
From nobody Thu Feb  1 01:53:58 2018
Return-Path: <aaron.ding@tum.de>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BC5531316DE; Thu,  1 Feb 2018 01:53:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UYdZMBpu1QVI; Thu,  1 Feb 2018 01:53:55 -0800 (PST)
Received: from mail-out2.informatik.tu-muenchen.de (mail-out2.informatik.tu-muenchen.de [131.159.0.36]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA6781318DC; Thu,  1 Feb 2018 01:53:53 -0800 (PST)
Received: by mail.in.tum.de (Postfix, from userid 107) id 45E321C2A52; Thu,  1 Feb 2018 10:53:51 +0100 (CET)
Received: (Authenticated sender: ding) by mail.in.tum.de (Postfix) with ESMTPSA id 1FEFB1C2A18; Thu,  1 Feb 2018 10:53:49 +0100 (CET) (Extended-Queue-bit tech_wpvnx@fff.in.tum.de)
User-Agent: Microsoft-MacOutlook/10.8.0.171210
Date: Thu, 01 Feb 2018 10:53:52 +0100
From: Aaron Yi DING <aaron.ding@tum.de>
To: "T2TRG@irtf.org" <T2TRG@irtf.org>, "icnrg@irtf.org" <icnrg@irtf.org>
Message-ID: <1E11872C-70C9-47E9-8CFB-2064C0316592@tum.de>
Thread-Topic: use case breakdown IoT edge
Mime-version: 1.0
Content-type: text/plain; charset="UTF-8"
Content-transfer-encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/eQcpl5tlRtSTe9qezfrjEHSqPxQ>
Subject: [T2TRG] use case breakdown IoT edge
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Feb 2018 09:53:58 -0000

few use cases breakdown from a recent article on IEEE Network:
http://ieeexplore.ieee.org/document/8270640/

Pre-print PDF can be fetched here:
http://home.in.tum.de/~ding/bib/netmag2018.html=EF=BB=BF

Cheers,
Aaron



From nobody Sun Feb  4 22:53:14 2018
Return-Path: <michael.koster@smartthings.com>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 95AE1120727 for <t2trg@ietfa.amsl.com>; Sun,  4 Feb 2018 22:53:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.589
X-Spam-Level: 
X-Spam-Status: No, score=-2.589 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, T_SPF_PERMERROR=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=smartthings-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rH6uYJKjaB90 for <t2trg@ietfa.amsl.com>; Sun,  4 Feb 2018 22:53:10 -0800 (PST)
Received: from mail-it0-x236.google.com (mail-it0-x236.google.com [IPv6:2607:f8b0:4001:c0b::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C3488126BF0 for <T2TRG@irtf.org>; Sun,  4 Feb 2018 22:53:10 -0800 (PST)
Received: by mail-it0-x236.google.com with SMTP id k131so15418651ith.4 for <T2TRG@irtf.org>; Sun, 04 Feb 2018 22:53:10 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smartthings-com.20150623.gappssmtp.com; s=20150623; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=3gyyUZGgHeCqYztSUG7Jhnq73tzAqHUNtXb1CS8p/oY=; b=Mn6cJjsWDsKJ8R7fRCjVz+mtErsFLu45KwElnjSG8BZMAA74urscrJvoinEX3PClpg nxLJqqPVALznfzo4E7Wp+yykKPb61Dzam3Ek0JvS4q8o6X/EU0AZZOJOEjCrSnj+Pypc 3bXcEm9b7RERkpLixrFClnEbytEG2HsI3OjzRhWlivfgaOahRIknrE2eTbE+YH5jgxr8 lceKQmc6fDtdbg0GlCUPO9TxkrEioMY75q+7jrp1/y+TBdvnQFbeTq6Ox9B0igku9Gqf CUbfCtmabl9s8cuEfxM5AntdatYIsMwSBQvnFvRAf5wKKuvSLQPzv64sNtNUGifD+x0y GddQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=3gyyUZGgHeCqYztSUG7Jhnq73tzAqHUNtXb1CS8p/oY=; b=eK2+JKZkZPOfomn+vFNLiBKAvS1jDFkmKOzcZtxB6c1x4vrCRxIrXb2KYs9t1YG37b DVU5EoJYTRxF94ohLoHd1V+tM/FN7aMG5+L6XX7Sa5lc8ra2ojoQund0LRHFv2c7EFFZ 3nUnRiVdslnIFZXbGjqx7TDd+kN3ydj7sXv/9mSe39eWxxAcBexB9xRLtQHymLKWgp4t Y9Rp3KqycOKNwas7PGAw1VwjTvrYBuKap5XrYnfA2ISuLI97Rf675ZrxN5fOkeg/TmC7 r4b1WA6w1gTr1YQvw51enOJlozJKSqP8+DF6qf4iHC17ybCjFiLYB4F/pRikxpVdwcyZ 4U3Q==
X-Gm-Message-State: AKwxytcJZFMH9Q3W1apd6woay+nYfObIYrRMSYJEOhw8kw8+8D+U7rIY QCX+709M6YhMy5VHKtsVKLx9mQ==
X-Google-Smtp-Source: AH8x224qbyt2d0zHFkFO7RdSX4IByLIIqlkHReTlLDX6jafTdXqQ4pssjjnbVbzQ6bKwMCLLU9xJIg==
X-Received: by 10.36.73.102 with SMTP id z99mr59862769ita.72.1517813589943; Sun, 04 Feb 2018 22:53:09 -0800 (PST)
Received: from [10.0.0.3] (108-201-184-41.lightspeed.sntcca.sbcglobal.net. [108.201.184.41]) by smtp.gmail.com with ESMTPSA id n89sm4802672ioe.46.2018.02.04.22.53.08 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 04 Feb 2018 22:53:08 -0800 (PST)
From: Michael Koster <michael.koster@smartthings.com>
Message-Id: <CD109281-CC20-4BA3-BCAE-01954DF41EDE@smartthings.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_8B786091-3688-4946-A6F0-EF5646BF492A"
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Date: Sun, 4 Feb 2018 22:53:06 -0800
In-Reply-To: <5275643D-26F2-44E6-AA55-9C274FA17354@ericsson.com>
Cc: "t2trg@irtf.org" <T2TRG@irtf.org>
To: =?utf-8?Q?Ari_Ker=C3=A4nen?= <ari.keranen@ericsson.com>
References: <5275643D-26F2-44E6-AA55-9C274FA17354@ericsson.com>
X-Mailer: Apple Mail (2.3273)
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/nlpIAumB6PbKb0Uen6CjiQDXBLY>
Subject: Re: [T2TRG] Next WISHI virtual meeting (February 5th, 2018)
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Feb 2018 06:53:13 -0000

--Apple-Mail=_8B786091-3688-4946-A6F0-EF5646BF492A
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

For the planning discussion:

=
https://github.com/mjkoster/wot-protocol-binding/blob/master/wishi-ietf101=
.pdf =
<https://github.com/mjkoster/wot-protocol-binding/blob/master/wishi-ietf10=
1.pdf>

Best regards,

MIchael


> On Jan 30, 2018, at 9:16 AM, Ari Ker=C3=A4nen =
<ari.keranen@ericsson.com> wrote:
>=20
> Hi all,
>=20
> The next WISHI virtual meeting will be on Monday, February 5th =
7:00-8:30 AM PST (16:00-17:30 CEST).
>=20
> See the latest draft agenda and previous meeting minutes in the WISHI =
wiki:
> https://github.com/t2trg/wishi/wiki/Agenda-items
>=20
> Join the call here: https://jitsi.tools.ietf.org/t2trg-wishi
>=20
>=20
> Cheers,
> Ari
> _______________________________________________
> T2TRG mailing list
> T2TRG@irtf.org
> https://www.irtf.org/mailman/listinfo/t2trg


--Apple-Mail=_8B786091-3688-4946-A6F0-EF5646BF492A
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D"">For the planning discussion:<div class=3D""><br =
class=3D""></div><div class=3D""><a =
href=3D"https://github.com/mjkoster/wot-protocol-binding/blob/master/wishi=
-ietf101.pdf" =
class=3D"">https://github.com/mjkoster/wot-protocol-binding/blob/master/wi=
shi-ietf101.pdf</a></div><div class=3D""><br class=3D""></div><div =
class=3D"">Best regards,</div><div class=3D""><br class=3D""></div><div =
class=3D"">MIchael</div><div class=3D""><br class=3D""><div class=3D""><br=
 class=3D""><div class=3D""><div><blockquote type=3D"cite" class=3D""><div=
 class=3D"">On Jan 30, 2018, at 9:16 AM, Ari Ker=C3=A4nen &lt;<a =
href=3D"mailto:ari.keranen@ericsson.com" =
class=3D"">ari.keranen@ericsson.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div class=3D"">Hi =
all,<br class=3D""><br class=3D"">The next WISHI virtual meeting will be =
on Monday, February 5th 7:00-8:30 AM PST (16:00-17:30 CEST).<br =
class=3D""><br class=3D"">See the latest draft agenda and previous =
meeting minutes in the WISHI wiki:<br class=3D""><a =
href=3D"https://github.com/t2trg/wishi/wiki/Agenda-items" =
class=3D"">https://github.com/t2trg/wishi/wiki/Agenda-items</a><br =
class=3D""><br class=3D"">Join the call here: =
https://jitsi.tools.ietf.org/t2trg-wishi<br class=3D""><br class=3D""><br =
class=3D"">Cheers,<br class=3D"">Ari<br =
class=3D"">_______________________________________________<br =
class=3D"">T2TRG mailing list<br class=3D"">T2TRG@irtf.org<br =
class=3D"">https://www.irtf.org/mailman/listinfo/t2trg<br =
class=3D""></div></div></blockquote></div><br =
class=3D""></div></div></div></body></html>=

--Apple-Mail=_8B786091-3688-4946-A6F0-EF5646BF492A--


From nobody Mon Feb  5 01:50:23 2018
Return-Path: <soumya-kanti.datta@eurecom.fr>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E6E02129BBF for <t2trg@ietfa.amsl.com>; Mon,  5 Feb 2018 01:50:21 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.911
X-Spam-Level: 
X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A8QBsQ_wslpP for <t2trg@ietfa.amsl.com>; Mon,  5 Feb 2018 01:50:19 -0800 (PST)
Received: from smtp2.eurecom.fr (smtp2.eurecom.fr [193.55.113.211]) by ietfa.amsl.com (Postfix) with ESMTP id 2D73112946D for <T2TRG@irtf.org>; Mon,  5 Feb 2018 01:50:18 -0800 (PST)
X-IronPort-AV: E=Sophos;i="5.46,464,1511823600";  d="scan'208";a="7602636"
Received: from monza.eurecom.fr ([192.168.106.15]) by drago2i.eurecom.fr with ESMTP; 05 Feb 2018 10:50:16 +0100
Received: from [172.17.11.61] (flotajou.eurecom.fr [172.17.11.61]) by monza.eurecom.fr (Postfix) with ESMTP id B32211F0E; Mon,  5 Feb 2018 10:50:16 +0100 (CET)
Message-ID: <5A7828D8.1030900@eurecom.fr>
Date: Mon, 05 Feb 2018 10:50:16 +0100
From: Soumya Kanti Datta <soumya-kanti.datta@eurecom.fr>
Organization: EURECOM
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:15.0) Gecko/20120824 Thunderbird/15.0
MIME-Version: 1.0
To: Michael Koster <michael.koster@smartthings.com>
CC: =?ISO-8859-1?Q?Ari_Ker=E4nen?= <ari.keranen@ericsson.com>,  "t2trg@irtf.org" <T2TRG@irtf.org>
References: <5275643D-26F2-44E6-AA55-9C274FA17354@ericsson.com> <CD109281-CC20-4BA3-BCAE-01954DF41EDE@smartthings.com>
In-Reply-To: <CD109281-CC20-4BA3-BCAE-01954DF41EDE@smartthings.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/D3KBPaDgECp4rAkSAvnCHFW07gk>
Subject: Re: [T2TRG] Next WISHI virtual meeting (February 5th, 2018)
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Feb 2018 09:50:22 -0000

Dear Michael, Ari

I'd like to take part in this semantic interop event. When would it be 
scheduled?

Regards,
Soumya

Research Engineer, EURECOM, France | @skdatta2010 | http://iot.eurecom.fr

On 05/02/2018 07:53, Michael Koster wrote:
> For the planning discussion:
>
> https://github.com/mjkoster/wot-protocol-binding/blob/master/wishi-ietf101.pdf
>
> Best regards,
>
> MIchael
>
>
>> On Jan 30, 2018, at 9:16 AM, Ari Keränen <ari.keranen@ericsson.com
>> <mailto:ari.keranen@ericsson.com>> wrote:
>>
>> Hi all,
>>
>> The next WISHI virtual meeting will be on Monday, February 5th
>> 7:00-8:30 AM PST (16:00-17:30 CEST).
>>
>> See the latest draft agenda and previous meeting minutes in the WISHI
>> wiki:
>> https://github.com/t2trg/wishi/wiki/Agenda-items
>>
>> Join the call here: https://jitsi.tools.ietf.org/t2trg-wishi
>>
>>
>> Cheers,
>> Ari
>> _______________________________________________
>> T2TRG mailing list
>> T2TRG@irtf.org
>> https://www.irtf.org/mailman/listinfo/t2trg
>
>
>
> _______________________________________________
> T2TRG mailing list
> T2TRG@irtf.org
> https://www.irtf.org/mailman/listinfo/t2trg
>


From nobody Mon Feb  5 02:12:36 2018
Return-Path: <cabo@tzi.org>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 96986129C6E for <t2trg@ietfa.amsl.com>; Mon,  5 Feb 2018 02:12:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o8_Cza1bKvAi for <t2trg@ietfa.amsl.com>; Mon,  5 Feb 2018 02:12:32 -0800 (PST)
Received: from mailhost.informatik.uni-bremen.de (mailhost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C7493129BBF for <T2TRG@irtf.org>; Mon,  5 Feb 2018 02:12:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at informatik.uni-bremen.de
Received: from submithost.informatik.uni-bremen.de (submithost.informatik.uni-bremen.de [134.102.201.11]) by mailhost.informatik.uni-bremen.de (8.14.5/8.14.5) with ESMTP id w15ACQYv000178; Mon, 5 Feb 2018 11:12:26 +0100 (CET)
Received: from [192.168.217.114] (p5DC7EAF5.dip0.t-ipconnect.de [93.199.234.245]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by submithost.informatik.uni-bremen.de (Postfix) with ESMTPSA id 3zZk0p3kKkzDWMr; Mon,  5 Feb 2018 11:12:26 +0100 (CET)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <5A7828D8.1030900@eurecom.fr>
Date: Mon, 5 Feb 2018 11:12:25 +0100
Cc: Michael Koster <michael.koster@smartthings.com>, =?utf-8?Q?Ari_Ker=C3=A4nen?= <ari.keranen@ericsson.com>, "t2trg@irtf.org" <T2TRG@irtf.org>
X-Mao-Original-Outgoing-Id: 539518344.859991-0e3a9228181bcd700adeda29744c7b6a
Content-Transfer-Encoding: quoted-printable
Message-Id: <A0E700ED-0C34-492C-8196-AA70BDA8E6FC@tzi.org>
References: <5275643D-26F2-44E6-AA55-9C274FA17354@ericsson.com> <CD109281-CC20-4BA3-BCAE-01954DF41EDE@smartthings.com> <5A7828D8.1030900@eurecom.fr>
To: Soumya Kanti Datta <soumya-kanti.datta@eurecom.fr>
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/id6oKfLNM0f_iHS589Mg2BTi6NA>
Subject: Re: [T2TRG] Next WISHI virtual meeting (February 5th, 2018)
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Feb 2018 10:12:35 -0000

Hi Soumya,

On Feb 5, 2018, at 10:50, Soumya Kanti Datta =
<soumya-kanti.datta@eurecom.fr> wrote:
>=20
> I'd like to take part in this semantic interop event. When would it be =
scheduled?

The WISHI activities are linked from the Wiki you can find under

	http://wishi.space

Specifically here:

	https://github.com/t2trg/wishi/wiki/Agenda-items

You can find both today=E2=80=99s phone call as well as the March 17/18 =
Hackathon event there, among some notes from previous events and phone =
meetings.

Gr=C3=BC=C3=9Fe, Carsten


From nobody Mon Feb 12 00:39:52 2018
Return-Path: <internet-drafts@ietf.org>
X-Original-To: t2trg@irtf.org
Delivered-To: t2trg@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id C4BF7127011; Mon, 12 Feb 2018 00:39:50 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: t2trg@irtf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.72.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151842479077.8058.1187284427273756739@ietfa.amsl.com>
Date: Mon, 12 Feb 2018 00:39:50 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/vAYMUxlqPKJTImkXmuxNZbYlrI8>
Subject: [T2TRG] I-D Action: draft-irtf-t2trg-iot-seccons-10.txt
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Feb 2018 08:39:51 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Thing-to-Thing RG of the IRTF.

        Title           : State-of-the-Art and Challenges for the Internet of Things Security
        Authors         : Oscar Garcia-Morchon
                          Sandeep S. Kumar
                          Mohit Sethi
	Filename        : draft-irtf-t2trg-iot-seccons-10.txt
	Pages           : 45
	Date            : 2018-02-12

Abstract:
   The Internet of Things (IoT) concept refers to the usage of standard
   Internet protocols to allow for human-to-thing and thing-to-thing
   communication.  The security needs for IoT systems are well-
   recognized and many standardization steps to provide security have
   been taken, for example, the specification of Constrained Application
   Protocol (CoAP) secured with Datagram Transport Layer Security
   (DTLS).  However, security challenges still exist, not only because
   there are some use cases that lack a suitable solution, but also
   because many IoT devices and systems have been designed and deployed
   with very limited security capabilities.  In this document, we first
   discuss the various stages in the lifecycle of a thing.  Next, we
   document the security threats to a thing and the challenges that one
   might face to protect against these threats.  Lastly, we discuss the
   next steps needed to facilitate the deployment of secure IoT systems.
   This document can be used by IoT standards specifications as a
   reference for details about security considerations applying to the
   specified protocol.

   This document is a product of the IRTF Thing-to-Thing Research Group
   (T2TRG).


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-irtf-t2trg-iot-seccons/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-irtf-t2trg-iot-seccons-10
https://datatracker.ietf.org/doc/html/draft-irtf-t2trg-iot-seccons-10

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-irtf-t2trg-iot-seccons-10


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue Feb 13 04:40:05 2018
Return-Path: <internet-drafts@ietf.org>
X-Original-To: t2trg@irtf.org
Delivered-To: t2trg@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 0C00E1201FA; Tue, 13 Feb 2018 04:40:04 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: t2trg@irtf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.72.1
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151852560399.22196.2309729695273104116@ietfa.amsl.com>
Date: Tue, 13 Feb 2018 04:40:04 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/gF-fIN8WddFHOQ8RQ3NRAiKjEWs>
Subject: [T2TRG] I-D Action: draft-irtf-t2trg-iot-seccons-11.txt
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Feb 2018 12:40:04 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Thing-to-Thing RG of the IRTF.

        Title           : State-of-the-Art and Challenges for the Internet of Things Security
        Authors         : Oscar Garcia-Morchon
                          Sandeep S. Kumar
                          Mohit Sethi
	Filename        : draft-irtf-t2trg-iot-seccons-11.txt
	Pages           : 45
	Date            : 2018-02-13

Abstract:
   The Internet of Things (IoT) concept refers to the usage of standard
   Internet protocols to allow for human-to-thing and thing-to-thing
   communication.  The security needs for IoT systems are well-
   recognized and many standardization steps to provide security have
   been taken, for example, the specification of Constrained Application
   Protocol (CoAP) secured with Datagram Transport Layer Security
   (DTLS).  However, security challenges still exist, not only because
   there are some use cases that lack a suitable solution, but also
   because many IoT devices and systems have been designed and deployed
   with very limited security capabilities.  In this document, we first
   discuss the various stages in the lifecycle of a thing.  Next, we
   document the security threats to a thing and the challenges that one
   might face to protect against these threats.  Lastly, we discuss the
   next steps needed to facilitate the deployment of secure IoT systems.
   This document can be used by IoT standards specifications as a
   reference for details about security considerations applying to the
   specified protocol.

   This document is a product of the IRTF Thing-to-Thing Research Group
   (T2TRG).


