
From nobody Thu Mar  1 13:16:20 2018
Return-Path: <noreply@github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B73E612FAB3 for <sacm@ietfa.amsl.com>; Thu,  1 Mar 2018 13:16:18 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.999
X-Spam-Level: 
X-Spam-Status: No, score=-6.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aXcOn4EscXQ8 for <sacm@ietfa.amsl.com>; Thu,  1 Mar 2018 13:16:17 -0800 (PST)
Received: from github-smtp2b-ext-cp1-prd.iad.github.net (github-smtp2-ext2.iad.github.net [192.30.252.193]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E6E8312EE46 for <sacm@ietf.org>; Thu,  1 Mar 2018 13:16:16 -0800 (PST)
Date: Thu, 01 Mar 2018 13:16:12 -0800
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com; s=pf2014; t=1519938972; bh=AF+gqDX2PgpbNvqp1ttBatMjdqaE86+hmHcplsLs0eA=; h=From:Reply-To:To:Cc:In-Reply-To:References:Subject:List-ID: List-Archive:List-Post:List-Unsubscribe:From; b=xgbz8SKQnlaVHzGalDc/zIDAlWb3eNqJ9sSC7mMlXq8p6SnojT/YRhrolwf7cWB2k jl4cj0OIs0wUugdZ4k7yFN0+E3XlQIzGwCCaQ1crKn35E5GIRsgyxNdXd3Ia9qYN1u eLiTUiunF5IFLuCjHi6XhIU+vVYJ1zgFKisjjGP0=
From: Charles Schmidt <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-terminology <reply+00a6c4d16b498497873e79f603f6648aa2942696624eed7692cf0000000116b02f9c92a169ce10bceccb@reply.github.com>
To: sacmwg/draft-ietf-sacm-terminology <draft-ietf-sacm-terminology@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-terminology/issues/67/369733459@github.com>
In-Reply-To: <sacmwg/draft-ietf-sacm-terminology/issues/67@github.com>
References: <sacmwg/draft-ietf-sacm-terminology/issues/67@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5a986d9ca706b_54812ab54e336ed045726"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: cmschmidt
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/YHBunDXx8Sp2liqM4UaWEMYz79U>
Subject: Re: [sacm] [sacmwg/draft-ietf-sacm-terminology] Need to clarify "attribute" vs. "posture attributes" (#67)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 01 Mar 2018 21:16:19 -0000

----==_mimepart_5a986d9ca706b_54812ab54e336ed045726
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

In doing the review for SWIMA I noted that the definition of "attribute" appears internally inconsistent. 

SACM states: "attribute: Is a data element, as defined in RFC5209, that is atomic. In the context of SACM, attributes are "atomic" information elements and an equivalent to attribute-value-pairs.""

RFC 5209 (the NEA Architecture) states "Attribute - Data element including any requisite meta-data describing an observed, expected, or the operational status of an endpoint feature (e.g., anti-virus software is currently in use). Attributes are exchanged as part of the NEA protocols (see section
5.2)."

The bottom lines is that, by my reading, "attribute" as used by SACM is a single piece of information, such as might be conveyed in a single name-value-pair. Attribute as used by NEA is a multi-field structure meant to convey information about a single subject via multiple related pieces of information. In particular, a SWIMA attribute can contain a couple dozen fields including timestamps, software locations, software unique ID, software record unique ID, software record, and other things. This use is consistent with the NEA use of attribute, but not with the SACM use of attribute. (At least as I understand it.)

I have no problem with SACM defining "attribute" to mean an atomic piece of information, but if we go that route we should remove the reference to RFC 5209.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/67#issuecomment-369733459
----==_mimepart_5a986d9ca706b_54812ab54e336ed045726
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<p>In doing the review for SWIMA I noted that the definition of "attribut=
e" appears internally inconsistent.</p>
<p>SACM states: "attribute: Is a data element, as defined in RFC5209, tha=
t is atomic. In the context of SACM, attributes are "atomic" information =
elements and an equivalent to attribute-value-pairs.""</p>
<p>RFC 5209 (the NEA Architecture) states "Attribute - Data element inclu=
ding any requisite meta-data describing an observed, expected, or the ope=
rational status of an endpoint feature (e.g., anti-virus software is curr=
ently in use). Attributes are exchanged as part of the NEA protocols (see=
 section<br>
5.2)."</p>
<p>The bottom lines is that, by my reading, "attribute" as used by SACM i=
s a single piece of information, such as might be conveyed in a single na=
me-value-pair. Attribute as used by NEA is a multi-field structure meant =
to convey information about a single subject via multiple related pieces =
of information. In particular, a SWIMA attribute can contain a couple doz=
en fields including timestamps, software locations, software unique ID, s=
oftware record unique ID, software record, and other things. This use is =
consistent with the NEA use of attribute, but not with the SACM use of at=
tribute. (At least as I understand it.)</p>
<p>I have no problem with SACM defining "attribute" to mean an atomic pie=
ce of information, but if we go that route we should remove the reference=
 to RFC 5209.</p>

<p style=3D"font-size:small;-webkit-text-size-adjust:none;color:#666;">&m=
dash;<br />You are receiving this because you are subscribed to this thre=
ad.<br />Reply to this email directly, <a href=3D"https://github.com/sacm=
wg/draft-ietf-sacm-terminology/issues/67#issuecomment-369733459">view it =
on GitHub</a>, or <a href=3D"https://github.com/notifications/unsubscribe=
-auth/AKbE0U7hVEPLsHNbIdJRluUUlDpYlU5Pks5taGUcgaJpZM4Q8ht1">mute the thre=
ad</a>.<img alt=3D"" height=3D"1" src=3D"https://github.com/notifications=
/beacon/AKbE0Rp9-_vjrsWdEoJR0NL7C4RN20dWks5taGUcgaJpZM4Q8ht1.gif" width=3D=
"1" /></p>
<div itemscope itemtype=3D"http://schema.org/EmailMessage">
<div itemprop=3D"action" itemscope itemtype=3D"http://schema.org/ViewActi=
on">
  <link itemprop=3D"url" href=3D"https://github.com/sacmwg/draft-ietf-sac=
m-terminology/issues/67#issuecomment-369733459"></link>
  <meta itemprop=3D"name" content=3D"View Issue"></meta>
</div>
<meta itemprop=3D"description" content=3D"View this Issue on GitHub"></me=
ta>
</div>

<script type=3D"application/json" data-scope=3D"inboxmarkup">{"api_versio=
n":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name"=
:"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-termin=
ology","title":"sacmwg/draft-ietf-sacm-terminology","subtitle":"GitHub re=
pository","main_image_url":"https://cloud.githubusercontent.com/assets/14=
3418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url=
":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c=
0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"h=
ttps://github.com/sacmwg/draft-ietf-sacm-terminology"}},"updates":{"snipp=
ets":[{"icon":"PERSON","message":"@cmschmidt in #67: In doing the review =
for SWIMA I noted that the definition of \"attribute\" appears internally=
 inconsistent. \r\n\r\nSACM states: \"attribute: Is a data element, as de=
fined in RFC5209, that is atomic. In the context of SACM, attributes are =
\"atomic\" information elements and an equivalent to attribute-value-pair=
s.\"\"\r\n\r\nRFC 5209 (the NEA Architecture) states \"Attribute - Data e=
lement including any requisite meta-data describing an observed, expected=
, or the operational status of an endpoint feature (e.g., anti-virus soft=
ware is currently in use). Attributes are exchanged as part of the NEA pr=
otocols (see section\r\n5.2).\"\r\n\r\nThe bottom lines is that, by my re=
ading, \"attribute\" as used by SACM is a single piece of information, su=
ch as might be conveyed in a single name-value-pair. Attribute as used by=
 NEA is a multi-field structure meant to convey information about a singl=
e subject via multiple related pieces of information. In particular, a SW=
IMA attribute can contain a couple dozen fields including timestamps, sof=
tware locations, software unique ID, software record unique ID, software =
record, and other things. This use is consistent with the NEA use of attr=
ibute, but not with the SACM use of attribute. (At least as I understand =
it.)\r\n\r\nI have no problem with SACM defining \"attribute\" to mean an=
 atomic piece of information, but if we go that route we should remove th=
e reference to RFC 5209."}],"action":{"name":"View Issue","url":"https://=
github.com/sacmwg/draft-ietf-sacm-terminology/issues/67#issuecomment-3697=
33459"}}}</script>=

----==_mimepart_5a986d9ca706b_54812ab54e336ed045726--


From nobody Thu Mar  1 17:58:40 2018
Return-Path: <linqiushi@huawei.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 351C5126C2F for <sacm@ietfa.amsl.com>; Thu,  1 Mar 2018 17:58:38 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.231
X-Spam-Level: 
X-Spam-Status: No, score=-4.231 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HxEtj9_Z2Fq7 for <sacm@ietfa.amsl.com>; Thu,  1 Mar 2018 17:58:36 -0800 (PST)
Received: from huawei.com (lhrrgout.huawei.com [194.213.3.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6D64F126BF0 for <sacm@ietf.org>; Thu,  1 Mar 2018 17:58:36 -0800 (PST)
Received: from lhreml709-cah.china.huawei.com (unknown [172.18.7.108]) by Forcepoint Email with ESMTP id 81C52B3BAB0E5 for <sacm@ietf.org>; Fri,  2 Mar 2018 01:58:32 +0000 (GMT)
Received: from DGGEML423-HUB.china.huawei.com (10.1.199.40) by lhreml709-cah.china.huawei.com (10.201.108.32) with Microsoft SMTP Server (TLS) id 14.3.361.1; Fri, 2 Mar 2018 01:58:33 +0000
Received: from DGGEML510-MBX.china.huawei.com ([169.254.2.73]) by dggeml423-hub.china.huawei.com ([10.1.199.40]) with mapi id 14.03.0361.001; Fri, 2 Mar 2018 09:58:31 +0800
From: "Linqiushi (Jessica, CSPL)" <linqiushi@huawei.com>
To: "sacm@ietf.org" <sacm@ietf.org>
Thread-Topic: New Version Notification for draft-lin-sacm-nid-mp-security-baseline-02.txt
Thread-Index: AdOxydvkqzD+rkdZRLC7DTdsasFbUg==
Date: Fri, 2 Mar 2018 01:58:31 +0000
Message-ID: <E22A9D71257049438949CB43F3A093E621C24795@dggeml510-mbx.china.huawei.com>
Accept-Language: zh-CN, en-US
Content-Language: zh-CN
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.57.63.123]
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-CFilter-Loop: Reflected
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/26LxlxRWYDf2f10XTpnangBVb3o>
Subject: [sacm] FW: New Version Notification for draft-lin-sacm-nid-mp-security-baseline-02.txt
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Mar 2018 01:58:38 -0000
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From nobody Thu Mar  1 19:19:25 2018
Return-Path: <ben@nostrum.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 184AF127023; Thu,  1 Mar 2018 19:19:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.89
X-Spam-Level: 
X-Spam-Status: No, score=-1.89 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01, T_SPF_HELO_PERMERROR=0.01, T_SPF_PERMERROR=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LZsyo-6caos4; Thu,  1 Mar 2018 19:19:21 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 202F5120724; Thu,  1 Mar 2018 19:19:21 -0800 (PST)
Received: from [10.0.1.10] (cpe-66-25-7-22.tx.res.rr.com [66.25.7.22]) (authenticated bits=0) by nostrum.com (8.15.2/8.15.2) with ESMTPSA id w223JI2j050770 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Thu, 1 Mar 2018 21:19:20 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-66-25-7-22.tx.res.rr.com [66.25.7.22] claimed to be [10.0.1.10]
From: Ben Campbell <ben@nostrum.com>
Message-Id: <080CB857-150E-450C-B685-8A10FA0D3984@nostrum.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_7229A4D8-135C-4364-AD50-4E0F105CAB2C"; protocol="application/pgp-signature"; micalg=pgp-sha512
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
Date: Thu, 1 Mar 2018 21:19:17 -0600
In-Reply-To: <DM5PR0901MB2375564B76246A1DA5FCE4A7ABC30@DM5PR0901MB2375.namprd09.prod.outlook.com>
Cc: The IESG <iesg@ietf.org>, "draft-ietf-sacm-nea-swima-patnc@ietf.org" <draft-ietf-sacm-nea-swima-patnc@ietf.org>,  "sacm@ietf.org" <sacm@ietf.org>, "Karen O'Donoghue" <odonoghue@isoc.org>, "sacm-chairs@ietf.org" <sacm-chairs@ietf.org>
To: "Schmidt, Charles M." <cmschmidt@mitre.org>
References: <151926897179.21101.1205735756502467820.idtracker@ietfa.amsl.com> <DM5PR0901MB2375564B76246A1DA5FCE4A7ABC30@DM5PR0901MB2375.namprd09.prod.outlook.com>
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/_egmIuXN1WsOMs2azCWnPWI5m_g>
Subject: Re: [sacm] Ben Campbell's Discuss on draft-ietf-sacm-nea-swima-patnc-02: (with DISCUSS and COMMENT)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Mar 2018 03:19:23 -0000

--Apple-Mail=_7229A4D8-135C-4364-AD50-4E0F105CAB2C
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8



> On Feb 24, 2018, at 1:01 AM, Schmidt, Charles M. <cmschmidt@mitre.org> =
wrote:
>=20
> Hello,
>=20
> Thanks a bunch for your feedback. In general I agree with your =
comments and made changes to address them. Some quick clarifications:
>=20
>> =C2=A72.4: This seems to assume there is never a need to hide =
information from
>> intermediaries. Is that the intent? (Or maybe there aren't any
>> intermediaries?)
>=20
> This is not the intent. NEA has multiple parts and the intent is to =
clarify that the SWIMA part isn't the part dealing with data =
confidentiality. The portion that handles confidentiality is the PT =
layer of the NEA architecture. (PT-TLS and PT-EAP) All I'm trying to do =
is emphasize that, if confidentiality is an issue, make sure your NEA =
architecture is set up to support that.

I think what is confusing me is the =E2=80=9Ctitle=E2=80=9D of the =
non-requirement is =E2=80=9CEnd to End confidentiality=E2=80=9D. I admit =
to not knowing the sacm work well enought to know what the =E2=80=9Cends=E2=
=80=9D are, but am I correct to assume that PT-TLS, like most uses of =
TLS, is hop-by-hop? Does the data every cross more than one hop? Is the =
answer the dame for PT-EAP?



>=20
>> =C2=A73.4.3,
>> -- first paragraph: What is the expected scope of uniqueness for =
record
>> identifiers? -- In the sentence "The Record Identifier SHOULD remain
>> unchanged
>> if that record is modified.", why is the SHOULD not a MUST? What =
would
>> happen
>> if the identifier did change?
>=20
> It is SHOULD rather than MUST because, under some tracking conditions =
it might not be possible to distinguish between a record being modified =
and a record being deleted and a new record being created. Will add =
clarifying text to this effect. If the system thinks that a modification =
is actually a delete/create action, it would be treated as such with a =
new record identifier being assigned to the "created" record.
>=20

Okay; I think the mentioned clarifying text would help.


>> =C2=A77.1: " Some tools might not be designed to update records in =
the Software
>> Inventory Evidence Collection in real time,..." Wasn't there a =
normative
>> requirement that they be capable of this?
>=20
> A subtle difference: The SWIMA-PC MUST detect changes to the Software =
Inventory Evidence Collection in near real time, but the data sources =
might not update the Software Inventory Evidence Collection in real =
time. I reworded to clarify the difference between the SWIMA-PC reading =
the Evidence Collection and the tool updating the Evidence Collection.

Okay.

>=20
>> =C2=A79: Nit: is there are reasons to violate the convention that =
IANA, security,
>> and privacy considerations are the last substantive sections in in =
the body of
>> an RFC?
>=20
> I'm happy to reorder these - a quick random sample of RFCs seems to =
provide a number of different orderings. I just followed the PA-TNC =
spec, since I had that open most. Just let me know what the expected =
order is.

Typically they are the last three =E2=80=9Csubstantive=E2=80=9D sections =
in the main body of an RFC, not counting any appendices or =
=E2=80=9Cacknowledgements=E2=80=9D type sections. I don=E2=80=99t think =
we are consistent in the order among those three.

Thanks!

Ben.

>=20
> Thanks a bunch,
> Charles
>=20
>> -----Original Message-----
>> From: Ben Campbell [mailto:ben@nostrum.com]
>> Sent: Wednesday, February 21, 2018 9:10 PM
>> To: The IESG <iesg@ietf.org>
>> Cc: draft-ietf-sacm-nea-swima-patnc@ietf.org; sacm@ietf.org; Karen
>> O'Donoghue <odonoghue@isoc.org>; sacm-chairs@ietf.org;
>> odonoghue@isoc.org; sacm@ietf.org
>> Subject: Ben Campbell's Discuss on =
draft-ietf-sacm-nea-swima-patnc-02:
>> (with DISCUSS and COMMENT)
>>=20
>> Ben Campbell has entered the following ballot position for
>> draft-ietf-sacm-nea-swima-patnc-02: Discuss
>>=20
>> When responding, please keep the subject line intact and reply to all
>> email addresses included in the To and CC lines. (Feel free to cut =
this
>> introductory paragraph, however.)
>>=20
>>=20
>> Please refer to =
https://www.ietf.org/iesg/statement/discuss-criteria.html
>> for more information about IESG DISCUSS and COMMENT positions.
>>=20
>>=20
>> The document, along with other ballot positions, can be found here:
>> https://datatracker.ietf.org/doc/draft-ietf-sacm-nea-swima-patnc/
>>=20
>>=20
>>=20
>> =
----------------------------------------------------------------------
>> DISCUSS:
>> =
----------------------------------------------------------------------
>>=20
>> (This is related to one of Ekr's comments, but I don't think it's =
quite the
>> same.)
>>=20
>> In the first paragraph of =C2=A77.2, the conclusions seem to be based =
on the
>> following sentence:
>>=20
>> "This is generally not considered to be problematic, as
>>   those with access to the endpoint can usually learn of everything
>>   disclosed by that endpoint=E2=80=99s records simply by inspecting =
other parts
>>   of the endpoint."
>>=20
>> This doesn=E2=80=99t seem like a reasonable assumption. Multiuser =
endpoints may
>> well
>> have access controls that prevent a given user from seeing all =
software
>> packages installed on the system. This leads to the conclusion that =
the
>> records
>> on the endpoint are not sensitive. I do not think this document =
should draw
>> that conclusion. Even if this were provably true for all existing =
systems, such
>> an assumption could be problematic for future systems.
>>=20
>>=20
>> =
----------------------------------------------------------------------
>> COMMENT:
>> =
----------------------------------------------------------------------
>>=20
>> Substantive Comments:
>>=20
>> =C2=A72.4: This seems to assume there is never a need to hide =
information from
>> intermediaries. Is that the intent? (Or maybe there aren't any
>> intermediaries?)
>>=20
>> =C2=A73.4.3,
>> -- first paragraph: What is the expected scope of uniqueness for =
record
>> identifiers? -- In the sentence "The Record Identifier SHOULD remain
>> unchanged
>> if that record is modified.", why is the SHOULD not a MUST? What =
would
>> happen
>> if the identifier did change?
>>=20
>> =C2=A73.4.4:
>>=20
>> -- "However, if that directory is shared by other software products, =
the
>> "location" SHOULD be the location of the primary executable
>>   associated with the software product."
>> I'm confused by the the condition, since sharing a directory with =
other
>> products doesn't seem to introduce the ambiguity that the rest of the
>> sentence
>> assumes. Perhaps this was meant to be about situations where a =
software
>> package
>> is installed across multiple directories?
>>=20
>> -- "Even a probable location for a software product is preferable to =
using a
>> zero-length locator." This could use elaboration; do you expect the =
collector
>> to guess?
>>=20
>> =C2=A77.1: " Some tools might not be designed to update records in =
the Software
>> Inventory Evidence Collection in real time,..." Wasn't there a =
normative
>> requirement that they be capable of this?
>>=20
>> =C2=A78,
>> -- 2nd paragraph: It=E2=80=99s worth mentioning that in some contexts =
this sort of
>> information could expose the user to severe personal risk, including =
the risk
>> of death. -- Last paragraph: "For this reason, privacy safeguards =
might be
>> necessary for collected inventory information." Can this be stated =
more
>> strongly than "might be necessary"?
>>=20
>> Editorial Comments and Nits:
>>=20
>> =C2=A73.8.5, first paragraph: "As noted in Section 3.6 SWIMA-PCs MUST =
..."
>> Please reserve 2119 keywords for the authoritative statement of a
>> requirement;
>> that is, please do not use them to refer to requirements defined =
elsewhere.
>> (Note that this pattern occurs multiple times in the draft.)
>>=20
>> =C2=A79: Nit: is there are reasons to violate the convention that =
IANA, security,
>> and privacy considerations are the last substantive sections in in =
the body of
>> an RFC?
>>=20
>>=20
>=20


