></o:p></span></p><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0cm =
0cm 0cm'><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><b><span =
lang=3DEN-US>From:</span></b><span lang=3DEN-US> SCITT &lt;<a =
href=3D"mailto:scitt-bounces@ietf.org" =
target=3D"_blank">scitt-bounces@ietf.org</a>&gt; <b>On Behalf Of =
</b>Orie Steele<br><b>Sent:</b> Monday, March 7, 2022 10:41 =
AM<br><b>To:</b> <a href=3D"mailto:scitt@ietf.org" =
target=3D"_blank">scitt@ietf.org</a><br><b>Cc:</b> Sapan Narang &lt;<a =
href=3D"mailto:sapan@transmute.industries">sapan@transmute.industries</a>=
&gt;<br><b>Subject:</b> [SCITT] GitHub DIDs &amp; VCs for Supply Chain =
Traceability<o:p></o:p></span></p></div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>&nbsp;<o:p></o:p></span></p><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>Hello,<br><br>I'm Orie, I work on identifier and =
credentialing standards at W3C and IETF.<br><br>My company <a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQyqiYqEgkF4xWgxA5Ast%2Fhttps%253A%252F%252Ftrans=
mute.industries%252F&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd=
4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63=
7832101843394128%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2lu=
MzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3D6thfhO%2FamDDW8VGe3=
vWFAMtCgRberjlJSnsK3U7nS%2BI%3D&amp;reserved=3D0" =
target=3D"_blank">Transmute</a> applies these standards to supply =
traceability (both physical&nbsp;and software).<br><br>Some of our work =
is funded by <a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQyqNTelooObAhwFx98Nw%2Fhttps%253A%252F%252Fwww.d=
hs.gov%252Fscience-and-technology%252Fsvip&amp;data=3D04%7C01%7Cantdl%40m=
icrosoft.com%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7=
cd011db47%7C1%7C0%7C637832101843394128%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC=
4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=
=3DPNClBX7s6LJwTCK58IWoeCknvUmXb%2BuU5bprqb%2BXHDY%3D&amp;reserved=3D0" =
target=3D"_blank">DHS SVIP</a>, including our work on applying DIDs and =
VCs to physical supply chain&nbsp;issues associated with global trade =
and imports and exports.<br><br>If you are interested in that work it =
can be found here:&nbsp;<a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQy2fH6UWEI23iw-vWGEG%2Fhttps%253A%252F%252Fw3id.=
org%252Ftraceability&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd=
4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63=
7832101843594123%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2lu=
MzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DjgUMxbIp3iypuGXzrGu=
BiuxsGd76ky1o%2FhQ0iCt5%2Fco%3D&amp;reserved=3D0" =
target=3D"_blank">https://w3id.org/traceability</a>.<br><br>I wanted to =
share some very recent (experimental and unstable) work we've done to =
enable <a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQyqX11lXlzLvQgPI070Q%2Fhttps%253A%252F%252Fwww.w=
3.org%252FTR%252Fdid-core%252F&amp;data=3D04%7C01%7Cantdl%40microsoft.com=
%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C=
1%7C0%7C637832101843594123%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLC=
JQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DhUDex2umg=
%2BhGKce2k%2FwMryNpSPu7v2VRlUVGiZd%2F6%2F0%3D&amp;reserved=3D0" =
target=3D"_blank">Decentralized Identifiers</a> and <a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQymDA7VYHe95RgZjMZKI%2Fhttps%253A%252F%252Fwww.w=
3.org%252FTR%252Fvc-data-model%252F&amp;data=3D04%7C01%7Cantdl%40microsof=
t.com%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db=
47%7C1%7C0%7C637832101843594123%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwM=
DAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DHho%=
2BgX2VaeoztUkVXkLF67fxrmgDKFw6FrlNnEM0d60%3D&amp;reserved=3D0" =
target=3D"_blank">Verifiable Credentials</a> to assist with the software =
supply chain.<br><br>Here are the links:<br><br>-&nbsp;<a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQyqXl4mGukfBcw_Wj_Q8%2Fhttps%253A%252F%252Fgithu=
b.com%252Ftransmute-industries%252Fverifiable-actions&amp;data=3D04%7C01%=
7Cantdl%40microsoft.com%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f1=
41af91ab2d7cd011db47%7C1%7C0%7C637832101843644104%7CUnknown%7CTWFpbGZsb3d=
8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C300=
0&amp;sdata=3D0BNa54C%2BKPAm5nma%2BUSqMZAGyabQwEzkjc3Z0itYA1A%3D&amp;rese=
rved=3D0" =
target=3D"_blank">https://github.com/transmute-industries/verifiable-acti=
ons</a><br>-&nbsp;<a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQyuHh9DtUHodDwKXtBBB%2Fhttps%253A%252F%252Fgithu=
b.com%252Ftransmute-industries%252Fpublic-credential-registry-template&am=
p;data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc634008538808da08ea64=
eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832101843644104%7CUnkn=
own%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJ=
XVCI6Mn0%3D%7C3000&amp;sdata=3Da0cKcxHbR2qHrxkG0Qa6qqKCl6X6VE162iisrQY5Mo=
M%3D&amp;reserved=3D0" =
target=3D"_blank">https://github.com/transmute-industries/public-credenti=
al-registry-template</a><br><br>The key idea is to enable github actions =
to sign and verify credentials that conform to the W3C Verifiable =
Credentials standard (which in turn supports various envelope formats =
including JOSE, COSE and PGP).<br><br>The issuers are =
identified&nbsp;with W3C Decentralized Identifiers, which provide a =
layer of interoperability for public key identifier&nbsp;registries. =
<br>The key value of this standard is the ability to support both =
traditional public key based identifiers, web resource based identifiers =
and blockchain&nbsp;based identifiers in the same data model.<br><br>The =
examples in the repository links above demonstrate support for these =
standards using <a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQyuGxqSDtSpdZABx8eMt%2Fhttps%253A%252F%252Fw3c-c=
cg.github.io%252Fdid-method-key%252F&amp;data=3D04%7C01%7Cantdl%40microso=
ft.com%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011d=
b47%7C1%7C0%7C637832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAw=
MDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3D%2B=
AomrNyRCdpgcDwtBVsOpofiATZOz7ff%2Fvj%2Bs7bk%2B%2F4%3D&amp;reserved=3D0" =
target=3D"_blank">did:key</a>&nbsp;and <a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQyqsLGN-htS74QXmSanv%2Fhttps%253A%252F%252Fgithu=
b.com%252Fw3c-ccg%252Fdid-method-web&amp;data=3D04%7C01%7Cantdl%40microso=
ft.com%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011d=
b47%7C1%7C0%7C637832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAw=
MDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DVzd=
lDZTCiJBVFv1mokeAoxf14VKj9Jd13jrM%2FYCgW3w%3D&amp;reserved=3D0" =
target=3D"_blank">did:web</a>, <br>however I am one of the editors of =
the&nbsp;<a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQyuu7nlpbor7UAurwtjs%2Fhttps%253A%252F%252Fgithu=
b.com%252Fdecentralized-identity%252Fsidetree&amp;data=3D04%7C01%7Cantdl%=
40microsoft.com%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab=
2d7cd011db47%7C1%7C0%7C637832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjo=
iMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sd=
ata=3DpKAHmQOymeq1gquTJPcxijcBxuAc%2FkRrWi6UpUxIWhs%3D&amp;reserved=3D0" =
target=3D"_blank">Sidetree Protocol</a>&nbsp;which is what powers <a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQyuxcXKIp3hEOgkQqHLh%2Fhttps%253A%252F%252Ftechc=
ommunity.microsoft.com%252Ft5%252Fidentity-standards-blog%252Fion-we-have=
-liftoff%252Fba-p%252F1441555&amp;data=3D04%7C01%7Cantdl%40microsoft.com%=
7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1=
%7C0%7C637832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJ=
QIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DWBCQ9HHha9=
X5XgmQi3vApvOj9oWFaukHcZo1RHIzNb8%3D&amp;reserved=3D0" =
target=3D"_blank">did:ion</a>&nbsp;which is being developed by Microsoft =
and other DIF members... <br>The GitHub examples I provided will also =
work with did:ion.<br><br>Feel free to raise issues on any of the =
repositories linked, or ask me questions directly by email if you are =
not comfortable commenting on a public =
repo.<br><br>Regards,<br><br>OS<br =
clear=3Dall><o:p></o:p></span></p><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>&nbsp;<o:p></o:p></span></p></div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>-- =
<o:p></o:p></span></p><div><div><div><div><div><div><div><div><div><div><=
p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><b><span =
lang=3DEN-US =
style=3D'font-size:10.0pt;font-family:"Tahoma",sans-serif;color:#351C75;b=
ackground:white'>ORIE STEELE</span></b><span =
lang=3DEN-US><o:p></o:p></span></p><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US style=3D'font-size:10.0pt;font-family:"Arial =
Narrow",sans-serif;color:#351C75;background:white'>Chief Technical =
Officer</span><span lang=3DEN-US><o:p></o:p></span></p></div><div><p =
class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US =
style=3D'font-size:7.5pt;font-family:"Arial",sans-serif;color:#351C75;bac=
kground:white'><a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%=
2Fwww.transmute.industries%2F&amp;data=3D04%7C01%7Cantdl%40microsoft.com%=
7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1=
%7C0%7C637832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJ=
QIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3Dpv3xaPyy8U=
w4RynudDGggy7dlHtWZgjLUIQx5rWK%2F8I%3D&amp;reserved=3D0" =
target=3D"_blank">www.transmute.industries</a></span><span =
lang=3DEN-US><o:p></o:p></span></p></div><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>&nbsp;<o:p></o:p></span></p></div><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQyqJyZSff0skfwnnG7JR%2Fhttps%253A%252F%252Fwww.t=
ransmute.industries&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4=
fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637=
832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luM=
zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DC3QvbpZsKWPV8FA2TfnH=
HF5O%2FNZfJv8SxCoSSuVA3wk%3D&amp;reserved=3D0" target=3D"_blank"><span =
lang=3DEN-US style=3D'font-size:10.0pt;font-family:"Arial =
Narrow",sans-serif;text-decoration:none'><img border=3D0 width=3D96 =
height=3D23 style=3D'width:1.0in;height:.2395in' id=3D"_x0000_i1028" =
src=3D"https://drive.google.com/a/transmute.industries/uc?id=3D1hbftCJoB5=
KdeV_kzj4eeyS28V3zS9d9c&amp;export=3Ddownload"></span></a><span =
lang=3DEN-US><o:p></o:p></span></p></div></div></div></div></div></div></=
div></div></div></div></div></div><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US><img border=3D0 width=3D1 height=3D1 =
style=3D'width:.0104in;height:.0104in' id=3D"_x0000_i1027" =
src=3D"https://mailfoogae.appspot.com/t?sender=3Dab3JpZUB0cmFuc211dGUuaW5=
kdXN0cmllcw%3D%3D&amp;type=3Dzerocontent&amp;guid=3D76629253-3770-41de-92=
67-75822572b3a6"></span><span lang=3DEN-US =
style=3D'font-size:7.5pt;font-family:"Gadugi",sans-serif;color:white'>=E1=
=90=A7</span><span =
lang=3DEN-US><o:p></o:p></span></p></div></div></div></blockquote></div><=
p class=3DMsoNormal><br clear=3Dall><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>-- =
<o:p></o:p></p><div><div><div><div><div><div><div><div><div><div><p =
class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma",sans-serif;color:#351C75;b=
ackground:white'>ORIE STEELE</span></b> <o:p></o:p></p><div><p =
class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial =
Narrow",sans-serif;color:#351C75;background:white'>Chief Technical =
Officer</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:7.5pt;font-family:"Arial",sans-serif;color:#351C75;bac=
kground:white'><a =
href=3D"http://www.transmute.industries">www.transmute.industries</a></sp=
an><o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fwww.transmute.industries%2F&amp;data=3D04%7C01%7Cantdl%40microsoft.com=
%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C=
1%7C0%7C637832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLC=
JQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3D3M8AJs5Ox=
bUjF13cqJx9TLayJ2wdxuNAx1QG6dXk6vc%3D&amp;reserved=3D0" =
target=3D"_blank"><span style=3D'font-size:10.0pt;font-family:"Arial =
Narrow",sans-serif;text-decoration:none'><img border=3D0 width=3D96 =
height=3D23 style=3D'width:1.0in;height:.2395in' id=3D"_x0000_i1026" =
src=3D"https://drive.google.com/a/transmute.industries/uc?id=3D1hbftCJoB5=
KdeV_kzj4eeyS28V3zS9d9c&amp;export=3Ddownload"></span></a><o:p></o:p></p>=
</div></div></div></div></div></div></div></div></div></div></div></block=
quote></div><p class=3DMsoNormal><br clear=3Dall><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>-- =
<o:p></o:p></p><div><div><div><div><div><div><div><div><div><div><p =
class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma",sans-serif;color:#351C75;b=
ackground:white'>ORIE STEELE</span></b> <o:p></o:p></p><div><p =
class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial =
Narrow",sans-serif;color:#351C75;background:white'>Chief Technical =
Officer</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:7.5pt;font-family:"Arial",sans-serif;color:#351C75;bac=
kground:white'><a =
href=3D"http://www.transmute.industries">www.transmute.industries</a></sp=
an><o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fwww.transmute.industries%2F&amp;data=3D04%7C01%7Cantdl%40microsoft.com=
%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C=
1%7C0%7C637832101843694104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLC=
JQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3Dwl7DU8CV3=
SPJb5xgqdl3MRYzwK4bBeux16YPNbmcPus%3D&amp;reserved=3D0" =
target=3D"_blank"><span style=3D'font-size:10.0pt;font-family:"Arial =
Narrow",sans-serif;text-decoration:none'><img border=3D0 width=3D96 =
height=3D23 style=3D'width:1.0in;height:.2395in' id=3D"_x0000_i1025" =
src=3D"https://drive.google.com/a/transmute.industries/uc?id=3D1hbftCJoB5=
KdeV_kzj4eeyS28V3zS9d9c&amp;export=3Ddownload"></span></a><o:p></o:p></p>=
</div></div></div></div></div></div></div></div></div></div></div></div><=
/div></body></html>
------=_NextPart_001_001E_01D83AE8.CBEB9FB0--

------=_NextPart_000_001D_01D83AE8.CBEB9FB0
Content-Type: application/pkcs7-signature;
	name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
	filename="smime.p7s"
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------=_NextPart_000_001D_01D83AE8.CBEB9FB0--


From nobody Fri Mar 18 10:02:21 2022
Return-Path: <orie@transmute.industries>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B11673A0D43 for <scitt@ietfa.amsl.com>; Fri, 18 Mar 2022 10:02:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.095
X-Spam-Level: 
X-Spam-Status: No, score=-1.095 tagged_above=-999 required=5 tests=[AC_DIV_BONANZA=0.001, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, DOTGOV_IMAGE=1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=transmute.industries
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HfkMxYOQYTnW for <scitt@ietfa.amsl.com>; Fri, 18 Mar 2022 10:02:14 -0700 (PDT)
Received: from mail-lj1-x231.google.com (mail-lj1-x231.google.com [IPv6:2a00:1450:4864:20::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1310A3A0D3D for <scitt@ietf.org>; Fri, 18 Mar 2022 10:02:13 -0700 (PDT)
Received: by mail-lj1-x231.google.com with SMTP id bn33so12074938ljb.6 for <scitt@ietf.org>; Fri, 18 Mar 2022 10:02:13 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=transmute.industries; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=RLudt9mD5fhLJEQw8LMoUC922r6woGZVZVYCL7Rd9nY=; b=dBNwtrg5WqjD5P9qpbG34p4T8WZRL635b5jdiR3Oj+v/UdIE+TjN+EPlwjfcL0FNwJ PWy0/kIVg0+DH6ptlnfYvh9p8TEx/OE3i674v4BpxGRsGy3jEuWqZi5KlWV6xUsnpREx c5YpRakU05OyXZMj1qEGBe/HYi7GxApjlwuqAs5MjQRVxyEfkMHB4xTz+oNS7hbyWIb0 ASpJUZjbu17gmMWeEpETkB3OWUv7+OpVaRCC2Vf4QLyN/ZTk+3s30gKEZNWivoIo3GR/ qwgJfa0S1z1qukMfsAAPAp5uxIb8NY8u0U85yjxlLYPjKzu4Ey7vetAviJ3QZta11VwZ BeYA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=RLudt9mD5fhLJEQw8LMoUC922r6woGZVZVYCL7Rd9nY=; b=aG0Y3eMJj0u6nr2J1Zt0cD8VJMux5HacqY5zoDYRn+GXDl42KS5jJ5iPkq0xzUXwTG u2JVECgSxK5E8BJMtCi//Bjqr2nUb241qkd9rW3ALsl9L9f0KGOmKP3yx4CmyQdYZPe+ 5cZFPYohlyv81a7FSdxetays95WYcfCiLmRZ/dbv1ng9SwlTFjY81s9oVYZfjdiJaaRG ifqOLLWiRo82rt5xtjz8CamQhrEW3d87konzUP4Ktp4GtYwr2A+ndNNdt0yhoaZQmEhz 2w+zYQ1pEH5GjGK38N/8zFuCMKEXOusajgW/gIkmLA1yUAg/FAyGIfZQcrQv02izTtF0 M7UA==
X-Gm-Message-State: AOAM530wr2UVBffzFgNbIgS2KsioXRxjnR58Nn1nDHNbPEdo+cHNJJaT ipdPeLdVXA0YXTLVsb+B+4sC8V+mUPCQPCJlZzjxhA==
X-Google-Smtp-Source: ABdhPJxoA1HfPAJfCcFs8HFD3ovZcLiguEZiH/1XjuaozSoxE7sZOKlS7JmV23xoRW6vx3a89e2C8BMgJN7omhCAFS4=
X-Received: by 2002:a2e:8495:0:b0:247:dca3:f7bc with SMTP id b21-20020a2e8495000000b00247dca3f7bcmr6893464ljh.12.1647622930566; Fri, 18 Mar 2022 10:02:10 -0700 (PDT)
MIME-Version: 1.0
References: <CAN8C-_K9KBg2DhKOHUf8EMXo5wmTnrEc011e3Q7Y8zFOJsZ-1Q@mail.gmail.com> <DM6PR21MB1148265AA4232ED71CC0D7D8C50C9@DM6PR21MB1148.namprd21.prod.outlook.com> <CAN8C-_J8tThmo2mdMyydP-5A1h9aHReftPDRVD_cZjMnd8=2hA@mail.gmail.com> <CAN8C-_KGz83+-giHgt9foheLU8rM+jd7mN92PJ+4pKVYbSXbHA@mail.gmail.com> <AM5PR83MB03726CB108BDE97A152E91D3B2139@AM5PR83MB0372.EURPRD83.prod.outlook.com>
In-Reply-To: <AM5PR83MB03726CB108BDE97A152E91D3B2139@AM5PR83MB0372.EURPRD83.prod.outlook.com>
From: Orie Steele <orie@transmute.industries>
Date: Fri, 18 Mar 2022 12:01:59 -0500
Message-ID: <CAN8C-_++P+Mu1zcV=PBqjfPPjHPCaYyL4OYXJamzO+Oa=-Z0PA@mail.gmail.com>
To: Antoine Delignat-Lavaud <antdl@microsoft.com>
Cc: Kay Williams <kayw@microsoft.com>, Sapan Narang <sapan@transmute.industries>,  "scitt@ietf.org" <scitt@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000802d0605da811b16"
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/so5h8JOb2Ym-DtQIaydy_Yrx9ZE>
Subject: Re: [SCITT] [EXTERNAL] Re: GitHub DIDs & VCs for Supply Chain Traceability
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Mar 2022 17:02:20 -0000

--000000000000802d0605da811b16
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Antoine,

I'm not sure which "W3C" document you are referring to.

I linked 2 W3C TRs (both contributed to by Microsoft and approved by
Microsoft AC Rep), and a few community group drafts at DIF (contributed to
by Microsoft) and at the W3C CCG (not contributed to by Microsoft).

Which document are you referring to?

OS

On Fri, Mar 18, 2022 at 11:54 AM Antoine Delignat-Lavaud <
antdl@microsoft.com> wrote:

> Hi Orie,
>
>
>
> Is there any follow up to the W3C Traceability Vocabulary document? It ha=
s
> some good context and terminology on supply chain security but doesn=E2=
=80=99t seem
> to offer any concrete solution or improvement.
>
>
>
> Antoine
>
>
>
> *From:* SCITT <scitt-bounces@ietf.org> *On Behalf Of *Orie Steele
> *Sent:* 18 March 2022 14:20
> *To:* Kay Williams <kayw@microsoft.com>
> *Cc:* Sapan Narang <sapan@transmute.industries>; scitt@ietf.org
> *Subject:* [EXTERNAL] Re: [SCITT] GitHub DIDs & VCs for Supply Chain
> Traceability
>
>
>
> Some people who received this message don't often get email from
> orie@transmute.industries. Learn why this is important
> <http://aka.ms/LearnAboutSenderIdentification>
>
> I am prepared to present, can you confirm a time.
>
> Regards,
>
> OS
>
>
>
> On Mon, Mar 14, 2022 at 10:21 AM Orie Steele <orie@transmute.industries>
> wrote:
>
> Sorry I got to this late.
>
> I can prepare something for the next meeting.
>
> Regards,
>
> OS
>
>
>
> On Fri, Mar 11, 2022 at 4:59 PM Kay Williams <kayw@microsoft.com> wrote:
>
> Hi Orie (and Sapan),
>
>
>
> Apologies for my late response to your email.  It landed in my spam
> folder, and I am just now seeing it.  (As a side note, I have now unblock=
ed
> all email from ietf.org
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fietf.=
org%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc634008538808da08e=
a64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832101843394128%7CUnk=
nown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJX=
VCI6Mn0%3D%7C3000&sdata=3DZYSZJV0zxzL3rq%2FSEi7Zvc8KyOPbN3p0hHhizvaAMBo%3D&=
reserved=3D0>
> .)
>
>
>
> Thank you for sharing this work.  Would you be interested in taking a few
> minutes on the agenda at our Monday 3/14 4 PM UTC meeting, or a future
> meeting, to provide an overview an entertain discussion?
>
>
>
> Kay
>
>
>
> *From:* SCITT <scitt-bounces@ietf.org> *On Behalf Of *Orie Steele
> *Sent:* Monday, March 7, 2022 10:41 AM
> *To:* scitt@ietf.org
> *Cc:* Sapan Narang <sapan@transmute.industries>
> *Subject:* [SCITT] GitHub DIDs & VCs for Supply Chain Traceability
>
>
>
> Hello,
>
> I'm Orie, I work on identifier and credentialing standards at W3C and IET=
F.
>
> My company Transmute
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqiYqEgkF4xWgxA5Ast%2Fhttps%253A%252F%252Ftransmute.indu=
stries%252F&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc634008538808=
da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832101843394128%=
7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWw=
iLCJXVCI6Mn0%3D%7C3000&sdata=3D6thfhO%2FamDDW8VGe3vWFAMtCgRberjlJSnsK3U7nS%=
2BI%3D&reserved=3D0>
> applies these standards to supply traceability (both physical and softwar=
e).
>
> Some of our work is funded by DHS SVIP
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqNTelooObAhwFx98Nw%2Fhttps%253A%252F%252Fwww.dhs.gov%25=
2Fscience-and-technology%252Fsvip&data=3D04%7C01%7Cantdl%40microsoft.com%7C=
93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0=
%7C637832101843394128%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV=
2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DPNClBX7s6LJwTCK58IWoeC=
knvUmXb%2BuU5bprqb%2BXHDY%3D&reserved=3D0>,
> including our work on applying DIDs and VCs to physical supply chain issu=
es
> associated with global trade and imports and exports.
>
> If you are interested in that work it can be found here:
> https://w3id.org/traceability
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQy2fH6UWEI23iw-vWGEG%2Fhttps%253A%252F%252Fw3id.org%252Ft=
raceability&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc634008538808=
da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832101843594123%=
7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWw=
iLCJXVCI6Mn0%3D%7C3000&sdata=3DjgUMxbIp3iypuGXzrGuBiuxsGd76ky1o%2FhQ0iCt5%2=
Fco%3D&reserved=3D0>
> .
>
> I wanted to share some very recent (experimental and unstable) work we've
> done to enable Decentralized Identifiers
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqX11lXlzLvQgPI070Q%2Fhttps%253A%252F%252Fwww.w3.org%252=
FTR%252Fdid-core%252F&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc63=
4008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832101=
843594123%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBT=
iI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DhUDex2umg%2BhGKce2k%2FwMryNpSPu7v2=
VRlUVGiZd%2F6%2F0%3D&reserved=3D0>
> and Verifiable Credentials
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQymDA7VYHe95RgZjMZKI%2Fhttps%253A%252F%252Fwww.w3.org%252=
FTR%252Fvc-data-model%252F&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd=
4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378=
32101843594123%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIi=
LCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DHho%2BgX2VaeoztUkVXkLF67fxrmg=
DKFw6FrlNnEM0d60%3D&reserved=3D0>
> to assist with the software supply chain.
>
> Here are the links:
>
> - https://github.com/transmute-industries/verifiable-actions
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqXl4mGukfBcw_Wj_Q8%2Fhttps%253A%252F%252Fgithub.com%252=
Ftransmute-industries%252Fverifiable-actions&data=3D04%7C01%7Cantdl%40micro=
soft.com%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011d=
b47%7C1%7C0%7C637832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMD=
AiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D0BNa54C%2BK=
PAm5nma%2BUSqMZAGyabQwEzkjc3Z0itYA1A%3D&reserved=3D0>
> -
> https://github.com/transmute-industries/public-credential-registry-templa=
te
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyuHh9DtUHodDwKXtBBB%2Fhttps%253A%252F%252Fgithub.com%252=
Ftransmute-industries%252Fpublic-credential-registry-template&data=3D04%7C0=
1%7Cantdl%40microsoft.com%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f1=
41af91ab2d7cd011db47%7C1%7C0%7C637832101843644104%7CUnknown%7CTWFpbGZsb3d8e=
yJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sd=
ata=3Da0cKcxHbR2qHrxkG0Qa6qqKCl6X6VE162iisrQY5MoM%3D&reserved=3D0>
>
> The key idea is to enable github actions to sign and verify credentials
> that conform to the W3C Verifiable Credentials standard (which in turn
> supports various envelope formats including JOSE, COSE and PGP).
>
> The issuers are identified with W3C Decentralized Identifiers, which
> provide a layer of interoperability for public key identifier registries.
> The key value of this standard is the ability to support both traditional
> public key based identifiers, web resource based identifiers and
> blockchain based identifiers in the same data model.
>
> The examples in the repository links above demonstrate support for these
> standards using did:key
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyuGxqSDtSpdZABx8eMt%2Fhttps%253A%252F%252Fw3c-ccg.github=
.io%252Fdid-method-key%252F&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0ef=
d4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637=
832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzI=
iLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D%2BAomrNyRCdpgcDwtBVsOpofiAT=
ZOz7ff%2Fvj%2Bs7bk%2B%2F4%3D&reserved=3D0> and
> did:web
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqsLGN-htS74QXmSanv%2Fhttps%253A%252F%252Fgithub.com%252=
Fw3c-ccg%252Fdid-method-web&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0ef=
d4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637=
832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzI=
iLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DVzdlDZTCiJBVFv1mokeAoxf14VKj=
9Jd13jrM%2FYCgW3w%3D&reserved=3D0>,
>
> however I am one of the editors of the Sidetree Protocol
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyuu7nlpbor7UAurwtjs%2Fhttps%253A%252F%252Fgithub.com%252=
Fdecentralized-identity%252Fsidetree&data=3D04%7C01%7Cantdl%40microsoft.com=
%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%=
7C0%7C637832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIj=
oiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DpKAHmQOymeq1gquTJPc=
xijcBxuAc%2FkRrWi6UpUxIWhs%3D&reserved=3D0> which
> is what powers did:ion
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyuxcXKIp3hEOgkQqHLh%2Fhttps%253A%252F%252Ftechcommunity.=
microsoft.com%252Ft5%252Fidentity-standards-blog%252Fion-we-have-liftoff%25=
2Fba-p%252F1441555&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc63400=
8538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832101843=
644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6=
Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DWBCQ9HHha9X5XgmQi3vApvOj9oWFaukHcZo1R=
HIzNb8%3D&reserved=3D0> which
> is being developed by Microsoft and other DIF members...
> The GitHub examples I provided will also work with did:ion.
>
> Feel free to raise issues on any of the repositories linked, or ask me
> questions directly by email if you are not comfortable commenting on a
> public repo.
>
> Regards,
>
> OS
>
>
>
> --
>
> *ORIE STEELE*
>
> Chief Technical Officer
>
> www.transmute.industries
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.t=
ransmute.industries%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc6=
34008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63783210=
1843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJB=
TiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3Dpv3xaPyy8Uw4RynudDGggy7dlHtWZgjLU=
IQx5rWK%2F8I%3D&reserved=3D0>
>
>
>
>
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqJyZSff0skfwnnG7JR%2Fhttps%253A%252F%252Fwww.transmute.=
industries&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc634008538808d=
a08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832101843644104%7=
CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwi=
LCJXVCI6Mn0%3D%7C3000&sdata=3DC3QvbpZsKWPV8FA2TfnHHF5O%2FNZfJv8SxCoSSuVA3wk=
%3D&reserved=3D0>
>
> =E1=90=A7
>
>
>
>
> --
>
> *ORIE STEELE*
>
> Chief Technical Officer
>
> www.transmute.industries
>
>
>
>
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.=
transmute.industries%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc=
634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378321=
01843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJ=
BTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D3M8AJs5OxbUjF13cqJx9TLayJ2wdxuNA=
x1QG6dXk6vc%3D&reserved=3D0>
>
>
>
>
> --
>
> *ORIE STEELE*
>
> Chief Technical Officer
>
> www.transmute.industries
>
>
>
>
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.=
transmute.industries%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc=
634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378321=
01843694104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJ=
BTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3Dwl7DU8CV3SPJb5xgqdl3MRYzwK4bBeux=
16YPNbmcPus%3D&reserved=3D0>
>


--=20
*ORIE STEELE*
Chief Technical Officer
www.transmute.industries

<https://www.transmute.industries>

--000000000000802d0605da811b16
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Antoine,<br><br></div>I&#39;m not sure which &quot;W3=
C&quot; document you are referring to.<br><br>I linked 2 W3C TRs (both cont=
ributed to by Microsoft and approved by Microsoft AC Rep), and a few commun=
ity=C2=A0group drafts at DIF (contributed to by Microsoft) and at the W3C C=
CG (not contributed to by Microsoft).<br><br>Which document are you referri=
ng to?<br><br>OS</div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=
=3D"gmail_attr">On Fri, Mar 18, 2022 at 11:54 AM Antoine Delignat-Lavaud &l=
t;<a href=3D"mailto:antdl@microsoft.com">antdl@microsoft.com</a>&gt; wrote:=
<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8=
ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div lang=3D"EN=
-GB" style=3D"overflow-wrap: break-word;"><div class=3D"gmail-m_96263246078=
289229WordSection1"><p class=3D"MsoNormal"><span>Hi Orie,<u></u><u></u></sp=
an></p><p class=3D"MsoNormal"><span><u></u>=C2=A0<u></u></span></p><p class=
=3D"MsoNormal"><span>Is there any follow up to the W3C Traceability Vocabul=
ary document? It has some good context and terminology on supply chain secu=
rity but doesn=E2=80=99t seem to offer any concrete solution or improvement=
. <u></u><u></u></span></p><p class=3D"MsoNormal"><span><u></u>=C2=A0<u></u=
></span></p><p class=3D"MsoNormal"><span>Antoine<u></u><u></u></span></p><p=
 class=3D"MsoNormal"><span><u></u>=C2=A0<u></u></span></p><div><div style=
=3D"border-right:none;border-bottom:none;border-left:none;border-top:1pt so=
lid rgb(225,225,225);padding:3pt 0cm 0cm"><p class=3D"MsoNormal"><b><span l=
ang=3D"EN-US">From:</span></b><span lang=3D"EN-US"> SCITT &lt;<a href=3D"ma=
ilto:scitt-bounces@ietf.org" target=3D"_blank">scitt-bounces@ietf.org</a>&g=
t; <b>On Behalf Of </b>Orie Steele<br><b>Sent:</b> 18 March 2022 14:20<br><=
b>To:</b> Kay Williams &lt;<a href=3D"mailto:kayw@microsoft.com" target=3D"=
_blank">kayw@microsoft.com</a>&gt;<br><b>Cc:</b> Sapan Narang &lt;sapan@tra=
nsmute.industries&gt;; <a href=3D"mailto:scitt@ietf.org" target=3D"_blank">=
scitt@ietf.org</a><br><b>Subject:</b> [EXTERNAL] Re: [SCITT] GitHub DIDs &a=
mp; VCs for Supply Chain Traceability<u></u><u></u></span></p></div></div><=
p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p><table border=3D"0" cellspaci=
ng=3D"0" cellpadding=3D"0" align=3D"left" width=3D"100%" style=3D"width:100=
%"><tbody><tr><td style=3D"background:rgb(166,166,166);padding:5.25pt 1.5pt=
"></td><td width=3D"100%" style=3D"width:100%;background:rgb(234,234,234);p=
adding:5.25pt 3.75pt 5.25pt 11.25pt"><div><p class=3D"MsoNormal"><span styl=
e=3D"font-size:9pt;font-family:&quot;Segoe UI&quot;,sans-serif;color:rgb(33=
,33,33)">Some people who received this message don&#39;t often get email fr=
om <a href=3D"mailto:orie@transmute.industries" target=3D"_blank">orie@tran=
smute.industries</a>. <a href=3D"http://aka.ms/LearnAboutSenderIdentificati=
on" target=3D"_blank">Learn why this is important</a><u></u><u></u></span><=
/p></div></td><td width=3D"75" style=3D"width:56.25pt;background:rgb(234,23=
4,234);padding:5.25pt 3.75pt"></td></tr></tbody></table><div><div><p class=
=3D"MsoNormal">I am prepared to present, can you confirm a time.<br><br>Reg=
ards,<br><br>OS<u></u><u></u></p></div><p class=3D"MsoNormal"><u></u>=C2=A0=
<u></u></p><div><div><p class=3D"MsoNormal">On Mon, Mar 14, 2022 at 10:21 A=
M Orie Steele &lt;<a href=3D"mailto:orie@transmute.industries" target=3D"_b=
lank">orie@transmute.industries</a>&gt; wrote:<u></u><u></u></p></div><bloc=
kquote style=3D"border-top:none;border-right:none;border-bottom:none;border=
-left:1pt solid rgb(204,204,204);padding:0cm 0cm 0cm 6pt;margin-left:4.8pt;=
margin-right:0cm"><div><p class=3D"MsoNormal">Sorry I got to this late.<br>=
<br>I can prepare something for the next meeting.<br><br>Regards,<br><br>OS=
<u></u><u></u></p></div><p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p><div=
><div><p class=3D"MsoNormal">On Fri, Mar 11, 2022 at 4:59 PM Kay Williams &=
lt;<a href=3D"mailto:kayw@microsoft.com" target=3D"_blank">kayw@microsoft.c=
om</a>&gt; wrote:<u></u><u></u></p></div><blockquote style=3D"border-top:no=
ne;border-right:none;border-bottom:none;border-left:1pt solid rgb(204,204,2=
04);padding:0cm 0cm 0cm 6pt;margin-left:4.8pt;margin-right:0cm"><div><div><=
p class=3D"MsoNormal"><span lang=3D"EN-US">Hi Orie (and Sapan),<u></u><u></=
u></span></p><p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></=
u></span></p><p class=3D"MsoNormal"><span lang=3D"EN-US">Apologies for my l=
ate response to your email.=C2=A0 It landed in my spam folder, and I am jus=
t now seeing it.=C2=A0 (As a side note, I have now unblocked all email from=
 <a href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2=
F%2Fietf.org%2F&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc6340=
08538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63783210184=
3394128%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI=
6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DZYSZJV0zxzL3rq%2FSEi7Zvc8KyOPbN3=
p0hHhizvaAMBo%3D&amp;reserved=3D0" target=3D"_blank">ietf.org</a>.)<u></u><=
u></u></span></p><p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><=
u></u></span></p><p class=3D"MsoNormal"><span lang=3D"EN-US">Thank you for =
sharing this work.=C2=A0 Would you be interested in taking a few minutes on=
 the agenda at our Monday 3/14 4 PM UTC meeting, or a future meeting, to pr=
ovide an overview an entertain discussion?<u></u><u></u></span></p><p class=
=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p><p class=
=3D"MsoNormal"><span lang=3D"EN-US">Kay<u></u><u></u></span></p><p class=3D=
"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p><div style=
=3D"border-right:none;border-bottom:none;border-left:none;border-top:1pt so=
lid rgb(225,225,225);padding:3pt 0cm 0cm"><p class=3D"MsoNormal"><b><span l=
ang=3D"EN-US">From:</span></b><span lang=3D"EN-US"> SCITT &lt;<a href=3D"ma=
ilto:scitt-bounces@ietf.org" target=3D"_blank">scitt-bounces@ietf.org</a>&g=
t; <b>On Behalf Of </b>Orie Steele<br><b>Sent:</b> Monday, March 7, 2022 10=
:41 AM<br><b>To:</b> <a href=3D"mailto:scitt@ietf.org" target=3D"_blank">sc=
itt@ietf.org</a><br><b>Cc:</b> Sapan Narang &lt;<a href=3D"mailto:sapan@tra=
nsmute.industries" target=3D"_blank">sapan@transmute.industries</a>&gt;<br>=
<b>Subject:</b> [SCITT] GitHub DIDs &amp; VCs for Supply Chain Traceability=
<u></u><u></u></span></p></div><p class=3D"MsoNormal"><span lang=3D"EN-US">=
=C2=A0<u></u><u></u></span></p><div><p class=3D"MsoNormal"><span lang=3D"EN=
-US">Hello,<br><br>I&#39;m Orie, I work on identifier and credentialing sta=
ndards at W3C and IETF.<br><br>My company <a href=3D"https://nam06.safelink=
s.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyqiYqE=
gkF4xWgxA5Ast%2Fhttps%253A%252F%252Ftransmute.industries%252F&amp;data=3D04=
%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf=
86f141af91ab2d7cd011db47%7C1%7C0%7C637832101843394128%7CUnknown%7CTWFpbGZsb=
3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C300=
0&amp;sdata=3D6thfhO%2FamDDW8VGe3vWFAMtCgRberjlJSnsK3U7nS%2BI%3D&amp;reserv=
ed=3D0" target=3D"_blank">Transmute</a> applies these standards to supply t=
raceability (both physical=C2=A0and software).<br><br>Some of our work is f=
unded by <a href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dh=
ttps%3A%2F%2Fstreaklinks.com%2FA9ifQyqNTelooObAhwFx98Nw%2Fhttps%253A%252F%2=
52Fwww.dhs.gov%252Fscience-and-technology%252Fsvip&amp;data=3D04%7C01%7Cant=
dl%40microsoft.com%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91a=
b2d7cd011db47%7C1%7C0%7C637832101843394128%7CUnknown%7CTWFpbGZsb3d8eyJWIjoi=
MC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=
=3DPNClBX7s6LJwTCK58IWoeCknvUmXb%2BuU5bprqb%2BXHDY%3D&amp;reserved=3D0" tar=
get=3D"_blank">DHS SVIP</a>, including our work on applying DIDs and VCs to=
 physical supply chain=C2=A0issues associated with global trade and imports=
 and exports.<br><br>If you are interested in that work it can be found her=
e:=C2=A0<a href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dht=
tps%3A%2F%2Fstreaklinks.com%2FA9ifQy2fH6UWEI23iw-vWGEG%2Fhttps%253A%252F%25=
2Fw3id.org%252Ftraceability&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7C93=
f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7=
C637832101843594123%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2l=
uMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DjgUMxbIp3iypuGXzrGuB=
iuxsGd76ky1o%2FhQ0iCt5%2Fco%3D&amp;reserved=3D0" target=3D"_blank">https://=
w3id.org/traceability</a>.<br><br>I wanted to share some very recent (exper=
imental and unstable) work we&#39;ve done to enable <a href=3D"https://nam0=
6.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA=
9ifQyqX11lXlzLvQgPI070Q%2Fhttps%253A%252F%252Fwww.w3.org%252FTR%252Fdid-cor=
e%252F&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc634008538808d=
a08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832101843594123%7=
CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwi=
LCJXVCI6Mn0%3D%7C3000&amp;sdata=3DhUDex2umg%2BhGKce2k%2FwMryNpSPu7v2VRlUVGi=
Zd%2F6%2F0%3D&amp;reserved=3D0" target=3D"_blank">Decentralized Identifiers=
</a> and <a href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dh=
ttps%3A%2F%2Fstreaklinks.com%2FA9ifQymDA7VYHe95RgZjMZKI%2Fhttps%253A%252F%2=
52Fwww.w3.org%252FTR%252Fvc-data-model%252F&amp;data=3D04%7C01%7Cantdl%40mi=
crosoft.com%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd0=
11db47%7C1%7C0%7C637832101843594123%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjA=
wMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DHho%=
2BgX2VaeoztUkVXkLF67fxrmgDKFw6FrlNnEM0d60%3D&amp;reserved=3D0" target=3D"_b=
lank">Verifiable Credentials</a> to assist with the software supply chain.<=
br><br>Here are the links:<br><br>-=C2=A0<a href=3D"https://nam06.safelinks=
.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyqXl4mG=
ukfBcw_Wj_Q8%2Fhttps%253A%252F%252Fgithub.com%252Ftransmute-industries%252F=
verifiable-actions&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc6=
34008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63783210=
1843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJB=
TiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3D0BNa54C%2BKPAm5nma%2BUSqMZAGy=
abQwEzkjc3Z0itYA1A%3D&amp;reserved=3D0" target=3D"_blank">https://github.co=
m/transmute-industries/verifiable-actions</a><br>-=C2=A0<a href=3D"https://=
nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com=
%2FA9ifQyuHh9DtUHodDwKXtBBB%2Fhttps%253A%252F%252Fgithub.com%252Ftransmute-=
industries%252Fpublic-credential-registry-template&amp;data=3D04%7C01%7Cant=
dl%40microsoft.com%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91a=
b2d7cd011db47%7C1%7C0%7C637832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoi=
MC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=
=3Da0cKcxHbR2qHrxkG0Qa6qqKCl6X6VE162iisrQY5MoM%3D&amp;reserved=3D0" target=
=3D"_blank">https://github.com/transmute-industries/public-credential-regis=
try-template</a><br><br>The key idea is to enable github actions to sign an=
d verify credentials that conform to the W3C Verifiable Credentials standar=
d (which in turn supports various envelope formats including JOSE, COSE and=
 PGP).<br><br>The issuers are identified=C2=A0with W3C Decentralized Identi=
fiers, which provide a layer of interoperability for public key identifier=
=C2=A0registries. <br>The key value of this standard is the ability to supp=
ort both traditional public key based identifiers, web resource based ident=
ifiers and blockchain=C2=A0based identifiers in the same data model.<br><br=
>The examples in the repository links above demonstrate support for these s=
tandards using <a href=3D"https://nam06.safelinks.protection.outlook.com/?u=
rl=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyuGxqSDtSpdZABx8eMt%2Fhttps%253A%=
252F%252Fw3c-ccg.github.io%252Fdid-method-key%252F&amp;data=3D04%7C01%7Cant=
dl%40microsoft.com%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91a=
b2d7cd011db47%7C1%7C0%7C637832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoi=
MC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=
=3D%2BAomrNyRCdpgcDwtBVsOpofiATZOz7ff%2Fvj%2Bs7bk%2B%2F4%3D&amp;reserved=3D=
0" target=3D"_blank">did:key</a>=C2=A0and <a href=3D"https://nam06.safelink=
s.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyqsLGN=
-htS74QXmSanv%2Fhttps%253A%252F%252Fgithub.com%252Fw3c-ccg%252Fdid-method-w=
eb&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc634008538808da08e=
a64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832101843644104%7CUnk=
nown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJX=
VCI6Mn0%3D%7C3000&amp;sdata=3DVzdlDZTCiJBVFv1mokeAoxf14VKj9Jd13jrM%2FYCgW3w=
%3D&amp;reserved=3D0" target=3D"_blank">did:web</a>, <br>however I am one o=
f the editors of the=C2=A0<a href=3D"https://nam06.safelinks.protection.out=
look.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyuu7nlpbor7UAurwtjs%2F=
https%253A%252F%252Fgithub.com%252Fdecentralized-identity%252Fsidetree&amp;=
data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc634008538808da08ea64eb%7=
C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832101843644104%7CUnknown%7C=
TWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0=
%3D%7C3000&amp;sdata=3DpKAHmQOymeq1gquTJPcxijcBxuAc%2FkRrWi6UpUxIWhs%3D&amp=
;reserved=3D0" target=3D"_blank">Sidetree Protocol</a>=C2=A0which is what p=
owers <a href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttp=
s%3A%2F%2Fstreaklinks.com%2FA9ifQyuxcXKIp3hEOgkQqHLh%2Fhttps%253A%252F%252F=
techcommunity.microsoft.com%252Ft5%252Fidentity-standards-blog%252Fion-we-h=
ave-liftoff%252Fba-p%252F1441555&amp;data=3D04%7C01%7Cantdl%40microsoft.com=
%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%=
7C0%7C637832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIj=
oiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DWBCQ9HHha9X5Xgm=
Qi3vApvOj9oWFaukHcZo1RHIzNb8%3D&amp;reserved=3D0" target=3D"_blank">did:ion=
</a>=C2=A0which is being developed by Microsoft and other DIF members... <b=
r>The GitHub examples I provided will also work with did:ion.<br><br>Feel f=
ree to raise issues on any of the repositories linked, or ask me questions =
directly by email if you are not comfortable commenting on a public repo.<b=
r><br>Regards,<br><br>OS<br clear=3D"all"><u></u><u></u></span></p><div><p =
class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p></d=
iv><p class=3D"MsoNormal"><span lang=3D"EN-US">-- <u></u><u></u></span></p>=
<div><div><div><div><div><div><div><div><div><div><p class=3D"MsoNormal"><b=
><span lang=3D"EN-US" style=3D"font-size:10pt;font-family:Tahoma,sans-serif=
;color:rgb(53,28,117);background:white">ORIE STEELE</span></b><span lang=3D=
"EN-US"><u></u><u></u></span></p><div><p class=3D"MsoNormal"><span lang=3D"=
EN-US" style=3D"font-size:10pt;font-family:&quot;Arial Narrow&quot;,sans-se=
rif;color:rgb(53,28,117);background:white">Chief Technical Officer</span><s=
pan lang=3D"EN-US"><u></u><u></u></span></p></div><div><p class=3D"MsoNorma=
l"><span lang=3D"EN-US" style=3D"font-size:7.5pt;font-family:Arial,sans-ser=
if;color:rgb(53,28,117);background:white"><a href=3D"https://nam06.safelink=
s.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.transmute.industries%2F&am=
p;data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0efd4fc634008538808da08ea64eb=
%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832101843644104%7CUnknown%=
7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6M=
n0%3D%7C3000&amp;sdata=3Dpv3xaPyy8Uw4RynudDGggy7dlHtWZgjLUIQx5rWK%2F8I%3D&a=
mp;reserved=3D0" target=3D"_blank">www.transmute.industries</a></span><span=
 lang=3D"EN-US"><u></u><u></u></span></p></div><div><p class=3D"MsoNormal">=
<span lang=3D"EN-US">=C2=A0<u></u><u></u></span></p></div><div><p class=3D"=
MsoNormal"><a href=3D"https://nam06.safelinks.protection.outlook.com/?url=
=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyqJyZSff0skfwnnG7JR%2Fhttps%253A%25=
2F%252Fwww.transmute.industries&amp;data=3D04%7C01%7Cantdl%40microsoft.com%=
7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7=
C0%7C637832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo=
iV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DC3QvbpZsKWPV8FA2=
TfnHHF5O%2FNZfJv8SxCoSSuVA3wk%3D&amp;reserved=3D0" target=3D"_blank"><span =
lang=3D"EN-US" style=3D"font-size:10pt;font-family:&quot;Arial Narrow&quot;=
,sans-serif;text-decoration:none"><img border=3D"0" width=3D"96" height=3D"=
23" style=3D"width: 1in; height: 0.2395in;" id=3D"gmail-m_96263246078289229=
_x0000_i1028" src=3D"https://drive.google.com/a/transmute.industries/uc?id=
=3D1hbftCJoB5KdeV_kzj4eeyS28V3zS9d9c&amp;export=3Ddownload"></span></a><spa=
n lang=3D"EN-US"><u></u><u></u></span></p></div></div></div></div></div></d=
iv></div></div></div></div></div></div><div><p class=3D"MsoNormal"><span la=
ng=3D"EN-US"><img border=3D"0" width=3D"1" height=3D"1" style=3D"width: 0.0=
104in; height: 0.0104in;" id=3D"gmail-m_96263246078289229_x0000_i1027" src=
=3D"https://mailfoogae.appspot.com/t?sender=3Dab3JpZUB0cmFuc211dGUuaW5kdXN0=
cmllcw%3D%3D&amp;type=3Dzerocontent&amp;guid=3D76629253-3770-41de-9267-7582=
2572b3a6"></span><span lang=3D"EN-US" style=3D"font-size:7.5pt;font-family:=
Gadugi,sans-serif;color:white">=E1=90=A7</span><span lang=3D"EN-US"><u></u>=
<u></u></span></p></div></div></div></blockquote></div><p class=3D"MsoNorma=
l"><br clear=3D"all"><u></u><u></u></p><div><p class=3D"MsoNormal"><u></u>=
=C2=A0<u></u></p></div><p class=3D"MsoNormal">-- <u></u><u></u></p><div><di=
v><div><div><div><div><div><div><div><div><p class=3D"MsoNormal"><b><span s=
tyle=3D"font-size:10pt;font-family:Tahoma,sans-serif;color:rgb(53,28,117);b=
ackground:white">ORIE STEELE</span></b> <u></u><u></u></p><div><p class=3D"=
MsoNormal"><span style=3D"font-size:10pt;font-family:&quot;Arial Narrow&quo=
t;,sans-serif;color:rgb(53,28,117);background:white">Chief Technical Office=
r</span><u></u><u></u></p></div><div><p class=3D"MsoNormal"><span style=3D"=
font-size:7.5pt;font-family:Arial,sans-serif;color:rgb(53,28,117);backgroun=
d:white"><a href=3D"http://www.transmute.industries" target=3D"_blank">www.=
transmute.industries</a></span><u></u><u></u></p></div><div><p class=3D"Mso=
Normal"><u></u>=C2=A0<u></u></p></div><div><p class=3D"MsoNormal"><a href=
=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww=
.transmute.industries%2F&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7C93f0e=
fd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63=
7832101843644104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMz=
IiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3D3M8AJs5OxbUjF13cqJx9TLa=
yJ2wdxuNAx1QG6dXk6vc%3D&amp;reserved=3D0" target=3D"_blank"><span style=3D"=
font-size:10pt;font-family:&quot;Arial Narrow&quot;,sans-serif;text-decorat=
ion:none"><img border=3D"0" width=3D"96" height=3D"23" style=3D"width: 1in;=
 height: 0.2395in;" id=3D"gmail-m_96263246078289229_x0000_i1026" src=3D"htt=
ps://drive.google.com/a/transmute.industries/uc?id=3D1hbftCJoB5KdeV_kzj4eey=
S28V3zS9d9c&amp;export=3Ddownload"></span></a><u></u><u></u></p></div></div=
></div></div></div></div></div></div></div></div></div></blockquote></div><=
p class=3D"MsoNormal"><br clear=3D"all"><u></u><u></u></p><div><p class=3D"=
MsoNormal"><u></u>=C2=A0<u></u></p></div><p class=3D"MsoNormal">-- <u></u><=
u></u></p><div><div><div><div><div><div><div><div><div><div><p class=3D"Mso=
Normal"><b><span style=3D"font-size:10pt;font-family:Tahoma,sans-serif;colo=
r:rgb(53,28,117);background:white">ORIE STEELE</span></b> <u></u><u></u></p=
><div><p class=3D"MsoNormal"><span style=3D"font-size:10pt;font-family:&quo=
t;Arial Narrow&quot;,sans-serif;color:rgb(53,28,117);background:white">Chie=
f Technical Officer</span><u></u><u></u></p></div><div><p class=3D"MsoNorma=
l"><span style=3D"font-size:7.5pt;font-family:Arial,sans-serif;color:rgb(53=
,28,117);background:white"><a href=3D"http://www.transmute.industries" targ=
et=3D"_blank">www.transmute.industries</a></span><u></u><u></u></p></div><d=
iv><p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p></div><div><p class=3D"Ms=
oNormal"><a href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dh=
ttps%3A%2F%2Fwww.transmute.industries%2F&amp;data=3D04%7C01%7Cantdl%40micro=
soft.com%7C93f0efd4fc634008538808da08ea64eb%7C72f988bf86f141af91ab2d7cd011d=
b47%7C1%7C0%7C637832101843694104%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMD=
AiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3Dwl7DU8C=
V3SPJb5xgqdl3MRYzwK4bBeux16YPNbmcPus%3D&amp;reserved=3D0" target=3D"_blank"=
><span style=3D"font-size:10pt;font-family:&quot;Arial Narrow&quot;,sans-se=
rif;text-decoration:none"><img border=3D"0" width=3D"96" height=3D"23" styl=
e=3D"width: 1in; height: 0.2395in;" id=3D"gmail-m_96263246078289229_x0000_i=
1025" src=3D"https://drive.google.com/a/transmute.industries/uc?id=3D1hbftC=
JoB5KdeV_kzj4eeyS28V3zS9d9c&amp;export=3Ddownload"></span></a><u></u><u></u=
></p></div></div></div></div></div></div></div></div></div></div></div></di=
v></div></div></blockquote></div><br clear=3D"all"><div><br></div>-- <br><d=
iv dir=3D"ltr" class=3D"gmail_signature"><div dir=3D"ltr"><div><div dir=3D"=
ltr"><div><div dir=3D"ltr"><div><div dir=3D"ltr"><div><div dir=3D"ltr"><fon=
t face=3D"tahoma, sans-serif" size=3D"2" color=3D"#351c75"><b style=3D"back=
ground-color:rgb(255,255,255)">ORIE STEELE</b></font><div><font size=3D"2" =
face=3D"arial narrow, sans-serif" style=3D"background-color:rgb(255,255,255=
)" color=3D"#351c75">Chief Technical Officer</font></div><div><font style=
=3D"background-color:rgb(255,255,255)" color=3D"#351c75" face=3D"arial, hel=
vetica, sans-serif" size=3D"1">www.transmute.industries</font></div><div><f=
ont size=3D"2" face=3D"arial narrow, sans-serif"><br></font></div><div><fon=
t size=3D"2" face=3D"arial narrow, sans-serif"><a href=3D"https://www.trans=
mute.industries" target=3D"_blank"><img src=3D"https://drive.google.com/a/t=
ransmute.industries/uc?id=3D1hbftCJoB5KdeV_kzj4eeyS28V3zS9d9c&amp;export=3D=
download" width=3D"96" height=3D"23"></a><br></font></div></div></div></div=
></div></div></div></div></div></div></div>