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-irtf-t2trg-iot-seccons/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-irtf-t2trg-iot-seccons-11
https://datatracker.ietf.org/doc/html/draft-irtf-t2trg-iot-seccons-11

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-irtf-t2trg-iot-seccons-11


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue Feb 13 04:44:23 2018
Return-Path: <mohit.m.sethi@ericsson.com>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DD7771270A7 for <t2trg@ietfa.amsl.com>; Tue, 13 Feb 2018 04:44:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.319
X-Spam-Level: 
X-Spam-Status: No, score=-4.319 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2CB56aj5uXFd for <t2trg@ietfa.amsl.com>; Tue, 13 Feb 2018 04:44:17 -0800 (PST)
Received: from sesbmg22.ericsson.net (sesbmg22.ericsson.net [193.180.251.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AD38B124BFA for <t2trg@irtf.org>; Tue, 13 Feb 2018 04:44:16 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/simple; q=dns/txt; i=@ericsson.com; t=1518525854; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:CC:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=5oyrzh5HCaLa6ued25qUqcp8kUfbRbhoxJSN2yz5CsA=; b=bvTzjMwqn0y1ExZtTS052FnNlAaAL8UDv/UNXIigqEBOS/cEcODJxqTf8mdPQ1Gb z7QlEC4P6Zccnlp08M70zANd34Puq73MHaqd4lLhKe85q+9SnlSKZReY4SXB0fcu VL4FqHIe+mey0+m9ED/lkrljMbGKWxdlTA+BGV1fGAk=;
X-AuditID: c1b4fb30-3b1ff70000004778-1d-5a82dd9ec8d8
Received: from ESESSHC018.ericsson.se (Unknown_Domain [153.88.183.72]) by sesbmg22.ericsson.net (Symantec Mail Security) with SMTP id BE.6D.18296.E9DD28A5; Tue, 13 Feb 2018 13:44:14 +0100 (CET)
Received: from nomadiclab.fi.eu.ericsson.se (153.88.183.153) by smtp.internal.ericsson.com (153.88.183.74) with Microsoft SMTP Server id 14.3.352.0; Tue, 13 Feb 2018 13:44:13 +0100
Received: from nomadiclab.fi.eu.ericsson.se (localhost [127.0.0.1])	by nomadiclab.fi.eu.ericsson.se (Postfix) with ESMTP id 050F1481736; Tue, 13 Feb 2018 14:44:14 +0200 (EET)
Received: from [127.0.0.1] (localhost [IPv6:::1])	by nomadiclab.fi.eu.ericsson.se (Postfix) with ESMTP id 9BFB3480EEE; Tue, 13 Feb 2018 14:44:13 +0200 (EET)
From: Mohit Sethi <mohit.m.sethi@ericsson.com>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, <t2trg@irtf.org>
References: <4c4023dd-4f36-eb55-8178-2e12f40c52a8@cs.tcd.ie>
CC: "Garcia-Morchon O, Oscar" <oscar.garcia-morchon@philips.com>, Jim Schaad <ietf@augustcellars.com>
Message-ID: <fe111a5b-c474-74d1-fb7c-2adb0dc53cd1@ericsson.com>
Date: Tue, 13 Feb 2018 14:44:13 +0200
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0
MIME-Version: 1.0
In-Reply-To: <4c4023dd-4f36-eb55-8178-2e12f40c52a8@cs.tcd.ie>
Content-Type: multipart/signed; protocol="application/pkcs7-signature"; micalg=sha-256; boundary="------------ms000705070902050305020002"
X-AV-Checked: ClamAV using ClamSMTP
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFrrNIsWRmVeSWpSXmKPExsUyM2K7h+68u01RBh8va1isnv6dzaLhzgUW i+l7r7FbvH/Qw+LA4rFxznQ2j7XdV9k8Jm88zOZx4MBupgCWKC6blNSczLLUIn27BK6M7jcb GQt+/2WsuHv1A2sD46uzjF2MnBwSAiYS3W9vMIHYQgKHGSXezBbqYuQCsncwSkxsfc4G4Wxi lPg8bzELhLOAUeLKkT1gLWwCehKd544zg9jCAtYSPd3/WEBsEQFHianndgLZHEANNhLz7uaB hJkF0iX+bD0C1sorYC+x9PBCJpASFgFVidcPU0DCogIREp0r57NAlAhKnJz5BMzmFLCV6O39 zAhyArNAN6PE+5Z1zBAfKEssaFnECPGBusTWjgOMExiFZiHpn4WsZxbYHWESDefnsUHY4hK3 nsxngrDNJOZtfghVoy2xbOFrIJsDyFaTWNaqhCoMYltLzPh1EGqMosSU7ofsELapxOujHxkh bGOJZev+si1g5FnFKFqcWpyUm25kpJdalJlcXJyfp5eXWrKJERjNB7f8NtjB+PK54yFGAQ5G JR5eDvGmKCHWxLLiytxDjCpAcx5tWH2BUYolLz8vVUmEl2MhUJo3JbGyKrUoP76oNCe1+BCj NAeLkjjvSU/eKCGB9MSS1OzU1ILUIpgsEwenVAPjGr19t01zw3RSLWOX3FOSOzb/z0y3jJnf z4fO2dygLs/7+ovK9ysXmnYLLHoUImxQ7LH87rX7xYLd6Wfr3zK+YLJ7Zsh+7/wnOTXrQhdR aZM9784/zJSaUi6nvjRWfeMC3+pHc96pB22yD/r1puXt0W+71kXO6hWYvEl9GbeTQeeF/dH8 1ouZlViKMxINtZiLihMBGJivnu4CAAA=
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/f4dbsozHyrXOFJ4dyStl0yiD6Ws>
Subject: Re: [T2TRG] review of draft-irtf-t2trg-iot-seccons
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Feb 2018 12:44:21 -0000

--------------ms000705070902050305020002
Content-Type: multipart/alternative;
 boundary="------------98B915A4FCD29EA320339221"
Content-Language: en-US

This is a multi-part message in MIME format.
--------------98B915A4FCD29EA320339221
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: quoted-printable

Hi Stefan,

Thanks for the detailed review. We have submitted updated versions to=20
address your concerns. You can find the latest version (-11) here:=20
https://tools.ietf.org/html/draft-irtf-t2trg-iot-seccons-11 and the diff =

from the earlier version which you reviewed (-09) here:

https://tools.ietf.org/tools/rfcdiff/rfcdiff.pyht?url1=3Dhttps://tools.ie=
tf.org/id/draft-irtf-t2trg-iot-seccons-09.txt&url2=3Dhttps://tools.ietf.o=
rg/id/draft-irtf-t2trg-iot-seccons-11.txt

Here are our responses to your comments:

> I wasn't
> clear who are the intended readers - if this is mainly
> meant for the RG, then does it need to be an RFC? If
> the intended readership is someone else, then who?
> And will the current text be useful for that set of
> folks?

The draft says in the abstract "This document can be used by IoT=20
standards specifications as a reference for details about security=20
considerations applying to the specified protocol.". Will this draft=20
solve all the IoT security problems and save the world? No. That was=20
never the intention. The draft provides a summary/collection of major=20
security challenges for IoT and the existing tools and protocols that=20
are available. This would serve as a good read for those designing new=20
protocols. And instead of repeating many of the generic security=20
considerations in each draft,=C2=A0 they could simply refer to this docum=
ent.

> (Note that I suggest referring to rfc 8240 and the LPWAN
> overview draft and am an editor for both of those. I do
> think they'd be good additions, but didn't want you to think
> I'm sneakily trying to up my h-index:-)

They are now added at relevant places in the document.

> - 50 pages, sheesh

The draft is currently 30 pages long with 10 pages of references. Yes,=20
it is relatively long. But this an RG document that summarizes a lot of=20
things.

> - p1: crap code is surely the biggest security challlenge
> =C2=A0 here, if this doc is to be useful it'll need to recognise
> that.

The draft says in section 3: "Vulnerable Software: Things in the=20
Internet of Things rely on software that might contain bugs.=C2=A0 This m=
akes=20
the things vulnerable to many different types of attacks, depending on=20
the criticality of the bugs, e.g., buffer overflows or lack of=20
authentication."

> - p3: I don't see the point of sales-speak such as "The
> =C2=A0 things that are part of the Internet of Things are no
> longer unresponsive and have transformed into computing
> devices that understand and react to the environment they
> reside in."

Not a sales pitch but rephrased anyhow.

> - p4, the lifecycle doesn't start when a tangible device is
> =C2=A0 manufactured but rather when the oldest bit of code the
> ends up in the device was written.=C2=A0 That's a significant
> point, esp for smaller vendors who often re-use unpatched
> old builds that "work" but may be wildly insecure.
> - p4, I'd argue that the lifecycle could include some
> recognition of OSS, but I'm not sure how to properly
> include that.
> - p4, the lifecycle could also include an on-the-shelf phase
> =C2=A0 and a phase where a device is re-badged by some vendor who
> wasn't the actual original manuf.=C2=A0 Such phases can
> significantly complicate s/w update and bootstrapping.
> - p4, there are two other end-states that probably ought be
> =C2=A0 part of the lifecycle - where a vendor end-of-life's a
> device type that's still in use and where a device is simply
> forgotten but keeps on trucking.=20

Good points. We have added a paragraph before Figure 1 stating that the=20
described lifecycle is a simplified model that can be extended, e.g.,=20
with the situations that you describe.

> - p7, section 2.2 seems pointless if it's not used later in
> =C2=A0 the document - you may as well delete this. FWIW, I don't
> find figure 3 useful.

Removed.

> - p9, the list seems to me to be very for-profit-vendor
> =C2=A0 oriented.=C2=A0 I wonder would a non-profit or device-using
> organisation write a different list? I think they would,
> e.g. they might include "crap s/w" and "attempted capture
> via proprietary APIs/data formats/cloudy services" as
> threats.

We do say that the list is not-exhaustive. Some of it has more to do=20
with business security than actual device/system security.

>
> - p11, I would argue that privacy deserves much more
> =C2=A0 attention in this document than this, and that this
> document isn't much use without that. For example, it's
> important to include the scenario where a static sensor
> emits a packet due to the presence/absence of people - in
> that scenario anyone who can see that packet can potentially
> invade the privacy of the people involved.=C2=A0 You do include
> more in section 5, but see my comment below about how that
> section is(n't:-) organised.

We have added this example to Section 5.9.

> - p20, "the fact is that many IoT devices and systems have
> =C2=A0 very limited security." It seems a bit late to say this on
> page 20:-)

Added some text earlier in the document (for example, in the abstract).

> - p21, I'm not sure an RFC is a good place to wonder about
> =C2=A0 potential future regulation, unless that's to be done in a
> more thorough manner. I'd say deleting the last two
> paragraphs of section 4.3 and replacing those with a single
> sentence that "redional regulations aren't unlikely" might
> be better.=20

Removed some text and added that regional regulations aren't unlikely.

>
> - p22, I don't agree with the crypto points made (IMO, only
> =C2=A0 devices that can verify an occasional signature ought be
> exposed to the Internet) - but even so the references here
> aren't good - curve 25519 ought be the main ECC reference
> relating to lessened CPU requirements. It's also a surprise
> to not see a mention of chacha.

Added references to curve 25519 and chacha.

>
> - p12, "Thus, ensuring a proper level of security in an IoT
> =C2=A0 system at any point of time is challenging.=C2=A0 To address
> this challenge, a process for secure product creation is
> required to ensure that an IoT system is secure and no
> security risks are present." That's just silly - aiming for
> a perfect system ("no security risks") is pointless as those
> do not exist.

Rephrased

> - p13, 4.1 should have some mention of LPWANs and indeed
> =C2=A0 those deserve more text in general as the set of usable
> security mechanisms and challenges differ in those parts of
> networks.=C2=A0 You do mention LPWAN in 5.1.4 - which confused me
> as that text probably should be here in 4.x.=C2=A0 You might also
> wanna reference the LPWAN overview draft, currently in IETF
> LC.=20

Added in 4.1.

>
> - p16 and elsewhere - the state-of-the-art text should
> =C2=A0 really try to indicate which things are or more, or less,
> importanct. That can be tricky, but e.g.=C2=A0 presenting HIP as
> being of equal importance to (D)TLS here isn't useful, nor
> particularly credible. I also wonder if OSCOAP is as mature
> and important as the text implies.

Text has been adapted to make clear that TLS, DTLS are the most=20
important protocols. Wording is added to make clear that HIP is less=20
relevant and OSCoAP is relatively new.

> - p21, I don't get the logic behind the organisation of
> =C2=A0 section 5, it seems to be a just-so list if things
> described at fairly different levels of detail, e.g.=C2=A0 5.1 vs
> 5.2. I'd say a bit of thought as to how to organise this
> section could lead to a better organised text.=C2=A0 I'm not sure
> how that'd be best done myself, but perhaps some discussion
> within the RG would help there.

Section 5.2 is much shorter since the RG decided to include that=20
material in a different Internet Draft.

> - p24, homomorphic crypto? Huh? I don't buy that at all.
> =C2=A0 And following the [SEAL] reference leads to a dead end.
> If you want to make a claim like this more detail would be
> needed. I'd say deleting this is best.

The text says that it is limited in use. However, this is an area in=20
which many people are working and thus, we would rather keep it. We have =

updated the reference. Microsoft updated it in the last months.

> - p28 - how is referring to an expired draft from 9 years
> =C2=A0 ago (yes, 2009!) useful?

Removed.

> - p28, [iotsu] is better referred to via rfc 8240 and I
> =C2=A0 think a lot of the text in 5.4 is likely included in that
> report. The overlap is probably fine, but it'd be no harm to
> just check to see if anything else from 8240 would be worth
> including here.

Updated the reference to RFC 8240.

> - p33, at the start of 5.9 "Users" is the wrong term, you
> =C2=A0 should say "People" - that's not just a nit, but an
> important difference (and one worth explicitly calling out)
> as the people whose privacy is affected by devices need not
> be "users" in any sense at all. Automatic number plate
> scanners or camera based systems are usually good examples.

Updated as suggested.

> - p34, in 5.10 you could add some mention of and reference
> =C2=A0 to methods for h/w tamper detection/resistance.

Added

>
> - p36 says "Thus, a potential approach is the definition and
> =C2=A0 standardization of security profiles,..." That conclusion
> is not justified based on the text of this document.
> (Where's there anything that implies that this conclusion is
> warranted?) Secondly, I don't agree with the conclusion
> itself - in the case of RPL that approach has lead to
> nothing good happening that I've seen, and I'd expect it to
> lead to more fig-leaves if applied in other cases. Now,
> while I may be wrong, and your conlusion may be right, I
> think I'm fairly safe in saying that much more justification
> is needed before this conclusion could be credibly drawn.

Removed.

If you don't find some of your comments here, then we chose not to take=20
any action on it. Please let us know if something is still needed.

Oscar, Sandeep and Mohit

On 01/05/2018 06:10 PM, Stephen Farrell wrote:
> Hiya,
>
> Carsten asked me to take a look at this draft and
> I said I would over the holidays, so I'm only a
> wee bit later than promised:-)
>
> In general, I think some more work is needed. Aside
> from the specific points in the attached, I wasn't
> clear who are the intended readers - if this is mainly
> meant for the RG, then does it need to be an RFC? If
> the intended readership is someone else, then who?
> And will the current text be useful for that set of
> folks?
>
> Apologies in advance if some of the issues I raise
> have been discussed in the RG before - I haven't
> had time to participate in the RG to date. (I'm also
> not subscribed to the RG list so please do cc me
> on any follow ups.)
>
> Cheers,
> S.
>
>
>
>
> _______________________________________________
> T2TRG mailing list
> T2TRG@irtf.org
> https://www.irtf.org/mailman/listinfo/t2trg


--------------98B915A4FCD29EA320339221
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html>
  <head>
    <meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dutf=
-8">
  </head>
  <body bgcolor=3D"#FFFFFF" text=3D"#000000">
    <p>Hi Stefan,</p>
    <p>Thanks for the detailed review. We have submitted updated
      versions to address your concerns. You can find the latest version
      (-11) here: <a moz-do-not-send=3D"true"
        href=3D"https://tools.ietf.org/html/draft-irtf-t2trg-iot-seccons-=
11">https://tools.ietf.org/html/draft-irtf-t2trg-iot-seccons-11</a>
      and the diff from the earlier version which you reviewed (-09)
      here:=C2=A0 <br>
    </p>
    <p><a moz-do-not-send=3D"true"
href=3D"https://tools.ietf.org/tools/rfcdiff/rfcdiff.pyht?url1=3Dhttps://=
tools.ietf.org/id/draft-irtf-t2trg-iot-seccons-09.txt&amp;url2=3Dhttps://=
tools.ietf.org/id/draft-irtf-t2trg-iot-seccons-11.txt">https://tools.ietf=
=2Eorg/tools/rfcdiff/rfcdiff.pyht?url1=3Dhttps://tools.ietf.org/id/draft-=
irtf-t2trg-iot-seccons-09.txt&amp;url2=3Dhttps://tools.ietf.org/id/draft-=
irtf-t2trg-iot-seccons-11.txt</a><br>
    </p>
    <p>Here are our responses to your comments: <br>
    </p>
    <p> </p>
    <blockquote type=3D"cite">
      <pre wrap=3D"">I wasn't
clear who are the intended readers - if this is mainly
meant for the RG, then does it need to be an RFC? If
the intended readership is someone else, then who?
And will the current text be useful for that set of
folks?</pre>
    </blockquote>
    <p>The draft says in the abstract "This document can be used by IoT
      standards specifications as a reference for details about security
      considerations applying to the specified protocol.". Will this
      draft solve all the IoT security problems and save the world? No.
      That was never the intention. The draft provides a
      summary/collection of major security challenges for IoT and the
      existing tools and protocols that are available. This would serve
      as a good read for those designing new protocols. And instead of
      repeating many of the generic security considerations in each
      draft,=C2=A0 they could simply refer to this document. <br>
    </p>
    <p> </p>
    <blockquote type=3D"cite">(Note that I suggest referring to rfc 8240
      and the LPWAN<br>
      overview draft and am an editor for both of those. I do<br>
      think they'd be good additions, but didn't want you to think<br>
      I'm sneakily trying to up my h-index:-)</blockquote>
    <br>
    They are now added at relevant places in the document.<br>
    <br>
    <p> </p>
    <blockquote type=3D"cite">- 50 pages, sheesh</blockquote>
    <br>
    The draft is currently 30 pages long with 10 pages of references.
    Yes, it is relatively long. But this an RG document that summarizes
    a lot of things.=C2=A0
    <p> </p>
    <blockquote type=3D"cite">- p1: crap code is surely the biggest
      security challlenge<br>
      =C2=A0 here, if this doc is to be useful it'll need to recognise<br=
>
      that.</blockquote>
    <br>
    The draft says in section 3: "Vulnerable Software: Things in the
    Internet of Things rely on software that might contain bugs.=C2=A0 Th=
is
    makes the things vulnerable to many different types of attacks,
    depending on the criticality of the bugs, e.g., buffer overflows or
    lack of authentication."<br>
    <p> </p>
    <blockquote type=3D"cite">- p3: I don't see the point of sales-speak
      such as "The<br>
      =C2=A0 things that are part of the Internet of Things are no<br>
      longer unresponsive and have transformed into computing<br>
      devices that understand and react to the environment they<br>
      reside in."<br>
    </blockquote>
    <br>
    Not a sales pitch but rephrased anyhow.
    <p> </p>
    <blockquote type=3D"cite">- p4, the lifecycle doesn't start when a
      tangible device is<br>
      =C2=A0 manufactured but rather when the oldest bit of code the<br>
      ends up in the device was written.=C2=A0 That's a significant<br>
      point, esp for smaller vendors who often re-use unpatched<br>
      old builds that "work" but may be wildly insecure.<br>
      - p4, I'd argue that the lifecycle could include some<br>
      recognition of OSS, but I'm not sure how to properly<br>
      include that.<br>
      - p4, the lifecycle could also include an on-the-shelf phase<br>
      =C2=A0 and a phase where a device is re-badged by some vendor who<b=
r>
      wasn't the actual original manuf.=C2=A0 Such phases can<br>
      significantly complicate s/w update and bootstrapping.<br>
      - p4, there are two other end-states that probably ought be<br>
      =C2=A0 part of the lifecycle - where a vendor end-of-life's a<br>
      device type that's still in use and where a device is simply<br>
      forgotten but keeps on trucking. </blockquote>
    <br>
    Good points. We have added a paragraph before Figure 1 stating that
    the described lifecycle is a simplified model that can be extended,
    e.g., with the situations that you describe.
    <p> </p>
    <blockquote type=3D"cite">- p7, section 2.2 seems pointless if it's
      not used later in<br>
      =C2=A0 the document - you may as well delete this. FWIW, I don't<br=
>
      find figure 3 useful.</blockquote>
    <br>
    Removed. <br>
    <p> </p>
    <blockquote type=3D"cite">- p9, the list seems to me to be very
      for-profit-vendor<br>
      =C2=A0 oriented.=C2=A0 I wonder would a non-profit or device-using<=
br>
      organisation write a different list? I think they would,<br>
      e.g. they might include "crap s/w" and "attempted capture<br>
      via proprietary APIs/data formats/cloudy services" as<br>
      threats.</blockquote>
    <br>
    We do say that the list is not-exhaustive. Some of it has more to do
    with business security than actual device/system security. <br>
    <p> </p>
    <blockquote type=3D"cite"><br>
      - p11, I would argue that privacy deserves much more<br>
      =C2=A0 attention in this document than this, and that this<br>
      document isn't much use without that. For example, it's<br>
      important to include the scenario where a static sensor<br>
      emits a packet due to the presence/absence of people - in<br>
      that scenario anyone who can see that packet can potentially<br>
      invade the privacy of the people involved.=C2=A0 You do include<br>=

      more in section 5, but see my comment below about how that<br>
      section is(n't:-) organised.</blockquote>
    <br>
    We have added this example to Section 5.9.<br>
    <br>
    <blockquote type=3D"cite">- p20, "the fact is that many IoT devices
      and systems have<br>
      =C2=A0 very limited security." It seems a bit late to say this on<b=
r>
      page 20:-)</blockquote>
    <br>
    Added some text earlier in the document (for example, in the
    abstract).<br>
    <br>
    <blockquote type=3D"cite">- p21, I'm not sure an RFC is a good place
      to wonder about<br>
      =C2=A0 potential future regulation, unless that's to be done in a<b=
r>
      more thorough manner. I'd say deleting the last two<br>
      paragraphs of section 4.3 and replacing those with a single<br>
      sentence that "redional regulations aren't unlikely" might<br>
      be better. </blockquote>
    <br>
    Removed some text and added that regional regulations aren't
    unlikely. <br>
    <br>
    <blockquote type=3D"cite"><br>
      - p22, I don't agree with the crypto points made (IMO, only<br>
      =C2=A0 devices that can verify an occasional signature ought be<br>=

      exposed to the Internet) - but even so the references here<br>
      aren't good - curve 25519 ought be the main ECC reference<br>
      relating to lessened CPU requirements. It's also a surprise<br>
      to not see a mention of chacha.</blockquote>
    <br>
    Added references to curve 25519 and chacha.<br>
    <br>
    <blockquote type=3D"cite"><br>
      - p12, "Thus, ensuring a proper level of security in an IoT<br>
      =C2=A0 system at any point of time is challenging.=C2=A0 To address=
<br>
      this challenge, a process for secure product creation is<br>
      required to ensure that an IoT system is secure and no<br>
      security risks are present." That's just silly - aiming for<br>
      a perfect system ("no security risks") is pointless as those<br>
      do not exist.</blockquote>
    <br>
    Rephrased<br>
    <br>
    <blockquote type=3D"cite">- p13, 4.1 should have some mention of
      LPWANs and indeed<br>
      =C2=A0 those deserve more text in general as the set of usable<br>
      security mechanisms and challenges differ in those parts of<br>
      networks.=C2=A0 You do mention LPWAN in 5.1.4 - which confused me<b=
r>
      as that text probably should be here in 4.x.=C2=A0 You might also<b=
r>
      wanna reference the LPWAN overview draft, currently in IETF<br>
      LC. </blockquote>
    <br>
    Added in 4.1.<br>
    <br>
    <blockquote type=3D"cite"><br>
      - p16 and elsewhere - the state-of-the-art text should<br>
      =C2=A0 really try to indicate which things are or more, or less,<br=
>
      importanct. That can be tricky, but e.g.=C2=A0 presenting HIP as<br=
>
      being of equal importance to (D)TLS here isn't useful, nor<br>
      particularly credible. I also wonder if OSCOAP is as mature<br>
      and important as the text implies.</blockquote>
    <br>
    Text has been adapted to make clear that TLS, DTLS are the most
    important protocols. Wording is added to make clear that HIP is less
    relevant and OSCoAP is relatively new.<br>
    <br>
    <blockquote type=3D"cite">- p21, I don't get the logic behind the
      organisation of<br>
      =C2=A0 section 5, it seems to be a just-so list if things<br>
      described at fairly different levels of detail, e.g.=C2=A0 5.1 vs<b=
r>
      5.2. I'd say a bit of thought as to how to organise this<br>
      section could lead to a better organised text.=C2=A0 I'm not sure<b=
r>
      how that'd be best done myself, but perhaps some discussion<br>
      within the RG would help there.</blockquote>
    <br>
    Section 5.2 is much shorter since the RG decided to include that
    material in a different Internet Draft.<br>
    <br>
    <blockquote type=3D"cite">- p24, homomorphic crypto? Huh? I don't buy=

      that at all.<br>
      =C2=A0 And following the [SEAL] reference leads to a dead end.<br>
      If you want to make a claim like this more detail would be<br>
      needed. I'd say deleting this is best.</blockquote>
    <br>
    The text says that it is limited in use. However, this is an area in
    which many people are working and thus, we would rather keep it. We
    have updated the reference. Microsoft updated it in the last months.<=
br>
    <br>
    <blockquote type=3D"cite">- p28 - how is referring to an expired draf=
t
      from 9 years<br>
      =C2=A0 ago (yes, 2009!) useful?</blockquote>
    <br>
    Removed.<br>
    <br>
    <blockquote type=3D"cite">- p28, [iotsu] is better referred to via rf=
c
      8240 and I<br>
      =C2=A0 think a lot of the text in 5.4 is likely included in that<br=
>
      report. The overlap is probably fine, but it'd be no harm to<br>
      just check to see if anything else from 8240 would be worth<br>
      including here.</blockquote>
    <br>
    Updated the reference to RFC 8240.<br>
    <br>
    <blockquote type=3D"cite">- p33, at the start of 5.9 "Users" is the
      wrong term, you<br>
      =C2=A0 should say "People" - that's not just a nit, but an<br>
      important difference (and one worth explicitly calling out)<br>
      as the people whose privacy is affected by devices need not<br>
      be "users" in any sense at all. Automatic number plate<br>
      scanners or camera based systems are usually good examples.</blockq=
uote>
    <br>
    Updated as suggested.<br>
    <br>
    <blockquote type=3D"cite">- p34, in 5.10 you could add some mention o=
f
      and reference<br>
      =C2=A0 to methods for h/w tamper detection/resistance.</blockquote>=

    <br>
    Added<br>
    <br>
    <blockquote type=3D"cite"><br>
      - p36 says "Thus, a potential approach is the definition and<br>
      =C2=A0 standardization of security profiles,..." That conclusion<br=
>
      is not justified based on the text of this document.<br>
      (Where's there anything that implies that this conclusion is<br>
      warranted?) Secondly, I don't agree with the conclusion<br>
      itself - in the case of RPL that approach has lead to<br>
      nothing good happening that I've seen, and I'd expect it to<br>
      lead to more fig-leaves if applied in other cases. Now,<br>
      while I may be wrong, and your conlusion may be right, I<br>
      think I'm fairly safe in saying that much more justification<br>
      is needed before this conclusion could be credibly drawn.</blockquo=
te>
    <br>
    Removed.<br>
    <br>
    If you don't find some of your comments here, then we chose not to
    take any action on it. Please let us know if something is still
    needed. <br>
    <br>
    Oscar, Sandeep and Mohit<br>
    <br>
    <div class=3D"moz-cite-prefix">On 01/05/2018 06:10 PM, Stephen Farrel=
l
      wrote:<br>
    </div>
    <blockquote type=3D"cite"
      cite=3D"mid:4c4023dd-4f36-eb55-8178-2e12f40c52a8@cs.tcd.ie">
      <pre wrap=3D"">Hiya,

Carsten asked me to take a look at this draft and
I said I would over the holidays, so I'm only a
wee bit later than promised:-)

In general, I think some more work is needed. Aside
from the specific points in the attached, I wasn't
clear who are the intended readers - if this is mainly
meant for the RG, then does it need to be an RFC? If
the intended readership is someone else, then who?
And will the current text be useful for that set of
folks?