--Apple-Mail=_7229A4D8-135C-4364-AD50-4E0F105CAB2C
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org
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=o0xq
-----END PGP SIGNATURE-----

--Apple-Mail=_7229A4D8-135C-4364-AD50-4E0F105CAB2C--


From nobody Thu Mar  1 19:30:20 2018
Return-Path: <ben@nostrum.com>
X-Original-To: sacm@ietf.org
Delivered-To: sacm@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id C24BA120724; Thu,  1 Mar 2018 19:30:12 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: Ben Campbell <ben@nostrum.com>
To: "The IESG" <iesg@ietf.org>
Cc: draft-ietf-sacm-nea-swima-patnc@ietf.org, sacm@ietf.org, Karen O'Donoghue <odonoghue@isoc.org>, sacm-chairs@ietf.org, odonoghue@isoc.org, sacm@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.73.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <151996141278.15763.2110633624566592429.idtracker@ietfa.amsl.com>
Date: Thu, 01 Mar 2018 19:30:12 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/1vWJLuxkacj8jegybyxabj9Al20>
Subject: [sacm] Ben Campbell's No Objection on draft-ietf-sacm-nea-swima-patnc-03: (with COMMENT)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 02 Mar 2018 03:30:13 -0000

Ben Campbell has entered the following ballot position for
draft-ietf-sacm-nea-swima-patnc-03: No Objection

When responding, please keep the subject line intact and reply to all
email addresses included in the To and CC lines. (Feel free to cut this
introductory paragraph, however.)


Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.html
for more information about IESG DISCUSS and COMMENT positions.


The document, along with other ballot positions, can be found here:
https://datatracker.ietf.org/doc/draft-ietf-sacm-nea-swima-patnc/



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

Thanks for addressing my DISCUSS points and comments!



From nobody Mon Mar  5 11:39:55 2018
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sacm@ietf.org
Delivered-To: sacm@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id B28F012D7E4; Mon,  5 Mar 2018 11:39:47 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: sacm@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.74.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <152027878768.31666.26026351686948497@ietfa.amsl.com>
Date: Mon, 05 Mar 2018 11:39:47 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/8Rwsf2yU0sshvA_CHR5Jksmxw_8>
Subject: [sacm] I-D Action: draft-ietf-sacm-rolie-softwaredescriptor-01.txt
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Mar 2018 19:39:48 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Security Automation and Continuous Monitoring WG of the IETF.

        Title           : Definition of the ROLIE Software Descriptor Extension
        Authors         : David Waltermire
                          Stephen Banghart
	Filename        : draft-ietf-sacm-rolie-softwaredescriptor-01.txt
	Pages           : 10
	Date            : 2018-03-05

Abstract:
   This document extends the Resource-Oriented Lightweight Information
   Exchange (ROLIE) core to add the information type category and
   related requirements needed to support Software Record and Software
   Inventory use cases.  The 'software-descriptor' information type is
   defined as a ROLIE extension.  Additional supporting requirements are
   also defined that describe the use of specific formats and link
   relations pertaining to the new information type.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sacm-rolie-softwaredescriptor/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-sacm-rolie-softwaredescriptor-01
https://datatracker.ietf.org/doc/html/draft-ietf-sacm-rolie-softwaredescriptor-01

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sacm-rolie-softwaredescriptor-01


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Mon Mar  5 14:23:36 2018
Return-Path: <bounces+848413-495d-sacm=ietf.org@sgmail.github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D2194127010 for <sacm@ietfa.amsl.com>; Mon,  5 Mar 2018 14:23:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.029
X-Spam-Level: 
X-Spam-Status: No, score=-2.029 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fcXiBmO5EimG for <sacm@ietfa.amsl.com>; Mon,  5 Mar 2018 14:23:32 -0800 (PST)
Received: from o4.sgmail.github.com (o4.sgmail.github.com [192.254.112.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8A98B12EAED for <sacm@ietf.org>; Mon,  5 Mar 2018 14:23:30 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=github.com;  h=from:reply-to:to:cc:subject:mime-version:content-type:content-transfer-encoding:list-id:list-archive:list-post:list-unsubscribe; s=s20150108; bh=Dbk1j8XjnzkxxHlEKtjSb874mQs=; b=rm6zSvVAP/GA0dbs 7kwW2w5iuqJiWUCkSE3hfSFTVoeHDrZonU53cYmjUL0XNDRvsMQVynG8tsOGWflS wScwuT+GzMoSzwvd4gmEFI+VxE77GYMzNQ8tadjfMAZo9cstKAOt08cRRhb3DDi8 b34/h0LcqWla04xrVdrmmx2y2H0=
Received: by filter0397p1iad2.sendgrid.net with SMTP id filter0397p1iad2-11487-5A9DC361-2 2018-03-05 22:23:29.131259128 +0000 UTC
Received: from github-smtp2b-ext-cp1-prd.iad.github.net (github-smtp2b-ext-cp1-prd.iad.github.net [192.30.253.17]) by ismtpd0009p1iad1.sendgrid.net (SG) with ESMTP id rMcRmcAdTreyYBEBdoMvAg for <sacm@ietf.org>; Mon, 05 Mar 2018 22:23:29.007 +0000 (UTC)
Date: Mon, 05 Mar 2018 22:23:29 +0000 (UTC)
From: David Waltermire <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-coswid <reply+00a6c4d121ad0c29d4ad84366c4a21ffec716ff945ac34e292cf0000000116b5856092a169ce12079ac0@reply.github.com>
To: sacmwg/draft-ietf-sacm-coswid <draft-ietf-sacm-coswid@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-coswid/pull/2@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5a9dc360cde9e_26103fecc40aaf284091f"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: david-waltermire-nist
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
X-SG-EID: UtArl2HfP/Y+1oZ8SNY9HwhIcn8hcZ1RcW+VJcQmSoI8XGKtGclfKkXhMZ1k6Mr/ixyJPrVAXV5J0t 5HumpM4my9GVC7amKA4vLwk3N/5JATDEtlv1bPhxefPGGn1soI1eKq7qLmVG6O8eYKd/Ke9AfceaDs EP9r5+yQcG0hqGcl5bsWj+SzzLM68BWHbQ4AJU+LrODR6AP2pMIzg1qfRED7UjIH/giTLFPBus7EXf 0=
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/ziZvpURbWl6xnis6EFnGRRIMoeo>
Subject: [sacm] [sacmwg/draft-ietf-sacm-coswid] Submitting the -04 draft revision (#2)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Mar 2018 22:23:35 -0000

----==_mimepart_5a9dc360cde9e_26103fecc40aaf284091f
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Requesting changes posted as -04 be merged into this repo.
You can view, comment on, or merge this pull request online at:

  https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2

-- Commit Summary --

  * Re-index label values in the CDDL to fix broken offsets for the firmware extension.
  * Fixed tab/spacing in diagram.
  * Continued work on the model descriptions.
  * Fixed compilation issues with the markdown, fixing references and comments in the document.
  * Fixed a number of reference issues to address idnits errors/warnings.

-- File Changes --

    M concise-software-identity.cddl (36)
    M draft-ietf-sacm-coswid.md (1456)
    M firmware-resource.cddl (29)

-- Patch Links --

https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2.patch
https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2.diff

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2

----==_mimepart_5a9dc360cde9e_26103fecc40aaf284091f
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

<p>Requesting changes posted as -04 be merged into this repo.</p>

<hr>

<h4>You can view, comment on, or merge this pull request online at:</h4>
<p>&nbsp;&nbsp;<a href='https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2'>https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2</a></p>

<h4>Commit Summary</h4>
<ul>
  <li>Re-index label values in the CDDL to fix broken offsets for the firmware extension.</li>
  <li>Fixed tab/spacing in diagram.</li>
  <li>Continued work on the model descriptions.</li>
  <li>Fixed compilation issues with the markdown, fixing references and comments in the document.</li>
  <li>Fixed a number of reference issues to address idnits errors/warnings.</li>
</ul>

<h4>File Changes</h4>
<ul>
  <li>
    <strong>M</strong>
    <a href="https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2/files#diff-0">concise-software-identity.cddl</a>
    (36)
  </li>
  <li>
    <strong>M</strong>
    <a href="https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2/files#diff-1">draft-ietf-sacm-coswid.md</a>
    (1456)
  </li>
  <li>
    <strong>M</strong>
    <a href="https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2/files#diff-2">firmware-resource.cddl</a>
    (29)
  </li>
</ul>

<h4>Patch Links:</h4>
<ul>
  <li><a href='https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2.patch'>https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2.patch</a></li>
  <li><a href='https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2.diff'>https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2.diff</a></li>
</ul>

<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">&mdash;<br />You are receiving this because you are subscribed to this thread.<br />Reply to this email directly, <a href="https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2">view it on GitHub</a>, or <a href="https://github.com/notifications/unsubscribe-auth/AKbE0Zb_p7LP-o-5-u1C3Q7CFPS-xOhMks5tbbrggaJpZM4Sdxfw">mute the thread</a>.<img alt="" height="1" src="https://github.com/notifications/beacon/AKbE0XcQiRabsiLS2Ar090tHDYX9O_A5ks5tbbrggaJpZM4Sdxfw.gif" width="1" /></p>
<div itemscope itemtype="http://schema.org/EmailMessage">
<div itemprop="action" itemscope itemtype="http://schema.org/ViewAction">
  <link itemprop="url" href="https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2"></link>
  <meta itemprop="name" content="View Pull Request"></meta>
</div>
<meta itemprop="description" content="View this Pull Request on GitHub"></meta>
</div>

<script type="application/json" data-scope="inboxmarkup">{"api_version":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-coswid","title":"sacmwg/draft-ietf-sacm-coswid","subtitle":"GitHub repository","main_image_url":"https://cloud.githubusercontent.com/assets/143418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"https://github.com/sacmwg/draft-ietf-sacm-coswid"}},"updates":{"snippets":[{"icon":"DESCRIPTION","message":"Submitting the -04 draft revision (#2)"}],"action":{"name":"View Pull Request","url":"https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2"}}}</script>

----==_mimepart_5a9dc360cde9e_26103fecc40aaf284091f--


From nobody Mon Mar  5 14:23:53 2018
Return-Path: <bounces+848413-495d-sacm=ietf.org@sgmail.github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16066127010 for <sacm@ietfa.amsl.com>; Mon,  5 Mar 2018 14:23:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.411
X-Spam-Level: 
X-Spam-Status: No, score=-0.411 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_24=1.618, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m-BCBPX3cdT2 for <sacm@ietfa.amsl.com>; Mon,  5 Mar 2018 14:23:47 -0800 (PST)
Received: from o10.sgmail.github.com (o10.sgmail.github.com [167.89.101.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 51DDA126DC2 for <sacm@ietf.org>; Mon,  5 Mar 2018 14:23:42 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=github.com;  h=from:reply-to:to:cc:in-reply-to:references:subject:mime-version:content-type:content-transfer-encoding:list-id:list-archive:list-post:list-unsubscribe; s=s20150108; bh=TpEs1OMb1WhjkliRDwmGzqsjFVI=; b=HSCukWgod8pafvTp oA7Tj8JEy0bCXSbaVnDjAMtfk58uh7d5OwlDlNZFDIzoCpd8VD7kMiy5V4Xgo7Dd t6AP0UlBXHoKOXZFZ7TLIuI1KM/ih0vOytOidi6fIzzgANrFdqUK9Z243Hm+iR75 /bStUiKWdLi6fgnbH+pQuyYktDs=
Received: by filter0419p1iad2.sendgrid.net with SMTP id filter0419p1iad2-2774-5A9DC36D-C 2018-03-05 22:23:41.306349315 +0000 UTC
Received: from github-smtp2a-ext-cp1-prd.iad.github.net (github-smtp2a-ext-cp1-prd.iad.github.net [192.30.253.16]) by ismtpd0002p1iad1.sendgrid.net (SG) with ESMTP id mAuHuJXaSfK33iPY3hf0mA for <sacm@ietf.org>; Mon, 05 Mar 2018 22:23:41.186 +0000 (UTC)
Date: Mon, 05 Mar 2018 22:23:41 +0000 (UTC)
From: David Waltermire <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-coswid <reply+00a6c4d1ad02337d7665d8f178bc5f2f58e7155ed42830e692cf0000000116b5856d92a169ce12079ac0@reply.github.com>
To: sacmwg/draft-ietf-sacm-coswid <draft-ietf-sacm-coswid@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-coswid/pull/2/issue_event/1505252084@github.com>
In-Reply-To: <sacmwg/draft-ietf-sacm-coswid/pull/2@github.com>
References: <sacmwg/draft-ietf-sacm-coswid/pull/2@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5a9dc36de88e_28132ab6dcffaed4104268"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: david-waltermire-nist
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
X-SG-EID: UtArl2HfP/Y+1oZ8SNY9H20dZHw7GyWqUPpopC/6DdJDRXb7hz6JSdsgTNhoDdykUmuzh3+VB33G5l kNEr70dMsU1paxMYmSAEo/PA4b6bZsH5r5FIyO2aEzMEWejCEhCsh2uaR1BZ5Wl3pVV48vDz/VCC4I m29eFqXxANED1baKxZpaXHqG1OO1xJwuo7mo17RSDlYPJFOIc1rD96L3lU1+nFC9c/AKn0SxKtUxy/ A=
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/y2wV8FjPW32141sEqYUaY0Gju48>
Subject: Re: [sacm] [sacmwg/draft-ietf-sacm-coswid] Submitting the -04 draft revision (#2)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Mar 2018 22:23:48 -0000

----==_mimepart_5a9dc36de88e_28132ab6dcffaed4104268
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Merged #2.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2#event-1505252084
----==_mimepart_5a9dc36de88e_28132ab6dcffaed4104268
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

<p>Merged <a href="https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2" class="issue-link js-issue-link" data-error-text="Failed to load issue title" data-id="302488256" data-permission-text="Issue title is private" data-url="https://github.com/sacmwg/draft-ietf-sacm-coswid/issues/2">#2</a>.</p>

<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">&mdash;<br />You are receiving this because you are subscribed to this thread.<br />Reply to this email directly, <a href="https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2#event-1505252084">view it on GitHub</a>, or <a href="https://github.com/notifications/unsubscribe-auth/AKbE0V-wZ6LsC3HzU3cdoWmOS68y9l5Oks5tbbrtgaJpZM4Sdxfw">mute the thread</a>.<img alt="" height="1" src="https://github.com/notifications/beacon/AKbE0faeR5D94dgZ9OplCFXhA_vdoC-Hks5tbbrtgaJpZM4Sdxfw.gif" width="1" /></p>
<div itemscope itemtype="http://schema.org/EmailMessage">
<div itemprop="action" itemscope itemtype="http://schema.org/ViewAction">
  <link itemprop="url" href="https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2#event-1505252084"></link>
  <meta itemprop="name" content="View Pull Request"></meta>
</div>
<meta itemprop="description" content="View this Pull Request on GitHub"></meta>
</div>

<script type="application/json" data-scope="inboxmarkup">{"api_version":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-coswid","title":"sacmwg/draft-ietf-sacm-coswid","subtitle":"GitHub repository","main_image_url":"https://cloud.githubusercontent.com/assets/143418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"https://github.com/sacmwg/draft-ietf-sacm-coswid"}},"updates":{"snippets":[{"icon":"DESCRIPTION","message":"Merged #2."}],"action":{"name":"View Pull Request","url":"https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/2#event-1505252084"}}}</script>
----==_mimepart_5a9dc36de88e_28132ab6dcffaed4104268--


From nobody Mon Mar  5 14:24:34 2018
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sacm@ietf.org
Delivered-To: sacm@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id C256B127010; Mon,  5 Mar 2018 14:24:29 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: sacm@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.74.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <152028866977.12856.9050339418042296100@ietfa.amsl.com>
Date: Mon, 05 Mar 2018 14:24:29 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/CfqWaeNgFWZGD-Uz7ymwfUqqn0M>
Subject: [sacm] I-D Action: draft-ietf-sacm-coswid-04.txt
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 05 Mar 2018 22:24:30 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Security Automation and Continuous Monitoring WG of the IETF.