--000000000000802d0605da811b16--


From nobody Fri Mar 18 10:10:25 2022
Return-Path: <antdl@microsoft.com>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D52173A0D76 for <scitt@ietfa.amsl.com>; Fri, 18 Mar 2022 10:09:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.098
X-Spam-Level: 
X-Spam-Status: No, score=-1.098 tagged_above=-999 required=5 tests=[AC_DIV_BONANZA=0.001, BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, DOTGOV_IMAGE=1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GjSTit3hKKZV for <scitt@ietfa.amsl.com>; Fri, 18 Mar 2022 10:09:55 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-vi1eur04on0705.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe0e::705]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 70A083A0D54 for <scitt@ietf.org>; Fri, 18 Mar 2022 10:09:54 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FHoor+jqerprDsMYjCqnfpoxZYGY/L2OoMevfrOlCQpLlaUp817oxkNocv2r95tCntxWMX/cAGIr0ykor9tKDHYXBmeEuxdRATPYwYdy8WbRWKv18L22jBKIxPQuJbjRl6M/cDUtSah5j6O6eZkAfa2kILvt/aouYAqb8XMYjc7LJYpCk9GpzY9GK7aN8LTuU/9doHZHFjRQZ6BXSZNTo4b9gqxil/dINIjN1M4OXFIX8m/V43Ft+RTrWZOJw0VbcazBkw0wCm5wge3KVIjtMaoAs0uowblAh/7VbuZu8K0pNSsAlecSJb8NC8nz0RqrnZ1AX5bSbMdiZRCK9TK2dA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=G51Ju4Cb9kTldKkahIMeg50iu4/YSyLFZt2/el/KIao=; b=U21uV24IY2Vk0hGBWVupasDMVMU4uAnML9RLbiO7G4CM38W9isqF6OCgBJRB167Q08WWS8ZwtD4aJg8yqytP7GMtusoeI1B/4u/FfTzxn8TNu8wu8WZ18+jYqe1T1yVG6bkHUPZEFM65jybLNjBObgx6uQ6EqGbS5sCUoU11IBCjpmrOFo36XWbqdGgZrG80LShIMqUUagky8yzvPloYMvQdtHpBfHhRp7xgkosaLxFjpwtqMR8OPXmQ1loKnTIKYkvN3T/zV+7tBPZ6Dp9MD3Suqi7/2Tgl82tZHsK5uJIm3n4JOvgGRSccSsj5scOD4YX8cNZxYLgKmcVNC/JiyA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=G51Ju4Cb9kTldKkahIMeg50iu4/YSyLFZt2/el/KIao=; b=Q+qmdHzVJTYTyZOEsRElx4JVJN7zh4m6PW7LicfFz2aNo+TCy3KxH68ecTJeQ1RS77MF+INMWCld+r0PwBUJC8ckIeBmaGOL3nVA6rDfcukd9d+mg2KsBARwgRWpovR5Up9Dn3JB/dkE3tWY0K81uktQQL4C3IlA+ofvcTDzHlE=
Received: from AM5PR83MB0372.EURPRD83.prod.outlook.com (2603:10a6:206:25::13) by AM9PR83MB0484.EURPRD83.prod.outlook.com (2603:10a6:20b:2d5::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.7; Fri, 18 Mar 2022 17:09:46 +0000
Received: from AM5PR83MB0372.EURPRD83.prod.outlook.com ([fe80::2522:e346:6a88:d4f]) by AM5PR83MB0372.EURPRD83.prod.outlook.com ([fe80::2522:e346:6a88:d4f%3]) with mapi id 15.20.5102.012; Fri, 18 Mar 2022 17:09:46 +0000
From: Antoine Delignat-Lavaud <antdl@microsoft.com>
To: Orie Steele <orie@transmute.industries>
CC: "scitt@ietf.org" <scitt@ietf.org>, Sapan Narang <sapan@transmute.industries>, Kay Williams <kayw@microsoft.com>
Thread-Topic: [SCITT] [EXTERNAL] Re: GitHub DIDs & VCs for Supply Chain Traceability
Thread-Index: AQHYOuop4NwDaW1gcUueROgJ9h93S6zFX8xA
Date: Fri, 18 Mar 2022 17:09:46 +0000
Message-ID: <AM5PR83MB0372D66F117E5343E9F695E9B2139@AM5PR83MB0372.EURPRD83.prod.outlook.com>
References: <CAN8C-_K9KBg2DhKOHUf8EMXo5wmTnrEc011e3Q7Y8zFOJsZ-1Q@mail.gmail.com> <DM6PR21MB1148265AA4232ED71CC0D7D8C50C9@DM6PR21MB1148.namprd21.prod.outlook.com> <CAN8C-_J8tThmo2mdMyydP-5A1h9aHReftPDRVD_cZjMnd8=2hA@mail.gmail.com> <CAN8C-_KGz83+-giHgt9foheLU8rM+jd7mN92PJ+4pKVYbSXbHA@mail.gmail.com> <AM5PR83MB03726CB108BDE97A152E91D3B2139@AM5PR83MB0372.EURPRD83.prod.outlook.com> <CAN8C-_++P+Mu1zcV=PBqjfPPjHPCaYyL4OYXJamzO+Oa=-Z0PA@mail.gmail.com>
In-Reply-To: <CAN8C-_++P+Mu1zcV=PBqjfPPjHPCaYyL4OYXJamzO+Oa=-Z0PA@mail.gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=dbf14874-c0c7-4f13-a216-79999dfd5e94; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2022-03-18T17:08:39Z;  MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47;
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 143ee6ca-a6aa-4525-9724-08da09021a5e
x-ms-traffictypediagnostic: AM9PR83MB0484:EE_
x-ms-exchange-atpmessageproperties: SA|SL
x-microsoft-antispam-prvs: <AM9PR83MB0484AD98EAB22103AB0455DAB2139@AM9PR83MB0484.EURPRD83.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:AM5PR83MB0372.EURPRD83.prod.outlook.com; PTR:; CAT:NONE;  SFS:(13230001)(4636009)(366004)(451199009)(8936002)(5660300002)(52536014)(966005)(82960400001)(82950400001)(122000001)(166002)(99936003)(38070700005)(66556008)(26005)(186003)(71200400001)(38100700002)(76236003)(7696005)(53546011)(6506007)(107886003)(8676002)(76116006)(9686003)(4326008)(64756008)(66446008)(83380400001)(508600001)(316002)(6916009)(54906003)(10290500003)(86362001)(66476007)(66946007)(55016003)(2906002)(33656002)(8990500004)(99710200001)(10090945011); DIR:OUT; SFP:1102; 
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?utf-8?B?UEcxTDI5L1FXR3E4VEhCS2RzMURYZnNaMEtBRzUvL2I4K2FLek9PMFdVQm9R?= =?utf-8?B?VjcxWFBVaHFydDhuL0xFYmMrOEZBZHQyd3RLWVg2OWdreXFydjUwMDlMaHNo?= =?utf-8?B?bmxVNFNIR1had2k1V3VqaUZWcUkzVHNKTlhiZFdsV0FXS3c5T0RvTHpUUjJG?= =?utf-8?B?dzZmanJvN3VyUzBacXBpSVUyL3BDMjFuTTYrOTR4NXgzanBYS3QwUUtsdWd5?= =?utf-8?B?QTkrV21ybk5ObDVtOURQQjM1NVRhM0dOS2F1YlNvaDdvQTdUQ05wdTErbFBD?= =?utf-8?B?MGhyd1ZSa1pjZmhOVUZUQklPL1RGVkczNDloVVk4MzZkbVdQWjZlZ0FJaEZr?= =?utf-8?B?NDVMei9yaEJZQkFkTXlUclZ2b3FwVkRnK3lNMk1HeWZWL0h6dU9NWkVaTnFB?= =?utf-8?B?NmozbkE2YVpuZzFzQjY5VDVTejRxdFpjZ3BsVG1JZE5MSkREd2h4OGdsc2FJ?= =?utf-8?B?cjJLc1d2K1lBY29NdWdIMDVERjBrdmMyVkVaTUZBWUliZ2hSNFdqT1ZwSmdL?= =?utf-8?B?TjRwZFd1YXlORXVrNEdsTFBJMlZqcndPUkRTTjh2T3F3N0xQNXBmMHlTODRT?= =?utf-8?B?TC93Zko2NGhEZEEweCt6ZTZpRk91S1N3QjE4bTVxSTFrYUdaL0U4OVNaSkVN?= =?utf-8?B?YlF0YWZJUkFDbUtXa2cvT1phTVdIOWxnREFlbzJDd2E2L0hXb2E1dHBaWkda?= =?utf-8?B?TG9CZ2NBUUpETE83czBNenRNbS9KdDhzdnhhem1lZTVUazBCV3k0L2VFVkxP?= =?utf-8?B?MEN2dmQwdjFMcUc2djRRWDQ0RGZyRDRPK0J2NTA2clhrRWtNTThRN1c3U2ta?= =?utf-8?B?dCtoSlBKYi9uWGRjU0VUZlNtdDZVbzJzdTFmNGZHcEgzNHY1Vk1vaC9sY2Rm?= =?utf-8?B?cHFING1UcFRyd0hHL09MbnlSWHJJTnVYcmF1aGNkRTFVeU1TQVl0NnRGaHBm?= =?utf-8?B?cm8vWkpDRFlsSGF5UnJiTEZzZEZ2V2Q1WGJoYzFzV2xVYlBORWNJV3Rra3Zs?= =?utf-8?B?TkNUeEJEQ28rN055NWtmaHR2eXl3c0plRFRPRk5CZWhJK1h5eU5Hcmo5ak9Z?= =?utf-8?B?QlNKQUNQK0VFeWxtVktMUXhaOGVDN2VOUlkzVzJRc0xBTEtGSElVVFVjZEtx?= =?utf-8?B?cytHczFpMHVoVWQxeTk2blNYZWFvRUNTTzZpMVJweUZZeU9odER6ajBZUWNT?= =?utf-8?B?TngwTytpTHNEMGpZN2lUVjRtUGZJd2RlWHIrK1dZSllNTHpNOG1UYlBiMldT?= =?utf-8?B?d3hQbFlNV3VXMlp3SUoxUGRXdFdoVVFiQWh3U3YydlIxOG5NcWYySkYwT2g5?= =?utf-8?B?WlMwY0duWGFRRkZXTVBGRHNyUHd5VDI4S3JtVTRrT1Z1MjJJVzZNVlpWaWFB?= =?utf-8?B?a1cxczQzNGh4WE5sMHJ4QXpRRVlZVHpUNS9kN0orR0tRbU80QkhCc1hKbGFl?= =?utf-8?B?cjdKMEFwdjBHR2Zyc0szYmFmdXcyU2trY1JiNk5oNVJuUVMyb203d09GVEdG?= =?utf-8?B?K2lxeEpVa1A1OHQ3RlJ4bUprQ2NyaE5WM1U2YlBub3A3SGQxWEoyc3lCQmlN?= =?utf-8?B?SDRKT2QrZ0JOaml6cUJTaUdjRzVidE5ZVnBXS2pRcXFhekg3OGtUR2NLVXZQ?= =?utf-8?B?VmdCMXVDaElEQWFWMmFPY282WGJSSlJCVkhudmZIVURDcGZhT2JHeGljNlNP?= =?utf-8?B?cjZqOXE5V0RHc1V6VUdxVGJHb2FGbjNWbURLcXBYMUQ4a2pGaTFrSm1zNm4z?= =?utf-8?B?bWNFSzVvdDRHYlhmeUlQYlhGTDBkZWFTTTJQQk5kZm5UZ0lEdjB2MmNKYWgx?= =?utf-8?B?TVl6SlRiY0dHcVNmcCt2UTZWaVpBOGR4MDRwMk5IMlc3VGVUVk5meHpaOVAw?= =?utf-8?B?bmxHcjcrWWNDTjJvWmdlbVM2KzdLeWhlNEI1U0ZKeUJXaC96QjIxdStPK2FO?= =?utf-8?Q?m9ZOC+//8ObP4ugw08/KXpGHpVYoytJX?=
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0024_01D83AEA.F6C65160"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM5PR83MB0372.EURPRD83.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 143ee6ca-a6aa-4525-9724-08da09021a5e
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Mar 2022 17:09:46.1987 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: /WCdJt5w13/t8tlFxDYCNw0aOlJe5ecwZcY9OJBIQ6TRRMqiwAC4B0/4Wyc6LuD3U4KDx0kWgAfSeOinfRf1IQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM9PR83MB0484
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/f4frBYdQ-XKE44SBojGXyj1Budo>
Subject: Re: [SCITT] [EXTERNAL] Re: GitHub DIDs & VCs for Supply Chain Traceability
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Mar 2022 17:10:06 -0000

------=_NextPart_000_0024_01D83AEA.F6C65160
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_0025_01D83AEA.F6C65160"


------=_NextPart_001_0025_01D83AEA.F6C65160
Content-Type: text/plain;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

I am referring to this draft - Traceability Vocabulary v0.0 =
(w3c-ccg.github.io) <https://w3c-ccg.github.io/traceability-vocab/>=20

Do you have any follow up draft that goes beyond vocabulary?=20

=20

Antoine

=20

From: SCITT <scitt-bounces@ietf.org> On Behalf Of Orie Steele
Sent: 18 March 2022 17:02
To: Antoine Delignat-Lavaud <antdl@microsoft.com>
Cc: scitt@ietf.org; Sapan Narang <sapan@transmute.industries>; Kay =
Williams <kayw@microsoft.com>
Subject: Re: [SCITT] [EXTERNAL] Re: GitHub DIDs & VCs for Supply Chain =
Traceability

=20

=09
You don't often get email from orie@transmute.industries =
<mailto:orie@transmute.industries> . Learn why this is important =
<http://aka.ms/LearnAboutSenderIdentification>=20

=09

Antoine,

I'm not sure which "W3C" document you are referring to.

I linked 2 W3C TRs (both contributed to by Microsoft and approved by =
Microsoft AC Rep), and a few community group drafts at DIF (contributed =
to by Microsoft) and at the W3C CCG (not contributed to by Microsoft).

Which document are you referring to?

OS

=20

On Fri, Mar 18, 2022 at 11:54 AM Antoine Delignat-Lavaud =
<antdl@microsoft.com <mailto:antdl@microsoft.com> > wrote:

Hi Orie,

=20

Is there any follow up to the W3C Traceability Vocabulary document? It =
has some good context and terminology on supply chain security but =
doesn=E2=80=99t seem to offer any concrete solution or improvement.=20

=20

Antoine

=20

From: SCITT <scitt-bounces@ietf.org <mailto:scitt-bounces@ietf.org> > On =
Behalf Of Orie Steele
Sent: 18 March 2022 14:20
To: Kay Williams <kayw@microsoft.com <mailto:kayw@microsoft.com> >
Cc: Sapan Narang <sapan@transmute.industries =
<mailto:sapan@transmute.industries> >; scitt@ietf.org =
<mailto:scitt@ietf.org>=20
Subject: [EXTERNAL] Re: [SCITT] GitHub DIDs & VCs for Supply Chain =
Traceability

=20

=09
Some people who received this message don't often get email from =
orie@transmute.industries <mailto:orie@transmute.industries> . Learn why =
this is important <http://aka.ms/LearnAboutSenderIdentification>=20

=09

I am prepared to present, can you confirm a time.

Regards,

OS

=20

On Mon, Mar 14, 2022 at 10:21 AM Orie Steele <orie@transmute.industries =
<mailto:orie@transmute.industries> > wrote:

Sorry I got to this late.

I can prepare something for the next meeting.

Regards,

OS

=20

On Fri, Mar 11, 2022 at 4:59 PM Kay Williams <kayw@microsoft.com =
<mailto:kayw@microsoft.com> > wrote:

Hi Orie (and Sapan),

=20

Apologies for my late response to your email.  It landed in my spam =
folder, and I am just now seeing it.  (As a side note, I have now =
unblocked all email from ietf.org =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fietf.=
org%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93be4a9d938408da0=
9011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832198406809551%7=
CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haW=
wiLCJXVCI6Mn0%3D%7C3000&sdata=3D4jYvz%2BbE4EX0fO%2FhkFtA97ZmJci54AMPkdrbn=
6psZyw%3D&reserved=3D0> .)

=20

Thank you for sharing this work.  Would you be interested in taking a =
few minutes on the agenda at our Monday 3/14 4 PM UTC meeting, or a =
future meeting, to provide an overview an entertain discussion?

=20

Kay

=20

From: SCITT <scitt-bounces@ietf.org <mailto:scitt-bounces@ietf.org> > On =
Behalf Of Orie Steele
Sent: Monday, March 7, 2022 10:41 AM
To: scitt@ietf.org <mailto:scitt@ietf.org>=20
Cc: Sapan Narang <sapan@transmute.industries =
<mailto:sapan@transmute.industries> >
Subject: [SCITT] GitHub DIDs & VCs for Supply Chain Traceability

=20

Hello,

I'm Orie, I work on identifier and credentialing standards at W3C and =
IETF.

My company Transmute =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqiYqEgkF4xWgxA5Ast%2Fhttps%253A%252F%252Ftransmute.in=
dustries%252F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93be4a9d93=
8408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378321984068=
59548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI=
6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DIx4VGApu5xPqBdsE%2BlnU0rBRUWUA%2Bw=
8HYCchDpSzDsg%3D&reserved=3D0>  applies these standards to supply =
traceability (both physical and software).

Some of our work is funded by DHS SVIP =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqNTelooObAhwFx98Nw%2Fhttps%253A%252F%252Fwww.dhs.gov%=
252Fscience-and-technology%252Fsvip&data=3D04%7C01%7Cantdl%40microsoft.co=
m%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7=
C1%7C0%7C637832198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiL=
CJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DFjLr2DPDP%2F=
mqyEMSCCL2lKkLPGFzinrHlZ0YNu7Yj%2B0%3D&reserved=3D0> , including our =
work on applying DIDs and VCs to physical supply chain issues associated =
with global trade and imports and exports.

If you are interested in that work it can be found here: =
https://w3id.org/traceability =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQy2fH6UWEI23iw-vWGEG%2Fhttps%253A%252F%252Fw3id.org%252=
Ftraceability&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93be4a9d93=
8408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378321984068=
59548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI=
6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DBzeAH4EO3qhT%2BiOvFIgY0iP0JxD9w8aI=
jBZltzoNA0s%3D&reserved=3D0> .

I wanted to share some very recent (experimental and unstable) work =
we've done to enable Decentralized Identifiers =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqX11lXlzLvQgPI070Q%2Fhttps%253A%252F%252Fwww.w3.org%2=
52FTR%252Fdid-core%252F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e=
93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637=
832198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luM=
zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DmipIQWqDcsK13zKrbXd0Ux2K=
lC11KUFV5MV3d%2BOrP04%3D&reserved=3D0>  and Verifiable Credentials =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQymDA7VYHe95RgZjMZKI%2Fhttps%253A%252F%252Fwww.w3.org%2=
52FTR%252Fvc-data-model%252F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4=
a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%=
7C637832198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoi=
V2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3Dl1f8CCIU71FCXXamkWD=
cTrZlxAOIqCVTZOfoOeDEzjE%3D&reserved=3D0>  to assist with the software =
supply chain.

Here are the links:

- https://github.com/transmute-industries/verifiable-actions =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqXl4mGukfBcw_Wj_Q8%2Fhttps%253A%252F%252Fgithub.com%2=
52Ftransmute-industries%252Fverifiable-actions&data=3D04%7C01%7Cantdl%40m=
icrosoft.com%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7=
cd011db47%7C1%7C0%7C637832198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC=
4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DL=
YTZNASkLQaZSTgTNMEVfLZhWGoN%2BAyIsKYm%2Bv9LQUo%3D&reserved=3D0>=20
- =
https://github.com/transmute-industries/public-credential-registry-templa=
te

The key idea is to enable github actions to sign and verify credentials =
that conform to the W3C Verifiable Credentials standard (which in turn =
supports various envelope formats including JOSE, COSE and PGP).

The issuers are identified with W3C Decentralized Identifiers, which =
provide a layer of interoperability for public key identifier =
registries.=20
The key value of this standard is the ability to support both =
traditional public key based identifiers, web resource based identifiers =
and blockchain based identifiers in the same data model.

The examples in the repository links above demonstrate support for these =
standards using did:key =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyuGxqSDtSpdZABx8eMt%2Fhttps%253A%252F%252Fw3c-ccg.gith=
ub.io%252Fdid-method-key%252F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff=
4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0=
%7C637832198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo=
iV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3Dd9RkjLXNP%2B8gJ%2B=
QmUvSjLCkOrp6P1NNicOK5vubVoCk%3D&reserved=3D0>  and did:web =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqsLGN-htS74QXmSanv%2Fhttps%253A%252F%252Fgithub.com%2=
52Fw3c-ccg%252Fdid-method-web&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff=
4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0=
%7C637832198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjo=
iV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3Dh4FixwKFTWBYIsyqFL=
wBuPSTzC59JgVmV6CiFMUAqYA%3D&reserved=3D0> ,=20
however I am one of the editors of the Sidetree Protocol =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyuu7nlpbor7UAurwtjs%2Fhttps%253A%252F%252Fgithub.com%2=
52Fdecentralized-identity%252Fsidetree&data=3D04%7C01%7Cantdl%40microsoft=
.com%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db4=
7%7C1%7C0%7C637832198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMD=
AiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DGSKjzf%2F=
wQjN%2Bti8QnGr9Ngs%2FAogG5BvnGwdflhm3R7M%3D&reserved=3D0>  which is what =
powers did:ion which is being developed by Microsoft and other DIF =
members...=20
The GitHub examples I provided will also work with did:ion.

Feel free to raise issues on any of the repositories linked, or ask me =
questions directly by email if you are not comfortable commenting on a =
public repo.

Regards,

OS


=20

--=20

ORIE STEELE

Chief Technical Officer

www.transmute.industries =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.t=
ransmute.industries%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e9=
3be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378=
32198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMz=
IiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D8rexUHYxTWo%2BdscrZQn%2Ff=
NepT89zLhzkqj%2FOlBSKtmM%3D&reserved=3D0>=20

=20

 =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqJyZSff0skfwnnG7JR%2Fhttps%253A%252F%252Fwww.transmut=
e.industries&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93be4a9d938=
408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63783219840690=
9546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6=
Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3Ds68xBb9HX6UQisVtRWMdNUvLwYCEpW%2Bhx=
p6wNMyNVY4%3D&reserved=3D0>=20

  =
<https://mailfoogae.appspot.com/t?sender=3Dab3JpZUB0cmFuc211dGUuaW5kdXN0c=
mllcw%3D%3D&type=3Dzerocontent&guid=3D76629253-3770-41de-9267-75822572b3a=
6> =E1=90=A7




=20

--=20

ORIE STEELE=20

Chief Technical Officer

www.transmute.industries =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.t=
ransmute.industries%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e9=
3be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378=
32198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMz=
IiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D8rexUHYxTWo%2BdscrZQn%2Ff=
NepT89zLhzkqj%2FOlBSKtmM%3D&reserved=3D0>=20

=20

 =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.=
transmute.industries%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e=
93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637=
832198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luM=
zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D1YUAFfSlm9oMsIvZz2nExEwd=
bumZLfSfi9w8hDyl7Ak%3D&reserved=3D0>=20




=20

--=20

ORIE STEELE=20

Chief Technical Officer

www.transmute.industries =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.t=
ransmute.industries%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e9=
3be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378=
32198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMz=
IiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D8rexUHYxTWo%2BdscrZQn%2Ff=
NepT89zLhzkqj%2FOlBSKtmM%3D&reserved=3D0>=20

=20

 =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.=
transmute.industries%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e=
93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637=
832198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luM=
zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D1YUAFfSlm9oMsIvZz2nExEwd=
bumZLfSfi9w8hDyl7Ak%3D&reserved=3D0>=20




=20

--=20

ORIE STEELE=20

Chief Technical Officer

www.transmute.industries <http://www.transmute.industries>=20

=20

 =
<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.=
transmute.industries%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e=
93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637=
832198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luM=
zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D1YUAFfSlm9oMsIvZz2nExEwd=
bumZLfSfi9w8hDyl7Ak%3D&reserved=3D0>=20


------=_NextPart_001_0025_01D83AEA.F6C65160
Content-Type: text/html;
	charset="utf-8"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; charset=3Dutf-8"><meta =
name=3DGenerator content=3D"Microsoft Word 15 (filtered medium)"><!--[if =
!mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Gadugi;
	panose-1:2 11 5 2 4 2 4 2 2 3;}
@font-face
	{font-family:"Segoe UI";
	panose-1:2 11 5 2 4 2 4 2 2 3;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
@font-face
	{font-family:"Arial Narrow";
	panose-1:2 11 6 6 2 2 2 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-GB link=3Dblue =
vlink=3Dpurple style=3D'word-wrap:break-word'><div =
class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'mso-fareast-language:EN-US'>I am referring to this draft - =
</span><a =
href=3D"https://w3c-ccg.github.io/traceability-vocab/">Traceability =
Vocabulary v0.0 (w3c-ccg.github.io)</a><o:p></o:p></p><p =
class=3DMsoNormal>Do you have any follow up draft that goes beyond =
vocabulary? <o:p></o:p></p><p class=3DMsoNormal><o:p>&nbsp;</o:p></p><p =
class=3DMsoNormal>Antoine<span =
style=3D'mso-fareast-language:EN-US'><o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'mso-fareast-language:EN-US'><o:p>&nbsp;</o:p></span></p><div><di=
v style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0cm =
0cm 0cm'><p class=3DMsoNormal><b><span =
lang=3DEN-US>From:</span></b><span lang=3DEN-US> SCITT =
&lt;scitt-bounces@ietf.org&gt; <b>On Behalf Of </b>Orie =
Steele<br><b>Sent:</b> 18 March 2022 17:02<br><b>To:</b> Antoine =
Delignat-Lavaud &lt;antdl@microsoft.com&gt;<br><b>Cc:</b> =
scitt@ietf.org; Sapan Narang &lt;sapan@transmute.industries&gt;; Kay =
Williams &lt;kayw@microsoft.com&gt;<br><b>Subject:</b> Re: [SCITT] =
[EXTERNAL] Re: GitHub DIDs &amp; VCs for Supply Chain =
Traceability<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><table class=3DMsoNormalTable =
border=3D0 cellspacing=3D0 cellpadding=3D0 align=3Dleft width=3D"100%" =
style=3D'width:100.0%'><tr><td =
style=3D'background:#A6A6A6;padding:5.25pt 1.5pt 5.25pt 1.5pt'></td><td =
width=3D"100%" style=3D'width:100.0%;background:#EAEAEA;padding:5.25pt =
3.75pt 5.25pt 11.25pt'><div><p class=3DMsoNormal =
style=3D'mso-element:frame;mso-element-frame-hspace:2.25pt;mso-element-wr=
ap:around;mso-element-anchor-vertical:paragraph;mso-element-anchor-horizo=
ntal:column;mso-height-rule:exactly'><span =
style=3D'font-size:9.0pt;font-family:"Segoe =
UI",sans-serif;color:#212121'>You don't often get email from <a =
href=3D"mailto:orie@transmute.industries">orie@transmute.industries</a>. =
<a href=3D"http://aka.ms/LearnAboutSenderIdentification">Learn why this =
is important</a><o:p></o:p></span></p></div></td><td width=3D75 =
style=3D'width:56.25pt;background:#EAEAEA;padding:5.25pt 3.75pt 5.25pt =
3.75pt;align:left'></td></tr></table><div><div><div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>Antoine,<o:p></o:p></p></div><p =
class=3DMsoNormal>I'm not sure which &quot;W3C&quot; document you are =
referring to.<br><br>I linked 2 W3C TRs (both contributed to by =
Microsoft and approved by Microsoft AC Rep), and a few =
community&nbsp;group drafts at DIF (contributed to by Microsoft) and at =
the W3C CCG (not contributed to by Microsoft).<br><br>Which document are =
you referring to?<br><br>OS<o:p></o:p></p></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><p class=3DMsoNormal>On =
Fri, Mar 18, 2022 at 11:54 AM Antoine Delignat-Lavaud &lt;<a =
href=3D"mailto:antdl@microsoft.com">antdl@microsoft.com</a>&gt; =
wrote:<o:p></o:p></p></div><blockquote =
style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0cm 0cm 0cm =
6.0pt;margin-left:4.8pt;margin-right:0cm'><div><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>Hi =
Orie,<o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>&nbsp;<o:p><=
/o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>Is there =
any follow up to the W3C Traceability Vocabulary document? It has some =
good context and terminology on supply chain security but =
doesn=E2=80=99t seem to offer any concrete solution or improvement. =
<o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>&nbsp;<o:p><=
/o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>Antoine<o:p>=
</o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>&nbsp;<o:p><=
/o:p></p><div><div style=3D'border:none;border-top:solid #E1E1E1 =
1.0pt;padding:3.0pt 0cm 0cm 0cm'><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><b><span =
lang=3DEN-US>From:</span></b><span lang=3DEN-US> SCITT &lt;<a =
href=3D"mailto:scitt-bounces@ietf.org" =
target=3D"_blank">scitt-bounces@ietf.org</a>&gt; <b>On Behalf Of =
</b>Orie Steele<br><b>Sent:</b> 18 March 2022 14:20<br><b>To:</b> Kay =
Williams &lt;<a href=3D"mailto:kayw@microsoft.com" =
target=3D"_blank">kayw@microsoft.com</a>&gt;<br><b>Cc:</b> Sapan Narang =
&lt;<a =
href=3D"mailto:sapan@transmute.industries">sapan@transmute.industries</a>=
&gt;; <a href=3D"mailto:scitt@ietf.org" =
target=3D"_blank">scitt@ietf.org</a><br><b>Subject:</b> [EXTERNAL] Re: =
[SCITT] GitHub DIDs &amp; VCs for Supply Chain =
Traceability</span><o:p></o:p></p></div></div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>&nbsp;<o:p><=
/o:p></p><table class=3DMsoNormalTable border=3D0 cellspacing=3D0 =
cellpadding=3D0 align=3Dleft width=3D"100%" =
style=3D'width:100.0%'><tr><td =
style=3D'background:#A6A6A6;padding:5.25pt 1.5pt 5.25pt 1.5pt'></td><td =
width=3D"100%" style=3D'width:100.0%;background:#EAEAEA;padding:5.25pt =
3.75pt 5.25pt 11.25pt'><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto;mso-element:f=
rame;mso-element-frame-hspace:2.25pt;mso-element-wrap:around;mso-element-=
anchor-vertical:paragraph;mso-element-anchor-horizontal:column;mso-height=
-rule:exactly'><span style=3D'font-size:9.0pt;font-family:"Segoe =
UI",sans-serif;color:#212121'>Some people who received this message =
don't often get email from <a href=3D"mailto:orie@transmute.industries" =
target=3D"_blank">orie@transmute.industries</a>. <a =
href=3D"http://aka.ms/LearnAboutSenderIdentification" =
target=3D"_blank">Learn why this is =
important</a></span><o:p></o:p></p></div></td><td width=3D75 =
style=3D'width:56.25pt;background:#EAEAEA;padding:5.25pt 3.75pt 5.25pt =
3.75pt'></td></tr></table><div><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>I am =
prepared to present, can you confirm a =
time.<br><br>Regards,<br><br>OS<o:p></o:p></p></div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>&nbsp;<o:p><=
/o:p></p><div><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>On Mon, Mar =
14, 2022 at 10:21 AM Orie Steele &lt;<a =
href=3D"mailto:orie@transmute.industries" =
target=3D"_blank">orie@transmute.industries</a>&gt; =
wrote:<o:p></o:p></p></div><blockquote =
style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0cm 0cm 0cm =
6.0pt;margin-left:4.8pt;margin-top:5.0pt;margin-right:0cm;margin-bottom:5=
.0pt'><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>Sorry I got =
to this late.<br><br>I can prepare something for the next =
meeting.<br><br>Regards,<br><br>OS<o:p></o:p></p></div><p =
class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>&nbsp;<o:p><=
/o:p></p><div><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>On Fri, Mar =
11, 2022 at 4:59 PM Kay Williams &lt;<a =
href=3D"mailto:kayw@microsoft.com" =
target=3D"_blank">kayw@microsoft.com</a>&gt; =
wrote:<o:p></o:p></p></div><blockquote =
style=3D'border:none;border-left:solid #CCCCCC 1.0pt;padding:0cm 0cm 0cm =
6.0pt;margin-left:4.8pt;margin-top:5.0pt;margin-right:0cm;margin-bottom:5=
.0pt'><div><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>Hi Orie (and Sapan),</span><o:p></o:p></p><p =
class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>Apologies for my late response to your email.&nbsp; It =
landed in my spam folder, and I am just now seeing it.&nbsp; (As a side =
note, I have now unblocked all email from <a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%=
2Fietf.org%2F&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93be4a=
9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832198=
406809551%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJ=
BTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3D4jYvz%2BbE4EX0fO%2FhkFtA97=
ZmJci54AMPkdrbn6psZyw%3D&amp;reserved=3D0" =
target=3D"_blank">ietf.org</a>.)</span><o:p></o:p></p><p =
class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>Thank you for sharing this work.&nbsp; Would you be =
interested in taking a few minutes on the agenda at our Monday 3/14 4 PM =
UTC meeting, or a future meeting, to provide an overview an entertain =
discussion?</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>Kay</span><o:p></o:p></p><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>&nbsp;</span><o:p></o:p></p><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0cm =
0cm 0cm'><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><b><span =
lang=3DEN-US>From:</span></b><span lang=3DEN-US> SCITT &lt;<a =
href=3D"mailto:scitt-bounces@ietf.org" =
target=3D"_blank">scitt-bounces@ietf.org</a>&gt; <b>On Behalf Of =
</b>Orie Steele<br><b>Sent:</b> Monday, March 7, 2022 10:41 =
AM<br><b>To:</b> <a href=3D"mailto:scitt@ietf.org" =
target=3D"_blank">scitt@ietf.org</a><br><b>Cc:</b> Sapan Narang &lt;<a =
href=3D"mailto:sapan@transmute.industries" =
target=3D"_blank">sapan@transmute.industries</a>&gt;<br><b>Subject:</b> =
[SCITT] GitHub DIDs &amp; VCs for Supply Chain =
Traceability</span><o:p></o:p></p></div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>&nbsp;</span><o:p></o:p></p><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>Hello,<br><br>I'm Orie, I work on identifier and =
credentialing standards at W3C and IETF.<br><br>My company <a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQyqiYqEgkF4xWgxA5Ast%2Fhttps%253A%252F%252Ftrans=
mute.industries%252F&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183=
e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63=
7832198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2lu=
MzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DIx4VGApu5xPqBdsE%2B=
lnU0rBRUWUA%2Bw8HYCchDpSzDsg%3D&amp;reserved=3D0" =
target=3D"_blank">Transmute</a> applies these standards to supply =
traceability (both physical&nbsp;and software).<br><br>Some of our work =
is funded by <a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQyqNTelooObAhwFx98Nw%2Fhttps%253A%252F%252Fwww.d=
hs.gov%252Fscience-and-technology%252Fsvip&amp;data=3D04%7C01%7Cantdl%40m=
icrosoft.com%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7=
cd011db47%7C1%7C0%7C637832198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC=
4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=
=3DFjLr2DPDP%2FmqyEMSCCL2lKkLPGFzinrHlZ0YNu7Yj%2B0%3D&amp;reserved=3D0" =
target=3D"_blank">DHS SVIP</a>, including our work on applying DIDs and =
VCs to physical supply chain&nbsp;issues associated with global trade =
and imports and exports.<br><br>If you are interested in that work it =
can be found here:&nbsp;<a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQy2fH6UWEI23iw-vWGEG%2Fhttps%253A%252F%252Fw3id.=
org%252Ftraceability&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183=
e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63=
7832198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2lu=
MzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DBzeAH4EO3qhT%2BiOvF=
IgY0iP0JxD9w8aIjBZltzoNA0s%3D&amp;reserved=3D0" =
target=3D"_blank">https://w3id.org/traceability</a>.<br><br>I wanted to =
share some very recent (experimental and unstable) work we've done to =
enable <a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQyqX11lXlzLvQgPI070Q%2Fhttps%253A%252F%252Fwww.w=
3.org%252FTR%252Fdid-core%252F&amp;data=3D04%7C01%7Cantdl%40microsoft.com=
%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C=
1%7C0%7C637832198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLC=
JQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DmipIQWqDc=
sK13zKrbXd0Ux2KlC11KUFV5MV3d%2BOrP04%3D&amp;reserved=3D0" =
target=3D"_blank">Decentralized Identifiers</a> and <a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQymDA7VYHe95RgZjMZKI%2Fhttps%253A%252F%252Fwww.w=
3.org%252FTR%252Fvc-data-model%252F&amp;data=3D04%7C01%7Cantdl%40microsof=
t.com%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db=
47%7C1%7C0%7C637832198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwM=
DAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3Dl1f8=
CCIU71FCXXamkWDcTrZlxAOIqCVTZOfoOeDEzjE%3D&amp;reserved=3D0" =
target=3D"_blank">Verifiable Credentials</a> to assist with the software =
supply chain.<br><br>Here are the links:<br><br>-&nbsp;<a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQyqXl4mGukfBcw_Wj_Q8%2Fhttps%253A%252F%252Fgithu=
b.com%252Ftransmute-industries%252Fverifiable-actions&amp;data=3D04%7C01%=
7Cantdl%40microsoft.com%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f1=
41af91ab2d7cd011db47%7C1%7C0%7C637832198406859548%7CUnknown%7CTWFpbGZsb3d=
8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C300=
0&amp;sdata=3DLYTZNASkLQaZSTgTNMEVfLZhWGoN%2BAyIsKYm%2Bv9LQUo%3D&amp;rese=
rved=3D0" =
target=3D"_blank">https://github.com/transmute-industries/verifiable-acti=
ons</a><br>-&nbsp;<a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQyuHh9DtUHodDwKXtBBB%2Fhttps%253A%252F%252Fgithu=
b.com%252Ftransmute-industries%252Fpublic-credential-registry-template&am=
p;data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93be4a9d938408da090114=
73%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832198406859548%7CUnkn=
own%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJ=
XVCI6Mn0%3D%7C3000&amp;sdata=3DP2GLeIO9erpNGOGKmnLyNMbsRGsHe%2FOez6r%2B%2=
FzlJzRI%3D&amp;reserved=3D0" =
target=3D"_blank">https://github.com/transmute-industries/public-credenti=
al-registry-template</a><br><br>The key idea is to enable github actions =
to sign and verify credentials that conform to the W3C Verifiable =
Credentials standard (which in turn supports various envelope formats =
including JOSE, COSE and PGP).<br><br>The issuers are =
identified&nbsp;with W3C Decentralized Identifiers, which provide a =
layer of interoperability for public key identifier&nbsp;registries. =
<br>The key value of this standard is the ability to support both =
traditional public key based identifiers, web resource based identifiers =
and blockchain&nbsp;based identifiers in the same data model.<br><br>The =
examples in the repository links above demonstrate support for these =
standards using <a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQyuGxqSDtSpdZABx8eMt%2Fhttps%253A%252F%252Fw3c-c=
cg.github.io%252Fdid-method-key%252F&amp;data=3D04%7C01%7Cantdl%40microso=
ft.com%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011d=
b47%7C1%7C0%7C637832198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAw=
MDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3Dd9R=
kjLXNP%2B8gJ%2BQmUvSjLCkOrp6P1NNicOK5vubVoCk%3D&amp;reserved=3D0" =
target=3D"_blank">did:key</a>&nbsp;and <a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQyqsLGN-htS74QXmSanv%2Fhttps%253A%252F%252Fgithu=
b.com%252Fw3c-ccg%252Fdid-method-web&amp;data=3D04%7C01%7Cantdl%40microso=
ft.com%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011d=
b47%7C1%7C0%7C637832198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAw=
MDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3Dh4F=
ixwKFTWBYIsyqFLwBuPSTzC59JgVmV6CiFMUAqYA%3D&amp;reserved=3D0" =
target=3D"_blank">did:web</a>, <br>however I am one of the editors of =
the&nbsp;<a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQyuu7nlpbor7UAurwtjs%2Fhttps%253A%252F%252Fgithu=
b.com%252Fdecentralized-identity%252Fsidetree&amp;data=3D04%7C01%7Cantdl%=
40microsoft.com%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab=
2d7cd011db47%7C1%7C0%7C637832198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjo=
iMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sd=
ata=3DGSKjzf%2FwQjN%2Bti8QnGr9Ngs%2FAogG5BvnGwdflhm3R7M%3D&amp;reserved=3D=
0" target=3D"_blank">Sidetree Protocol</a>&nbsp;which is what powers <a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQyuxcXKIp3hEOgkQqHLh%2Fhttps%253A%252F%252Ftechc=
ommunity.microsoft.com%252Ft5%252Fidentity-standards-blog%252Fion-we-have=
-liftoff%252Fba-p%252F1441555&amp;data=3D04%7C01%7Cantdl%40microsoft.com%=
7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1=
%7C0%7C637832198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJ=
QIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DYCr2pamOUm=
q4Yq39LDLlpeotuj2bNGZIutxts1Sum68%3D&amp;reserved=3D0" =
target=3D"_blank">did:ion</a>&nbsp;which is being developed by Microsoft =
and other DIF members... <br>The GitHub examples I provided will also =
work with did:ion.<br><br>Feel free to raise issues on any of the =
repositories linked, or ask me questions directly by email if you are =
not comfortable commenting on a public =
repo.<br><br>Regards,<br><br>OS<br =
clear=3Dall></span><o:p></o:p></p><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>&nbsp;</span><o:p></o:p></p></div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>-- =
</span><o:p></o:p></p><div><div><div><div><div><div><div><div><div><div><=
p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><b><span =
lang=3DEN-US =
style=3D'font-size:10.0pt;font-family:"Tahoma",sans-serif;color:#351C75;b=
ackground:white'>ORIE STEELE</span></b><o:p></o:p></p><div><p =
class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US style=3D'font-size:10.0pt;font-family:"Arial =
Narrow",sans-serif;color:#351C75;background:white'>Chief Technical =
Officer</span><o:p></o:p></p></div><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US =
style=3D'font-size:7.5pt;font-family:"Arial",sans-serif;color:#351C75;bac=
kground:white'><a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%=
2Fwww.transmute.industries%2F&amp;data=3D04%7C01%7Cantdl%40microsoft.com%=
7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1=
%7C0%7C637832198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJ=
QIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3D8rexUHYxTW=
o%2BdscrZQn%2FfNepT89zLhzkqj%2FOlBSKtmM%3D&amp;reserved=3D0" =
target=3D"_blank">www.transmute.industries</a></span><o:p></o:p></p></div=
><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fstreaklinks.com%2FA9ifQyqJyZSff0skfwnnG7JR%2Fhttps%253A%252F%252Fwww.t=
ransmute.industries&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e=
93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637=
832198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luM=
zIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3Ds68xBb9HX6UQisVtRWMd=
NUvLwYCEpW%2Bhxp6wNMyNVY4%3D&amp;reserved=3D0" target=3D"_blank"><span =
lang=3DEN-US style=3D'font-size:10.0pt;font-family:"Arial =
Narrow",sans-serif;text-decoration:none'><img border=3D0 width=3D96 =
height=3D23 style=3D'width:1.0in;height:.2395in' id=3D"_x0000_i1029" =
src=3D"https://drive.google.com/a/transmute.industries/uc?id=3D1hbftCJoB5=
KdeV_kzj4eeyS28V3zS9d9c&amp;export=3Ddownload"></span></a><o:p></o:p></p>=
</div></div></div></div></div></div></div></div></div></div></div></div><=
div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
lang=3DEN-US><img border=3D0 width=3D1 height=3D1 =
style=3D'width:.0104in;height:.0104in' id=3D"_x0000_i1028" =
src=3D"https://mailfoogae.appspot.com/t?sender=3Dab3JpZUB0cmFuc211dGUuaW5=
kdXN0cmllcw%3D%3D&amp;type=3Dzerocontent&amp;guid=3D76629253-3770-41de-92=
67-75822572b3a6"></span><span lang=3DEN-US =
style=3D'font-size:7.5pt;font-family:"Gadugi",sans-serif;color:white'>=E1=
=90=A7</span><o:p></o:p></p></div></div></div></blockquote></div><p =
class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><br =
clear=3Dall><o:p></o:p></p><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>&nbsp;<o:p><=
/o:p></p></div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>-- =
<o:p></o:p></p><div><div><div><div><div><div><div><div><div><div><p =
class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma",sans-serif;color:#351C75;b=
ackground:white'>ORIE STEELE</span></b> <o:p></o:p></p><div><p =
class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
style=3D'font-size:10.0pt;font-family:"Arial =
Narrow",sans-serif;color:#351C75;background:white'>Chief Technical =
Officer</span><o:p></o:p></p></div><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
style=3D'font-size:7.5pt;font-family:"Arial",sans-serif;color:#351C75;bac=
kground:white'><a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%=
2Fwww.transmute.industries%2F&amp;data=3D04%7C01%7Cantdl%40microsoft.com%=
7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1=
%7C0%7C637832198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJ=
QIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3D8rexUHYxTW=
o%2BdscrZQn%2FfNepT89zLhzkqj%2FOlBSKtmM%3D&amp;reserved=3D0" =
target=3D"_blank">www.transmute.industries</a></span><o:p></o:p></p></div=
><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>&nbsp;<o:p><=
/o:p></p></div><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fwww.transmute.industries%2F&amp;data=3D04%7C01%7Cantdl%40microsoft.com=
%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C=
1%7C0%7C637832198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLC=
JQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3D1YUAFfSlm=
9oMsIvZz2nExEwdbumZLfSfi9w8hDyl7Ak%3D&amp;reserved=3D0" =
target=3D"_blank"><span style=3D'font-size:10.0pt;font-family:"Arial =
Narrow",sans-serif;text-decoration:none'><img border=3D0 width=3D96 =
height=3D23 style=3D'width:1.0in;height:.2395in' id=3D"_x0000_i1027" =
src=3D"https://drive.google.com/a/transmute.industries/uc?id=3D1hbftCJoB5=
KdeV_kzj4eeyS28V3zS9d9c&amp;export=3Ddownload"></span></a><o:p></o:p></p>=
</div></div></div></div></div></div></div></div></div></div></div></block=
quote></div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><br =
clear=3Dall><o:p></o:p></p><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>&nbsp;<o:p><=
/o:p></p></div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>-- =
<o:p></o:p></p><div><div><div><div><div><div><div><div><div><div><p =
class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma",sans-serif;color:#351C75;b=
ackground:white'>ORIE STEELE</span></b> <o:p></o:p></p><div><p =
class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
style=3D'font-size:10.0pt;font-family:"Arial =
Narrow",sans-serif;color:#351C75;background:white'>Chief Technical =
Officer</span><o:p></o:p></p></div><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><span =
style=3D'font-size:7.5pt;font-family:"Arial",sans-serif;color:#351C75;bac=
kground:white'><a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%=
2Fwww.transmute.industries%2F&amp;data=3D04%7C01%7Cantdl%40microsoft.com%=
7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1=
%7C0%7C637832198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJ=
QIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3D8rexUHYxTW=
o%2BdscrZQn%2FfNepT89zLhzkqj%2FOlBSKtmM%3D&amp;reserved=3D0" =
target=3D"_blank">www.transmute.industries</a></span><o:p></o:p></p></div=
><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'>&nbsp;<o:p><=
/o:p></p></div><div><p class=3DMsoNormal =
style=3D'mso-margin-top-alt:auto;mso-margin-bottom-alt:auto'><a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fwww.transmute.industries%2F&amp;data=3D04%7C01%7Cantdl%40microsoft.com=
%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C=
1%7C0%7C637832198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLC=
JQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3D1YUAFfSlm=
9oMsIvZz2nExEwdbumZLfSfi9w8hDyl7Ak%3D&amp;reserved=3D0" =
target=3D"_blank"><span style=3D'font-size:10.0pt;font-family:"Arial =
Narrow",sans-serif;text-decoration:none'><img border=3D0 width=3D96 =
height=3D23 style=3D'width:1.0in;height:.2395in' id=3D"_x0000_i1026" =
src=3D"https://drive.google.com/a/transmute.industries/uc?id=3D1hbftCJoB5=
KdeV_kzj4eeyS28V3zS9d9c&amp;export=3Ddownload"></span></a><o:p></o:p></p>=
</div></div></div></div></div></div></div></div></div></div></div></div><=
/div></div></blockquote></div><p class=3DMsoNormal><br =
clear=3Dall><o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><p class=3DMsoNormal>-- =
<o:p></o:p></p><div><div><div><div><div><div><div><div><div><div><p =
class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma",sans-serif;color:#351C75;b=
ackground:white'>ORIE STEELE</span></b> <o:p></o:p></p><div><p =
class=3DMsoNormal><span style=3D'font-size:10.0pt;font-family:"Arial =
Narrow",sans-serif;color:#351C75;background:white'>Chief Technical =
Officer</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:7.5pt;font-family:"Arial",sans-serif;color:#351C75;bac=
kground:white'><a =
href=3D"http://www.transmute.industries">www.transmute.industries</a></sp=
an><o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><a =
href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F=
%2Fwww.transmute.industries%2F&amp;data=3D04%7C01%7Cantdl%40microsoft.com=
%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C=
1%7C0%7C637832198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLC=
JQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3D1YUAFfSlm=
9oMsIvZz2nExEwdbumZLfSfi9w8hDyl7Ak%3D&amp;reserved=3D0" =
target=3D"_blank"><span style=3D'font-size:10.0pt;font-family:"Arial =
Narrow",sans-serif;text-decoration:none'><img border=3D0 width=3D96 =
height=3D23 style=3D'width:1.0in;height:.2395in' id=3D"_x0000_i1025" =
src=3D"https://drive.google.com/a/transmute.industries/uc?id=3D1hbftCJoB5=
KdeV_kzj4eeyS28V3zS9d9c&amp;export=3Ddownload"></span></a><o:p></o:p></p>=
</div></div></div></div></div></div></div></div></div></div></div></div><=
/div></body></html>
------=_NextPart_001_0025_01D83AEA.F6C65160--