Apologies in advance if some of the issues I raise
have been discussed in the RG before - I haven't
had time to participate in the RG to date. (I'm also
not subscribed to the RG list so please do cc me
on any follow ups.)

Cheers,
S.


</pre>
      <br>
      <fieldset class=3D"mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap=3D"">_______________________________________________
T2TRG mailing list
<a class=3D"moz-txt-link-abbreviated" href=3D"mailto:T2TRG@irtf.org">T2TR=
G@irtf.org</a>
<a class=3D"moz-txt-link-freetext" href=3D"https://www.irtf.org/mailman/l=
istinfo/t2trg">https://www.irtf.org/mailman/listinfo/t2trg</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------98B915A4FCD29EA320339221--

--------------ms000705070902050305020002
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
Content-Description: S/MIME Cryptographic Signature
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--------------ms000705070902050305020002--


From nobody Tue Feb 13 22:32:23 2018
Return-Path: <ari.keranen@ericsson.com>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A81B124B17 for <t2trg@ietfa.amsl.com>; Tue, 13 Feb 2018 22:32:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.321
X-Spam-Level: 
X-Spam-Status: No, score=-4.321 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id RU7-Djg5Qaw1 for <t2trg@ietfa.amsl.com>; Tue, 13 Feb 2018 22:32:20 -0800 (PST)
Received: from sesbmg23.ericsson.net (sesbmg23.ericsson.net [193.180.251.37]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 36AEF124F57 for <T2TRG@irtf.org>; Tue, 13 Feb 2018 22:32:20 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/simple; q=dns/txt; i=@ericsson.com; t=1518589937; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=IGqC/kAkArM+53RRUtClF7U3xTlxnodop+q2kZZ1H/0=; b=UJqT8H7CA581Oz3jikwhrHYNsI8m/LAEeXjH+kxUDwoXJI2XbXljvIj7VgvmPwhX 5bxsZg885KwdMKeMIClDo0SJpgPWV4rFWPHRxQQsmNxhVzlRCqmPBO3GxSpi7qn+ JrNMwa2VXXvEZndSZPYZ+9LNtQlNoSbUTnamwipHPwg=;
X-AuditID: c1b4fb25-473ff7000000341b-9d-5a83d7f177f6
Received: from ESESSHC003.ericsson.se (Unknown_Domain [153.88.183.27]) by sesbmg23.ericsson.net (Symantec Mail Security) with SMTP id F4.70.13339.1F7D38A5; Wed, 14 Feb 2018 07:32:17 +0100 (CET)
Received: from ESESSMB109.ericsson.se ([169.254.9.195]) by ESESSHC003.ericsson.se ([153.88.183.27]) with mapi id 14.03.0352.000; Wed, 14 Feb 2018 07:32:17 +0100
From: =?iso-8859-1?Q?Ari_Ker=E4nen?= <ari.keranen@ericsson.com>
To: "T2TRG@irtf.org" <T2TRG@irtf.org>
Thread-Topic: Next WISHI virtual meeting (February 19th, 2018)
Thread-Index: AQHTpV2ObYL9JXeUiEycA6ZqSY7YhA==
Date: Wed, 14 Feb 2018 06:32:16 +0000
Message-ID: <0074EADD-8D10-4340-A966-FB6C24E53E63@ericsson.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [153.88.183.148]
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <BC29E9EFC039A24BB5237BA6158BAE64@ericsson.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrGLMWRmVeSWpSXmKPExsUyM2K7tO7H681RBosXmVq8f9DD4sDoMXnj YbYAxigum5TUnMyy1CJ9uwSujP87F7EU/GCqOPlpL2MD41amLkZODgkBE4l76z6zdjFycQgJ HGaU2PpiOjuEs4RRYsfj0ywgVWwC9hKT13xkBLFFBFQlmqdsYAWxhQUsJVq2LgNq4ACK20kc /JwDUaInceDKHGYQmwWovOPsYXYQmxdozNOT79hAbEYBMYnvp9aAHcEsIC5x68l8qIMEJJbs Oc8MYYtKvHz8jxXCVpJoXPKEFaJeT+LG1ClsELa1xMeub1BxbYllC18zQ+wSlDg58wnLBEbh WUhWzELSPgtJ+ywk7bOQtC9gZF3FKFqcWpyUm25krJdalJlcXJyfp5eXWrKJERj6B7f8Vt3B ePmN4yFGAQ5GJR7eV07NUUKsiWXFlbmHGCU4mJVEeI3PA4V4UxIrq1KL8uOLSnNSiw8xSnOw KInznvTkjRISSE8sSc1OTS1ILYLJMnFwSjUwVhkKy62T7fzrULP+rsKDmAdVxyqUXhzqMTH9 VOUtnlW8/vm3k1srz8pb33hlI+SlNnGXyq+omk86htvNt7U6TZ/67wr3QTn37EKFJU/nSxVE cpQE3GV87/C8PZ/7wYtJJx/l+QokTD3plpz/7NHXN4ZBl85sWbHvWrr4r4rDKknLjoe8lbh9 RImlOCPRUIu5qDgRAHen6ZF5AgAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/lbegRFdXmZHqhLUWGV1ym44Iilw>
Subject: [T2TRG] Next WISHI virtual meeting (February 19th, 2018)
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Feb 2018 06:32:22 -0000

Hi all,

We are continuing WISHI calls with our usual bi-weekly cadence and the next=
 one will be on Monday, February 19th 7:00-8:30 AM PST (16:00-17:30 CET).

See the latest draft agenda and previous meeting minutes in the WISHI wiki:
https://github.com/t2trg/wishi/wiki/Agenda-items

Join the call here: https://jitsi.tools.ietf.org/t2trg-wishi


Cheers,
Ari=


From nobody Thu Feb 15 03:13:23 2018
Return-Path: <cabo@tzi.org>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5CA22124BE8 for <t2trg@ietfa.amsl.com>; Thu, 15 Feb 2018 03:13:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id huweCDx-7MYh for <t2trg@ietfa.amsl.com>; Thu, 15 Feb 2018 03:13:20 -0800 (PST)
Received: from mailhost.informatik.uni-bremen.de (mailhost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5E715127275 for <t2trg@irtf.org>; Thu, 15 Feb 2018 03:13:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at informatik.uni-bremen.de
Received: from submithost.informatik.uni-bremen.de (submithost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::b]) by mailhost.informatik.uni-bremen.de (8.14.5/8.14.5) with ESMTP id w1FBDGKe009405 for <t2trg@irtf.org>; Thu, 15 Feb 2018 12:13:16 +0100 (CET)
Received: from client-0222.vpn.uni-bremen.de (client-0222.vpn.uni-bremen.de [134.102.107.222]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by submithost.informatik.uni-bremen.de (Postfix) with ESMTPSA id 3zhttN3378zDXF3; Thu, 15 Feb 2018 12:13:16 +0100 (CET)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <E547FD2B-CEB9-4243-9401-411395CC3C84@tzi.org>
Date: Thu, 15 Feb 2018 12:13:15 +0100
X-Mao-Original-Outgoing-Id: 540385993.939362-f64cb07888a5be08508df9740dee8052
Content-Transfer-Encoding: quoted-printable
Message-Id: <3BF26B93-CACF-4D4F-A450-959A97128750@tzi.org>
References: <E547FD2B-CEB9-4243-9401-411395CC3C84@tzi.org>
To: t2trg@irtf.org
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/R_ZtRlGxRniIFGe3kxaOeZw6PvY>
Subject: Re: [T2TRG] Preparing for the IETF101 cluster, WISHI and T2TRG
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Feb 2018 11:13:22 -0000

On Dec 18, 2017, at 10:29, Carsten Bormann <cabo@tzi.org> wrote:
>=20
> W3C WoT is meeting in Prague the week after IETF101, and OCF has taken =
the opportunity to co-locate with that (unfortunately, during the IETF =
week).  We may want to bite the bullet and move over to Prague for a =
Friday joint meeting =E2=80=94 this takes out half a day from the IETF =
attendance, but these joint meetings have turned out to be useful. =20

OCF was able to cram this joint OCF/T2TRG/W3C WoT meeting into their =
Friday afternoon agenda, so people leaving London early Friday morning =
for Prague can be there in time.  The joint session is scheduled from =
13:30=E2=80=9317:30 on Friday, March 23rd.  OCF is also inviting us to =
their meeting lunch at 12:30=E2=80=9313:30.

We=E2=80=99ll need to collect registration information by March 12th; =
more about that (and other logistical details) later.

Gr=C3=BC=C3=9Fe, Carsten


From nobody Sat Feb 17 08:35:04 2018
Return-Path: <cabo@tzi.org>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C2DDA1204DA; Sat, 17 Feb 2018 08:34:45 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.299
X-Spam-Level: 
X-Spam-Status: No, score=-2.299 tagged_above=-999 required=5 tests=[RCVD_IN_DNSWL_MED=-2.3, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JApWs0NPk0ix; Sat, 17 Feb 2018 08:34:44 -0800 (PST)
Received: from mailhost.informatik.uni-bremen.de (mailhost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 16CB4120725; Sat, 17 Feb 2018 08:34:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at informatik.uni-bremen.de
Received: from submithost.informatik.uni-bremen.de (submithost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::b]) by mailhost.informatik.uni-bremen.de (8.14.5/8.14.5) with ESMTP id w1HGYepK013857; Sat, 17 Feb 2018 17:34:40 +0100 (CET)
Received: from client-0231.vpn.uni-bremen.de (client-0231.vpn.uni-bremen.de [134.102.107.231]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by submithost.informatik.uni-bremen.de (Postfix) with ESMTPSA id 3zkFwF6pZ9zDXjD; Sat, 17 Feb 2018 17:34:37 +0100 (CET)
From: Carsten Bormann <cabo@tzi.org>
Content-Type: text/plain; charset=utf-8
X-Mao-Original-Outgoing-Id: 540578068.245754-97e5f0bc463b69dabaa858a33a4d2e19
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
Date: Sat, 17 Feb 2018 08:34:29 -0800
Message-Id: <FB328F1A-C7DA-4528-A2B6-4CA3AFDD7BBE@tzi.org>
To: ace@ietf.org, "core@ietf.org WG (core@ietf.org)" <core@ietf.org>, cose <cose@ietf.org>, cbor@ietf.org, t2trg@irtf.org
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/cxuB4xfKrSwhtOth2xSOwIigrco>
Subject: [T2TRG] Constrained Node/Network Cluster @ IETF101: DRAFT AGENDA
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sat, 17 Feb 2018 16:34:46 -0000

Here is my usual eclectic condensed agenda based on the DRAFT AGENDA
for IETF101.  Remember that there is still quite some potential for
changes.

The painful ones (not necessarily fixable) this time include:
DINRG vs. ACE, CBOR vs. TEEP, ROLL vs. SUIT vs. OCF/WoT; also CORE
vs. ANIMA, CORE vs. QUIC.

All times are BST (UTC+0100).  (You can get pure UTC times on
https://datatracker.ietf.org/meeting/agenda-utc, for those who want to
listen from remote.)

Gr=C3=BC=C3=9Fe, Carsten

SATURDAY/SUNDAY
-- Hackathon (including various interops)

MONDAY, March 19, 2018

0930-1200  Morning Session I
Bleinheim	ART	dispatch	Dispatch WG - 0930-1100 Joint =
with ARTAREA
Sandringham	INT	ipwave	IP Wireless Access in Vehicular =
Environments WG
Palace C	IRTF***	dinrg	Decentralized Internet Infrastructure =
Proposed RG
Viscount	OPS	v6ops	IPv6 Operations WG
Balmoral	SEC ***	ace	Authentication and Authorization for =
Constrained Environments WG

1330-1530  Afternoon Session I
Buckingham	ART ***	core	Constrained RESTful Environments WG
Viscount	INT	6man	IPv6 Maintenance WG
Sandringham	TSV	quic	QUIC WG

1550-1720  Afternoon Session II
Sandringham	INT	intarea	Internet Area Working Group WG
Balmoral	IRTF	cfrg	Crypto Forum
Buckingham	SEC	oauth	Web Authorization Protocol WG

1740-1840  Afternoon Session III
Balmoral	SEC	tls	Transport Layer Security WG
Sandringham	TSV	tsvarea	Transport Area Open Meeting

TUESDAY, March 20, 2018

0930-1200  Morning Session I
Viscount	ART ***	core	Constrained RESTful Environments WG
Sandringham	IRTF	maprg	Measurement and Analysis for Protocols
Buckingham	OPS	anima	Autonomic Networking Integrated Model =
and Approach WG
Bleinheim	SEC	secdispatch	Security Dispatch WG

1330-1530  Afternoon Session I
Park Suite	ART ***	cbor	Concise Binary Object Representation =
Maintenance and Extensions WG
Buckingham	IRTF	panrg	Path Aware Networking Proposed RG
Richm_Chl_Tow	RTG	rift	Routing In Fat Trees WG
Balmoral	SEC ***	teep	Trusted Execution Environment =
Provisioning BOF

1550-1820  Afternoon Session II
Balmoral	ART	httpbis	Hypertext Transfer Protocol WG
Park Suite	IRTF	icnrg	Information-Centric Networking

WEDNESDAY, March 21, 2018

0930-1200  Morning Session I
Viscount	INT ***	lpwan	IPv6 over Low Power Wide-Area Networks =
WG
Sandringham	IRTF	irtfopen	IRTF Open Meeting
Bleinheim	SEC	tls	Transport Layer Security WG
Park Suite	TSV	taps	Transport Services WG

1330-1500  Afternoon Session I
Viscount	INT ***	6tisch	IPv6 over the TSCH mode of IEEE =
802.15.4e WG
Richm_Chl_Tow	RTG	bier	Bit Indexed Explicit Replication WG
Park Suite	SEC	oauth	Web Authorization Protocol WG
Palace C	TSV	rmcat	RTP Media Congestion Avoidance =
Techniques WG

1520-1650  Afternoon Session II
Park Suite	INT ***	lwig	Light-Weight Implementation Guidance WG
Buckingham	SEC	acme	Automated Certificate Management =
Environment WG
Viscount	SEC	tokbind	Token Binding WG

1710-1940  IETF Plenary - Sandringham

THURSDAY, March 22, 2018

0930-1200  Morning Session I
Buckingham	INT	dnssd	Extensions for Scalable DNS Service =
Discovery  WG
Park Suite	RTG ***	roll	Routing Over Low power and Lossy =
networks WG
Sandringham	TSV	quic	QUIC WG

1330-1530  Afternoon Session I
Buckingham	INT ***	6lo	IPv6 over Networks of =
Resource-constrained Nodes WG
Sandringham	SEC	saag	Security Area Open Meeting

1550-1750  Afternoon Session II
Bleinheim	IRTF***	t2trg	Thing-to-Thing
Sandringham	RTG	rtgarea	Routing Area Open Meeting
Buckingham	SEC	mls	Messaging Layer Security BOF
Balmoral	TSV	tsvwg	Transport Area Working Group WG

1810-1910  Afternoon Session III
Bleinheim	ART	uta	Using TLS in Applications WG
Park Suite	RTG	babel	Babel routing protocol WG
Balmoral	TSV	tsvwg	Transport Area Working Group WG

FRIDAY, March 23, 2018

0930-1130  Morning Session I
Richm_Chl_Tow	ART	ice	Interactive Connectivity Establishment =
WG - 0930 - 1030
Sandringham	INT	homenet	Home Networking WG
Bleinheim	RTG	detnet	Deterministic Networking WG
Viscount	RTG ***	roll	Routing Over Low power and Lossy =
networks WG
Balmoral	SEC ***	suit	Software Updates for Internet of Things =
WG

1150-1320  Afternoon Session I
Bleinheim	RTG	detnet	Deterministic Networking WG


1330-1730  @ OCF meeting venue (Prague, colocated with W3C WoT)
-- Joint meeting of OCF, W3C WoT, and T2TRG


From nobody Tue Feb 20 20:57:27 2018
Return-Path: <cabo@tzi.org>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BF05912D0C3 for <t2trg@ietfa.amsl.com>; Tue, 20 Feb 2018 20:57:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4JmuaVid8F0K for <t2trg@ietfa.amsl.com>; Tue, 20 Feb 2018 20:57:23 -0800 (PST)
Received: from mailhost.informatik.uni-bremen.de (mailhost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1D64D129C6D for <t2trg@irtf.org>; Tue, 20 Feb 2018 20:57:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at informatik.uni-bremen.de
Received: from submithost.informatik.uni-bremen.de (submithost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::b]) by mailhost.informatik.uni-bremen.de (8.14.5/8.14.5) with ESMTP id w1L4vJ67011354 for <t2trg@irtf.org>; Wed, 21 Feb 2018 05:57:19 +0100 (CET)
Received: from pptp-218-1.informatik.uni-bremen.de (pptp-218-1.informatik.uni-bremen.de [134.102.218.240]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by submithost.informatik.uni-bremen.de (Postfix) with ESMTPSA id 3zmQFp5BdLzDWxJ; Wed, 21 Feb 2018 05:57:18 +0100 (CET)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <3BF26B93-CACF-4D4F-A450-959A97128750@tzi.org>
Date: Tue, 20 Feb 2018 20:57:11 -0800
X-Mao-Original-Outgoing-Id: 540881829.9110399-d1aa621d6543633d9af65d6821cbd8d9
Content-Transfer-Encoding: quoted-printable
Message-Id: <5486D56F-BC98-405D-8771-B15032EC5C4C@tzi.org>
References: <E547FD2B-CEB9-4243-9401-411395CC3C84@tzi.org> <3BF26B93-CACF-4D4F-A450-959A97128750@tzi.org>
To: t2trg@irtf.org
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/Q-4gRuk5n60BUEPit9-903PjnOQ>
Subject: Re: [T2TRG] Preparing for the IETF101 cluster, WISHI and T2TRG
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Feb 2018 04:57:26 -0000

On Feb 15, 2018, at 03:13, Carsten Bormann <cabo@tzi.org> wrote:
>=20
> On Dec 18, 2017, at 10:29, Carsten Bormann <cabo@tzi.org> wrote:
>>=20
>> W3C WoT is meeting in Prague the week after IETF101, and OCF has =
taken the opportunity to co-locate with that (unfortunately, during the =
IETF week).  We may want to bite the bullet and move over to Prague for =
a Friday joint meeting =E2=80=94 this takes out half a day from the IETF =
attendance, but these joint meetings have turned out to be useful. =20
>=20
> OCF was able to cram this joint OCF/T2TRG/W3C WoT meeting into their =
Friday afternoon agenda, so people leaving London early Friday morning =
for Prague can be there in time.  The joint session is scheduled from =
13:30=E2=80=9317:30 on Friday, March 23rd.  OCF is also inviting us to =
their meeting lunch at 12:30=E2=80=9313:30.
>=20
> We=E2=80=99ll need to collect registration information by March 12th; =
more about that (and other logistical details) later.

While we don=E2=80=99t have all those logistical details yet, here is an =
update for this and the other parts of that busy week:

# 2018-03-17..-18 The WISHI Hackathon @ IETF101 (London)

So that we can plan the details of what we are going to do there, =
Michael Koster has prepared a questionnaire for participants:

	=
https://github.com/t2trg/wishi/wiki/Hackathon--Participant-Questionnaire

If you want to participate, please fill in as much of the questionnaire =
as you can (all questions are optional; see the embedded instructions) =
and submit a pull request to the Wishi repo (e.g., prefixing the file =
name with your name/your company name) or send it to Michael or to the =
chairs (t2trg-chairs@irtf.org).

More planning information at:

	https://github.com/t2trg/wishi/wiki/Hackathon-Planning

# 2018-03-22 T2TRG summary meeting @ IETF101 (London)

The final IETF101 agenda isn=E2=80=99t out yet, but it seems we will =
meet on Thursday afternoon (*) at 1550-1750 to report to the IETF and =
for a number of interesting talks.

The agenda is being built right now:

	https://github.com/t2trg/2018-ietf101

# 2018-03-23 Joint meeting between OCF, T2TRG and W3C WoT (Prague)

The agenda is being built right now:

	https://github.com/t2trg/2018-03-ocf-wot

Please indicate if you want to have topics added.