        Title           : Concise Software Identifiers
        Authors         : Henk Birkholz
                          Jessica Fitzgerald-McKay
                          Charles Schmidt
                          David Waltermire
	Filename        : draft-ietf-sacm-coswid-04.txt
	Pages           : 41
	Date            : 2018-03-05

Abstract:
   This document defines a concise representation of ISO/IEC
   19770-2:2015 Software Identifiers (SWID tags) that is interoperable
   with the XML schema definition of ISO/IEC 19770-2:2015 and augmented
   for application in Constrained-Node Networks.  Next to the inherent
   capability of SWID tags to express arbitrary context information,
   CoSWID support the definition of additional semantics via well-
   defined data definitions incorporated by extension points.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sacm-coswid/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-sacm-coswid-04
https://datatracker.ietf.org/doc/html/draft-ietf-sacm-coswid-04

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sacm-coswid-04


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Mon Mar  5 17:03:55 2018
Return-Path: <cmschmidt@mitre.org>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B0923128959; Mon,  5 Mar 2018 17:03:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mitre.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WILtB8g01gdR; Mon,  5 Mar 2018 17:03:43 -0800 (PST)
Received: from smtpvmsrv1.mitre.org (smtpvmsrv1.mitre.org [192.52.194.136]) by ietfa.amsl.com (Postfix) with ESMTP id 82A4B12E8E0; Mon,  5 Mar 2018 17:03:40 -0800 (PST)
Received: from smtpvmsrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 127606C004E; Mon,  5 Mar 2018 20:03:40 -0500 (EST)
Received: from imshyb02.MITRE.ORG (unknown [129.83.29.3]) by smtpvmsrv1.mitre.org (Postfix) with ESMTP id F1D4A6C0039; Mon,  5 Mar 2018 20:03:39 -0500 (EST)
Received: from imshyb01.MITRE.ORG (129.83.29.2) by imshyb02.MITRE.ORG (129.83.29.3) with Microsoft SMTP Server (TLS) id 15.0.1263.5; Mon, 5 Mar 2018 20:03:38 -0500
Received: from gcc01-dm2-obe.outbound.protection.outlook.com (10.140.19.249) by imshyb01.MITRE.ORG (129.83.29.2) with Microsoft SMTP Server (TLS) id 15.0.1263.5 via Frontend Transport; Mon, 5 Mar 2018 20:03:38 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mitre.onmicrosoft.com;  s=selector1-mitre-org; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=Wl35O2tJksHL14ofIGZLjipUiaySDskVxzXlon7mKaA=; b=TXa87zBD+w2nE0pOWrKnKRAx83vlBcZLmfFR4zEQKCjn6FimHvkWW06VKOMr9WrnDlMkDq9Cs3bnnOY4lCc4SuYkPB0KafqzN3SQK+XMRu2EndIlD5VCOYOx7Y6bdyzZXnFijmGqNg7hxKbPYiPsAjy0fVRlU6f/UOuHHQQo0oI=
Received: from DM5PR0901MB2375.namprd09.prod.outlook.com (52.132.133.18) by DM5PR0901MB2373.namprd09.prod.outlook.com (52.132.133.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.548.13; Tue, 6 Mar 2018 01:03:37 +0000
Received: from DM5PR0901MB2375.namprd09.prod.outlook.com ([fe80::21b9:ccf6:187e:85e1]) by DM5PR0901MB2375.namprd09.prod.outlook.com ([fe80::21b9:ccf6:187e:85e1%13]) with mapi id 15.20.0548.016; Tue, 6 Mar 2018 01:03:37 +0000
From: "Schmidt, Charles M." <cmschmidt@mitre.org>
To: Benjamin Kaduk <kaduk@mit.edu>
CC: The IESG <iesg@ietf.org>, "sacm-chairs@ietf.org" <sacm-chairs@ietf.org>, "draft-ietf-sacm-nea-swima-patnc@ietf.org" <draft-ietf-sacm-nea-swima-patnc@ietf.org>, "odonoghue@isoc.org" <odonoghue@isoc.org>, "sacm@ietf.org" <sacm@ietf.org>
Thread-Topic: Benjamin Kaduk's practice ballot (No Objection) on draft-ietf-sacm-nea-swima-patnc-02: (with COMMENT)
Thread-Index: AQHTsDa+NLvXN0x1rUG3OeCsst4A4KPCY50g
Date: Tue, 6 Mar 2018 01:03:37 +0000
Message-ID: <DM5PR0901MB2375EF1656E78C7DA3DE046FABD90@DM5PR0901MB2375.namprd09.prod.outlook.com>
References: <20180221225835.GG54688@mit.edu> <DM5PR0901MB2375263C5375E6438FA0A70BABC30@DM5PR0901MB2375.namprd09.prod.outlook.com> <20180228015121.GE50954@kduck.kaduk.org>
In-Reply-To: <20180228015121.GE50954@kduck.kaduk.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=cmschmidt@mitre.org; 
x-originating-ip: [192.160.51.88]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM5PR0901MB2373; 7:RQJNUh3hIrZMQjstwmS13U7/wx4LMrSjdLDEuWHkqH+6hNxJFydGJjxGzbbMvIvXBEDCqUtN5yRwK/XiC2jbSeiT/lACj1jIuaO1N2r/VlS/UKjRO8S06DktcXowaYRTnTvFQehA3dtRWf+BOAsJsuts7N0Cl8kZspH60kSC8rtoXtkJ2fveSNEibB3vVzeqb6AfrstTg0jwtcrv3z3tC0TJWLBwQrMY+0g5E9NXZY5uGHFikvukiC3SfSjgjP9i
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 3d775678-731e-4568-4ead-08d582fe17ef
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:DM5PR0901MB2373; 
x-ms-traffictypediagnostic: DM5PR0901MB2373:
x-microsoft-antispam-prvs: <DM5PR0901MB23739B0582D1DCA2534010F2ABD90@DM5PR0901MB2373.namprd09.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(72170088055959)(192374486261705)(240460790083961)(211171220733660); 
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040501)(2401047)(8121501046)(5005006)(3002001)(3231220)(944501244)(52105095)(10201501046)(93006095)(93001095)(6055026)(6041288)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123562045)(20161123564045)(6072148)(201708071742011); SRVR:DM5PR0901MB2373; BCL:0; PCL:0; RULEID:; SRVR:DM5PR0901MB2373; 
x-forefront-prvs: 06036BD506
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(396003)(366004)(376002)(39860400002)(39380400002)(346002)(199004)(189003)(13464003)(69224002)(52314003)(966005)(14454004)(66066001)(86362001)(3280700002)(229853002)(33656002)(106356001)(2906002)(6916009)(54906003)(81166006)(81156014)(478600001)(8676002)(105586002)(8936002)(2900100001)(68736007)(99286004)(25786009)(2950100002)(4326008)(6116002)(55016002)(316002)(97736004)(3660700001)(53546011)(6506007)(3846002)(9686003)(8666007)(7736002)(6306002)(53936002)(53946003)(76176011)(6246003)(2171002)(6436002)(74316002)(7696005)(186003)(5660300001)(102836004)(59450400001)(26005)(305945005)(5250100002); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR0901MB2373; H:DM5PR0901MB2375.namprd09.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; 
received-spf: None (protection.outlook.com: mitre.org does not designate permitted sender hosts)
x-microsoft-antispam-message-info: rZ1mkF2sZyc3+UVt2C28+kZyltgc3JNoKDx2kOFr+WU8yoYlanVD8Tgd16CBKJoYaTCxTMsIQyInYwfBA4Ydr1SsZshvib9TPpVOeLnK8NwPAKR0RJTKej8xXUKvX1jzeS8o4WaZSG+fck/SfDGp6EaUHItJdE2E5eVGUfxIlKJ6rR1gEYzkrKbarDgI4jhcCWfXHVziBGSUZk4YtGTI+OD9PWr7NvNRGNNShXmgdpClNPSxyvMvrIYNIU4nw7HQ/rVwZiD/9Lni3v0PwGLMLPF7AeeYYyOFX6o42tV4dqF/Ne8/I65QQBgWGRhDgwLi94uzKagPKI7Dk0FWT+p5dg==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 3d775678-731e-4568-4ead-08d582fe17ef
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Mar 2018 01:03:37.7187 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: c620dc48-1d50-4952-8b39-df4d54d74d82
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR0901MB2373
X-OriginatorOrg: mitre.org
X-MITRE: 8GQsMWxq66rxk57w
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/2IM_zu_1rj8y5MevpMU1blaMcf8>
Subject: Re: [sacm] Benjamin Kaduk's practice ballot (No Objection) on draft-ietf-sacm-nea-swima-patnc-02: (with COMMENT)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Mar 2018 01:03:48 -0000

Hi Benjamin,

Thanks for following up. It looks like we are mostly on the same page. I ha=
ve a few additional responses:

> > > Also Section 2.3
> > >
> > > Can we REQUIRE the underlying transport to provide confidentiality,
> > > or is there some historical baggage that requires us to allow the
> > > possibility of cleartext transport?  To be clear, my preference
> > > is in general for in-protocol message protection, but I recognize
> > > that there are scenarios where that doesn't always work well or is
> > > redundant.
> >
> > NEA is designed to support an extensible list of PT (transport) protoco=
ls.
> Currently, the only NEA transport protocols defined are PT-TLS and PT-EAP=
,
> both of which provide confidentiality. I cannot think of why, but it migh=
t be
> the case that sometime in the future someone might create a PT protocol
> that does not provide confidentiality. If someone did this, I am not sure=
 I
> would want to automatically preclude SWIMA from using it. In short, my
> preference would be to note this issue, but not dictate a specific respon=
se.
> Please let me know if you still feel that stronger requirements for
> confidentiality are necessary.
>=20
> This seems pretty speculative to me, but not quite to the point that
> I would ballot DISCUSS for it (if I could ballot, which I can't
> yet).  If such a hypothetical future transport was standards-track,
> it could (procedurally, at least) update this document to relax the
> condition, anyway, so my personal inclination is to require
> confidentiality at present and revisit later if needed.

Thinking about this a bit more, I agree. I have made two changes to the sec=
tion. First, I made it clear that the section is not about "things that are=
 not required", but about requirements that are beyond the scope of SWIMA t=
o meet. (Hopefully that will clarify things a bit better.) I also rephrased=
 the section:

   There are certain capabilities that users of the SWIMA specification
   might require but which are beyond the scope of SWIMA itself and need
   to be addressed by other standards.  This list is not exhaustive.

   End to End Confidentiality:  The SWIMA specification does not define
      a mechanism for confidentiality, nor is confidentiality
      automatically provided by using the PA-TNC interface.  In the NEA
      architecture, confidentiality is generally provided by the
      underlying transport protocols, such as the PT Binding to TLS
      [RFC6876] or PT-EAP Posture Transport for Tunneled EAP Methods
      [RFC7171] - see Section 7 for more information on related
      standards.  The information conveyed by SWIMA is often sensitive
      in nature for both security (Section 8) and privacy (Section 9)
      reasons.  Those who implement SWIMA need to ensure that
      appropriate NEA transport mechanisms are employed to meet
      confidentiality requirements.

Does this better address your concerns?

--

> > > I'm a little concerned that there are some broad MUST-level
> > > requirements=20
<SNIP>
> >
> > Could you expand on this?=20
<SNIP>
>
> Probably I should treat this as a learning experience with my
> practice ballot, having put some not-really-actionable comment in my
> review.  Looking through the document again, maybe things like:
>=20
>    With regard to alterations to a record, SWIMA-PCs MUST detect any
>    alterations to the contents of a record.
>=20
> could be problematic if the record format changes to add more fields
> and the SWIMA-PC doesn't know to track the new fields (pretty
> speculative, admittedly; I don't know how plausible either of those
> are)

I'm not too worried about this because change detection can be extremely co=
arse. (I.e., it can be based on the record's "Modification timestamp" if it=
 is a file, or based on comparing hashes of the record.) The structure of t=
he record should be irrelevant for that level of change detection.

> There's also the prohibition against coverage gaps, which I can
> definitely understand wanting, but seems prone to Murphy's law.

I agree this is a bigger lift, but, again, I'm not worried. It just means t=
he SWIMA-PC needs to keep track of the records in the Evidence Collection. =
If it stops and restarts monitoring, it just needs to see how the Evidence =
Collection changes. As noted above, MODIFICATION detection can be very coar=
se. If it cannot figure out the delta, it just needs to change the Epoch to=
 indicate a discontinuity and continue from there. (Noted in 3.7.1 Event Id=
entifiers.) So, again, while this is a challenge, I think it remains reason=
able.

--

> > > In Section 3.6
> > >
> > > It seems a little odd to me that we need to keep last state prior to
> > > deletion even around, but we don't need to be able to provide the
> > > full alteration history -- that makes an alteration event seem like
> > > a weaker piece of data than delete+create would be, whereas intution
> > > might think that they should have the same information content.
> >
> > I am confused by this comment. The requirement to retain deleted record=
s
> is different from the requirement to track alterations. The former is pro=
vided
> so that SWIMA-PVs are able to get additional data about a product that ha=
s
> been deleted, in the form of the deleted software's information record.
> Alteration, creation, and deletion are for tracking changes to software s=
tate.
> This needs to provide a complete history so that old state information ca=
n be
> updated to reflect new state. In this, alteration and delete+create are, =
in
> fact, of equal value. Am I misunderstanding your comment?
>=20
> It is more likely that the misunderstanding was mine.  In that,
> since the SWIMA-PC needs to be able to provide event history
> including alteration events, the SWIMA-PV could request all the
> relevant alteration events and track the state of that software
> through the history that's retained.  My original comment would only
> be valid if the alteration records did not contain a record of what
> actually changed.

I think I understand your concern: You were noting that, in the case of a D=
ELETE action, the SWIMA-PV can request the historical record to see what us=
ed to be there. However, in the case of a MODIFY event, the SWIMA-PV has no=
 way to collect the previous iteration of the record, and thus cannot compa=
re to determine what changed. Thus, if there was a DELETE+CREATE event, one=
 could take the old and new records (assuming one was able to line them up)=
 and compare, but would not be able to perform such a comparison under a MO=
DIFICATION. Is this your concern?

If so, then I do agree that there is a difference between what one can tell=
 about the two event sequences. However, from a practical standpoint, I am =
not concerned about this. We do make it explicit in the specification that =
the old attribute cannot be collected via SWIMA, so this shouldn't be a sur=
prise. I cannot think of any use cases where knowing the preceding state of=
 the record is necessary - most of the uses of SWIMA I can imagine just nee=
d a way to capture the current state. If you can think of a reason that a c=
onsumer might need to know what changed in the record let me know, but I fe=
el that simply knowing there is a revised record is sufficient for virtuall=
y all SWIMA uses.

--

Regarding the timestamp, I did some searching but I was also unable to find=
 a standard expressed time in a more concise format. The Wilkinson draft yo=
u found didn't have a lot of detail. At this stage, I'm inclined to leave t=
hings be rather than create something unique to SWIMA (or adopt something e=
soteric enough that I might as well be doing so).

---

Thanks again for the clarifications. I hope that the new draft (-04) better=
 addresses your concerns.

Thanks,
Charles




> -----Original Message-----
> From: Benjamin Kaduk [mailto:kaduk@mit.edu]
> Sent: Tuesday, February 27, 2018 7:51 PM
> To: Schmidt, Charles M. <cmschmidt@mitre.org>
> Cc: The IESG <iesg@ietf.org>; sacm-chairs@ietf.org; draft-ietf-sacm-nea-
> swima-patnc@ietf.org; odonoghue@isoc.org; sacm@ietf.org
> Subject: Re: Benjamin Kaduk's practice ballot (No Objection) on draft-iet=
f-
> sacm-nea-swima-patnc-02: (with COMMENT)
>=20
> On Sat, Feb 24, 2018 at 06:00:12AM +0000, Schmidt, Charles M. wrote:
> > Hello,
> >
> > Thanks a bunch for the comments. I agree and have implemented most of
> the changes. I have a few questions/responses:
> >
> > > My understanding is that the
> > > primary benefit of this work is in managed environments where there
> > > is an expectation that only a central authority within a given trust
> > > domain will be installing/updating software, and so this mechanism
> > > can be used to audit for policy compliance, in terms of things like
> > > whether updates are taken in a timely fashion, and blocking
> > > certain types of "role-based" access where the presence of certain
> > > software indicates a certain role.
> >
> > I think SWIMA has a much broader use, including gathering information
> from endpoints where users control what software is added. That said, in =
re-
> reading the introduction I agree that it doesn't adequately convey that
> SWIMA standardizes transport but not detection. I'll update accordingly.
>=20
> I guess there is some scope for its use on endpoints where users
> can affect the installed software, yes.  Thanks for taking another
> look at the actual wording.
>=20
> > > Also Section 2.3
> > >
> > > Can we REQUIRE the underlying transport to provide confidentiality,
> > > or is there some historical baggage that requires us to allow the
> > > possibility of cleartext transport?  To be clear, my preference
> > > is in general for in-protocol message protection, but I recognize
> > > that there are scenarios where that doesn't always work well or is
> > > redundant.
> >
> > NEA is designed to support an extensible list of PT (transport) protoco=
ls.
> Currently, the only NEA transport protocols defined are PT-TLS and PT-EAP=
,
> both of which provide confidentiality. I cannot think of why, but it migh=
t be
> the case that sometime in the future someone might create a PT protocol
> that does not provide confidentiality. If someone did this, I am not sure=
 I
> would want to automatically preclude SWIMA from using it. In short, my
> preference would be to note this issue, but not dictate a specific respon=
se.
> Please let me know if you still feel that stronger requirements for
> confidentiality are necessary.
>=20
> This seems pretty speculative to me, but not quite to the point that
> I would ballot DISCUSS for it (if I could ballot, which I can't
> yet).  If such a hypothetical future transport was standards-track,
> it could (procedurally, at least) update this document to relax the
> condition, anyway, so my personal inclination is to require
> confidentiality at present and revisit later if needed.
>=20
> > > I'm a little concerned that there are some broad MUST-level
> > > requirements that seem hard to know if they can actually be
> > > implemented reliably, like only using a data source in the posture
> > > collector if it is known that it can meet all the listed
> > > requirements both now and in the future, or the requirements for
> > > consistency across time about how various information is handled.
> > > This makes updating the PC software pretty risky.  Another example
> > > is saying that "Even a probable location for a software product is
> > > preferable to using a zero-length locator." so that once we pick one
> > > we can't change what is reported.  (I guess we're supposed to
> > > DELETE+CREATE in this scenario?)
> >
> > Could you expand on this? At the moment I feel the MUSTs are all
> necessary. In the case of "MUST meet all listed requirements", this is
> because a partially compliant source would not provide the consistent vie=
w
> that SWIMA needs. For example, if one source didn't allow event detection=
,
> that would mean that events could not reliably be used to update inventor=
y
> information, violating a SWIMA-PV's assumptions.
>=20
> Probably I should treat this as a learning experience with my
> practice ballot, having put some not-really-actionable comment in my
> review.  Looking through the document again, maybe things like:
>=20
>    With regard to alterations to a record, SWIMA-PCs MUST detect any
>    alterations to the contents of a record.
>=20
> could be problematic if the record format changes to add more fields
> and the SWIMA-PC doesn't know to track the new fields (pretty
> speculative, admittedly; I don't know how plausible either of those
> are)
>=20
> There's also the prohibition against coverage gaps, which I can
> definitely understand wanting, but seems prone to Murphy's law.
>=20
>=20
> > I'm not sure what you mean with regard to your concern about preferring
> "probable locations" to a lack of location, or how that relates to
> DELETE+CREATE events. Could you clarify?
>=20
> It looks like this text was removed in the -03, but the idea was
> that when first reporting an event, the SWIMA-PC would use a
> "probable locator" as indicated by the -02.  What should the
> SWIMA-PC do if it later discovers that this locator was erroneous
> and now posesses a true locator for that software?  There is a MUST
> level requirement to not change the reported locator for a given
> installation of the software (IIRC), but it's known to be wrong.
> Deleting this text seems to resolve the question in favor of "use a
> zero-length locator if you're not sure", which is consistent at
> least.  (I'm still not sure if it's worth doing a DELETE and
> CREATEing a new entry if the actual software location is later
> discovered, though.)
>=20
> > > In Section 3.6
> > >
> > > It seems a little odd to me that we need to keep last state prior to
> > > deletion even around, but we don't need to be able to provide the
> > > full alteration history -- that makes an alteration event seem like
> > > a weaker piece of data than delete+create would be, whereas intution
> > > might think that they should have the same information content.
> >
> > I am confused by this comment. The requirement to retain deleted record=
s
> is different from the requirement to track alterations. The former is pro=
vided
> so that SWIMA-PVs are able to get additional data about a product that ha=
s
> been deleted, in the form of the deleted software's information record.
> Alteration, creation, and deletion are for tracking changes to software s=
tate.
> This needs to provide a complete history so that old state information ca=
n be
> updated to reflect new state. In this, alteration and delete+create are, =
in
> fact, of equal value. Am I misunderstanding your comment?
>=20
> It is more likely that the misunderstanding was mine.  In that,
> since the SWIMA-PC needs to be able to provide event history
> including alteration events, the SWIMA-PV could request all the
> relevant alteration events and track the state of that software
> through the history that's retained.  My original comment would only
> be valid if the alteration records did not contain a record of what
> actually changed.
>=20
> > > It makes me a little sad to see an ASCII time representation used whe=
n
> more
> > > space-efficient options are available and we've already got binary
> > > integers going on the wire.  Seconds since the epoch might even be
> > > enough for this work, or for more precision 100s of nanoseconds
> > > since the epoch is also seeing some notable use.
> >
> > I would definitely be open to other formats as long as they are not too
> esoteric. RFC 3339 was just what the TNC uses in their protocols. I'm alw=
ays
> for saving some bytes. Do you have a recommendation?
>=20
> I'm failing to find a good (i.e., IETF) citation, but my personal
> recommendation is to have a 64-bit integer that counts time since
> the epoch in units of 100 nanoseconds.  This is used in
> http://afs3-stds.central.org/docs/draft-wilkinson-afs3-rxgk-11.html
> and I'm pretty sure also some IETF work, even if I can't find it
> right now.
>=20
> > Beyond these questions, I agree with your comments and have updated
> the draft accordingly.
> >
> > Thanks again for the input.
>=20
> You're welcome!  I looked through the diff between -02 and -03, and
> it looked good -- thanks for all the fixes!
>=20
> -Benjamin
>=20
> > Charles
> >