------=_NextPart_000_0024_01D83AEA.F6C65160
Content-Type: application/pkcs7-signature;
	name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment;
	filename="smime.p7s"
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------=_NextPart_000_0024_01D83AEA.F6C65160--


From nobody Fri Mar 18 11:32:43 2022
Return-Path: <kayw@microsoft.com>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2FC773A0C51 for <scitt@ietfa.amsl.com>; Fri, 18 Mar 2022 11:32:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.113
X-Spam-Level: 
X-Spam-Status: No, score=-0.113 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URI_TRY_3LD=1.997] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WNWcS45RtehM for <scitt@ietfa.amsl.com>; Fri, 18 Mar 2022 11:32:37 -0700 (PDT)
Received: from na01-obe.outbound.protection.outlook.com (mail-cusazlp170110003.outbound.protection.outlook.com [IPv6:2a01:111:f403:c111::3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EA7A23A0915 for <scitt@ietf.org>; Fri, 18 Mar 2022 11:32:36 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ECUY1PXlCNiWa2Ft555wcj/u2xoUHP6etcL+QI3NjbF0n9iby2E1/vOMavCencW9SSChSCHBeOKDgnEoD4A1D79vxardKsU6TmEd5pY0ev0rDUvhPspX5/6zGOwHesThjmIgJtbRwrDtOiawkz/kji1sd3Y01f/2vDVPHXrjVQugSzrdIsfzDe2ZMYHWTtm7Q1+OAt17PbpAO12+VIZGHlnIwzKO63HUSFNcygeq1xLYd1aoGhm/HX3H1BBc96wmjNtOC5FdJJanR6bE8gYxQ970zkzIQtnKl/Ur62xdIOxAMJzXR3/Gl+8huHuNKb7Kqs8fl35ir3XOA+UOIOPxLg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=dQyNjyLsxQotdjkzHvaVTmzQC3T+vtR2QCGwzgoXu3g=; b=g3vxkzeBErlpvf5pN6Y1Fq15SPKSN0Bs4aLHQ5J+iLT1Vg3mOzylV+xTqmMW9yi6WRe5H0iN4yPD1qmgJVnXuuVfKep1ORDkTnoaZWpZL/MJJPWnhHaDXQ681LF3UYbjuXoLCa43zCO8gkoc5S0t93571ucrEXmG8tEw4ugucMwGFyazwzr6BePojyxnZyRC3aJYwadn11tV02ybRWSCqNczIfhKLgwS+m1OFAjFtmal+5wOO+JHKLfh80dKffDttS5HOuoqDnNc/HHWjlHLnoNqWEvVJcQxHO+phx18svOaxBCHy+p3fT1jWYa8f4mVRp9Ncaiw8zK8IfpBcTDuqA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=dQyNjyLsxQotdjkzHvaVTmzQC3T+vtR2QCGwzgoXu3g=; b=JR1cijBbVX0lhL7YCP89zamXHvUTOvVFavH31CgXdXzw8KBdFqx2tDBmkconheLjFd1El5MS2gNgh2/1DDiLH5bzZoaaW1KZBoSZhhJbHrArPy9TuzJ6QUQh14s/tr4ihLvljP1W2PZZNDio/pSiC32N1Xh9MyuMW49rpAblFXM=
Received: from DM6PR21MB1148.namprd21.prod.outlook.com (2603:10b6:5:16d::28) by BY5PR21MB1377.namprd21.prod.outlook.com (2603:10b6:a03:23c::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.1; Fri, 18 Mar 2022 18:32:33 +0000
Received: from DM6PR21MB1148.namprd21.prod.outlook.com ([fe80::6c2e:c18e:10f9:4cbd]) by DM6PR21MB1148.namprd21.prod.outlook.com ([fe80::6c2e:c18e:10f9:4cbd%6]) with mapi id 15.20.5102.007; Fri, 18 Mar 2022 18:32:33 +0000
From: Kay Williams <kayw@microsoft.com>
To: "scitt@ietf.org" <scitt@ietf.org>
Thread-Topic: SCITT community meeting - 3/21 Agenda
Thread-Index: Adg69UcrpHUvYzQQSCCgrthP0hVUEw==
Date: Fri, 18 Mar 2022 18:32:33 +0000
Message-ID: <DM6PR21MB1148BE6D3FFE5EF6166449DFC5139@DM6PR21MB1148.namprd21.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2022-03-18T18:22:13Z;  MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=3f07b590-d055-41af-a7fb-655caa2eb466; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 313b3dfc-cfc4-470f-0108-08da090daad7
x-ms-traffictypediagnostic: BY5PR21MB1377:EE_
x-ms-exchange-atpmessageproperties: SA|SL
x-microsoft-antispam-prvs: <BY5PR21MB1377192341B169E271DA189BC5139@BY5PR21MB1377.namprd21.prod.outlook.com>
x-o365-sonar-daas-pilot: True
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:DM6PR21MB1148.namprd21.prod.outlook.com; PTR:; CAT:NONE;  SFS:(13230001)(4636009)(366004)(451199009)(40140700001)(6916009)(10290500003)(86362001)(9686003)(316002)(166002)(7696005)(6506007)(55016003)(83380400001)(33656002)(2906002)(186003)(508600001)(8936002)(52536014)(8990500004)(9326002)(38070700005)(38100700002)(82960400001)(82950400001)(122000001)(8676002)(64756008)(66556008)(71200400001)(5660300002)(66946007)(66446008)(66476007)(76116006)(15940465004); DIR:OUT; SFP:1102; 
x-ms-exchange-antispam-messagedata-chunkcount: 2
x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?WNRIK8IBsBXtgxQCRhVlGlEtLXI123USKHUt0OP1WUzMNhWprbQavwE87WBt?= =?us-ascii?Q?UTLa3LdNCTwd8hO1qw9z6UyVn5cVBjsw8XK4/A5l/9eciUdUg6lRdadGZaAa?= =?us-ascii?Q?9nA6Mrmd/SYoRZEFCJjxs2pb3kqcYm8edKxbn3NRdze9Zl3yvkXXAWCrls3p?= =?us-ascii?Q?s+l6Gh9l3wwexulxUhU4xmnEXcpzNig79sG5zBY4JnH4vzZjFT+8rORsBu6D?= =?us-ascii?Q?CcXhSnYQlE+IfFxak7saksgp7n/9pmBK3JS6MWSOFNmZ4V1ooOVDnNBeWNnI?= =?us-ascii?Q?OJ/qcQKQbRFkidWQcSLoCHcXEllxN0s0FpKue0iw3EilAbjsYcJFxEPmM6sw?= =?us-ascii?Q?FQaJnpNR4nxSngJ2Il787PiyoEEWjSAKyfrJJHonEcR4sc0ocI5DztXMnhQS?= =?us-ascii?Q?s6TjF9UlXtIRF5deX2AkW9hXWu0dcDrAxSveSiKz/plht6q25v1W/wvnALIA?= =?us-ascii?Q?9o6D66Iz5GwHVlZswyNM2/LUe6KFCIZjKyqlJfrL7ToIjBxOdcCOBwxlunqf?= =?us-ascii?Q?xgr/mYlIYE4gVszzsO1mSH1CbJ5WyrHtAVhA9pJnZhV26xNDWgjcfSPThzVD?= =?us-ascii?Q?8m/wAzOSl4vTjTrLbhKWfHlZ7hE2ToAygWnbJjbW9TaKp4Am46sWv28tyLBK?= =?us-ascii?Q?RtRc/iDrvFb5aFSl7hA/VrUNNlDbDERV20p+PtVUId7LEAgKQwwm+F7SafQq?= =?us-ascii?Q?nRJT+zD8euSEJ6JDFxt9elPZywcpD5Nhc8TKTmKIyys+3rZ16y1OJG9YWquy?= =?us-ascii?Q?TDoyOPkwQUL/HnKkKThKMX3+vRfqw3gIbDUNUTw/Iro6pS5FhqHr52kWOff3?= =?us-ascii?Q?2ufrEsTeZhIK1zBk32NWowmXMl89u18cmXNYAGmP7ljl7eN7fbIUzNWFLFtL?= =?us-ascii?Q?7C2vxleDAOOHvS+Q0tNhPbpzs2FVp/A+aAyyjm7So9BQpUqgVWdrbYK8LryL?= =?us-ascii?Q?rkZsRbIFdP/puW+YtWByKyxfzITlYLdW9/T9G2nnSe5AiRdvMmlpxULmYPPk?= =?us-ascii?Q?yP+A1PTvCAjeasI6zlWAkJe0FHPZdjQCe2l9zsXpKCOet5tN4lE03kT0qUv0?= =?us-ascii?Q?4nbgIBSNJkV5j94lUPvx4ENqdCg/NbLJB+fxCFsDDSwe5o63/XEU7h9ftkaU?= =?us-ascii?Q?XZV0E10z5Pd5Pw1nxgp5dpv6jMGVqPgxUyk6gPAJdwGgUWgDCj4Gt5PTJ4FP?= =?us-ascii?Q?DgvQKHqUJrrqVVaa5MMcHYnjibqDjytqQAxpnGhsW1v6tpgDwWP9Cs0HHkBd?= =?us-ascii?Q?VlwPsfgsqD6RcxQHbfyDs83DNYZoHdTTaT/w1CwRQTCXbmFrev/TlVyimmvn?= =?us-ascii?Q?1Lb7H7qq/SJn2nhDYrS1J8AyfjNyhoMZr2b4/V9RIWL6jjgKvxgcmV5BYG4a?= =?us-ascii?Q?5QEStd303UueLstiEVmkfbBXNYtAC8BJj4twdoiWDD8VFB1QRr/+xN1r/Tip?= =?us-ascii?Q?o/zewgDvNctTAqBS5tFZ8XugHR1C4+F6d+MM4M/lYVPLeoosaBvk/MMWRX5X?= =?us-ascii?Q?QkU09lHQIqcUQleyGZ6tPqN/duVoAK79nGWxJ8Fo37Bcf5c4OPiG95eO86TP?= =?us-ascii?Q?pmDhNSvXwl+BOUVZw1OjZEMun8h1AEelEdxuejIZAIWRFcYYqz7I/2x5rZxg?= =?us-ascii?Q?UMbi5TeVwuPuZaWEH9+eUotEIWRHa1WNHfWKQEiGDqlXNq6RKge73h7PAkXJ?= =?us-ascii?Q?cce/yK7Dz5kJPZDVotMTM7fftB57lYL5bPh6r6Rtq1HrHG52i7MH2gF9KTUx?= =?us-ascii?Q?48WF6gnbyOYRcS2QltoHJuNaa3vU6WmAVqNXc331tk7NFg/0Llv/MCdQ3abx?=
x-ms-exchange-antispam-messagedata-1: eMz7up3p4FMdug==
Content-Type: multipart/alternative; boundary="_000_DM6PR21MB1148BE6D3FFE5EF6166449DFC5139DM6PR21MB1148namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR21MB1148.namprd21.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 313b3dfc-cfc4-470f-0108-08da090daad7
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Mar 2022 18:32:33.0588 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: tMJvjcVr4ntSXxQNSasbTknNZrvuOO6hCh+/w3cpfIHpGMLf6KxxNPos8xqlH4cggq3RvCg6JsGrLmHTNZdw1A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR21MB1377
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/2JNs8zSgTwnk5VOX1rrleVc_ON8>
Subject: [SCITT] SCITT community meeting - 3/21 Agenda
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Mar 2022 18:32:41 -0000

--_000_DM6PR21MB1148BE6D3FFE5EF6166449DFC5139DM6PR21MB1148namp_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi All,

Here is a proposed agenda for our Monday 3/21 8:05 Pacific SCITT community =
meeting (see meeting details at bottom of message).


  *   IETF Security Dispatch Meeting
     *   Review slides for IETF Security Dispatch committee
     *   Meeting details: Tuesday 3/22, time? link?
  *   COSE
     *   go-cose library updates
     *   signing format<https://docs.google.com/document/d/18YVGA4mq45wfUkW=
rAqWkymzdHRcXxlwINKXnEp86L0w/edit> discussions with OpenSSF community
  *   GitHub DIDs & VCs for Supply Chain Traceability (Orie Steele, Sapan N=
arang)
     *   transmute-industries/verifiable-actions: Workflow tools for Decent=
ralized Identifiers & Verifiable Credentials (github.com)<https://github.co=
m/transmute-industries/verifiable-actions>

Please reach out with any additions.

Kay

GitHub:  Supply Chain Integrity, Transparency, and Trust (github.com)<https=
://github.com/ietf-scitt>
Meeting agenda and notes: SCITT Community Meeting Agenda and Notes - Google=
 Docs<https://docs.google.com/document/d/1vf-EliXByhg5HZfgVbTqZhfaJFCmvMdQu=
Z4tC-Eq6wg/edit>
Mailing list: SCITT Info Page (ietf.org)<https://www.ietf.org/mailman/listi=
nfo/scitt>

Microsoft Teams meeting
Join on your computer or mobile app
Click here to join the meeting<https://teams.microsoft.com/l/meetup-join/19=
%3ameeting_YWI2YzM0YmYtYmJkOC00ODg2LWI1MmItYmJmZWM1OTI4Y2Ex%40thread.v2/0?c=
ontext=3D%7b%22Tid%22%3a%2272f988bf-86f1-41af-91ab-2d7cd011db47%22%2c%22Oid=
%22%3a%22531852bd-66b0-45f7-abad-b1e0ad3b3a32%22%7d>
Join with a video conferencing device
813878896@t.plcm.vc<mailto:813878896@t.plcm.vc>
Video Conference ID: 112 827 551 0
Alternate VTC dialing instructions<https://dialin.plcm.vc/teams/?key=3D8138=
78896&conf=3D1128275510>
Or call in (audio only)
+1 425-616-0754,,203402542#<tel:+14256160754,,203402542#>   United States, =
Seattle
Phone Conference ID: 203 402 542#
Find a local number<https://dialin.teams.microsoft.com/8551f4c1-bea3-441a-8=
738-69aa517a91c5?id=3D203402542> | Reset PIN<https://mysettings.lync.com/ps=
tnconferencing>



--_000_DM6PR21MB1148BE6D3FFE5EF6166449DFC5139DM6PR21MB1148namp_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"Segoe UI";
	panose-1:2 11 5 2 4 2 4 2 2 3;}
@font-face
	{font-family:"Segoe UI Semibold";
	panose-1:2 11 7 2 4 2 4 2 2 3;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:473832621;
	mso-list-template-ids:-1830813526;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72" style=3D"word-wrap:=
break-word">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Hi All,<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Here is a proposed agenda for our Monday 3/21 8:05 P=
acific SCITT community meeting (see meeting details at bottom of message).<=
o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<ul style=3D"margin-top:0in" type=3D"disc">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level1 lfo1">IETF Security Dis=
patch Meeting<o:p></o:p></li><ul style=3D"margin-top:0in" type=3D"circle">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level2 lfo1">Review slides for=
 IETF Security Dispatch committee<o:p></o:p></li><li class=3D"MsoNormal" st=
yle=3D"mso-list:l0 level2 lfo1">Meeting details: Tuesday 3/22, time? link?<=
o:p></o:p></li></ul>
<li class=3D"MsoNormal" style=3D"mso-list:l0 level1 lfo1">COSE<o:p></o:p></=
li><ul style=3D"margin-top:0in" type=3D"circle">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level2 lfo1">go-cose library u=
pdates<o:p></o:p></li><li class=3D"MsoNormal" style=3D"mso-list:l0 level2 l=
fo1"><a href=3D"https://docs.google.com/document/d/18YVGA4mq45wfUkWrAqWkymz=
dHRcXxlwINKXnEp86L0w/edit">signing format</a> discussions with OpenSSF comm=
unity<o:p></o:p></li></ul>
<li class=3D"MsoNormal" style=3D"mso-list:l0 level1 lfo1">GitHub DIDs &amp;=
 VCs for Supply Chain Traceability (Orie Steele, Sapan Narang)<o:p></o:p></=
li><ul style=3D"margin-top:0in" type=3D"circle">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level2 lfo1"><a href=3D"https:=
//github.com/transmute-industries/verifiable-actions">transmute-industries/=
verifiable-actions: Workflow tools for Decentralized Identifiers &amp; Veri=
fiable Credentials (github.com)</a><o:p></o:p></li></ul>
</ul>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Please reach out with any additions.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Kay<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">GitHub: &nbsp;<a href=3D"https://github.com/ietf-sci=
tt">Supply Chain Integrity, Transparency, and Trust (github.com)</a><o:p></=
o:p></p>
<p class=3D"MsoNormal">Meeting agenda and notes: <a href=3D"https://docs.go=
ogle.com/document/d/1vf-EliXByhg5HZfgVbTqZhfaJFCmvMdQuZ4tC-Eq6wg/edit">
SCITT Community Meeting Agenda and Notes - Google Docs</a><o:p></o:p></p>
<p class=3D"MsoNormal">Mailing list: <a href=3D"https://www.ietf.org/mailma=
n/listinfo/scitt">
SCITT Info Page (ietf.org)</a><o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:18.0pt;font-family:&quot;Se=
goe UI&quot;,sans-serif;color:#252424">Microsoft Teams meeting</span><span =
style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;color:#252424">
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.5pt;font-family:&quot=
;Segoe UI&quot;,sans-serif;color:#252424">Join on your computer or mobile a=
pp</span></b><b><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;=
color:#252424">
<o:p></o:p></span></b></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Segoe UI&quot;,sans=
-serif;color:#252424"><a href=3D"https://teams.microsoft.com/l/meetup-join/=
19%3ameeting_YWI2YzM0YmYtYmJkOC00ODg2LWI1MmItYmJmZWM1OTI4Y2Ex%40thread.v2/0=
?context=3D%7b%22Tid%22%3a%2272f988bf-86f1-41af-91ab-2d7cd011db47%22%2c%22O=
id%22%3a%22531852bd-66b0-45f7-abad-b1e0ad3b3a32%22%7d" target=3D"_blank"><s=
pan style=3D"font-size:10.5pt;font-family:&quot;Segoe UI Semibold&quot;,san=
s-serif;color:#6264A7">Click
 here to join the meeting</span></a> <o:p></o:p></span></p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.5pt;font-family:&quot=
;Segoe UI&quot;,sans-serif;color:#252424">Join with a video conferencing de=
vice</span></b><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;c=
olor:#252424">
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Se=
goe UI&quot;,sans-serif;color:#252424"><a href=3D"mailto:813878896@t.plcm.v=
c">813878896@t.plcm.vc</a>
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Se=
goe UI&quot;,sans-serif;color:#252424">Video Conference ID:
</span><span style=3D"font-size:12.0pt;font-family:&quot;Segoe UI&quot;,san=
s-serif;color:#252424">112 827 551 0
</span><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;color:#25=
2424"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Se=
goe UI&quot;,sans-serif;color:#252424"><a href=3D"https://dialin.plcm.vc/te=
ams/?key=3D813878896&amp;conf=3D1128275510"><span style=3D"color:#6264A7">A=
lternate VTC dialing instructions</span></a>
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.5pt;font-family:&quot=
;Segoe UI&quot;,sans-serif;color:#252424">Or call in (audio only)</span></b=
><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;color:#252424">
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Segoe UI&quot;,sans=
-serif;color:#252424"><a href=3D"tel:+14256160754,,203402542# "><span style=
=3D"font-size:10.5pt;color:#6264A7">+1 425-616-0754,,203402542#</span></a>
</span><span style=3D"font-size:10.5pt;font-family:&quot;Segoe UI&quot;,san=
s-serif;color:#252424">&nbsp; United States, Seattle
</span><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;color:#25=
2424"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Se=
goe UI&quot;,sans-serif;color:#252424">Phone Conference ID:
</span><span style=3D"font-size:12.0pt;font-family:&quot;Segoe UI&quot;,san=
s-serif;color:#252424">203 402 542#
</span><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;color:#25=
2424"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Segoe UI&quot;,sans=
-serif;color:#252424"><a href=3D"https://dialin.teams.microsoft.com/8551f4c=
1-bea3-441a-8738-69aa517a91c5?id=3D203402542" target=3D"_blank"><span style=
=3D"font-size:10.5pt;color:#6264A7">Find a local number</span></a>
 | <a href=3D"https://mysettings.lync.com/pstnconferencing" target=3D"_blan=
k"><span style=3D"font-size:10.5pt;color:#6264A7">Reset PIN</span></a>
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_DM6PR21MB1148BE6D3FFE5EF6166449DFC5139DM6PR21MB1148namp_--


From nobody Fri Mar 18 12:19:15 2022
Return-Path: <orie@transmute.industries>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DABD93A0E8E for <scitt@ietfa.amsl.com>; Fri, 18 Mar 2022 12:19:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.095
X-Spam-Level: 
X-Spam-Status: No, score=-1.095 tagged_above=-999 required=5 tests=[AC_DIV_BONANZA=0.001, BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, DOTGOV_IMAGE=1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=transmute.industries
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NXvicfz5y6Ym for <scitt@ietfa.amsl.com>; Fri, 18 Mar 2022 12:19:09 -0700 (PDT)
Received: from mail-lf1-x12a.google.com (mail-lf1-x12a.google.com [IPv6:2a00:1450:4864:20::12a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8A8153A0EAC for <scitt@ietf.org>; Fri, 18 Mar 2022 12:19:08 -0700 (PDT)
Received: by mail-lf1-x12a.google.com with SMTP id bu29so15675491lfb.0 for <scitt@ietf.org>; Fri, 18 Mar 2022 12:19:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=transmute.industries; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=KV/buhSItBAU7u03HhhLrDrPZoey2O/a5zoAFosgJGQ=; b=Z9wOh6HG+Y5P8QIk+6tmRGT+IWqeDgDrEaqVO0plegCKNeIyDXMOLi4sA7xJAzkf8D zYlr7/1hWOzRlcPcdD/ljtcZqELt7galO2Ulq+eXKvi+HvKkseG1cTuOgvoa/EXgSakG GB6/IIOeJ+IVH+j5OE3UqwkZtGoXLRu6kMeUGdOsudhfTYINV1VLC32PsR9XCUCY8x3h 6sESNHfCHqmBahNBGmo5vz9ZIxhpZrkmU6EnjqPSnSBGOcyA9SPIKWa3BvboCnIIPh+5 noStUG+VxlhO9ded5rxRPGojlRX/yLM/PbT7qT9wzNDh5Ch2TkbUwsMh2IBbeNkCIQ/X pKCA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=KV/buhSItBAU7u03HhhLrDrPZoey2O/a5zoAFosgJGQ=; b=GUzdXK0sTILSPZhiuCFUu98iRdh0gknzTincO5SSmVJS3XclqueAcEy6eDK/MH7xS2 JHP04yPEEZD/b+LEU+kAdEcwIpkggIuOV3kiBOXdUS6v56O1cg+RBW1+dL44hIKzSn8m C7Hxd/4cnGwEDO0ke0bJoq7RErJY7qd6EX4h9NgIP73qa/tSEfvPzpxSIJMcpAgrD5mI PfJinb4ZsZe4U8J4yz97QPk6noFOY87Tp7RHgWG2KB6w1Ojs0qwlg+c6C++C+2saW1h4 EBtvShi/LBJMd+wRrAjUncgOjp9zuVnAotrXRvNfBXnUB7aZmvxHRkbX6G9K8qdo3Zy7 ZmzQ==
X-Gm-Message-State: AOAM530+O+ocqEht5/THCJqL3Gmga3rnORLI6SJFTJ7ZLSuAkcFEISw1 Y1kF2496b1KLXW/mEqRCQ/okT6F/lemB4CzA8p/Cew==
X-Google-Smtp-Source: ABdhPJwvONYkHUrMRL0NoFVw31hEP2l35xssvTuHU7f6HS/6fimRqXt7HgJ5H6b2PNEyr+fmTjXzwwA+KcWw9hscfhM=
X-Received: by 2002:a05:6512:1506:b0:448:2f28:91ec with SMTP id bq6-20020a056512150600b004482f2891ecmr6857604lfb.217.1647631146084; Fri, 18 Mar 2022 12:19:06 -0700 (PDT)
MIME-Version: 1.0
References: <CAN8C-_K9KBg2DhKOHUf8EMXo5wmTnrEc011e3Q7Y8zFOJsZ-1Q@mail.gmail.com> <DM6PR21MB1148265AA4232ED71CC0D7D8C50C9@DM6PR21MB1148.namprd21.prod.outlook.com> <CAN8C-_J8tThmo2mdMyydP-5A1h9aHReftPDRVD_cZjMnd8=2hA@mail.gmail.com> <CAN8C-_KGz83+-giHgt9foheLU8rM+jd7mN92PJ+4pKVYbSXbHA@mail.gmail.com> <AM5PR83MB03726CB108BDE97A152E91D3B2139@AM5PR83MB0372.EURPRD83.prod.outlook.com> <CAN8C-_++P+Mu1zcV=PBqjfPPjHPCaYyL4OYXJamzO+Oa=-Z0PA@mail.gmail.com> <AM5PR83MB0372D66F117E5343E9F695E9B2139@AM5PR83MB0372.EURPRD83.prod.outlook.com>
In-Reply-To: <AM5PR83MB0372D66F117E5343E9F695E9B2139@AM5PR83MB0372.EURPRD83.prod.outlook.com>
From: Orie Steele <orie@transmute.industries>
Date: Fri, 18 Mar 2022 14:18:55 -0500
Message-ID: <CAN8C-_J6NAOOd93-d+dcOr5anbuqzLdQKEFHKgH7ybh_dwd-Pg@mail.gmail.com>
To: Antoine Delignat-Lavaud <antdl@microsoft.com>
Cc: "scitt@ietf.org" <scitt@ietf.org>, Sapan Narang <sapan@transmute.industries>,  Kay Williams <kayw@microsoft.com>
Content-Type: multipart/alternative; boundary="0000000000002f02be05da83059c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/StzyuvUJ8BKF9ZpYVe5DQZOq_aM>
Subject: Re: [SCITT] [EXTERNAL] Re: GitHub DIDs & VCs for Supply Chain Traceability
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Mar 2022 19:19:14 -0000

--0000000000002f02be05da83059c
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Antoine,

There is a paired work item for using DIDs and VCs with HTTP -
https://w3id.org/traceability/interoperability

But long story short is that we and others are currently incubating that
work in the W3C CCG (a community group of the W3C)... We also work on
related projects at both DIF and IETF.

That profile defines one way that businesses have historically exchanged
data, and explains how to use HTTPS, REST, OAuth2 to exchange JSON based
Verifiable Credentials and Presentations.

There is a lot of prior art in the supply chain standards space, and we do
our best to address it or directly support it, for example:

- https://schema.org/
- https://www.gs1.org/voc/
- https://www.gs1.org/standards/epcis
- https://www.gs1.org/standards/gs1-digital-link

But also:

- https://developers.google.com/knowledge-graph (powered by JSON-LD /
schema.org)
- https://docs.microsoft.com/en-us/azure/digital-twins/concepts-models
(essentially
a reinvention of RDF / JSON-LD).

One of the things that most excites me about this WG at IETF (SCITT) is the
interest in COSE / CBOR and compact binary representations and transports.

While many of these technologies are younger than JSON / HTTP, they offer
some tremendous advantages, specifically

- https://developers.google.com/protocol-buffers (gRPC)
- https://en.wikipedia.org/wiki/LEB128 (WASM)

There are many use cases in industrial IoT or smart cities, or distributed
mobile computing that are gated by our inability to efficiently and safely
exchange compact binary messages over multiple protocols, including QR
Codes, NFC, Bluetooth, etc.

Many of these use cases have nothing to do with "Blockchain" or
"Decentralized Identifiers" or "Crypto Currencies", but sometimes there is
overlap or a desire to support interoperability, or good lessons we have
learned that impact the business framing of the standards.

I look forward to sharing a taste of some of this work on the next call if
time allows.

Regards,

OS



On Fri, Mar 18, 2022 at 12:09 PM Antoine Delignat-Lavaud <
antdl@microsoft.com> wrote:

> I am referring to this draft - Traceability Vocabulary v0.0
> (w3c-ccg.github.io) <https://w3c-ccg.github.io/traceability-vocab/>
>
> Do you have any follow up draft that goes beyond vocabulary?
>
>
>
> Antoine
>
>
>
> *From:* SCITT <scitt-bounces@ietf.org> *On Behalf Of *Orie Steele
> *Sent:* 18 March 2022 17:02
> *To:* Antoine Delignat-Lavaud <antdl@microsoft.com>
> *Cc:* scitt@ietf.org; Sapan Narang <sapan@transmute.industries>; Kay
> Williams <kayw@microsoft.com>
> *Subject:* Re: [SCITT] [EXTERNAL] Re: GitHub DIDs & VCs for Supply Chain
> Traceability
>
>
>
> You don't often get email from orie@transmute.industries. Learn why this
> is important <http://aka.ms/LearnAboutSenderIdentification>
>
> Antoine,
>
> I'm not sure which "W3C" document you are referring to.
>
> I linked 2 W3C TRs (both contributed to by Microsoft and approved by
> Microsoft AC Rep), and a few community group drafts at DIF (contributed t=
o
> by Microsoft) and at the W3C CCG (not contributed to by Microsoft).
>
> Which document are you referring to?
>
> OS
>
>
>
> On Fri, Mar 18, 2022 at 11:54 AM Antoine Delignat-Lavaud <
> antdl@microsoft.com> wrote:
>
> Hi Orie,
>
>
>
> Is there any follow up to the W3C Traceability Vocabulary document? It ha=
s
> some good context and terminology on supply chain security but doesn=E2=
=80=99t seem
> to offer any concrete solution or improvement.
>
>
>
> Antoine
>
>
>
> *From:* SCITT <scitt-bounces@ietf.org> *On Behalf Of *Orie Steele
> *Sent:* 18 March 2022 14:20
> *To:* Kay Williams <kayw@microsoft.com>
> *Cc:* Sapan Narang <sapan@transmute.industries>; scitt@ietf.org
> *Subject:* [EXTERNAL] Re: [SCITT] GitHub DIDs & VCs for Supply Chain
> Traceability
>
>
>
> Some people who received this message don't often get email from
> orie@transmute.industries. Learn why this is important
> <http://aka.ms/LearnAboutSenderIdentification>
>
> I am prepared to present, can you confirm a time.
>
> Regards,
>
> OS
>
>
>
> On Mon, Mar 14, 2022 at 10:21 AM Orie Steele <orie@transmute.industries>
> wrote:
>
> Sorry I got to this late.
>
> I can prepare something for the next meeting.
>
> Regards,
>
> OS
>
>
>
> On Fri, Mar 11, 2022 at 4:59 PM Kay Williams <kayw@microsoft.com> wrote:
>
> Hi Orie (and Sapan),
>
>
>
> Apologies for my late response to your email.  It landed in my spam
> folder, and I am just now seeing it.  (As a side note, I have now unblock=
ed
> all email from ietf.org
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fietf.=
org%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93be4a9d938408da090=
11473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832198406809551%7CUnk=
nown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJX=
VCI6Mn0%3D%7C3000&sdata=3D4jYvz%2BbE4EX0fO%2FhkFtA97ZmJci54AMPkdrbn6psZyw%3=
D&reserved=3D0>
> .)
>
>
>
> Thank you for sharing this work.  Would you be interested in taking a few
> minutes on the agenda at our Monday 3/14 4 PM UTC meeting, or a future
> meeting, to provide an overview an entertain discussion?
>
>
>
> Kay
>
>
>
> *From:* SCITT <scitt-bounces@ietf.org> *On Behalf Of *Orie Steele
> *Sent:* Monday, March 7, 2022 10:41 AM
> *To:* scitt@ietf.org
> *Cc:* Sapan Narang <sapan@transmute.industries>
> *Subject:* [SCITT] GitHub DIDs & VCs for Supply Chain Traceability
>
>
>
> Hello,
>
> I'm Orie, I work on identifier and credentialing standards at W3C and IET=
F.
>
> My company Transmute
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqiYqEgkF4xWgxA5Ast%2Fhttps%253A%252F%252Ftransmute.indu=
stries%252F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93be4a9d938408=
da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832198406859548%=
7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWw=
iLCJXVCI6Mn0%3D%7C3000&sdata=3DIx4VGApu5xPqBdsE%2BlnU0rBRUWUA%2Bw8HYCchDpSz=
Dsg%3D&reserved=3D0>
> applies these standards to supply traceability (both physical and softwar=
e).
>
> Some of our work is funded by DHS SVIP
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqNTelooObAhwFx98Nw%2Fhttps%253A%252F%252Fwww.dhs.gov%25=
2Fscience-and-technology%252Fsvip&data=3D04%7C01%7Cantdl%40microsoft.com%7C=
ff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0=
%7C637832198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV=
2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DFjLr2DPDP%2FmqyEMSCCL2=
lKkLPGFzinrHlZ0YNu7Yj%2B0%3D&reserved=3D0>,
> including our work on applying DIDs and VCs to physical supply chain issu=
es
> associated with global trade and imports and exports.
>
> If you are interested in that work it can be found here:
> https://w3id.org/traceability
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQy2fH6UWEI23iw-vWGEG%2Fhttps%253A%252F%252Fw3id.org%252Ft=
raceability&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93be4a9d938408=
da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832198406859548%=
7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWw=
iLCJXVCI6Mn0%3D%7C3000&sdata=3DBzeAH4EO3qhT%2BiOvFIgY0iP0JxD9w8aIjBZltzoNA0=
s%3D&reserved=3D0>
> .
>
> I wanted to share some very recent (experimental and unstable) work we've
> done to enable Decentralized Identifiers
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqX11lXlzLvQgPI070Q%2Fhttps%253A%252F%252Fwww.w3.org%252=
FTR%252Fdid-core%252F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93be=
4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832198=
406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBT=
iI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DmipIQWqDcsK13zKrbXd0Ux2KlC11KUFV5M=
V3d%2BOrP04%3D&reserved=3D0>
> and Verifiable Credentials
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQymDA7VYHe95RgZjMZKI%2Fhttps%253A%252F%252Fwww.w3.org%252=
FTR%252Fvc-data-model%252F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183=
e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378=
32198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIi=
LCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3Dl1f8CCIU71FCXXamkWDcTrZlxAOIq=
CVTZOfoOeDEzjE%3D&reserved=3D0>
> to assist with the software supply chain.
>
> Here are the links:
>
> - https://github.com/transmute-industries/verifiable-actions
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqXl4mGukfBcw_Wj_Q8%2Fhttps%253A%252F%252Fgithub.com%252=
Ftransmute-industries%252Fverifiable-actions&data=3D04%7C01%7Cantdl%40micro=
soft.com%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011d=
b47%7C1%7C0%7C637832198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMD=
AiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DLYTZNASkLQa=
ZSTgTNMEVfLZhWGoN%2BAyIsKYm%2Bv9LQUo%3D&reserved=3D0>
> -
> https://github.com/transmute-industries/public-credential-registry-templa=
te
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyuHh9DtUHodDwKXtBBB%2Fhttps%253A%252F%252Fgithub.com%252=
Ftransmute-industries%252Fpublic-credential-registry-template&data=3D04%7C0=
1%7Cantdl%40microsoft.com%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f1=
41af91ab2d7cd011db47%7C1%7C0%7C637832198406859548%7CUnknown%7CTWFpbGZsb3d8e=
yJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sd=
ata=3DP2GLeIO9erpNGOGKmnLyNMbsRGsHe%2FOez6r%2B%2FzlJzRI%3D&reserved=3D0>
>
> The key idea is to enable github actions to sign and verify credentials
> that conform to the W3C Verifiable Credentials standard (which in turn
> supports various envelope formats including JOSE, COSE and PGP).
>
> The issuers are identified with W3C Decentralized Identifiers, which
> provide a layer of interoperability for public key identifier registries.
> The key value of this standard is the ability to support both traditional
> public key based identifiers, web resource based identifiers and
> blockchain based identifiers in the same data model.
>
> The examples in the repository links above demonstrate support for these
> standards using did:key
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyuGxqSDtSpdZABx8eMt%2Fhttps%253A%252F%252Fw3c-ccg.github=
.io%252Fdid-method-key%252F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a18=
3e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637=
832198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzI=
iLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3Dd9RkjLXNP%2B8gJ%2BQmUvSjLCkO=
rp6P1NNicOK5vubVoCk%3D&reserved=3D0> and
> did:web
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqsLGN-htS74QXmSanv%2Fhttps%253A%252F%252Fgithub.com%252=
Fw3c-ccg%252Fdid-method-web&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a18=
3e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637=
832198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzI=
iLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3Dh4FixwKFTWBYIsyqFLwBuPSTzC59=
JgVmV6CiFMUAqYA%3D&reserved=3D0>,
>
> however I am one of the editors of the Sidetree Protocol
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyuu7nlpbor7UAurwtjs%2Fhttps%253A%252F%252Fgithub.com%252=
Fdecentralized-identity%252Fsidetree&data=3D04%7C01%7Cantdl%40microsoft.com=
%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%=
7C0%7C637832198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIj=
oiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DGSKjzf%2FwQjN%2Bti8=
QnGr9Ngs%2FAogG5BvnGwdflhm3R7M%3D&reserved=3D0> which
> is what powers did:ion
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyuxcXKIp3hEOgkQqHLh%2Fhttps%253A%252F%252Ftechcommunity.=
microsoft.com%252Ft5%252Fidentity-standards-blog%252Fion-we-have-liftoff%25=
2Fba-p%252F1441555&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93be4a9=
d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832198406=
909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6=
Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DYCr2pamOUmq4Yq39LDLlpeotuj2bNGZIutxts=
1Sum68%3D&reserved=3D0> which
> is being developed by Microsoft and other DIF members...
> The GitHub examples I provided will also work with did:ion.
>
> Feel free to raise issues on any of the repositories linked, or ask me
> questions directly by email if you are not comfortable commenting on a
> public repo.
>
> Regards,
>
> OS
>
>
>
> --
>
> *ORIE STEELE*
>
> Chief Technical Officer
>
> www.transmute.industries
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.t=
ransmute.industries%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93b=
e4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63783219=
8406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJB=
TiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D8rexUHYxTWo%2BdscrZQn%2FfNepT89zL=
hzkqj%2FOlBSKtmM%3D&reserved=3D0>
>
>
>
>
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstre=
aklinks.com%2FA9ifQyqJyZSff0skfwnnG7JR%2Fhttps%253A%252F%252Fwww.transmute.=
industries&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93be4a9d938408d=
a09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832198406909546%7=
CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwi=
LCJXVCI6Mn0%3D%7C3000&sdata=3Ds68xBb9HX6UQisVtRWMdNUvLwYCEpW%2Bhxp6wNMyNVY4=
%3D&reserved=3D0>
>
> =E1=90=A7
>
>
>
>
> --
>
> *ORIE STEELE*
>
> Chief Technical Officer
>
> www.transmute.industries
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.t=
ransmute.industries%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93b=
e4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63783219=
8406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJB=
TiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D8rexUHYxTWo%2BdscrZQn%2FfNepT89zL=
hzkqj%2FOlBSKtmM%3D&reserved=3D0>
>
>
>
>
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.=
transmute.industries%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93=
be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378321=
98406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJ=
BTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D1YUAFfSlm9oMsIvZz2nExEwdbumZLfSf=
i9w8hDyl7Ak%3D&reserved=3D0>
>
>
>
>
> --
>
> *ORIE STEELE*
>
> Chief Technical Officer
>
> www.transmute.industries
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.t=
ransmute.industries%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93b=
e4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63783219=
8406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJB=
TiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D8rexUHYxTWo%2BdscrZQn%2FfNepT89zL=
hzkqj%2FOlBSKtmM%3D&reserved=3D0>
>
>
>
>
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.=
transmute.industries%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93=
be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378321=
98406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJ=
BTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D1YUAFfSlm9oMsIvZz2nExEwdbumZLfSf=
i9w8hDyl7Ak%3D&reserved=3D0>
>
>
>
>
> --
>
> *ORIE STEELE*
>
> Chief Technical Officer
>
> www.transmute.industries
>
>
>
>
> <https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.=
transmute.industries%2F&data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93=
be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378321=
98406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJ=
BTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D1YUAFfSlm9oMsIvZz2nExEwdbumZLfSf=
i9w8hDyl7Ak%3D&reserved=3D0>
>