Gr=C3=BC=C3=9Fe, Carsten

(*) Yes, this is suboptimal for those of us flying on to Prague for the =
joint meeting; attempts to swap slots=20
haven=E2=80=99t been fruitful.


From nobody Tue Feb 20 21:07:34 2018
Return-Path: <cabo@tzi.org>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4922512AF83 for <t2trg@ietfa.amsl.com>; Tue, 20 Feb 2018 21:07:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JeWjdlaE4t2m for <t2trg@ietfa.amsl.com>; Tue, 20 Feb 2018 21:07:31 -0800 (PST)
Received: from mailhost.informatik.uni-bremen.de (mailhost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 910D912708C for <t2trg@irtf.org>; Tue, 20 Feb 2018 21:07:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at informatik.uni-bremen.de
Received: from submithost.informatik.uni-bremen.de (submithost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::b]) by mailhost.informatik.uni-bremen.de (8.14.5/8.14.5) with ESMTP id w1L57RV0019791 for <t2trg@irtf.org>; Wed, 21 Feb 2018 06:07:27 +0100 (CET)
Received: from pptp-218-1.informatik.uni-bremen.de (pptp-218-1.informatik.uni-bremen.de [134.102.218.240]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by submithost.informatik.uni-bremen.de (Postfix) with ESMTPSA id 3zmQTV6zJyzDWxM; Wed, 21 Feb 2018 06:07:26 +0100 (CET)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
From: Carsten Bormann <cabo@tzi.org>
In-Reply-To: <5486D56F-BC98-405D-8771-B15032EC5C4C@tzi.org>
Date: Tue, 20 Feb 2018 21:07:19 -0800
X-Mao-Original-Outgoing-Id: 540882438.302395-12e450dcd535c89865c4239ef0a88354
Content-Transfer-Encoding: quoted-printable
Message-Id: <DC53DCBB-5924-439D-9D2F-06AF4E436179@tzi.org>
References: <E547FD2B-CEB9-4243-9401-411395CC3C84@tzi.org> <3BF26B93-CACF-4D4F-A450-959A97128750@tzi.org> <5486D56F-BC98-405D-8771-B15032EC5C4C@tzi.org>
To: t2trg@irtf.org
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/jlqVhlJK_9D7X-9RRWhuVs2iYQw>
Subject: Re: [T2TRG] Preparing for the IETF101 cluster, WISHI and T2TRG
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Feb 2018 05:07:33 -0000

On Feb 20, 2018, at 20:57, Carsten Bormann <cabo@tzi.org> wrote:
>=20
> please fill in as much of the questionnaire=20

=E2=80=A6 and I forgot to say that it would be good to have a first =
version of that soon, latest by Monday, as we plan to make a short =
coordination call at

2018-02-26 14:30Z (06:30 PST, 15:30 CET, =E2=80=A6)

	=
https://github.com/t2trg/wishi/wiki/Hackathon--Participant-Questionnaire

Please join on Monday via

	https://jitsi.tools.ietf.org/t2trg-wishi

Gr=C3=BC=C3=9Fe, Carsten


From nobody Wed Feb 21 13:19:44 2018
Return-Path: <ari.keranen@ericsson.com>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 59B6E124BFA for <t2trg@ietfa.amsl.com>; Wed, 21 Feb 2018 13:19:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.321
X-Spam-Level: 
X-Spam-Status: No, score=-4.321 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZmGBKjACHfBt for <t2trg@ietfa.amsl.com>; Wed, 21 Feb 2018 13:19:42 -0800 (PST)
Received: from sesbmg23.ericsson.net (sesbmg23.ericsson.net [193.180.251.37]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D5B7612420B for <t2trg@irtf.org>; Wed, 21 Feb 2018 13:19:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/simple; q=dns/txt; i=@ericsson.com; t=1519247980; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=KeG5VRzaiiVOc/8Bxw9RvMpGG/IhLLqpjM1SKoCwmu8=; b=epZ41M9RUbraNnP0UbYdKkKEn3r7arjbjb9WGk/rN22rZxoJ1ROviAJN4HqGHoJD TPmCTLMqIwxhvvhkMF3dlUjKNoyXde95G2pimAWCdg7pqsLzeY1V5wVPHr31s4T5 JpfTFuRrcHWqq44Gv87q57RScjaV+7gcLKRLRVtbSx4=;
X-AuditID: c1b4fb25-44ba69c000002d5f-12-5a8de26b4e2c
Received: from ESESSHC021.ericsson.se (Unknown_Domain [153.88.183.81]) by sesbmg23.ericsson.net (Symantec Mail Security) with SMTP id FA.51.11615.B62ED8A5; Wed, 21 Feb 2018 22:19:40 +0100 (CET)
Received: from ESESSMB109.ericsson.se ([169.254.9.195]) by ESESSHC021.ericsson.se ([153.88.183.81]) with mapi id 14.03.0352.000; Wed, 21 Feb 2018 22:19:06 +0100
From: =?utf-8?B?QXJpIEtlcsOkbmVu?= <ari.keranen@ericsson.com>
To: "t2trg@irtf.org" <t2trg@irtf.org>
Thread-Topic: [T2TRG] Preparing for the IETF101 cluster, WISHI and T2TRG
Thread-Index: AQHTd+LA5AjaXno1nky5WTYc9GjHbaOlm2mAgAkE64CAAALVgIABD4KA
Date: Wed, 21 Feb 2018 21:19:06 +0000
Message-ID: <8F6D3861-3D6F-4B3E-BC87-CCE604386B8E@ericsson.com>
References: <E547FD2B-CEB9-4243-9401-411395CC3C84@tzi.org> <3BF26B93-CACF-4D4F-A450-959A97128750@tzi.org> <5486D56F-BC98-405D-8771-B15032EC5C4C@tzi.org> <DC53DCBB-5924-439D-9D2F-06AF4E436179@tzi.org>
In-Reply-To: <DC53DCBB-5924-439D-9D2F-06AF4E436179@tzi.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [87.95.226.8]
Content-Type: text/plain; charset="utf-8"
Content-ID: <8D0B7DB99EC1CC44B545433B3FC08DB6@ericsson.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrDLMWRmVeSWpSXmKPExsUyM2J7oG7Oo94ogzNH2S3eP+hhcWD0mLzx MFsAYxSXTUpqTmZZapG+XQJXxtPOPawF87gqXjXeZm9g/MPZxcjJISFgIrHx3BfGLkYuDiGB w4wS5w4fYIJwljBK/Gq4zwhSxSZgK/GkdR8riC0ioCqxceZGMFtYwF1iwfVFTBBxD4lXXfeg atwkTt9byw5iswDVX9k9ga2LkYODV8Be4uHhVIj5Zxklzj/6zwQS5xSwlmg56QFSziggJvH9 1BqwkcwC4hK3nsxngjhUQGLJnvPMELaoxMvH/1ghbHmJGWdvgY1hFtCUWL9LH6LVWmLjnJes ELaixJTuh2DX8AoISpyc+YRlAqPoLCQbZiF0z0LSPQtJ9ywk3QsYWVcxihanFiflphsZ66UW ZSYXF+fn6eWllmxiBMbJwS2/VXcwXn7jeIhRgINRiYd37p3eKCHWxLLiytxDjBIczEoivCcS gEK8KYmVValF+fFFpTmpxYcYpTlYlMR55wi3RwkJpCeWpGanphakFsFkmTg4pRoYY+4q6u6N 2jKP4/BOdr1LP5W0jjqEHlFiezgj9KBKoNQrThtm3+c29+xO8v4ymNZussX88NbN3GIpf3uX 5IQmrn6z5bRrs/yfi3yX1XS8/zn59+RlLop1DDlj6TtTrkrnfKrNRJlU341cNeoxxueMnC8s 47/14o/gN43pu14VrI199kEqq/+HEktxRqKhFnNRcSIAFWZib48CAAA=
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/I-n8AE_nI2K9NQOr8glYjWD_TZI>
Subject: Re: [T2TRG] Preparing for the IETF101 cluster, WISHI and T2TRG
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Feb 2018 21:19:43 -0000

SWYgeW91IHByZWZlciB0byBhbnN3ZXIgdXNpbmcgYSB3ZWIgZm9ybSBpbnN0ZWFkIG9mIFBSIHRv
IEdpdGh1YiwgeW91IGNhbiB1c2UgdGhpcyBHb29nbGUgZm9ybToNCmh0dHBzOi8vZ29vLmdsL2Zv
cm1zL0p2WVNiOFZPV2l6a0t5MjYyDQoNCkFzIHdpdGggdGhlIEdpdGh1YiBxdWVzdGlvbm5haXJl
LCBhbGwgcXVlc3Rpb25zIGFyZSBvcHRpb25hbC4gDQoNCg0KQ2hlZXJzLA0KQXJpDQoNCj4gT24g
MjEgRmViIDIwMTgsIGF0IDcuMDcsIENhcnN0ZW4gQm9ybWFubiA8Y2Fib0B0emkub3JnPiB3cm90
ZToNCj4gDQo+IE9uIEZlYiAyMCwgMjAxOCwgYXQgMjA6NTcsIENhcnN0ZW4gQm9ybWFubiA8Y2Fi
b0B0emkub3JnPiB3cm90ZToNCj4+IA0KPj4gcGxlYXNlIGZpbGwgaW4gYXMgbXVjaCBvZiB0aGUg
cXVlc3Rpb25uYWlyZSANCj4gDQo+IOKApiBhbmQgSSBmb3Jnb3QgdG8gc2F5IHRoYXQgaXQgd291
bGQgYmUgZ29vZCB0byBoYXZlIGEgZmlyc3QgdmVyc2lvbiBvZiB0aGF0IHNvb24sIGxhdGVzdCBi
eSBNb25kYXksIGFzIHdlIHBsYW4gdG8gbWFrZSBhIHNob3J0IGNvb3JkaW5hdGlvbiBjYWxsIGF0
DQo+IA0KPiAyMDE4LTAyLTI2IDE0OjMwWiAoMDY6MzAgUFNULCAxNTozMCBDRVQsIOKApikNCj4g
DQo+IAlodHRwczovL2dpdGh1Yi5jb20vdDJ0cmcvd2lzaGkvd2lraS9IYWNrYXRob24tLVBhcnRp
Y2lwYW50LVF1ZXN0aW9ubmFpcmUNCj4gDQo+IFBsZWFzZSBqb2luIG9uIE1vbmRheSB2aWENCj4g
DQo+IAlodHRwczovL2ppdHNpLnRvb2xzLmlldGYub3JnL3QydHJnLXdpc2hpDQo+IA0KPiBHcsO8
w59lLCBDYXJzdGVuDQo+IA0KPiBfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fXw0KPiBUMlRSRyBtYWlsaW5nIGxpc3QNCj4gVDJUUkdAaXJ0Zi5vcmcNCj4gaHR0
cHM6Ly93d3cuaXJ0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby90MnRyZw0KDQo=


From nobody Thu Feb 22 03:06:01 2018
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8374512E91F for <t2trg@ietfa.amsl.com>; Thu, 22 Feb 2018 03:06:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.31
X-Spam-Level: 
X-Spam-Status: No, score=-4.31 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gyRXTpC_FNZM for <t2trg@ietfa.amsl.com>; Thu, 22 Feb 2018 03:05:56 -0800 (PST)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ECB131242F5 for <t2trg@irtf.org>; Thu, 22 Feb 2018 03:05:55 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 8A76CBE4D; Thu, 22 Feb 2018 11:05:53 +0000 (GMT)
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jyN6IARc-R2M; Thu, 22 Feb 2018 11:05:53 +0000 (GMT)
Received: from [134.226.36.93] (bilbo.dsg.cs.tcd.ie [134.226.36.93]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 33101BE4C; Thu, 22 Feb 2018 11:05:53 +0000 (GMT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1519297553; bh=Dlb1Tx08SOlRZ0/L9fB83xKpLwsDeUcGUQTgQ6EBdhQ=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=2212zIPTD5sN85W3I1t9uBv/LEAEDhRUEROKzWEq8k6t2WavcVfSbWcq85y4fiO3I f16LmbN/ylsiseTmEN+EyQRJdUOrB4apr8iCK3TU4a662mz1h2Fjy4UlYBjTUt12OW Cvs57m83tzGze5/WhA4SQ9Hz3roWq+B9TTAB+CV0=
To: Mohit Sethi <mohit.m.sethi@ericsson.com>, t2trg@irtf.org
Cc: "Garcia-Morchon O, Oscar" <oscar.garcia-morchon@philips.com>, Jim Schaad <ietf@augustcellars.com>
References: <4c4023dd-4f36-eb55-8178-2e12f40c52a8@cs.tcd.ie> <fe111a5b-c474-74d1-fb7c-2adb0dc53cd1@ericsson.com>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Openpgp: id=5BB5A6EA5765D2C5863CAE275AB2FAF17B172BEA; url=
Message-ID: <ab60cda0-1bc2-bdb8-3427-a5a31d2f899b@cs.tcd.ie>
Date: Thu, 22 Feb 2018 11:05:52 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0
MIME-Version: 1.0
In-Reply-To: <fe111a5b-c474-74d1-fb7c-2adb0dc53cd1@ericsson.com>
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="cLa6Jsl9dvePLdDiplqQn1NGmdL63AlCj"
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/HMjoM5fg0pvEMbwN5c0dkq1vPl8>
Subject: Re: [T2TRG] review of draft-irtf-t2trg-iot-seccons
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Feb 2018 11:06:00 -0000

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--cLa6Jsl9dvePLdDiplqQn1NGmdL63AlCj
Content-Type: multipart/mixed; boundary="VQudv0ZbCKA7KIeYtvwKzcmTYHzzH9h2S";
 protected-headers="v1"
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
To: Mohit Sethi <mohit.m.sethi@ericsson.com>, t2trg@irtf.org
Cc: "Garcia-Morchon O, Oscar" <oscar.garcia-morchon@philips.com>,
 Jim Schaad <ietf@augustcellars.com>
Message-ID: <ab60cda0-1bc2-bdb8-3427-a5a31d2f899b@cs.tcd.ie>
Subject: Re: [T2TRG] review of draft-irtf-t2trg-iot-seccons
References: <4c4023dd-4f36-eb55-8178-2e12f40c52a8@cs.tcd.ie>
 <fe111a5b-c474-74d1-fb7c-2adb0dc53cd1@ericsson.com>
In-Reply-To: <fe111a5b-c474-74d1-fb7c-2adb0dc53cd1@ericsson.com>

--VQudv0ZbCKA7KIeYtvwKzcmTYHzzH9h2S
Content-Type: multipart/mixed;
 boundary="------------7958087A64D7EDB809AB9CB8"
Content-Language: en-GB

This is a multi-part message in MIME format.
--------------7958087A64D7EDB809AB9CB8
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable


Hi Mohit,

Sorry for the slow response...

On 13/02/18 12:44, Mohit Sethi wrote:
> Hi Stefan,
>=20
> Thanks for the detailed review. We have submitted updated versions to
> address your concerns. You can find the latest version (-11) here:
> https://tools.ietf.org/html/draft-irtf-t2trg-iot-seccons-11 and the dif=
f
> from the earlier version which you reviewed (-09) here:
>=20
> https://tools.ietf.org/tools/rfcdiff/rfcdiff.pyht?url1=3Dhttps://tools.=
ietf.org/id/draft-irtf-t2trg-iot-seccons-09.txt&url2=3Dhttps://tools.ietf=
=2Eorg/id/draft-irtf-t2trg-iot-seccons-11.txt
>=20
>=20
> Here are our responses to your comments:
>=20
>> I wasn't
>> clear who are the intended readers - if this is mainly
>> meant for the RG, then does it need to be an RFC? If
>> the intended readership is someone else, then who?
>> And will the current text be useful for that set of
>> folks?
>=20
> The draft says in the abstract "This document can be used by IoT
> standards specifications as a reference for details about security
> considerations applying to the specified protocol.". Will this draft
> solve all the IoT security problems and save the world? No. That was
> never the intention. The draft provides a summary/collection of major
> security challenges for IoT and the existing tools and protocols that
> are available. This would serve as a good read for those designing new
> protocols. And instead of repeating many of the generic security
> considerations in each draft,=C3=82=C2=A0 they could simply refer to th=
is document.

So I'm not sure that the text in the abstract is really
right, but maybe it's just me misinterpreting that. I do
think this is a useful read for those writing code and specs
for protocols in this space, but I do not think they can
"simply refer to this" in order to deal with the challenges
they face. If the abstract said this is background material
but implementers and specification writers need to figure
out and document their specific threat models, and mitigations
based on those, then that'd be better.

The reason I asked about this is that it's fairly common
to find internet drafts where the security considerations
just says "go read RFCxxxx" and I don't think pointers like
that to this document would be a good outcome here.

>=20
>> (Note that I suggest referring to rfc 8240 and the LPWAN
>> overview draft and am an editor for both of those. I do
>> think they'd be good additions, but didn't want you to think
>> I'm sneakily trying to up my h-index:-)
>=20
> They are now added at relevant places in the document.
>=20
>> - 50 pages, sheesh
>=20
> The draft is currently 30 pages long with 10 pages of references. Yes,
> it is relatively long. But this an RG document that summarizes a lot of=

> things.

Fair 'nuff I guess.

>=20
>> - p1: crap code is surely the biggest security challlenge
>> =C3=82=C2=A0 here, if this doc is to be useful it'll need to recognise=

>> that.
>=20
> The draft says in section 3: "Vulnerable Software: Things in the
> Internet of Things rely on software that might contain bugs.=C3=82=C2=A0=
 This
> makes the things vulnerable to many different types of attacks,
> depending on the criticality of the bugs, e.g., buffer overflows or lac=
k
> of authentication."

Yes, that is point#10 in section 3. Personally I think
that's the biggest challenge in this space and deserves
to be better highlighted. And it's not simply vulns, (all
systems will have some CVEs) - some of the code we've
seen deployed really is just very very crappy e.g. with
default admin/admin access exposed to the Internet in
gazillions of cameras all findable via shodan. IMO such
cases aren't really "bugs."

I forget if the draft says somewhere that if you deploy
crap, that will be found and exploited, but it probably
ought. And a couple of pointers to examples of that
having happened would be good too.

>=20
>> - p3: I don't see the point of sales-speak such as "The
>> =C3=82=C2=A0 things that are part of the Internet of Things are no
>> longer unresponsive and have transformed into computing
>> devices that understand and react to the environment they
>> reside in."
>=20
> Not a sales pitch but rephrased anyhow.
>=20
>> - p4, the lifecycle doesn't start when a tangible device is
>> =C3=82=C2=A0 manufactured but rather when the oldest bit of code the
>> ends up in the device was written.=C3=82=C2=A0 That's a significant
>> point, esp for smaller vendors who often re-use unpatched
>> old builds that "work" but may be wildly insecure.
>> - p4, I'd argue that the lifecycle could include some
>> recognition of OSS, but I'm not sure how to properly
>> include that.
>> - p4, the lifecycle could also include an on-the-shelf phase
>> =C3=82=C2=A0 and a phase where a device is re-badged by some vendor wh=
o
>> wasn't the actual original manuf.=C3=82=C2=A0 Such phases can
>> significantly complicate s/w update and bootstrapping.
>> - p4, there are two other end-states that probably ought be
>> =C3=82=C2=A0 part of the lifecycle - where a vendor end-of-life's a
>> device type that's still in use and where a device is simply
>> forgotten but keeps on trucking.=20
>=20
> Good points. We have added a paragraph before Figure 1 stating that the=

> described lifecycle is a simplified model that can be extended, e.g.,
> with the situations that you describe.

Fair enough. I'd highlight it more, but that's maybe a
matter of opinion. For me, figure 1 still seems too much
focused on what larger manufs will/can do for sets of
devices sold to larger customers.

>=20
>> - p7, section 2.2 seems pointless if it's not used later in
>> =C3=82=C2=A0 the document - you may as well delete this. FWIW, I don't=

>> find figure 3 useful.
>=20
> Removed.
>=20
>> - p9, the list seems to me to be very for-profit-vendor
>> =C3=82=C2=A0 oriented.=C3=82=C2=A0 I wonder would a non-profit or devi=
ce-using
>> organisation write a different list? I think they would,
>> e.g. they might include "crap s/w" and "attempted capture
>> via proprietary APIs/data formats/cloudy services" as
>> threats.
>=20
> We do say that the list is not-exhaustive. Some of it has more to do
> with business security than actual device/system security.

I still think there'd be value in the RG trying to reflect
inputs here from open-source developers, individual end
users and maybe pentesters. Did anyone try get review from
such folks? (Note: I'm not saying I know what they'd say,
or if it'd make much difference, but I do wonder.)

>> - p11, I would argue that privacy deserves much more
>> =C3=82=C2=A0 attention in this document than this, and that this
>> document isn't much use without that. For example, it's
>> important to include the scenario where a static sensor
>> emits a packet due to the presence/absence of people - in
>> that scenario anyone who can see that packet can potentially
>> invade the privacy of the people involved.=C3=82=C2=A0 You do include
>> more in section 5, but see my comment below about how that
>> section is(n't:-) organised.
>=20
> We have added this example to Section 5.9.
>=20
>> - p20, "the fact is that many IoT devices and systems have
>> =C3=82=C2=A0 very limited security." It seems a bit late to say this o=
n
>> page 20:-)
>=20
> Added some text earlier in the document (for example, in the abstract).=

>=20
>> - p21, I'm not sure an RFC is a good place to wonder about
>> =C3=82=C2=A0 potential future regulation, unless that's to be done in =
a
>> more thorough manner. I'd say deleting the last two
>> paragraphs of section 4.3 and replacing those with a single
>> sentence that "redional regulations aren't unlikely" might
>> be better.=20
>=20
> Removed some text and added that regional regulations aren't unlikely.
>=20
>>
>> - p22, I don't agree with the crypto points made (IMO, only
>> =C3=82=C2=A0 devices that can verify an occasional signature ought be
>> exposed to the Internet) - but even so the references here
>> aren't good - curve 25519 ought be the main ECC reference
>> relating to lessened CPU requirements. It's also a surprise
>> to not see a mention of chacha.
>=20
> Added references to curve 25519 and chacha.

Great.

I still think the RG should consider whether to make a strong
recommendation that devices that are incapable of verifying a
reasonable signature are really highly likely to cause trouble.
IOW, couldn't the RG RECOMMEND that such devices ought not be
even indirectly exposed to the Internet, given the real-world
threats faced? If the RG did have consensus on that, then that
would I think help those developing standards and subsequent
users of devices built to those standards.