From nobody Mon Mar  5 17:12:20 2018
Return-Path: <cmschmidt@mitre.org>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2205E12E9D9; Mon,  5 Mar 2018 17:12:15 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mitre.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nOQvpb8g_1tv; Mon,  5 Mar 2018 17:12:01 -0800 (PST)
Received: from smtpvmsrv1.mitre.org (smtpvmsrv1.mitre.org [192.52.194.136]) by ietfa.amsl.com (Postfix) with ESMTP id AB39412EA52; Mon,  5 Mar 2018 17:12:01 -0800 (PST)
Received: from smtpvmsrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id A5A716C0049; Mon,  5 Mar 2018 20:12:01 -0500 (EST)
Received: from imshyb01.MITRE.ORG (unknown [129.83.29.2]) by smtpvmsrv1.mitre.org (Postfix) with ESMTP id 915EB6C0039; Mon,  5 Mar 2018 20:12:01 -0500 (EST)
Received: from imshyb01.MITRE.ORG (129.83.29.2) by imshyb01.MITRE.ORG (129.83.29.2) with Microsoft SMTP Server (TLS) id 15.0.1263.5; Mon, 5 Mar 2018 20:12:00 -0500
Received: from gcc01-CY1-obe.outbound.protection.outlook.com (10.140.19.249) by imshyb01.MITRE.ORG (129.83.29.2) with Microsoft SMTP Server (TLS) id 15.0.1263.5 via Frontend Transport; Mon, 5 Mar 2018 20:12:00 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mitre.onmicrosoft.com;  s=selector1-mitre-org; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=3g8SmICF4dKszhVbxkCst3K4i2aBG6Ktd6s7iLpnf0Y=; b=jhn18hIPSpa30Ukq5dOSwpwyNqmI57WLgZ4psmGkQ2RhHeWoKk2IcM8lsWeOXCkUQOPpI40fQmW/eDHFVfIBIFR6gJ73pABFZIQFf3e2Xqp+qtr6N3yMWMBHdL0PiDklniZO8ZRvujTHMkbuRVb9tMHOGGsnhNzBkfx7DUxi4CY=
Received: from DM5PR0901MB2375.namprd09.prod.outlook.com (52.132.133.18) by DM5PR0901MB2375.namprd09.prod.outlook.com (52.132.133.18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.548.13; Tue, 6 Mar 2018 01:11:59 +0000
Received: from DM5PR0901MB2375.namprd09.prod.outlook.com ([fe80::21b9:ccf6:187e:85e1]) by DM5PR0901MB2375.namprd09.prod.outlook.com ([fe80::21b9:ccf6:187e:85e1%13]) with mapi id 15.20.0548.016; Tue, 6 Mar 2018 01:11:59 +0000
From: "Schmidt, Charles M." <cmschmidt@mitre.org>
To: Ben Campbell <ben@nostrum.com>
CC: "sacm-chairs@ietf.org" <sacm-chairs@ietf.org>, Karen O'Donoghue <odonoghue@isoc.org>, The IESG <iesg@ietf.org>, "sacm@ietf.org" <sacm@ietf.org>, "draft-ietf-sacm-nea-swima-patnc@ietf.org" <draft-ietf-sacm-nea-swima-patnc@ietf.org>
Thread-Topic: [sacm] Ben Campbell's Discuss on draft-ietf-sacm-nea-swima-patnc-02: (with DISCUSS and COMMENT)
Thread-Index: AQHTsdVhBrtttTsYykuKkDXdvise8aPCalqg
Date: Tue, 6 Mar 2018 01:11:59 +0000
Message-ID: <DM5PR0901MB23759238C98C5F9E82AB5D7CABD90@DM5PR0901MB2375.namprd09.prod.outlook.com>
References: <151926897179.21101.1205735756502467820.idtracker@ietfa.amsl.com> <DM5PR0901MB2375564B76246A1DA5FCE4A7ABC30@DM5PR0901MB2375.namprd09.prod.outlook.com> <080CB857-150E-450C-B685-8A10FA0D3984@nostrum.com>
In-Reply-To: <080CB857-150E-450C-B685-8A10FA0D3984@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=cmschmidt@mitre.org; 
x-originating-ip: [192.160.51.88]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM5PR0901MB2375; 7:ondMlHXv6uUrEVnzw9SlQy6bPAUT4mfmphug/xF6u/9Padfpboe2PT+hF0aN3fuTOpMnq0Ju2HxWs1K3bRzjLcaCUGGQsTsHluII/evdse0uD+kEUNoHpEoR7UI9fQxKu9WY+aAg2WU8PQwfJlfRxU8HmqvV/FKoxJ1rJCFAf48INXOaWwmr3Ss4qRVA4W7DuK14p1Qr8EJJA0UtEnMVVqs14e5Iql6lAJxFXPorCLzRM6rD60ex0TkqSwdgxqVL
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 7c41a200-5bd6-465c-41cd-08d582ff42d9
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:DM5PR0901MB2375; 
x-ms-traffictypediagnostic: DM5PR0901MB2375:
x-microsoft-antispam-prvs: <DM5PR0901MB2375A82438AF93B10B547E54ABD90@DM5PR0901MB2375.namprd09.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(120809045254105)(192374486261705);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040501)(2401047)(8121501046)(5005006)(10201501046)(93006095)(93001095)(3231220)(944501244)(52105095)(3002001)(6055026)(6041288)(20161123558120)(20161123562045)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(6072148)(201708071742011); SRVR:DM5PR0901MB2375; BCL:0; PCL:0; RULEID:; SRVR:DM5PR0901MB2375; 
x-forefront-prvs: 06036BD506
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(376002)(366004)(396003)(346002)(39380400002)(189003)(199004)(13464003)(59450400001)(105586002)(305945005)(81156014)(9686003)(6506007)(81166006)(6306002)(8666007)(66066001)(26005)(2906002)(53546011)(55016002)(8936002)(54906003)(4326008)(5250100002)(25786009)(8676002)(53936002)(316002)(74316002)(33656002)(6436002)(102836004)(6246003)(68736007)(106356001)(229853002)(345774005)(3280700002)(186003)(5660300001)(966005)(2900100001)(2950100002)(97736004)(3660700001)(76176011)(99286004)(6916009)(86362001)(478600001)(3846002)(6116002)(7736002)(7696005)(14454004); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR0901MB2375; H:DM5PR0901MB2375.namprd09.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; 
received-spf: None (protection.outlook.com: mitre.org does not designate permitted sender hosts)
x-microsoft-antispam-message-info: sj0qs1GkBE99IYbr7tr6CBB1HmZd+NOr1zvJYWtUUzlzrF31COZLYL3L0GZiSXsC6ZyJV3Ztowm+UnB20uzI2HIPbKGnJkNtCpsL53vhPSSTVA1I5uVY77lLKsktq5XJvbC4kNsDqf5dc12mqzKf+L4nMZPBOVL263EFRmGw7ILiFsVu+A2KTZHafo4SC6Od+q+c/cXYV79BxDXbXakYUw2JVvtk2slGTnIakqHkHB3Kt8WNyQhzmzuMXmWck/SQMbxVq5jaRz93EAyDckrD7ABgU+g7hsb3DlGyJeYLBf5ecYPt5GEi09EHVtP60Ary8+B0aXHLW5cTnlnQoahKZA==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 7c41a200-5bd6-465c-41cd-08d582ff42d9
X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Mar 2018 01:11:59.1817 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: c620dc48-1d50-4952-8b39-df4d54d74d82
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR0901MB2375
X-OriginatorOrg: mitre.org
X-MITRE: 8GQsMWxq66rxk57w
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/4W35RteU28ft7tCJlaVeI3IQSEE>
Subject: Re: [sacm] Ben Campbell's Discuss on draft-ietf-sacm-nea-swima-patnc-02: (with DISCUSS and COMMENT)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Mar 2018 01:12:18 -0000