--=20
*ORIE STEELE*
Chief Technical Officer
www.transmute.industries

<https://www.transmute.industries>

--0000000000002f02be05da83059c
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Antoine,<br><br>There is a paired work item for using DIDs=
 and VCs with HTTP -=C2=A0<a href=3D"https://w3id.org/traceability/interope=
rability">https://w3id.org/traceability/interoperability</a><br><br>But lon=
g story short is that we and others are currently incubating that work in=
=C2=A0the W3C CCG (a community group of the W3C)... We also work on related=
 projects at both DIF and IETF.<br><br>That profile defines one way that bu=
sinesses have historically exchanged data, and explains how to use HTTPS, R=
EST, OAuth2 to exchange JSON based Verifiable Credentials and Presentations=
.<br><br>There is a lot of prior art in the supply chain standards space, a=
nd we do our best to address it or directly support it, for example:<br><br=
>-=C2=A0<a href=3D"https://schema.org/">https://schema.org/</a><br>-=C2=A0<=
a href=3D"https://www.gs1.org/voc/">https://www.gs1.org/voc/</a><br>-=C2=A0=
<a href=3D"https://www.gs1.org/standards/epcis">https://www.gs1.org/standar=
ds/epcis</a><br>-=C2=A0<a href=3D"https://www.gs1.org/standards/gs1-digital=
-link">https://www.gs1.org/standards/gs1-digital-link</a><br><br>But also:<=
br><br>-=C2=A0<a href=3D"https://developers.google.com/knowledge-graph">htt=
ps://developers.google.com/knowledge-graph</a>=C2=A0(powered by JSON-LD / <=
a href=3D"http://schema.org">schema.org</a>)<br>-=C2=A0<a href=3D"https://d=
ocs.microsoft.com/en-us/azure/digital-twins/concepts-models">https://docs.m=
icrosoft.com/en-us/azure/digital-twins/concepts-models</a>=C2=A0(essentiall=
y a reinvention of RDF / JSON-LD).<br><br>One of the things that most excit=
es me about this WG at IETF (SCITT) is the interest in COSE / CBOR and comp=
act binary representations and transports.<br><br>While many of these techn=
ologies are younger than JSON / HTTP, they offer some tremendous advantages=
, specifically=C2=A0<br><br>-=C2=A0<a href=3D"https://developers.google.com=
/protocol-buffers">https://developers.google.com/protocol-buffers</a>=C2=A0=
(gRPC)<br>-=C2=A0<a href=3D"https://en.wikipedia.org/wiki/LEB128">https://e=
n.wikipedia.org/wiki/LEB128</a>=C2=A0(WASM)<br><br>There are many use cases=
 in industrial IoT or smart cities, or distributed mobile computing that ar=
e gated by our inability to efficiently and safely exchange compact binary =
messages over multiple protocols, including QR Codes, NFC, Bluetooth, etc.<=
br><br>Many of these use cases have nothing to do with &quot;Blockchain&quo=
t; or &quot;Decentralized Identifiers&quot; or &quot;Crypto Currencies&quot=
;, but sometimes there is overlap or a desire to support interoperability, =
or good lessons we have learned that impact the business framing of the sta=
ndards.<br><br>I look forward to sharing a taste of some of this work on th=
e next call if time allows.<br><br>Regards,<br><br>OS<br><br><br></div><br>=
<div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Fri, Ma=
r 18, 2022 at 12:09 PM Antoine Delignat-Lavaud &lt;<a href=3D"mailto:antdl@=
microsoft.com">antdl@microsoft.com</a>&gt; wrote:<br></div><blockquote clas=
s=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid r=
gb(204,204,204);padding-left:1ex"><div lang=3D"EN-GB" style=3D"overflow-wra=
p: break-word;"><div class=3D"gmail-m_5896966266628912084WordSection1"><p c=
lass=3D"MsoNormal"><span>I am referring to this draft - </span><a href=3D"h=
ttps://w3c-ccg.github.io/traceability-vocab/" target=3D"_blank">Traceabilit=
y Vocabulary v0.0 (w3c-ccg.github.io)</a><u></u><u></u></p><p class=3D"MsoN=
ormal">Do you have any follow up draft that goes beyond vocabulary? <u></u>=
<u></u></p><p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p><p class=3D"MsoNo=
rmal">Antoine<span><u></u><u></u></span></p><p class=3D"MsoNormal"><span><u=
></u>=C2=A0<u></u></span></p><div><div style=3D"border-right:none;border-bo=
ttom:none;border-left:none;border-top:1pt solid rgb(225,225,225);padding:3p=
t 0cm 0cm"><p class=3D"MsoNormal"><b><span lang=3D"EN-US">From:</span></b><=
span lang=3D"EN-US"> SCITT &lt;<a href=3D"mailto:scitt-bounces@ietf.org" ta=
rget=3D"_blank">scitt-bounces@ietf.org</a>&gt; <b>On Behalf Of </b>Orie Ste=
ele<br><b>Sent:</b> 18 March 2022 17:02<br><b>To:</b> Antoine Delignat-Lava=
ud &lt;<a href=3D"mailto:antdl@microsoft.com" target=3D"_blank">antdl@micro=
soft.com</a>&gt;<br><b>Cc:</b> <a href=3D"mailto:scitt@ietf.org" target=3D"=
_blank">scitt@ietf.org</a>; Sapan Narang &lt;sapan@transmute.industries&gt;=
; Kay Williams &lt;<a href=3D"mailto:kayw@microsoft.com" target=3D"_blank">=
kayw@microsoft.com</a>&gt;<br><b>Subject:</b> Re: [SCITT] [EXTERNAL] Re: Gi=
tHub DIDs &amp; VCs for Supply Chain Traceability<u></u><u></u></span></p><=
/div></div><p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p><table border=3D"=
0" cellspacing=3D"0" cellpadding=3D"0" align=3D"left" width=3D"100%" style=
=3D"width:100%"><tbody><tr><td style=3D"background:rgb(166,166,166);padding=
:5.25pt 1.5pt"></td><td width=3D"100%" style=3D"width:100%;background:rgb(2=
34,234,234);padding:5.25pt 3.75pt 5.25pt 11.25pt"><div><p class=3D"MsoNorma=
l"><span style=3D"font-size:9pt;font-family:&quot;Segoe UI&quot;,sans-serif=
;color:rgb(33,33,33)">You don&#39;t often get email from <a href=3D"mailto:=
orie@transmute.industries" target=3D"_blank">orie@transmute.industries</a>.=
 <a href=3D"http://aka.ms/LearnAboutSenderIdentification" target=3D"_blank"=
>Learn why this is important</a><u></u><u></u></span></p></div></td><td wid=
th=3D"75" style=3D"width:56.25pt;background:rgb(234,234,234);padding:5.25pt=
 3.75pt"></td></tr></tbody></table><div><div><div><p class=3D"MsoNormal" st=
yle=3D"margin-bottom:12pt">Antoine,<u></u><u></u></p></div><p class=3D"MsoN=
ormal">I&#39;m not sure which &quot;W3C&quot; document you are referring to=
.<br><br>I linked 2 W3C TRs (both contributed to by Microsoft and approved =
by Microsoft AC Rep), and a few community=C2=A0group drafts at DIF (contrib=
uted to by Microsoft) and at the W3C CCG (not contributed to by Microsoft).=
<br><br>Which document are you referring to?<br><br>OS<u></u><u></u></p></d=
iv><p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p><div><div><p class=3D"Mso=
Normal">On Fri, Mar 18, 2022 at 11:54 AM Antoine Delignat-Lavaud &lt;<a hre=
f=3D"mailto:antdl@microsoft.com" target=3D"_blank">antdl@microsoft.com</a>&=
gt; wrote:<u></u><u></u></p></div><blockquote style=3D"border-top:none;bord=
er-right:none;border-bottom:none;border-left:1pt solid rgb(204,204,204);pad=
ding:0cm 0cm 0cm 6pt;margin-left:4.8pt;margin-right:0cm"><div><div><p class=
=3D"MsoNormal">Hi Orie,<u></u><u></u></p><p class=3D"MsoNormal">=C2=A0<u></=
u><u></u></p><p class=3D"MsoNormal">Is there any follow up to the W3C Trace=
ability Vocabulary document? It has some good context and terminology on su=
pply chain security but doesn=E2=80=99t seem to offer any concrete solution=
 or improvement. <u></u><u></u></p><p class=3D"MsoNormal">=C2=A0<u></u><u><=
/u></p><p class=3D"MsoNormal">Antoine<u></u><u></u></p><p class=3D"MsoNorma=
l">=C2=A0<u></u><u></u></p><div><div style=3D"border-right:none;border-bott=
om:none;border-left:none;border-top:1pt solid rgb(225,225,225);padding:3pt =
0cm 0cm"><p class=3D"MsoNormal"><b><span lang=3D"EN-US">From:</span></b><sp=
an lang=3D"EN-US"> SCITT &lt;<a href=3D"mailto:scitt-bounces@ietf.org" targ=
et=3D"_blank">scitt-bounces@ietf.org</a>&gt; <b>On Behalf Of </b>Orie Steel=
e<br><b>Sent:</b> 18 March 2022 14:20<br><b>To:</b> Kay Williams &lt;<a hre=
f=3D"mailto:kayw@microsoft.com" target=3D"_blank">kayw@microsoft.com</a>&gt=
;<br><b>Cc:</b> Sapan Narang &lt;<a href=3D"mailto:sapan@transmute.industri=
es" target=3D"_blank">sapan@transmute.industries</a>&gt;; <a href=3D"mailto=
:scitt@ietf.org" target=3D"_blank">scitt@ietf.org</a><br><b>Subject:</b> [E=
XTERNAL] Re: [SCITT] GitHub DIDs &amp; VCs for Supply Chain Traceability</s=
pan><u></u><u></u></p></div></div><p class=3D"MsoNormal">=C2=A0<u></u><u></=
u></p><table border=3D"0" cellspacing=3D"0" cellpadding=3D"0" align=3D"left=
" width=3D"100%" style=3D"width:100%"><tbody><tr><td style=3D"background:rg=
b(166,166,166);padding:5.25pt 1.5pt"></td><td width=3D"100%" style=3D"width=
:100%;background:rgb(234,234,234);padding:5.25pt 3.75pt 5.25pt 11.25pt"><di=
v><p class=3D"MsoNormal"><span style=3D"font-size:9pt;font-family:&quot;Seg=
oe UI&quot;,sans-serif;color:rgb(33,33,33)">Some people who received this m=
essage don&#39;t often get email from <a href=3D"mailto:orie@transmute.indu=
stries" target=3D"_blank">orie@transmute.industries</a>. <a href=3D"http://=
aka.ms/LearnAboutSenderIdentification" target=3D"_blank">Learn why this is =
important</a></span><u></u><u></u></p></div></td><td width=3D"75" style=3D"=
width:56.25pt;background:rgb(234,234,234);padding:5.25pt 3.75pt"></td></tr>=
</tbody></table><div><div><p class=3D"MsoNormal">I am prepared to present, =
can you confirm a time.<br><br>Regards,<br><br>OS<u></u><u></u></p></div><p=
 class=3D"MsoNormal">=C2=A0<u></u><u></u></p><div><div><p class=3D"MsoNorma=
l">On Mon, Mar 14, 2022 at 10:21 AM Orie Steele &lt;<a href=3D"mailto:orie@=
transmute.industries" target=3D"_blank">orie@transmute.industries</a>&gt; w=
rote:<u></u><u></u></p></div><blockquote style=3D"border-top:none;border-ri=
ght:none;border-bottom:none;border-left:1pt solid rgb(204,204,204);padding:=
0cm 0cm 0cm 6pt;margin:5pt 0cm 5pt 4.8pt"><div><p class=3D"MsoNormal">Sorry=
 I got to this late.<br><br>I can prepare something for the next meeting.<b=
r><br>Regards,<br><br>OS<u></u><u></u></p></div><p class=3D"MsoNormal">=C2=
=A0<u></u><u></u></p><div><div><p class=3D"MsoNormal">On Fri, Mar 11, 2022 =
at 4:59 PM Kay Williams &lt;<a href=3D"mailto:kayw@microsoft.com" target=3D=
"_blank">kayw@microsoft.com</a>&gt; wrote:<u></u><u></u></p></div><blockquo=
te style=3D"border-top:none;border-right:none;border-bottom:none;border-lef=
t:1pt solid rgb(204,204,204);padding:0cm 0cm 0cm 6pt;margin:5pt 0cm 5pt 4.8=
pt"><div><div><p class=3D"MsoNormal"><span lang=3D"EN-US">Hi Orie (and Sapa=
n),</span><u></u><u></u></p><p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=
=A0</span><u></u><u></u></p><p class=3D"MsoNormal"><span lang=3D"EN-US">Apo=
logies for my late response to your email.=C2=A0 It landed in my spam folde=
r, and I am just now seeing it.=C2=A0 (As a side note, I have now unblocked=
 all email from <a href=3D"https://nam06.safelinks.protection.outlook.com/?=
url=3Dhttp%3A%2F%2Fietf.org%2F&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7=
Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C=
0%7C637832198406809551%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoi=
V2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3D4jYvz%2BbE4EX0fO%=
2FhkFtA97ZmJci54AMPkdrbn6psZyw%3D&amp;reserved=3D0" target=3D"_blank">ietf.=
org</a>.)</span><u></u><u></u></p><p class=3D"MsoNormal"><span lang=3D"EN-U=
S">=C2=A0</span><u></u><u></u></p><p class=3D"MsoNormal"><span lang=3D"EN-U=
S">Thank you for sharing this work.=C2=A0 Would you be interested in taking=
 a few minutes on the agenda at our Monday 3/14 4 PM UTC meeting, or a futu=
re meeting, to provide an overview an entertain discussion?</span><u></u><u=
></u></p><p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0</span><u></u><u=
></u></p><p class=3D"MsoNormal"><span lang=3D"EN-US">Kay</span><u></u><u></=
u></p><p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0</span><u></u><u></=
u></p><div style=3D"border-right:none;border-bottom:none;border-left:none;b=
order-top:1pt solid rgb(225,225,225);padding:3pt 0cm 0cm"><p class=3D"MsoNo=
rmal"><b><span lang=3D"EN-US">From:</span></b><span lang=3D"EN-US"> SCITT &=
lt;<a href=3D"mailto:scitt-bounces@ietf.org" target=3D"_blank">scitt-bounce=
s@ietf.org</a>&gt; <b>On Behalf Of </b>Orie Steele<br><b>Sent:</b> Monday, =
March 7, 2022 10:41 AM<br><b>To:</b> <a href=3D"mailto:scitt@ietf.org" targ=
et=3D"_blank">scitt@ietf.org</a><br><b>Cc:</b> Sapan Narang &lt;<a href=3D"=
mailto:sapan@transmute.industries" target=3D"_blank">sapan@transmute.indust=
ries</a>&gt;<br><b>Subject:</b> [SCITT] GitHub DIDs &amp; VCs for Supply Ch=
ain Traceability</span><u></u><u></u></p></div><p class=3D"MsoNormal"><span=
 lang=3D"EN-US">=C2=A0</span><u></u><u></u></p><div><p class=3D"MsoNormal">=
<span lang=3D"EN-US">Hello,<br><br>I&#39;m Orie, I work on identifier and c=
redentialing standards at W3C and IETF.<br><br>My company <a href=3D"https:=
//nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstreaklinks.c=
om%2FA9ifQyqiYqEgkF4xWgxA5Ast%2Fhttps%253A%252F%252Ftransmute.industries%25=
2F&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93be4a9d938408da090=
11473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832198406859548%7CUnk=
nown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJX=
VCI6Mn0%3D%7C3000&amp;sdata=3DIx4VGApu5xPqBdsE%2BlnU0rBRUWUA%2Bw8HYCchDpSzD=
sg%3D&amp;reserved=3D0" target=3D"_blank">Transmute</a> applies these stand=
ards to supply traceability (both physical=C2=A0and software).<br><br>Some =
of our work is funded by <a href=3D"https://nam06.safelinks.protection.outl=
ook.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyqNTelooObAhwFx98Nw%2Fh=
ttps%253A%252F%252Fwww.dhs.gov%252Fscience-and-technology%252Fsvip&amp;data=
=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93be4a9d938408da09011473%7C72f=
988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832198406859548%7CUnknown%7CTWFp=
bGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%=
7C3000&amp;sdata=3DFjLr2DPDP%2FmqyEMSCCL2lKkLPGFzinrHlZ0YNu7Yj%2B0%3D&amp;r=
eserved=3D0" target=3D"_blank">DHS SVIP</a>, including our work on applying=
 DIDs and VCs to physical supply chain=C2=A0issues associated with global t=
rade and imports and exports.<br><br>If you are interested in that work it =
can be found here:=C2=A0<a href=3D"https://nam06.safelinks.protection.outlo=
ok.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQy2fH6UWEI23iw-vWGEG%2Fht=
tps%253A%252F%252Fw3id.org%252Ftraceability&amp;data=3D04%7C01%7Cantdl%40mi=
crosoft.com%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd0=
11db47%7C1%7C0%7C637832198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjA=
wMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DBzeA=
H4EO3qhT%2BiOvFIgY0iP0JxD9w8aIjBZltzoNA0s%3D&amp;reserved=3D0" target=3D"_b=
lank">https://w3id.org/traceability</a>.<br><br>I wanted to share some very=
 recent (experimental and unstable) work we&#39;ve done to enable <a href=
=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstr=
eaklinks.com%2FA9ifQyqX11lXlzLvQgPI070Q%2Fhttps%253A%252F%252Fwww.w3.org%25=
2FTR%252Fdid-core%252F&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183=
e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378=
32198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIi=
LCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DmipIQWqDcsK13zKrbXd0Ux2Kl=
C11KUFV5MV3d%2BOrP04%3D&amp;reserved=3D0" target=3D"_blank">Decentralized I=
dentifiers</a> and <a href=3D"https://nam06.safelinks.protection.outlook.co=
m/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQymDA7VYHe95RgZjMZKI%2Fhttps%2=
53A%252F%252Fwww.w3.org%252FTR%252Fvc-data-model%252F&amp;data=3D04%7C01%7C=
antdl%40microsoft.com%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af=
91ab2d7cd011db47%7C1%7C0%7C637832198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWI=
joiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sd=
ata=3Dl1f8CCIU71FCXXamkWDcTrZlxAOIqCVTZOfoOeDEzjE%3D&amp;reserved=3D0" targ=
et=3D"_blank">Verifiable Credentials</a> to assist with the software supply=
 chain.<br><br>Here are the links:<br><br>-=C2=A0<a href=3D"https://nam06.s=
afelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9if=
QyqXl4mGukfBcw_Wj_Q8%2Fhttps%253A%252F%252Fgithub.com%252Ftransmute-industr=
ies%252Fverifiable-actions&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4=
a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C=
637832198406859548%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2lu=
MzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DLYTZNASkLQaZSTgTNMEVf=
LZhWGoN%2BAyIsKYm%2Bv9LQUo%3D&amp;reserved=3D0" target=3D"_blank">https://g=
ithub.com/transmute-industries/verifiable-actions</a><br>-=C2=A0<a href=3D"=
https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstreakl=
inks.com%2FA9ifQyuHh9DtUHodDwKXtBBB%2Fhttps%253A%252F%252Fgithub.com%252Ftr=
ansmute-industries%252Fpublic-credential-registry-template&amp;data=3D04%7C=
01%7Cantdl%40microsoft.com%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f=
141af91ab2d7cd011db47%7C1%7C0%7C637832198406859548%7CUnknown%7CTWFpbGZsb3d8=
eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&a=
mp;sdata=3DP2GLeIO9erpNGOGKmnLyNMbsRGsHe%2FOez6r%2B%2FzlJzRI%3D&amp;reserve=
d=3D0" target=3D"_blank">https://github.com/transmute-industries/public-cre=
dential-registry-template</a><br><br>The key idea is to enable github actio=
ns to sign and verify credentials that conform to the W3C Verifiable Creden=
tials standard (which in turn supports various envelope formats including J=
OSE, COSE and PGP).<br><br>The issuers are identified=C2=A0with W3C Decentr=
alized Identifiers, which provide a layer of interoperability for public ke=
y identifier=C2=A0registries. <br>The key value of this standard is the abi=
lity to support both traditional public key based identifiers, web resource=
 based identifiers and blockchain=C2=A0based identifiers in the same data m=
odel.<br><br>The examples in the repository links above demonstrate support=
 for these standards using <a href=3D"https://nam06.safelinks.protection.ou=
tlook.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyuGxqSDtSpdZABx8eMt%2=
Fhttps%253A%252F%252Fw3c-ccg.github.io%252Fdid-method-key%252F&amp;data=3D0=
4%7C01%7Cantdl%40microsoft.com%7Cff4a183e93be4a9d938408da09011473%7C72f988b=
f86f141af91ab2d7cd011db47%7C1%7C0%7C637832198406859548%7CUnknown%7CTWFpbGZs=
b3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C30=
00&amp;sdata=3Dd9RkjLXNP%2B8gJ%2BQmUvSjLCkOrp6P1NNicOK5vubVoCk%3D&amp;reser=
ved=3D0" target=3D"_blank">did:key</a>=C2=A0and <a href=3D"https://nam06.sa=
felinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQ=
yqsLGN-htS74QXmSanv%2Fhttps%253A%252F%252Fgithub.com%252Fw3c-ccg%252Fdid-me=
thod-web&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93be4a9d93840=
8da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832198406859548=
%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haW=
wiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3Dh4FixwKFTWBYIsyqFLwBuPSTzC59JgVmV6CiFMU=
AqYA%3D&amp;reserved=3D0" target=3D"_blank">did:web</a>, <br>however I am o=
ne of the editors of the=C2=A0<a href=3D"https://nam06.safelinks.protection=
.outlook.com/?url=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyuu7nlpbor7UAurwtj=
s%2Fhttps%253A%252F%252Fgithub.com%252Fdecentralized-identity%252Fsidetree&=
amp;data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93be4a9d938408da090114=
73%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832198406909546%7CUnknow=
n%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI=
6Mn0%3D%7C3000&amp;sdata=3DGSKjzf%2FwQjN%2Bti8QnGr9Ngs%2FAogG5BvnGwdflhm3R7=
M%3D&amp;reserved=3D0" target=3D"_blank">Sidetree Protocol</a>=C2=A0which i=
s what powers <a href=3D"https://nam06.safelinks.protection.outlook.com/?ur=
l=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyuxcXKIp3hEOgkQqHLh%2Fhttps%253A%2=
52F%252Ftechcommunity.microsoft.com%252Ft5%252Fidentity-standards-blog%252F=
ion-we-have-liftoff%252Fba-p%252F1441555&amp;data=3D04%7C01%7Cantdl%40micro=
soft.com%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011d=
b47%7C1%7C0%7C637832198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMD=
AiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DYCr2pam=
OUmq4Yq39LDLlpeotuj2bNGZIutxts1Sum68%3D&amp;reserved=3D0" target=3D"_blank"=
>did:ion</a>=C2=A0which is being developed by Microsoft and other DIF membe=
rs... <br>The GitHub examples I provided will also work with did:ion.<br><b=
r>Feel free to raise issues on any of the repositories linked, or ask me qu=
estions directly by email if you are not comfortable commenting on a public=
 repo.<br><br>Regards,<br><br>OS<br clear=3D"all"></span><u></u><u></u></p>=
<div><p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0</span><u></u><u></u=
></p></div><p class=3D"MsoNormal"><span lang=3D"EN-US">-- </span><u></u><u>=
</u></p><div><div><div><div><div><div><div><div><div><div><p class=3D"MsoNo=
rmal"><b><span lang=3D"EN-US" style=3D"font-size:10pt;font-family:Tahoma,sa=
ns-serif;color:rgb(53,28,117);background:white">ORIE STEELE</span></b><u></=
u><u></u></p><div><p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font=
-size:10pt;font-family:&quot;Arial Narrow&quot;,sans-serif;color:rgb(53,28,=
117);background:white">Chief Technical Officer</span><u></u><u></u></p></di=
v><div><p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"font-size:7.5pt=
;font-family:Arial,sans-serif;color:rgb(53,28,117);background:white"><a hre=
f=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww=
.transmute.industries%2F&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a1=
83e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C63=
7832198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMz=
IiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3D8rexUHYxTWo%2BdscrZQn%2=
FfNepT89zLhzkqj%2FOlBSKtmM%3D&amp;reserved=3D0" target=3D"_blank">www.trans=
mute.industries</a></span><u></u><u></u></p></div><div><p class=3D"MsoNorma=
l"><span lang=3D"EN-US">=C2=A0</span><u></u><u></u></p></div><div><p class=
=3D"MsoNormal"><a href=3D"https://nam06.safelinks.protection.outlook.com/?u=
rl=3Dhttps%3A%2F%2Fstreaklinks.com%2FA9ifQyqJyZSff0skfwnnG7JR%2Fhttps%253A%=
252F%252Fwww.transmute.industries&amp;data=3D04%7C01%7Cantdl%40microsoft.co=
m%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1=
%7C0%7C637832198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQI=
joiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3Ds68xBb9HX6UQis=
VtRWMdNUvLwYCEpW%2Bhxp6wNMyNVY4%3D&amp;reserved=3D0" target=3D"_blank"><spa=
n lang=3D"EN-US" style=3D"font-size:10pt;font-family:&quot;Arial Narrow&quo=
t;,sans-serif;text-decoration:none"><img border=3D"0" width=3D"96" height=
=3D"23" style=3D"width: 1in; height: 0.2395in;" id=3D"gmail-m_5896966266628=
912084_x0000_i1029" src=3D"https://drive.google.com/a/transmute.industries/=
uc?id=3D1hbftCJoB5KdeV_kzj4eeyS28V3zS9d9c&amp;export=3Ddownload"></span></a=
><u></u><u></u></p></div></div></div></div></div></div></div></div></div></=
div></div></div><div><p class=3D"MsoNormal"><span lang=3D"EN-US"><img borde=
r=3D"0" width=3D"1" height=3D"1" style=3D"width: 0.0104in; height: 0.0104in=
;" id=3D"gmail-m_5896966266628912084_x0000_i1028" src=3D"https://mailfoogae=
.appspot.com/t?sender=3Dab3JpZUB0cmFuc211dGUuaW5kdXN0cmllcw%3D%3D&amp;type=
=3Dzerocontent&amp;guid=3D76629253-3770-41de-9267-75822572b3a6"></span><spa=
n lang=3D"EN-US" style=3D"font-size:7.5pt;font-family:Gadugi,sans-serif;col=
or:white">=E1=90=A7</span><u></u><u></u></p></div></div></div></blockquote>=
</div><p class=3D"MsoNormal"><br clear=3D"all"><u></u><u></u></p><div><p cl=
ass=3D"MsoNormal">=C2=A0<u></u><u></u></p></div><p class=3D"MsoNormal">-- <=
u></u><u></u></p><div><div><div><div><div><div><div><div><div><div><p class=
=3D"MsoNormal"><b><span style=3D"font-size:10pt;font-family:Tahoma,sans-ser=
if;color:rgb(53,28,117);background:white">ORIE STEELE</span></b> <u></u><u>=
</u></p><div><p class=3D"MsoNormal"><span style=3D"font-size:10pt;font-fami=
ly:&quot;Arial Narrow&quot;,sans-serif;color:rgb(53,28,117);background:whit=
e">Chief Technical Officer</span><u></u><u></u></p></div><div><p class=3D"M=
soNormal"><span style=3D"font-size:7.5pt;font-family:Arial,sans-serif;color=
:rgb(53,28,117);background:white"><a href=3D"https://nam06.safelinks.protec=
tion.outlook.com/?url=3Dhttp%3A%2F%2Fwww.transmute.industries%2F&amp;data=
=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93be4a9d938408da09011473%7C72f=
988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832198406909546%7CUnknown%7CTWFp=
bGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%=
7C3000&amp;sdata=3D8rexUHYxTWo%2BdscrZQn%2FfNepT89zLhzkqj%2FOlBSKtmM%3D&amp=
;reserved=3D0" target=3D"_blank">www.transmute.industries</a></span><u></u>=
<u></u></p></div><div><p class=3D"MsoNormal">=C2=A0<u></u><u></u></p></div>=
<div><p class=3D"MsoNormal"><a href=3D"https://nam06.safelinks.protection.o=
utlook.com/?url=3Dhttps%3A%2F%2Fwww.transmute.industries%2F&amp;data=3D04%7=
C01%7Cantdl%40microsoft.com%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86=
f141af91ab2d7cd011db47%7C1%7C0%7C637832198406909546%7CUnknown%7CTWFpbGZsb3d=
8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&=
amp;sdata=3D1YUAFfSlm9oMsIvZz2nExEwdbumZLfSfi9w8hDyl7Ak%3D&amp;reserved=3D0=
" target=3D"_blank"><span style=3D"font-size:10pt;font-family:&quot;Arial N=
arrow&quot;,sans-serif;text-decoration:none"><img border=3D"0" width=3D"96"=
 height=3D"23" style=3D"width: 1in; height: 0.2395in;" id=3D"gmail-m_589696=
6266628912084_x0000_i1027" src=3D"https://drive.google.com/a/transmute.indu=
stries/uc?id=3D1hbftCJoB5KdeV_kzj4eeyS28V3zS9d9c&amp;export=3Ddownload"></s=
pan></a><u></u><u></u></p></div></div></div></div></div></div></div></div><=
/div></div></div></blockquote></div><p class=3D"MsoNormal"><br clear=3D"all=
"><u></u><u></u></p><div><p class=3D"MsoNormal">=C2=A0<u></u><u></u></p></d=
iv><p class=3D"MsoNormal">-- <u></u><u></u></p><div><div><div><div><div><di=
v><div><div><div><div><p class=3D"MsoNormal"><b><span style=3D"font-size:10=
pt;font-family:Tahoma,sans-serif;color:rgb(53,28,117);background:white">ORI=
E STEELE</span></b> <u></u><u></u></p><div><p class=3D"MsoNormal"><span sty=
le=3D"font-size:10pt;font-family:&quot;Arial Narrow&quot;,sans-serif;color:=
rgb(53,28,117);background:white">Chief Technical Officer</span><u></u><u></=
u></p></div><div><p class=3D"MsoNormal"><span style=3D"font-size:7.5pt;font=
-family:Arial,sans-serif;color:rgb(53,28,117);background:white"><a href=3D"=
https://nam06.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fwww.tran=
smute.industries%2F&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93=
be4a9d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378321=
98406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJ=
BTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3D8rexUHYxTWo%2BdscrZQn%2FfNep=
T89zLhzkqj%2FOlBSKtmM%3D&amp;reserved=3D0" target=3D"_blank">www.transmute.=
industries</a></span><u></u><u></u></p></div><div><p class=3D"MsoNormal">=
=C2=A0<u></u><u></u></p></div><div><p class=3D"MsoNormal"><a href=3D"https:=
//nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.transmute=
.industries%2F&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7Cff4a183e93be4a9=
d938408da09011473%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637832198406=
909546%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6=
Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3D1YUAFfSlm9oMsIvZz2nExEwdbumZLfSfi=
9w8hDyl7Ak%3D&amp;reserved=3D0" target=3D"_blank"><span style=3D"font-size:=
10pt;font-family:&quot;Arial Narrow&quot;,sans-serif;text-decoration:none">=
<img border=3D"0" width=3D"96" height=3D"23" style=3D"width: 1in; height: 0=
.2395in;" id=3D"gmail-m_5896966266628912084_x0000_i1026" src=3D"https://dri=
ve.google.com/a/transmute.industries/uc?id=3D1hbftCJoB5KdeV_kzj4eeyS28V3zS9=
d9c&amp;export=3Ddownload"></span></a><u></u><u></u></p></div></div></div><=
/div></div></div></div></div></div></div></div></div></div></div></blockquo=
te></div><p class=3D"MsoNormal"><br clear=3D"all"><u></u><u></u></p><div><p=
 class=3D"MsoNormal"><u></u>=C2=A0<u></u></p></div><p class=3D"MsoNormal">-=
- <u></u><u></u></p><div><div><div><div><div><div><div><div><div><div><p cl=
ass=3D"MsoNormal"><b><span style=3D"font-size:10pt;font-family:Tahoma,sans-=
serif;color:rgb(53,28,117);background:white">ORIE STEELE</span></b> <u></u>=
<u></u></p><div><p class=3D"MsoNormal"><span style=3D"font-size:10pt;font-f=
amily:&quot;Arial Narrow&quot;,sans-serif;color:rgb(53,28,117);background:w=
hite">Chief Technical Officer</span><u></u><u></u></p></div><div><p class=
=3D"MsoNormal"><span style=3D"font-size:7.5pt;font-family:Arial,sans-serif;=
color:rgb(53,28,117);background:white"><a href=3D"http://www.transmute.indu=
stries" target=3D"_blank">www.transmute.industries</a></span><u></u><u></u>=
</p></div><div><p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p></div><div><p=
 class=3D"MsoNormal"><a href=3D"https://nam06.safelinks.protection.outlook.=
com/?url=3Dhttps%3A%2F%2Fwww.transmute.industries%2F&amp;data=3D04%7C01%7Ca=
ntdl%40microsoft.com%7Cff4a183e93be4a9d938408da09011473%7C72f988bf86f141af9=
1ab2d7cd011db47%7C1%7C0%7C637832198406909546%7CUnknown%7CTWFpbGZsb3d8eyJWIj=
oiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sda=
ta=3D1YUAFfSlm9oMsIvZz2nExEwdbumZLfSfi9w8hDyl7Ak%3D&amp;reserved=3D0" targe=
t=3D"_blank"><span style=3D"font-size:10pt;font-family:&quot;Arial Narrow&q=
uot;,sans-serif;text-decoration:none"><img border=3D"0" width=3D"96" height=
=3D"23" style=3D"width: 1in; height: 0.2395in;" id=3D"gmail-m_5896966266628=
912084_x0000_i1025" src=3D"https://drive.google.com/a/transmute.industries/=
uc?id=3D1hbftCJoB5KdeV_kzj4eeyS28V3zS9d9c&amp;export=3Ddownload"></span></a=
><u></u><u></u></p></div></div></div></div></div></div></div></div></div></=
div></div></div></div></div></blockquote></div><br clear=3D"all"><div><br><=
/div>-- <br><div dir=3D"ltr" class=3D"gmail_signature"><div dir=3D"ltr"><di=
v><div dir=3D"ltr"><div><div dir=3D"ltr"><div><div dir=3D"ltr"><div><div di=
r=3D"ltr"><font face=3D"tahoma, sans-serif" size=3D"2" color=3D"#351c75"><b=
 style=3D"background-color:rgb(255,255,255)">ORIE STEELE</b></font><div><fo=
nt size=3D"2" face=3D"arial narrow, sans-serif" style=3D"background-color:r=
gb(255,255,255)" color=3D"#351c75">Chief Technical Officer</font></div><div=
><font style=3D"background-color:rgb(255,255,255)" color=3D"#351c75" face=
=3D"arial, helvetica, sans-serif" size=3D"1">www.transmute.industries</font=
></div><div><font size=3D"2" face=3D"arial narrow, sans-serif"><br></font><=
/div><div><font size=3D"2" face=3D"arial narrow, sans-serif"><a href=3D"htt=
ps://www.transmute.industries" target=3D"_blank"><img src=3D"https://drive.=
google.com/a/transmute.industries/uc?id=3D1hbftCJoB5KdeV_kzj4eeyS28V3zS9d9c=
&amp;export=3Ddownload" width=3D"96" height=3D"23"></a><br></font></div></d=
iv></div></div></div></div></div></div></div></div></div>

--0000000000002f02be05da83059c--


From nobody Mon Mar 21 16:23:28 2022
Return-Path: <ekr@rtfm.com>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D745D3A13EA for <scitt@ietfa.amsl.com>; Mon, 21 Mar 2022 16:23:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.905
X-Spam-Level: 
X-Spam-Status: No, score=-1.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4Fy4x9tGFOIq for <scitt@ietfa.amsl.com>; Mon, 21 Mar 2022 16:23:01 -0700 (PDT)
Received: from mail-il1-x134.google.com (mail-il1-x134.google.com [IPv6:2607:f8b0:4864:20::134]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ED4713A14CF for <scitt@ietf.org>; Mon, 21 Mar 2022 16:23:00 -0700 (PDT)
Received: by mail-il1-x134.google.com with SMTP id r11so11371098ila.1 for <scitt@ietf.org>; Mon, 21 Mar 2022 16:23:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=NPUedg51XI6Y+40GxS7I9E/DyY3bKol17zmLoaUdkSY=; b=7ARU+9nz4ByQWVrcXVWmGAEptytDP/oRLSJL3zmNZ2uk7J1PW5cSWycoEp+YGAtN7i TXd9oPmmIoI1xN0POPnTj2v5YmKGp8IG4HDqvBkumzvb7+M4TuTTPZIxkq70bCXJuPIR ber4ZAI+nyJSGInx0RogXUY+hLKF39hgh1GD0JCoEPg5FYBmRjt/K+KBYyMBNZtIVP77 4Ta3fyWz1cpL3s44z2+xApyj/5nuMeQQzKY5oKQZo+npQ8x1p6cH1AfE2areWHO1mULj RO9h8pUBGSjxLL8AHr3Ue/pwOKZg66h4WfPGNN8GiHu8/6XCgWW3ghN5Priq3hG0PO+B bveA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=NPUedg51XI6Y+40GxS7I9E/DyY3bKol17zmLoaUdkSY=; b=6SBckQQJkb1fpx/69PpJL5o6wqnE4vQuBDU04jHevPWD85ijLs8GioMUzusfxZKpsT xK3v49NIiL9cfOVvKyoiSJe+Qog8KUvACb0gmTGHzcC3zEAHwPRkellbAuVG03hU16Z+ 3Symqr6DSRe28LAjrNRsRG3wFfbfyI2TMul+AmZ6BK3UDoxnvkDzt5dWBPTOc/ecQoa2 Dw5f5KC4lqZWNKJIXSc7bs3pPVgdIVe4fQF7HXmeLejsGp8jtSZYy2oQ12a5RLPyZQIU srRpwXDFs72AlwmLCKzYXXR1lqRSnciZiOs/QU0Por/vNPZC71JQJ6vrGuplUSTx9M3N 3hpw==
X-Gm-Message-State: AOAM532OidJryvw/DE42WWncov9pKXAYedI4DlleC3s6v6yHhFAeTgRj CPAuvV8xumWo/tmV+9VT+G5LuFF4vDpTCY/MKNgWkw==
X-Google-Smtp-Source: ABdhPJyj89rb5uCCD0Vd1xZOZGH+yYeQ+VS3VVgyAUSFdodQS2vrIYp+6mfJ0ACiow6SPN5TIo1HQuI1QlswbNdIdUk=
X-Received: by 2002:a05:6e02:1c2a:b0:2c7:dcdb:86f3 with SMTP id m10-20020a056e021c2a00b002c7dcdb86f3mr11693414ilh.276.1647904979760; Mon, 21 Mar 2022 16:22:59 -0700 (PDT)
MIME-Version: 1.0
References: <164583895227.24617.1939040203283436909@ietfa.amsl.com> <5b97a678-eba1-09c3-7e70-c71dd98db8a9@sit.fraunhofer.de>
In-Reply-To: <5b97a678-eba1-09c3-7e70-c71dd98db8a9@sit.fraunhofer.de>
From: Eric Rescorla <ekr@rtfm.com>
Date: Mon, 21 Mar 2022 16:22:24 -0700
Message-ID: <CABcZeBMJgKPSyJ3Z1igS38fbgsp6R-FxVd193+CGsKJC2dchuA@mail.gmail.com>
To: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Cc: IETF SecDispatch <secdispatch@ietf.org>, scitt@ietf.org
Content-Type: multipart/alternative; boundary="000000000000f14e3905dac2c669"
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/gKK1zCCDaTxvwEM_S5orWNdIZHA>
Subject: Re: [SCITT] [Secdispatch] Request for session at IETF 113
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Mar 2022 23:23:06 -0000

--000000000000f14e3905dac2c669
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

OVERALL
This document describes a general structure for providing transparency
for  software artifacts, effectively a generalization of what's often
called "binary transparency". This is a useful kind of service in concept
an at least theoretically an appropriate topic for IETF.

The answer to the secdispatch questions depends, I think on the level
of interest people have in deploying such a service and especially
with this as a starting point. Specifically, we'd need to hear from:

- Software vendors
- Potential transparency service (log) operators.

I'd particularly like to hear from people who already are involved
with Binary Transparency:
https://developers.google.com/android/binary_transparency

If there is interest, I would be supportive of moving forward with
this. Given the complexity of the topic, a BOF is probably the next
step.


TECHNICAL
I do have a few small technical comments.

1. I'm still working through the semantics of the identities you are
   using. As I understand it, the signatures are intended to provide
   evidence that the vendor actually published something, but if you
   use did:web, then can't the vendor just use a different key for
   each signature and remove the key from the Web site later. What
   proof is there that the vendor endorsed a specific key?

2. I understand the appeal of the append only log, but I'd observe
   that much of the value in CT has been achieved without any real
   verification by clients of the inclusion proofs but just relying
   entirely on SCTs. So, perhaps we don't need to try as hard
   here. This point applies to BT as well, I think.

3. S 6.3 seems to require the claim to be appended to the log prior to
   issuing the receipt. This is not how CT is architected, as I
   understand it because of concerns about the latency of that
   process. Instead, certificates have SCTs. Do similar concerns
   apply here?

I'm sure all of these could be addressed during the standards process,
and they certainly don't preclude doing this work, but I noted them
as I read the document and thought it would be good to record them.