>=20
>>
>> - p12, "Thus, ensuring a proper level of security in an IoT
>> =C3=82=C2=A0 system at any point of time is challenging.=C3=82=C2=A0 T=
o address
>> this challenge, a process for secure product creation is
>> required to ensure that an IoT system is secure and no
>> security risks are present." That's just silly - aiming for
>> a perfect system ("no security risks") is pointless as those
>> do not exist.
>=20
> Rephrased
>=20
>> - p13, 4.1 should have some mention of LPWANs and indeed
>> =C3=82=C2=A0 those deserve more text in general as the set of usable
>> security mechanisms and challenges differ in those parts of
>> networks.=C3=82=C2=A0 You do mention LPWAN in 5.1.4 - which confused m=
e
>> as that text probably should be here in 4.x.=C3=82=C2=A0 You might als=
o
>> wanna reference the LPWAN overview draft, currently in IETF
>> LC.=20
>=20
> Added in 4.1.
>=20
>>
>> - p16 and elsewhere - the state-of-the-art text should
>> =C3=82=C2=A0 really try to indicate which things are or more, or less,=

>> importanct. That can be tricky, but e.g.=C3=82=C2=A0 presenting HIP as=

>> being of equal importance to (D)TLS here isn't useful, nor
>> particularly credible. I also wonder if OSCOAP is as mature
>> and important as the text implies.
>=20
> Text has been adapted to make clear that TLS, DTLS are the most
> important protocols. Wording is added to make clear that HIP is less
> relevant and OSCoAP is relatively new.
>=20
>> - p21, I don't get the logic behind the organisation of
>> =C3=82=C2=A0 section 5, it seems to be a just-so list if things
>> described at fairly different levels of detail, e.g.=C3=82=C2=A0 5.1 v=
s
>> 5.2. I'd say a bit of thought as to how to organise this
>> section could lead to a better organised text.=C3=82=C2=A0 I'm not sur=
e
>> how that'd be best done myself, but perhaps some discussion
>> within the RG would help there.
>=20
> Section 5.2 is much shorter since the RG decided to include that
> material in a different Internet Draft.
>=20
>> - p24, homomorphic crypto? Huh? I don't buy that at all.
>> =C3=82=C2=A0 And following the [SEAL] reference leads to a dead end.
>> If you want to make a claim like this more detail would be
>> needed. I'd say deleting this is best.
>=20
> The text says that it is limited in use. However, this is an area in
> which many people are working and thus, we would rather keep it. We hav=
e
> updated the reference. Microsoft updated it in the last months.

My scepticism remains unchanged:-)

I don't think this is useful background for the intended
audience until after someone has documented a usable scheme
e.g. via a CFRG RFC.

>=20
>> - p28 - how is referring to an expired draft from 9 years
>> =C3=82=C2=A0 ago (yes, 2009!) useful?
>=20
> Removed.
>=20
>> - p28, [iotsu] is better referred to via rfc 8240 and I
>> =C3=82=C2=A0 think a lot of the text in 5.4 is likely included in that=

>> report. The overlap is probably fine, but it'd be no harm to
>> just check to see if anything else from 8240 would be worth
>> including here.
>=20
> Updated the reference to RFC 8240.
>=20
>> - p33, at the start of 5.9 "Users" is the wrong term, you
>> =C3=82=C2=A0 should say "People" - that's not just a nit, but an
>> important difference (and one worth explicitly calling out)
>> as the people whose privacy is affected by devices need not
>> be "users" in any sense at all. Automatic number plate
>> scanners or camera based systems are usually good examples.
>=20
> Updated as suggested.

Thanks. I think it'd be useful to explicitly point out the
difference though - the set of people affected by devices can
be much bigger than the set of users of those devices, and
implementers and people writing standards ought to, but perhaps
don't, consider both, esp. when it comes to privacy issues.

>=20
>> - p34, in 5.10 you could add some mention of and reference
>> =C3=82=C2=A0 to methods for h/w tamper detection/resistance.
>=20
> Added
>=20
>>
>> - p36 says "Thus, a potential approach is the definition and
>> =C3=82=C2=A0 standardization of security profiles,..." That conclusion=

>> is not justified based on the text of this document.
>> (Where's there anything that implies that this conclusion is
>> warranted?) Secondly, I don't agree with the conclusion
>> itself - in the case of RPL that approach has lead to
>> nothing good happening that I've seen, and I'd expect it to
>> lead to more fig-leaves if applied in other cases. Now,
>> while I may be wrong, and your conlusion may be right, I
>> think I'm fairly safe in saying that much more justification
>> is needed before this conclusion could be credibly drawn.
>=20
> Removed.

Thanks. That does leave section 6 without "next steps"
though doesn't it? I guess you could say that implementers
and those writing spec need to consider how all of these
issues (and those that emerge later) affect their work,
and need to devote real effort to addressing these issues,
and (for the spec writers) say how they've done that, so
that those reading and implementing are less likely to
screw up yet again;-)

Cheers,
S.

>=20
> If you don't find some of your comments here, then we chose not to take=

> any action on it. Please let us know if something is still needed.
>=20
> Oscar, Sandeep and Mohit
>=20
> On 01/05/2018 06:10 PM, Stephen Farrell wrote:
>> Hiya,
>>
>> Carsten asked me to take a look at this draft and
>> I said I would over the holidays, so I'm only a
>> wee bit later than promised:-)
>>
>> In general, I think some more work is needed. Aside
>> from the specific points in the attached, I wasn't
>> clear who are the intended readers - if this is mainly
>> meant for the RG, then does it need to be an RFC? If
>> the intended readership is someone else, then who?
>> And will the current text be useful for that set of
>> folks?
>>
>> Apologies in advance if some of the issues I raise
>> have been discussed in the RG before - I haven't
>> had time to participate in the RG to date. (I'm also
>> not subscribed to the RG list so please do cc me
>> on any follow ups.)
>>
>> Cheers,
>> S.
>>
>>
>>
>>
>> _______________________________________________
>> T2TRG mailing list
>> T2TRG@irtf.org
>> https://www.irtf.org/mailman/listinfo/t2trg
>=20
>=20

--=20
PGP key change time for me.
New-ID 7B172BEA; old-ID 805F8DA2 expires Jan 24 2018.
NewWithOld sigs in keyservers.
Sorry if that mucks something up;-)

--------------7958087A64D7EDB809AB9CB8
Content-Type: application/pgp-keys;
 name="0x7B172BEA.asc"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
 filename="0x7B172BEA.asc"

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=3Dg8yx
-----END PGP PUBLIC KEY BLOCK-----

--------------7958087A64D7EDB809AB9CB8--

--VQudv0ZbCKA7KIeYtvwKzcmTYHzzH9h2S--

--cLa6Jsl9dvePLdDiplqQn1NGmdL63AlCj
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQIcBAEBCAAGBQJajqQQAAoJEFqy+vF7FyvqyQQP/1GZ8XPe89VaZxTF5jX6C441
10vNKRhjUIbBKG4wbGxBX/YQX5nmCbcRE5LHQDSHRS2QC99nrrUW8qzpUYOaiB87
kkmp+mheZI3QRXUupS65kV8RJnBSQpOar+eC/06ZFpvKCk8oiP2HcxsFeEKdzFAS
JB5LRj1ejNtTj4KtttNaU+hNa0i4Ep0iz39tNEqQELkHuFAYYwMlvwWdiEOKw0C/
1j6lfeZ9zUmn/XPP+iDd4fX4IG9wC5GBIhvrZ9Xp23vDevbLA5G0ZY6rNIEgRWRV
qQr9ISVZIonVTMRQUE31NgEEzp0ayNBjAEXAUu+/VeI4JrYfSnjzVhpd3I2Ew/Vk
9+p2r+DtTgEU0VcJUQPrfFNmZhYUHATy6nMCUnQuSIF1gC7MuV+mT15w/ZqLiC3u
eaHFhQEkUgxd1mJO9UrFothrOWOqGzNO7gXkh9StSVoJe2cgvOFcTCadYOPTv+Rz
UVin9nCUP8+yZ8yic2ZXhf1is0K2DzZzDgHhMyG3V5Dmt0fA8O8RL8cTEykFQjlV
L+U4kLrKZZj3tRChDP61HlNS6mJPT7Hagj+zY89DYz0gKtbR8er4waRf8ptBzRBh
16Mw5L4t5f9JazYI7f9GKCHaG8t+rxnECoo0cTmqKPCGlk1o496QHtxR/CDyMSg1
jeoJ8BA2JYvepcjNdMtL
=Ur0o
-----END PGP SIGNATURE-----

--cLa6Jsl9dvePLdDiplqQn1NGmdL63AlCj--


From nobody Thu Feb 22 04:08:53 2018
Return-Path: <lear@cisco.com>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D152D12EA5A for <t2trg@ietfa.amsl.com>; Thu, 22 Feb 2018 04:08:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.509
X-Spam-Level: 
X-Spam-Status: No, score=-14.509 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vY2i2Dbcsxf1 for <t2trg@ietfa.amsl.com>; Thu, 22 Feb 2018 04:08:44 -0800 (PST)
Received: from aer-iport-1.cisco.com (aer-iport-1.cisco.com [173.38.203.51]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 38B9C12EA57 for <t2trg@irtf.org>; Thu, 22 Feb 2018 04:08:43 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=20635; q=dns/txt; s=iport; t=1519301323; x=1520510923; h=subject:to:cc:references:from:message-id:date: mime-version:in-reply-to; bh=9cYQo+RNQ+nhyMcqOf1QUtn7RhYW0dmd7z7AbIje2wo=; b=BjvnaoIKBG/JZ4nSe9pM5qqXdUbAtFbnRxTpN3Sc02TvEgdd45wDTnZ7 TnlSxz8bCa1gwKt8ks4d+++sFmXqePaoxpPjX7O63fjT6HHxxf1ryrpzI eqrnVtYO/xyyj7+BDZ0vrEev4s6XT0xQVLDaaB6URdTdOL+brgj+xrseX U=;
X-Files: signature.asc : 488
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0CCAQD6sY5a/xbLJq1cGQEBAQEBAQEBA?= =?us-ascii?q?QEBAQcBAQEBAYQ1cCiDaIsZjlQygRaQcIVyggIHAxgBCoURAoMCFAECAQEBAQE?= =?us-ascii?q?BAmsohSQBAQQBASFLCxALGCoCAicwBgEMBgIBAYofEKpbgicmhFqDdYITAQEBA?= =?us-ascii?q?QEBAQEBAQEBAQEBAQEBAQEBDgoFhRGBDYRYKYF3gQ6DMAGBPg0Pgy+CZQWKXwu?= =?us-ascii?q?JYIVpigwJhG+CM4UOiV6CIIYog3GIC4tIjGKBPDYigVEzGggbFTqCQ4JUHIIHQ?= =?us-ascii?q?DeJd4JNAQEB?=
X-IronPort-AV: E=Sophos;i="5.47,377,1515456000";  d="asc'?scan'208,217";a="2225497"
Received: from aer-iport-nat.cisco.com (HELO aer-core-3.cisco.com) ([173.38.203.22]) by aer-iport-1.cisco.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 22 Feb 2018 12:08:40 +0000
Received: from [10.61.241.233] ([10.61.241.233]) by aer-core-3.cisco.com (8.14.5/8.14.5) with ESMTP id w1MC8dou032404; Thu, 22 Feb 2018 12:08:39 GMT
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, Mohit Sethi <mohit.m.sethi@ericsson.com>, t2trg@irtf.org
Cc: "Garcia-Morchon O, Oscar" <oscar.garcia-morchon@philips.com>, Jim Schaad <ietf@augustcellars.com>
References: <4c4023dd-4f36-eb55-8178-2e12f40c52a8@cs.tcd.ie> <fe111a5b-c474-74d1-fb7c-2adb0dc53cd1@ericsson.com> <ab60cda0-1bc2-bdb8-3427-a5a31d2f899b@cs.tcd.ie>
From: Eliot Lear <lear@cisco.com>
Message-ID: <e6353500-ad62-ec8e-db56-43e5879bde9d@cisco.com>
Date: Thu, 22 Feb 2018 13:08:38 +0100
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.13; rv:52.0) Gecko/20100101 Thunderbird/52.6.0
MIME-Version: 1.0
In-Reply-To: <ab60cda0-1bc2-bdb8-3427-a5a31d2f899b@cs.tcd.ie>
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="6OU41uUTacTG9W4rflOku0Dg88r612Edx"
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/Ghd0efHe37L5WD1UEKl_c97N82U>
Subject: Re: [T2TRG] review of draft-irtf-t2trg-iot-seccons
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Feb 2018 12:08:51 -0000

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--6OU41uUTacTG9W4rflOku0Dg88r612Edx
Content-Type: multipart/mixed; boundary="Uxq8GvOKm5TlcURGPA6FvaPXqolc82v4d";
 protected-headers="v1"
From: Eliot Lear <lear@cisco.com>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>,
 Mohit Sethi <mohit.m.sethi@ericsson.com>, t2trg@irtf.org
Cc: "Garcia-Morchon O, Oscar" <oscar.garcia-morchon@philips.com>,
 Jim Schaad <ietf@augustcellars.com>
Message-ID: <e6353500-ad62-ec8e-db56-43e5879bde9d@cisco.com>
Subject: Re: [T2TRG] review of draft-irtf-t2trg-iot-seccons
References: <4c4023dd-4f36-eb55-8178-2e12f40c52a8@cs.tcd.ie>
 <fe111a5b-c474-74d1-fb7c-2adb0dc53cd1@ericsson.com>
 <ab60cda0-1bc2-bdb8-3427-a5a31d2f899b@cs.tcd.ie>
In-Reply-To: <ab60cda0-1bc2-bdb8-3427-a5a31d2f899b@cs.tcd.ie>

--Uxq8GvOKm5TlcURGPA6FvaPXqolc82v4d
Content-Type: multipart/alternative;
 boundary="------------D1F3759D9E8915EC4D901BB5"
Content-Language: en-US

This is a multi-part message in MIME format.
--------------D1F3759D9E8915EC4D901BB5
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable

Hi Stephen,


On 22.02.18 12:05, Stephen Farrell wrote:
> I still think the RG should consider whether to make a strong
> recommendation that devices that are incapable of verifying a
> reasonable signature are really highly likely to cause trouble.
> IOW, couldn't the RG RECOMMEND that such devices ought not be
> even indirectly exposed to the Internet, given the real-world
> threats faced? If the RG did have consensus on that, then that
> would I think help those developing standards and subsequent
> users of devices built to those standards.

I think this depends on just how connected we are talking about. Where
does one draw the line?=C2=A0 Surely we have seen Bluetooth exploits, for=

example.=C2=A0 What about serial devices?=C2=A0 Does an actuator that tak=
es a
simple +/- count?=C2=A0 To put this into some context, let's talk about
automotive vulnerabilities.=C2=A0 A classic way into a car is via the 3G
interface in the entertainment system, but an equally possible way in,
as Cantor et al demonstrated was via the diagnostic port.=C2=A0 Should a
brake actuator require authentication on the CAM?=C2=A0 How many ms do yo=
u
get or how many mw can you spend on the op before it impacts the
distance an electric vehicle can travel before its next charge?=C2=A0 A
careful drawing of the line is in order for any such recommendation, and
the parameters of that recommendation are worthy of exploration.


>
>>> - p12, "Thus, ensuring a proper level of security in an IoT
>>> =C3=82=C2=A0 system at any point of time is challenging.=C3=82=C2=A0 =
To address
>>> this challenge, a process for secure product creation is
>>> required to ensure that an IoT system is secure and no
>>> security risks are present." That's just silly - aiming for
>>> a perfect system ("no security risks") is pointless as those
>>> do not exist.
>> Rephrased
>>
>>> - p13, 4.1 should have some mention of LPWANs and indeed
>>> =C3=82=C2=A0 those deserve more text in general as the set of usable
>>> security mechanisms and challenges differ in those parts of
>>> networks.=C3=82=C2=A0 You do mention LPWAN in 5.1.4 - which confused =
me
>>> as that text probably should be here in 4.x.=C3=82=C2=A0 You might al=
so
>>> wanna reference the LPWAN overview draft, currently in IETF
>>> LC.=20
>> Added in 4.1.
>>
>>> - p16 and elsewhere - the state-of-the-art text should
>>> =C3=82=C2=A0 really try to indicate which things are or more, or less=
,
>>> importanct. That can be tricky, but e.g.=C3=82=C2=A0 presenting HIP a=
s
>>> being of equal importance to (D)TLS here isn't useful, nor
>>> particularly credible. I also wonder if OSCOAP is as mature
>>> and important as the text implies.
>> Text has been adapted to make clear that TLS, DTLS are the most
>> important protocols. Wording is added to make clear that HIP is less
>> relevant and OSCoAP is relatively new.
>>
>>> - p21, I don't get the logic behind the organisation of
>>> =C3=82=C2=A0 section 5, it seems to be a just-so list if things
>>> described at fairly different levels of detail, e.g.=C3=82=C2=A0 5.1 =
vs
>>> 5.2. I'd say a bit of thought as to how to organise this
>>> section could lead to a better organised text.=C3=82=C2=A0 I'm not su=
re
>>> how that'd be best done myself, but perhaps some discussion
>>> within the RG would help there.
>> Section 5.2 is much shorter since the RG decided to include that
>> material in a different Internet Draft.
>>
>>> - p24, homomorphic crypto? Huh? I don't buy that at all.
>>> =C3=82=C2=A0 And following the [SEAL] reference leads to a dead end.
>>> If you want to make a claim like this more detail would be
>>> needed. I'd say deleting this is best.
>> The text says that it is limited in use. However, this is an area in
>> which many people are working and thus, we would rather keep it. We ha=
ve
>> updated the reference. Microsoft updated it in the last months.
> My scepticism remains unchanged:-)
>
> I don't think this is useful background for the intended
> audience until after someone has documented a usable scheme
> e.g. via a CFRG RFC.
>
>>> - p28 - how is referring to an expired draft from 9 years
>>> =C3=82=C2=A0 ago (yes, 2009!) useful?
>> Removed.
>>
>>> - p28, [iotsu] is better referred to via rfc 8240 and I
>>> =C3=82=C2=A0 think a lot of the text in 5.4 is likely included in tha=
t
>>> report. The overlap is probably fine, but it'd be no harm to
>>> just check to see if anything else from 8240 would be worth
>>> including here.
>> Updated the reference to RFC 8240.
>>
>>> - p33, at the start of 5.9 "Users" is the wrong term, you
>>> =C3=82=C2=A0 should say "People" - that's not just a nit, but an
>>> important difference (and one worth explicitly calling out)
>>> as the people whose privacy is affected by devices need not
>>> be "users" in any sense at all. Automatic number plate
>>> scanners or camera based systems are usually good examples.
>> Updated as suggested.
> Thanks. I think it'd be useful to explicitly point out the
> difference though - the set of people affected by devices can
> be much bigger than the set of users of those devices, and
> implementers and people writing standards ought to, but perhaps
> don't, consider both, esp. when it comes to privacy issues.
>
>>> - p34, in 5.10 you could add some mention of and reference
>>> =C3=82=C2=A0 to methods for h/w tamper detection/resistance.
>> Added
>>
>>> - p36 says "Thus, a potential approach is the definition and
>>> =C3=82=C2=A0 standardization of security profiles,..." That conclusio=
n
>>> is not justified based on the text of this document.
>>> (Where's there anything that implies that this conclusion is
>>> warranted?) Secondly, I don't agree with the conclusion
>>> itself - in the case of RPL that approach has lead to
>>> nothing good happening that I've seen, and I'd expect it to
>>> lead to more fig-leaves if applied in other cases. Now,
>>> while I may be wrong, and your conlusion may be right, I
>>> think I'm fairly safe in saying that much more justification
>>> is needed before this conclusion could be credibly drawn.
>> Removed.
> Thanks. That does leave section 6 without "next steps"
> though doesn't it? I guess you could say that implementers
> and those writing spec need to consider how all of these
> issues (and those that emerge later) affect their work,
> and need to devote real effort to addressing these issues,
> and (for the spec writers) say how they've done that, so
> that those reading and implementing are less likely to
> screw up yet again;-)
>
> Cheers,
> S.
>
>> If you don't find some of your comments here, then we chose not to tak=
e
>> any action on it. Please let us know if something is still needed.
>>
>> Oscar, Sandeep and Mohit
>>
>> On 01/05/2018 06:10 PM, Stephen Farrell wrote:
>>> Hiya,
>>>
>>> Carsten asked me to take a look at this draft and
>>> I said I would over the holidays, so I'm only a
>>> wee bit later than promised:-)
>>>
>>> In general, I think some more work is needed. Aside
>>> from the specific points in the attached, I wasn't
>>> clear who are the intended readers - if this is mainly
>>> meant for the RG, then does it need to be an RFC? If
>>> the intended readership is someone else, then who?
>>> And will the current text be useful for that set of
>>> folks?
>>>
>>> Apologies in advance if some of the issues I raise
>>> have been discussed in the RG before - I haven't
>>> had time to participate in the RG to date. (I'm also
>>> not subscribed to the RG list so please do cc me
>>> on any follow ups.)
>>>
>>> Cheers,
>>> S.
>>>
>>>
>>>
>>>
>>> _______________________________________________
>>> T2TRG mailing list
>>> T2TRG@irtf.org
>>> https://www.irtf.org/mailman/listinfo/t2trg
>>
>
>
> _______________________________________________
> T2TRG mailing list
> T2TRG@irtf.org
> https://www.irtf.org/mailman/listinfo/t2trg


--------------D1F3759D9E8915EC4D901BB5
Content-Type: text/html; charset=utf-8
Content-Transfer-Encoding: quoted-printable

<html>
  <head>
    <meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dutf=
-8">
  </head>
  <body text=3D"#000000" bgcolor=3D"#FFFFFF">
    <p>Hi Stephen,<br>
    </p>
    <br>
    <div class=3D"moz-cite-prefix">On 22.02.18 12:05, Stephen Farrell
      wrote:<br>
    </div>
    <blockquote type=3D"cite"
      cite=3D"mid:ab60cda0-1bc2-bdb8-3427-a5a31d2f899b@cs.tcd.ie">
      <pre wrap=3D"">
I still think the RG should consider whether to make a strong
recommendation that devices that are incapable of verifying a
reasonable signature are really highly likely to cause trouble.
IOW, couldn't the RG RECOMMEND that such devices ought not be
even indirectly exposed to the Internet, given the real-world
threats faced? If the RG did have consensus on that, then that
would I think help those developing standards and subsequent
users of devices built to those standards.</pre>
    </blockquote>
    <br>
    I think this depends on just how connected we are talking about.
    Where does one draw the line?=C2=A0 Surely we have seen Bluetooth
    exploits, for example.=C2=A0 What about serial devices?=C2=A0 Does an=
 actuator
    that takes a simple +/- count?=C2=A0 To put this into some context, l=
et's
    talk about automotive vulnerabilities.=C2=A0 A classic way into a car=
 is
    via the 3G interface in the entertainment system, but an equally
    possible way in, as Cantor et al demonstrated was via the diagnostic
    port.=C2=A0 Should a brake actuator require authentication on the CAM=
?=C2=A0
    How many ms do you get or how many mw can you spend on the op before
    it impacts the distance an electric vehicle can travel before its
    next charge?=C2=A0 A careful drawing of the line is in order for any =
such
    recommendation, and the parameters of that recommendation are worthy
    of exploration.<br>
    <br>
    <br>
    <blockquote type=3D"cite"
      cite=3D"mid:ab60cda0-1bc2-bdb8-3427-a5a31d2f899b@cs.tcd.ie">
      <pre wrap=3D"">

</pre>
      <blockquote type=3D"cite">
        <pre wrap=3D"">
</pre>
        <blockquote type=3D"cite">
          <pre wrap=3D"">
- p12, "Thus, ensuring a proper level of security in an IoT
=C3=82=C2=A0 system at any point of time is challenging.=C3=82=C2=A0 To a=
ddress
this challenge, a process for secure product creation is
required to ensure that an IoT system is secure and no
security risks are present." That's just silly - aiming for
a perfect system ("no security risks") is pointless as those
do not exist.
</pre>
        </blockquote>
        <pre wrap=3D"">
Rephrased

</pre>
        <blockquote type=3D"cite">
          <pre wrap=3D"">- p13, 4.1 should have some mention of LPWANs an=
d indeed
=C3=82=C2=A0 those deserve more text in general as the set of usable
security mechanisms and challenges differ in those parts of
networks.=C3=82=C2=A0 You do mention LPWAN in 5.1.4 - which confused me
as that text probably should be here in 4.x.=C3=82=C2=A0 You might also
wanna reference the LPWAN overview draft, currently in IETF
LC.=20
</pre>
        </blockquote>
        <pre wrap=3D"">
Added in 4.1.