SGkgQmVuLA0KDQpUaGFuayB5b3UgZm9yIHRoZSBmb2xsb3ctdXAuIEkgbWFkZSBzb21lIGFkZGl0
aW9uYWwgbW9kaWZpY2F0aW9ucyAoLTA0IGRyYWZ0KSB0aGF0IEkgaG9wZSBhZGRyZXNzIHlvdXIg
cmVtYWluaW5nIGNvbW1lbnRzLg0KDQpSZWdhcmRpbmcgeW91ciBuaXQsIEkgbW92ZWQgdGhlIFJl
bGF0aW9uc2hpcCB0byBPdGhlciBTcGVjaWZpY2F0aW9ucyBiZWZvcmUgdGhlIFNlY3VyaXR5IENv
bnNpZGVyYXRpb25zLiBUaGUgbGFzdCBzZWN0aW9ucyBhcmUgbm93IHRoZSB0aHJlZSB5b3Ugbm90
ZS4NCg0KUmVnYXJkaW5nIHlvdXIgY29tbWVudCBvbiAyLjQ6DQoNCj4gPj4gwqcyLjQ6IFRoaXMg
c2VlbXMgdG8gYXNzdW1lIHRoZXJlIGlzIG5ldmVyIGEgbmVlZCB0byBoaWRlIGluZm9ybWF0aW9u
DQo+IGZyb20NCj4gPj4gaW50ZXJtZWRpYXJpZXMuIElzIHRoYXQgdGhlIGludGVudD8gKE9yIG1h
eWJlIHRoZXJlIGFyZW4ndCBhbnkNCj4gPj4gaW50ZXJtZWRpYXJpZXM/KQ0KPiA+DQo+ID4gVGhp
cyBpcyBub3QgdGhlIGludGVudC4gTkVBIGhhcyBtdWx0aXBsZSBwYXJ0cyBhbmQgdGhlIGludGVu
dCBpcyB0byBjbGFyaWZ5IHRoYXQNCj4gdGhlIFNXSU1BIHBhcnQgaXNuJ3QgdGhlIHBhcnQgZGVh
bGluZyB3aXRoIGRhdGEgY29uZmlkZW50aWFsaXR5LiBUaGUgcG9ydGlvbg0KPiB0aGF0IGhhbmRs
ZXMgY29uZmlkZW50aWFsaXR5IGlzIHRoZSBQVCBsYXllciBvZiB0aGUgTkVBIGFyY2hpdGVjdHVy
ZS4gKFBULVRMUw0KPiBhbmQgUFQtRUFQKSBBbGwgSSdtIHRyeWluZyB0byBkbyBpcyBlbXBoYXNp
emUgdGhhdCwgaWYgY29uZmlkZW50aWFsaXR5IGlzIGFuIGlzc3VlLA0KPiBtYWtlIHN1cmUgeW91
ciBORUEgYXJjaGl0ZWN0dXJlIGlzIHNldCB1cCB0byBzdXBwb3J0IHRoYXQuDQo+IA0KPiBJIHRo
aW5rIHdoYXQgaXMgY29uZnVzaW5nIG1lIGlzIHRoZSDigJx0aXRsZeKAnSBvZiB0aGUgbm9uLXJl
cXVpcmVtZW50IGlzIOKAnEVuZCB0bw0KPiBFbmQgY29uZmlkZW50aWFsaXR54oCdLiBJIGFkbWl0
IHRvIG5vdCBrbm93aW5nIHRoZSBzYWNtIHdvcmsgd2VsbCBlbm91Z2h0IHRvDQo+IGtub3cgd2hh
dCB0aGUg4oCcZW5kc+KAnSBhcmUsIGJ1dCBhbSBJIGNvcnJlY3QgdG8gYXNzdW1lIHRoYXQgUFQt
VExTLCBsaWtlIG1vc3QNCj4gdXNlcyBvZiBUTFMsIGlzIGhvcC1ieS1ob3A/IERvZXMgdGhlIGRh
dGEgZXZlcnkgY3Jvc3MgbW9yZSB0aGFuIG9uZSBob3A/IElzDQo+IHRoZSBhbnN3ZXIgdGhlIGRh
bWUgZm9yIFBULUVBUD8NCg0KUmUtcmVhZGluZyB0aGlzIHNlY3Rpb24sIEkgYWdyZWUgdGhhdCB0
aGUgc2VjdGlvbiB3YXMgY29uZnVzaW5nLiBJIHJlbmFtZWQgdGhlIHNlY3Rpb24gdG8gIk5vbi1T
V0lNQSBSZXF1aXJlbWVudHMiIChhbmQgcmVuYW1lZCB0aGUgcHJlY2VkaW5nIHNlY3Rpb24gdG8g
IlNXSU1BIFJlcXVpcmVtZW50cyIpLiBIb3BlZnVsbHkgdGhpcyBjbGFyaWZpZXMgdGhhdCB0aGUg
c3BlY2lmaWNhdGlvbiBpcyBub3QgdGFsa2luZyBhYm91dCB3aGF0IGlzIGFuZCBpcyBub3QgcmVx
dWlyZWQsIGJ1dCBzaW1wbHkgd2hpY2ggcmVxdWlyZW1lbnRzIG5lZWQgdG8gYmUgYWRkcmVzc2Vk
IGJ5IFNXSU1BIGFuZCB3aGljaCByZXF1aXJlbWVudHMgbmVlZCB0byBiZSBhZGRyZXNzZWQgYnkg
b3RoZXIgc3RhbmRhcmRzLg0KDQpJIGFsc28gY2hhbmdlZCB0aGUgdGV4dCBhcyBmb2xsb3dzOg0K
DQogICBUaGVyZSBhcmUgY2VydGFpbiBjYXBhYmlsaXRpZXMgdGhhdCB1c2VycyBvZiB0aGUgU1dJ
TUEgc3BlY2lmaWNhdGlvbg0KICAgbWlnaHQgcmVxdWlyZSBidXQgd2hpY2ggYXJlIGJleW9uZCB0
aGUgc2NvcGUgb2YgU1dJTUEgaXRzZWxmIGFuZCBuZWVkDQogICB0byBiZSBhZGRyZXNzZWQgYnkg
b3RoZXIgc3RhbmRhcmRzLiAgVGhpcyBsaXN0IGlzIG5vdCBleGhhdXN0aXZlLg0KDQogICBFbmQg
dG8gRW5kIENvbmZpZGVudGlhbGl0eTogIFRoZSBTV0lNQSBzcGVjaWZpY2F0aW9uIGRvZXMgbm90
IGRlZmluZQ0KICAgICAgYSBtZWNoYW5pc20gZm9yIGNvbmZpZGVudGlhbGl0eSwgbm9yIGlzIGNv
bmZpZGVudGlhbGl0eQ0KICAgICAgYXV0b21hdGljYWxseSBwcm92aWRlZCBieSB1c2luZyB0aGUg
UEEtVE5DIGludGVyZmFjZS4gIEluIHRoZSBORUENCiAgICAgIGFyY2hpdGVjdHVyZSwgY29uZmlk
ZW50aWFsaXR5IGlzIGdlbmVyYWxseSBwcm92aWRlZCBieSB0aGUNCiAgICAgIHVuZGVybHlpbmcg
dHJhbnNwb3J0IHByb3RvY29scywgc3VjaCBhcyB0aGUgUFQgQmluZGluZyB0byBUTFMNCiAgICAg
IFtSRkM2ODc2XSBvciBQVC1FQVAgUG9zdHVyZSBUcmFuc3BvcnQgZm9yIFR1bm5lbGVkIEVBUCBN
ZXRob2RzDQogICAgICBbUkZDNzE3MV0gLSBzZWUgU2VjdGlvbiA3IGZvciBtb3JlIGluZm9ybWF0
aW9uIG9uIHJlbGF0ZWQNCiAgICAgIHN0YW5kYXJkcy4gIFRoZSBpbmZvcm1hdGlvbiBjb252ZXll
ZCBieSBTV0lNQSBpcyBvZnRlbiBzZW5zaXRpdmUNCiAgICAgIGluIG5hdHVyZSBmb3IgYm90aCBz
ZWN1cml0eSAoU2VjdGlvbiA4KSBhbmQgcHJpdmFjeSAoU2VjdGlvbiA5KQ0KICAgICAgcmVhc29u
cy4gIFRob3NlIHdobyBpbXBsZW1lbnQgU1dJTUEgbmVlZCB0byBlbnN1cmUgdGhhdA0KICAgICAg
YXBwcm9wcmlhdGUgTkVBIHRyYW5zcG9ydCBtZWNoYW5pc21zIGFyZSBlbXBsb3llZCB0byBtZWV0
DQogICAgICBjb25maWRlbnRpYWxpdHkgcmVxdWlyZW1lbnRzLg0KDQpIb3BlZnVsbHkgdGhhdCBt
YWtlcyB0aGluZ3MgY2xlYXJlci4gVG8gbW9yZSBkaXJlY3RseSBhbnN3ZXIgeW91ciBxdWVzdGlv
biwgUFQtVExTIGlzIGp1c3QgVExTIHdpdGggc29tZSBtaW5vciBhZGRlZCBjb25zdHJhaW50cyB0
byBmaXQgd2l0aCB0aGUgTkVBIGFyY2hpdGVjdHVyZS4gTGlrZXdpc2UsIFBULUVBUCBpcyBiYXNp
Y2FsbHkganVzdCBFQVAuIFNXSU1BIHNob3VsZCBiZSBhZ25vc3RpYyBhcyB0byB3aGV0aGVyIG9y
IG5vdCB0aGVyZSBhcmUgaG9wcyBpbiB0aGUgdHJhbnNtaXNzaW9uIGFuZCBkZWxlZ2F0ZSBhbGwg
cmVzcG9uc2liaWxpdHkgZm9yIG1haW50YWluaW5nIGNvbmZpZGVudGlhbGl0eSBhY3Jvc3MgYW55
IGhvcHMgdG8gdGhlIFBUIHByb3RvY29sIGluIHF1ZXN0aW9uLiBEb2VzIHRoaXMgaGVscD8NCg0K
VGhhbmtzIGFnYWluIGZvciB0aGUgY2xhcmlmaWNhdGlvbnMuIEhvcGVmdWxseSB0aGUgbmV3IGRy
YWZ0ICgtMDQpIHdpbGwgYWRkcmVzcyB0aG9zZSByZW1haW5pbmcgY29uY2VybnMuDQoNCkNoYXJs
ZXMNCg0KPiAtLS0tLU9yaWdpbmFsIE1lc3NhZ2UtLS0tLQ0KPiBGcm9tOiBzYWNtIFttYWlsdG86
c2FjbS1ib3VuY2VzQGlldGYub3JnXSBPbiBCZWhhbGYgT2YgQmVuIENhbXBiZWxsDQo+IFNlbnQ6
IFRodXJzZGF5LCBNYXJjaCAwMSwgMjAxOCA5OjE5IFBNDQo+IFRvOiBTY2htaWR0LCBDaGFybGVz
IE0uIDxjbXNjaG1pZHRAbWl0cmUub3JnPg0KPiBDYzogc2FjbS1jaGFpcnNAaWV0Zi5vcmc7IEth
cmVuIE8nRG9ub2dodWUgPG9kb25vZ2h1ZUBpc29jLm9yZz47IFRoZQ0KPiBJRVNHIDxpZXNnQGll
dGYub3JnPjsgc2FjbUBpZXRmLm9yZzsgZHJhZnQtaWV0Zi1zYWNtLW5lYS1zd2ltYS0NCj4gcGF0
bmNAaWV0Zi5vcmcNCj4gU3ViamVjdDogUmU6IFtzYWNtXSBCZW4gQ2FtcGJlbGwncyBEaXNjdXNz
IG9uIGRyYWZ0LWlldGYtc2FjbS1uZWEtc3dpbWEtDQo+IHBhdG5jLTAyOiAod2l0aCBESVNDVVNT
IGFuZCBDT01NRU5UKQ0KPiANCj4gDQo+IA0KPiA+IE9uIEZlYiAyNCwgMjAxOCwgYXQgMTowMSBB
TSwgU2NobWlkdCwgQ2hhcmxlcyBNLiA8Y21zY2htaWR0QG1pdHJlLm9yZz4NCj4gd3JvdGU6DQo+
ID4NCj4gPiBIZWxsbywNCj4gPg0KPiA+IFRoYW5rcyBhIGJ1bmNoIGZvciB5b3VyIGZlZWRiYWNr
LiBJbiBnZW5lcmFsIEkgYWdyZWUgd2l0aCB5b3VyIGNvbW1lbnRzDQo+IGFuZCBtYWRlIGNoYW5n
ZXMgdG8gYWRkcmVzcyB0aGVtLiBTb21lIHF1aWNrIGNsYXJpZmljYXRpb25zOg0KPiA+DQo+ID4+
IMKnMi40OiBUaGlzIHNlZW1zIHRvIGFzc3VtZSB0aGVyZSBpcyBuZXZlciBhIG5lZWQgdG8gaGlk
ZSBpbmZvcm1hdGlvbg0KPiBmcm9tDQo+ID4+IGludGVybWVkaWFyaWVzLiBJcyB0aGF0IHRoZSBp
bnRlbnQ/IChPciBtYXliZSB0aGVyZSBhcmVuJ3QgYW55DQo+ID4+IGludGVybWVkaWFyaWVzPykN
Cj4gPg0KPiA+IFRoaXMgaXMgbm90IHRoZSBpbnRlbnQuIE5FQSBoYXMgbXVsdGlwbGUgcGFydHMg
YW5kIHRoZSBpbnRlbnQgaXMgdG8gY2xhcmlmeSB0aGF0DQo+IHRoZSBTV0lNQSBwYXJ0IGlzbid0
IHRoZSBwYXJ0IGRlYWxpbmcgd2l0aCBkYXRhIGNvbmZpZGVudGlhbGl0eS4gVGhlIHBvcnRpb24N
Cj4gdGhhdCBoYW5kbGVzIGNvbmZpZGVudGlhbGl0eSBpcyB0aGUgUFQgbGF5ZXIgb2YgdGhlIE5F
QSBhcmNoaXRlY3R1cmUuIChQVC1UTFMNCj4gYW5kIFBULUVBUCkgQWxsIEknbSB0cnlpbmcgdG8g
ZG8gaXMgZW1waGFzaXplIHRoYXQsIGlmIGNvbmZpZGVudGlhbGl0eSBpcyBhbiBpc3N1ZSwNCj4g
bWFrZSBzdXJlIHlvdXIgTkVBIGFyY2hpdGVjdHVyZSBpcyBzZXQgdXAgdG8gc3VwcG9ydCB0aGF0
Lg0KPiANCj4gSSB0aGluayB3aGF0IGlzIGNvbmZ1c2luZyBtZSBpcyB0aGUg4oCcdGl0bGXigJ0g
b2YgdGhlIG5vbi1yZXF1aXJlbWVudCBpcyDigJxFbmQgdG8NCj4gRW5kIGNvbmZpZGVudGlhbGl0
eeKAnS4gSSBhZG1pdCB0byBub3Qga25vd2luZyB0aGUgc2FjbSB3b3JrIHdlbGwgZW5vdWdodCB0
bw0KPiBrbm93IHdoYXQgdGhlIOKAnGVuZHPigJ0gYXJlLCBidXQgYW0gSSBjb3JyZWN0IHRvIGFz
c3VtZSB0aGF0IFBULVRMUywgbGlrZSBtb3N0DQo+IHVzZXMgb2YgVExTLCBpcyBob3AtYnktaG9w
PyBEb2VzIHRoZSBkYXRhIGV2ZXJ5IGNyb3NzIG1vcmUgdGhhbiBvbmUgaG9wPyBJcw0KPiB0aGUg
YW5zd2VyIHRoZSBkYW1lIGZvciBQVC1FQVA/DQo+IA0KPiANCj4gDQo+ID4NCj4gPj4gwqczLjQu
MywNCj4gPj4gLS0gZmlyc3QgcGFyYWdyYXBoOiBXaGF0IGlzIHRoZSBleHBlY3RlZCBzY29wZSBv
ZiB1bmlxdWVuZXNzIGZvciByZWNvcmQNCj4gPj4gaWRlbnRpZmllcnM/IC0tIEluIHRoZSBzZW50
ZW5jZSAiVGhlIFJlY29yZCBJZGVudGlmaWVyIFNIT1VMRCByZW1haW4NCj4gPj4gdW5jaGFuZ2Vk
DQo+ID4+IGlmIHRoYXQgcmVjb3JkIGlzIG1vZGlmaWVkLiIsIHdoeSBpcyB0aGUgU0hPVUxEIG5v
dCBhIE1VU1Q/IFdoYXQgd291bGQNCj4gPj4gaGFwcGVuDQo+ID4+IGlmIHRoZSBpZGVudGlmaWVy
IGRpZCBjaGFuZ2U/DQo+ID4NCj4gPiBJdCBpcyBTSE9VTEQgcmF0aGVyIHRoYW4gTVVTVCBiZWNh
dXNlLCB1bmRlciBzb21lIHRyYWNraW5nIGNvbmRpdGlvbnMgaXQNCj4gbWlnaHQgbm90IGJlIHBv
c3NpYmxlIHRvIGRpc3Rpbmd1aXNoIGJldHdlZW4gYSByZWNvcmQgYmVpbmcgbW9kaWZpZWQgYW5k
IGENCj4gcmVjb3JkIGJlaW5nIGRlbGV0ZWQgYW5kIGEgbmV3IHJlY29yZCBiZWluZyBjcmVhdGVk
LiBXaWxsIGFkZCBjbGFyaWZ5aW5nIHRleHQNCj4gdG8gdGhpcyBlZmZlY3QuIElmIHRoZSBzeXN0
ZW0gdGhpbmtzIHRoYXQgYSBtb2RpZmljYXRpb24gaXMgYWN0dWFsbHkgYQ0KPiBkZWxldGUvY3Jl
YXRlIGFjdGlvbiwgaXQgd291bGQgYmUgdHJlYXRlZCBhcyBzdWNoIHdpdGggYSBuZXcgcmVjb3Jk
IGlkZW50aWZpZXINCj4gYmVpbmcgYXNzaWduZWQgdG8gdGhlICJjcmVhdGVkIiByZWNvcmQuDQo+
ID4NCj4gDQo+IE9rYXk7IEkgdGhpbmsgdGhlIG1lbnRpb25lZCBjbGFyaWZ5aW5nIHRleHQgd291
bGQgaGVscC4NCj4gDQo+IA0KPiA+PiDCpzcuMTogIiBTb21lIHRvb2xzIG1pZ2h0IG5vdCBiZSBk
ZXNpZ25lZCB0byB1cGRhdGUgcmVjb3JkcyBpbiB0aGUNCj4gU29mdHdhcmUNCj4gPj4gSW52ZW50
b3J5IEV2aWRlbmNlIENvbGxlY3Rpb24gaW4gcmVhbCB0aW1lLC4uLiIgV2Fzbid0IHRoZXJlIGEg
bm9ybWF0aXZlDQo+ID4+IHJlcXVpcmVtZW50IHRoYXQgdGhleSBiZSBjYXBhYmxlIG9mIHRoaXM/
DQo+ID4NCj4gPiBBIHN1YnRsZSBkaWZmZXJlbmNlOiBUaGUgU1dJTUEtUEMgTVVTVCBkZXRlY3Qg
Y2hhbmdlcyB0byB0aGUgU29mdHdhcmUNCj4gSW52ZW50b3J5IEV2aWRlbmNlIENvbGxlY3Rpb24g
aW4gbmVhciByZWFsIHRpbWUsIGJ1dCB0aGUgZGF0YSBzb3VyY2VzIG1pZ2h0DQo+IG5vdCB1cGRh
dGUgdGhlIFNvZnR3YXJlIEludmVudG9yeSBFdmlkZW5jZSBDb2xsZWN0aW9uIGluIHJlYWwgdGlt
ZS4gSQ0KPiByZXdvcmRlZCB0byBjbGFyaWZ5IHRoZSBkaWZmZXJlbmNlIGJldHdlZW4gdGhlIFNX
SU1BLVBDIHJlYWRpbmcgdGhlDQo+IEV2aWRlbmNlIENvbGxlY3Rpb24gYW5kIHRoZSB0b29sIHVw
ZGF0aW5nIHRoZSBFdmlkZW5jZSBDb2xsZWN0aW9uLg0KPiANCj4gT2theS4NCj4gDQo+ID4NCj4g
Pj4gwqc5OiBOaXQ6IGlzIHRoZXJlIGFyZSByZWFzb25zIHRvIHZpb2xhdGUgdGhlIGNvbnZlbnRp
b24gdGhhdCBJQU5BLCBzZWN1cml0eSwNCj4gPj4gYW5kIHByaXZhY3kgY29uc2lkZXJhdGlvbnMg
YXJlIHRoZSBsYXN0IHN1YnN0YW50aXZlIHNlY3Rpb25zIGluIGluIHRoZSBib2R5DQo+IG9mDQo+
ID4+IGFuIFJGQz8NCj4gPg0KPiA+IEknbSBoYXBweSB0byByZW9yZGVyIHRoZXNlIC0gYSBxdWlj
ayByYW5kb20gc2FtcGxlIG9mIFJGQ3Mgc2VlbXMgdG8NCj4gcHJvdmlkZSBhIG51bWJlciBvZiBk
aWZmZXJlbnQgb3JkZXJpbmdzLiBJIGp1c3QgZm9sbG93ZWQgdGhlIFBBLVROQyBzcGVjLA0KPiBz
aW5jZSBJIGhhZCB0aGF0IG9wZW4gbW9zdC4gSnVzdCBsZXQgbWUga25vdyB3aGF0IHRoZSBleHBl
Y3RlZCBvcmRlciBpcy4NCj4gDQo+IFR5cGljYWxseSB0aGV5IGFyZSB0aGUgbGFzdCB0aHJlZSDi
gJxzdWJzdGFudGl2ZeKAnSBzZWN0aW9ucyBpbiB0aGUgbWFpbiBib2R5IG9mIGFuDQo+IFJGQywg
bm90IGNvdW50aW5nIGFueSBhcHBlbmRpY2VzIG9yIOKAnGFja25vd2xlZGdlbWVudHPigJ0gdHlw
ZSBzZWN0aW9ucy4gSQ0KPiBkb27igJl0IHRoaW5rIHdlIGFyZSBjb25zaXN0ZW50IGluIHRoZSBv
cmRlciBhbW9uZyB0aG9zZSB0aHJlZS4NCj4gDQo+IFRoYW5rcyENCj4gDQo+IEJlbi4NCj4gDQo+
ID4NCj4gPiBUaGFua3MgYSBidW5jaCwNCj4gPiBDaGFybGVzDQo+ID4NCj4gPj4gLS0tLS1Pcmln
aW5hbCBNZXNzYWdlLS0tLS0NCj4gPj4gRnJvbTogQmVuIENhbXBiZWxsIFttYWlsdG86YmVuQG5v
c3RydW0uY29tXQ0KPiA+PiBTZW50OiBXZWRuZXNkYXksIEZlYnJ1YXJ5IDIxLCAyMDE4IDk6MTAg
UE0NCj4gPj4gVG86IFRoZSBJRVNHIDxpZXNnQGlldGYub3JnPg0KPiA+PiBDYzogZHJhZnQtaWV0
Zi1zYWNtLW5lYS1zd2ltYS1wYXRuY0BpZXRmLm9yZzsgc2FjbUBpZXRmLm9yZzsgS2FyZW4NCj4g
Pj4gTydEb25vZ2h1ZSA8b2Rvbm9naHVlQGlzb2Mub3JnPjsgc2FjbS1jaGFpcnNAaWV0Zi5vcmc7
DQo+ID4+IG9kb25vZ2h1ZUBpc29jLm9yZzsgc2FjbUBpZXRmLm9yZw0KPiA+PiBTdWJqZWN0OiBC
ZW4gQ2FtcGJlbGwncyBEaXNjdXNzIG9uIGRyYWZ0LWlldGYtc2FjbS1uZWEtc3dpbWEtcGF0bmMt
MDI6DQo+ID4+ICh3aXRoIERJU0NVU1MgYW5kIENPTU1FTlQpDQo+ID4+DQo+ID4+IEJlbiBDYW1w
YmVsbCBoYXMgZW50ZXJlZCB0aGUgZm9sbG93aW5nIGJhbGxvdCBwb3NpdGlvbiBmb3INCj4gPj4g
ZHJhZnQtaWV0Zi1zYWNtLW5lYS1zd2ltYS1wYXRuYy0wMjogRGlzY3Vzcw0KPiA+Pg0KPiA+PiBX
aGVuIHJlc3BvbmRpbmcsIHBsZWFzZSBrZWVwIHRoZSBzdWJqZWN0IGxpbmUgaW50YWN0IGFuZCBy
ZXBseSB0byBhbGwNCj4gPj4gZW1haWwgYWRkcmVzc2VzIGluY2x1ZGVkIGluIHRoZSBUbyBhbmQg
Q0MgbGluZXMuIChGZWVsIGZyZWUgdG8gY3V0IHRoaXMNCj4gPj4gaW50cm9kdWN0b3J5IHBhcmFn
cmFwaCwgaG93ZXZlci4pDQo+ID4+DQo+ID4+DQo+ID4+IFBsZWFzZSByZWZlciB0byBodHRwczov
L3d3dy5pZXRmLm9yZy9pZXNnL3N0YXRlbWVudC9kaXNjdXNzLWNyaXRlcmlhLmh0bWwNCj4gPj4g
Zm9yIG1vcmUgaW5mb3JtYXRpb24gYWJvdXQgSUVTRyBESVNDVVNTIGFuZCBDT01NRU5UIHBvc2l0
aW9ucy4NCj4gPj4NCj4gPj4NCj4gPj4gVGhlIGRvY3VtZW50LCBhbG9uZyB3aXRoIG90aGVyIGJh
bGxvdCBwb3NpdGlvbnMsIGNhbiBiZSBmb3VuZCBoZXJlOg0KPiA+PiBodHRwczovL2RhdGF0cmFj
a2VyLmlldGYub3JnL2RvYy9kcmFmdC1pZXRmLXNhY20tbmVhLXN3aW1hLXBhdG5jLw0KPiA+Pg0K
PiA+Pg0KPiA+Pg0KPiA+PiAtLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQo+ID4+IERJU0NVU1M6DQo+ID4+IC0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0NCj4gPj4NCj4gPj4gKFRoaXMgaXMgcmVsYXRlZCB0byBvbmUgb2YgRWtyJ3MgY29t
bWVudHMsIGJ1dCBJIGRvbid0IHRoaW5rIGl0J3MgcXVpdGUgdGhlDQo+ID4+IHNhbWUuKQ0KPiA+
Pg0KPiA+PiBJbiB0aGUgZmlyc3QgcGFyYWdyYXBoIG9mIMKnNy4yLCB0aGUgY29uY2x1c2lvbnMg
c2VlbSB0byBiZSBiYXNlZCBvbiB0aGUNCj4gPj4gZm9sbG93aW5nIHNlbnRlbmNlOg0KPiA+Pg0K
PiA+PiAiVGhpcyBpcyBnZW5lcmFsbHkgbm90IGNvbnNpZGVyZWQgdG8gYmUgcHJvYmxlbWF0aWMs
IGFzDQo+ID4+ICAgdGhvc2Ugd2l0aCBhY2Nlc3MgdG8gdGhlIGVuZHBvaW50IGNhbiB1c3VhbGx5
IGxlYXJuIG9mIGV2ZXJ5dGhpbmcNCj4gPj4gICBkaXNjbG9zZWQgYnkgdGhhdCBlbmRwb2ludOKA
mXMgcmVjb3JkcyBzaW1wbHkgYnkgaW5zcGVjdGluZyBvdGhlciBwYXJ0cw0KPiA+PiAgIG9mIHRo
ZSBlbmRwb2ludC4iDQo+ID4+DQo+ID4+IFRoaXMgZG9lc27igJl0IHNlZW0gbGlrZSBhIHJlYXNv
bmFibGUgYXNzdW1wdGlvbi4gTXVsdGl1c2VyIGVuZHBvaW50cyBtYXkNCj4gPj4gd2VsbA0KPiA+
PiBoYXZlIGFjY2VzcyBjb250cm9scyB0aGF0IHByZXZlbnQgYSBnaXZlbiB1c2VyIGZyb20gc2Vl
aW5nIGFsbCBzb2Z0d2FyZQ0KPiA+PiBwYWNrYWdlcyBpbnN0YWxsZWQgb24gdGhlIHN5c3RlbS4g
VGhpcyBsZWFkcyB0byB0aGUgY29uY2x1c2lvbiB0aGF0IHRoZQ0KPiA+PiByZWNvcmRzDQo+ID4+
IG9uIHRoZSBlbmRwb2ludCBhcmUgbm90IHNlbnNpdGl2ZS4gSSBkbyBub3QgdGhpbmsgdGhpcyBk
b2N1bWVudCBzaG91bGQNCj4gZHJhdw0KPiA+PiB0aGF0IGNvbmNsdXNpb24uIEV2ZW4gaWYgdGhp
cyB3ZXJlIHByb3ZhYmx5IHRydWUgZm9yIGFsbCBleGlzdGluZyBzeXN0ZW1zLA0KPiBzdWNoDQo+
ID4+IGFuIGFzc3VtcHRpb24gY291bGQgYmUgcHJvYmxlbWF0aWMgZm9yIGZ1dHVyZSBzeXN0ZW1z
Lg0KPiA+Pg0KPiA+Pg0KPiA+PiAtLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tDQo+ID4+IENPTU1FTlQ6DQo+ID4+IC0t
LS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0t
LS0tLS0tLS0tLS0NCj4gPj4NCj4gPj4gU3Vic3RhbnRpdmUgQ29tbWVudHM6DQo+ID4+DQo+ID4+
IMKnMi40OiBUaGlzIHNlZW1zIHRvIGFzc3VtZSB0aGVyZSBpcyBuZXZlciBhIG5lZWQgdG8gaGlk
ZSBpbmZvcm1hdGlvbg0KPiBmcm9tDQo+ID4+IGludGVybWVkaWFyaWVzLiBJcyB0aGF0IHRoZSBp
bnRlbnQ/IChPciBtYXliZSB0aGVyZSBhcmVuJ3QgYW55DQo+ID4+IGludGVybWVkaWFyaWVzPykN
Cj4gPj4NCj4gPj4gwqczLjQuMywNCj4gPj4gLS0gZmlyc3QgcGFyYWdyYXBoOiBXaGF0IGlzIHRo
ZSBleHBlY3RlZCBzY29wZSBvZiB1bmlxdWVuZXNzIGZvciByZWNvcmQNCj4gPj4gaWRlbnRpZmll
cnM/IC0tIEluIHRoZSBzZW50ZW5jZSAiVGhlIFJlY29yZCBJZGVudGlmaWVyIFNIT1VMRCByZW1h
aW4NCj4gPj4gdW5jaGFuZ2VkDQo+ID4+IGlmIHRoYXQgcmVjb3JkIGlzIG1vZGlmaWVkLiIsIHdo
eSBpcyB0aGUgU0hPVUxEIG5vdCBhIE1VU1Q/IFdoYXQgd291bGQNCj4gPj4gaGFwcGVuDQo+ID4+
IGlmIHRoZSBpZGVudGlmaWVyIGRpZCBjaGFuZ2U/DQo+ID4+DQo+ID4+IMKnMy40LjQ6DQo+ID4+
DQo+ID4+IC0tICJIb3dldmVyLCBpZiB0aGF0IGRpcmVjdG9yeSBpcyBzaGFyZWQgYnkgb3RoZXIg
c29mdHdhcmUgcHJvZHVjdHMsIHRoZQ0KPiA+PiAibG9jYXRpb24iIFNIT1VMRCBiZSB0aGUgbG9j
YXRpb24gb2YgdGhlIHByaW1hcnkgZXhlY3V0YWJsZQ0KPiA+PiAgIGFzc29jaWF0ZWQgd2l0aCB0
aGUgc29mdHdhcmUgcHJvZHVjdC4iDQo+ID4+IEknbSBjb25mdXNlZCBieSB0aGUgdGhlIGNvbmRp
dGlvbiwgc2luY2Ugc2hhcmluZyBhIGRpcmVjdG9yeSB3aXRoIG90aGVyDQo+ID4+IHByb2R1Y3Rz
IGRvZXNuJ3Qgc2VlbSB0byBpbnRyb2R1Y2UgdGhlIGFtYmlndWl0eSB0aGF0IHRoZSByZXN0IG9m
IHRoZQ0KPiA+PiBzZW50ZW5jZQ0KPiA+PiBhc3N1bWVzLiBQZXJoYXBzIHRoaXMgd2FzIG1lYW50
IHRvIGJlIGFib3V0IHNpdHVhdGlvbnMgd2hlcmUgYQ0KPiBzb2Z0d2FyZQ0KPiA+PiBwYWNrYWdl
DQo+ID4+IGlzIGluc3RhbGxlZCBhY3Jvc3MgbXVsdGlwbGUgZGlyZWN0b3JpZXM/DQo+ID4+DQo+
ID4+IC0tICJFdmVuIGEgcHJvYmFibGUgbG9jYXRpb24gZm9yIGEgc29mdHdhcmUgcHJvZHVjdCBp
cyBwcmVmZXJhYmxlIHRvIHVzaW5nIGENCj4gPj4gemVyby1sZW5ndGggbG9jYXRvci4iIFRoaXMg
Y291bGQgdXNlIGVsYWJvcmF0aW9uOyBkbyB5b3UgZXhwZWN0IHRoZQ0KPiBjb2xsZWN0b3INCj4g
Pj4gdG8gZ3Vlc3M/DQo+ID4+DQo+ID4+IMKnNy4xOiAiIFNvbWUgdG9vbHMgbWlnaHQgbm90IGJl
IGRlc2lnbmVkIHRvIHVwZGF0ZSByZWNvcmRzIGluIHRoZQ0KPiBTb2Z0d2FyZQ0KPiA+PiBJbnZl
bnRvcnkgRXZpZGVuY2UgQ29sbGVjdGlvbiBpbiByZWFsIHRpbWUsLi4uIiBXYXNuJ3QgdGhlcmUg
YSBub3JtYXRpdmUNCj4gPj4gcmVxdWlyZW1lbnQgdGhhdCB0aGV5IGJlIGNhcGFibGUgb2YgdGhp
cz8NCj4gPj4NCj4gPj4gwqc4LA0KPiA+PiAtLSAybmQgcGFyYWdyYXBoOiBJdOKAmXMgd29ydGgg
bWVudGlvbmluZyB0aGF0IGluIHNvbWUgY29udGV4dHMgdGhpcyBzb3J0IG9mDQo+ID4+IGluZm9y
bWF0aW9uIGNvdWxkIGV4cG9zZSB0aGUgdXNlciB0byBzZXZlcmUgcGVyc29uYWwgcmlzaywgaW5j
bHVkaW5nIHRoZQ0KPiByaXNrDQo+ID4+IG9mIGRlYXRoLiAtLSBMYXN0IHBhcmFncmFwaDogIkZv
ciB0aGlzIHJlYXNvbiwgcHJpdmFjeSBzYWZlZ3VhcmRzIG1pZ2h0IGJlDQo+ID4+IG5lY2Vzc2Fy
eSBmb3IgY29sbGVjdGVkIGludmVudG9yeSBpbmZvcm1hdGlvbi4iIENhbiB0aGlzIGJlIHN0YXRl
ZCBtb3JlDQo+ID4+IHN0cm9uZ2x5IHRoYW4gIm1pZ2h0IGJlIG5lY2Vzc2FyeSI/DQo+ID4+DQo+
ID4+IEVkaXRvcmlhbCBDb21tZW50cyBhbmQgTml0czoNCj4gPj4NCj4gPj4gwqczLjguNSwgZmly
c3QgcGFyYWdyYXBoOiAiQXMgbm90ZWQgaW4gU2VjdGlvbiAzLjYgU1dJTUEtUENzIE1VU1QgLi4u
Ig0KPiA+PiBQbGVhc2UgcmVzZXJ2ZSAyMTE5IGtleXdvcmRzIGZvciB0aGUgYXV0aG9yaXRhdGl2
ZSBzdGF0ZW1lbnQgb2YgYQ0KPiA+PiByZXF1aXJlbWVudDsNCj4gPj4gdGhhdCBpcywgcGxlYXNl
IGRvIG5vdCB1c2UgdGhlbSB0byByZWZlciB0byByZXF1aXJlbWVudHMgZGVmaW5lZA0KPiBlbHNl
d2hlcmUuDQo+ID4+IChOb3RlIHRoYXQgdGhpcyBwYXR0ZXJuIG9jY3VycyBtdWx0aXBsZSB0aW1l
cyBpbiB0aGUgZHJhZnQuKQ0KPiA+Pg0KPiA+PiDCpzk6IE5pdDogaXMgdGhlcmUgYXJlIHJlYXNv
bnMgdG8gdmlvbGF0ZSB0aGUgY29udmVudGlvbiB0aGF0IElBTkEsIHNlY3VyaXR5LA0KPiA+PiBh
bmQgcHJpdmFjeSBjb25zaWRlcmF0aW9ucyBhcmUgdGhlIGxhc3Qgc3Vic3RhbnRpdmUgc2VjdGlv
bnMgaW4gaW4gdGhlIGJvZHkNCj4gb2YNCj4gPj4gYW4gUkZDPw0KPiA+Pg0KPiA+Pg0KPiA+DQoN
Cg==