On Wed, Mar 9, 2022 at 2:40 PM Henk Birkholz <
henk.birkholz@sit.fraunhofer.de> wrote:

> Hi secdispatch,
> (hi scitt),
>
> emerging work on the topic of Supply Chain Integrity, Transparency,
> Trust has taken some shape recently.
>
> The work combines existing IETF building blocks to facilitate useful
> Internet-based support of global supply chain interoperability.
>
> Current contributions focus on the definition of Transparency Services
> based on Internet technology (using CBOR/CDDL/COSE) to achieve
> unambiguous, scaleable, and resilient integration with common devops and
> secops requirements.
>
> I'd like to request secdispatch agenda time for two documents that are
> currently submitted:
>   > https://datatracker.ietf.org/doc/draft-birkholz-scitt-architecture/
>
> and
>
> > https://datatracker.ietf.org/doc/draft-birkholz-scitt-receipts/
>
> These two contributions are in -00 state. Yet, they already address
> essential requirements, such as, air-gapped validation when being
> offline, integration of remote attestation, efficient and crypto-agile
> signing prescriptions for out-of-the-box interoperability, and - in
> essence - long-long-term guarantees in support of various types of
> supply chains requirements.
>
> We=E2=80=99d be happy to present this emerging work in secdispatch with t=
he goal
> of discussing whether it might fit into the IETF space and how to
> progress it together.
>
> Viele Gr=C3=BC=C3=9Fe,
>
> Henk
>
>
>
> On 26.02.22 02:29, "IETF Secretariat" wrote:
> > Dear Mohit Sethi,
> >
> > The session(s) that you have requested have been scheduled.
> > Below is the scheduled session information followed by
> > the original request.
> >
> >
> >      secdispatch Session 1 (2:00 requested)
> >      Tuesday, 22 March 2022, Afternoon Session II 1430-1630
> >      Room Name: Grand Park Hall 3 size: 250
> >      ---------------------------------------------
> >
> >
> > iCalendar:
> https://datatracker.ietf.org/meeting/113/sessions/secdispatch.ics
> >
> > Request Information:
> >
> >
> > ---------------------------------------------------------
> > Working Group Name: Security Dispatch
> > Area Name: Security Area
> > Session Requester: Mohit Sethi
> >
> >
> > Number of Sessions: 1
> > Length of Session(s):
> > Number of Attendees: 200
> > Conflicts to Avoid:
> >
> >
> >
> >
> > People who must be present:
> >    Benjamin Kaduk
> >    Kathleen Moriarty
> >    Mohit Sethi
> >    Paul Wouters
> >    Richard Barnes
> >    Roman Danyliw
> >
> > Resources Requested:
> >
> > Special Requests:
> >    Please avoid conflict with any Security related BoF.
> > ---------------------------------------------------------
> >
> >
> > _______________________________________________
> > Secdispatch mailing list
> > Secdispatch@ietf.org
> > https://www.ietf.org/mailman/listinfo/secdispatch
>
> _______________________________________________
> Secdispatch mailing list
> Secdispatch@ietf.org
> https://www.ietf.org/mailman/listinfo/secdispatch
>

--000000000000f14e3905dac2c669
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><br>OVERALL<br>This document describes a general structure=
 for providing transparency<br>for =C2=A0software artifacts, effectively a =
generalization of what&#39;s often<br>called &quot;binary transparency&quot=
;. This is a useful kind of service in concept<br>an at least theoretically=
 an appropriate topic for IETF.<br><br>The answer to the secdispatch questi=
ons depends, I think on the level<br>of interest people have in deploying s=
uch a service and especially<br>with this as a starting point. Specifically=
, we&#39;d need to hear from:<br><br>- Software vendors<br>- Potential tran=
sparency service (log) operators.<br><br>I&#39;d particularly like to hear =
from people who already are involved<br>with Binary Transparency: <a href=
=3D"https://developers.google.com/android/binary_transparency">https://deve=
lopers.google.com/android/binary_transparency</a><br><br>If there is intere=
st, I would be supportive of moving forward with<br>this. Given the complex=
ity of the topic, a BOF is probably the next<br>step.<br><br><br>TECHNICAL<=
br>I do have a few small technical comments.<br><br>1. I&#39;m still workin=
g through the semantics of the identities you are<br>=C2=A0 =C2=A0using. As=
 I understand it, the signatures are intended to provide<br>=C2=A0 =C2=A0ev=
idence that the vendor actually published something, but if you<br>=C2=A0 =
=C2=A0use did:web, then can&#39;t the vendor just use a different key for<b=
r>=C2=A0 =C2=A0each signature and remove the key from the Web site later. W=
hat<br>=C2=A0 =C2=A0proof is there that the vendor endorsed a specific key?=
<br><br>2. I understand the appeal of the append only log, but I&#39;d obse=
rve<br>=C2=A0 =C2=A0that much of the value in CT has been achieved without =
any real<br>=C2=A0 =C2=A0verification by clients of the inclusion proofs bu=
t just relying<br>=C2=A0 =C2=A0entirely on SCTs. So, perhaps we don&#39;t n=
eed to try as hard<br>=C2=A0 =C2=A0here. This point applies to BT as well, =
I think.<br><br>3. S 6.3 seems to require the claim to be appended to the l=
og prior to<br>=C2=A0 =C2=A0issuing the receipt. This is not how CT is arch=
itected, as I<br>=C2=A0 =C2=A0understand it because of concerns about the l=
atency of that<br>=C2=A0 =C2=A0process. Instead, certificates have SCTs. Do=
 similar concerns<br>=C2=A0 =C2=A0apply here?<br><br>I&#39;m sure all of th=
ese could be addressed during the standards process,<br>and they certainly =
don&#39;t preclude doing this work, but I noted them<br>as I read the docum=
ent and thought it would be good to record them. <br><br>=C2=A0 <br><br>=C2=
=A0 <br><br><br><br><br></div><br><div class=3D"gmail_quote"><div dir=3D"lt=
r" class=3D"gmail_attr">On Wed, Mar 9, 2022 at 2:40 PM Henk Birkholz &lt;<a=
 href=3D"mailto:henk.birkholz@sit.fraunhofer.de">henk.birkholz@sit.fraunhof=
er.de</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"ma=
rgin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:=
1ex">Hi secdispatch,<br>
(hi scitt),<br>
<br>
emerging work on the topic of Supply Chain Integrity, Transparency, <br>
Trust has taken some shape recently.<br>
<br>
The work combines existing IETF building blocks to facilitate useful <br>
Internet-based support of global supply chain interoperability.<br>
<br>
Current contributions focus on the definition of Transparency Services <br>
based on Internet technology (using CBOR/CDDL/COSE) to achieve <br>
unambiguous, scaleable, and resilient integration with common devops and <b=
r>
secops requirements.<br>
<br>
I&#39;d like to request secdispatch agenda time for two documents that are =
<br>
currently submitted:<br>
=C2=A0 &gt; <a href=3D"https://datatracker.ietf.org/doc/draft-birkholz-scit=
t-architecture/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.i=
etf.org/doc/draft-birkholz-scitt-architecture/</a><br>
<br>
and<br>
<br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/draft-birkholz-scitt-recei=
pts/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/doc=
/draft-birkholz-scitt-receipts/</a><br>
<br>
These two contributions are in -00 state. Yet, they already address <br>
essential requirements, such as, air-gapped validation when being <br>
offline, integration of remote attestation, efficient and crypto-agile <br>
signing prescriptions for out-of-the-box interoperability, and - in <br>
essence - long-long-term guarantees in support of various types of <br>
supply chains requirements.<br>
<br>
We=E2=80=99d be happy to present this emerging work in secdispatch with the=
 goal <br>
of discussing whether it might fit into the IETF space and how to <br>
progress it together.<br>
<br>
Viele Gr=C3=BC=C3=9Fe,<br>
<br>
Henk<br>
<br>
<br>
<br>
On 26.02.22 02:29, &quot;IETF Secretariat&quot; wrote:<br>
&gt; Dear Mohit Sethi,<br>
&gt; <br>
&gt; The session(s) that you have requested have been scheduled.<br>
&gt; Below is the scheduled session information followed by<br>
&gt; the original request.<br>
&gt; <br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 secdispatch Session 1 (2:00 requested)<br>
&gt;=C2=A0 =C2=A0 =C2=A0 Tuesday, 22 March 2022, Afternoon Session II 1430-=
1630<br>
&gt;=C2=A0 =C2=A0 =C2=A0 Room Name: Grand Park Hall 3 size: 250<br>
&gt;=C2=A0 =C2=A0 =C2=A0 ---------------------------------------------<br>
&gt; <br>
&gt; <br>
&gt; iCalendar: <a href=3D"https://datatracker.ietf.org/meeting/113/session=
s/secdispatch.ics" rel=3D"noreferrer" target=3D"_blank">https://datatracker=
.ietf.org/meeting/113/sessions/secdispatch.ics</a><br>
&gt; <br>
&gt; Request Information:<br>
&gt; <br>
&gt; <br>
&gt; ---------------------------------------------------------<br>
&gt; Working Group Name: Security Dispatch<br>
&gt; Area Name: Security Area<br>
&gt; Session Requester: Mohit Sethi<br>
&gt; <br>
&gt; <br>
&gt; Number of Sessions: 1<br>
&gt; Length of Session(s):<br>
&gt; Number of Attendees: 200<br>
&gt; Conflicts to Avoid:<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0<br>
&gt; <br>
&gt; <br>
&gt; People who must be present:<br>
&gt;=C2=A0 =C2=A0 Benjamin Kaduk<br>
&gt;=C2=A0 =C2=A0 Kathleen Moriarty<br>
&gt;=C2=A0 =C2=A0 Mohit Sethi<br>
&gt;=C2=A0 =C2=A0 Paul Wouters<br>
&gt;=C2=A0 =C2=A0 Richard Barnes<br>
&gt;=C2=A0 =C2=A0 Roman Danyliw<br>
&gt; <br>
&gt; Resources Requested:<br>
&gt; <br>
&gt; Special Requests:<br>
&gt;=C2=A0 =C2=A0 Please avoid conflict with any Security related BoF.<br>
&gt; ---------------------------------------------------------<br>
&gt; <br>
&gt; <br>
&gt; _______________________________________________<br>
&gt; Secdispatch mailing list<br>
&gt; <a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank">Secdispatch@=
ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/secdispatch" rel=3D"n=
oreferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/secdispa=
tch</a><br>
<br>
_______________________________________________<br>
Secdispatch mailing list<br>
<a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank">Secdispatch@ietf.=
org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/secdispatch" rel=3D"norefe=
rrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/secdispatch</=
a><br>
</blockquote></div>

--000000000000f14e3905dac2c669--


From nobody Tue Mar 22 04:31:46 2022
Return-Path: <rlb@ipv.sx>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 867393A110C for <scitt@ietfa.amsl.com>; Tue, 22 Mar 2022 04:31:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.906
X-Spam-Level: 
X-Spam-Status: No, score=-6.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=ipv-sx.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ib8Lsid6-CV7 for <scitt@ietfa.amsl.com>; Tue, 22 Mar 2022 04:31:37 -0700 (PDT)
Received: from mail-qk1-x730.google.com (mail-qk1-x730.google.com [IPv6:2607:f8b0:4864:20::730]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5F66F3A112D for <scitt@ietf.org>; Tue, 22 Mar 2022 04:31:16 -0700 (PDT)
Received: by mail-qk1-x730.google.com with SMTP id i65so7878771qkd.7 for <scitt@ietf.org>; Tue, 22 Mar 2022 04:31:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ipv-sx.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=dx36XK0Leu4BsDOewduCjJHLYPmbnHANJzqpgIW8ShE=; b=wSA9COxwGFF0tbblv6A6y0mhWat1BXJnvZNPuDeG2oDezVxJNBIMgGNxrd/PST3gej 5eycBuc9NxsDCoe+PQ//f65FiuHYwwJqp2DaXzF0YdrTFIplzLzTJ/V7em5w/Dt6Xzqp xzKo6Wi++63P37g5SSTrUJHphCTxlO9cdpcRSP42QBGRc21iK0MRv1duA2MJ/Vp9JvJh LxFrMYerUSz3O0wEIJ0dHOimSM2bdLl4pAN7HKdgESGGWkbASa8iSi4D6d80Pc0nVMdy d9Uo64lf09w/bsOmt580umwvmg3t6rijEZCMWy4wbPVW3UpD5DZCZuNwqHiSkjjuPH43 W+KA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=dx36XK0Leu4BsDOewduCjJHLYPmbnHANJzqpgIW8ShE=; b=4f8P4diIvIQbE9Jpae3CkYP6JMSZQVkhta4SVq5jBmCEJnsKlApvuIAFXGhrgxSoHX vFlLEVVcEkPnvtc4nLS4s6UM08lUCvI3lIUvm3B3rTXARVl8hxqy5H7cgITEjxwXriek rpiWpC+kyXuyJ3K3+MRJm1UjWkMe9WQCcHmcRDuJsJGW7X6s9kAq18YFu59OxjlITNsq WvlhKzW7WAukpC/M+wo+L/Z+9KzDXszfYgQL3Ts5Q3loQxfVHyg4VPWYj9lKBW6a+oiW JrQvPVJoNlqBB8LdZxF7JJQcCoP4L7NYOTmTKutda+rgfws+WhnEW5EUPGBTFeQV9JfJ ax3g==
X-Gm-Message-State: AOAM533Q+K5+k2V69POciVQckRHPCUVBU9/XLLqoOXkTve9MY189xCwX SarI2z+5bfmjD+4AXBVrGLyzGo540Cu60t+Xd7OfKqDOOxGRbQ==
X-Google-Smtp-Source: ABdhPJx6hfpq/SKk3r7rw/dKITfZPOdmPWjmVTQeQU1dAabiC1oLFge/c5/yJvy9JIXnK84nm7LEEw2sIMS9kxPyQUw=
X-Received: by 2002:a37:a0ca:0:b0:67d:b628:6a4e with SMTP id j193-20020a37a0ca000000b0067db6286a4emr15174967qke.35.1647948675151; Tue, 22 Mar 2022 04:31:15 -0700 (PDT)
MIME-Version: 1.0
References: <164583895227.24617.1939040203283436909@ietfa.amsl.com> <5b97a678-eba1-09c3-7e70-c71dd98db8a9@sit.fraunhofer.de>
In-Reply-To: <5b97a678-eba1-09c3-7e70-c71dd98db8a9@sit.fraunhofer.de>
From: Richard Barnes <rlb@ipv.sx>
Date: Tue, 22 Mar 2022 07:31:04 -0400
Message-ID: <CAL02cgT7cRXsM7qNtMarcxcLd0fdSCtj_dM+79=DbnMWyikdhQ@mail.gmail.com>
To: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Cc: secdispatch@ietf.org, scitt@ietf.org
Content-Type: multipart/alternative; boundary="000000000000640ced05daccf3d7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/nOmn_ZG4eF-QONCdUayqsWGTRP4>
Subject: Re: [SCITT] [Secdispatch] Request for session at IETF 113
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2022 11:31:44 -0000

--000000000000640ced05daccf3d7
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi folks,

It looks like at a high level, the approach here is along the same lines as
what has been discussed as "Binary Transparency" elsewhere.  There have
been several stabs taken at this before.  See, for example:

https://www.sigstore.dev/
https://unmitigatedrisk.com/?tag=3Dbinary-transparency
https://github.com/FreeBSDFoundation/binary-transparency-notes/blob/master/=
debian.txt
https://wiki.mozilla.org/Security/Binary_Transparency

While these existing approaches do help validate that there is some
interest in the field for what SCITT does, it's not clear how SCITT is
different from / better than this prior art.

--RLB


On Wed, Mar 9, 2022 at 5:40 PM Henk Birkholz <
henk.birkholz@sit.fraunhofer.de> wrote:

> Hi secdispatch,
> (hi scitt),
>
> emerging work on the topic of Supply Chain Integrity, Transparency,
> Trust has taken some shape recently.
>
> The work combines existing IETF building blocks to facilitate useful
> Internet-based support of global supply chain interoperability.
>
> Current contributions focus on the definition of Transparency Services
> based on Internet technology (using CBOR/CDDL/COSE) to achieve
> unambiguous, scaleable, and resilient integration with common devops and
> secops requirements.
>
> I'd like to request secdispatch agenda time for two documents that are
> currently submitted:
>   > https://datatracker.ietf.org/doc/draft-birkholz-scitt-architecture/
>
> and
>
> > https://datatracker.ietf.org/doc/draft-birkholz-scitt-receipts/
>
> These two contributions are in -00 state. Yet, they already address
> essential requirements, such as, air-gapped validation when being
> offline, integration of remote attestation, efficient and crypto-agile
> signing prescriptions for out-of-the-box interoperability, and - in
> essence - long-long-term guarantees in support of various types of
> supply chains requirements.
>
> We=E2=80=99d be happy to present this emerging work in secdispatch with t=
he goal
> of discussing whether it might fit into the IETF space and how to
> progress it together.
>
> Viele Gr=C3=BC=C3=9Fe,
>
> Henk
>
>
>
> On 26.02.22 02:29, "IETF Secretariat" wrote:
> > Dear Mohit Sethi,
> >
> > The session(s) that you have requested have been scheduled.
> > Below is the scheduled session information followed by
> > the original request.
> >
> >
> >      secdispatch Session 1 (2:00 requested)
> >      Tuesday, 22 March 2022, Afternoon Session II 1430-1630
> >      Room Name: Grand Park Hall 3 size: 250
> >      ---------------------------------------------
> >
> >
> > iCalendar:
> https://datatracker.ietf.org/meeting/113/sessions/secdispatch.ics
> >
> > Request Information:
> >
> >
> > ---------------------------------------------------------
> > Working Group Name: Security Dispatch
> > Area Name: Security Area
> > Session Requester: Mohit Sethi
> >
> >
> > Number of Sessions: 1
> > Length of Session(s):
> > Number of Attendees: 200
> > Conflicts to Avoid:
> >
> >
> >
> >
> > People who must be present:
> >    Benjamin Kaduk
> >    Kathleen Moriarty
> >    Mohit Sethi
> >    Paul Wouters
> >    Richard Barnes
> >    Roman Danyliw
> >
> > Resources Requested:
> >
> > Special Requests:
> >    Please avoid conflict with any Security related BoF.
> > ---------------------------------------------------------
> >
> >
> > _______________________________________________
> > Secdispatch mailing list
> > Secdispatch@ietf.org
> > https://www.ietf.org/mailman/listinfo/secdispatch
>
> _______________________________________________
> Secdispatch mailing list
> Secdispatch@ietf.org
> https://www.ietf.org/mailman/listinfo/secdispatch
>

--000000000000640ced05daccf3d7
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Hi folks,</div><div><br></div><div>It looks like at a=
 high level, the approach here is along the same lines as what has been dis=
cussed as &quot;Binary Transparency&quot; elsewhere.=C2=A0 There have been =
several stabs taken at this before.=C2=A0 See, for example:<br></div><div><=
br></div><div><a href=3D"https://www.sigstore.dev/">https://www.sigstore.de=
v/</a></div><div><a href=3D"https://unmitigatedrisk.com/?tag=3Dbinary-trans=
parency">https://unmitigatedrisk.com/?tag=3Dbinary-transparency</a></div><d=
iv><a href=3D"https://github.com/FreeBSDFoundation/binary-transparency-note=
s/blob/master/debian.txt">https://github.com/FreeBSDFoundation/binary-trans=
parency-notes/blob/master/debian.txt</a><br><a href=3D"https://wiki.mozilla=
.org/Security/Binary_Transparency">https://wiki.mozilla.org/Security/Binary=
_Transparency</a></div><div><br></div><div>While these existing approaches =
do help validate that there is some interest in the field for what SCITT do=
es, it&#39;s not clear how SCITT is different from / better than this prior=
 art.</div><div><br></div><div>--RLB<br></div><div><br></div></div><br><div=
 class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Wed, Mar 9,=
 2022 at 5:40 PM Henk Birkholz &lt;<a href=3D"mailto:henk.birkholz@sit.frau=
nhofer.de">henk.birkholz@sit.fraunhofer.de</a>&gt; wrote:<br></div><blockqu=
ote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px=
 solid rgb(204,204,204);padding-left:1ex">Hi secdispatch,<br>
(hi scitt),<br>
<br>
emerging work on the topic of Supply Chain Integrity, Transparency, <br>
Trust has taken some shape recently.<br>
<br>
The work combines existing IETF building blocks to facilitate useful <br>
Internet-based support of global supply chain interoperability.<br>
<br>
Current contributions focus on the definition of Transparency Services <br>
based on Internet technology (using CBOR/CDDL/COSE) to achieve <br>
unambiguous, scaleable, and resilient integration with common devops and <b=
r>
secops requirements.<br>
<br>
I&#39;d like to request secdispatch agenda time for two documents that are =
<br>
currently submitted:<br>
=C2=A0 &gt; <a href=3D"https://datatracker.ietf.org/doc/draft-birkholz-scit=
t-architecture/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.i=
etf.org/doc/draft-birkholz-scitt-architecture/</a><br>
<br>
and<br>
<br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/draft-birkholz-scitt-recei=
pts/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/doc=
/draft-birkholz-scitt-receipts/</a><br>
<br>
These two contributions are in -00 state. Yet, they already address <br>
essential requirements, such as, air-gapped validation when being <br>
offline, integration of remote attestation, efficient and crypto-agile <br>
signing prescriptions for out-of-the-box interoperability, and - in <br>
essence - long-long-term guarantees in support of various types of <br>
supply chains requirements.<br>
<br>
We=E2=80=99d be happy to present this emerging work in secdispatch with the=
 goal <br>
of discussing whether it might fit into the IETF space and how to <br>
progress it together.<br>
<br>
Viele Gr=C3=BC=C3=9Fe,<br>
<br>
Henk<br>
<br>
<br>
<br>
On 26.02.22 02:29, &quot;IETF Secretariat&quot; wrote:<br>
&gt; Dear Mohit Sethi,<br>
&gt; <br>
&gt; The session(s) that you have requested have been scheduled.<br>
&gt; Below is the scheduled session information followed by<br>
&gt; the original request.<br>
&gt; <br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 secdispatch Session 1 (2:00 requested)<br>
&gt;=C2=A0 =C2=A0 =C2=A0 Tuesday, 22 March 2022, Afternoon Session II 1430-=
1630<br>
&gt;=C2=A0 =C2=A0 =C2=A0 Room Name: Grand Park Hall 3 size: 250<br>
&gt;=C2=A0 =C2=A0 =C2=A0 ---------------------------------------------<br>
&gt; <br>
&gt; <br>
&gt; iCalendar: <a href=3D"https://datatracker.ietf.org/meeting/113/session=
s/secdispatch.ics" rel=3D"noreferrer" target=3D"_blank">https://datatracker=
.ietf.org/meeting/113/sessions/secdispatch.ics</a><br>
&gt; <br>
&gt; Request Information:<br>
&gt; <br>
&gt; <br>
&gt; ---------------------------------------------------------<br>
&gt; Working Group Name: Security Dispatch<br>
&gt; Area Name: Security Area<br>
&gt; Session Requester: Mohit Sethi<br>
&gt; <br>
&gt; <br>
&gt; Number of Sessions: 1<br>
&gt; Length of Session(s):<br>
&gt; Number of Attendees: 200<br>
&gt; Conflicts to Avoid:<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0<br>
&gt; <br>
&gt; <br>
&gt; People who must be present:<br>
&gt;=C2=A0 =C2=A0 Benjamin Kaduk<br>
&gt;=C2=A0 =C2=A0 Kathleen Moriarty<br>
&gt;=C2=A0 =C2=A0 Mohit Sethi<br>
&gt;=C2=A0 =C2=A0 Paul Wouters<br>
&gt;=C2=A0 =C2=A0 Richard Barnes<br>
&gt;=C2=A0 =C2=A0 Roman Danyliw<br>
&gt; <br>
&gt; Resources Requested:<br>
&gt; <br>
&gt; Special Requests:<br>
&gt;=C2=A0 =C2=A0 Please avoid conflict with any Security related BoF.<br>
&gt; ---------------------------------------------------------<br>
&gt; <br>
&gt; <br>
&gt; _______________________________________________<br>
&gt; Secdispatch mailing list<br>
&gt; <a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank">Secdispatch@=
ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/secdispatch" rel=3D"n=
oreferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/secdispa=
tch</a><br>
<br>
_______________________________________________<br>
Secdispatch mailing list<br>
<a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank">Secdispatch@ietf.=
org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/secdispatch" rel=3D"norefe=
rrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/secdispatch</=
a><br>
</blockquote></div>

--000000000000640ced05daccf3d7--


From nobody Tue Mar 22 06:21:50 2022
Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 375AF3A12B8; Tue, 22 Mar 2022 06:21:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.107
X-Spam-Level: 
X-Spam-Status: No, score=-7.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GqW-vUvCWJmq; Tue, 22 Mar 2022 06:21:37 -0700 (PDT)
Received: from mail-vk1-xa2a.google.com (mail-vk1-xa2a.google.com [IPv6:2607:f8b0:4864:20::a2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BE7EA3A12D5; Tue, 22 Mar 2022 06:21:35 -0700 (PDT)
Received: by mail-vk1-xa2a.google.com with SMTP id 188so6020869vku.5; Tue, 22 Mar 2022 06:21:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=GS+Aemus5tk+4YW1JocTwVIrJVZUNk5FHmYM2lqVxcM=; b=ns430hsnwwi02o4X3s7c7aeMCFpiTt5SkJ4yDtCT6h+HlvAFF5mQ0oWJ49IVvKgBTj CAqcOMGWn+/6eUXoTZNna0i7bdmgRWH7SsU979ThS9D4dUUYBOBiex/f29p7LmDwWp9I pr9N3bXPzmJzK8zNOiMGWJZXJUkdHtT/3iwCsR+fAfDzPuLkTCjB31zPy5frm3A3XdX2 MozO3wfj6ZG0aoZ/jmmHhcLvboKY2dpsBTqlZeKVItwSqjUmroY48xtqK0OHccokGm4E pywqUDfltrlp/pQ6ocH+ahVnSqyM8F+HEhMZxcfXd19H92bAppttdi3J8+KCBpQRjgRT CSLQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=GS+Aemus5tk+4YW1JocTwVIrJVZUNk5FHmYM2lqVxcM=; b=ZrsCLugfbk/4lbz+jimbRvxrrUOviP2pDN5zsyjKNfGBmmkhWvHIrRKzyUuhBdxyzi grHe0dxAunzreu/JV2csYDeyMUL5zTG8BmtvgXqhNVottPUPZZ8da5sK6yk8YjTILKIk Qo7aw9dWmTL3L4Z/XttGnz4uMWrKALidDgZkblJja4Qbry09OSdQ0eaLOMz6tjnpzVLk Mes/Owi9ctxWUV+aWe4LXF30o7nMRFyodEEQMhnA/Yq0GIYhJ0RqDUaQQ6+nxrBvGe+T 0W4QqEWoqFVDVlNH8qlgDrGghdWsQ0RpelQzVr3TMkQptB4vGBwSuOt2R7Tnf2gtb5G4 vgyA==
X-Gm-Message-State: AOAM531d1QPnie+EjeCn7J/XtS29ftb8Nsmd9zdGY/wVQDSvCmAwB52d afyJaDhszlzK1bB6Woy6KRK/62UpE2rfpxU4pqyaN0CGsIA=
X-Google-Smtp-Source: ABdhPJw3lYZSKaLvmHHkijwtvPJj1D97quI+I/UPu8btekWUKmPmh1iyvnQcctNwOgN0c+cwIEcfheqIVU+D0jDMEaI=
X-Received: by 2002:a1f:ac04:0:b0:32d:710:5930 with SMTP id v4-20020a1fac04000000b0032d07105930mr9726350vke.6.1647955294340; Tue, 22 Mar 2022 06:21:34 -0700 (PDT)
MIME-Version: 1.0
References: <164583895227.24617.1939040203283436909@ietfa.amsl.com> <5b97a678-eba1-09c3-7e70-c71dd98db8a9@sit.fraunhofer.de> <CAL02cgT7cRXsM7qNtMarcxcLd0fdSCtj_dM+79=DbnMWyikdhQ@mail.gmail.com>
In-Reply-To: <CAL02cgT7cRXsM7qNtMarcxcLd0fdSCtj_dM+79=DbnMWyikdhQ@mail.gmail.com>
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Date: Tue, 22 Mar 2022 09:20:58 -0400
Message-ID: <CAHbuEH6mrun0dF_zMTWUtG3zex3NjHhijYrcPpKOYxdkx=B3Kw@mail.gmail.com>
To: Richard Barnes <rlb@ipv.sx>
Cc: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>, scitt@ietf.org,  IETF SecDispatch <secdispatch@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000ecccdb05dace7de9"
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/kTCHXC5CNGG_3oiRVanJbo9JSRY>
Subject: Re: [SCITT] [Secdispatch] Request for session at IETF 113
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2022 13:21:45 -0000

--000000000000ecccdb05dace7de9
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Greetings,

I have some similar questions, and question the hard requirement for a DID.
It seems that there will be many use cases that would want a traditional
PKI like is used with SigStore for a higher level of assurance. Both a
traditional PKI and a distributed can use the distributed ledger.

I am aware of vendors looking at this solution, so there's support behind
it. They also want to make sure the right thing is done, hence it coming to
the IETF to get broad review.

I think on the signature part, it would be useful to also support PKI with
ACME and to see the client authentication methods supported as sigStore
uses a certificate (their flow is a little different from ACME at the
moment).

I also support this being developed in the IETF as it's an important
problem set and now has vendor traction due to requirements. I'd just like
to see support for traditional PKI and ACME for the certificates/keys.

I have to go through the document more closely as the problem set needs to
consider organizations and individuals in terms of scale as well. How will
this be managed? Will it be manageable and can it be architected to reduce
the distributed burden so that security just works (as opposed to needing
another million jobs to be filled that can't be filled).

It's an important problem and would benefit from the IETF review process
and openness to bring more vendors together than those who are already
participating.

Best regards,
Kathleen

On Tue, Mar 22, 2022 at 7:31 AM Richard Barnes <rlb@ipv.sx> wrote:

> Hi folks,
>
> It looks like at a high level, the approach here is along the same lines
> as what has been discussed as "Binary Transparency" elsewhere.  There hav=
e
> been several stabs taken at this before.  See, for example:
>
> https://www.sigstore.dev/
> https://unmitigatedrisk.com/?tag=3Dbinary-transparency
>
> https://github.com/FreeBSDFoundation/binary-transparency-notes/blob/maste=
r/debian.txt
> https://wiki.mozilla.org/Security/Binary_Transparency
>
> While these existing approaches do help validate that there is some
> interest in the field for what SCITT does, it's not clear how SCITT is
> different from / better than this prior art.
>
> --RLB
>
>
> On Wed, Mar 9, 2022 at 5:40 PM Henk Birkholz <
> henk.birkholz@sit.fraunhofer.de> wrote:
>
>> Hi secdispatch,
>> (hi scitt),
>>
>> emerging work on the topic of Supply Chain Integrity, Transparency,
>> Trust has taken some shape recently.
>>
>> The work combines existing IETF building blocks to facilitate useful
>> Internet-based support of global supply chain interoperability.
>>
>> Current contributions focus on the definition of Transparency Services
>> based on Internet technology (using CBOR/CDDL/COSE) to achieve
>> unambiguous, scaleable, and resilient integration with common devops and
>> secops requirements.
>>
>> I'd like to request secdispatch agenda time for two documents that are
>> currently submitted:
>>   > https://datatracker.ietf.org/doc/draft-birkholz-scitt-architecture/
>>
>> and
>>
>> > https://datatracker.ietf.org/doc/draft-birkholz-scitt-receipts/
>>
>> These two contributions are in -00 state. Yet, they already address
>> essential requirements, such as, air-gapped validation when being
>> offline, integration of remote attestation, efficient and crypto-agile
>> signing prescriptions for out-of-the-box interoperability, and - in
>> essence - long-long-term guarantees in support of various types of
>> supply chains requirements.
>>
>> We=E2=80=99d be happy to present this emerging work in secdispatch with =
the goal
>> of discussing whether it might fit into the IETF space and how to
>> progress it together.
>>
>> Viele Gr=C3=BC=C3=9Fe,
>>
>> Henk
>>
>>
>>
>> On 26.02.22 02:29, "IETF Secretariat" wrote:
>> > Dear Mohit Sethi,
>> >
>> > The session(s) that you have requested have been scheduled.
>> > Below is the scheduled session information followed by
>> > the original request.
>> >
>> >
>> >      secdispatch Session 1 (2:00 requested)
>> >      Tuesday, 22 March 2022, Afternoon Session II 1430-1630
>> >      Room Name: Grand Park Hall 3 size: 250
>> >      ---------------------------------------------
>> >
>> >
>> > iCalendar:
>> https://datatracker.ietf.org/meeting/113/sessions/secdispatch.ics
>> >
>> > Request Information:
>> >
>> >
>> > ---------------------------------------------------------
>> > Working Group Name: Security Dispatch
>> > Area Name: Security Area
>> > Session Requester: Mohit Sethi
>> >
>> >
>> > Number of Sessions: 1
>> > Length of Session(s):
>> > Number of Attendees: 200
>> > Conflicts to Avoid:
>> >
>> >
>> >
>> >
>> > People who must be present:
>> >    Benjamin Kaduk
>> >    Kathleen Moriarty
>> >    Mohit Sethi
>> >    Paul Wouters
>> >    Richard Barnes
>> >    Roman Danyliw
>> >
>> > Resources Requested:
>> >
>> > Special Requests:
>> >    Please avoid conflict with any Security related BoF.
>> > ---------------------------------------------------------
>> >
>> >
>> > _______________________________________________
>> > Secdispatch mailing list
>> > Secdispatch@ietf.org
>> > https://www.ietf.org/mailman/listinfo/secdispatch
>>
>> _______________________________________________
>> Secdispatch mailing list
>> Secdispatch@ietf.org
>> https://www.ietf.org/mailman/listinfo/secdispatch
>>
> _______________________________________________
> Secdispatch mailing list
> Secdispatch@ietf.org
> https://www.ietf.org/mailman/listinfo/secdispatch
>


--=20

Best regards,
Kathleen

--000000000000ecccdb05dace7de9
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Greetings,<div><br></div><div>I have some similar question=
s, and question the hard requirement for a DID. It seems that there will be=
 many use cases that would want a traditional PKI like is used with SigStor=
e for a higher level of assurance. Both a traditional PKI and a distributed=
 can use the distributed ledger.</div><div><br></div><div>I am aware of ven=
dors looking at this solution, so there&#39;s support behind it. They also =
want to make sure the right thing is done, hence it coming to the IETF to g=
et broad review.</div><div><br></div><div>I think on the signature part, it=
 would be useful to also support PKI with ACME and to see the client authen=
tication methods supported as sigStore uses a certificate (their flow is a =
little different from ACME at the moment).=C2=A0</div><div><br></div><div>I=
 also support this being developed in the=C2=A0IETF as it&#39;s an importan=
t problem set and now has vendor traction due to requirements. I&#39;d just=
 like to see support for traditional PKI and ACME for the certificates/keys=
.</div><div><br></div><div>I have to go through the document more closely a=
s the problem set needs to consider organizations and individuals in terms =
of scale as well. How will this be managed? Will it be manageable and can i=
t be architected to reduce the distributed burden so that security just wor=
ks (as opposed to needing another million jobs to be filled that can&#39;t =
be filled).</div><div><br></div><div>It&#39;s an important problem and woul=
d benefit from the=C2=A0IETF review process and openness to bring more vend=
ors together than those who are already participating.</div><div><br></div>=
<div>Best regards,</div><div>Kathleen</div></div><br><div class=3D"gmail_qu=
ote"><div dir=3D"ltr" class=3D"gmail_attr">On Tue, Mar 22, 2022 at 7:31 AM =
Richard Barnes &lt;<a href=3D"mailto:rlb@ipv.sx">rlb@ipv.sx</a>&gt; wrote:<=
br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8e=
x;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div dir=3D"ltr"=
><div>Hi folks,</div><div><br></div><div>It looks like at a high level, the=
 approach here is along the same lines as what has been discussed as &quot;=
Binary Transparency&quot; elsewhere.=C2=A0 There have been several stabs ta=
ken at this before.=C2=A0 See, for example:<br></div><div><br></div><div><a=
 href=3D"https://www.sigstore.dev/" target=3D"_blank">https://www.sigstore.=
dev/</a></div><div><a href=3D"https://unmitigatedrisk.com/?tag=3Dbinary-tra=
nsparency" target=3D"_blank">https://unmitigatedrisk.com/?tag=3Dbinary-tran=
sparency</a></div><div><a href=3D"https://github.com/FreeBSDFoundation/bina=
ry-transparency-notes/blob/master/debian.txt" target=3D"_blank">https://git=
hub.com/FreeBSDFoundation/binary-transparency-notes/blob/master/debian.txt<=
/a><br><a href=3D"https://wiki.mozilla.org/Security/Binary_Transparency" ta=
rget=3D"_blank">https://wiki.mozilla.org/Security/Binary_Transparency</a></=
div><div><br></div><div>While these existing approaches do help validate th=
at there is some interest in the field for what SCITT does, it&#39;s not cl=
ear how SCITT is different from / better than this prior art.</div><div><br=
></div><div>--RLB<br></div><div><br></div></div><br><div class=3D"gmail_quo=
te"><div dir=3D"ltr" class=3D"gmail_attr">On Wed, Mar 9, 2022 at 5:40 PM He=
nk Birkholz &lt;<a href=3D"mailto:henk.birkholz@sit.fraunhofer.de" target=
=3D"_blank">henk.birkholz@sit.fraunhofer.de</a>&gt; wrote:<br></div><blockq=
uote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1p=
x solid rgb(204,204,204);padding-left:1ex">Hi secdispatch,<br>
(hi scitt),<br>
<br>
emerging work on the topic of Supply Chain Integrity, Transparency, <br>
Trust has taken some shape recently.<br>
<br>
The work combines existing IETF building blocks to facilitate useful <br>
Internet-based support of global supply chain interoperability.<br>
<br>
Current contributions focus on the definition of Transparency Services <br>
based on Internet technology (using CBOR/CDDL/COSE) to achieve <br>
unambiguous, scaleable, and resilient integration with common devops and <b=
r>
secops requirements.<br>
<br>
I&#39;d like to request secdispatch agenda time for two documents that are =
<br>
currently submitted:<br>
=C2=A0 &gt; <a href=3D"https://datatracker.ietf.org/doc/draft-birkholz-scit=
t-architecture/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.i=
etf.org/doc/draft-birkholz-scitt-architecture/</a><br>
<br>
and<br>
<br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/draft-birkholz-scitt-recei=
pts/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/doc=
/draft-birkholz-scitt-receipts/</a><br>
<br>
These two contributions are in -00 state. Yet, they already address <br>
essential requirements, such as, air-gapped validation when being <br>
offline, integration of remote attestation, efficient and crypto-agile <br>
signing prescriptions for out-of-the-box interoperability, and - in <br>
essence - long-long-term guarantees in support of various types of <br>
supply chains requirements.<br>
<br>
We=E2=80=99d be happy to present this emerging work in secdispatch with the=
 goal <br>
of discussing whether it might fit into the IETF space and how to <br>
progress it together.<br>
<br>
Viele Gr=C3=BC=C3=9Fe,<br>
<br>
Henk<br>
<br>
<br>
<br>
On 26.02.22 02:29, &quot;IETF Secretariat&quot; wrote:<br>
&gt; Dear Mohit Sethi,<br>
&gt; <br>
&gt; The session(s) that you have requested have been scheduled.<br>
&gt; Below is the scheduled session information followed by<br>
&gt; the original request.<br>
&gt; <br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 secdispatch Session 1 (2:00 requested)<br>
&gt;=C2=A0 =C2=A0 =C2=A0 Tuesday, 22 March 2022, Afternoon Session II 1430-=
1630<br>
&gt;=C2=A0 =C2=A0 =C2=A0 Room Name: Grand Park Hall 3 size: 250<br>
&gt;=C2=A0 =C2=A0 =C2=A0 ---------------------------------------------<br>
&gt; <br>
&gt; <br>
&gt; iCalendar: <a href=3D"https://datatracker.ietf.org/meeting/113/session=
s/secdispatch.ics" rel=3D"noreferrer" target=3D"_blank">https://datatracker=
.ietf.org/meeting/113/sessions/secdispatch.ics</a><br>
&gt; <br>
&gt; Request Information:<br>
&gt; <br>
&gt; <br>
&gt; ---------------------------------------------------------<br>
&gt; Working Group Name: Security Dispatch<br>
&gt; Area Name: Security Area<br>
&gt; Session Requester: Mohit Sethi<br>
&gt; <br>
&gt; <br>
&gt; Number of Sessions: 1<br>
&gt; Length of Session(s):<br>
&gt; Number of Attendees: 200<br>
&gt; Conflicts to Avoid:<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0<br>
&gt; <br>
&gt; <br>
&gt; People who must be present:<br>
&gt;=C2=A0 =C2=A0 Benjamin Kaduk<br>
&gt;=C2=A0 =C2=A0 Kathleen Moriarty<br>
&gt;=C2=A0 =C2=A0 Mohit Sethi<br>
&gt;=C2=A0 =C2=A0 Paul Wouters<br>
&gt;=C2=A0 =C2=A0 Richard Barnes<br>
&gt;=C2=A0 =C2=A0 Roman Danyliw<br>
&gt; <br>
&gt; Resources Requested:<br>
&gt; <br>
&gt; Special Requests:<br>
&gt;=C2=A0 =C2=A0 Please avoid conflict with any Security related BoF.<br>
&gt; ---------------------------------------------------------<br>
&gt; <br>
&gt; <br>
&gt; _______________________________________________<br>
&gt; Secdispatch mailing list<br>
&gt; <a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank">Secdispatch@=
ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/secdispatch" rel=3D"n=
oreferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/secdispa=
tch</a><br>
<br>
_______________________________________________<br>
Secdispatch mailing list<br>
<a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank">Secdispatch@ietf.=
org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/secdispatch" rel=3D"norefe=
rrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/secdispatch</=
a><br>
</blockquote></div>
_______________________________________________<br>
Secdispatch mailing list<br>
<a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank">Secdispatch@ietf.=
org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/secdispatch" rel=3D"norefe=
rrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/secdispatch</=
a><br>
</blockquote></div><br clear=3D"all"><div><br></div>-- <br><div dir=3D"ltr"=
 class=3D"gmail_signature"><div dir=3D"ltr"><br><div>Best regards,</div><di=
v>Kathleen</div></div></div>

--000000000000ecccdb05dace7de9--


From nobody Tue Mar 22 06:24:04 2022
Return-Path: <antdl@microsoft.com>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4ABD43A13A5; Tue, 22 Mar 2022 06:23:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.01
X-Spam-Level: 
X-Spam-Status: No, score=-7.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id REzx8d_N2Y89; Tue, 22 Mar 2022 06:23:50 -0700 (PDT)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (mail-am5eur03on0723.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe08::723]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 74C3D3A12D2; Tue, 22 Mar 2022 06:23:49 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=CBlfGhA5N1JiWU/XL2pvFMm0gaPdnf8W1XPZBJ0h+NtvZbxZHdc6ecj53FYHwaus4et12k2j1O4e/2N+w/dsMw3mpWcwKuZIXPma94xwis2roL5lPlCh95hk+rdgSUCGQTEKwE86swHHNqLj2KUc0luvV+/UX2UobDvyYtrNRyvA/RX9cGMHkgoz7E459UFyvHl4d6Yr29EdUFFmdkVc7PSA4mMm0U7Z45kxTEMtw3riPWJGsTU7kqMshH8AtRBsELEJe3qtYCv8bukfkacVpU0ilrgA9Ojm6lU8KnM0JSMkFYMvZI+rM95yvt5veWsKTw69TbrksU4JPjPYnrIvwg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=N5xX3PaUdocRikhlzjOQpKo6wiZPnGfHligVU+xREYE=; b=KxqAt0bg+x7WU5okTDFqYKdeqdNtp4feb5aOdP1ZVlN1FT8kh6aVMpclICBCavieC2QYgnhCAhY0dSz3RBKzSyKp+tlU7psGtkgohsqL6dfV7k5/MY3soNzppayBS6lE0VXSNch3ZhMeGujKLWDaEJl9RL8JX9NoyMmKotcBfP8M7kRufwjWluefXqrC9vjTwZ6oMJuKlIL73Z1X0tGTRQpe3cmZMnAgz2rzXSN/XcUl0AK9MXeKxqdIyramlHVClyiZnyb8We3G5cKLio4ql2tTL/egWGe+VPyARaFOfs9fCCh+eHmIhsd5m0bf4jdX4Zo6Fl3vHfenBVEn8kAOPQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=N5xX3PaUdocRikhlzjOQpKo6wiZPnGfHligVU+xREYE=; b=NL9ghDRdTWzsVmuKZds7i5NjFAQKwqHF+6Y6AVD8Bw9tbQrHgT/7VZWcJ7S55IaC0pxYfisa4o4DB316/tqwALMiXZl4UMbdGlfxRIyCmf90corOMAxY5V56OfqXM67gvVsWwRDtE9GME0KPNBWm7qXcK+igFEjUITDXlPkMmrI=
Received: from AM5PR83MB0372.EURPRD83.prod.outlook.com (2603:10a6:206:25::13) by DB6PR83MB0182.EURPRD83.prod.outlook.com (2603:10a6:6:3f::31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5102.8; Tue, 22 Mar 2022 13:23:41 +0000
Received: from AM5PR83MB0372.EURPRD83.prod.outlook.com ([fe80::2522:e346:6a88:d4f]) by AM5PR83MB0372.EURPRD83.prod.outlook.com ([fe80::2522:e346:6a88:d4f%3]) with mapi id 15.20.5102.013; Tue, 22 Mar 2022 13:23:41 +0000
From: Antoine Delignat-Lavaud <antdl@microsoft.com>
To: Eric Rescorla <ekr@rtfm.com>, "Birkholz, Henk" <henk.birkholz@sit.fraunhofer.de>
CC: "scitt@ietf.org" <scitt@ietf.org>, IETF SecDispatch <secdispatch@ietf.org>
Thread-Topic: [EXTERNAL] Re: [SCITT] [Secdispatch] Request for session at IETF 113
Thread-Index: AQHYPXqyioJfvqpnjUmlgOPJi3YBoKzLYVvw
Date: Tue, 22 Mar 2022 13:23:41 +0000
Message-ID: <AM5PR83MB0372E1023BDDCFD13A0D0B2EB2179@AM5PR83MB0372.EURPRD83.prod.outlook.com>
References: <164583895227.24617.1939040203283436909@ietfa.amsl.com> <5b97a678-eba1-09c3-7e70-c71dd98db8a9@sit.fraunhofer.de> <CABcZeBMJgKPSyJ3Z1igS38fbgsp6R-FxVd193+CGsKJC2dchuA@mail.gmail.com>
In-Reply-To: <CABcZeBMJgKPSyJ3Z1igS38fbgsp6R-FxVd193+CGsKJC2dchuA@mail.gmail.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=ce69a1cf-bf12-41a6-88b0-4a951a3dd9b4; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2022-03-22T13:10:09Z;  MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47;
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b9c606d1-a2cc-4b93-3a6d-08da0c072ef3
x-ms-traffictypediagnostic: DB6PR83MB0182:EE_
x-ld-processed: 72f988bf-86f1-41af-91ab-2d7cd011db47,ExtAddr
x-ms-exchange-atpmessageproperties: SA|SL
x-microsoft-antispam-prvs: <DB6PR83MB0182DD9F48DAF5FC6F5BC880B2179@DB6PR83MB0182.EURPRD83.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:AM5PR83MB0372.EURPRD83.prod.outlook.com; PTR:; CAT:NONE;  SFS:(13230001)(4636009)(366004)(451199009)(55016003)(5660300002)(54906003)(110136005)(38070700005)(66574015)(186003)(52536014)(8990500004)(508600001)(966005)(10290500003)(53546011)(8936002)(86362001)(8676002)(2906002)(7696005)(4326008)(6506007)(82960400001)(82950400001)(66556008)(166002)(83380400001)(38100700002)(122000001)(9686003)(66946007)(64756008)(76116006)(66446008)(66476007)(71200400001)(316002)(33656002); DIR:OUT; SFP:1102; 
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?jCAX8xl3czeTUWYyZ4BpIvXC3inkW6jv8Hmx/5g/Jdrj+gLtkHLExtXevU?= =?iso-8859-1?Q?lfxVNn8if/I2JEEarzoFsQ5QGPmjMN5s007mzm+WOyfc7Aj4fFh0MGjRw7?= =?iso-8859-1?Q?9l6rPsWyRMPc7eMvzFKLDlodjvFt8xbYyFsVtLZ8ZZMg4AJ/QVQUmvbnnA?= =?iso-8859-1?Q?yccPFNxK5X6yjJjy1bQLxmN4cFqqA2ZsE3tF+deYboCe5I2aSVTMuq7RdL?= =?iso-8859-1?Q?bg5kqZkDB2pjXYRC7gBGQJiCsL2w/PWb1d1ymySKRnoE5nQVTrRsgEkKb7?= =?iso-8859-1?Q?aDTXGeT9YbRsmeh89ttc/ZJ5fHxOiiV0SwKpLkUeWQm5/UhLZmo4Ud8cw+?= =?iso-8859-1?Q?n5PF6iJq7HmxRn2xVacJrpRojW0Hv+g+VVWn4jYFB05Pm0Mg3S5AFgOtGU?= =?iso-8859-1?Q?NsrvuffLLwfvwpWJsrPDo5P6T5LxoZqX/bK2WFsVibwj1KJaNyAGUzFgy/?= =?iso-8859-1?Q?VD08E7vuXVbGsoJXmR3gdKrdULDEvPQE+wwn2Onc5BDqam/nhlbsIh8K03?= =?iso-8859-1?Q?/DCfR1GzsKWV13QG4fYi0TA0j84fS0AzZlhD6GnQVOXjokk6U7+nBXA776?= =?iso-8859-1?Q?S6UytaBNHdCqMgA2yi/RwRvNEfVWnTABnyRhSf2hQkntUfGrHP1/WGoNkI?= =?iso-8859-1?Q?Qb3ersU8ygvE179VLg9LgAqSDIoH4AUdoN6bnl1g5u8KdwufQEydQonlVs?= =?iso-8859-1?Q?Pb8HGk7JMBU/ZsQE/F1Fm1MRfE4Ewj7wQB3NhhdtF1OYpj3VbQuh5o0cjO?= =?iso-8859-1?Q?mzVT+HtEC0ofullr/T4s3y433WAillNW7SUR/PGUqIk1tSl0LqAq67smif?= =?iso-8859-1?Q?T6GRn1b5se3PXzsDzEOOqJA5RH5oy3kjYVz4RewMJ3N02H97ZDJRSsRhap?= =?iso-8859-1?Q?6R7nXf1BDOr8uftAe9fLxt+t+DfiD0N9yj0dIw5eRxwsyizgixizPgqaNe?= =?iso-8859-1?Q?I+nBEKCZKq7/1xGmeU+8E+0seFuGq3BNIivP63xMyVjEGfYnFedVsG355J?= =?iso-8859-1?Q?8DChBbYLmIatdfZGTalsyH5lMJV67lGThswPwiTY2zM9ZOxGVu3mHaCHYu?= =?iso-8859-1?Q?m0Iq6TVkYztwzCkc/rUZGFx/NOPIApHlbnNhE354iJ1rLsB5K05Ma1GW59?= =?iso-8859-1?Q?FWWY0Xjn6THsYhGftBBQ1eWRLNTQqzFYlFjVOmiycVWzoubn8dFgRZ3MNU?= =?iso-8859-1?Q?mv9zx3i4cOngUPPfn01KrbLSFYtE/NQ1M7yjPIOLXs2yJyAChFNkrU7sd3?= =?iso-8859-1?Q?mkVJwU2ZBJYAtDIceqLuNCK8ODwuVW/GV86kBFAj2wEuKHVkTwTHjI8N/y?= =?iso-8859-1?Q?lJ26N+ayIkSVUrAIucxwaKBSyDVExP4EpGi9cRcKih32LtBRSxE6ZbdLs0?= =?iso-8859-1?Q?eMmoJcR/GJAFYwcchHq/pjihkhOnFZ2gRsTyUSeox6Y8StIOsjdHWWD4kX?= =?iso-8859-1?Q?Ubc+riiw8jdYnzAYDs/zw5OU+YfDN488xPMJ8MFsQkYutsX8jT0JMhVkjF?= =?iso-8859-1?Q?0n/5kyPfy26ufusxOLpXutolXnVZyXwdfvDxLsZJLSTUETSk8M5ayKGkQX?= =?iso-8859-1?Q?lBk9tvE6wnwM3OPI2KheHReaFx11?=
Content-Type: multipart/alternative; boundary="_000_AM5PR83MB0372E1023BDDCFD13A0D0B2EB2179AM5PR83MB0372EURP_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: AM5PR83MB0372.EURPRD83.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b9c606d1-a2cc-4b93-3a6d-08da0c072ef3
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Mar 2022 13:23:41.6793 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: sqY/dvihmWVeuhUcKcONonLmGWDPZJmGtdjZbqpikien4EFsBkgh7EOfRm5Opuv0rTzrBvG3YekW8YWgyLeq+A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR83MB0182
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/l2oyG--QEnfzm8uanvp4OTivhQs>
Subject: Re: [SCITT] [EXTERNAL] Re: [Secdispatch] Request for session at IETF 113
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2022 13:23:56 -0000

--_000_AM5PR83MB0372E1023BDDCFD13A0D0B2EB2179AM5PR83MB0372EURP_
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Hi Ekr and thanks for your excellent technical comments.

Regarding (1) this is very much something to be aware of in deciding which =
DID schemes should be recommended by the standard. Generally you would expe=
ct that transparency services should prefer fully replayable/verifiable DID=
 resolution methods (and it is indeed quite hard to make did:web verifiable=
 with TLS 1.3 where all cipher suites are AEAD without using advanced verif=
iable computation crypto). It is not clear what choice would fit most binar=
y transparency users; maybe something based on DNSSEC could fit the bill, b=
ut at this point the question is open for comments.

(2) is a good argument, though unlike certificates there isn't an obvious u=
niversal mechanism to attach SCT to signed binaries. Receipts also have the=
 benefit to work with unsigned artifacts, which are a legitimate use in non=
-software supply chain. More is definitely achievable to integrate transpar=
ency into binary signing in the style of today's certs.

(3) is up for discussion but we would rather avoid a mess like pre-certs in=
 CT, such as commitments to artifacts that are not known at claim registrat=
ion. Note that related to the previous point the receipt is separate from t=
he artifact in SCITT so there should not be as much latency pressure as in =
CT, if the receipt is obtained asynchronously. However, getting more feedba=
ck from maintainers of existing binary transparency systems would be helpfu=
l.

Best,
Antoine

From: SCITT <scitt-bounces@ietf.org> On Behalf Of Eric Rescorla
Sent: 21 March 2022 23:22
To: Birkholz, Henk <henk.birkholz@sit.fraunhofer.de>
Cc: scitt@ietf.org; IETF SecDispatch <secdispatch@ietf.org>
Subject: [EXTERNAL] Re: [SCITT] [Secdispatch] Request for session at IETF 1=
13


OVERALL
This document describes a general structure for providing transparency
for  software artifacts, effectively a generalization of what's often
called "binary transparency". This is a useful kind of service in concept
an at least theoretically an appropriate topic for IETF.