</pre>
        <blockquote type=3D"cite">
          <pre wrap=3D"">
- p16 and elsewhere - the state-of-the-art text should
=C3=82=C2=A0 really try to indicate which things are or more, or less,
importanct. That can be tricky, but e.g.=C3=82=C2=A0 presenting HIP as
being of equal importance to (D)TLS here isn't useful, nor
particularly credible. I also wonder if OSCOAP is as mature
and important as the text implies.
</pre>
        </blockquote>
        <pre wrap=3D"">
Text has been adapted to make clear that TLS, DTLS are the most
important protocols. Wording is added to make clear that HIP is less
relevant and OSCoAP is relatively new.

</pre>
        <blockquote type=3D"cite">
          <pre wrap=3D"">- p21, I don't get the logic behind the organisa=
tion of
=C3=82=C2=A0 section 5, it seems to be a just-so list if things
described at fairly different levels of detail, e.g.=C3=82=C2=A0 5.1 vs
5.2. I'd say a bit of thought as to how to organise this
section could lead to a better organised text.=C3=82=C2=A0 I'm not sure
how that'd be best done myself, but perhaps some discussion
within the RG would help there.
</pre>
        </blockquote>
        <pre wrap=3D"">
Section 5.2 is much shorter since the RG decided to include that
material in a different Internet Draft.

</pre>
        <blockquote type=3D"cite">
          <pre wrap=3D"">- p24, homomorphic crypto? Huh? I don't buy that=
 at all.
=C3=82=C2=A0 And following the [SEAL] reference leads to a dead end.
If you want to make a claim like this more detail would be
needed. I'd say deleting this is best.
</pre>
        </blockquote>
        <pre wrap=3D"">
The text says that it is limited in use. However, this is an area in
which many people are working and thus, we would rather keep it. We have
updated the reference. Microsoft updated it in the last months.
</pre>
      </blockquote>
      <pre wrap=3D"">
My scepticism remains unchanged:-)

I don't think this is useful background for the intended
audience until after someone has documented a usable scheme
e.g. via a CFRG RFC.

</pre>
      <blockquote type=3D"cite">
        <pre wrap=3D"">
</pre>
        <blockquote type=3D"cite">
          <pre wrap=3D"">- p28 - how is referring to an expired draft fro=
m 9 years
=C3=82=C2=A0 ago (yes, 2009!) useful?
</pre>
        </blockquote>
        <pre wrap=3D"">
Removed.

</pre>
        <blockquote type=3D"cite">
          <pre wrap=3D"">- p28, [iotsu] is better referred to via rfc 824=
0 and I
=C3=82=C2=A0 think a lot of the text in 5.4 is likely included in that
report. The overlap is probably fine, but it'd be no harm to
just check to see if anything else from 8240 would be worth
including here.
</pre>
        </blockquote>
        <pre wrap=3D"">
Updated the reference to RFC 8240.

</pre>
        <blockquote type=3D"cite">
          <pre wrap=3D"">- p33, at the start of 5.9 "Users" is the wrong =
term, you
=C3=82=C2=A0 should say "People" - that's not just a nit, but an
important difference (and one worth explicitly calling out)
as the people whose privacy is affected by devices need not
be "users" in any sense at all. Automatic number plate
scanners or camera based systems are usually good examples.
</pre>
        </blockquote>
        <pre wrap=3D"">
Updated as suggested.
</pre>
      </blockquote>
      <pre wrap=3D"">
Thanks. I think it'd be useful to explicitly point out the
difference though - the set of people affected by devices can
be much bigger than the set of users of those devices, and
implementers and people writing standards ought to, but perhaps
don't, consider both, esp. when it comes to privacy issues.

</pre>
      <blockquote type=3D"cite">
        <pre wrap=3D"">
</pre>
        <blockquote type=3D"cite">
          <pre wrap=3D"">- p34, in 5.10 you could add some mention of and=
 reference
=C3=82=C2=A0 to methods for h/w tamper detection/resistance.
</pre>
        </blockquote>
        <pre wrap=3D"">
Added

</pre>
        <blockquote type=3D"cite">
          <pre wrap=3D"">
- p36 says "Thus, a potential approach is the definition and
=C3=82=C2=A0 standardization of security profiles,..." That conclusion
is not justified based on the text of this document.
(Where's there anything that implies that this conclusion is
warranted?) Secondly, I don't agree with the conclusion
itself - in the case of RPL that approach has lead to
nothing good happening that I've seen, and I'd expect it to
lead to more fig-leaves if applied in other cases. Now,
while I may be wrong, and your conlusion may be right, I
think I'm fairly safe in saying that much more justification
is needed before this conclusion could be credibly drawn.
</pre>
        </blockquote>
        <pre wrap=3D"">
Removed.
</pre>
      </blockquote>
      <pre wrap=3D"">
Thanks. That does leave section 6 without "next steps"
though doesn't it? I guess you could say that implementers
and those writing spec need to consider how all of these
issues (and those that emerge later) affect their work,
and need to devote real effort to addressing these issues,
and (for the spec writers) say how they've done that, so
that those reading and implementing are less likely to
screw up yet again;-)

Cheers,
S.

</pre>
      <blockquote type=3D"cite">
        <pre wrap=3D"">
If you don't find some of your comments here, then we chose not to take
any action on it. Please let us know if something is still needed.

Oscar, Sandeep and Mohit

On 01/05/2018 06:10 PM, Stephen Farrell wrote:
</pre>
        <blockquote type=3D"cite">
          <pre wrap=3D"">Hiya,

Carsten asked me to take a look at this draft and
I said I would over the holidays, so I'm only a
wee bit later than promised:-)

In general, I think some more work is needed. Aside
from the specific points in the attached, I wasn't
clear who are the intended readers - if this is mainly
meant for the RG, then does it need to be an RFC? If
the intended readership is someone else, then who?
And will the current text be useful for that set of
folks?

Apologies in advance if some of the issues I raise
have been discussed in the RG before - I haven't
had time to participate in the RG to date. (I'm also
not subscribed to the RG list so please do cc me
on any follow ups.)

Cheers,
S.




_______________________________________________
T2TRG mailing list
<a class=3D"moz-txt-link-abbreviated" href=3D"mailto:T2TRG@irtf.org">T2TR=
G@irtf.org</a>
<a class=3D"moz-txt-link-freetext" href=3D"https://www.irtf.org/mailman/l=
istinfo/t2trg">https://www.irtf.org/mailman/listinfo/t2trg</a>
</pre>
        </blockquote>
        <pre wrap=3D"">

</pre>
      </blockquote>
      <pre wrap=3D"">
</pre>
      <br>
      <fieldset class=3D"mimeAttachmentHeader"></fieldset>
      <br>
      <pre wrap=3D"">_______________________________________________
T2TRG mailing list
<a class=3D"moz-txt-link-abbreviated" href=3D"mailto:T2TRG@irtf.org">T2TR=
G@irtf.org</a>
<a class=3D"moz-txt-link-freetext" href=3D"https://www.irtf.org/mailman/l=
istinfo/t2trg">https://www.irtf.org/mailman/listinfo/t2trg</a>
</pre>
    </blockquote>
    <br>
  </body>
</html>

--------------D1F3759D9E8915EC4D901BB5--

--Uxq8GvOKm5TlcURGPA6FvaPXqolc82v4d--

--6OU41uUTacTG9W4rflOku0Dg88r612Edx
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCAAdFiEEmNC9kEYdsJKnsmEdh7ZrRtnSejMFAlqOsscACgkQh7ZrRtnS
ejOwOggAm9UvLikXzsjbU9zQwJY236EcInmtWtROpOi/R0BPA7/FSM/brEkPWcJN
D4zbVa6lFBwMtJRsNFzh64Nf1SLteF2NPmh8rlnMypMrXLRoKP6oaoEXLunB3PSH
/melqQbYN6y72SNfHhT2Aooq1W1Cz+AN3HI+VbNUcXZ6xvSwyFcmJtcCIbwUTg5m
Tp10++NgEYZM3zdANKKC5xlykzaiXIWYdXObj1dDllEq8+JCis2f3l8QaddqhI7O
Yza850LDBuhq9xoEd4KyBsCktFu32QKeDRc/3Kwy0FoANNHp6uFP5TBYnQN4IitV
5sHKrC83Hmuy5/HVNwSB6haLDkW3/Q==
=HRSB
-----END PGP SIGNATURE-----

--6OU41uUTacTG9W4rflOku0Dg88r612Edx--


From nobody Thu Feb 22 04:42:02 2018
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7156812426E for <t2trg@ietfa.amsl.com>; Thu, 22 Feb 2018 04:42:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.311
X-Spam-Level: 
X-Spam-Status: No, score=-4.311 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lUa8nddV7XLA for <t2trg@ietfa.amsl.com>; Thu, 22 Feb 2018 04:41:58 -0800 (PST)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3112012EA87 for <t2trg@irtf.org>; Thu, 22 Feb 2018 04:41:57 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id D0A64BE51; Thu, 22 Feb 2018 12:41:53 +0000 (GMT)
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oidw11HsjqQN; Thu, 22 Feb 2018 12:41:53 +0000 (GMT)
Received: from [134.226.36.93] (bilbo.dsg.cs.tcd.ie [134.226.36.93]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 63D9ABE4C; Thu, 22 Feb 2018 12:41:53 +0000 (GMT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1519303313; bh=pb57Hc175fEf+VGLk5sQQGk9KMwjy1Spd8V3Nq0XirU=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=SImqhk5j1T/23Q2oH0HwIdSFN46sw0pMdkifyqo+MMEI7TUwQfFzmbCUIqiba/tb3 2VdGM6F0rdZGA3pS8wyJ7XnhHgsNucJ4FGIrgzxrpzwhxEkGr8mGPGdSlaA6u6A+xp hvU6iVdIplrZu4Mj6SC2P+hlvTaQjkb88I1aHzoU=
To: Eliot Lear <lear@cisco.com>, Mohit Sethi <mohit.m.sethi@ericsson.com>, t2trg@irtf.org
Cc: "Garcia-Morchon O, Oscar" <oscar.garcia-morchon@philips.com>, Jim Schaad <ietf@augustcellars.com>
References: <4c4023dd-4f36-eb55-8178-2e12f40c52a8@cs.tcd.ie> <fe111a5b-c474-74d1-fb7c-2adb0dc53cd1@ericsson.com> <ab60cda0-1bc2-bdb8-3427-a5a31d2f899b@cs.tcd.ie> <e6353500-ad62-ec8e-db56-43e5879bde9d@cisco.com>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Openpgp: id=5BB5A6EA5765D2C5863CAE275AB2FAF17B172BEA; url=
Message-ID: <437bcece-df2d-230f-357b-9208fe0e88ac@cs.tcd.ie>
Date: Thu, 22 Feb 2018 12:41:52 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0
MIME-Version: 1.0
In-Reply-To: <e6353500-ad62-ec8e-db56-43e5879bde9d@cisco.com>
Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="QTOHXUCFRE0sVWdrTrXVExFMX0g7xO6as"
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/RPsPWUayonh1dGEu8lhkuv7L28M>
Subject: Re: [T2TRG] review of draft-irtf-t2trg-iot-seccons
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Feb 2018 12:42:00 -0000

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--QTOHXUCFRE0sVWdrTrXVExFMX0g7xO6as
Content-Type: multipart/mixed; boundary="MDe5eR2romzql2metiKpXuBQYkgZlMqWJ";
 protected-headers="v1"
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
To: Eliot Lear <lear@cisco.com>, Mohit Sethi <mohit.m.sethi@ericsson.com>,
 t2trg@irtf.org
Cc: "Garcia-Morchon O, Oscar" <oscar.garcia-morchon@philips.com>,
 Jim Schaad <ietf@augustcellars.com>
Message-ID: <437bcece-df2d-230f-357b-9208fe0e88ac@cs.tcd.ie>
Subject: Re: [T2TRG] review of draft-irtf-t2trg-iot-seccons
References: <4c4023dd-4f36-eb55-8178-2e12f40c52a8@cs.tcd.ie>
 <fe111a5b-c474-74d1-fb7c-2adb0dc53cd1@ericsson.com>
 <ab60cda0-1bc2-bdb8-3427-a5a31d2f899b@cs.tcd.ie>
 <e6353500-ad62-ec8e-db56-43e5879bde9d@cisco.com>
In-Reply-To: <e6353500-ad62-ec8e-db56-43e5879bde9d@cisco.com>

--MDe5eR2romzql2metiKpXuBQYkgZlMqWJ
Content-Type: multipart/mixed;
 boundary="------------675BB7D594A56A8367B1AB97"
Content-Language: en-GB

This is a multi-part message in MIME format.
--------------675BB7D594A56A8367B1AB97
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable


Hiya,

On 22/02/18 12:08, Eliot Lear wrote:
> Hi Stephen,
>=20
>=20
> On 22.02.18 12:05, Stephen Farrell wrote:
>> I still think the RG should consider whether to make a strong
>> recommendation that devices that are incapable of verifying a
>> reasonable signature are really highly likely to cause trouble.
>> IOW, couldn't the RG RECOMMEND that such devices ought not be
>> even indirectly exposed to the Internet, given the real-world
>> threats faced? If the RG did have consensus on that, then that
>> would I think help those developing standards and subsequent
>> users of devices built to those standards.
>=20
> I think this depends on just how connected we are talking about. Where
> does one draw the line?=C3=82=C2=A0 Surely we have seen Bluetooth explo=
its, for
> example.=C3=82=C2=A0 What about serial devices?=C3=82=C2=A0 Does an act=
uator that takes a
> simple +/- count?=C3=82=C2=A0 To put this into some context, let's talk=
 about
> automotive vulnerabilities.=C3=82=C2=A0 A classic way into a car is via=
 the 3G
> interface in the entertainment system, but an equally possible way in,
> as Cantor et al demonstrated was via the diagnostic port.=C3=82=C2=A0 S=
hould a
> brake actuator require authentication on the CAM?=C3=82=C2=A0 How many =
ms do you
> get or how many mw can you spend on the op before it impacts the
> distance an electric vehicle can travel before its next charge?=C3=82=C2=
=A0 A
> careful drawing of the line is in order for any such recommendation, an=
d
> the parameters of that recommendation are worthy of exploration.

I agree that any "baseline" crypto capability recommendation
would need such exploration and justification. OTOH, we do
kinda know that s/w update pretty much needs signatures, which
is why I suggest that the ability to verify some signatures
at some time(s) could be a good baseline capability to consider.
(That's not to suggest that all inbound messages to all devices
be signed, as that'd not be a good plan:-)

What I'm suggesting is that the RG do the exercise of trying
to see if such a baseline could be usefully described. (And as
I'm not on the RG list, it could be that that's been discussed,
but if so, that's not visible in this draft.)

Cheers,
S.




--------------675BB7D594A56A8367B1AB97
Content-Type: application/pgp-keys;
 name="0x7B172BEA.asc"
Content-Transfer-Encoding: quoted-printable
Content-Disposition: attachment;
 filename="0x7B172BEA.asc"

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=3Dg8yx
-----END PGP PUBLIC KEY BLOCK-----

--------------675BB7D594A56A8367B1AB97--

--MDe5eR2romzql2metiKpXuBQYkgZlMqWJ--

--QTOHXUCFRE0sVWdrTrXVExFMX0g7xO6as
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
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=RRb5
-----END PGP SIGNATURE-----

--QTOHXUCFRE0sVWdrTrXVExFMX0g7xO6as--


From nobody Fri Feb 23 12:44:45 2018
Return-Path: <ari.keranen@ericsson.com>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B3B3D1205F0 for <t2trg@ietfa.amsl.com>; Fri, 23 Feb 2018 12:44:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.321
X-Spam-Level: 
X-Spam-Status: No, score=-4.321 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id poudDEc3eJ9H for <t2trg@ietfa.amsl.com>; Fri, 23 Feb 2018 12:44:43 -0800 (PST)
Received: from sesbmg22.ericsson.net (sesbmg22.ericsson.net [193.180.251.48]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1E177124235 for <t2trg@irtf.org>; Fri, 23 Feb 2018 12:44:42 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/simple; q=dns/txt; i=@ericsson.com; t=1519418681; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=AOQP+gXXA+MwOusrZMsY4QbFqAWsdL4H6/heJtpGrSQ=; b=V75yeV0B5Z5GP+NlISVoVLd3LN6j5kUBFy8Um2Aukf1i8vGC2hcAP0EgX9u3f5zQ Y480XM9qKSYArgmDs/ozrhBmPlHln1WGWZyyy4KPb0ONiDkJJRMJ/JxD7vdm4LXO iDSbnbeZoqTc13Is1TWoqXpGpN+5jZas4x7uxwuxj/Q=;
X-AuditID: c1b4fb30-399ff70000004778-7e-5a907d395862
Received: from ESESSHC020.ericsson.se (Unknown_Domain [153.88.183.78]) by sesbmg22.ericsson.net (Symantec Mail Security) with SMTP id B5.27.18296.93D709A5; Fri, 23 Feb 2018 21:44:41 +0100 (CET)
Received: from ESESSMB109.ericsson.se ([169.254.9.195]) by ESESSHC020.ericsson.se ([153.88.183.78]) with mapi id 14.03.0352.000; Fri, 23 Feb 2018 21:44:40 +0100
From: =?iso-8859-1?Q?Ari_Ker=E4nen?= <ari.keranen@ericsson.com>
To: "t2trg@irtf.org" <t2trg@irtf.org>
Thread-Topic: Reminder: WISHI Semantic Interoperability Test Event planning call (February 26th, 2018) and questionnaire
Thread-Index: AQHTrOcgo03BH0MQqEeOMuxPiTTJRg==
Date: Fri, 23 Feb 2018 20:44:40 +0000
Message-ID: <8790AF73-EA79-41A2-9896-DE9BAFC08CDD@ericsson.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [87.95.226.8]
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <93A3F525EA7632498EB9E1D04463AE24@ericsson.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrCLMWRmVeSWpSXmKPExsUyM2K7n65l7YQogzWNfBbvH/SwODB6TN54 mC2AMYrLJiU1J7MstUjfLoErY/5ph4KprBUXp0s2MC5m6WLk5JAQMJE48HkbcxcjF4eQwGFG id4Zd1khnCWMEs0f3zKDVLEJ2EtMXvOREcQWEVCV2DhzIyuILSxQKjGhaxOQzQEUr5L4eqoA okRP4tj332AlLEDl29+cBxvDCzRm9tM/YHFGATGJ76fWMIHYzALiEreezGeCOEhAYskeiHoJ AVGJl4//sULY8hIzzt6CqteTuDF1ChuEbS1x5v0hZghbW2LZwtdQuwQlTs58wjKBUXgWkhWz kLTPQtI+C0n7LCTtCxhZVzGKFqcWJ+WmGxnppRZlJhcX5+fp5aWWbGIEhv3BLb8NdjC+fO54 iFGAg1GJh3dq6YQoIdbEsuLK3EOMEhzMSiK8Zc/7o4R4UxIrq1KL8uOLSnNSiw8xSnOwKInz nvTkjRISSE8sSc1OTS1ILYLJMnFwSjUwhk5vU4urVTlXuHjrteO2rw4KbdWbZmoV5M+/8fsu tz+XVq3nOLqxxiY0+P42hTkaAdsv3TVi+rFCke21+h6fHd8YmZanH9e1efS+Ynuixo870R+f ubH9rL7Yt0nlD5fnjpm1P39cer9r74Pl86a1SLBUzp/LtrF1x5qG+6JZTnVLBdve9Z5y3qHE UpyRaKjFXFScCAC++aRZdwIAAA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/riVyuqxhZ1J_zQTeOi2jGfLhDAU>
Subject: [T2TRG] Reminder: WISHI Semantic Interoperability Test Event planning call (February 26th, 2018) and questionnaire
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Feb 2018 20:44:45 -0000

Hi all,

Remember that we have a WISHI Semantic Interoperability Test Event planning=
 call coming next Monday, February 26th 6:30-7:00 AM PST (15:30-16:00 CET).=
 This is only a 30 minute call with a topic of planning for the test event =
in the IETF hackathon.

For details, see:
https://github.com/t2trg/wishi/wiki/Agenda-items

Join the call here: https://jitsi.tools.ietf.org/t2trg-wishi

Also, if you are planning to join the hackathon (with or without running co=
de) and haven't yet filled the questionnaire, please do so as soon as possi=
ble:
https://github.com/t2trg/wishi/wiki/Hackathon--Participant-Questionnaire


Thanks,
Ari=


From nobody Sat Feb 24 00:04:12 2018
Return-Path: <cabo@tzi.org>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0AD21126D45; Sat, 24 Feb 2018 00:03:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BpTacQAHyYk4; Sat, 24 Feb 2018 00:03:35 -0800 (PST)
Received: from mailhost.informatik.uni-bremen.de (mailhost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::12]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 14003120227; Sat, 24 Feb 2018 00:03:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at informatik.uni-bremen.de
Received: from submithost.informatik.uni-bremen.de (submithost.informatik.uni-bremen.de [IPv6:2001:638:708:30c9::b]) by mailhost.informatik.uni-bremen.de (8.14.5/8.14.5) with ESMTP id w1O83Vm7021286; Sat, 24 Feb 2018 09:03:31 +0100 (CET)
Received: from client-0185.vpn.uni-bremen.de (client-0185.vpn.uni-bremen.de [134.102.107.185]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by submithost.informatik.uni-bremen.de (Postfix) with ESMTPSA id 3zpLFG64Z9zDXfw; Sat, 24 Feb 2018 09:03:30 +0100 (CET)
From: Carsten Bormann <cabo@tzi.org>
Content-Type: text/plain; charset=utf-8
X-Mao-Original-Outgoing-Id: 541152208.06002-906f3783a4e6b88ee7e0de21eeb0bf70
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
Date: Sat, 24 Feb 2018 00:03:29 -0800
Message-Id: <42D54C90-DA66-42FB-B734-27986B87BC2E@tzi.org>
To: ace <ace@ietf.org>, "core@ietf.org WG" <core@ietf.org>, cose <cose@ietf.org>, cbor@ietf.org, t2trg@irtf.org
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/YLsteJeOWSn6xfTEQMZO5Viuzrg>
Subject: [T2TRG] Constrained Node/Network Cluster @ IETF101: "FINAL" AGENDA
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sat, 24 Feb 2018 08:03:38 -0000

Here is my usual eclectic condensed agenda based on the "FINAL" AGENDA
for IETF101.  Remember that "FINAL" means this will be the basis for
printed agenda sheets, there is still some potential for changes after
that.