From nobody Tue Mar  6 09:16:54 2018
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sacm@ietf.org
Delivered-To: sacm@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 08E1F124BFA; Tue,  6 Mar 2018 09:16:47 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: sacm@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.74.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <152035660698.28287.11407844289476676943@ietfa.amsl.com>
Date: Tue, 06 Mar 2018 09:16:47 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/qXvOYEAHiv_zLpl2DLJE0A1nvo0>
Subject: [sacm] I-D Action: draft-ietf-sacm-nea-swima-patnc-04.txt
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Mar 2018 17:16:47 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Security Automation and Continuous Monitoring WG of the IETF.

        Title           : Software Inventory Message and Attributes (SWIMA) for PA-TNC
        Authors         : Charles Schmidt
                          Daniel Haynes
                          Chris Coffin
                          David Waltermire
                          Jessica Fitzgerald-McKay
	Filename        : draft-ietf-sacm-nea-swima-patnc-04.txt
	Pages           : 94
	Date            : 2018-03-06

Abstract:
   This document extends "PA-TNC: A Posture Attribute (PA) Protocol
   Compatible with Trusted Network Connect (TNC)" (RFC 5792) by
   providing specific attributes and message exchanges to allow
   endpoints to report their installed software inventory information to
   a NEA server, as defined in "Network Endpoint Assessment (NEA):
   Overview and Requirements" (RFC 5209).


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sacm-nea-swima-patnc/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-sacm-nea-swima-patnc-04
https://datatracker.ietf.org/doc/html/draft-ietf-sacm-nea-swima-patnc-04

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sacm-nea-swima-patnc-04


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue Mar  6 09:17:02 2018
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sacm@ietf.org
Delivered-To: sacm@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 38C5C1289B0; Tue,  6 Mar 2018 09:16:47 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: "Karen O'Donoghue" <odonoghue@isoc.org>, <Kathleen.Moriarty.ietf@gmail.com>, <sacm@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.74.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <152035660722.28287.4572279157894246012.idtracker@ietfa.amsl.com>
Date: Tue, 06 Mar 2018 09:16:47 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/krwmDfbdq-Jx__CnCfSMohRyrB4>
Subject: [sacm] New Version Notification - draft-ietf-sacm-nea-swima-patnc-04.txt
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 06 Mar 2018 17:16:47 -0000

A new version (-04) has been submitted for draft-ietf-sacm-nea-swima-patnc:
https://www.ietf.org/internet-drafts/draft-ietf-sacm-nea-swima-patnc-04.txt


The IETF datatracker page for this Internet-Draft is:
https://datatracker.ietf.org/doc/draft-ietf-sacm-nea-swima-patnc/

Diff from previous version:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sacm-nea-swima-patnc-04

Please note that it may take a couple of minutes from the time of submission
until the diff is available at tools.ietf.org.

IETF Secretariat.


From nobody Thu Mar  8 06:17:49 2018
Return-Path: <kaduk@mit.edu>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6BC44126D85; Thu,  8 Mar 2018 06:17:42 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.211
X-Spam-Level: 
X-Spam-Status: No, score=-4.211 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DiZePIm3yQYO; Thu,  8 Mar 2018 06:17:40 -0800 (PST)
Received: from dmz-mailsec-scanner-4.mit.edu (dmz-mailsec-scanner-4.mit.edu [18.9.25.15]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F0EC4126CD6; Thu,  8 Mar 2018 06:17:39 -0800 (PST)
X-AuditID: 1209190f-ce9ff70000007d48-0d-5aa146020d61
Received: from mailhub-auth-1.mit.edu ( [18.9.21.35]) (using TLS with cipher DHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by dmz-mailsec-scanner-4.mit.edu (Symantec Messaging Gateway) with SMTP id E5.69.32072.20641AA5; Thu,  8 Mar 2018 09:17:38 -0500 (EST)
Received: from outgoing.mit.edu (OUTGOING-AUTH-1.MIT.EDU [18.9.28.11]) by mailhub-auth-1.mit.edu (8.13.8/8.9.2) with ESMTP id w28EHb92007293; Thu, 8 Mar 2018 09:17:37 -0500
Received: from mit.edu (24-107-191-124.dhcp.stls.mo.charter.com [24.107.191.124]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.13.8/8.12.4) with ESMTP id w28EHW76016968 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT); Thu, 8 Mar 2018 09:17:34 -0500
Date: Thu, 8 Mar 2018 08:17:32 -0600
From: Benjamin Kaduk <kaduk@mit.edu>
To: "Schmidt, Charles M." <cmschmidt@mitre.org>
Cc: The IESG <iesg@ietf.org>, "sacm-chairs@ietf.org" <sacm-chairs@ietf.org>, "draft-ietf-sacm-nea-swima-patnc@ietf.org" <draft-ietf-sacm-nea-swima-patnc@ietf.org>,  "odonoghue@isoc.org" <odonoghue@isoc.org>, "sacm@ietf.org" <sacm@ietf.org>
Message-ID: <20180308141732.GD27850@mit.edu>
References: <20180221225835.GG54688@mit.edu> <DM5PR0901MB2375263C5375E6438FA0A70BABC30@DM5PR0901MB2375.namprd09.prod.outlook.com> <20180228015121.GE50954@kduck.kaduk.org> <DM5PR0901MB2375EF1656E78C7DA3DE046FABD90@DM5PR0901MB2375.namprd09.prod.outlook.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <DM5PR0901MB2375EF1656E78C7DA3DE046FABD90@DM5PR0901MB2375.namprd09.prod.outlook.com>
User-Agent: Mutt/1.9.1 (2017-09-22)
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFupnleLIzCtJLcpLzFFi42IR4hRV1mVyWxhlcGCmlcW8xz1MFl9e/2Cz mPFnIrPFrEf7mS3WN01itXixtIvRgc1jyZKfTB6vpjWyerxtuMoewBzFZZOSmpNZllqkb5fA lfHwx0fmgksuFd+e2zQwTjTrYuTkkBAwkVjcvJGpi5GLQ0hgMZPE032v2SGcDYwSn48cZoZw zjBJLPzezAbSwiKgIrHvcysriM0GZDd0X2YGsUUE9CVenv3OAmIzC3QySWxZqApiCwuUSHx/ 2gcU5+DgFdCReNrhAjGzlUli94RXjCA1vAKCEidnPoHq1ZK48e8lE0g9s4C0xPJ/HCBhToFE iZ/rl4OtFRVQltjbd4h9AqPALCTds5B0z0LoXsDIvIpRNiW3Sjc3MTOnODVZtzg5MS8vtUjX RC83s0QvNaV0EyM4rCX5dzDOafA+xCjAwajEw/vAcWGUEGtiWXFl7iFGSQ4mJVFe36wFUUJ8 SfkplRmJxRnxRaU5qcWHGCU4mJVEeAP0gcp5UxIrq1KL8mFS0hwsSuK87ibaUUIC6Yklqdmp qQWpRTBZGQ4OJQneby5AjYJFqempFWmZOSUIaSYOTpDhPEDDOVxBhhcXJOYWZ6ZD5E8x6nLc ePG6jVmIJS8/L1VKnPc7yCABkKKM0jy4OaB0JJG9v+YVozjQW8K8JiCjeICpDG7SK6AlTEBL 9l5eALKkJBEhJdXAaL99ffRKU/Pbz3bI8R5cFzqPJ8Rpi7/QuhnC03f8YYqpWdFgN//P8rLv KU4JC5I+mDe+eqkgmbV4b+2ME08+rdIoK/G8xGH4Jsdd9FWl1eqit8+/ZegrPs4LnxSceO6E 2AsGG3UVrlv/tdcejt0ZJ84Ypsl37tdf00PfdBd3H31yY+4ig8LnnUosxRmJhlrMRcWJACjy 3PUiAwAA
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/KeqYFVS1pmkPdPYecIk-iWahJiE>
Subject: Re: [sacm] Benjamin Kaduk's practice ballot (No Objection) on draft-ietf-sacm-nea-swima-patnc-02: (with COMMENT)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Mar 2018 14:17:43 -0000

Hi Charles,

On Tue, Mar 06, 2018 at 01:03:37AM +0000, Schmidt, Charles M. wrote:
> Hi Benjamin,
> 
> Thanks for following up. It looks like we are mostly on the same page. I have a few additional responses:
> 
> > > > Also Section 2.3
> > > >
> > > > Can we REQUIRE the underlying transport to provide confidentiality,
> > > > or is there some historical baggage that requires us to allow the
> > > > possibility of cleartext transport?  To be clear, my preference
> > > > is in general for in-protocol message protection, but I recognize
> > > > that there are scenarios where that doesn't always work well or is
> > > > redundant.
> > >
> > > NEA is designed to support an extensible list of PT (transport) protocols.
> > Currently, the only NEA transport protocols defined are PT-TLS and PT-EAP,
> > both of which provide confidentiality. I cannot think of why, but it might be
> > the case that sometime in the future someone might create a PT protocol
> > that does not provide confidentiality. If someone did this, I am not sure I
> > would want to automatically preclude SWIMA from using it. In short, my
> > preference would be to note this issue, but not dictate a specific response.
> > Please let me know if you still feel that stronger requirements for
> > confidentiality are necessary.
> > 
> > This seems pretty speculative to me, but not quite to the point that
> > I would ballot DISCUSS for it (if I could ballot, which I can't
> > yet).  If such a hypothetical future transport was standards-track,
> > it could (procedurally, at least) update this document to relax the
> > condition, anyway, so my personal inclination is to require
> > confidentiality at present and revisit later if needed.
> 
> Thinking about this a bit more, I agree. I have made two changes to the section. First, I made it clear that the section is not about "things that are not required", but about requirements that are beyond the scope of SWIMA to meet. (Hopefully that will clarify things a bit better.) I also rephrased the section:
> 
>    There are certain capabilities that users of the SWIMA specification
>    might require but which are beyond the scope of SWIMA itself and need
>    to be addressed by other standards.  This list is not exhaustive.
> 
>    End to End Confidentiality:  The SWIMA specification does not define
>       a mechanism for confidentiality, nor is confidentiality
>       automatically provided by using the PA-TNC interface.  In the NEA
>       architecture, confidentiality is generally provided by the
>       underlying transport protocols, such as the PT Binding to TLS
>       [RFC6876] or PT-EAP Posture Transport for Tunneled EAP Methods
>       [RFC7171] - see Section 7 for more information on related
>       standards.  The information conveyed by SWIMA is often sensitive
>       in nature for both security (Section 8) and privacy (Section 9)
>       reasons.  Those who implement SWIMA need to ensure that
>       appropriate NEA transport mechanisms are employed to meet
>       confidentiality requirements.
> 
> Does this better address your concerns?

Yes, thank you!