The answer to the secdispatch questions depends, I think on the level
of interest people have in deploying such a service and especially
with this as a starting point. Specifically, we'd need to hear from:

- Software vendors
- Potential transparency service (log) operators.

I'd particularly like to hear from people who already are involved
with Binary Transparency: https://developers.google.com/android/binary_tran=
sparency<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%=
2Fdevelopers.google.com%2Fandroid%2Fbinary_transparency&data=3D04%7C01%7Can=
tdl%40microsoft.com%7C448f5c11a113497f9e7008da0b91d09a%7C72f988bf86f141af91=
ab2d7cd011db47%7C1%7C0%7C637835018189784163%7CUnknown%7CTWFpbGZsb3d8eyJWIjo=
iMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D=
KMKXKvlTYUbhmTgQY9AavdSEqFuJ1Lao%2F5eMyK9s5%2B4%3D&reserved=3D0>

If there is interest, I would be supportive of moving forward with
this. Given the complexity of the topic, a BOF is probably the next
step.


TECHNICAL
I do have a few small technical comments.

1. I'm still working through the semantics of the identities you are
   using. As I understand it, the signatures are intended to provide
   evidence that the vendor actually published something, but if you
   use did:web, then can't the vendor just use a different key for
   each signature and remove the key from the Web site later. What
   proof is there that the vendor endorsed a specific key?

2. I understand the appeal of the append only log, but I'd observe
   that much of the value in CT has been achieved without any real
   verification by clients of the inclusion proofs but just relying
   entirely on SCTs. So, perhaps we don't need to try as hard
   here. This point applies to BT as well, I think.

3. S 6.3 seems to require the claim to be appended to the log prior to
   issuing the receipt. This is not how CT is architected, as I
   understand it because of concerns about the latency of that
   process. Instead, certificates have SCTs. Do similar concerns
   apply here?

I'm sure all of these could be addressed during the standards process,
and they certainly don't preclude doing this work, but I noted them
as I read the document and thought it would be good to record them.








On Wed, Mar 9, 2022 at 2:40 PM Henk Birkholz <henk.birkholz@sit.fraunhofer.=
de<mailto:henk.birkholz@sit.fraunhofer.de>> wrote:
Hi secdispatch,
(hi scitt),

emerging work on the topic of Supply Chain Integrity, Transparency,
Trust has taken some shape recently.

The work combines existing IETF building blocks to facilitate useful
Internet-based support of global supply chain interoperability.

Current contributions focus on the definition of Transparency Services
based on Internet technology (using CBOR/CDDL/COSE) to achieve
unambiguous, scaleable, and resilient integration with common devops and
secops requirements.

I'd like to request secdispatch agenda time for two documents that are
currently submitted:
  > https://datatracker.ietf.org/doc/draft-birkholz-scitt-architecture/<htt=
ps://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdatatracke=
r.ietf.org%2Fdoc%2Fdraft-birkholz-scitt-architecture%2F&data=3D04%7C01%7Can=
tdl%40microsoft.com%7C448f5c11a113497f9e7008da0b91d09a%7C72f988bf86f141af91=
ab2d7cd011db47%7C1%7C0%7C637835018189784163%7CUnknown%7CTWFpbGZsb3d8eyJWIjo=
iMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3D=
kYB%2BZyzNWT2BvRNewYHBYJANYh3WQsPbYzowoEeMV%2FI%3D&reserved=3D0>

and

> https://datatracker.ietf.org/doc/draft-birkholz-scitt-receipts/<https://n=
am06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdatatracker.ietf=
.org%2Fdoc%2Fdraft-birkholz-scitt-receipts%2F&data=3D04%7C01%7Cantdl%40micr=
osoft.com%7C448f5c11a113497f9e7008da0b91d09a%7C72f988bf86f141af91ab2d7cd011=
db47%7C1%7C0%7C637835018189784163%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwM=
DAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DiyQcUeZ%2B=
buzW%2FUncjOIPndC%2Fr9%2FILP%2FzNh2hqiu5ndI%3D&reserved=3D0>

These two contributions are in -00 state. Yet, they already address
essential requirements, such as, air-gapped validation when being
offline, integration of remote attestation, efficient and crypto-agile
signing prescriptions for out-of-the-box interoperability, and - in
essence - long-long-term guarantees in support of various types of
supply chains requirements.

We'd be happy to present this emerging work in secdispatch with the goal
of discussing whether it might fit into the IETF space and how to
progress it together.

Viele Gr=FC=DFe,

Henk



On 26.02.22 02:29, "IETF Secretariat" wrote:
> Dear Mohit Sethi,
>
> The session(s) that you have requested have been scheduled.
> Below is the scheduled session information followed by
> the original request.
>
>
>      secdispatch Session 1 (2:00 requested)
>      Tuesday, 22 March 2022, Afternoon Session II 1430-1630
>      Room Name: Grand Park Hall 3 size: 250
>      ---------------------------------------------
>
>
> iCalendar: https://datatracker.ietf.org/meeting/113/sessions/secdispatch.=
ics<https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fdat=
atracker.ietf.org%2Fmeeting%2F113%2Fsessions%2Fsecdispatch.ics&data=3D04%7C=
01%7Cantdl%40microsoft.com%7C448f5c11a113497f9e7008da0b91d09a%7C72f988bf86f=
141af91ab2d7cd011db47%7C1%7C0%7C637835018189784163%7CUnknown%7CTWFpbGZsb3d8=
eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&s=
data=3DCfvI4TXyDkZcBgkRYsI6jI6BYwTNre0wRCBmUCf1A8o%3D&reserved=3D0>
>
> Request Information:
>
>
> ---------------------------------------------------------
> Working Group Name: Security Dispatch
> Area Name: Security Area
> Session Requester: Mohit Sethi
>
>
> Number of Sessions: 1
> Length of Session(s):
> Number of Attendees: 200
> Conflicts to Avoid:
>
>
>
>
> People who must be present:
>    Benjamin Kaduk
>    Kathleen Moriarty
>    Mohit Sethi
>    Paul Wouters
>    Richard Barnes
>    Roman Danyliw
>
> Resources Requested:
>
> Special Requests:
>    Please avoid conflict with any Security related BoF.
> ---------------------------------------------------------
>
>
> _______________________________________________
> Secdispatch mailing list
> Secdispatch@ietf.org<mailto:Secdispatch@ietf.org>
> https://www.ietf.org/mailman/listinfo/secdispatch<https://nam06.safelinks=
.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.ietf.org%2Fmailman%2Flisti=
nfo%2Fsecdispatch&data=3D04%7C01%7Cantdl%40microsoft.com%7C448f5c11a113497f=
9e7008da0b91d09a%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378350181897=
84163%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6I=
k1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DcP73pgYaZFajY9JxODBB6YSIiEHTlNddKunfEZ=
HS7ZE%3D&reserved=3D0>

_______________________________________________
Secdispatch mailing list
Secdispatch@ietf.org<mailto:Secdispatch@ietf.org>
https://www.ietf.org/mailman/listinfo/secdispatch<https://nam06.safelinks.p=
rotection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinf=
o%2Fsecdispatch&data=3D04%7C01%7Cantdl%40microsoft.com%7C448f5c11a113497f9e=
7008da0b91d09a%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637835018189784=
163%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1=
haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DcP73pgYaZFajY9JxODBB6YSIiEHTlNddKunfEZHS=
7ZE%3D&reserved=3D0>

--_000_AM5PR83MB0372E1023BDDCFD13A0D0B2EB2179AM5PR83MB0372EURP_
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Diso-8859-=
1">
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0cm;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-family:"Calibri",sans-serif;
	mso-fareast-language:EN-US;}
@page WordSection1
	{size:612.0pt 792.0pt;
	margin:72.0pt 72.0pt 72.0pt 72.0pt;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-GB" link=3D"blue" vlink=3D"purple" style=3D"word-wrap:brea=
k-word">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"mso-fareast-language:EN-US">Hi Ekr an=
d thanks for your excellent technical comments.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"mso-fareast-language:EN-US"><o:p>&nbs=
p;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"mso-fareast-language:EN-US">Regarding=
 (1) this is very much something to be aware of in deciding which DID schem=
es should be recommended by the standard. Generally you would expect that t=
ransparency services should prefer fully
 replayable/verifiable DID resolution methods (and it is indeed quite hard =
to make did:web verifiable with TLS 1.3 where all cipher suites are AEAD wi=
thout using advanced verifiable computation crypto). It is not clear what c=
hoice would fit most binary transparency
 users; maybe something based on DNSSEC could fit the bill, but at this poi=
nt the question is open for comments.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"mso-fareast-language:EN-US"><o:p>&nbs=
p;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"mso-fareast-language:EN-US">(2) is a =
good argument, though unlike certificates there isn&#8217;t an obvious univ=
ersal mechanism to attach SCT to signed binaries. Receipts also have the be=
nefit to work with unsigned artifacts, which
 are a legitimate use in non-software supply chain. More is definitely achi=
evable to integrate transparency into binary signing in the style of today&=
#8217;s certs.
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"mso-fareast-language:EN-US"><o:p>&nbs=
p;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"mso-fareast-language:EN-US">(3) is up=
 for discussion but we would rather avoid a mess like pre-certs in CT, such=
 as commitments to artifacts that are not known at claim registration. Note=
 that related to the previous point
 the receipt is separate from the artifact in SCITT so there should not be =
as much latency pressure as in CT, if the receipt is obtained asynchronousl=
y. However, getting more feedback from maintainers of existing binary trans=
parency systems would be helpful.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"mso-fareast-language:EN-US"><o:p>&nbs=
p;</o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"mso-fareast-language:EN-US">Best,<o:p=
></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"mso-fareast-language:EN-US">Antoine<o=
:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"mso-fareast-language:EN-US"><o:p>&nbs=
p;</o:p></span></p>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0cm =
0cm 0cm">
<p class=3D"MsoNormal"><b><span lang=3D"EN-US">From:</span></b><span lang=
=3D"EN-US"> SCITT &lt;scitt-bounces@ietf.org&gt;
<b>On Behalf Of </b>Eric Rescorla<br>
<b>Sent:</b> 21 March 2022 23:22<br>
<b>To:</b> Birkholz, Henk &lt;henk.birkholz@sit.fraunhofer.de&gt;<br>
<b>Cc:</b> scitt@ietf.org; IETF SecDispatch &lt;secdispatch@ietf.org&gt;<br=
>
<b>Subject:</b> [EXTERNAL] Re: [SCITT] [Secdispatch] Request for session at=
 IETF 113<o:p></o:p></span></p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
OVERALL<br>
This document describes a general structure for providing transparency<br>
for &nbsp;software artifacts, effectively a generalization of what's often<=
br>
called &quot;binary transparency&quot;. This is a useful kind of service in=
 concept<br>
an at least theoretically an appropriate topic for IETF.<br>
<br>
The answer to the secdispatch questions depends, I think on the level<br>
of interest people have in deploying such a service and especially<br>
with this as a starting point. Specifically, we'd need to hear from:<br>
<br>
- Software vendors<br>
- Potential transparency service (log) operators.<br>
<br>
I'd particularly like to hear from people who already are involved<br>
with Binary Transparency: <a href=3D"https://nam06.safelinks.protection.out=
look.com/?url=3Dhttps%3A%2F%2Fdevelopers.google.com%2Fandroid%2Fbinary_tran=
sparency&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7C448f5c11a113497f9e700=
8da0b91d09a%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637835018189784163=
%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haW=
wiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DKMKXKvlTYUbhmTgQY9AavdSEqFuJ1Lao%2F5eMy=
K9s5%2B4%3D&amp;reserved=3D0">
https://developers.google.com/android/binary_transparency</a><br>
<br>
If there is interest, I would be supportive of moving forward with<br>
this. Given the complexity of the topic, a BOF is probably the next<br>
step.<br>
<br>
<br>
TECHNICAL<br>
I do have a few small technical comments.<br>
<br>
1. I'm still working through the semantics of the identities you are<br>
&nbsp; &nbsp;using. As I understand it, the signatures are intended to prov=
ide<br>
&nbsp; &nbsp;evidence that the vendor actually published something, but if =
you<br>
&nbsp; &nbsp;use did:web, then can't the vendor just use a different key fo=
r<br>
&nbsp; &nbsp;each signature and remove the key from the Web site later. Wha=
t<br>
&nbsp; &nbsp;proof is there that the vendor endorsed a specific key?<br>
<br>
2. I understand the appeal of the append only log, but I'd observe<br>
&nbsp; &nbsp;that much of the value in CT has been achieved without any rea=
l<br>
&nbsp; &nbsp;verification by clients of the inclusion proofs but just relyi=
ng<br>
&nbsp; &nbsp;entirely on SCTs. So, perhaps we don't need to try as hard<br>
&nbsp; &nbsp;here. This point applies to BT as well, I think.<br>
<br>
3. S 6.3 seems to require the claim to be appended to the log prior to<br>
&nbsp; &nbsp;issuing the receipt. This is not how CT is architected, as I<b=
r>
&nbsp; &nbsp;understand it because of concerns about the latency of that<br=
>
&nbsp; &nbsp;process. Instead, certificates have SCTs. Do similar concerns<=
br>
&nbsp; &nbsp;apply here?<br>
<br>
I'm sure all of these could be addressed during the standards process,<br>
and they certainly don't preclude doing this work, but I noted them<br>
as I read the document and thought it would be good to record them. <br>
<br>
&nbsp; <br>
<br>
&nbsp; <br>
<br>
<br>
<br>
<o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal">On Wed, Mar 9, 2022 at 2:40 PM Henk Birkholz &lt;<a =
href=3D"mailto:henk.birkholz@sit.fraunhofer.de">henk.birkholz@sit.fraunhofe=
r.de</a>&gt; wrote:<o:p></o:p></p>
</div>
<blockquote style=3D"border:none;border-left:solid #CCCCCC 1.0pt;padding:0c=
m 0cm 0cm 6.0pt;margin-left:4.8pt;margin-right:0cm">
<p class=3D"MsoNormal">Hi secdispatch,<br>
(hi scitt),<br>
<br>
emerging work on the topic of Supply Chain Integrity, Transparency, <br>
Trust has taken some shape recently.<br>
<br>
The work combines existing IETF building blocks to facilitate useful <br>
Internet-based support of global supply chain interoperability.<br>
<br>
Current contributions focus on the definition of Transparency Services <br>
based on Internet technology (using CBOR/CDDL/COSE) to achieve <br>
unambiguous, scaleable, and resilient integration with common devops and <b=
r>
secops requirements.<br>
<br>
I'd like to request secdispatch agenda time for two documents that are <br>
currently submitted:<br>
&nbsp; &gt; <a href=3D"https://nam06.safelinks.protection.outlook.com/?url=
=3Dhttps%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-birkholz-scitt-architec=
ture%2F&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7C448f5c11a113497f9e7008=
da0b91d09a%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637835018189784163%=
7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWw=
iLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DkYB%2BZyzNWT2BvRNewYHBYJANYh3WQsPbYzowoE=
eMV%2FI%3D&amp;reserved=3D0" target=3D"_blank">
https://datatracker.ietf.org/doc/draft-birkholz-scitt-architecture/</a><br>
<br>
and<br>
<br>
&gt; <a href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps=
%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fdraft-birkholz-scitt-receipts%2F&amp;=
data=3D04%7C01%7Cantdl%40microsoft.com%7C448f5c11a113497f9e7008da0b91d09a%7=
C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637835018189784163%7CUnknown%7C=
TWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0=
%3D%7C3000&amp;sdata=3DiyQcUeZ%2BbuzW%2FUncjOIPndC%2Fr9%2FILP%2FzNh2hqiu5nd=
I%3D&amp;reserved=3D0" target=3D"_blank">
https://datatracker.ietf.org/doc/draft-birkholz-scitt-receipts/</a><br>
<br>
These two contributions are in -00 state. Yet, they already address <br>
essential requirements, such as, air-gapped validation when being <br>
offline, integration of remote attestation, efficient and crypto-agile <br>
signing prescriptions for out-of-the-box interoperability, and - in <br>
essence - long-long-term guarantees in support of various types of <br>
supply chains requirements.<br>
<br>
We&#8217;d be happy to present this emerging work in secdispatch with the g=
oal <br>
of discussing whether it might fit into the IETF space and how to <br>
progress it together.<br>
<br>
Viele Gr=FC=DFe,<br>
<br>
Henk<br>
<br>
<br>
<br>
On 26.02.22 02:29, &quot;IETF Secretariat&quot; wrote:<br>
&gt; Dear Mohit Sethi,<br>
&gt; <br>
&gt; The session(s) that you have requested have been scheduled.<br>
&gt; Below is the scheduled session information followed by<br>
&gt; the original request.<br>
&gt; <br>
&gt; <br>
&gt;&nbsp; &nbsp; &nbsp; secdispatch Session 1 (2:00 requested)<br>
&gt;&nbsp; &nbsp; &nbsp; Tuesday, 22 March 2022, Afternoon Session II 1430-=
1630<br>
&gt;&nbsp; &nbsp; &nbsp; Room Name: Grand Park Hall 3 size: 250<br>
&gt;&nbsp; &nbsp; &nbsp; ---------------------------------------------<br>
&gt; <br>
&gt; <br>
&gt; iCalendar: <a href=3D"https://nam06.safelinks.protection.outlook.com/?=
url=3Dhttps%3A%2F%2Fdatatracker.ietf.org%2Fmeeting%2F113%2Fsessions%2Fsecdi=
spatch.ics&amp;data=3D04%7C01%7Cantdl%40microsoft.com%7C448f5c11a113497f9e7=
008da0b91d09a%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378350181897841=
63%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1h=
aWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=3DCfvI4TXyDkZcBgkRYsI6jI6BYwTNre0wRCBmU=
Cf1A8o%3D&amp;reserved=3D0" target=3D"_blank">
https://datatracker.ietf.org/meeting/113/sessions/secdispatch.ics</a><br>
&gt; <br>
&gt; Request Information:<br>
&gt; <br>
&gt; <br>
&gt; ---------------------------------------------------------<br>
&gt; Working Group Name: Security Dispatch<br>
&gt; Area Name: Security Area<br>
&gt; Session Requester: Mohit Sethi<br>
&gt; <br>
&gt; <br>
&gt; Number of Sessions: 1<br>
&gt; Length of Session(s):<br>
&gt; Number of Attendees: 200<br>
&gt; Conflicts to Avoid:<br>
&gt; <br>
&gt;&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<br>
&gt; <br>
&gt; <br>
&gt; People who must be present:<br>
&gt;&nbsp; &nbsp; Benjamin Kaduk<br>
&gt;&nbsp; &nbsp; Kathleen Moriarty<br>
&gt;&nbsp; &nbsp; Mohit Sethi<br>
&gt;&nbsp; &nbsp; Paul Wouters<br>
&gt;&nbsp; &nbsp; Richard Barnes<br>
&gt;&nbsp; &nbsp; Roman Danyliw<br>
&gt; <br>
&gt; Resources Requested:<br>
&gt; <br>
&gt; Special Requests:<br>
&gt;&nbsp; &nbsp; Please avoid conflict with any Security related BoF.<br>
&gt; ---------------------------------------------------------<br>
&gt; <br>
&gt; <br>
&gt; _______________________________________________<br>
&gt; Secdispatch mailing list<br>
&gt; <a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank">Secdispatch@=
ietf.org</a><br>
&gt; <a href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps=
%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fsecdispatch&amp;data=3D04%7C01=
%7Cantdl%40microsoft.com%7C448f5c11a113497f9e7008da0b91d09a%7C72f988bf86f14=
1af91ab2d7cd011db47%7C1%7C0%7C637835018189784163%7CUnknown%7CTWFpbGZsb3d8ey=
JWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp=
;sdata=3DcP73pgYaZFajY9JxODBB6YSIiEHTlNddKunfEZHS7ZE%3D&amp;reserved=3D0" t=
arget=3D"_blank">
https://www.ietf.org/mailman/listinfo/secdispatch</a><br>
<br>
_______________________________________________<br>
Secdispatch mailing list<br>
<a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank">Secdispatch@ietf.=
org</a><br>
<a href=3D"https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2=
F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fsecdispatch&amp;data=3D04%7C01%7Can=
tdl%40microsoft.com%7C448f5c11a113497f9e7008da0b91d09a%7C72f988bf86f141af91=
ab2d7cd011db47%7C1%7C0%7C637835018189784163%7CUnknown%7CTWFpbGZsb3d8eyJWIjo=
iMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdat=
a=3DcP73pgYaZFajY9JxODBB6YSIiEHTlNddKunfEZHS7ZE%3D&amp;reserved=3D0" target=
=3D"_blank">https://www.ietf.org/mailman/listinfo/secdispatch</a><o:p></o:p=
></p>
</blockquote>
</div>
</div>
</body>
</html>

--_000_AM5PR83MB0372E1023BDDCFD13A0D0B2EB2179AM5PR83MB0372EURP_--


From nobody Tue Mar 22 06:27:21 2022
Return-Path: <inacio@cert.org>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F0A0E3A1399; Tue, 22 Mar 2022 06:27:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.909
X-Spam-Level: 
X-Spam-Status: No, score=-1.909 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_BLOCKED=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=seicmu.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uK5Tx5Limd7M; Tue, 22 Mar 2022 06:27:01 -0700 (PDT)
Received: from USG02-BN3-obe.outbound.protection.office365.us (mail-bn3usg02on0134.outbound.protection.office365.us [23.103.208.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 711D43A1423; Tue, 22 Mar 2022 06:26:31 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector5401; d=microsoft.com; cv=none; b=dLcDPMlaTwGN8x6glaSnNZ7xTDddF8t5a2ou8gbv1jyOGrcR7sPAtjMNpdrzAmYM882ojP80QMYpmgF0JTnLx819Z54BH+bQt9PDABOqbtHdEc6RgNeZtbxQdnYyt8cyaB1TBDY0s7tH4QNoIlzJQl0gAO9T1OOdqLbse0ZtWVN4GbxhlH1mNpG2otIeE6SK0C2L3cEZ42F5b9OwN+zbn5RfCULsLYcierBW0Ed7TZTP+99IlMz9bi7lnjZeaPaz5ypuLvyoX7ZlVs50OeW+6b2T//5KOCthYvFvcURRVzrpmq0aOe2yavCu2+MDS2IZj/RXlepY7X4JhoszmUcK9A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector5401; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=H9lKIctZzoKcVgoGSCXVduY7p1Yp6zZdqog/wSkvA9k=; b=l3vB9YIh0JBWdnpcQV7giZ20ipGIG8Zh832MyXf2RmaaIBa1Dj9XYyBFPVocRHXfd8EYUI/x2EHZfnHNAUGvn0cTUIBGnmxgLb2ancDzAMAibsFqwU5Erl75kzsyEm3SsNNdQV8irx1vaTGZFLmAsFxGcV6p47VjiiEFrQrvaVGD8odGqY/PoaclV74+70OxrDryAZybVAULcDlTLv8jynAbLacrzdKJgMfFGBLVIQEZu3P2pm+OnIY0WjXOJCbQm1TjJr4Z91kmCLu+/XYvGVI39J63sK9P2nxbN3JY96r+Uy/QErraSr4uLB7XyZ1WJ1UUZY3g7cwUahiZRei/Kw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cert.org; dmarc=pass action=none header.from=cert.org; dkim=pass header.d=cert.org; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=seicmu.onmicrosoft.com; s=selector1-seicmu-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=H9lKIctZzoKcVgoGSCXVduY7p1Yp6zZdqog/wSkvA9k=; b=JDGA6xgQVCA34vbliaCwpoHQ/5Eni+7XLq/0d5+H/aI/02P5AE6mv2T/xknFeDUeiDRR+sAchJvOCW9ORqKsev763dPBpoKJ7Axoz8DYC8DN6fyAibe0j7eTNjZNG4stADA/7Oo/gPd/k0bcsaN1LqSP8JAEPdZRfoN2iQLBfd4=
Received: from PH1P110MB1113.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:175::13) by PH1P110MB1539.NAMP110.PROD.OUTLOOK.COM (2001:489a:200:18b::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5061.24; Tue, 22 Mar 2022 13:26:28 +0000
Received: from PH1P110MB1113.NAMP110.PROD.OUTLOOK.COM ([fe80::c5f4:c8f2:21db:48d7]) by PH1P110MB1113.NAMP110.PROD.OUTLOOK.COM ([fe80::c5f4:c8f2:21db:48d7%5]) with mapi id 15.20.5061.024; Tue, 22 Mar 2022 13:26:28 +0000
From: Chris Inacio <inacio@cert.org>
To: "secdispatch@ietf.org" <secdispatch@ietf.org>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>, "scitt@ietf.org" <scitt@ietf.org>
Thread-Topic: [Secdispatch] Request for session at IETF 113
Thread-Index: AQHYNAaiJ6edOPtaskuVlnXrwcl3xazLeMoA
Date: Tue, 22 Mar 2022 13:26:28 +0000
Message-ID: <etPan.6239ce83.43b93aee.b2ea@cert.org>
References: <164583895227.24617.1939040203283436909@ietfa.amsl.com> <5b97a678-eba1-09c3-7e70-c71dd98db8a9@sit.fraunhofer.de>
In-Reply-To: <5b97a678-eba1-09c3-7e70-c71dd98db8a9@sit.fraunhofer.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cert.org;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 76547828-af8a-48ad-5be4-08da0c079212
x-ms-traffictypediagnostic: PH1P110MB1539:EE_
x-microsoft-antispam-prvs: <PH1P110MB15398FFB3FE266AFDEE6A610AD179@PH1P110MB1539.NAMP110.PROD.OUTLOOK.COM>
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:PH1P110MB1113.NAMP110.PROD.OUTLOOK.COM; PTR:; CAT:NONE;  SFS:(13230001)(366004)(110136005)(966005)(508600001)(122000001)(6486002)(5660300002)(38100700002)(71200400001)(66476007)(66556008)(8936002)(2906002)(76116006)(64756008)(66446008)(66946007)(8676002)(66574015)(82960400001)(6506007)(53546011)(86362001)(38070700005)(36756003)(6512007)(83380400001)(2616005)(186003)(26005)(316002); DIR:OUT; SFP:1102; 
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 5L9HM9pfZnJD7e0XAdcNfpm/bT0BtzLYdvsvEtQgkfzbNKXdHTe8vCbfKfadTKOtMd79L7SCKCPA7CEiPOJ666hC5b5gc2I4AewQi45Q1pe78ksMSvjQTcpjNWO1bf18pd7yOq0RwMjWHMaukWDBDg==
Content-Type: text/plain; charset="utf-8"
Content-ID: <24C8A3BE7898694CAF98DED70721A912@NAMP110.PROD.OUTLOOK.COM>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: cert.org
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH1P110MB1113.NAMP110.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 76547828-af8a-48ad-5be4-08da0c079212
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Mar 2022 13:26:28.0390 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 95a9dce2-04f2-4043-995d-1ec3861911c6
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH1P110MB1539
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/mFXfRDdZyal4qm6dusyZIJKY4tQ>
Subject: Re: [SCITT] [Secdispatch] Request for session at IETF 113
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2022 13:27:15 -0000

SGVuaywNCg0KSnVzdCBhIHF1aWNrIGNvbW1lbnQgYmVmb3JlIHRoZSBzdGFydCBvZiB0aGUgYWN0
dWFsIFNFQ0RJU1BBVENIIHNlc3Npb246IHNpZ25pbmcgYW4gTUwgYWxnb3JpdGhtIGlzbuKAmXQg
YWxsIHRoYXQgaW50ZXJlc3RpbmcsIF9tYXliZV8gc2lnbmluZyB0aGUgbW9kZWwgaXMgYSBiaXQg
bW9yZSBpbnRlcmVzdGluZy4gwqBXaGF04oCZcyByZWFsbHkgaW50ZXJlc3RpbmcgaXMgdGhlIGRh
dGEgdXNlZCB0byBjcmVhdGUgdGhlIG1vZGVsLCBhbmQgdGhhdCBpcyB3aGVyZSBhIGxvdCBvZiB3
b3JrIGluIGFkdmVyc2FyaWFsIEFJIGhhcHBlbnMuIMKgQnV0IHRoZXkgZG9u4oCZdCBjYWxsIGl0
IGJpZyBkYXRhIGZvciBub3RoaW5nLCBhbmQgSeKAmW0gbm90IHN1cmUgdGhlIGxvZ2lzdGljcyBv
ZiB0cmFuc3BhcmVudCAoYmlnKSBkYXRhLCBvciB0aGUgcHJpdmFjeSBpbXBhY3Qgb2YgdGhhdCBh
cmUgcmVhc29uYWJsZS4NCg0KU28gbWF5YmUgYSBkaWZmZXJlbnQgZXhhbXBsZSBtYXkgYmUgYXBw
cm9wcmlhdGUuDQoNCg0KLS0NCkNocmlzIEluYWNpbw0KaW5hY2lvQGNlcnQub3JnDQoNCi0tLS0t
T3JpZ2luYWwgTWVzc2FnZS0tLS0tDQpGcm9tOsKgSGVuayBCaXJraG9seiA8aGVuay5iaXJraG9s
ekBzaXQuZnJhdW5ob2Zlci5kZT4NCkRhdGU6wqBNYXJjaCA5LCAyMDIyIGF0IDU6NDA6MTEgUE0N
ClRvOsKgc2VjZGlzcGF0Y2hAaWV0Zi5vcmcgPHNlY2Rpc3BhdGNoQGlldGYub3JnPiwgc2NpdHRA
aWV0Zi5vcmcgPHNjaXR0QGlldGYub3JnPg0KU3ViamVjdDrCoCBbU2VjZGlzcGF0Y2hdIFJlcXVl
c3QgZm9yIHNlc3Npb24gYXQgSUVURiAxMTMNCg0KPiBIaSBzZWNkaXNwYXRjaCwNCj4gKGhpIHNj
aXR0KSwNCj4gIA0KPiBlbWVyZ2luZyB3b3JrIG9uIHRoZSB0b3BpYyBvZiBTdXBwbHkgQ2hhaW4g
SW50ZWdyaXR5LCBUcmFuc3BhcmVuY3ksDQo+IFRydXN0IGhhcyB0YWtlbiBzb21lIHNoYXBlIHJl
Y2VudGx5Lg0KPiAgDQo+IFRoZSB3b3JrIGNvbWJpbmVzIGV4aXN0aW5nIElFVEYgYnVpbGRpbmcg
YmxvY2tzIHRvIGZhY2lsaXRhdGUgdXNlZnVsDQo+IEludGVybmV0LWJhc2VkIHN1cHBvcnQgb2Yg
Z2xvYmFsIHN1cHBseSBjaGFpbiBpbnRlcm9wZXJhYmlsaXR5Lg0KPiAgDQo+IEN1cnJlbnQgY29u
dHJpYnV0aW9ucyBmb2N1cyBvbiB0aGUgZGVmaW5pdGlvbiBvZiBUcmFuc3BhcmVuY3kgU2Vydmlj
ZXMNCj4gYmFzZWQgb24gSW50ZXJuZXQgdGVjaG5vbG9neSAodXNpbmcgQ0JPUi9DRERML0NPU0Up
IHRvIGFjaGlldmUNCj4gdW5hbWJpZ3VvdXMsIHNjYWxlYWJsZSwgYW5kIHJlc2lsaWVudCBpbnRl
Z3JhdGlvbiB3aXRoIGNvbW1vbiBkZXZvcHMgYW5kDQo+IHNlY29wcyByZXF1aXJlbWVudHMuDQo+
ICANCj4gSSdkIGxpa2UgdG8gcmVxdWVzdCBzZWNkaXNwYXRjaCBhZ2VuZGEgdGltZSBmb3IgdHdv
IGRvY3VtZW50cyB0aGF0IGFyZQ0KPiBjdXJyZW50bHkgc3VibWl0dGVkOg0KPiA+IGh0dHBzOi8v
ZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LWJpcmtob2x6LXNjaXR0LWFyY2hpdGVjdHVy
ZS8NCj4gIA0KPiBhbmQNCj4gIA0KPiA+IGh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9j
L2RyYWZ0LWJpcmtob2x6LXNjaXR0LXJlY2VpcHRzLw0KPiAgDQo+IFRoZXNlIHR3byBjb250cmli
dXRpb25zIGFyZSBpbiAtMDAgc3RhdGUuIFlldCwgdGhleSBhbHJlYWR5IGFkZHJlc3MNCj4gZXNz
ZW50aWFsIHJlcXVpcmVtZW50cywgc3VjaCBhcywgYWlyLWdhcHBlZCB2YWxpZGF0aW9uIHdoZW4g
YmVpbmcNCj4gb2ZmbGluZSwgaW50ZWdyYXRpb24gb2YgcmVtb3RlIGF0dGVzdGF0aW9uLCBlZmZp
Y2llbnQgYW5kIGNyeXB0by1hZ2lsZQ0KPiBzaWduaW5nIHByZXNjcmlwdGlvbnMgZm9yIG91dC1v
Zi10aGUtYm94IGludGVyb3BlcmFiaWxpdHksIGFuZCAtIGluDQo+IGVzc2VuY2UgLSBsb25nLWxv
bmctdGVybSBndWFyYW50ZWVzIGluIHN1cHBvcnQgb2YgdmFyaW91cyB0eXBlcyBvZg0KPiBzdXBw
bHkgY2hhaW5zIHJlcXVpcmVtZW50cy4NCj4gIA0KPiBXZeKAmWQgYmUgaGFwcHkgdG8gcHJlc2Vu
dCB0aGlzIGVtZXJnaW5nIHdvcmsgaW4gc2VjZGlzcGF0Y2ggd2l0aCB0aGUgZ29hbA0KPiBvZiBk
aXNjdXNzaW5nIHdoZXRoZXIgaXQgbWlnaHQgZml0IGludG8gdGhlIElFVEYgc3BhY2UgYW5kIGhv
dyB0bw0KPiBwcm9ncmVzcyBpdCB0b2dldGhlci4NCj4gIA0KPiBWaWVsZSBHcsO8w59lLA0KPiAg
DQo+IEhlbmsNCj4gIA0KPiBPbiAyNi4wMi4yMiAwMjoyOSwgIklFVEYgU2VjcmV0YXJpYXQiIHdy
b3RlOg0KPiA+IERlYXIgTW9oaXQgU2V0aGksDQo+ID4NCj4gPiBUaGUgc2Vzc2lvbihzKSB0aGF0
IHlvdSBoYXZlIHJlcXVlc3RlZCBoYXZlIGJlZW4gc2NoZWR1bGVkLg0KPiA+IEJlbG93IGlzIHRo
ZSBzY2hlZHVsZWQgc2Vzc2lvbiBpbmZvcm1hdGlvbiBmb2xsb3dlZCBieQ0KPiA+IHRoZSBvcmln
aW5hbCByZXF1ZXN0Lg0KPiA+DQo+ID4NCj4gPiBzZWNkaXNwYXRjaCBTZXNzaW9uIDEgKDI6MDAg
cmVxdWVzdGVkKQ0KPiA+IFR1ZXNkYXksIDIyIE1hcmNoIDIwMjIsIEFmdGVybm9vbiBTZXNzaW9u
IElJIDE0MzAtMTYzMA0KPiA+IFJvb20gTmFtZTogR3JhbmQgUGFyayBIYWxsIDMgc2l6ZTogMjUw
DQo+ID4gLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQo+ID4N
Cj4gPg0KPiA+IGlDYWxlbmRhcjogaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9tZWV0aW5n
LzExMy9zZXNzaW9ucy9zZWNkaXNwYXRjaC5pY3MgIA0KPiA+DQo+ID4gUmVxdWVzdCBJbmZvcm1h
dGlvbjoNCj4gPg0KPiA+DQo+ID4gLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tDQo+ID4gV29ya2luZyBHcm91cCBOYW1lOiBTZWN1cml0eSBE
aXNwYXRjaA0KPiA+IEFyZWEgTmFtZTogU2VjdXJpdHkgQXJlYQ0KPiA+IFNlc3Npb24gUmVxdWVz
dGVyOiBNb2hpdCBTZXRoaQ0KPiA+DQo+ID4NCj4gPiBOdW1iZXIgb2YgU2Vzc2lvbnM6IDENCj4g
PiBMZW5ndGggb2YgU2Vzc2lvbihzKToNCj4gPiBOdW1iZXIgb2YgQXR0ZW5kZWVzOiAyMDANCj4g
PiBDb25mbGljdHMgdG8gQXZvaWQ6DQo+ID4NCj4gPg0KPiA+DQo+ID4NCj4gPiBQZW9wbGUgd2hv
IG11c3QgYmUgcHJlc2VudDoNCj4gPiBCZW5qYW1pbiBLYWR1aw0KPiA+IEthdGhsZWVuIE1vcmlh
cnR5DQo+ID4gTW9oaXQgU2V0aGkNCj4gPiBQYXVsIFdvdXRlcnMNCj4gPiBSaWNoYXJkIEJhcm5l
cw0KPiA+IFJvbWFuIERhbnlsaXcNCj4gPg0KPiA+IFJlc291cmNlcyBSZXF1ZXN0ZWQ6DQo+ID4N
Cj4gPiBTcGVjaWFsIFJlcXVlc3RzOg0KPiA+IFBsZWFzZSBhdm9pZCBjb25mbGljdCB3aXRoIGFu
eSBTZWN1cml0eSByZWxhdGVkIEJvRi4NCj4gPiAtLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0NCj4gPg0KPiA+DQo+ID4gX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NCj4gPiBTZWNkaXNwYXRjaCBtYWls
aW5nIGxpc3QNCj4gPiBTZWNkaXNwYXRjaEBpZXRmLm9yZw0KPiA+IGh0dHBzOi8vd3d3LmlldGYu
b3JnL21haWxtYW4vbGlzdGluZm8vc2VjZGlzcGF0Y2gNCj4gIA0KPiBfX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0KPiBTZWNkaXNwYXRjaCBtYWlsaW5nIGxp
c3QNCj4gU2VjZGlzcGF0Y2hAaWV0Zi5vcmcNCj4gaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1h
bi9saXN0aW5mby9zZWNkaXNwYXRjaA0KPiAgDQo=


From nobody Tue Mar 22 07:15:36 2022
Return-Path: <blueroofmusic@gmail.com>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 689EB3A1388; Tue, 22 Mar 2022 07:15:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.107
X-Spam-Level: 
X-Spam-Status: No, score=-2.107 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uIx31za7Z-gN; Tue, 22 Mar 2022 07:15:28 -0700 (PDT)
Received: from mail-vs1-xe33.google.com (mail-vs1-xe33.google.com [IPv6:2607:f8b0:4864:20::e33]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 10D763A12D3; Tue, 22 Mar 2022 07:15:28 -0700 (PDT)
Received: by mail-vs1-xe33.google.com with SMTP id g21so19193464vsp.6; Tue, 22 Mar 2022 07:15:27 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=scZgkZn3ePZRfimdKKhX8qI857IN8s1yssxZra5Usw8=; b=PViipTk8QgHqxVUNBcO1xzov9f2FE1Xpc4uEGe1lsgc/bTCftCs9iiIjIxgiBRopMY 2pGhr9/RnLjJH8RP83/m6SNQ8DW7te8T3B9XRVUDAk4lROUqmGdX+gVnhK/ReqKFTtj/ ueJWSKPXSZg/w+79RQP96YwjOUKG3ASX+2iw32lu9EG0/cA7a6VG9baHEhGccQxDjfwb vK2OU55d4iCWmxvJdtY4FgyXqGQOOZyQVFgwRridIBU3VkjeUXW3PaS/Xa0iPRiewDcK p+lLze0E6H2IfudPgKw4jtNplNh6aNmb2mV6CEmgrOasplh2JnCXysFXxi2267UzRW6p Ovjg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=scZgkZn3ePZRfimdKKhX8qI857IN8s1yssxZra5Usw8=; b=5ehF99jor4NP5o0xWQe3X4pZQh51V4JUe7Nelz4jujjVawDXnF63Yzm3J66EJTZXPN varJwL+Tz23Uv2MfDZfNxeMNL7LRiU0mau7XEVc4Hiz33INcjvBDGfCo5wJwFcSJSkMr /rlKAep3yNwzZ1oO9B82I8pm2M/oj1xyzzAgJmvmRFKZwT/cx/QdE1icvtly3irdGf0W 5hccxpUXjCGZSUGzkaS4L4ijtPliJIkSEbcMkXI0eMvsZsc36fZngSO+3frX1XSe7FbF Sg2XhATmHsBhwBwS5mUMpep2lQn51ez2CysanLIkmegbYbyR9/S5sZ9HsKqjFJharhRt 5dFw==
X-Gm-Message-State: AOAM532BUtOKgfAXWRh4q1p1yumo48kmfFxbbD06w3Cn+CRvpbbe47rV anKs29/y0RKf4PA2jZANs7y5FRjY6TZI70+Mi6o=
X-Google-Smtp-Source: ABdhPJwLQ5v3Swog78KbYDsXOk2WBLMox7cez/3T7nVKMKjwY9K0NUuSqv1I+HUKEIng51Rh3NoViPatWLH5XZ/NWeM=
X-Received: by 2002:a05:6102:c0f:b0:324:ce94:67eb with SMTP id x15-20020a0561020c0f00b00324ce9467ebmr8235084vss.49.1647958526480; Tue, 22 Mar 2022 07:15:26 -0700 (PDT)
MIME-Version: 1.0
References: <164583895227.24617.1939040203283436909@ietfa.amsl.com> <5b97a678-eba1-09c3-7e70-c71dd98db8a9@sit.fraunhofer.de> <etPan.6239ce83.43b93aee.b2ea@cert.org>
In-Reply-To: <etPan.6239ce83.43b93aee.b2ea@cert.org>
From: Ira McDonald <blueroofmusic@gmail.com>
Date: Tue, 22 Mar 2022 10:15:06 -0400
Message-ID: <CAN40gSs85k80krh-cGNN4RCLGmXqWVS=dxLq=u8cPa0S=R+9zw@mail.gmail.com>
To: Chris Inacio <inacio@cert.org>, Ira McDonald <blueroofmusic@gmail.com>
Cc: "secdispatch@ietf.org" <secdispatch@ietf.org>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>,  "scitt@ietf.org" <scitt@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000093563705dacf3e13"
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/VqhlqLT_DOlOG4eQ2YY2F-_C1QE>
Subject: Re: [SCITT] [Secdispatch] Request for session at IETF 113
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2022 14:15:34 -0000

--00000000000093563705dacf3e13
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi,

Please note that ETSI SAI (Security of AI) has been explicitly addressing
these
issues of algorithm/model/data set integrity and attestation for a couple
of years,
has already published several excellent documents and is developing more.

My co-chair in TCG Trusted Mobility Solutions (Alec Brusilovsky,
InterDigital) is a
co-editor and rapporteur (liaison) to TCG from ETSI SAI.

https://www.etsi.org/committee/sai

Interested folks can send me a note (offlist).