SUIT is now on top of CORE (!??).

(Also, ICE has moved.)  The painful ones this time include: DINRG
vs. ACE, CBOR vs. TEEP, ROLL vs. traveling to OCF/WoT; also CORE
vs. ANIMA, CORE vs. QUIC, CORE vs. SECDISPATCH.

All times are actually in GMT (UTC+0000, DST only starts in London on
March 25).  (You can always get pure UTC times on
https://datatracker.ietf.org/meeting/agenda-utc, for those who want to
listen from remote.)

Gr=C3=BC=C3=9Fe, Carsten

SATURDAY/SUNDAY
-- Hackathon (including various interops)

MONDAY, March 19, 2018

0930-1200  Morning Session I
Blenheim	ART	dispatch	Dispatch WG - 0930-1100 Joint =
with ARTAREA
Sandringham	INT	ipwave	IP Wireless Access in Vehicular =
Environments WG
Palace C	IRTF***	dinrg	Decentralized Internet Infrastructure =
Proposed RG
Viscount	OPS	v6ops	IPv6 Operations WG
Balmoral	SEC ***	ace	Authentication and Authorization for =
Constrained Environments WG

1330-1530  Afternoon Session I
Richm_Chl_Tow	ART ***	core	Constrained RESTful Environments WG
Viscount	INT	6man	IPv6 Maintenance WG
Buckingham	SEC ***	suit	Software Updates for Internet of Things =
WG
Sandringham	TSV	quic	QUIC WG

1550-1720  Afternoon Session II
Sandringham	INT	intarea	Internet Area Working Group WG
Balmoral	IRTF	cfrg	Crypto Forum
Viscount	SEC	oauth	Web Authorization Protocol WG

1740-1840  Afternoon Session III
Balmoral	SEC	tls	Transport Layer Security WG
Sandringham	TSV	tsvarea	Transport Area Open Meeting

TUESDAY, March 20, 2018

0930-1200  Morning Session I
Viscount	ART ***	core	Constrained RESTful Environments WG
Sandringham	IRTF	maprg	Measurement and Analysis for Protocols
Buckingham	OPS	anima	Autonomic Networking Integrated Model =
and Approach WG
Blenheim	SEC	secdispatch	Security Dispatch WG

1330-1530  Afternoon Session I
Park Suite	ART ***	cbor	Concise Binary Object Representation =
Maintenance and Extensions WG
Palace C	ART	ice	Interactive Connectivity Establishment =
WG
Buckingham	IRTF	panrg	Path Aware Networking Proposed RG
Richm_Chl_Tow	RTG	rift	Routing In Fat Trees WG
Balmoral	SEC ***	teep	Trusted Execution Environment =
Provisioning BOF

1550-1820  Afternoon Session II
Balmoral	ART	httpbis	Hypertext Transfer Protocol WG
Park Suite	IRTF	icnrg	Information-Centric Networking

WEDNESDAY, March 21, 2018

0930-1200  Morning Session I
Viscount	INT ***	lpwan	IPv6 over Low Power Wide-Area Networks =
WG
Sandringham	IRTF	irtfopen	IRTF Open Meeting
Blenheim	SEC	tls	Transport Layer Security WG
Park Suite	TSV	taps	Transport Services WG

1330-1500  Afternoon Session I
Viscount	INT ***	6tisch	IPv6 over the TSCH mode of IEEE =
802.15.4e WG
Richm_Chl_Tow	RTG	bier	Bit Indexed Explicit Replication WG
Park Suite	SEC	oauth	Web Authorization Protocol WG
Palace C	TSV	rmcat	RTP Media Congestion Avoidance =
Techniques WG

1520-1650  Afternoon Session II
Park Suite	INT ***	lwig	Light-Weight Implementation Guidance WG
Buckingham	SEC	acme	Automated Certificate Management =
Environment WG
Viscount	SEC	tokbind	Token Binding WG

1710-1940  IETF Plenary - Sandringham

THURSDAY, March 22, 2018

0930-1200  Morning Session I
Buckingham	INT	dnssd	Extensions for Scalable DNS Service =
Discovery  WG
Park Suite	RTG ***	roll	Routing Over Low power and Lossy =
networks WG
Sandringham	TSV	quic	QUIC WG

1330-1530  Afternoon Session I
Buckingham	INT ***	6lo	IPv6 over Networks of =
Resource-constrained Nodes WG
Sandringham	SEC	saag	Security Area Open Meeting

1550-1750  Afternoon Session II
Blenheim	IRTF***	t2trg	Thing-to-Thing
Sandringham	RTG	rtgarea	Routing Area Open Meeting
Buckingham	SEC	mls	Messaging Layer Security BOF
Balmoral	TSV	tsvwg	Transport Area Working Group WG

1810-1910  Afternoon Session III
Blenheim	ART	uta	Using TLS in Applications WG
Park Suite	RTG	babel	Babel routing protocol WG
Balmoral	TSV	tsvwg	Transport Area Working Group WG

FRIDAY, March 23, 2018

0930-1130  Morning Session I
Sandringham	INT	homenet	Home Networking WG
Blenheim	RTG	detnet	Deterministic Networking WG
Viscount	RTG ***	roll	Routing Over Low power and Lossy =
networks WG

1150-1320  Afternoon Session I
Blenheim	RTG	detnet	Deterministic Networking WG - 1150 - =
1430

1330-1730  @ OCF meeting venue (Prague, colocated with W3C WoT)
-- Joint meeting of OCF, W3C WoT, and T2TRG (UTC+01:00 times)


From nobody Mon Feb 26 01:20:21 2018
Return-Path: <ari.keranen@ericsson.com>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E6CEE1204DA for <t2trg@ietfa.amsl.com>; Mon, 26 Feb 2018 01:20:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.321
X-Spam-Level: 
X-Spam-Status: No, score=-4.321 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qY9qo7yw8eOr for <t2trg@ietfa.amsl.com>; Mon, 26 Feb 2018 01:20:18 -0800 (PST)
Received: from sessmg22.ericsson.net (sessmg22.ericsson.net [193.180.251.58]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8A46B126BF6 for <T2TRG@irtf.org>; Mon, 26 Feb 2018 01:20:18 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; d=ericsson.com; s=mailgw201801; c=relaxed/simple; q=dns/txt; i=@ericsson.com; t=1519636816; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:Cc:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=Hm6QzZtRuDk9CLdwn9xqKjxumnNDQ0cnUlmx8czuYzY=; b=NjwmISxcfWgm53UsapfAO5wmsCQjIv31BAd0eIlbLf18XGKlCKiFrU6ai6yzYoSv HycyATVEmgMQd1qUGTKaI+H5lWfLV2Aa1bHL/Z9rr2NAFEEILu7l8MpUqWl9JLiq jTYjOXSleU5YnhwA5p8Q6Fry2FZHaLpUlLhZxQ/9kBI=;
X-AuditID: c1b4fb3a-35fff700000067b4-cf-5a93d1509a9f
Received: from ESESSHC013.ericsson.se (Unknown_Domain [153.88.183.57]) by sessmg22.ericsson.net (Symantec Mail Security) with SMTP id 6C.D3.26548.051D39A5; Mon, 26 Feb 2018 10:20:16 +0100 (CET)
Received: from ESESSMB109.ericsson.se ([169.254.9.82]) by ESESSHC013.ericsson.se ([153.88.183.57]) with mapi id 14.03.0352.000; Mon, 26 Feb 2018 10:20:16 +0100
From: =?iso-8859-1?Q?Ari_Ker=E4nen?= <ari.keranen@ericsson.com>
To: "T2TRG@irtf.org" <T2TRG@irtf.org>
Thread-Topic: Registration for the OCF-T2TRG-W3C WoT meeting in Prague
Thread-Index: AQHTruMCQ8yDxrqGDESwMW5fAr/15w==
Date: Mon, 26 Feb 2018 09:20:15 +0000
Message-ID: <D44C6280-EF23-4219-ABA2-92F2AE6445F1@ericsson.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [193.234.218.122]
Content-Type: text/plain; charset="iso-8859-1"
Content-ID: <AAF220DE7B62464F9835FDAA22A634D2@ericsson.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFnrGLMWRmVeSWpSXmKPExsUyM2K7pW7AxclRBueb1C3eP+hhcWD0mLzx MFsAYxSXTUpqTmZZapG+XQJXxu4bX9kKHjJVXJvRydLAOJ+pi5GTQ0LAROLF3TOsXYxcHEIC hxkljj5azwLhLGaU2Hm2nxmkik3AXmLymo+MILaIgKpE85QNrCC2sICjxOIPW9kg4m4Say+d AKrnALL1JP5tFgYJswCVT519CmwZL9CYxu2TwcoZBcQkvp9aAxZnFhCXuPUE5iABiSV7zjND 2KISLx//Y4WwlSXWPXjCCFGvJ3Fj6hQ2CNta4t3/K8wQtrbEsoWvmSF2CUqcnPmEZQKj8Cwk K2YhaZ+FpH0WkvZZSNoXMLKuYhQtTi0uzk03MtJLLcpMLi7Oz9PLSy3ZxAgM/YNbflvtYDz4 3PEQowAHoxIP78rtk6OEWBPLiitzDzFKcDArifCuXAwU4k1JrKxKLcqPLyrNSS0+xCjNwaIk zuuUZhElJJCeWJKanZpakFoEk2Xi4JRqYJwRMuXGa830ngIGBb6SXrOEwP+ZnauOR7m9t1ng n+523sTAkzNhxqGnfOwbmgKuFh3NkThcKLQkN+4IT/0b9QxDJYdTt/vX6+Ye2FD+7rSRjITL iSmH/Z6rT5wSHHzpzJ/n8+PLVPzvCWxae9chvck93vpc+LX6/AM7nuyf+/2xKN88s4kvhZRY ijMSDbWYi4oTAT/mAlZ5AgAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/QfyR1ls98LP7wqrbVhu1PNyBOJc>
Subject: [T2TRG] Registration for the OCF-T2TRG-W3C WoT meeting in Prague
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Feb 2018 09:20:20 -0000

Hi all,

If you are planning to come to the joint OCF, T2TRG, W3C WoT meeting in Pra=
gue (March 23rd), please register before the end of this work week (by Satu=
rday 3rd of March):
https://goo.gl/forms/6J41OcplbUAPVL3J3

More information about the meeting and agenda being drafted:
https://github.com/t2trg/2018-03-ocf-wot


Thanks,
Ari=


From nobody Mon Feb 26 07:57:36 2018
Return-Path: <michael.koster@smartthings.com>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1FCAB126C25 for <t2trg@ietfa.amsl.com>; Mon, 26 Feb 2018 07:57:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.589
X-Spam-Level: 
X-Spam-Status: No, score=-2.589 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, T_SPF_PERMERROR=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=smartthings-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lcKXiDtDiaoF for <t2trg@ietfa.amsl.com>; Mon, 26 Feb 2018 07:57:32 -0800 (PST)
Received: from mail-it0-x234.google.com (mail-it0-x234.google.com [IPv6:2607:f8b0:4001:c0b::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CFBDB124217 for <t2trg@irtf.org>; Mon, 26 Feb 2018 07:57:32 -0800 (PST)
Received: by mail-it0-x234.google.com with SMTP id k135so6358956ite.2 for <t2trg@irtf.org>; Mon, 26 Feb 2018 07:57:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=smartthings-com.20150623.gappssmtp.com; s=20150623; h=from:mime-version:subject:message-id:date:to; bh=814CAdtf9MAiR6oUCzqmeU3xojVxWr+lO7BB7szhP7o=; b=cqWokO5vCckUYAfrhZXPaIcsd2bPDLGqibPQcFgfO2R1XAvBvz/uCLm38T0CzOFRsv rqoKgevGEpMLtKwlk5IVwebPnTF9n590t/Idyno7cNxYDd2E6qkneTXDD0ivC1bq/ovv Y4QQK+9q5VKwMJ4AbAhhdq0g6TKZBHzy8d8kp9nbDxt1MOE220YfAKhnECu6U+o2EGho 3A/voUyxqK1FTniYbHoYHdNmqD4SxtVKRJVvBGMpihXhATlfThtfqNDqgsdYc/2VOxIA x2JiFx+z+baT8Jo9+xNSdsnlotSBCGf/y9UrYreDP3OBmhJP5z++iLBOfi/H3xv1OJq0 B2Bw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:mime-version:subject:message-id:date:to; bh=814CAdtf9MAiR6oUCzqmeU3xojVxWr+lO7BB7szhP7o=; b=EUAQ92SEeWuQoVmE8fH+Zsxs1rKUt3OYOvYPqP2sgnAgCc4+dc1WWmli7Hu+rkIGd9 knqdnPUNWdnAX42Rkas5ljC4n+SLvWAv8ff2slYghaPmDg4+pJv0YxfoAnrKOI7RZ7+W YtBvf9ndh4aVyLqzhwAVspqv5WoKzAsREYuq3i+gPpzKyL03L27B6z+NbOZIxghUgSJZ 62dE+Aa68Aozv/84IDhrt5Zh5zkvD420/YvrHxOG7fWbsRCYj486WTDYMoQjkmtY9B+F Vp4ZraHdLU73dRMOl1B3XvGno6q1hxqes4+nsgeDKtEPTs2jfp5kCqgNy9wT5rC5kNQP RVgg==
X-Gm-Message-State: APf1xPDeM2/OJhWCHzHhx3uA3/99jl/aPumCkzDck5bVIAHJjBik/JxE 5xMFx7V5Mw5WZQM3+fLjOBZuw7kdDPg=
X-Google-Smtp-Source: AG47ELuAubuG23fEFdteh4nvlCg2vEDK63vhMlYj5j0Eu8UH1C597qExWCf1U1xn1Z2dGckugdufww==
X-Received: by 10.36.172.17 with SMTP id s17mr13200166ite.143.1519660651477; Mon, 26 Feb 2018 07:57:31 -0800 (PST)
Received: from [10.0.0.3] (108-201-184-41.lightspeed.sntcca.sbcglobal.net. [108.201.184.41]) by smtp.gmail.com with ESMTPSA id y96sm3662116ita.39.2018.02.26.07.57.30 for <t2trg@irtf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 26 Feb 2018 07:57:30 -0800 (PST)
From: Michael Koster <michael.koster@smartthings.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_994D1666-A03C-4493-828D-226CCEC94434"
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Message-Id: <99E9FE62-8503-4AD9-A80B-5F954B01765A@smartthings.com>
Date: Mon, 26 Feb 2018 07:57:29 -0800
To: t2trg@irtf.org
X-Mailer: Apple Mail (2.3273)
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/wkkvw4N6b2WPyHviBRy9btDfyFY>
Subject: [T2TRG]  [WISHI] Preparation for the IETF101 Hackathon
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Mon, 26 Feb 2018 15:57:35 -0000

--Apple-Mail=_994D1666-A03C-4493-828D-226CCEC94434
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

-- PLANNING FOR THE WISHI SEMANTIC INTEROP EVENT AT THE IETF101 =
HACKATHON

Hi ,

We how have the questionnaire for the upcoming IETF101 hackathon in =
London, the weekend of March 17 and 18.
https://github.com/t2trg/wishi/wiki/Hackathon-Planning =
<https://github.com/t2trg/wishi/wiki/Hackathon-Planning>

We are inviting everyone to participate by filling out the questionnaire =
(all answers are optional), even if you are not planning to show up and =
connect something to the network.

There is an online survey tool:
https://goo.gl/forms/JvYSb8VOWizkKy262 =
<https://goo.gl/forms/JvYSb8VOWizkKy262>

Or if you prefer you can go to the github repository and fork,clone, or =
copy the markdown template, rename it, edit it with your answers, and =
either make a PR or email the file to me:
=
https://github.com/t2trg/wishi/blob/master/interop/participant-questionnai=
re.md =
<https://github.com/t2trg/wishi/blob/master/interop/participant-questionna=
ire.md>

There is an example already filled out at:
=
https://github.com/t2trg/wishi/blob/master/interop/participant-mjkoster.md=
 =
<https://github.com/t2trg/wishi/blob/master/interop/participant-mjkoster.m=
d>

And you can see the current online survey answers at:
=
https://docs.google.com/spreadsheets/d/1wsexeSXwHbMGEP02RFP_zQLlWpb_7sbSyj=
gGbopAvOE/edit#gid=3D256748193 =
<https://docs.google.com/spreadsheets/d/1wsexeSXwHbMGEP02RFP_zQLlWpb_7sbSy=
jgGbopAvOE/edit#gid=3D256748193>

Please fill out the survey promptly. We can use the information to plan =
for a successful event.

Also, if you have feedback on the questionnaire itself please comment in =
the github issues or send email.

Best regards,

Michael=

--Apple-Mail=_994D1666-A03C-4493-828D-226CCEC94434
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" =
class=3D"">-- PLANNING FOR THE WISHI SEMANTIC INTEROP EVENT AT THE =
IETF101 HACKATHON<div class=3D""><br class=3D""></div><div class=3D"">Hi =
,<div class=3D""><br class=3D""></div><div class=3D"">We how have the =
questionnaire for the upcoming IETF101 hackathon in London, the weekend =
of March 17 and 18.</div><div class=3D""><a =
href=3D"https://github.com/t2trg/wishi/wiki/Hackathon-Planning" =
class=3D"">https://github.com/t2trg/wishi/wiki/Hackathon-Planning</a></div=
><div class=3D""><br class=3D""></div><div class=3D"">We are inviting =
everyone to participate by filling out the questionnaire (all answers =
are optional), even if you are not planning to show up and connect =
something to the network.</div><div class=3D""><br class=3D""></div><div =
class=3D"">There is an online survey tool:</div><div class=3D""><a =
href=3D"https://goo.gl/forms/JvYSb8VOWizkKy262" =
class=3D"">https://goo.gl/forms/JvYSb8VOWizkKy262</a></div><div =
class=3D""><br class=3D""></div><div class=3D"">Or if you prefer you can =
go to the github repository and fork,clone, or copy the markdown =
template, rename it, edit it with your answers, and either make a PR or =
email the file to me:</div><div class=3D""><a =
href=3D"https://github.com/t2trg/wishi/blob/master/interop/participant-que=
stionnaire.md" =
class=3D"">https://github.com/t2trg/wishi/blob/master/interop/participant-=
questionnaire.md</a></div><div class=3D""><br class=3D""></div><div =
class=3D"">There is an example already filled out at:</div><div =
class=3D""><a =
href=3D"https://github.com/t2trg/wishi/blob/master/interop/participant-mjk=
oster.md" =
class=3D"">https://github.com/t2trg/wishi/blob/master/interop/participant-=
mjkoster.md</a></div><div class=3D""><br class=3D""></div><div =
class=3D"">And you can see the current online survey answers =
at:</div><div class=3D""><a =
href=3D"https://docs.google.com/spreadsheets/d/1wsexeSXwHbMGEP02RFP_zQLlWp=
b_7sbSyjgGbopAvOE/edit#gid=3D256748193" =
class=3D"">https://docs.google.com/spreadsheets/d/1wsexeSXwHbMGEP02RFP_zQL=
lWpb_7sbSyjgGbopAvOE/edit#gid=3D256748193</a></div><div class=3D""><br =
class=3D""></div><div class=3D"">Please fill out the survey promptly. We =
can use the information to plan for a successful event.</div><div =
class=3D""><br class=3D""></div><div class=3D"">Also, if you have =
feedback on the questionnaire itself please comment in the github issues =
or send email.</div><div class=3D""><br class=3D""></div><div =
class=3D"">Best regards,</div><div class=3D""><br class=3D""></div><div =
class=3D"">Michael</div></div></body></html>=

--Apple-Mail=_994D1666-A03C-4493-828D-226CCEC94434--


From nobody Tue Feb 27 15:22:10 2018
Return-Path: <agenda@ietf.org>
X-Original-To: t2trg@irtf.org
Delivered-To: t2trg@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 6612812EB7D; Tue, 27 Feb 2018 15:11:28 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: "\"IETF Secretariat\"" <agenda@ietf.org>
To: <cabo@tzi.org>, <t2trg-chairs@ietf.org>
Cc: t2trg@irtf.org, irtf-chair@irtf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.73.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151977308841.5200.16781443226235572394.idtracker@ietfa.amsl.com>
Date: Tue, 27 Feb 2018 15:11:28 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/O6BEVgun4bYXq-cLCUGfUvPYmlQ>
Subject: [T2TRG] t2trg - Requested session has been scheduled for IETF 101
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Feb 2018 23:11:29 -0000

Dear Carsten Bormann,

The session(s) that you have requested have been scheduled.
Below is the scheduled session information followed by
the original request. 

t2trg Session 1 (2:00:00)
    Thursday, Afternoon Session II 1550-1750
    Room Name: Blenheim size: 200
    ---------------------------------------------
    


Request Information:


---------------------------------------------------------
Working Group Name: Thing-to-Thing
Area Name: IRTF
Session Requester: Carsten Bormann

Number of Sessions: 1
Length of Session(s):  2 Hours
Number of Attendees: 120
Conflicts to Avoid: 
 First Priority: cbor httpbis core ace lpwan 6lo roll ice suit anima i2nsf
 Second Priority: dnssd saag irtfopen 6tisch netconf netmod sacm artarea teep
 Third Priority: lwig detnet quic v6ops opsarea cfrg icnrg intarea


People who must be present:
  Carsten Bormann
  Ari Keranen

Resources Requested:

Special Requests:
  Early in the week (Monday/Tuesday) would help so participants can join
that then need to move on to the OCF meeting in Prague.
Please also avoid any IoT related BOFs that might come up.

---------------------------------------------------------


From nobody Wed Feb 28 00:20:30 2018
Return-Path: <internet-drafts@ietf.org>
X-Original-To: t2trg@irtf.org
Delivered-To: t2trg@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 0337A124207; Wed, 28 Feb 2018 00:20:24 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: t2trg@irtf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.73.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151980602397.5147.3273729913393702907@ietfa.amsl.com>
Date: Wed, 28 Feb 2018 00:20:24 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/t_8OZpMIk0OHocSEKApqDYQguTU>
Subject: [T2TRG] I-D Action: draft-irtf-t2trg-iot-seccons-12.txt
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Feb 2018 08:20:24 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Thing-to-Thing RG of the IRTF.