> --
> 
> > > > I'm a little concerned that there are some broad MUST-level
> > > > requirements 
> <SNIP>
> > >
> > > Could you expand on this? 
> <SNIP>
> >
> > Probably I should treat this as a learning experience with my
> > practice ballot, having put some not-really-actionable comment in my
> > review.  Looking through the document again, maybe things like:
> > 
> >    With regard to alterations to a record, SWIMA-PCs MUST detect any
> >    alterations to the contents of a record.
> > 
> > could be problematic if the record format changes to add more fields
> > and the SWIMA-PC doesn't know to track the new fields (pretty
> > speculative, admittedly; I don't know how plausible either of those
> > are)
> 
> I'm not too worried about this because change detection can be extremely coarse. (I.e., it can be based on the record's "Modification timestamp" if it is a file, or based on comparing hashes of the record.) The structure of the record should be irrelevant for that level of change detection.

Okay, I'll defer to your better familiarity.

> > There's also the prohibition against coverage gaps, which I can
> > definitely understand wanting, but seems prone to Murphy's law.
> 
> I agree this is a bigger lift, but, again, I'm not worried. It just means the SWIMA-PC needs to keep track of the records in the Evidence Collection. If it stops and restarts monitoring, it just needs to see how the Evidence Collection changes. As noted above, MODIFICATION detection can be very coarse. If it cannot figure out the delta, it just needs to change the Epoch to indicate a discontinuity and continue from there. (Noted in 3.7.1 Event Identifiers.) So, again, while this is a challenge, I think it remains reasonable.

Okay.

> --
> 
> > > > In Section 3.6
> > > >
> > > > It seems a little odd to me that we need to keep last state prior to
> > > > deletion even around, but we don't need to be able to provide the
> > > > full alteration history -- that makes an alteration event seem like
> > > > a weaker piece of data than delete+create would be, whereas intution
> > > > might think that they should have the same information content.
> > >
> > > I am confused by this comment. The requirement to retain deleted records
> > is different from the requirement to track alterations. The former is provided
> > so that SWIMA-PVs are able to get additional data about a product that has
> > been deleted, in the form of the deleted software's information record.
> > Alteration, creation, and deletion are for tracking changes to software state.
> > This needs to provide a complete history so that old state information can be
> > updated to reflect new state. In this, alteration and delete+create are, in
> > fact, of equal value. Am I misunderstanding your comment?
> > 
> > It is more likely that the misunderstanding was mine.  In that,
> > since the SWIMA-PC needs to be able to provide event history
> > including alteration events, the SWIMA-PV could request all the
> > relevant alteration events and track the state of that software
> > through the history that's retained.  My original comment would only
> > be valid if the alteration records did not contain a record of what
> > actually changed.
> 
> I think I understand your concern: You were noting that, in the case of a DELETE action, the SWIMA-PV can request the historical record to see what used to be there. However, in the case of a MODIFY event, the SWIMA-PV has no way to collect the previous iteration of the record, and thus cannot compare to determine what changed. Thus, if there was a DELETE+CREATE event, one could take the old and new records (assuming one was able to line them up) and compare, but would not be able to perform such a comparison under a MODIFICATION. Is this your concern?

Exactly.

> If so, then I do agree that there is a difference between what one can tell about the two event sequences. However, from a practical standpoint, I am not concerned about this. We do make it explicit in the specification that the old attribute cannot be collected via SWIMA, so this shouldn't be a surprise. I cannot think of any use cases where knowing the preceding state of the record is necessary - most of the uses of SWIMA I can imagine just need a way to capture the current state. If you can think of a reason that a consumer might need to know what changed in the record let me know, but I feel that simply knowing there is a revised record is sufficient for virtually all SWIMA uses.

I am thinking about some sort of compliance scenario where it
becomes relevant to know "did Employee X have a vulnerable version
of software Y installed on date Z?" to be able to confirm that their
machine was potentially compromised by a given virus, which would
change the liability situation.  Or is that not an intended use
case?

> --
> 
> Regarding the timestamp, I did some searching but I was also unable to find a standard expressed time in a more concise format. The Wilkinson draft you found didn't have a lot of detail. At this stage, I'm inclined to leave things be rather than create something unique to SWIMA (or adopt something esoteric enough that I might as well be doing so).

I can't blame you for sticking to tried-and-true.  Sorry for sending
you on the ultimately fruitless chase -- I really thought there was
something in an RFC using it.

> ---
> 
> Thanks again for the clarifications. I hope that the new draft (-04) better addresses your concerns.

It does look better.  Thanks again,

Benjamin


From nobody Thu Mar  8 06:36:55 2018
Return-Path: <cmschmidt@mitre.org>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BB4E2126CD6; Thu,  8 Mar 2018 06:36:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mitre.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 36CiTyMGWHXN; Thu,  8 Mar 2018 06:36:46 -0800 (PST)
Received: from smtpvmsrv1.mitre.org (smtpvmsrv1.mitre.org [192.52.194.136]) by ietfa.amsl.com (Postfix) with ESMTP id C251F1241F8; Thu,  8 Mar 2018 06:36:45 -0800 (PST)
Received: from smtpvmsrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id 574816C0114; Thu,  8 Mar 2018 09:36:45 -0500 (EST)
Received: from imshyb02.MITRE.ORG (unknown [129.83.29.3]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by smtpvmsrv1.mitre.org (Postfix) with ESMTPS id 4735E6C00F8; Thu,  8 Mar 2018 09:36:45 -0500 (EST)
Received: from imshyb01.MITRE.ORG (129.83.29.2) by imshyb02.MITRE.ORG (129.83.29.3) with Microsoft SMTP Server (TLS) id 15.0.1263.5; Thu, 8 Mar 2018 09:36:44 -0500
Received: from gcc01-dm2-obe.outbound.protection.outlook.com (10.140.19.249) by imshyb01.MITRE.ORG (129.83.29.2) with Microsoft SMTP Server (TLS) id 15.0.1263.5 via Frontend Transport; Thu, 8 Mar 2018 09:36:44 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mitre.onmicrosoft.com;  s=selector1-mitre-org; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=KNZ3LGBKzofcvjgeqlfj+YGkqVD/3sUQiVqc0/6yYM0=; b=ozxQstwy1m+7epQQM2A93IUiOLxpdtZQKvUiJgnn+CquO9EO6SBD3gTQizgwjE6eXPio5FGBQbgnqrDeiqbT9XD/RXA4sozDrSVKNK+yuy9Cog8uMSbgnwm8o/mGEc4nMoLm6A+mQCZQxe2e3yeU02JrhUOi2DPI2GmjZA7n6A4=
Received: from DM5PR0901MB2375.namprd09.prod.outlook.com (52.132.133.18) by DM5PR0901MB2374.namprd09.prod.outlook.com (52.132.133.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.548.13; Thu, 8 Mar 2018 14:36:42 +0000
Received: from DM5PR0901MB2375.namprd09.prod.outlook.com ([fe80::21b9:ccf6:187e:85e1]) by DM5PR0901MB2375.namprd09.prod.outlook.com ([fe80::21b9:ccf6:187e:85e1%13]) with mapi id 15.20.0548.016; Thu, 8 Mar 2018 14:36:42 +0000
From: "Schmidt, Charles M." <cmschmidt@mitre.org>
To: Benjamin Kaduk <kaduk@mit.edu>
CC: The IESG <iesg@ietf.org>, "sacm-chairs@ietf.org" <sacm-chairs@ietf.org>, "draft-ietf-sacm-nea-swima-patnc@ietf.org" <draft-ietf-sacm-nea-swima-patnc@ietf.org>, "odonoghue@isoc.org" <odonoghue@isoc.org>, "sacm@ietf.org" <sacm@ietf.org>
Thread-Topic: Benjamin Kaduk's practice ballot (No Objection) on draft-ietf-sacm-nea-swima-patnc-02: (with COMMENT)
Thread-Index: AQHTtug7GduiUNRdgEesOVv/VwYW0KPGYw0A
Date: Thu, 8 Mar 2018 14:36:42 +0000
Message-ID: <DM5PR0901MB237561F2F05627B06EE95693ABDF0@DM5PR0901MB2375.namprd09.prod.outlook.com>
References: <20180221225835.GG54688@mit.edu> <DM5PR0901MB2375263C5375E6438FA0A70BABC30@DM5PR0901MB2375.namprd09.prod.outlook.com> <20180228015121.GE50954@kduck.kaduk.org> <DM5PR0901MB2375EF1656E78C7DA3DE046FABD90@DM5PR0901MB2375.namprd09.prod.outlook.com> <20180308141732.GD27850@mit.edu>
In-Reply-To: <20180308141732.GD27850@mit.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=cmschmidt@mitre.org; 
x-originating-ip: [192.160.51.88]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM5PR0901MB2374; 7:hZhPQu3aBosiYyQBzlsxJEt46RQI/V8rtS6WJ1Gcqi9ENbhXKrDzGXlDfryboN95EaNko8tBiOZM3ihHdCGOVke5TdLo+XDiD01hSRzPI94KWwAJUuRjgnlziApbJABqN2F3sfnnSwkRfKoUwPnhT1luVC7d1DYcqvvk5RcVCu3O7j3FqkpezijMoAiwOIUUJbis8xQSvtL+AhLOvY5MAUsUv9nVqZPksiXJmQxyygmQLLnlfWP9PC8wZiBNX+lE
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: eac00a64-970f-41fa-0d35-08d5850202af
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:DM5PR0901MB2374; 
x-ms-traffictypediagnostic: DM5PR0901MB2374:
x-microsoft-antispam-prvs: <DM5PR0901MB23747BBAF18EA8FFD2013425ABDF0@DM5PR0901MB2374.namprd09.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040501)(2401047)(5005006)(8121501046)(10201501046)(3231220)(944501244)(52105095)(3002001)(93006095)(93001095)(6055026)(6041288)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(20161123564045)(20161123562045)(6072148)(201708071742011); SRVR:DM5PR0901MB2374; BCL:0; PCL:0; RULEID:; SRVR:DM5PR0901MB2374; 
x-forefront-prvs: 060503E79B
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39380400002)(396003)(376002)(346002)(39860400002)(366004)(69224002)(199004)(189003)(3660700001)(5250100002)(8936002)(81156014)(81166006)(8676002)(53936002)(9686003)(2906002)(229853002)(2950100002)(6116002)(3846002)(8666007)(6916009)(6436002)(68736007)(55016002)(2900100001)(26005)(5660300001)(186003)(316002)(99286004)(7696005)(102836004)(76176011)(59450400001)(54906003)(6506007)(93886005)(3280700002)(7736002)(305945005)(74316002)(86362001)(105586002)(478600001)(14454004)(2171002)(6246003)(66066001)(106356001)(33656002)(25786009)(4326008)(97736004); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR0901MB2374; H:DM5PR0901MB2375.namprd09.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; 
received-spf: None (protection.outlook.com: mitre.org does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 47JaZmrp83WqvFuB2/PqLWjAT7Rx130oRY1ugwWpQgGOnqPWRtsVm1WSSKrr7ncR2j2RYfTvEUktrJBSFfL2PX13jc2Zs0S3Z46g/CbtvrZaKK+83+U9sH8QjgTdHC+giDHnzHf5tRsA1hrhqjIVk5THWRQlMZFvFULkdtF7kmCXzehhNM3KkqizzzSh2B66bNWh6/X8+iw4TdJzA9jdzbMfPi5raDtg/8UVVi2aRIdscsoyPL0iRGtiq5ByXQrkuLBkVs9tIR/jcr7NEJ92hmpMQJfEqHdhjAftmD9mnwyr6P/j2dBCdhnJ8zDvs5G7dJNckFL9xXeiV5IzVuA0vw==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: eac00a64-970f-41fa-0d35-08d5850202af
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Mar 2018 14:36:42.2686 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: c620dc48-1d50-4952-8b39-df4d54d74d82
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR0901MB2374
X-OriginatorOrg: mitre.org
X-MITRE: 8GQsMWxq66rxk57w
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/y_x5AATdwPccVQ7vM17XfFa3Vfs>
Subject: Re: [sacm] Benjamin Kaduk's practice ballot (No Objection) on draft-ietf-sacm-nea-swima-patnc-02: (with COMMENT)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 08 Mar 2018 14:36:48 -0000

Hi Benjamin,

Thanks for following up. A few quick responses to close the loop on these i=
tems.

> > I think I understand your concern: You were noting that, in the case of=
 a
> DELETE action, the SWIMA-PV can request the historical record to see what
> used to be there. However, in the case of a MODIFY event, the SWIMA-PV
> has no way to collect the previous iteration of the record, and thus cann=
ot
> compare to determine what changed. Thus, if there was a DELETE+CREATE
> event, one could take the old and new records (assuming one was able to
> line them up) and compare, but would not be able to perform such a
> comparison under a MODIFICATION. Is this your concern?
>=20
> Exactly.
>=20
> > If so, then I do agree that there is a difference between what one can =
tell
> about the two event sequences. However, from a practical standpoint, I am
> not concerned about this. We do make it explicit in the specification tha=
t the
> old attribute cannot be collected via SWIMA, so this shouldn't be a surpr=
ise. I
> cannot think of any use cases where knowing the preceding state of the
> record is necessary - most of the uses of SWIMA I can imagine just need a
> way to capture the current state. If you can think of a reason that a con=
sumer
> might need to know what changed in the record let me know, but I feel tha=
t
> simply knowing there is a revised record is sufficient for virtually all =
SWIMA
> uses.
>=20
> I am thinking about some sort of compliance scenario where it
> becomes relevant to know "did Employee X have a vulnerable version
> of software Y installed on date Z?" to be able to confirm that their
> machine was potentially compromised by a given virus, which would
> change the liability situation.  Or is that not an intended use
> case?

What you describe is more of a SACM use case than a SWIMA use case. SACM en=
visions that there will be a persistent repository, fed by inputs such as S=
WIMA, that will retain historical information for analytics. SWIMA supports=
 this by making sure the SWIMA-PV understands current endpoint state, which=
 can then be archived in that persistent repository. Even the event history=
 that SWIMA provides is generally described as a way to convey current stat=
e to a SWIMA-PV efficiently, by describing how state has changed from some =
initial inventory. The SACM vision is more aligned with there being a singl=
e repository of historical information rather than performing historical an=
alysis on endpoints individually (and thus forcing endpoints to retain this=
 history for as long as one might be interested in those analytics).

I'll also note that, since event queries are based on EID rather than times=
tamp, even if SWIMA retained modified records, it is not optimized for the =
historical querying you describe. One would need to review events to find a=
n EIDs that roughly correlated to the bounds of the time period of interest=
 and then query by those EIDs. Certainly possible, but not optimal.

So the bottom line is that SWIMA isn't really designed to directly support =
historical querying of the type you describe.

> > Regarding the timestamp, I did some searching but I was also unable to =
find
> a standard expressed time in a more concise format. The Wilkinson draft y=
ou
> found didn't have a lot of detail. At this stage, I'm inclined to leave t=
hings be
> rather than create something unique to SWIMA (or adopt something esoteric
> enough that I might as well be doing so).
>=20
> I can't blame you for sticking to tried-and-true.  Sorry for sending
> you on the ultimately fruitless chase -- I really thought there was
> something in an RFC using it.

No worries - it would have been great if I was able to find something that =
made the timestamps more efficient. Maybe that will be my next RFC. :)

Thanks for all your help on this document.

Charles


From nobody Fri Mar  9 12:51:07 2018
Return-Path: <kathleen.moriarty.ietf@gmail.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 62EA9124F57; Fri,  9 Mar 2018 12:51:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qUxOKXS69ZJM; Fri,  9 Mar 2018 12:50:57 -0800 (PST)
Received: from mail-io0-x233.google.com (mail-io0-x233.google.com [IPv6:2607:f8b0:4001:c06::233]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 83F0E120047; Fri,  9 Mar 2018 12:50:57 -0800 (PST)
Received: by mail-io0-x233.google.com with SMTP id e30so4951511ioc.3; Fri, 09 Mar 2018 12:50:57 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=LgCNnL0O2XO/OivEceYdal8ZiVoMF9CqSPp5VW9e2/4=; b=F1/Ap2g1JRt6p2wtRdYCJLa4V5O9z8I5GN4tPRUUdskR0Z++4vMKNc+PVh9tcLY4PI 4wNVQjfVx7ci+a0AJxSBph6xbH7XkoDdeAbWzfkKN4GAvCOBn1+R+v00DxuIVUetc3L8 kwsv8ZBz2mr/DoHXHe7fJFla1JYEUSI0cWsxjAdh5k8btHlc3+042nj/P0T2Vly0fHN4 nM/gRV/kVNbJYLoQGk5u9WEz+ivdLx9+CEC6e8AdgjQ2I5vqtzvamZQr4/ABEYhZZEux NZQbbXS1mi6qdWjI3wQ31WoA1mswnWGrxJk9l8wAD0/q/0Si7ks/FPMnXy9fvIhKli/X iMag==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=LgCNnL0O2XO/OivEceYdal8ZiVoMF9CqSPp5VW9e2/4=; b=N7lFSM7V2v1y0CREx4TKraNJcm53RP/BZbUl6j6yX1kUNzlTsxZUdkcD4Vht23CikR 87MYn7S6Y9bqD2HveQaBstIb7lkU6f+k9DJzpo0Ftdc7IzawKzXjjM74GsyGEpMC1gxC 0arheM0WSrnDq1tZHjbYC52HawYvoj1+KqHY1eAeFBsvyxfJuVjpy9N5qJlz/phZJmQa v8Hg5/RWW+qS1IVIhAO8XKC1a7dUK0TOkdEOPrsP3toj8jHBt0h0mAlcEPmCK0ZcZrS1 l9glMWUSuhWyXSJDiGHQHzBH7s5fYpIovGoXYz2pYj9i2FmIEjcGkd/gJ9srtT3zS2xP f2rw==
X-Gm-Message-State: APf1xPD8lIVGhSXx5FszYx+ExEjgtRlLWFRPX7fT3dZVe2XIo0eiHxkH kAxlVB2zoGCPQOQR8N43iJOfSSMtbvMvswn1DoY=
X-Google-Smtp-Source: AG47ELu3mGrJYEVq5quvffvuBpeoLyvImrlaQe0qHivKRXuSxmhtfAnGKP+eixy2A+VDILg2hSWUkiP5ilqer+C0T/U=
X-Received: by 10.107.82.8 with SMTP id g8mr36255512iob.163.1520628656798; Fri, 09 Mar 2018 12:50:56 -0800 (PST)
MIME-Version: 1.0
Received: by 10.192.156.137 with HTTP; Fri, 9 Mar 2018 12:50:16 -0800 (PST)
In-Reply-To: <DM5PR0901MB23759238C98C5F9E82AB5D7CABD90@DM5PR0901MB2375.namprd09.prod.outlook.com>
References: <151926897179.21101.1205735756502467820.idtracker@ietfa.amsl.com> <DM5PR0901MB2375564B76246A1DA5FCE4A7ABC30@DM5PR0901MB2375.namprd09.prod.outlook.com> <080CB857-150E-450C-B685-8A10FA0D3984@nostrum.com> <DM5PR0901MB23759238C98C5F9E82AB5D7CABD90@DM5PR0901MB2375.namprd09.prod.outlook.com>
From: Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
Date: Fri, 9 Mar 2018 15:50:16 -0500
Message-ID: <CAHbuEH7MvQFii7ceYkA7LN8bCH795zb0nWCJrctk3hF5DSVxLw@mail.gmail.com>
To: "Schmidt, Charles M." <cmschmidt@mitre.org>
Cc: Ben Campbell <ben@nostrum.com>, "draft-ietf-sacm-nea-swima-patnc@ietf.org" <draft-ietf-sacm-nea-swima-patnc@ietf.org>,  "sacm-chairs@ietf.org" <sacm-chairs@ietf.org>, The IESG <iesg@ietf.org>,  "Karen O'Donoghue" <odonoghue@isoc.org>, "sacm@ietf.org" <sacm@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/TEwfJmnCAiDDGl0ut11ryHmLHOE>
Subject: Re: [sacm] Ben Campbell's Discuss on draft-ietf-sacm-nea-swima-patnc-02: (with DISCUSS and COMMENT)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Mar 2018 20:51:00 -0000

Hi Charles,

Thanks for this update.  I believe Ben's last comment is addressed
with your text and it reads well to me.  Ben - are you good with this
text? I will assume so if I don't hear back soon.