Cheers,
- Ira

*Ira McDonald (Musician / Software Architect)*

*Chair - SAE Trust Anchors and Authentication TF*
*Co-Chair - TCG Trusted Mobility Solutions WG*

*Co-Chair - TCG Metadata Access Protocol SG*








*Chair - Linux Foundation Open Printing WGSecretary - IEEE-ISTO Printer
Working GroupCo-Chair - IEEE-ISTO PWG Internet Printing Protocol WGIETF
Designated Expert - IPP & Printer MIBBlue Roof Music / High North
Inchttp://sites.google.com/site/blueroofmusic
<http://sites.google.com/site/blueroofmusic>http://sites.google.com/site/hi=
ghnorthinc
<http://sites.google.com/site/highnorthinc>mailto: blueroofmusic@gmail.com
<blueroofmusic@gmail.com>(permanent) PO Box 221  Grand Marais, MI 49839
906-494-2434*


On Tue, Mar 22, 2022 at 9:30 AM Chris Inacio <inacio@cert.org> wrote:

> Henk,
>
> Just a quick comment before the start of the actual SECDISPATCH session:
> signing an ML algorithm isn=E2=80=99t all that interesting, _maybe_ signi=
ng the
> model is a bit more interesting.  What=E2=80=99s really interesting is th=
e data
> used to create the model, and that is where a lot of work in adversarial =
AI
> happens.  But they don=E2=80=99t call it big data for nothing, and I=E2=
=80=99m not sure the
> logistics of transparent (big) data, or the privacy impact of that are
> reasonable.
>
> So maybe a different example may be appropriate.
>
>
> --
> Chris Inacio
> inacio@cert.org
>
> -----Original Message-----
> From: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
> Date: March 9, 2022 at 5:40:11 PM
> To: secdispatch@ietf.org <secdispatch@ietf.org>, scitt@ietf.org <
> scitt@ietf.org>
> Subject:  [Secdispatch] Request for session at IETF 113
>
> > Hi secdispatch,
> > (hi scitt),
> >
> > emerging work on the topic of Supply Chain Integrity, Transparency,
> > Trust has taken some shape recently.
> >
> > The work combines existing IETF building blocks to facilitate useful
> > Internet-based support of global supply chain interoperability.
> >
> > Current contributions focus on the definition of Transparency Services
> > based on Internet technology (using CBOR/CDDL/COSE) to achieve
> > unambiguous, scaleable, and resilient integration with common devops an=
d
> > secops requirements.
> >
> > I'd like to request secdispatch agenda time for two documents that are
> > currently submitted:
> > > https://datatracker.ietf.org/doc/draft-birkholz-scitt-architecture/
> >
> > and
> >
> > > https://datatracker.ietf.org/doc/draft-birkholz-scitt-receipts/
> >
> > These two contributions are in -00 state. Yet, they already address
> > essential requirements, such as, air-gapped validation when being
> > offline, integration of remote attestation, efficient and crypto-agile
> > signing prescriptions for out-of-the-box interoperability, and - in
> > essence - long-long-term guarantees in support of various types of
> > supply chains requirements.
> >
> > We=E2=80=99d be happy to present this emerging work in secdispatch with=
 the goal
> > of discussing whether it might fit into the IETF space and how to
> > progress it together.
> >
> > Viele Gr=C3=BC=C3=9Fe,
> >
> > Henk
> >
> > On 26.02.22 02:29, "IETF Secretariat" wrote:
> > > Dear Mohit Sethi,
> > >
> > > The session(s) that you have requested have been scheduled.
> > > Below is the scheduled session information followed by
> > > the original request.
> > >
> > >
> > > secdispatch Session 1 (2:00 requested)
> > > Tuesday, 22 March 2022, Afternoon Session II 1430-1630
> > > Room Name: Grand Park Hall 3 size: 250
> > > ---------------------------------------------
> > >
> > >
> > > iCalendar:
> https://datatracker.ietf.org/meeting/113/sessions/secdispatch.ics
> > >
> > > Request Information:
> > >
> > >
> > > ---------------------------------------------------------
> > > Working Group Name: Security Dispatch
> > > Area Name: Security Area
> > > Session Requester: Mohit Sethi
> > >
> > >
> > > Number of Sessions: 1
> > > Length of Session(s):
> > > Number of Attendees: 200
> > > Conflicts to Avoid:
> > >
> > >
> > >
> > >
> > > People who must be present:
> > > Benjamin Kaduk
> > > Kathleen Moriarty
> > > Mohit Sethi
> > > Paul Wouters
> > > Richard Barnes
> > > Roman Danyliw
> > >
> > > Resources Requested:
> > >
> > > Special Requests:
> > > Please avoid conflict with any Security related BoF.
> > > ---------------------------------------------------------
> > >
> > >
> > > _______________________________________________
> > > Secdispatch mailing list
> > > Secdispatch@ietf.org
> > > https://www.ietf.org/mailman/listinfo/secdispatch
> >
> > _______________________________________________
> > Secdispatch mailing list
> > Secdispatch@ietf.org
> > https://www.ietf.org/mailman/listinfo/secdispatch
> >
> _______________________________________________
> Secdispatch mailing list
> Secdispatch@ietf.org
> https://www.ietf.org/mailman/listinfo/secdispatch
>

--00000000000093563705dacf3e13
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Hi,</div><div><br></div><div>Please note that ETSI SA=
I (Security of AI) has been explicitly addressing these</div><div>issues of=
 algorithm/model/data set integrity and attestation for a couple of years,<=
/div><div>has already published several excellent documents and is developi=
ng more.=C2=A0 <br></div><div><br></div><div>My co-chair in TCG Trusted Mob=
ility Solutions (Alec Brusilovsky, InterDigital) is a <br></div><div>co-edi=
tor and rapporteur (liaison) to TCG from ETSI SAI.<br></div><div><br></div>=
<div><a href=3D"https://www.etsi.org/committee/sai">https://www.etsi.org/co=
mmittee/sai</a></div><div><br></div><div>Interested folks can send me a not=
e (offlist).</div><div><br></div><div>Cheers,</div><div>- Ira</div><div><br=
></div><div><div><div dir=3D"ltr" class=3D"gmail_signature" data-smartmail=
=3D"gmail_signature"><div dir=3D"ltr"><div><div dir=3D"ltr"><div><div dir=
=3D"ltr"><div><div dir=3D"ltr"><div><div dir=3D"ltr"><div><div dir=3D"ltr">=
<div><div dir=3D"ltr"><div><div dir=3D"ltr"><div><div dir=3D"ltr"><i><font =
size=3D"1">Ira McDonald (Musician / Software Architect)</font></i></div><di=
v><i><font size=3D"1">Chair - SAE Trust Anchors and Authentication TF<br></=
font></i></div><div dir=3D"ltr"><i><font size=3D"1">Co-Chair - TCG Trusted =
Mobility Solutions WG</font></i></div><div><i><font size=3D"1">Co-Chair - T=
CG Metadata Access Protocol SG<br></font></i></div><div dir=3D"ltr"><i><fon=
t size=3D"1">Chair - Linux Foundation Open Printing WG<br>Secretary - IEEE-=
ISTO Printer Working Group<br>Co-Chair - IEEE-ISTO PWG Internet Printing Pr=
otocol WG<br>IETF Designated Expert - IPP &amp; Printer MIB<br>Blue Roof Mu=
sic / High North Inc<br><a style=3D"color:rgb(51,51,255)" href=3D"http://si=
tes.google.com/site/blueroofmusic" target=3D"_blank">http://sites.google.co=
m/site/blueroofmusic</a><br><a style=3D"color:rgb(102,0,204)" href=3D"http:=
//sites.google.com/site/highnorthinc" target=3D"_blank">http://sites.google=
.com/site/highnorthinc</a><br>mailto: <a href=3D"mailto:blueroofmusic@gmail=
.com" target=3D"_blank">blueroofmusic@gmail.com</a><br>(permanent) PO Box 2=
21=C2=A0 Grand Marais, MI 49839=C2=A0 906-494-2434</font></i></div></div></=
div></div></div></div></div></div></div></div></div></div></div></div></div=
></div></div></div></div><br></div></div><br><div class=3D"gmail_quote"><di=
v dir=3D"ltr" class=3D"gmail_attr">On Tue, Mar 22, 2022 at 9:30 AM Chris In=
acio &lt;<a href=3D"mailto:inacio@cert.org">inacio@cert.org</a>&gt; wrote:<=
br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8e=
x;border-left:1px solid rgb(204,204,204);padding-left:1ex">Henk,<br>
<br>
Just a quick comment before the start of the actual SECDISPATCH session: si=
gning an ML algorithm isn=E2=80=99t all that interesting, _maybe_ signing t=
he model is a bit more interesting.=C2=A0 What=E2=80=99s really interesting=
 is the data used to create the model, and that is where a lot of work in a=
dversarial AI happens.=C2=A0 But they don=E2=80=99t call it big data for no=
thing, and I=E2=80=99m not sure the logistics of transparent (big) data, or=
 the privacy impact of that are reasonable.<br>
<br>
So maybe a different example may be appropriate.<br>
<br>
<br>
--<br>
Chris Inacio<br>
<a href=3D"mailto:inacio@cert.org" target=3D"_blank">inacio@cert.org</a><br=
>
<br>
-----Original Message-----<br>
From:=C2=A0Henk Birkholz &lt;<a href=3D"mailto:henk.birkholz@sit.fraunhofer=
.de" target=3D"_blank">henk.birkholz@sit.fraunhofer.de</a>&gt;<br>
Date:=C2=A0March 9, 2022 at 5:40:11 PM<br>
To:=C2=A0<a href=3D"mailto:secdispatch@ietf.org" target=3D"_blank">secdispa=
tch@ietf.org</a> &lt;<a href=3D"mailto:secdispatch@ietf.org" target=3D"_bla=
nk">secdispatch@ietf.org</a>&gt;, <a href=3D"mailto:scitt@ietf.org" target=
=3D"_blank">scitt@ietf.org</a> &lt;<a href=3D"mailto:scitt@ietf.org" target=
=3D"_blank">scitt@ietf.org</a>&gt;<br>
Subject:=C2=A0 [Secdispatch] Request for session at IETF 113<br>
<br>
&gt; Hi secdispatch,<br>
&gt; (hi scitt),<br>
&gt;=C2=A0 <br>
&gt; emerging work on the topic of Supply Chain Integrity, Transparency,<br=
>
&gt; Trust has taken some shape recently.<br>
&gt;=C2=A0 <br>
&gt; The work combines existing IETF building blocks to facilitate useful<b=
r>
&gt; Internet-based support of global supply chain interoperability.<br>
&gt;=C2=A0 <br>
&gt; Current contributions focus on the definition of Transparency Services=
<br>
&gt; based on Internet technology (using CBOR/CDDL/COSE) to achieve<br>
&gt; unambiguous, scaleable, and resilient integration with common devops a=
nd<br>
&gt; secops requirements.<br>
&gt;=C2=A0 <br>
&gt; I&#39;d like to request secdispatch agenda time for two documents that=
 are<br>
&gt; currently submitted:<br>
&gt; &gt; <a href=3D"https://datatracker.ietf.org/doc/draft-birkholz-scitt-=
architecture/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.iet=
f.org/doc/draft-birkholz-scitt-architecture/</a><br>
&gt;=C2=A0 <br>
&gt; and<br>
&gt;=C2=A0 <br>
&gt; &gt; <a href=3D"https://datatracker.ietf.org/doc/draft-birkholz-scitt-=
receipts/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.or=
g/doc/draft-birkholz-scitt-receipts/</a><br>
&gt;=C2=A0 <br>
&gt; These two contributions are in -00 state. Yet, they already address<br=
>
&gt; essential requirements, such as, air-gapped validation when being<br>
&gt; offline, integration of remote attestation, efficient and crypto-agile=
<br>
&gt; signing prescriptions for out-of-the-box interoperability, and - in<br=
>
&gt; essence - long-long-term guarantees in support of various types of<br>
&gt; supply chains requirements.<br>
&gt;=C2=A0 <br>
&gt; We=E2=80=99d be happy to present this emerging work in secdispatch wit=
h the goal<br>
&gt; of discussing whether it might fit into the IETF space and how to<br>
&gt; progress it together.<br>
&gt;=C2=A0 <br>
&gt; Viele Gr=C3=BC=C3=9Fe,<br>
&gt;=C2=A0 <br>
&gt; Henk<br>
&gt;=C2=A0 <br>
&gt; On 26.02.22 02:29, &quot;IETF Secretariat&quot; wrote:<br>
&gt; &gt; Dear Mohit Sethi,<br>
&gt; &gt;<br>
&gt; &gt; The session(s) that you have requested have been scheduled.<br>
&gt; &gt; Below is the scheduled session information followed by<br>
&gt; &gt; the original request.<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; secdispatch Session 1 (2:00 requested)<br>
&gt; &gt; Tuesday, 22 March 2022, Afternoon Session II 1430-1630<br>
&gt; &gt; Room Name: Grand Park Hall 3 size: 250<br>
&gt; &gt; ---------------------------------------------<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; iCalendar: <a href=3D"https://datatracker.ietf.org/meeting/113/se=
ssions/secdispatch.ics" rel=3D"noreferrer" target=3D"_blank">https://datatr=
acker.ietf.org/meeting/113/sessions/secdispatch.ics</a>=C2=A0 <br>
&gt; &gt;<br>
&gt; &gt; Request Information:<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; ---------------------------------------------------------<br>
&gt; &gt; Working Group Name: Security Dispatch<br>
&gt; &gt; Area Name: Security Area<br>
&gt; &gt; Session Requester: Mohit Sethi<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; Number of Sessions: 1<br>
&gt; &gt; Length of Session(s):<br>
&gt; &gt; Number of Attendees: 200<br>
&gt; &gt; Conflicts to Avoid:<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; People who must be present:<br>
&gt; &gt; Benjamin Kaduk<br>
&gt; &gt; Kathleen Moriarty<br>
&gt; &gt; Mohit Sethi<br>
&gt; &gt; Paul Wouters<br>
&gt; &gt; Richard Barnes<br>
&gt; &gt; Roman Danyliw<br>
&gt; &gt;<br>
&gt; &gt; Resources Requested:<br>
&gt; &gt;<br>
&gt; &gt; Special Requests:<br>
&gt; &gt; Please avoid conflict with any Security related BoF.<br>
&gt; &gt; ---------------------------------------------------------<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; _______________________________________________<br>
&gt; &gt; Secdispatch mailing list<br>
&gt; &gt; <a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank">Secdisp=
atch@ietf.org</a><br>
&gt; &gt; <a href=3D"https://www.ietf.org/mailman/listinfo/secdispatch" rel=
=3D"noreferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sec=
dispatch</a><br>
&gt;=C2=A0 <br>
&gt; _______________________________________________<br>
&gt; Secdispatch mailing list<br>
&gt; <a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank">Secdispatch@=
ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/secdispatch" rel=3D"n=
oreferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/secdispa=
tch</a><br>
&gt;=C2=A0 <br>
_______________________________________________<br>
Secdispatch mailing list<br>
<a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank">Secdispatch@ietf.=
org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/secdispatch" rel=3D"norefe=
rrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/secdispatch</=
a><br>
</blockquote></div>

--00000000000093563705dacf3e13--


From nobody Tue Mar 22 07:24:26 2022
Return-Path: <orie@transmute.industries>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CFBE13A0825 for <scitt@ietfa.amsl.com>; Tue, 22 Mar 2022 07:24:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level: 
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=transmute.industries
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yBf7KLRGgFq5 for <scitt@ietfa.amsl.com>; Tue, 22 Mar 2022 07:24:04 -0700 (PDT)
Received: from mail-lj1-x22a.google.com (mail-lj1-x22a.google.com [IPv6:2a00:1450:4864:20::22a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9DC3C3A14E1 for <scitt@ietf.org>; Tue, 22 Mar 2022 07:23:53 -0700 (PDT)
Received: by mail-lj1-x22a.google.com with SMTP id q5so24125830ljb.11 for <scitt@ietf.org>; Tue, 22 Mar 2022 07:23:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=transmute.industries; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=/LGsgIZHC4sEWzXxq7nq31EFthH76j1WlMsg2jP0YhM=; b=BACq63CPB+sN6uGhjIwFobSB2b+gpFM/sS0sLTEXcoKlYIDFY5LbAhUWxM5LXSjM9g eK/KVhHmYzkRn2L8QLTShMEUvLRVKQvlg9AmYOr/8+2uDEDDBHN0CWqxSNbhVeVZkrGU 9CS7t7XbYvlXxlkKdwPZq4UqRN9ekMSiGHOp1g6VSsW69e6ZTIUKq6NxKdfmg1tZbMiA B6hkRYX6HhC8xDlfA0qF1r6IspjZxvbJuifXVLwpFFDJAq0AwWVhBTT26AGOGLm+CwVS uz079c+HGsqAYA/dfqOrqiymUJV6Bd4KyyrVZtakNVvtXDg6IU/h5mZ2ZPdn/Xt+b4bF FxZg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=/LGsgIZHC4sEWzXxq7nq31EFthH76j1WlMsg2jP0YhM=; b=FB9osbBPDltbo9wskjCYlTiBWR0PXfvPNOhiNE/aVtWO05yH8vbn318Zyru+kimikd oR+zbHIgKd1MjcM8qwhdvqtDGEC9bq4J/oBufdrWer7a5ZI8Gdy7wt4t54Fwulgi7axz ObxyXmTr+UZe8Z0lcecOFSsnZg+5irGf4oOVpVxSt/Fj85axtei4LlkYtWOjbJ+NXhdp uCZtoI7IKWBXkwo2LERPGBf0pr+WzeXutba00dl0FWKnAK4XqztUZxZEjb2f/o9uQOpZ xZZLQVcA6CDlvTrt7/yCODhS+MZcUA6sPFojv6vlNAnrPza3LAU/5FSAPTc9TZ2HFKm1 G4yg==
X-Gm-Message-State: AOAM530p8ZUVIiw1ul9ncn2MV23AMaGv4a8EPxVNXeo7rxDMdQuvd5Uf q1FYJYBNz0TobeERhn1vxh149B66BQkZcbQ8qOopIA==
X-Google-Smtp-Source: ABdhPJzdSz1w21NYaTYT1xB6xfWFuPLEN9bar6anhEQdgQbM/TcybkF4emLXnHBQ23J11OSMY6RTWO513mHpp5JBCaw=
X-Received: by 2002:a2e:8495:0:b0:247:dca3:f7bc with SMTP id b21-20020a2e8495000000b00247dca3f7bcmr19349220ljh.12.1647959031079; Tue, 22 Mar 2022 07:23:51 -0700 (PDT)
MIME-Version: 1.0
References: <164583895227.24617.1939040203283436909@ietfa.amsl.com> <5b97a678-eba1-09c3-7e70-c71dd98db8a9@sit.fraunhofer.de> <etPan.6239ce83.43b93aee.b2ea@cert.org>
In-Reply-To: <etPan.6239ce83.43b93aee.b2ea@cert.org>
From: Orie Steele <orie@transmute.industries>
Date: Tue, 22 Mar 2022 09:23:40 -0500
Message-ID: <CAN8C-_K3NAbWtCDs_iGzUr2XMsbgwf2FVjT7-J=+3HbJ7n7OOw@mail.gmail.com>
To: Chris Inacio <inacio@cert.org>, Mike Prorock <mprorock@mesur.io>
Cc: "secdispatch@ietf.org" <secdispatch@ietf.org>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>,  "scitt@ietf.org" <scitt@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000a6ffeb05dacf5cae"
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/CRTHZWU4MThQC6hq9p9JMbRMLcc>
Subject: Re: [SCITT] [Secdispatch] Request for session at IETF 113
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2022 14:24:20 -0000

--000000000000a6ffeb05dacf5cae
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On the subject of DIDs.

They can be blended with traditional CA Chains, @Mike Prorock
<mprorock@mesur.io> built this demo on OpenSSL and DID Web in a weekend to
show at least one way that this can be done:

https://github.com/transmute-industries/openssl-did-web-tutorial

The main parts of DIDs that are relevant are where they show up in the
"credential"...  "iss" and "kid" and possibly "sub".

In these cases you have to compare using DIDs to the current solutions to
make a decision.

If you are inventing a centralized verifiable transparency log, you are
basically inventing a DID method without calling it one.

You can consider using AmazonQLDB or https://github.com/google/trillian to
build it faster.

But at the end of the day, trust in this system comes from trust in that
log, and its service providers.

If an artifact is signed with keys or certificates originating in that log,
what is their unique identifier?

If the log exposes a querying interface, what are the endpoints that are
exposed?

You will likely have URL / URIs and if they describe an issuer or an
issuer's key, you will have a system that is like DIDs (maybe even like
web), but that can be destroyed by attacking DNS.

If you have been following the conflict in Ukraine, you can see that
although we (the keepers on internet security / not the US or NATO) have
been considering various options that would apply directly to such a
system:

https://blog.cloudflare.com/steps-taken-around-cloudflares-services-in-ukra=
ine-belarus-and-russia/

I believe that it is possible to effectively attack software supply chains,
while leaving social media / propaganda channels or medical services up...
but it's also very clear that both sides in the current conflict have
capabilities that could be used to directly disable any DNS based systems,
both with denial of service and coercion.

https://www.themoscowtimes.com/2021/09/10/russia-to-test-block-domains-used=
-by-navalny-apps-sparking-online-privacy-fears-kommersant-a75014

All this to say, I wouldn't necessarily jump over the awesome solutions
that folks have built on DNS and CAs today.

I would look to extend them to remove some of their weaknesses, I would
avoid becoming shackled to those weaknesses.

In an ideal world, the log, credential and identity layer would work with
and without DNS as a root of trust...

Happy to chat about this more in our next meeting.

Regards,

OS


On Tue, Mar 22, 2022 at 8:28 AM Chris Inacio <inacio@cert.org> wrote:

> Henk,
>
> Just a quick comment before the start of the actual SECDISPATCH session:
> signing an ML algorithm isn=E2=80=99t all that interesting, _maybe_ signi=
ng the
> model is a bit more interesting.  What=E2=80=99s really interesting is th=
e data
> used to create the model, and that is where a lot of work in adversarial =
AI
> happens.  But they don=E2=80=99t call it big data for nothing, and I=E2=
=80=99m not sure the
> logistics of transparent (big) data, or the privacy impact of that are
> reasonable.
>
> So maybe a different example may be appropriate.
>
>
> --
> Chris Inacio
> inacio@cert.org
>
> -----Original Message-----
> From: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
> Date: March 9, 2022 at 5:40:11 PM
> To: secdispatch@ietf.org <secdispatch@ietf.org>, scitt@ietf.org <
> scitt@ietf.org>
> Subject:  [Secdispatch] Request for session at IETF 113
>
> > Hi secdispatch,
> > (hi scitt),
> >
> > emerging work on the topic of Supply Chain Integrity, Transparency,
> > Trust has taken some shape recently.
> >
> > The work combines existing IETF building blocks to facilitate useful
> > Internet-based support of global supply chain interoperability.
> >
> > Current contributions focus on the definition of Transparency Services
> > based on Internet technology (using CBOR/CDDL/COSE) to achieve
> > unambiguous, scaleable, and resilient integration with common devops an=
d
> > secops requirements.
> >
> > I'd like to request secdispatch agenda time for two documents that are
> > currently submitted:
> > > https://datatracker.ietf.org/doc/draft-birkholz-scitt-architecture/
> >
> > and
> >
> > > https://datatracker.ietf.org/doc/draft-birkholz-scitt-receipts/
> >
> > These two contributions are in -00 state. Yet, they already address
> > essential requirements, such as, air-gapped validation when being
> > offline, integration of remote attestation, efficient and crypto-agile
> > signing prescriptions for out-of-the-box interoperability, and - in
> > essence - long-long-term guarantees in support of various types of
> > supply chains requirements.
> >
> > We=E2=80=99d be happy to present this emerging work in secdispatch with=
 the goal
> > of discussing whether it might fit into the IETF space and how to
> > progress it together.
> >
> > Viele Gr=C3=BC=C3=9Fe,
> >
> > Henk
> >
> > On 26.02.22 02:29, "IETF Secretariat" wrote:
> > > Dear Mohit Sethi,
> > >
> > > The session(s) that you have requested have been scheduled.
> > > Below is the scheduled session information followed by
> > > the original request.
> > >
> > >
> > > secdispatch Session 1 (2:00 requested)
> > > Tuesday, 22 March 2022, Afternoon Session II 1430-1630
> > > Room Name: Grand Park Hall 3 size: 250
> > > ---------------------------------------------
> > >
> > >
> > > iCalendar:
> https://datatracker.ietf.org/meeting/113/sessions/secdispatch.ics
> > >
> > > Request Information:
> > >
> > >
> > > ---------------------------------------------------------
> > > Working Group Name: Security Dispatch
> > > Area Name: Security Area
> > > Session Requester: Mohit Sethi
> > >
> > >
> > > Number of Sessions: 1
> > > Length of Session(s):
> > > Number of Attendees: 200
> > > Conflicts to Avoid:
> > >
> > >
> > >
> > >
> > > People who must be present:
> > > Benjamin Kaduk
> > > Kathleen Moriarty
> > > Mohit Sethi
> > > Paul Wouters
> > > Richard Barnes
> > > Roman Danyliw
> > >
> > > Resources Requested:
> > >
> > > Special Requests:
> > > Please avoid conflict with any Security related BoF.
> > > ---------------------------------------------------------
> > >
> > >
> > > _______________________________________________
> > > Secdispatch mailing list
> > > Secdispatch@ietf.org
> > > https://www.ietf.org/mailman/listinfo/secdispatch
> >
> > _______________________________________________
> > Secdispatch mailing list
> > Secdispatch@ietf.org
> > https://www.ietf.org/mailman/listinfo/secdispatch
> >
> --
> SCITT mailing list
> SCITT@ietf.org
> https://www.ietf.org/mailman/listinfo/scitt
>


--=20
*ORIE STEELE*
Chief Technical Officer
www.transmute.industries

<https://www.transmute.industries>

--000000000000a6ffeb05dacf5cae
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">On the subject of DIDs.<br><br>They can be blended with tr=
aditional CA Chains,=C2=A0<a class=3D"gmail_plusreply" id=3D"plusReplyChip-=
0" href=3D"mailto:mprorock@mesur.io" tabindex=3D"-1">@Mike Prorock</a>=C2=
=A0built this demo on OpenSSL and DID Web in a weekend to show at least one=
 way that this can be done:<br><br><a href=3D"https://github.com/transmute-=
industries/openssl-did-web-tutorial">https://github.com/transmute-industrie=
s/openssl-did-web-tutorial</a><br><br>The main parts of DIDs that are relev=
ant are where they show up in the &quot;credential&quot;...=C2=A0 &quot;iss=
&quot; and &quot;kid&quot; and possibly &quot;sub&quot;.<br><br>In these ca=
ses you have to compare using DIDs to the current solutions to make a decis=
ion.<br><br>If you are inventing a centralized verifiable transparency log,=
 you are basically inventing a DID method without calling it one.<br><br>Yo=
u can consider using AmazonQLDB or=C2=A0<a href=3D"https://github.com/googl=
e/trillian">https://github.com/google/trillian</a>=C2=A0to build it faster.=
<br><br>But at the end of the day, trust in this system comes from trust in=
 that log, and its service providers.<br><br>If an artifact is signed with =
keys or certificates originating=C2=A0in that log, what is their unique ide=
ntifier?<br><br>If the log exposes a querying interface, what are the endpo=
ints that are exposed?<br><br>You will likely have URL / URIs and if they d=
escribe an issuer or an issuer&#39;s key, you will have a system that is li=
ke DIDs (maybe even like web), but that can be destroyed by attacking DNS.<=
br><br>If you have been following the conflict in Ukraine, you can see that=
 although we (the keepers on internet security / not the US or NATO) have b=
een considering various options that would apply directly to such a system:=
=C2=A0<br><br><a href=3D"https://blog.cloudflare.com/steps-taken-around-clo=
udflares-services-in-ukraine-belarus-and-russia/">https://blog.cloudflare.c=
om/steps-taken-around-cloudflares-services-in-ukraine-belarus-and-russia/</=
a><br><br>I believe=C2=A0that it is possible to effectively attack software=
 supply chains, while leaving social media / propaganda channels or medical=
 services up... but it&#39;s also very clear that both sides in the current=
 conflict have capabilities that could be used to directly disable any DNS =
based systems, both with denial of service and coercion.<br><br><a href=3D"=
https://www.themoscowtimes.com/2021/09/10/russia-to-test-block-domains-used=
-by-navalny-apps-sparking-online-privacy-fears-kommersant-a75014">https://w=
ww.themoscowtimes.com/2021/09/10/russia-to-test-block-domains-used-by-naval=
ny-apps-sparking-online-privacy-fears-kommersant-a75014</a><br><br>All this=
 to say, I wouldn&#39;t necessarily jump over the awesome solutions that fo=
lks have built on DNS and CAs today. <br><br>I would look to extend them to=
 remove some of their weaknesses, I would avoid becoming shackled=C2=A0to t=
hose weaknesses.<br><br>In an ideal world, the log, credential and identity=
 layer would work with and without DNS as a root of trust...=C2=A0<br><br>H=
appy to chat about this more in our next meeting.<br><br>Regards,<br><br>OS=
<br><br></div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmai=
l_attr">On Tue, Mar 22, 2022 at 8:28 AM Chris Inacio &lt;<a href=3D"mailto:=
inacio@cert.org">inacio@cert.org</a>&gt; wrote:<br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rg=
b(204,204,204);padding-left:1ex">Henk,<br>
<br>
Just a quick comment before the start of the actual SECDISPATCH session: si=
gning an ML algorithm isn=E2=80=99t all that interesting, _maybe_ signing t=
he model is a bit more interesting.=C2=A0 What=E2=80=99s really interesting=
 is the data used to create the model, and that is where a lot of work in a=
dversarial AI happens.=C2=A0 But they don=E2=80=99t call it big data for no=
thing, and I=E2=80=99m not sure the logistics of transparent (big) data, or=
 the privacy impact of that are reasonable.<br>
<br>
So maybe a different example may be appropriate.<br>
<br>
<br>
--<br>
Chris Inacio<br>
<a href=3D"mailto:inacio@cert.org" target=3D"_blank">inacio@cert.org</a><br=
>
<br>
-----Original Message-----<br>
From:=C2=A0Henk Birkholz &lt;<a href=3D"mailto:henk.birkholz@sit.fraunhofer=
.de" target=3D"_blank">henk.birkholz@sit.fraunhofer.de</a>&gt;<br>
Date:=C2=A0March 9, 2022 at 5:40:11 PM<br>
To:=C2=A0<a href=3D"mailto:secdispatch@ietf.org" target=3D"_blank">secdispa=
tch@ietf.org</a> &lt;<a href=3D"mailto:secdispatch@ietf.org" target=3D"_bla=
nk">secdispatch@ietf.org</a>&gt;, <a href=3D"mailto:scitt@ietf.org" target=
=3D"_blank">scitt@ietf.org</a> &lt;<a href=3D"mailto:scitt@ietf.org" target=
=3D"_blank">scitt@ietf.org</a>&gt;<br>
Subject:=C2=A0 [Secdispatch] Request for session at IETF 113<br>
<br>
&gt; Hi secdispatch,<br>
&gt; (hi scitt),<br>
&gt;=C2=A0 <br>
&gt; emerging work on the topic of Supply Chain Integrity, Transparency,<br=
>
&gt; Trust has taken some shape recently.<br>
&gt;=C2=A0 <br>
&gt; The work combines existing IETF building blocks to facilitate useful<b=
r>
&gt; Internet-based support of global supply chain interoperability.<br>
&gt;=C2=A0 <br>
&gt; Current contributions focus on the definition of Transparency Services=
<br>
&gt; based on Internet technology (using CBOR/CDDL/COSE) to achieve<br>
&gt; unambiguous, scaleable, and resilient integration with common devops a=
nd<br>
&gt; secops requirements.<br>
&gt;=C2=A0 <br>
&gt; I&#39;d like to request secdispatch agenda time for two documents that=
 are<br>
&gt; currently submitted:<br>
&gt; &gt; <a href=3D"https://datatracker.ietf.org/doc/draft-birkholz-scitt-=
architecture/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.iet=
f.org/doc/draft-birkholz-scitt-architecture/</a><br>
&gt;=C2=A0 <br>
&gt; and<br>
&gt;=C2=A0 <br>
&gt; &gt; <a href=3D"https://datatracker.ietf.org/doc/draft-birkholz-scitt-=
receipts/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.or=
g/doc/draft-birkholz-scitt-receipts/</a><br>
&gt;=C2=A0 <br>
&gt; These two contributions are in -00 state. Yet, they already address<br=
>
&gt; essential requirements, such as, air-gapped validation when being<br>
&gt; offline, integration of remote attestation, efficient and crypto-agile=
<br>
&gt; signing prescriptions for out-of-the-box interoperability, and - in<br=
>
&gt; essence - long-long-term guarantees in support of various types of<br>
&gt; supply chains requirements.<br>
&gt;=C2=A0 <br>
&gt; We=E2=80=99d be happy to present this emerging work in secdispatch wit=
h the goal<br>
&gt; of discussing whether it might fit into the IETF space and how to<br>
&gt; progress it together.<br>
&gt;=C2=A0 <br>
&gt; Viele Gr=C3=BC=C3=9Fe,<br>
&gt;=C2=A0 <br>
&gt; Henk<br>
&gt;=C2=A0 <br>
&gt; On 26.02.22 02:29, &quot;IETF Secretariat&quot; wrote:<br>
&gt; &gt; Dear Mohit Sethi,<br>
&gt; &gt;<br>
&gt; &gt; The session(s) that you have requested have been scheduled.<br>
&gt; &gt; Below is the scheduled session information followed by<br>
&gt; &gt; the original request.<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; secdispatch Session 1 (2:00 requested)<br>
&gt; &gt; Tuesday, 22 March 2022, Afternoon Session II 1430-1630<br>
&gt; &gt; Room Name: Grand Park Hall 3 size: 250<br>
&gt; &gt; ---------------------------------------------<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; iCalendar: <a href=3D"https://datatracker.ietf.org/meeting/113/se=
ssions/secdispatch.ics" rel=3D"noreferrer" target=3D"_blank">https://datatr=
acker.ietf.org/meeting/113/sessions/secdispatch.ics</a>=C2=A0 <br>
&gt; &gt;<br>
&gt; &gt; Request Information:<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; ---------------------------------------------------------<br>
&gt; &gt; Working Group Name: Security Dispatch<br>
&gt; &gt; Area Name: Security Area<br>
&gt; &gt; Session Requester: Mohit Sethi<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; Number of Sessions: 1<br>
&gt; &gt; Length of Session(s):<br>
&gt; &gt; Number of Attendees: 200<br>
&gt; &gt; Conflicts to Avoid:<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; People who must be present:<br>
&gt; &gt; Benjamin Kaduk<br>
&gt; &gt; Kathleen Moriarty<br>
&gt; &gt; Mohit Sethi<br>
&gt; &gt; Paul Wouters<br>
&gt; &gt; Richard Barnes<br>
&gt; &gt; Roman Danyliw<br>
&gt; &gt;<br>
&gt; &gt; Resources Requested:<br>
&gt; &gt;<br>
&gt; &gt; Special Requests:<br>
&gt; &gt; Please avoid conflict with any Security related BoF.<br>
&gt; &gt; ---------------------------------------------------------<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt; _______________________________________________<br>
&gt; &gt; Secdispatch mailing list<br>
&gt; &gt; <a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank">Secdisp=
atch@ietf.org</a><br>
&gt; &gt; <a href=3D"https://www.ietf.org/mailman/listinfo/secdispatch" rel=
=3D"noreferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sec=
dispatch</a><br>
&gt;=C2=A0 <br>
&gt; _______________________________________________<br>
&gt; Secdispatch mailing list<br>
&gt; <a href=3D"mailto:Secdispatch@ietf.org" target=3D"_blank">Secdispatch@=
ietf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/secdispatch" rel=3D"n=
oreferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/secdispa=
tch</a><br>
&gt;=C2=A0 <br>
-- <br>
SCITT mailing list<br>
<a href=3D"mailto:SCITT@ietf.org" target=3D"_blank">SCITT@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/scitt" rel=3D"noreferrer" =
target=3D"_blank">https://www.ietf.org/mailman/listinfo/scitt</a><br>
</blockquote></div><br clear=3D"all"><div><br></div>-- <br><div dir=3D"ltr"=
 class=3D"gmail_signature"><div dir=3D"ltr"><div><div dir=3D"ltr"><div><div=
 dir=3D"ltr"><div><div dir=3D"ltr"><div><div dir=3D"ltr"><font face=3D"taho=
ma, sans-serif" size=3D"2" color=3D"#351c75"><b style=3D"background-color:r=
gb(255,255,255)">ORIE STEELE</b></font><div><font size=3D"2" face=3D"arial =
narrow, sans-serif" style=3D"background-color:rgb(255,255,255)" color=3D"#3=
51c75">Chief Technical Officer</font></div><div><font style=3D"background-c=
olor:rgb(255,255,255)" color=3D"#351c75" face=3D"arial, helvetica, sans-ser=
if" size=3D"1">www.transmute.industries</font></div><div><font size=3D"2" f=
ace=3D"arial narrow, sans-serif"><br></font></div><div><font size=3D"2" fac=
e=3D"arial narrow, sans-serif"><a href=3D"https://www.transmute.industries"=
 target=3D"_blank"><img src=3D"https://drive.google.com/a/transmute.industr=
ies/uc?id=3D1hbftCJoB5KdeV_kzj4eeyS28V3zS9d9c&amp;export=3Ddownload" width=
=3D"96" height=3D"23"></a><br></font></div></div></div></div></div></div></=
div></div></div></div></div>

--000000000000a6ffeb05dacf5cae--


From nobody Tue Mar 22 08:56:18 2022
Return-Path: <henk.birkholz@sit.fraunhofer.de>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7DA0D3A15A8 for <scitt@ietfa.amsl.com>; Tue, 22 Mar 2022 08:56:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.91
X-Spam-Level: 
X-Spam-Status: No, score=-6.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=fraunhofer.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TIIBhu6zoDBw for <scitt@ietfa.amsl.com>; Tue, 22 Mar 2022 08:56:10 -0700 (PDT)
Received: from mail-edgeF24.fraunhofer.de (mail-edgef24.fraunhofer.de [192.102.164.24]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1E34E3A15A6 for <scitt@ietf.org>; Tue, 22 Mar 2022 08:56:08 -0700 (PDT)
IronPort-SDR: uAijvFm2AYVOYWZbcP8Z4ppF2rP9H3JSJR/MObRqFlz6KgXYMnNKNQe3+LLK+78pHkrjiQcQE0 RlCJsxYgUVKQ==
X-IPAS-Result: =?us-ascii?q?A2HiKgDI8Dli/xmkZsBaHQEBPAEFBQECAQkBFYFQCAEDA?= =?us-ascii?q?YIlglOEVY4WlT6IfIJTAxg8CwEBAQEBAQEBAQgBEhMeBAEBAwSJRSY5BQ0BA?= =?us-ascii?q?gQBAQEBAwIDAQEBAQUBAQYBAQEBAQEGBAICgRiFLzkBDINTTTsBAQEBAQEBA?= =?us-ascii?q?QEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEFAoEIZw8BBQgBATgYHAImA?= =?us-ascii?q?jQrDQgBAYMAgmYDkSKcDIExgQGCCAEBBgQEglSCNxhcgVsJCQGBBiwBgxCHJ?= =?us-ascii?q?oRKgVVEgTwMA4sRgmXcQDQHghKBOoE7BgyeEQYULoNiAZJokXWWWyCmOQIEA?= =?us-ascii?q?gQFAg4IgXmBfk0kT4JpURkPkhKKX3Q4AgYBCgEBAwmQUgEB?=
IronPort-PHdr: A9a23:tdCWaBNleE3XSHI7UzIl6ncLWUAX0o4cdiYZ6Zsi3rRJdKnrv5HvJ 1fW6vgliljVFZ7a5PRJh6uz0ejgVGUM7IzHvCUEd5pBBBMAgN8dygonBsPNAEbnLfnsOio9G skKVFJs83yhd0ZPH8OrfFzO5HOo5CMUGhLxOBAzKummcrM=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.90,201,1643670000"; d="scan'208";a="36945125"
Received: from mail-mtaf25.fraunhofer.de ([192.102.164.25]) by mail-edgeF24.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Mar 2022 16:56:05 +0100
IronPort-SDR: ntZ6bi5gOQwRZaM+YXFulgtAUV2+SwlEZfmJgy/GwpPTrgafbBmwDrp7rT6fc8T5zvpS0LgQEQ u5f3mGOz19UVyiaxcvxnoAfky942vl6xk=
X-IPAS-Result: =?us-ascii?q?A0AIcADI8Dli/3+zYZlaHAEBATwBAQQEAQECAQEHAQEVC?= =?us-ascii?q?YFHBwEBAwGBT1YHgVAmVoRUg0sBAYU5hRBdAYJfAZIAiHyCUwNUCwEDAQEBA?= =?us-ascii?q?QEIARIxBAEBiUkCJjkFDQECBAEBAQEDAgMBAQEBBQEBBQEBAQIBAQYEgQknB?= =?us-ascii?q?l4GaIFPgWETCzQBDIZbEQ8BBQgBARQkGBwCJgI0ByQNCAEBHoJigmYDLQEBk?= =?us-ascii?q?HOPNgGBOgKBDooLgTGBAYIIAQEGBASCVII3GFyBWwkJAYEGLAGDEIcmhEqBV?= =?us-ascii?q?USBPAwDixGCZdxANAeCEoE6gTsGDJ4RBhQug2IBkmiRdZZbIKY5AgQCBAUCD?= =?us-ascii?q?gEBBoF5JIFZTSRPgmlOAQIBAg0BAgIDAQIBAgkBAQKSD4pfQjI4AgYBCgEBA?= =?us-ascii?q?wmQUgEB?=
IronPort-PHdr: A9a23:dGZI+Bw9VJ8ZSNXXCzPRngc9DxPP8534PQ8Qv5wgjb8GMqGu5I/rM 0GX4/JxxETIUoPW57Mh6aLWvqnsVHZG7cOHt3YPI5BJXgUO3MMRmQFoCcWZCEr9efjtaSFyH MlLWFJ/uX+hNk0AA8fiIVPIq2C07TkcFw+5OQcmTtk=
IronPort-Data: A9a23:4TPyWqMaJYDgMYDvrR1kl8FynXyQoLVcMsEvi/4bfWQNrUor0mNWy mJOWWvXaKyINmbwf9x1aty3pEJUu8fUndUyS3M5pCpnJ55oRWUpJjg5wmPYZX76whjrFRo/h ykmQoCbap1yEhcwnz/1WlTbhSAUOZqgG/ytUIYoBggrHVU+EHx700o58wIEqtcAbeaRU1vlV eza/pW31G+Ng1aY5UpNtspvADs21BjDkGtwUm4WPJinj3eC/5UhN6/zEInqR5fOrim4KcbhL wrL5OnREmo0ZH7BAPv9+lrwWhVirrI/oWFih1IOM5VOjCSuqQQ1j4o5F8Y/Ln1yrGy4o/wt0 4xQjaCJHFJB0q3kwIzxUjFDFj1me6BW87+BL2K2rMqTyEPLaT3gzp2CDmlvYNZeq7kxWD4fs 6VCd1jhbTjb7w6y6LK2TOoqjMU5L8nsOJE3oXB8iz/DBOsgQZfNTr+M6dIwMDIY354fQKmDN pJDAdZpRD/QYwdKYUscM75kmuSSnknkegV+sGvA8MLb5ECWlmSdyoPFK9HUZsCiRMhJkACfv G2uwojiKkhHb5nOln/crSPp37WQ2z3+HolUGqex6/hqh1Oe3CofBXX6SGeGnBVwsWbmM/o3F qDe0nFGQXEa+BP5Q9/jcQe/pXLY7BcQV8AJTL8h6R3LxLDd/gCZAWYJVHhNZYV+5sMxQDUr0 H6Pns/oXGA+7ufKFCjFrrrE/ymvPSU1LHMZYXFWRwUy4+7l/NM5gCXJQ4sxC6WylND0RWr9z mnS/igzjrkel+AR0KC/8QyVij6gvMGWHBU0+kPZRGu46AN+aoO/IYClsACJ4fFFJYefb1+Ao Hldx5nAtr9TV8nVmXXUEusXHbyv6/KUCxHmgAZiT8s76jCg23+/ZoQOsjtwE0deNJpWczHeZ kKO6xha44VePSfxYKJ6P9CxBsAtwfSyHNjpTKqPPMFLfoA3eR+M/Gdgf0eN2WDqnkU2160yY M/JfcGpBHccKKJm0DvvG7ZDi+B2nHhmyDOBX43/wjSmzaGaOCyfR4ADPQbcdes+9q6F/FjY/ ooNLceM0BkDAuTybjOMqtxKcAtPfCd+XM+n7pUNKaidJ0xtXm87AuLXwbQvdpYjk6kMzrXE+ XS0W0l5zlvjhCSbeFvQNS05MOviDcRlsHY2HS0wJlL0iXItVoCisfUEfJwtcLh7qeFuwJaYl RXelxls3xiXdgn6xg==
IronPort-HdrOrdr: A9a23:HtxAP6i//EXCNELicnsvkWP1CnBQXt8ji2hC6mlwRA09TyXqra 6TdZUguiMc5wx8ZJhNo7q90ey7IU80lqQf3WByB9aftWDd0QOVxcNZnOjfKlbbak/DH4BmuJ tIQuxZLey1IFhhh8Pz4A21CL8bsby6zJw=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-AV: E=Sophos;i="5.90,201,1643670000"; d="scan'208";a="169575902"
Received: from 153-97-179-127.vm.c.fraunhofer.de (HELO smtp.exch.fraunhofer.de) ([153.97.179.127]) by mail-mtaF25.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Mar 2022 16:56:03 +0100
Received: from XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) by XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.15; Tue, 22 Mar 2022 16:56:02 +0100
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (104.47.1.51) by XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.15 via Frontend Transport; Tue, 22 Mar 2022 16:56:02 +0100
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GuMoUYU3i4+ee+32HZmtwKJsxtAllepV4Dn6vzy+gBaCTs3EwfSY5GdTLIX6r/18C/9LhpPKTLpf9hGyxChswj3cQdOEIw1Aq2jMsN9mKLWbHoB5YXMblwmapICf9AujQBRsqcJYf8Wqn9IetiV+ZKhVhdX4cQ6XmrgSVQtUCwZtdTEKOOsYrLsuGV4WjzAwuxMb8iKylHtdTOVNI7UPQs6zGUb0RwwvZ7Y4Ynn9QesTQ+cV8HLTZ1CQoSXWh00Xg/BJcR35w7pxYcpyfN8O3IQp/Y8ufTCUTQnwTU/sJCC2F+VZPqQ9Pmjrw5fbcbA72oz8OOfpPnfQZa2F9BW7qA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=nqSuSGDJ2p2jccoQuaAsnTh3mqaFCyteVnwyBL5zRsU=; b=PXCvYhP2iqTIdsWjTAunyV1spYCjS6amcsH08CDNa5MvT7KIzHQ8hgQVfNS+a6aFIwy24pR4feCxgmB66cQoyhGvzVXbNo7KEbx858Qu1cjc5Ub4Y8AEvhRSqy5uydMfi0eR2l1dG97CULwRBTwy66IMM8PsGdRG8ra0wWS+Xu6eW5jCU3bvOrV4huJAgMfcLzLQOY6cNziKG95F31xmdBZCKeJxdhHIsuQ9lpICTTgCUUJbLl9MPQXBqm/psbVciuuO7znavV23dWQPfScO50afKZV5TLjspl8SmdNftPv/Ar3D0IMrjphiejDoCi97d/M3xUhKtbz0FtCCrVa53g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=sit.fraunhofer.de; dmarc=pass action=none header.from=sit.fraunhofer.de; dkim=pass header.d=sit.fraunhofer.de; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fraunhofer.onmicrosoft.com; s=selector2-fraunhofer-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=nqSuSGDJ2p2jccoQuaAsnTh3mqaFCyteVnwyBL5zRsU=; b=HF4fMogXV2hdjajF/pEsNt5Cbg2gHfQZpzrvJAW/zS0Gks1ERtjYVSQRRrFegPEVp92fxtMMJr3Bu+3e9WG8ZEgvN9TvMXofxFHZBQysJLiJ2rCN2h02NQiqqqonbE9poLt9jyceQ7Hf5ozWcdlVuHv10pEVm28ujpVpcdu51PU=
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=sit.fraunhofer.de;
Received: from DU2P194MB1709.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:276::9) by VI1P194MB0654.EURP194.PROD.OUTLOOK.COM (2603:10a6:800:152::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5081.14; Tue, 22 Mar 2022 15:56:00 +0000
Received: from DU2P194MB1709.EURP194.PROD.OUTLOOK.COM ([fe80::ec87:f3dc:70f7:2421]) by DU2P194MB1709.EURP194.PROD.OUTLOOK.COM ([fe80::ec87:f3dc:70f7:2421%5]) with mapi id 15.20.5081.023; Tue, 22 Mar 2022 15:56:00 +0000
Message-ID: <70f84b2b-b04f-9962-da18-5b81bafcc196@sit.fraunhofer.de>
Date: Tue, 22 Mar 2022 16:55:57 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:91.0) Gecko/20100101 Thunderbird/91.5.0
To: "scitt@ietf.org" <scitt@ietf.org>
Content-Language: en-US
From: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
X-ClientProxiedBy: AM6P195CA0049.EURP195.PROD.OUTLOOK.COM (2603:10a6:209:87::26) To DU2P194MB1709.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:276::9)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 82ea5125-128d-457a-cb5d-08da0c1c75d0
X-MS-TrafficTypeDiagnostic: VI1P194MB0654:EE_
X-Microsoft-Antispam-PRVS: <VI1P194MB06541D6E0236BC74462CF363A8179@VI1P194MB0654.EURP194.PROD.OUTLOOK.COM>
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:DU2P194MB1709.EURP194.PROD.OUTLOOK.COM; PTR:; CAT:NONE;  SFS:(13230001)(366004)(6666004)(5660300002)(44832011)(52116002)(6506007)(2616005)(6512007)(186003)(38100700002)(82960400001)(2906002)(558084003)(31686004)(86362001)(31696002)(3480700007)(6916009)(66556008)(316002)(66476007)(8676002)(66946007)(6486002)(508600001)(8936002)(45980500001)(43740500002); DIR:OUT; SFP:1102; 
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?bDdlZlJBQTdjNFdvY3daclozakp5K3RVWVZlWVo1NVBaTkdjcnpTcTJnQytC?= =?utf-8?B?UzlxeGo4ck9uaEd6YUYvVlJTVVVSNHd6N1QvN3lCdlcwUWptdjQraDZNNWVQ?= =?utf-8?B?NEJrYUkrc05WSlluSG9CR2Z2OVppMzFKRzBPQ3EzK0FERlFrWlQwVWdBM0FQ?= =?utf-8?B?SWR6TmR5T1JTSlk0Q0pBYkdiUzVIc1hIVERRRVFlR2pTVTI5QTBYTkMwN0hO?= =?utf-8?B?WFVQSlp6eVN3azh2YzRpVVRuQ0NMVUNyQXNycWY5Zk9wR1VidkNRdzUrWjh0?= =?utf-8?B?THJzUy9jTlV2WC9ya3BnT3gvUFVQVUJqWFJNcWpBTGdoWm1sS3BmZ09aR3R3?= =?utf-8?B?ODY5VEs2TEpucEhaQlM0cG1IOHJYdjZJTHRtK3pRS2pnOTBDVDlaN0FEWVli?= =?utf-8?B?VTRyNmk0MlRsa3BjcDRlR09vUi9taFU1OHVjNjVZeHlsWmJDb1Y3Z1lnZ2k2?= =?utf-8?B?dVd6TWZVVjM4dlArM094eW8wZ21WLzh2MnNaVTF2MDg1NjB1Mlk5YzFkbjQz?= =?utf-8?B?Z2trQVczNkJTcU9waFNCM0VyN1pwNEYzV2hpSThpdytkZ05WdWZjc2NKQ1FI?= =?utf-8?B?QkpRMXpmY25xc1J4eURxV1U2emwzUzkwT0syakNQRU5NR3lKY1RVZklLWlk0?= =?utf-8?B?UlJ1Qnk5SFNobFhFdXRBd29kdUNlZTVBTGtYUEtGYlZLU3lkdFVoSUtqNTNQ?= =?utf-8?B?c3V5eVZhMkVVbzZnSkgrMXZzQ0czRXdlcDgrY2ZLUGc3N1E2RmhRZFF3MnQ3?= =?utf-8?B?MW5abmlSNCtSSEF6a0JLRlRGOVVOQ2xVNkN2dzBTb0EzWG5pMDBHRTZ2eUpI?= =?utf-8?B?cGlYNU0wU21HWDZ6YUVkNW92MjlYSStyYUxkOVZad3haWDBPY3lwYWFydEZl?= =?utf-8?B?RHJDZ1RLMkNrL0svOVpRMGlFRzhiWTkrODk3MGZ6d3VpRGxZZ1JJMWptT2x0?= =?utf-8?B?N3lwS3RvbzBFcFl2NlB3czhSdVhiYjY5bm9ZQk5yZ1JZU2xMRU43TXI4eEhQ?= =?utf-8?B?SWc4QitxWUIweTFsdU5IYlNGSGxpMzRHblIzUlhkbWoySk1zUHB3d2swVkF6?= =?utf-8?B?eU5qQUxXOTlXcmY5bDFHanpiV1NocEhnN3BKMGQxYitKQjZiU0hJNmFLYTZy?= =?utf-8?B?RVRjOVhMdUhKdzJ3UUN4V0plWkx1cWRmODQrU1d4VUdWN0JtVGVwOEU2Ry92?= =?utf-8?B?Yk5uNktwZmVYa1lDS0paWU5hdTQxWVNuTnVrSFUvbmdhZWhqQ3RVbkUxc2Nh?= =?utf-8?B?WnIwbzBDOUhFM1MzQ3JrQzRjY1JOODdYekxoWTBHT01rbDdWR2pYL0h3SlA1?= =?utf-8?B?T3JlTCtWODU3aml3cDljUE5oa3UvTHhFWUUycDkvcDFKOVNmL0g5YkdwdUZO?= =?utf-8?B?SEhIRlJROTZuZDNJemVHSkdPWGNPNUdoNzFiNTJabW5ndEFnVjVTSDJMMkN2?= =?utf-8?B?ZEk2M1Q1RDl3RS9Ca2xCeC9FbzlPQytrYlZRbk5ONmppSjFzQnNHZjVjR1cv?= =?utf-8?B?ZDBqTkdkNm9QWUhKOXVVWXB3bWdWMWhwZDVaN09mazllWHBsV25wOGx2U3Fs?= =?utf-8?B?azExRWlkMGs1aVJCUGxJQS85YjJtaDQxcEVsbVZFc0RUbStnaFBuNXRrWnds?= =?utf-8?B?dVRodkZFb0owMkY2bW9OTnFDdS9WOVMrRDVuVkdmK0s2WkRoZWRaWXlwWUZ6?= =?utf-8?B?TmRTclZta1pNV29kbjNBb1AvR0ViWis2Z280NzlpQy9nOS9nRzJzdkpDVnkw?= =?utf-8?B?YWpGV3dENWJIZlJpRHpQYy9GRlJIRXRVTzRCZmNSY1ZuUml3TzFmUUdscDVt?= =?utf-8?B?SDVhbGFQRWNxSkhoYU03eXNvUlVRNjc3Z0VoanpZUzM2MWJXWVljWHR6MDk5?= =?utf-8?B?clMweVcyTjB6VDdqYTJDcmdrRklFMndHTklUNmlyWHcwdUk3TGJaOGN0RVhu?= =?utf-8?B?L0k5SGkzTFE4TmR5d3phYkhSbldoTTVkblJjSkhSZlRWdjZVaDVvTlF4Y2hi?= =?utf-8?B?bG0vK0l6SG9IVXE0OGVNQVNRQUlkNGZoZHgrdGVTdE91Q1ZxVFl5UlNPRnpu?= =?utf-8?B?K1NVbk9HNkNKbk1jREk3Vi91VXFOVzZtZDlmZnJUaEl4STB6ZEZhWmNHeU5w?= =?utf-8?Q?53Og=3D?=
X-MS-Exchange-CrossTenant-Network-Message-Id: 82ea5125-128d-457a-cb5d-08da0c1c75d0
X-MS-Exchange-CrossTenant-AuthSource: DU2P194MB1709.EURP194.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Mar 2022 15:56:00.4706 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: f930300c-c97d-4019-be03-add650a171c4
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: V/FPZRvIBSpUNEyRGmrvVDeUY4XnKgzSy6U2vs/p39XkrT8tmKCEcNFiIVxa9KExIPlkcVhD1K/lHDBcrmkM5CK+J0/u9HMNGP5zHsm36mc=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1P194MB0654
X-OriginatorOrg: sit.fraunhofer.de
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/ZePO8xbPCOG7VW_6MgEpMTTu9Ak>
Subject: [SCITT] Ad-hoc hybrid Bar BoF
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2022 15:56:16 -0000

Hi SCITT list,

we are having an ad-hoc "Bar" BoF right now in the Vienna venue "Park 
Boardroom". Next to the NOC room on level M1.