        Title           : State-of-the-Art and Challenges for the Internet of Things Security
        Authors         : Oscar Garcia-Morchon
                          Sandeep S. Kumar
                          Mohit Sethi
	Filename        : draft-irtf-t2trg-iot-seccons-12.txt
	Pages           : 45
	Date            : 2018-02-28

Abstract:
   The Internet of Things (IoT) concept refers to the usage of standard
   Internet protocols to allow for human-to-thing and thing-to-thing
   communication.  The security needs for IoT systems are well-
   recognized and many standardization steps to provide security have
   been taken, for example, the specification of Constrained Application
   Protocol (CoAP) secured with Datagram Transport Layer Security
   (DTLS).  However, security challenges still exist, not only because
   there are some use cases that lack a suitable solution, but also
   because many IoT devices and systems have been designed and deployed
   with very limited security capabilities.  In this document, we first
   discuss the various stages in the lifecycle of a thing.  Next, we
   document the security threats to a thing and the challenges that one
   might face to protect against these threats.  Lastly, we discuss the
   next steps needed to facilitate the deployment of secure IoT systems.
   This document can be used by implementors and authors of IoT
   specifications as a reference for details about security
   considerations while documenting their specific security challenges,
   threat models, and mitigations.

   This document is a product of the IRTF Thing-to-Thing Research Group
   (T2TRG).


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-irtf-t2trg-iot-seccons/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-irtf-t2trg-iot-seccons-12
https://datatracker.ietf.org/doc/html/draft-irtf-t2trg-iot-seccons-12

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-irtf-t2trg-iot-seccons-12


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Wed Feb 28 00:33:51 2018
Return-Path: <oscar.garcia-morchon@philips.com>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4C4231270A0 for <t2trg@ietfa.amsl.com>; Wed, 28 Feb 2018 00:33:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.011
X-Spam-Level: 
X-Spam-Status: No, score=-1.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H5=-1, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=philips.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g7Cz2L2_tLrV for <t2trg@ietfa.amsl.com>; Wed, 28 Feb 2018 00:33:42 -0800 (PST)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-he1eur01on0091.outbound.protection.outlook.com [104.47.0.91]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 038BD126B7E for <t2trg@irtf.org>; Wed, 28 Feb 2018 00:33:41 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=philips.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=RDgW+dbyRK3jVfHRNqO6cmtREtPUJzCzmRC5tNfdJ0Q=; b=QzitnUw978OqIClPjiU0oKio4R5GYHNujRcv2a9NlmuAeCrZcJQeJ00WpxJPG2r91govSMkvaYa3XCmC57y7fB75pa4D/KLdxc8poSdG2OYjDJNPsmlOFlKtQqXkmfJ4vsD+q53LFXz8gcAZAlLvqIEMKn1tSFYKCkmO4MQtDJM=
Received: from DB5P122MB0087.EURP122.PROD.OUTLOOK.COM (129.75.164.154) by DB5P122MB0086.EURP122.PROD.OUTLOOK.COM (129.75.164.153) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.527.21; Wed, 28 Feb 2018 08:33:37 +0000
Received: from DB5P122MB0087.EURP122.PROD.OUTLOOK.COM ([fe80::14ee:643c:5f2c:47bb]) by DB5P122MB0087.EURP122.PROD.OUTLOOK.COM ([fe80::14ee:643c:5f2c:47bb%18]) with mapi id 15.20.0527.021; Wed, 28 Feb 2018 08:33:37 +0000
From: "Garcia-Morchon O, Oscar" <oscar.garcia-morchon@philips.com>
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>, Mohit Sethi <mohit.m.sethi@ericsson.com>, "t2trg@irtf.org" <t2trg@irtf.org>
CC: Jim Schaad <ietf@augustcellars.com>
Thread-Topic: [T2TRG] review of draft-irtf-t2trg-iot-seccons
Thread-Index: AQHThj++b5zD70bAdkSwFuRH9KfguKOihDSAgA4JgACACUBOEA==
Date: Wed, 28 Feb 2018 08:33:37 +0000
Message-ID: <DB5P122MB008793B72DD2B8B48283569CC8C70@DB5P122MB0087.EURP122.PROD.OUTLOOK.COM>
References: <4c4023dd-4f36-eb55-8178-2e12f40c52a8@cs.tcd.ie> <fe111a5b-c474-74d1-fb7c-2adb0dc53cd1@ericsson.com> <ab60cda0-1bc2-bdb8-3427-a5a31d2f899b@cs.tcd.ie>
In-Reply-To: <ab60cda0-1bc2-bdb8-3427-a5a31d2f899b@cs.tcd.ie>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=oscar.garcia-morchon@philips.com; 
x-originating-ip: [2a02:a450:cb83:1:d81c:a32:bb0:9149]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DB5P122MB0086; 7:SIP419VtEID2rEWLX1uA03PiozGmvrzfnP49OKQHurMPNgW+tjIVSqvUCQDw6L5AHpzVXYKOIso5M0r1DUinZO/s0aLfCmd7z/QKfSikEsPAyzwBiFIFncHfsWAeQ2AZtaz9aCGfeRzTCOiDtdJr+nNS3MpF1bcXRtpN+jn3dQYi1oQHkcD3m8sxA5CB0WM9jx/+ExCgEHOnp3+481G53O1iAyVWqLKTEujtw1kWmyWL7MIYUk4wlYfJBFjN852w
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: b1f9e667-a660-428d-2648-08d57e85f67e
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(4534165)(4627221)(201703031133081)(201702281549075)(48565401081)(5600026)(4604075)(3008032)(2017052603307)(7153060)(7193020); SRVR:DB5P122MB0086; 
x-ms-traffictypediagnostic: DB5P122MB0086:
x-microsoft-antispam-prvs: <DB5P122MB00866CD9A24BC13720F46C8DC8C70@DB5P122MB0086.EURP122.PROD.OUTLOOK.COM>
x-exchange-antispam-report-test: UriScan:(37575265505322)(28532068793085)(32856632585715)(192374486261705)(275740015457677)(100405760836317)(21748063052155)(260087099026482);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(8211001083)(6040501)(2401047)(5005006)(8121501046)(10201501046)(3231220)(944501161)(52105095)(93006095)(93001095)(3002001)(6055026)(6041288)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123564045)(20161123562045)(6072148)(201708071742011); SRVR:DB5P122MB0086; BCL:0; PCL:0; RULEID:; SRVR:DB5P122MB0086; 
x-forefront-prvs: 0597911EE1
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(396003)(366004)(39860400002)(39380400002)(376002)(346002)(374574003)(55904004)(189003)(13464003)(199004)(51444003)(51914003)(97736004)(229853002)(25786009)(606006)(68736007)(7736002)(551544002)(6506007)(5250100002)(106356001)(53546011)(81156014)(5660300001)(110136005)(2906002)(54896002)(2950100002)(81166006)(8936002)(33656002)(2900100001)(105586002)(3660700001)(8676002)(4326008)(413944005)(53946003)(236005)(790700001)(6306002)(966005)(53936002)(59450400001)(55016002)(6436002)(478600001)(102836004)(5890100001)(3280700002)(6246003)(76176011)(99286004)(316002)(86362001)(7696005)(186003)(14454004)(74316002)(45080400002)(9686003)(2501003)(6116002)(579004); DIR:OUT; SFP:1102; SCL:1; SRVR:DB5P122MB0086; H:DB5P122MB0087.EURP122.PROD.OUTLOOK.COM; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; 
received-spf: None (protection.outlook.com: philips.com does not designate permitted sender hosts)
x-microsoft-antispam-message-info: m0YT8+DRuZjOYLgAap8Z6hlqtm/v7RyMniry1TenViHZIG5ANvJkf61CSomSgIKzho7TP2kDwM/nyPUZXPysGWawFz725A+MjheBJKu8uW7JXTpLcIvOpmTQgOKLOfWOX4aWXAB4Mt/wXxfrJBUjDznww5h3eNXwuUVf9e94gJw=
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_DB5P122MB008793B72DD2B8B48283569CC8C70DB5P122MB0087EURP_"
MIME-Version: 1.0
X-OriginatorOrg: philips.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b1f9e667-a660-428d-2648-08d57e85f67e
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Feb 2018 08:33:37.3224 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 1a407a2d-7675-4d17-8692-b3ac285306e4
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB5P122MB0086
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/fFuFzullgFGjlarY-UYIL91gJqs>
Subject: Re: [T2TRG] review of draft-irtf-t2trg-iot-seccons
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Feb 2018 08:33:50 -0000

--_000_DB5P122MB008793B72DD2B8B48283569CC8C70DB5P122MB0087EURP_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_DB5P122MB008793B72DD2B8B48283569CC8C70DB5P122MB0087EURP_
Content-Type: text/html; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_DB5P122MB008793B72DD2B8B48283569CC8C70DB5P122MB0087EURP_--


From nobody Wed Feb 28 08:24:13 2018
Return-Path: <laura.marie.feeney@it.uu.se>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5E04C12D0C3 for <t2trg@ietfa.amsl.com>; Wed, 28 Feb 2018 08:24:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level: 
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=uu.se
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id k4itD_U1sxrt for <t2trg@ietfa.amsl.com>; Wed, 28 Feb 2018 08:24:09 -0800 (PST)
Received: from cursor.its.uu.se (smtp-out3.uu.se [130.238.7.174]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 65FF1124B17 for <t2trg@irtf.org>; Wed, 28 Feb 2018 08:24:09 -0800 (PST)
Received: from e-mailfilter02.sunet.se (e-mailfilter02.sunet.se [192.36.171.202]) by cursor.its.uu.se (Postfix) with ESMTP id CC8EB2B7 for <t2trg@irtf.org>; Wed, 28 Feb 2018 17:24:06 +0100 (CET)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=uu.se; s=centralsmtp; t=1519835046; bh=+uadWyAeubGj4ZUPNnWUYbCfd2o0rbxzroLDv9GjIX8=; h=To:From:Subject:Date; b=UaRzN+Mf+bCB2BPp+XySkeR/Sa0i1UQj9e8sRgEMNAKXLUm+PW4dnxVxcU2zJ8LC4 MnBzb1b/KM7iUBCaZNfNV3bTjxWFW+zcuHDLM83XCDGOfs9+x7nLAYN552HJo8oesz J91AK/kI3sKzYFzCxy81TsQ1cJamGBGnNrwsCdHc=
Received: from velox.its.uu.se (velox.its.uu.se [130.238.7.74]) by e-mailfilter02.sunet.se (8.14.4/8.14.4/Debian-8+deb8u2) with ESMTP id w1SGO4GB127186 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO) for <t2trg@irtf.org>; Wed, 28 Feb 2018 17:24:06 +0100
Received: from smtp.user.uu.se (uuc-epost003.user.uu.se [130.238.3.13]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by velox.its.uu.se (Postfix) with ESMTPS id 44AF334565 for <t2trg@irtf.org>; Wed, 28 Feb 2018 17:24:03 +0100 (CET)
Received: from [130.238.234.185] (130.238.234.185) by uuc-epost003.user.uu.se (130.238.3.13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1415.2; Wed, 28 Feb 2018 17:24:04 +0100
To: <t2trg@irtf.org>
From: L M Feeney <laura.marie.feeney@it.uu.se>
Message-ID: <be68133b-00f4-b151-6f9e-cb1ad2874352@it.uu.se>
Date: Wed, 28 Feb 2018 17:24:00 +0100
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.5.0
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-Originating-IP: [130.238.234.185]
X-ClientProxiedBy: uuc-epost005.user.uu.se (130.238.3.15) To uuc-epost003.user.uu.se (130.238.3.13)
X-Bayes-Prob: 0.998 (Score 5, tokens from: outbound, outbound-uu-se:default, uu-se:default, base:default, @@RPTN)
X-p0f-Info: os=Linux 2.6.x, link=Ethernet or modem
X-CanIt-Geo: ip=130.238.3.13; country=SE; region=Uppsala; city=Uppsala; latitude=59.8667; longitude=17.6333; http://maps.google.com/maps?q=59.8667,17.6333&z=6
X-CanItPRO-Stream: outbound-uu-se:outbound (inherits from outbound-uu-se:default, uu-se:default, base:default)
X-Canit-Stats-ID: 0aVggo4o8 - 791720ba0e25 - 20180228
X-CanIt-Archive-Cluster: PfMRe/vJWMiXwM2YIH5BVExnUnw
Received-SPF: neutral (e-mailfilter02.sunet.se: 130.238.3.13 is neither permitted nor denied by domain laura.marie.feeney@it.uu.se) receiver=e-mailfilter02.sunet.se; client-ip=130.238.3.13; envelope-from=<laura.marie.feeney@it.uu.se>; helo=velox.its.uu.se; identity=mailfrom
X-Scanned-By: CanIt (www . roaringpenguin . com)
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/7Dn_FKztLbFouRoFq9X3K2L6LiE>
Subject: [T2TRG] Inter-network Coexistence in the Internet of Things
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Feb 2018 16:24:12 -0000

Dear all,

The  document "Inter-network Coexistence in the Internet of Things" 
describes key challenges for coexistence for _administratively 
independent_ IoT networks sharing unlicensed spectrum.

Recent research results (our own and others) demonstrate the impact of 
protocol-level interactions on network performance.  A better 
understanding of these issues is needed to ensure successful deployment 
of IoT applications.

The document identifies two opportunities for the IRTF T2TRG community. 
The first is to define best practices for performance evaluation and 
protocol design in the context of network coexistence.  The second is to 
investigate the use of higher layer protocols to actively participate in 
managing network coexistence.

Version -01  (2017/10/30) is available at
https://tools.ietf.org/html/draft-feeney-t2trg-inter-network-01
Comments are most welcome.

If there is interest in further discussions, I will plan to be at the 
London meeting next month.

Regards,
Laura

---
Laura Marie Feeney
Division of Computer Systems
Uppsala University


From nobody Wed Feb 28 08:50:54 2018
Return-Path: <ted.ietf@gmail.com>
X-Original-To: t2trg@ietfa.amsl.com
Delivered-To: t2trg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 32AC312DA0C for <t2trg@ietfa.amsl.com>; Wed, 28 Feb 2018 08:50:36 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TD8flFaI42kY for <t2trg@ietfa.amsl.com>; Wed, 28 Feb 2018 08:50:31 -0800 (PST)
Received: from mail-oi0-x231.google.com (mail-oi0-x231.google.com [IPv6:2607:f8b0:4003:c06::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DCF1D12D871 for <t2trg@irtf.org>; Wed, 28 Feb 2018 08:50:24 -0800 (PST)
Received: by mail-oi0-x231.google.com with SMTP id c83so2275567oib.1 for <t2trg@irtf.org>; Wed, 28 Feb 2018 08:50:24 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=AkIcPSsiOT/jU/+LuQvC7eHWknmf36tbg0wQkWjJFg0=; b=s4H/SiWhh2du7UVUYmExpOoOuRTVgf6ISZkMzwkdGGFAYGFR2+dKyghnxKryW4jPuc SX/AZk0uyUBGsQ1Nbfek5MNudQief6Iofj7eqr6twV1MH0xFN2/qVX+5dCchWKW/o6WR sHVi3uXboB+xHUqa+iGWW15aCIxQAygaP32lRgeTRVo4l5q/PnMCWITEysqX77s0ZA3C LUgdQepVYWpNDk0HDEmnz1H7wXDWvFyPKVu+oA3Ftd8jYVHCAgOHPQ0cTqMMR8X3zB9S Ml7dvyfwl22ChVYkljjtuN/mYe7RobUPbhZ0C2zpOyyrVF/OxcOqBenqXIGnk+PuwH64 3jow==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=AkIcPSsiOT/jU/+LuQvC7eHWknmf36tbg0wQkWjJFg0=; b=BQLh7Y75quIegodXqP3LNHtRxTcluR+KYLmZTCLSG9C3BqFR7pPjpdXxlz7bNKoPE5 Fhgl0A7ySXfA0QWQBAVd3EUeMLe55LLsZFnfXQNrQKGt0zIo6ki6Ago9ibqU6pJNmpji X+CKcmEb5I0z2nvAuWU4Lut4sNOvAuoKc8h8YmmfxHYo6KBw3sr/DpKS699qqZidcBgp Mnjl+5bBZ8+91hX+yEhqs85J8NSr4IgGa9Q25a+jSSJDNGYiWn9QdqHVu2ROMLh6vag4 ypziefEgTVzPELszOBNxTCK27RC/jDz5rZAQ/fCXnFppIR2xYxxKRIETu3tj27giD5Yz IzWQ==
X-Gm-Message-State: APf1xPC0+x8ul+9WXmH0HtdEFGXzn0NsBDWvhxfoNE3FWTgCEycxyp2e Hv1igOfH5biuzr7ZQ9S64f7R6G5Ooku2I9OnqB0=
X-Google-Smtp-Source: AG47ELsaShxMNtXRJyIReljV6Ft7dHbX8qCSwnXYEMYk8MNLshpNS1mhe1FLS+scyy1gscaXWkcrCZx0U4Hhq7D2xD4=
X-Received: by 10.202.15.21 with SMTP id 21mr12196725oip.216.1519836623955; Wed, 28 Feb 2018 08:50:23 -0800 (PST)
MIME-Version: 1.0
Received: by 10.74.195.141 with HTTP; Wed, 28 Feb 2018 08:49:52 -0800 (PST)
In-Reply-To: <be68133b-00f4-b151-6f9e-cb1ad2874352@it.uu.se>
References: <be68133b-00f4-b151-6f9e-cb1ad2874352@it.uu.se>
From: Ted Hardie <ted.ietf@gmail.com>
Date: Wed, 28 Feb 2018 08:49:52 -0800
Message-ID: <CA+9kkMBo84QY8Ot1fwWtqy8m1TPndCmDr4BCQOBQN1pUL=BFJg@mail.gmail.com>
To: L M Feeney <laura.marie.feeney@it.uu.se>
Cc: t2trg@irtf.org
Content-Type: multipart/alternative; boundary="f4f5e808d70c1672c80566488a6c"
Archived-At: <https://mailarchive.ietf.org/arch/msg/t2trg/uL2RFXXEAPy3acdj1FtkFA8J6zY>
Subject: Re: [T2TRG] Inter-network Coexistence in the Internet of Things
X-BeenThere: t2trg@irtf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IRTF Thing-to-Thing Research Group <t2trg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/t2trg>, <mailto:t2trg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/t2trg/>
List-Post: <mailto:t2trg@irtf.org>
List-Help: <mailto:t2trg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/t2trg>, <mailto:t2trg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Feb 2018 16:50:36 -0000

--f4f5e808d70c1672c80566488a6c
Content-Type: text/plain; charset="UTF-8"

Thanks, I found that to be a useful summary of the issues and to have some
good pointers.   I'd like to add one potential work item, though, before
"define best practices for performance evaluation":  "describe what a
useful lab setup would look like".  Looking back at our own experience at
building a lab, it strike me that we have many of the elements you describe
but lack one:  we have multiple, heterogeneous networks in a variety of
topologies, but we also have a single higher-order administration.  So we
may actually be scheduling away some of the real-world implications by
parceling out project activity in the lab.

Thoughts on how to avoid that from the group would make a good addition
(either to your doc or to the best practices doc).

regards,

Ted

On Wed, Feb 28, 2018 at 8:24 AM, L M Feeney <laura.marie.feeney@it.uu.se>
wrote:

> Dear all,
>
> The  document "Inter-network Coexistence in the Internet of Things"
> describes key challenges for coexistence for _administratively independent_
> IoT networks sharing unlicensed spectrum.
>
> Recent research results (our own and others) demonstrate the impact of
> protocol-level interactions on network performance.  A better understanding
> of these issues is needed to ensure successful deployment of IoT
> applications.
>
> The document identifies two opportunities for the IRTF T2TRG community.
> The first is to define best practices for performance evaluation and
> protocol design in the context of network coexistence.  The second is to
> investigate the use of higher layer protocols to actively participate in
> managing network coexistence.
>
> Version -01  (2017/10/30) is available at
> https://tools.ietf.org/html/draft-feeney-t2trg-inter-network-01
> Comments are most welcome.
>
> If there is interest in further discussions, I will plan to be at the
> London meeting next month.
>
> Regards,
> Laura
>
> ---
> Laura Marie Feeney
> Division of Computer Systems
> Uppsala University
>
> _______________________________________________
> T2TRG mailing list
> T2TRG@irtf.org
> https://www.irtf.org/mailman/listinfo/t2trg
>

--f4f5e808d70c1672c80566488a6c
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Thanks, I found that to be a useful summary of the is=
sues and to have some good pointers.=C2=A0=C2=A0 I&#39;d like to add one po=
tential work item, though, before &quot;define best practices for performan=
ce evaluation&quot;:=C2=A0 &quot;describe what a useful lab setup would loo=
k like&quot;.=C2=A0 Looking back at our own experience at building a lab, i=
t strike me that we have many of the elements you describe but lack one:=C2=
=A0 we have multiple, heterogeneous networks in a variety of topologies, bu=
t we also have a single higher-order administration.=C2=A0 So we may actual=
ly be scheduling away some of the real-world implications by parceling out =
project activity in the lab.<br><br></div><div>Thoughts on how to avoid tha=
t from the group would make a good addition (either to your doc or to the b=
est practices doc).<br><br></div><div>regards,<br><br></div><div>Ted<br></d=
iv></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Wed, =
Feb 28, 2018 at 8:24 AM, L M Feeney <span dir=3D"ltr">&lt;<a href=3D"mailto=
:laura.marie.feeney@it.uu.se" target=3D"_blank">laura.marie.feeney@it.uu.se=
</a>&gt;</span> wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin=
:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Dear all,<br>
<br>
The=C2=A0 document &quot;Inter-network Coexistence in the Internet of Thing=
s&quot; describes key challenges for coexistence for _administratively inde=
pendent_ IoT networks sharing unlicensed spectrum.<br>
<br>
Recent research results (our own and others) demonstrate the impact of prot=
ocol-level interactions on network performance.=C2=A0 A better understandin=
g of these issues is needed to ensure successful deployment of IoT applicat=
ions.<br>
<br>
The document identifies two opportunities for the IRTF T2TRG community. The=
 first is to define best practices for performance evaluation and protocol =
design in the context of network coexistence.=C2=A0 The second is to invest=
igate the use of higher layer protocols to actively participate in managing=
 network coexistence.<br>
<br>
Version -01=C2=A0 (2017/10/30) is available at<br>
<a href=3D"https://tools.ietf.org/html/draft-feeney-t2trg-inter-network-01"=
 rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/dr<wbr>af=
t-feeney-t2trg-inter-network<wbr>-01</a><br>
Comments are most welcome.<br>
<br>
If there is interest in further discussions, I will plan to be at the Londo=
n meeting next month.<br>
<br>
Regards,<br>
Laura<br>
<br>
---<br>
Laura Marie Feeney<br>
Division of Computer Systems<br>
Uppsala University<br>
<br>
______________________________<wbr>_________________<br>
T2TRG mailing list<br>
<a href=3D"mailto:T2TRG@irtf.org" target=3D"_blank">T2TRG@irtf.org</a><br>
<a href=3D"https://www.irtf.org/mailman/listinfo/t2trg" rel=3D"noreferrer" =
target=3D"_blank">https://www.irtf.org/mailman/l<wbr>istinfo/t2trg</a><br>
</blockquote></div><br></div>

--f4f5e808d70c1672c80566488a6c--