Viele Grüße,

Henk


From nobody Thu Mar 24 12:20:29 2022
Return-Path: <housley@vigilsec.com>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B1C4B3A0D6F for <scitt@ietfa.amsl.com>; Thu, 24 Mar 2022 12:20:27 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.907
X-Spam-Level: 
X-Spam-Status: No, score=-6.907 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5sQkGgcI7ojM for <scitt@ietfa.amsl.com>; Thu, 24 Mar 2022 12:20:23 -0700 (PDT)
Received: from mail3.g24.pair.com (mail3.g24.pair.com [66.39.134.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 245263A0D51 for <scitt@ietf.org>; Thu, 24 Mar 2022 12:20:23 -0700 (PDT)
Received: from mail3.g24.pair.com (localhost [127.0.0.1]) by mail3.g24.pair.com (Postfix) with ESMTP id 5A2B66FD1C for <scitt@ietf.org>; Thu, 24 Mar 2022 15:20:22 -0400 (EDT)
Received: from [192.168.1.161] (pool-141-156-161-153.washdc.fios.verizon.net [141.156.161.153]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail3.g24.pair.com (Postfix) with ESMTPSA id 51339A8089 for <scitt@ietf.org>; Thu, 24 Mar 2022 15:20:22 -0400 (EDT)
From: Russ Housley <housley@vigilsec.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_08926910-C157-4369-A24A-5CC509D402A6"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.21\))
Date: Thu, 24 Mar 2022 15:20:21 -0400
References: <70f84b2b-b04f-9962-da18-5b81bafcc196@sit.fraunhofer.de>
To: "scitt@ietf.org" <scitt@ietf.org>
In-Reply-To: <70f84b2b-b04f-9962-da18-5b81bafcc196@sit.fraunhofer.de>
Message-Id: <3C16729E-1370-4A29-AFC4-EB962BD58834@vigilsec.com>
X-Mailer: Apple Mail (2.3445.104.21)
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/-YljS6flpJJdmRn4MGa5Mdag9OI>
Subject: [SCITT] NIST Seeks Input to Update Cybersecurity Framework & Supply Chain Risk Management Resources
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2022 19:20:28 -0000

--Apple-Mail=_08926910-C157-4369-A24A-5CC509D402A6
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

https://content.govdelivery.com/accounts/USNIST/bulletins/30f50da =
<https://content.govdelivery.com/accounts/USNIST/bulletins/30f50da>

This seems relevant to this mail list.

Russ


--Apple-Mail=_08926910-C157-4369-A24A-5CC509D402A6
Content-Transfer-Encoding: 7bit
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv="Content-Type" content="text/html; charset=us-ascii"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; line-break: after-white-space;" class=""><a href="https://content.govdelivery.com/accounts/USNIST/bulletins/30f50da" class="">https://content.govdelivery.com/accounts/USNIST/bulletins/30f50da</a><div class=""><br class=""></div><div class="">This seems relevant to this mail list.</div><div class=""><br class=""></div><div class="">Russ</div><div class=""><br class=""></div></body></html>
--Apple-Mail=_08926910-C157-4369-A24A-5CC509D402A6--


From nobody Thu Mar 24 12:30:44 2022
Return-Path: <kayw@microsoft.com>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F7E13A1273 for <scitt@ietfa.amsl.com>; Thu, 24 Mar 2022 12:30:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level: 
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eswkiMr7Q0qm for <scitt@ietfa.amsl.com>; Thu, 24 Mar 2022 12:30:37 -0700 (PDT)
Received: from na01-obe.outbound.protection.outlook.com (mail-eus2azlp170100002.outbound.protection.outlook.com [IPv6:2a01:111:f403:c110::2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 354FA3A122D for <scitt@ietf.org>; Thu, 24 Mar 2022 12:30:36 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QaOWslqgqmp5Koe4Hg40pzAXL7+dA1neNUsOlwRT+z5b4+Fs4QaMN5ZFx7lNE+yc+wm4Wye/dOjnxlXuzRLm6DEFHMoIyFWOMxs0tiwC0+17ajmPnROKk0VSBAoxzHFEIez55/7qUhHZkavWO0TN0JW94aatGmm5Q9Mp4qm7GUFrO19CAssHyql4hMlpMwqUoi/4Dmp5nj7XoJUWOMfikMUwYKzKKwGdxApqQHp7cexGhO2DwQN8dMmQdaOe+XYyTTWr8d3bPCNyYgOJGYGp7K+zS0OMVexlgiCOt2RRUvElaYUKQSkcTfMn69KEot5qA6IVUnZdHckMDMj2xh0yWg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=qd2BA+nrYzgxqVEyfQUdevqBoFACZo1t718OZc1YNeI=; b=fznZZW0QZiT53AWxwDyPRVUYBDIp7QuByHvmYtNQfhNsn00JqUKn1JWMQU1DeuCk6mTmwpQKhCCvB19MAG+HSOZ2HLFpT8kb29sXazRmwKBWKawd2hXPQB2/dun/SV5ZrTTLRNTWhUDxhXoezEgO/ZTsZuVFlcZfHW+wvHd3fEVsI1VhFyzgz72JIBnY81KuF5fJzP/TGA4KHhYeCjWqMjhQufeNP5j16//OzVkBNdbQ+5akUWI3gr3T9NpUPTAwljF9y6HfD0txm3eUWNnQM2eAt8P2TINOVV9W6J6tzgHSIEkWEU6VyDdrGftlf9AqpoeoMiXv1uq0lLvzvW7CEw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=qd2BA+nrYzgxqVEyfQUdevqBoFACZo1t718OZc1YNeI=; b=ExlL6Hfm3YmegrrYc1N3aHTfIc+I+CAUk6MYT6dW+INB+o5/t2JmxLxDxd3NWnfS+LrBRTFnMkoY8qQv5qGZJCmXlzQEK3uGzn8p1wJsOWOglRFnT2rrS2/ln1F4NbpvvKDg6uKTckrHcDGxBLl7iAgqbDboKFjc9it7d+McDAA=
Received: from BN8PR21MB1138.namprd21.prod.outlook.com (2603:10b6:408:71::33) by SN6PR2101MB1102.namprd21.prod.outlook.com (2603:10b6:805:6::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.10; Thu, 24 Mar 2022 19:30:32 +0000
Received: from BN8PR21MB1138.namprd21.prod.outlook.com ([fe80::1998:226d:a6d9:5e2f]) by BN8PR21MB1138.namprd21.prod.outlook.com ([fe80::1998:226d:a6d9:5e2f%2]) with mapi id 15.20.5123.009; Thu, 24 Mar 2022 19:30:32 +0000
From: Kay Williams <kayw@microsoft.com>
To: Russ Housley <housley@vigilsec.com>, "scitt@ietf.org" <scitt@ietf.org>
Thread-Topic: [SCITT] NIST Seeks Input to Update Cybersecurity Framework & Supply Chain Risk Management Resources
Thread-Index: AQHYP7REYyJ57D0RZUm71x0Wg3QhtqzO6tkg
Date: Thu, 24 Mar 2022 19:30:31 +0000
Message-ID: <BN8PR21MB113881D9B7291A8BDFECA1E6C5199@BN8PR21MB1138.namprd21.prod.outlook.com>
References: <70f84b2b-b04f-9962-da18-5b81bafcc196@sit.fraunhofer.de> <3C16729E-1370-4A29-AFC4-EB962BD58834@vigilsec.com>
In-Reply-To: <3C16729E-1370-4A29-AFC4-EB962BD58834@vigilsec.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2022-03-24T19:30:31Z;  MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=1bcd7990-5bb3-451e-a99d-bc431a7995c8; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6ff82c09-6427-441f-3b67-08da0dccc2fd
x-ms-traffictypediagnostic: SN6PR2101MB1102:EE_
x-ms-exchange-atpmessageproperties: SA|SL
x-microsoft-antispam-prvs: <SN6PR2101MB1102EC97ACF7B1E70719F265C5199@SN6PR2101MB1102.namprd21.prod.outlook.com>
x-o365-sonar-daas-pilot: True
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:BN8PR21MB1138.namprd21.prod.outlook.com; PTR:; CAT:NONE;  SFS:(13230001)(4636009)(366004)(451199009)(86362001)(110136005)(66946007)(76116006)(316002)(966005)(38070700005)(64756008)(8676002)(66446008)(66476007)(10290500003)(66556008)(508600001)(52536014)(38100700002)(166002)(8936002)(71200400001)(122000001)(82960400001)(82950400001)(5660300002)(9326002)(55016003)(83380400001)(8990500004)(4744005)(7696005)(53546011)(15650500001)(2906002)(9686003)(33656002)(6506007)(186003); DIR:OUT; SFP:1102; 
x-ms-exchange-antispam-messagedata-chunkcount: 2
x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?vUEdUtYUaTE8XMxtAll8/J1ZuIGo0V64U4sbzOOCbBlKrvvaE7lVoZnzLxWO?= =?us-ascii?Q?5xjS8aTcqndu6EUloPOBvxDjyYHAkAg332lIp+vLCDL988T9CjtXP9nQL9b4?= =?us-ascii?Q?tAhMconD7Lmydx4LThvuR1B8MymgrMxvSs947tIm8mQlpZt3M99w/TXcNaFv?= =?us-ascii?Q?LMCDxaIuEdpgbI6SC+Cv9A6lZx7WjFruyinJytWAN3oFELFUBuseTpVDO4mH?= =?us-ascii?Q?oStT9HmsMGLzmIo6hQ1Z8kQb/lFUJ45kT6hTKL3wGyZwgABQhOqcTN57h04s?= =?us-ascii?Q?Nb/oE4NRx1KShyn3qx0vFfeyOdYwgOCICI8WpJ1PIThClip2myfja0ct35jx?= =?us-ascii?Q?VBhqCOxPS0pB8VBR3iM4ehZ+jke7Ll/V0fPYaCeeSSPzmMa5V3j5KfaR9JE8?= =?us-ascii?Q?9Rv3HYM4ohO5muI4DcLBv2KCBlDtzMpDmCEf+qF/UBZ1PLriv3iPpCEIK045?= =?us-ascii?Q?Mz5FGNACLY0hP+HgZZs+F8oSKwkGsJWZVzYDXVBdZpQka9HF/vDg920Z0hv8?= =?us-ascii?Q?udN/3Bxf0SbFnaEDSTIXItxVgLuKQrYNZ1KsNg4DZ8wV3Olj80lHTkjAO5/d?= =?us-ascii?Q?rzvOT/DG7H6GCgWrGrnOQc7ymjb9G6GxnB8rnb9r7Xs28U4mLDGNioXH+20t?= =?us-ascii?Q?SZ8hP10ehQGtDfsMwQ6GfbrQEMfdMVSszDaF1uYrJd5aFofKQuA3R/vOsX9J?= =?us-ascii?Q?VgbXyjf6CYYCZNiF2zAnW/9kM5wR2iFMR2WjvsPc+k+nRH32rLkkMW4Wxe9Y?= =?us-ascii?Q?kr5uE8GAbdLk0XdcpBluCTfhqeM6/Z7iu8uz8gK8pmoU/2/wVVbzUoy95lzD?= =?us-ascii?Q?SNxFCW8g1fgTmEIQIOoOeaKDBfaff6ZQ+7w7MkhBiFdpBfvzkJPx9kuzkUFM?= =?us-ascii?Q?1Pr7+MnjLa6zreImLksgREv8D2Ql1mR/Jxj6XAkZKhWolDvpOV4CdBEnbPN1?= =?us-ascii?Q?taHa3I9KIgTMvVZRGwyDNwfpuiyYyYgo6zmdDNvvl/rW4sjOAN/QIYwXLMzU?= =?us-ascii?Q?1rNP0Gj+DZKzCt6toEwtq3WMr1sdMAIopp3cvtyqtJfbUzRJk1EZGMnYK1EY?= =?us-ascii?Q?AS3PwB+unyKWWdnzZJ1W1W5qruIWv0RhvVyoDeUhRqRfS0BN3R/cfxJQt9iJ?= =?us-ascii?Q?M7cOHCJ4TyMUf1gUsqbwOIhSJjU3Kmy0t+gU1g4c3423kvkABMGe64y0pP+Z?= =?us-ascii?Q?n9t8hfSs++buHdTgGWTyP6AiCfBAawkQyOi5Q+5JKtco4iKW8mIrwD6RENIT?= =?us-ascii?Q?WPMaQMEm5F+PkSgN04F7JdEiJyVn/WD+FiQRj/e2dBqhK01IefglccTtl9PW?= =?us-ascii?Q?5wZeORtLtGkkMhz69AS+3Q9DmNtPPt7idE9r4Ljn35kMutES7oMmUgKqF+WH?= =?us-ascii?Q?0mOxmVAAW4uuIvkfbCkIS80QUpq+cKn8UiVZe9ReDvrHEFnFSf5JR4CUZE0q?= =?us-ascii?Q?VsyKUEehrg5OjGsTzNJI49BowPCZx6JrpHqIjLATTcPn18t/OWe5l6VlNJ6J?= =?us-ascii?Q?olLxNnQcTIcP6tVK6dVecDdImSRA+0bH+I2rYuNUS0saC74CcWUyuAmMjfsi?= =?us-ascii?Q?T/ut9HEjHAHu7oq39w4PYY0zXBMWBT76sYcp+FJYlur/ZsmtwohlKx8vxBdr?= =?us-ascii?Q?kdNxpQsVH8V+4FnvFPmqt+qYhcn9j7lTJqLdC5nqnOQgoDcK/1cM7vDUskRz?= =?us-ascii?Q?8LWUnKnUqeEn+ctBS88D3avqbvNlECd9UtHNbxAkEfOkm47accc3ZN+kXP1X?= =?us-ascii?Q?aianY9JTnl1A6rsiP2tp4b7Jt5iJG5b6pr97xrsAFYjD3291aLFkTZ1d7TPm?=
x-ms-exchange-antispam-messagedata-1: vrss6FIhgdt0WQ==
Content-Type: multipart/alternative; boundary="_000_BN8PR21MB113881D9B7291A8BDFECA1E6C5199BN8PR21MB1138namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BN8PR21MB1138.namprd21.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6ff82c09-6427-441f-3b67-08da0dccc2fd
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 Mar 2022 19:30:32.0311 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: dIgRZPkPKeNIn5pWLiwkqIBGIAl6CCpfh/0nJfPeKBqrw5/3qE9JbOqCpeqJM0babziE4NDV8B+IsIiMISyljQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR2101MB1102
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/MNk_nJy2JpnQh3xZH3-RDQpsZgs>
Subject: Re: [SCITT] NIST Seeks Input to Update Cybersecurity Framework & Supply Chain Risk Management Resources
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2022 19:30:42 -0000

--_000_BN8PR21MB113881D9B7291A8BDFECA1E6C5199BN8PR21MB1138namp_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi Russ,

Thanks for forwarding.  Yes, this extremely relevant. Microsoft will be men=
tioning the SCITT initiative in our response to the request for input on 'E=
valuating and Improving Cybersecurity Supply Chain Risk Management'. Others=
 may wish to do likewise.

Kay

From: SCITT <scitt-bounces@ietf.org> On Behalf Of Russ Housley
Sent: Thursday, March 24, 2022 12:20 PM
To: scitt@ietf.org
Subject: [SCITT] NIST Seeks Input to Update Cybersecurity Framework & Suppl=
y Chain Risk Management Resources

https://content.govdelivery.com/accounts/USNIST/bulletins/30f50da<https://n=
am06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fcontent.govdeliv=
ery.com%2Faccounts%2FUSNIST%2Fbulletins%2F30f50da&data=3D04%7C01%7Ckayw%40m=
icrosoft.com%7C52226d1eaa71480a41ec08da0dcb5d6b%7C72f988bf86f141af91ab2d7cd=
011db47%7C1%7C0%7C637837464487651784%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLj=
AwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=3D0gnWCrT=
prKftgEOvUmk2ZnEcyIpi1OdoWZbWK78bOz4%3D&reserved=3D0>

This seems relevant to this mail list.

Russ


--_000_BN8PR21MB113881D9B7291A8BDFECA1E6C5199BN8PR21MB1138namp_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple" style=3D"word-wrap:brea=
k-word">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Hi Russ,<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Thanks for forwarding.&nbsp; Yes, this extremely rel=
evant. Microsoft will be mentioning the SCITT initiative in our response to=
 the request for input on &#8216;Evaluating and Improving Cybersecurity Sup=
ply Chain Risk Management&#8217;. Others may wish to
 do likewise.<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Kay<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b>From:</b> SCITT &lt;scitt-bounces@ietf.org&gt; <b=
>On Behalf Of </b>
Russ Housley<br>
<b>Sent:</b> Thursday, March 24, 2022 12:20 PM<br>
<b>To:</b> scitt@ietf.org<br>
<b>Subject:</b> [SCITT] NIST Seeks Input to Update Cybersecurity Framework =
&amp; Supply Chain Risk Management Resources<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><a href=3D"https://nam06.safelinks.protection.outloo=
k.com/?url=3Dhttps%3A%2F%2Fcontent.govdelivery.com%2Faccounts%2FUSNIST%2Fbu=
lletins%2F30f50da&amp;data=3D04%7C01%7Ckayw%40microsoft.com%7C52226d1eaa714=
80a41ec08da0dcb5d6b%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6378374644=
87651784%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTi=
I6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=3D0gnWCrTprKftgEOvUmk2ZnEcyIpi1Od=
oWZbWK78bOz4%3D&amp;reserved=3D0">https://content.govdelivery.com/accounts/=
USNIST/bulletins/30f50da</a>
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">This seems relevant to this mail list.<o:p></o:p></p=
>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Russ<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</div>
</body>
</html>

--_000_BN8PR21MB113881D9B7291A8BDFECA1E6C5199BN8PR21MB1138namp_--


From nobody Thu Mar 24 12:30:54 2022
Return-Path: <mprorock@mesur.io>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 367183A12B8 for <scitt@ietfa.amsl.com>; Thu, 24 Mar 2022 12:30:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level: 
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=mesur-io.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oKn0tYqz2cna for <scitt@ietfa.amsl.com>; Thu, 24 Mar 2022 12:30:40 -0700 (PDT)
Received: from mail-vs1-xe36.google.com (mail-vs1-xe36.google.com [IPv6:2607:f8b0:4864:20::e36]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 494FE3A1259 for <scitt@ietf.org>; Thu, 24 Mar 2022 12:30:40 -0700 (PDT)
Received: by mail-vs1-xe36.google.com with SMTP id o67so6059759vsc.0 for <scitt@ietf.org>; Thu, 24 Mar 2022 12:30:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mesur-io.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=+POadNIlhboeqGJFUvYC1sYFlcOViSOt1QAaZDksd5M=; b=7LfdHWJC/bRUWhlG0rV9+CpgIBJ+lscsf/ZYNGMx7NAoKpThDPdqAjW2IuUv9MMkYe gwK84w45um/YbdZz+s+ckQ6Y/PYxx+4XZdZvHnR6qvB2OZF2oeCu3Zn4qNkWLhTh3R1y qHQm1c0pmDCrW4TRjPM8aVxI2/6ywUglX1l81JH3qKltq/XEphs7qAPi3TIm/HryyyOb 91xQbXM8x0Z+d22dGWMC11L5EUpWsWwWYy/KbE3cki3kTGSLNyCcLiG7beA5Nxzik6TT TlFqCwse68uBWzAz2in+54Zm5yrI48UPuraAQzPpx5EYBpQyHCGehcktJSq6gzhJ3T1/ sYaw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=+POadNIlhboeqGJFUvYC1sYFlcOViSOt1QAaZDksd5M=; b=GY7kF0eDcJ2XB1Q0k9/koehNxoiiCaZ3CRp+ku46U08cUmg8GN0XAJgIW5bnZAE+2+ Kj8TwVFyudyQuWzWKFuGREZZT27a9dhKIX0rNo5ZSaZohibdg7+h3eeyjzKTguhAPntK slx7SixAOOVhoSX5XtLOea66nyEhR6GQJhJXyx1PaBsC0LBwdnBSlSK859Q1ZBQwcLji vXVnla6DCc+QPiymKn+TdScyGlRxoVrbsrXSl6MyqOK9He2lXZS/QNpruPcIe49j7T9O 0e170yQQV1yfeT9+y9DBJ1QemrKv9q9D1mqOM7M80QEg1ShW9c3w1SgiSfyvjwtj2Fjm WuWQ==
X-Gm-Message-State: AOAM531J7DM5xBhmg2x3aQWJ4ZyR/Jd9UhvhD6/IM9AICPgiEImpS9tt ptlieI2eLUTvDFe+bXZc+FWaOchTq88YMyqSI+tE
X-Google-Smtp-Source: ABdhPJyhzg+w79vqwnJlro0vwrJ0qLC2EDFwlhqj26/CdGN8yUfub7QQsXwJzdT3zmNGyhlVhkzp0gI11KmQMtS8Zfc=
X-Received: by 2002:a05:6102:302a:b0:325:4cea:b1c8 with SMTP id v10-20020a056102302a00b003254ceab1c8mr3228462vsa.75.1648150238863; Thu, 24 Mar 2022 12:30:38 -0700 (PDT)
MIME-Version: 1.0
References: <70f84b2b-b04f-9962-da18-5b81bafcc196@sit.fraunhofer.de> <3C16729E-1370-4A29-AFC4-EB962BD58834@vigilsec.com>
In-Reply-To: <3C16729E-1370-4A29-AFC4-EB962BD58834@vigilsec.com>
From: Mike Prorock <mprorock@mesur.io>
Date: Thu, 24 Mar 2022 15:30:27 -0400
Message-ID: <CAGJKSNShHhGfmZ6hMOZCDP4XagW7dQ9BRSSCxvgWcKetghiecg@mail.gmail.com>
To: Russ Housley <housley@vigilsec.com>
Cc: scitt@ietf.org, "John, Anil" <anil.john@hq.dhs.gov>
Content-Type: multipart/alternative; boundary="000000000000863c0205dafbe178"
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/5cEQld7e5tYqZ9Kd5iZiUoANqnA>
Subject: Re: [SCITT] NIST Seeks Input to Update Cybersecurity Framework & Supply Chain Risk Management Resources
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 24 Mar 2022 19:30:46 -0000

--000000000000863c0205dafbe178
Content-Type: text/plain; charset="UTF-8"

Very much so.  Thanks for sharing Russ.

Looping in Anil to see if he as any thoughts on this as well.

Mike Prorock
mesur.io

On Thu, Mar 24, 2022, 15:20 Russ Housley <housley@vigilsec.com> wrote:

> https://content.govdelivery.com/accounts/USNIST/bulletins/30f50da
>
> This seems relevant to this mail list.
>
> Russ
>
> --
> SCITT mailing list
> SCITT@ietf.org
> https://www.ietf.org/mailman/listinfo/scitt
>

--000000000000863c0205dafbe178
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto">Very much so.=C2=A0 Thanks=C2=A0for sharing Russ.<div dir=
=3D"auto"><br></div><div dir=3D"auto">Looping in Anil to see if he as any t=
houghts on this as well.<br><br><div data-smartmail=3D"gmail_signature" dir=
=3D"auto">Mike Prorock<br><a href=3D"http://mesur.io">mesur.io</a></div></d=
iv></div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_att=
r">On Thu, Mar 24, 2022, 15:20 Russ Housley &lt;<a href=3D"mailto:housley@v=
igilsec.com">housley@vigilsec.com</a>&gt; wrote:<br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padd=
ing-left:1ex"><div style=3D"word-wrap:break-word;line-break:after-white-spa=
ce"><a href=3D"https://content.govdelivery.com/accounts/USNIST/bulletins/30=
f50da" target=3D"_blank" rel=3D"noreferrer">https://content.govdelivery.com=
/accounts/USNIST/bulletins/30f50da</a><div><br></div><div>This seems releva=
nt to this mail list.</div><div><br></div><div>Russ</div><div><br></div></d=
iv>-- <br>
SCITT mailing list<br>
<a href=3D"mailto:SCITT@ietf.org" target=3D"_blank" rel=3D"noreferrer">SCIT=
T@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/scitt" rel=3D"noreferrer n=
oreferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/scitt</a=
><br>
</blockquote></div>

--000000000000863c0205dafbe178--


From nobody Sun Mar 27 08:52:01 2022
Return-Path: <kayw@microsoft.com>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 58F743A0CF1 for <scitt@ietfa.amsl.com>; Sun, 27 Mar 2022 08:51:59 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.114
X-Spam-Level: 
X-Spam-Status: No, score=-0.114 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URI_TRY_3LD=1.997] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id T0pKCMZiINUf for <scitt@ietfa.amsl.com>; Sun, 27 Mar 2022 08:51:55 -0700 (PDT)
Received: from na01-obe.outbound.protection.outlook.com (mail-cusazon11020022.outbound.protection.outlook.com [52.101.61.22]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E118A3A0CE1 for <scitt@ietf.org>; Sun, 27 Mar 2022 08:51:54 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=gD/aPCLop0pJrm6jWOhaGXSA3nk56lU5NTY8Ucf4S5QIG3zRPe0GgQo5i06zb0mxEP2cSjOeBAEJ9uqmlYcKdWaM9Pdt2vGhHAMSKEWCiq420OG4YUi1weDAXi2or6Y2xi8dDxYlN0v4u+04bbjGMWinw0/2MmmKol+2Sp7HFI9M3f8+gxrkuOcsJs807X3/khb2gpc0WP2T4x7kdH5Am21BiDsAZkbxlyNIt87ldAYktbhpL3bYZ4+w9E0SaXxUL+MhJAsEfg/q1t5QM7ISinOLFeNDfiUOvs0QxjrtUjiFIxPxPZ+IgI+b+8450z6FquwQRswAaKXW+BbmVbpMQg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;  s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=GBbUn6Fd0SGHV4dU0AXt8lFnSjlLCM8giWq+iUfLEZ4=; b=cB0Zy0mD423Av8rJuJJqT3rrnYrWndEtTSPYHpiCR38BxO5q2Mxf/HR9g36ZPuXEtmYlLqtoxV4hW3h85WnEBnEPa6qHL3OC9uiQP4L6S3FGIW5Ql8NaIe3cAlgAGjr07rGzsBtFNOssnOr2Uh8LP/cq6PCKlbIpJTTw/uXEl5L8PfI+CXKjkhkicy39vDxuVE/+IK68nzq7qqDCU5MtE/F1AHIrz62XH6T9yKQ2QyfKea2bHTDsUlWzGMWxGAwtd4Pto2pTHH8Oyiotkbt2kZrV0GPH/TvDGo1Wf0EYqoEMZaR/p5kR6SAUTI3dQfIonuyU+S8X2sM8bQixbmXAYw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GBbUn6Fd0SGHV4dU0AXt8lFnSjlLCM8giWq+iUfLEZ4=; b=GgOFjb0VnfivKoFwkVnGATS3G+RqMsItSAeaCjxU6PwjsYOalLxtktSmNL8du0cJzRIh1JY3OdV6+LQ7uVEsXfjVSqf+6Er9zHqVO85JDqDoV/EYa5abI3TcKLR0SgNClJpvuxVvzEYTuhokKopO4FQgs5emrTnNUbmJuPa4tB8=
Received: from DM6PR21MB1148.namprd21.prod.outlook.com (2603:10b6:5:16d::28) by SJ0PR21MB2040.namprd21.prod.outlook.com (2603:10b6:a03:395::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5123.15; Sun, 27 Mar 2022 15:51:48 +0000
Received: from DM6PR21MB1148.namprd21.prod.outlook.com ([fe80::17a:60d8:7f57:e0cc]) by DM6PR21MB1148.namprd21.prod.outlook.com ([fe80::17a:60d8:7f57:e0cc%5]) with mapi id 15.20.5123.015; Sun, 27 Mar 2022 15:51:47 +0000
From: Kay Williams <kayw@microsoft.com>
To: "scitt@ietf.org" <scitt@ietf.org>
Thread-Topic: SCITT Community Meeting Agenda - 3/28
Thread-Index: AdhB8j+BOlIWNDjqRpW6Tm7pp2HzEA==
Date: Sun, 27 Mar 2022 15:51:47 +0000
Message-ID: <DM6PR21MB1148FB3CC332D17DCAE54E6BC51C9@DM6PR21MB1148.namprd21.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2022-03-27T15:49:04Z;  MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=ef32e1c6-cc63-40f4-a4c8-a969ee1d6333; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 646d4f5c-c039-41f7-8170-08da1009b38e
x-ms-traffictypediagnostic: SJ0PR21MB2040:EE_
x-ms-exchange-atpmessageproperties: SA|SL
x-microsoft-antispam-prvs: <SJ0PR21MB2040515CC070151F875F3931C51C9@SJ0PR21MB2040.namprd21.prod.outlook.com>
x-o365-sonar-daas-pilot: True
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:;  IPV:NLI; SFV:NSPM; H:DM6PR21MB1148.namprd21.prod.outlook.com; PTR:; CAT:NONE;  SFS:(13230001)(4636009)(366004)(451199009)(6506007)(33656002)(38070700005)(7696005)(9686003)(64756008)(71200400001)(66446008)(76116006)(6916009)(66946007)(66476007)(86362001)(122000001)(5660300002)(82960400001)(82950400001)(2906002)(186003)(66556008)(8676002)(10290500003)(8936002)(166002)(40140700001)(52536014)(83380400001)(55016003)(508600001)(8990500004)(38100700002)(316002)(15940465004); DIR:OUT; SFP:1102; 
x-ms-exchange-antispam-messagedata-chunkcount: 2
x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?AZwv/xzxZU53qTkSq/pnXFxOHJ0GJQMw6rg8p8tSphqcH3iyVsmaBGKsAm5u?= =?us-ascii?Q?NYOQNjqskBtZ6lXzOuwVHYHYuZhXp7a8wGyXbCBg9TrBAtesCKdhgjyqKA2y?= =?us-ascii?Q?1LHxSqYs6xtYXSqzdfUdei6pkorMLuxBdoHCL+KytYZU6vD8ouUhAoyY5rCz?= =?us-ascii?Q?26oaZrBo7jCinxIHMQONp6dHu09AAJIXXfbSgRzb4skXkRWHPg4+WGOTaQd/?= =?us-ascii?Q?nJJjIelsceK55k2gl0welTFyAO+wVElt3Si+6298Dcs1NGbdMvaBHjXIZ7SY?= =?us-ascii?Q?QB5bicNUusJ423sbhf6FiN2mQ6PnepTl36nXEfx1pCscdX7r+r1moylNu8ob?= =?us-ascii?Q?Uz/g9JlM8zjC2+ia9HrBlGF5f4e5jFcwQWHh0TBGb+pTBD5qmZiXs8jWZ4RX?= =?us-ascii?Q?XkFQrroSHuyjufsBlYHynvjUCck+arzEvUjRHwGuDUgCVtwpjWhJ9R1jsege?= =?us-ascii?Q?Z0qOUr9j+UTi//nescWgR5BgLxC8DlZtx0+82+hWz+dWodyAck1pp4Oqf8hM?= =?us-ascii?Q?wEp3dQffhqHikA53ztODoJ/WtR1VHWbIcpX9Jxq/6SejLhNRfEl19Agh+nEj?= =?us-ascii?Q?E65W2wrcHL3d4RBQ/psfHzpWxQ6fpqxDZSPku+y0dDmsEFiYX+5kqWXlvrZ3?= =?us-ascii?Q?WUL83hXFMDYOJ9KZusdQL//02mGsbneqiaYvAV40fvk0Tj6Nt3Gq6XCEbYdK?= =?us-ascii?Q?JBWIkwmcjzOb5BXu2xPvut5RQTYB5NF6p7P8Db3uce6nGLgcHGPO3pzLGete?= =?us-ascii?Q?12fjq5czVUwo8NuPg2PABQKwBi/NBGDieMTLb5YvEHyZj9sMN3PtFRCIFZy2?= =?us-ascii?Q?qMWU5pl7nXNymbtUXw7qJWl0j2gANRBFvx7KFiEb6Les9lpdrBUzY/CwqLEg?= =?us-ascii?Q?Km0iuUWAruQ7hgvueoG3nfOckUrBX5ofVzvQD7Pf3v+dWBR/CYlzepUIL04F?= =?us-ascii?Q?35TuaehWP/ldKd8fKzMJ7MRKTv6VJ8oIqEfABJ6YdcdL4y8yTMks9yloscAl?= =?us-ascii?Q?rbrFE+POhBmua0cCTvBx5hfw9n/9qSQlzP/1diwB49oMrbNHQA9LU+dDDFvH?= =?us-ascii?Q?q1hoAdM8TY4rWeQKnkijgjXtbHr9j+L/ZFjhnTe9N72u3M2tr7quHftVtQCm?= =?us-ascii?Q?z+bo/2U0DD7g2EfpjjyUKK/icOdA4fzTpe5p6C9bk8lhK8ya3dTlxJwp2JgD?= =?us-ascii?Q?r/CxW41z8XcFfNKGs07fgGZxJZnILketjCKbxXG1MtpbuhQLaTRBo5K0ebzt?= =?us-ascii?Q?vxRaEXzUPE+dof/aJ2kFysOZLYHe4c+3ws20WqWRfjKBqnO50fuWHwZzZazF?= =?us-ascii?Q?t3p4xu53Lq5TuUfbDAf9lYmIOK02KDpQpt/9LInq3Ab/vI3Jmj7QY1hhWiGf?= =?us-ascii?Q?0OQ3DZdAfOYvk5iWlV3wRwVwfOqdtzW88VCg1w9JK6WGBQdxvXpPP6fdd3cR?= =?us-ascii?Q?CQHbM2Wxd38qTPaY4r6nhDRVtbHD+qsm6DeT2o8hxu18QC00Hngy9rO0+4cK?= =?us-ascii?Q?rdxGMrHMSZvbyutZe5R5LyPGVUWp2nky737e35Nq2Nk+39u5tBCjKFiEj2sc?= =?us-ascii?Q?ZlKw13A6oMaPro0wx9ZkSVEcmLQntdMeQUYka7kHFHqsI+EXcWExY3yde9ma?= =?us-ascii?Q?J5fWbJC7Fz9i5Vprx8JTCLU8GpyzYdkfrM9qCa3e5fz7Rdd1KLhwXRxIluGg?= =?us-ascii?Q?H/9wes/V7JJ9+KMbvzoR3Y3zi/hLixed8OqztOYtydEkX8hd+QCUlfsoSshA?= =?us-ascii?Q?LyXVMo/9yGsex+TXmnIqReF+HHyXP3MfxItbAEfNedUWSLK6fwz7H+KIWU2k?=
x-ms-exchange-antispam-messagedata-1: Q3Toig6cmULCkA==
Content-Type: multipart/alternative; boundary="_000_DM6PR21MB1148FB3CC332D17DCAE54E6BC51C9DM6PR21MB1148namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: DM6PR21MB1148.namprd21.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 646d4f5c-c039-41f7-8170-08da1009b38e
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Mar 2022 15:51:47.7957 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: s0Aydmp/pBqRDWvmqOwZw52bEVomD+JhDRiE3bO9QTH3Az8HACOolNa0lmbXpTSYgNbIZRO7mh3l0HpqyZ+PgA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR21MB2040
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/TlhkEZCcJLgLuix32kmbY4P8ZsY>
Subject: [SCITT] SCITT Community Meeting Agenda - 3/28
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 27 Mar 2022 15:52:00 -0000

--_000_DM6PR21MB1148FB3CC332D17DCAE54E6BC51C9DM6PR21MB1148namp_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Hi all,

Here is a proposed agenda for our Monday 3/28 8:05 Pacific SCITT community =
meeting (see meeting details at bottom of message).


  *   IETF Security Dispatch Meeting
     *   Feedback
        *   Expansive vision, need to make concrete progress
        *   Need participation from other initiatives, e.g. binary transpar=
ency, certificate transparency, sigstore
        *   Advance to BOF stage
     *   Next steps
        *   Next quarterly meeting July 23-29, 2022. Philadelphia.
  *   COSE
     *   go-cose library updates and next steps (Yogesh, Steve)
  *   Notary Use Case
     *   updates and next steps (Steve)
  *   US Executive Order Conformance Use Case
     *   updates and next steps (Kay)

Please reach out with any additions or questions.

Kay

GitHub:  Supply Chain Integrity, Transparency, and Trust (github.com)<https=
://github.com/ietf-scitt>
Meeting agenda and notes: SCITT Community Meeting Agenda and Notes - Google=
 Docs<https://docs.google.com/document/d/1vf-EliXByhg5HZfgVbTqZhfaJFCmvMdQu=
Z4tC-Eq6wg/edit>
Mailing list: SCITT Info Page (ietf.org)<https://www.ietf.org/mailman/listi=
nfo/scitt>

Microsoft Teams meeting
Join on your computer or mobile app
Click here to join the meeting<https://teams.microsoft.com/l/meetup-join/19=
%3ameeting_YWI2YzM0YmYtYmJkOC00ODg2LWI1MmItYmJmZWM1OTI4Y2Ex%40thread.v2/0?c=
ontext=3D%7b%22Tid%22%3a%2272f988bf-86f1-41af-91ab-2d7cd011db47%22%2c%22Oid=
%22%3a%22531852bd-66b0-45f7-abad-b1e0ad3b3a32%22%7d>
Join with a video conferencing device
813878896@t.plcm.vc<mailto:813878896@t.plcm.vc>
Video Conference ID: 112 827 551 0
Alternate VTC dialing instructions<https://dialin.plcm.vc/teams/?key=3D8138=
78896&conf=3D1128275510>
Or call in (audio only)
+1 425-616-0754,,203402542#<tel:+14256160754,,203402542#>   United States, =
Seattle
Phone Conference ID: 203 402 542#
Find a local number<https://dialin.teams.microsoft.com/8551f4c1-bea3-441a-8=
738-69aa517a91c5?id=3D203402542> | Reset PIN<https://mysettings.lync.com/ps=
tnconferencing>


--_000_DM6PR21MB1148FB3CC332D17DCAE54E6BC51C9DM6PR21MB1148namp_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 15 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:"Segoe UI";
	panose-1:2 11 5 2 4 2 4 2 2 3;}
@font-face
	{font-family:"Segoe UI Semibold";
	panose-1:2 11 7 2 4 2 4 2 2 3;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	font-size:11.0pt;
	font-family:"Calibri",sans-serif;
	mso-ligatures:standardcontextual;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:#0563C1;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-compose;
	font-family:"Calibri",sans-serif;
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	mso-ligatures:standardcontextual;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:422607210;
	mso-list-template-ids:1768977296;}
@list l0:level1
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Symbol;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:1.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:"Courier New";
	mso-bidi-font-family:"Times New Roman";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:1.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:2.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:2.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:3.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:3.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:4.0in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:4.5in;
	mso-level-number-position:left;
	text-indent:-.25in;
	mso-ansi-font-size:10.0pt;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"#0563C1" vlink=3D"#954F72" style=3D"word-wrap:=
break-word">
<div class=3D"WordSection1">
<p class=3D"MsoNormal">Hi all, <o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Here is a proposed agenda for our Monday 3/28 8:05 P=
acific SCITT community meeting (see meeting details at bottom of message).<=
o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<ul style=3D"margin-top:0in" type=3D"disc">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level1 lfo1">IETF Security Dis=
patch Meeting<o:p></o:p></li><ul style=3D"margin-top:0in" type=3D"circle">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level2 lfo1">Feedback<o:p></o:=
p></li><ul style=3D"margin-top:0in" type=3D"square">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level3 lfo1">Expansive vision,=
 need to make concrete progress<o:p></o:p></li><li class=3D"MsoNormal" styl=
e=3D"mso-list:l0 level3 lfo1">Need participation from other initiatives, e.=
g. binary transparency, certificate transparency, sigstore<o:p></o:p></li><=
li class=3D"MsoNormal" style=3D"mso-list:l0 level3 lfo1">Advance to BOF sta=
ge<o:p></o:p></li></ul>
<li class=3D"MsoNormal" style=3D"mso-list:l0 level2 lfo1">Next steps<o:p></=
o:p></li><ul style=3D"margin-top:0in" type=3D"square">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level3 lfo1">Next quarterly me=
eting July 23-29, 2022. Philadelphia.<o:p></o:p></li></ul>
</ul>
<li class=3D"MsoNormal" style=3D"mso-list:l0 level1 lfo1">COSE<o:p></o:p></=
li><ul style=3D"margin-top:0in" type=3D"circle">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level2 lfo1">go-cose library u=
pdates and next steps (Yogesh, Steve)<o:p></o:p></li></ul>
<li class=3D"MsoNormal" style=3D"mso-list:l0 level1 lfo1">Notary Use Case<o=
:p></o:p></li><ul style=3D"margin-top:0in" type=3D"circle">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level2 lfo1">updates and next =
steps (Steve)<o:p></o:p></li></ul>
<li class=3D"MsoNormal" style=3D"mso-list:l0 level1 lfo1">US Executive Orde=
r Conformance Use Case<o:p></o:p></li><ul style=3D"margin-top:0in" type=3D"=
circle">
<li class=3D"MsoNormal" style=3D"mso-list:l0 level2 lfo1">updates and next =
steps (Kay)<o:p></o:p></li></ul>
</ul>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Please reach out with any additions or questions.<o:=
p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Kay<o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">GitHub: &nbsp;<a href=3D"https://github.com/ietf-sci=
tt">Supply Chain Integrity, Transparency, and Trust (github.com)</a><o:p></=
o:p></p>
<p class=3D"MsoNormal">Meeting agenda and notes: <a href=3D"https://docs.go=
ogle.com/document/d/1vf-EliXByhg5HZfgVbTqZhfaJFCmvMdQuZ4tC-Eq6wg/edit">
SCITT Community Meeting Agenda and Notes - Google Docs</a><o:p></o:p></p>
<p class=3D"MsoNormal">Mailing list: <a href=3D"https://www.ietf.org/mailma=
n/listinfo/scitt">
SCITT Info Page (ietf.org)</a><o:p></o:p></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:18.0pt;font-family:&quot;Se=
goe UI&quot;,sans-serif;color:#252424">Microsoft Teams meeting</span><span =
style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;color:#252424">
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.5pt;font-family:&quot=
;Segoe UI&quot;,sans-serif;color:#252424">Join on your computer or mobile a=
pp</span></b><b><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;=
color:#252424">
<o:p></o:p></span></b></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Segoe UI&quot;,sans=
-serif;color:#252424"><a href=3D"https://teams.microsoft.com/l/meetup-join/=
19%3ameeting_YWI2YzM0YmYtYmJkOC00ODg2LWI1MmItYmJmZWM1OTI4Y2Ex%40thread.v2/0=
?context=3D%7b%22Tid%22%3a%2272f988bf-86f1-41af-91ab-2d7cd011db47%22%2c%22O=
id%22%3a%22531852bd-66b0-45f7-abad-b1e0ad3b3a32%22%7d" target=3D"_blank"><s=
pan style=3D"font-size:10.5pt;font-family:&quot;Segoe UI Semibold&quot;,san=
s-serif;color:#6264A7">Click
 here to join the meeting</span></a> <o:p></o:p></span></p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.5pt;font-family:&quot=
;Segoe UI&quot;,sans-serif;color:#252424">Join with a video conferencing de=
vice</span></b><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;c=
olor:#252424">
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Se=
goe UI&quot;,sans-serif;color:#252424"><a href=3D"mailto:813878896@t.plcm.v=
c">813878896@t.plcm.vc</a>
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Se=
goe UI&quot;,sans-serif;color:#252424">Video Conference ID:
</span><span style=3D"font-size:12.0pt;font-family:&quot;Segoe UI&quot;,san=
s-serif;color:#252424">112 827 551 0
</span><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;color:#25=
2424"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Se=
goe UI&quot;,sans-serif;color:#252424"><a href=3D"https://dialin.plcm.vc/te=
ams/?key=3D813878896&amp;conf=3D1128275510"><span style=3D"color:#6264A7">A=
lternate VTC dialing instructions</span></a>
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.5pt;font-family:&quot=
;Segoe UI&quot;,sans-serif;color:#252424">Or call in (audio only)</span></b=
><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;color:#252424">
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Segoe UI&quot;,sans=
-serif;color:#252424"><a href=3D"tel:+14256160754,,203402542# "><span style=
=3D"font-size:10.5pt;color:#6264A7">+1 425-616-0754,,203402542#</span></a>
</span><span style=3D"font-size:10.5pt;font-family:&quot;Segoe UI&quot;,san=
s-serif;color:#252424">&nbsp; United States, Seattle
</span><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;color:#25=
2424"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Se=
goe UI&quot;,sans-serif;color:#252424">Phone Conference ID:
</span><span style=3D"font-size:12.0pt;font-family:&quot;Segoe UI&quot;,san=
s-serif;color:#252424">203 402 542#
</span><span style=3D"font-family:&quot;Segoe UI&quot;,sans-serif;color:#25=
2424"><o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-family:&quot;Segoe UI&quot;,sans=
-serif;color:#252424"><a href=3D"https://dialin.teams.microsoft.com/8551f4c=
1-bea3-441a-8738-69aa517a91c5?id=3D203402542" target=3D"_blank"><span style=
=3D"font-size:10.5pt;color:#6264A7">Find a local number</span></a>
 | <a href=3D"https://mysettings.lync.com/pstnconferencing" target=3D"_blan=
k"><span style=3D"font-size:10.5pt;color:#6264A7">Reset PIN</span></a>
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</body>
</html>

--_000_DM6PR21MB1148FB3CC332D17DCAE54E6BC51C9DM6PR21MB1148namp_--