Thanks,
Kathleen

On Mon, Mar 5, 2018 at 8:11 PM, Schmidt, Charles M. <cmschmidt@mitre.org> w=
rote:
> Hi Ben,
>
> Thank you for the follow-up. I made some additional modifications (-04 dr=
aft) that I hope address your remaining comments.
>
> Regarding your nit, I moved the Relationship to Other Specifications befo=
re the Security Considerations. The last sections are now the three you not=
e.
>
> Regarding your comment on 2.4:
>
>> >> =C2=A72.4: This seems to assume there is never a need to hide informa=
tion
>> from
>> >> intermediaries. Is that the intent? (Or maybe there aren't any
>> >> intermediaries?)
>> >
>> > This is not the intent. NEA has multiple parts and the intent is to cl=
arify that
>> the SWIMA part isn't the part dealing with data confidentiality. The por=
tion
>> that handles confidentiality is the PT layer of the NEA architecture. (P=
T-TLS
>> and PT-EAP) All I'm trying to do is emphasize that, if confidentiality i=
s an issue,
>> make sure your NEA architecture is set up to support that.
>>
>> I think what is confusing me is the =E2=80=9Ctitle=E2=80=9D of the non-r=
equirement is =E2=80=9CEnd to
>> End confidentiality=E2=80=9D. I admit to not knowing the sacm work well =
enought to
>> know what the =E2=80=9Cends=E2=80=9D are, but am I correct to assume tha=
t PT-TLS, like most
>> uses of TLS, is hop-by-hop? Does the data every cross more than one hop?=
 Is
>> the answer the dame for PT-EAP?
>
> Re-reading this section, I agree that the section was confusing. I rename=
d the section to "Non-SWIMA Requirements" (and renamed the preceding sectio=
n to "SWIMA Requirements"). Hopefully this clarifies that the specification=
 is not talking about what is and is not required, but simply which require=
ments need to be addressed by SWIMA and which requirements need to be addre=
ssed by other standards.
>
> I also changed the text as follows:
>
>    There are certain capabilities that users of the SWIMA specification
>    might require but which are beyond the scope of SWIMA itself and need
>    to be addressed by other standards.  This list is not exhaustive.
>
>    End to End Confidentiality:  The SWIMA specification does not define
>       a mechanism for confidentiality, nor is confidentiality
>       automatically provided by using the PA-TNC interface.  In the NEA
>       architecture, confidentiality is generally provided by the
>       underlying transport protocols, such as the PT Binding to TLS
>       [RFC6876] or PT-EAP Posture Transport for Tunneled EAP Methods
>       [RFC7171] - see Section 7 for more information on related
>       standards.  The information conveyed by SWIMA is often sensitive
>       in nature for both security (Section 8) and privacy (Section 9)
>       reasons.  Those who implement SWIMA need to ensure that
>       appropriate NEA transport mechanisms are employed to meet
>       confidentiality requirements.
>
> Hopefully that makes things clearer. To more directly answer your questio=
n, PT-TLS is just TLS with some minor added constraints to fit with the NEA=
 architecture. Likewise, PT-EAP is basically just EAP. SWIMA should be agno=
stic as to whether or not there are hops in the transmission and delegate a=
ll responsibility for maintaining confidentiality across any hops to the PT=
 protocol in question. Does this help?
>
> Thanks again for the clarifications. Hopefully the new draft (-04) will a=
ddress those remaining concerns.
>
> Charles
>
>> -----Original Message-----
>> From: sacm [mailto:sacm-bounces@ietf.org] On Behalf Of Ben Campbell
>> Sent: Thursday, March 01, 2018 9:19 PM
>> To: Schmidt, Charles M. <cmschmidt@mitre.org>
>> Cc: sacm-chairs@ietf.org; Karen O'Donoghue <odonoghue@isoc.org>; The
>> IESG <iesg@ietf.org>; sacm@ietf.org; draft-ietf-sacm-nea-swima-
>> patnc@ietf.org
>> Subject: Re: [sacm] Ben Campbell's Discuss on draft-ietf-sacm-nea-swima-
>> patnc-02: (with DISCUSS and COMMENT)
>>
>>
>>
>> > On Feb 24, 2018, at 1:01 AM, Schmidt, Charles M. <cmschmidt@mitre.org>
>> wrote:
>> >
>> > Hello,
>> >
>> > Thanks a bunch for your feedback. In general I agree with your comment=
s
>> and made changes to address them. Some quick clarifications:
>> >
>> >> =C2=A72.4: This seems to assume there is never a need to hide informa=
tion
>> from
>> >> intermediaries. Is that the intent? (Or maybe there aren't any
>> >> intermediaries?)
>> >
>> > This is not the intent. NEA has multiple parts and the intent is to cl=
arify that
>> the SWIMA part isn't the part dealing with data confidentiality. The por=
tion
>> that handles confidentiality is the PT layer of the NEA architecture. (P=
T-TLS
>> and PT-EAP) All I'm trying to do is emphasize that, if confidentiality i=
s an issue,
>> make sure your NEA architecture is set up to support that.
>>
>> I think what is confusing me is the =E2=80=9Ctitle=E2=80=9D of the non-r=
equirement is =E2=80=9CEnd to
>> End confidentiality=E2=80=9D. I admit to not knowing the sacm work well =
enought to
>> know what the =E2=80=9Cends=E2=80=9D are, but am I correct to assume tha=
t PT-TLS, like most
>> uses of TLS, is hop-by-hop? Does the data every cross more than one hop?=
 Is
>> the answer the dame for PT-EAP?
>>
>>
>>
>> >
>> >> =C2=A73.4.3,
>> >> -- first paragraph: What is the expected scope of uniqueness for reco=
rd
>> >> identifiers? -- In the sentence "The Record Identifier SHOULD remain
>> >> unchanged
>> >> if that record is modified.", why is the SHOULD not a MUST? What woul=
d
>> >> happen
>> >> if the identifier did change?
>> >
>> > It is SHOULD rather than MUST because, under some tracking conditions =
it
>> might not be possible to distinguish between a record being modified and=
 a
>> record being deleted and a new record being created. Will add clarifying=
 text
>> to this effect. If the system thinks that a modification is actually a
>> delete/create action, it would be treated as such with a new record iden=
tifier
>> being assigned to the "created" record.
>> >
>>
>> Okay; I think the mentioned clarifying text would help.
>>
>>
>> >> =C2=A77.1: " Some tools might not be designed to update records in th=
e
>> Software
>> >> Inventory Evidence Collection in real time,..." Wasn't there a normat=
ive
>> >> requirement that they be capable of this?
>> >
>> > A subtle difference: The SWIMA-PC MUST detect changes to the Software
>> Inventory Evidence Collection in near real time, but the data sources mi=
ght
>> not update the Software Inventory Evidence Collection in real time. I
>> reworded to clarify the difference between the SWIMA-PC reading the
>> Evidence Collection and the tool updating the Evidence Collection.
>>
>> Okay.
>>
>> >
>> >> =C2=A79: Nit: is there are reasons to violate the convention that IAN=
A, security,
>> >> and privacy considerations are the last substantive sections in in th=
e body
>> of
>> >> an RFC?
>> >
>> > I'm happy to reorder these - a quick random sample of RFCs seems to
>> provide a number of different orderings. I just followed the PA-TNC spec=
,
>> since I had that open most. Just let me know what the expected order is.
>>
>> Typically they are the last three =E2=80=9Csubstantive=E2=80=9D sections=
 in the main body of an
>> RFC, not counting any appendices or =E2=80=9Cacknowledgements=E2=80=9D t=
ype sections. I
>> don=E2=80=99t think we are consistent in the order among those three.
>>
>> Thanks!
>>
>> Ben.
>>
>> >
>> > Thanks a bunch,
>> > Charles
>> >
>> >> -----Original Message-----
>> >> From: Ben Campbell [mailto:ben@nostrum.com]
>> >> Sent: Wednesday, February 21, 2018 9:10 PM
>> >> To: The IESG <iesg@ietf.org>
>> >> Cc: draft-ietf-sacm-nea-swima-patnc@ietf.org; sacm@ietf.org; Karen
>> >> O'Donoghue <odonoghue@isoc.org>; sacm-chairs@ietf.org;
>> >> odonoghue@isoc.org; sacm@ietf.org
>> >> Subject: Ben Campbell's Discuss on draft-ietf-sacm-nea-swima-patnc-02=
:
>> >> (with DISCUSS and COMMENT)
>> >>
>> >> Ben Campbell has entered the following ballot position for
>> >> draft-ietf-sacm-nea-swima-patnc-02: Discuss
>> >>
>> >> When responding, please keep the subject line intact and reply to all
>> >> email addresses included in the To and CC lines. (Feel free to cut th=
is
>> >> introductory paragraph, however.)
>> >>
>> >>
>> >> Please refer to https://www.ietf.org/iesg/statement/discuss-criteria.=
html
>> >> for more information about IESG DISCUSS and COMMENT positions.
>> >>
>> >>
>> >> The document, along with other ballot positions, can be found here:
>> >> https://datatracker.ietf.org/doc/draft-ietf-sacm-nea-swima-patnc/
>> >>
>> >>
>> >>
>> >> ---------------------------------------------------------------------=
-
>> >> DISCUSS:
>> >> ---------------------------------------------------------------------=
-
>> >>
>> >> (This is related to one of Ekr's comments, but I don't think it's qui=
te the
>> >> same.)
>> >>
>> >> In the first paragraph of =C2=A77.2, the conclusions seem to be based=
 on the
>> >> following sentence:
>> >>
>> >> "This is generally not considered to be problematic, as
>> >>   those with access to the endpoint can usually learn of everything
>> >>   disclosed by that endpoint=E2=80=99s records simply by inspecting o=
ther parts
>> >>   of the endpoint."
>> >>
>> >> This doesn=E2=80=99t seem like a reasonable assumption. Multiuser end=
points may
>> >> well
>> >> have access controls that prevent a given user from seeing all softwa=
re
>> >> packages installed on the system. This leads to the conclusion that t=
he
>> >> records
>> >> on the endpoint are not sensitive. I do not think this document shoul=
d
>> draw
>> >> that conclusion. Even if this were provably true for all existing sys=
tems,
>> such
>> >> an assumption could be problematic for future systems.
>> >>
>> >>
>> >> ---------------------------------------------------------------------=
-
>> >> COMMENT:
>> >> ---------------------------------------------------------------------=
-
>> >>
>> >> Substantive Comments:
>> >>
>> >> =C2=A72.4: This seems to assume there is never a need to hide informa=
tion
>> from
>> >> intermediaries. Is that the intent? (Or maybe there aren't any
>> >> intermediaries?)
>> >>
>> >> =C2=A73.4.3,
>> >> -- first paragraph: What is the expected scope of uniqueness for reco=
rd
>> >> identifiers? -- In the sentence "The Record Identifier SHOULD remain
>> >> unchanged
>> >> if that record is modified.", why is the SHOULD not a MUST? What woul=
d
>> >> happen
>> >> if the identifier did change?
>> >>
>> >> =C2=A73.4.4:
>> >>
>> >> -- "However, if that directory is shared by other software products, =
the
>> >> "location" SHOULD be the location of the primary executable
>> >>   associated with the software product."
>> >> I'm confused by the the condition, since sharing a directory with oth=
er
>> >> products doesn't seem to introduce the ambiguity that the rest of the
>> >> sentence
>> >> assumes. Perhaps this was meant to be about situations where a
>> software
>> >> package
>> >> is installed across multiple directories?
>> >>
>> >> -- "Even a probable location for a software product is preferable to =
using a
>> >> zero-length locator." This could use elaboration; do you expect the
>> collector
>> >> to guess?
>> >>
>> >> =C2=A77.1: " Some tools might not be designed to update records in th=
e
>> Software
>> >> Inventory Evidence Collection in real time,..." Wasn't there a normat=
ive
>> >> requirement that they be capable of this?
>> >>
>> >> =C2=A78,
>> >> -- 2nd paragraph: It=E2=80=99s worth mentioning that in some contexts=
 this sort of
>> >> information could expose the user to severe personal risk, including =
the
>> risk
>> >> of death. -- Last paragraph: "For this reason, privacy safeguards mig=
ht be
>> >> necessary for collected inventory information." Can this be stated mo=
re
>> >> strongly than "might be necessary"?
>> >>
>> >> Editorial Comments and Nits:
>> >>
>> >> =C2=A73.8.5, first paragraph: "As noted in Section 3.6 SWIMA-PCs MUST=
 ..."
>> >> Please reserve 2119 keywords for the authoritative statement of a
>> >> requirement;
>> >> that is, please do not use them to refer to requirements defined
>> elsewhere.
>> >> (Note that this pattern occurs multiple times in the draft.)
>> >>
>> >> =C2=A79: Nit: is there are reasons to violate the convention that IAN=
A, security,
>> >> and privacy considerations are the last substantive sections in in th=
e body
>> of
>> >> an RFC?
>> >>
>> >>
>> >
>



--=20

Best regards,
Kathleen


From nobody Fri Mar  9 14:21:56 2018
Return-Path: <ben@nostrum.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 43ED61270A0; Fri,  9 Mar 2018 14:21:49 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.889
X-Spam-Level: 
X-Spam-Status: No, score=-1.889 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, T_RP_MATCHES_RCVD=-0.01, T_SPF_HELO_PERMERROR=0.01, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d9jB3UpRYe4w; Fri,  9 Mar 2018 14:21:46 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 622E412420B; Fri,  9 Mar 2018 14:21:46 -0800 (PST)
Received: from [10.0.1.10] (cpe-66-25-7-22.tx.res.rr.com [66.25.7.22]) (authenticated bits=0) by nostrum.com (8.15.2/8.15.2) with ESMTPSA id w29MLifW014239 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Fri, 9 Mar 2018 16:21:45 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-66-25-7-22.tx.res.rr.com [66.25.7.22] claimed to be [10.0.1.10]
From: Ben Campbell <ben@nostrum.com>
Message-Id: <4D1185F9-AE0F-4CDB-AEE9-2FD7248977AE@nostrum.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_2D734FAE-CDAB-4916-B168-A358AC8A9E65"; protocol="application/pgp-signature"; micalg=pgp-sha512
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
Date: Fri, 9 Mar 2018 16:21:43 -0600
In-Reply-To: <DM5PR0901MB23759238C98C5F9E82AB5D7CABD90@DM5PR0901MB2375.namprd09.prod.outlook.com>
Cc: "sacm-chairs@ietf.org" <sacm-chairs@ietf.org>, "Karen O'Donoghue" <odonoghue@isoc.org>, The IESG <iesg@ietf.org>, "sacm@ietf.org" <sacm@ietf.org>, "draft-ietf-sacm-nea-swima-patnc@ietf.org" <draft-ietf-sacm-nea-swima-patnc@ietf.org>
To: "Schmidt, Charles M." <cmschmidt@mitre.org>
References: <151926897179.21101.1205735756502467820.idtracker@ietfa.amsl.com> <DM5PR0901MB2375564B76246A1DA5FCE4A7ABC30@DM5PR0901MB2375.namprd09.prod.outlook.com> <080CB857-150E-450C-B685-8A10FA0D3984@nostrum.com> <DM5PR0901MB23759238C98C5F9E82AB5D7CABD90@DM5PR0901MB2375.namprd09.prod.outlook.com>
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/FeUwYazUPcmoLs6506pXyYz8-04>
Subject: Re: [sacm] Ben Campbell's Discuss on draft-ietf-sacm-nea-swima-patnc-02: (with DISCUSS and COMMENT)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Mar 2018 22:21:49 -0000

--Apple-Mail=_2D734FAE-CDAB-4916-B168-A358AC8A9E65
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Thanks for the response. I still have a point of confusion, inline. =
Also, keep in mind that I have cleared my DISCUSS; this is a =
non-blocking comment and you are welcome to handle it however you =
please.

Ben.

> On Mar 5, 2018, at 7:11 PM, Schmidt, Charles M. <cmschmidt@mitre.org> =
wrote:
>=20
> Hi Ben,
>=20
> Thank you for the follow-up. I made some additional modifications (-04 =
draft) that I hope address your remaining comments.
>=20
> Regarding your nit, I moved the Relationship to Other Specifications =
before the Security Considerations. The last sections are now the three =
you note.
>=20
> Regarding your comment on 2.4:
>=20
>>>> =C2=A72.4: This seems to assume there is never a need to hide =
information
>> from
>>>> intermediaries. Is that the intent? (Or maybe there aren't any
>>>> intermediaries?)
>>>=20
>>> This is not the intent. NEA has multiple parts and the intent is to =
clarify that
>> the SWIMA part isn't the part dealing with data confidentiality. The =
portion
>> that handles confidentiality is the PT layer of the NEA architecture. =
(PT-TLS
>> and PT-EAP) All I'm trying to do is emphasize that, if =
confidentiality is an issue,
>> make sure your NEA architecture is set up to support that.
>>=20
>> I think what is confusing me is the =E2=80=9Ctitle=E2=80=9D of the =
non-requirement is =E2=80=9CEnd to
>> End confidentiality=E2=80=9D. I admit to not knowing the sacm work =
well enought to
>> know what the =E2=80=9Cends=E2=80=9D are, but am I correct to assume =
that PT-TLS, like most
>> uses of TLS, is hop-by-hop? Does the data every cross more than one =
hop? Is
>> the answer the dame for PT-EAP?
>=20
> Re-reading this section, I agree that the section was confusing. I =
renamed the section to "Non-SWIMA Requirements" (and renamed the =
preceding section to "SWIMA Requirements"). Hopefully this clarifies =
that the specification is not talking about what is and is not required, =
but simply which requirements need to be addressed by SWIMA and which =
requirements need to be addressed by other standards.
>=20
> I also changed the text as follows:
>=20
>   There are certain capabilities that users of the SWIMA specification
>   might require but which are beyond the scope of SWIMA itself and =
need
>   to be addressed by other standards.  This list is not exhaustive.
>=20
>   End to End Confidentiality:  The SWIMA specification does not define
>      a mechanism for confidentiality, nor is confidentiality
>      automatically provided by using the PA-TNC interface.  In the NEA
>      architecture, confidentiality is generally provided by the
>      underlying transport protocols, such as the PT Binding to TLS
>      [RFC6876] or PT-EAP Posture Transport for Tunneled EAP Methods
>      [RFC7171] - see Section 7 for more information on related
>      standards.  The information conveyed by SWIMA is often sensitive
>      in nature for both security (Section 8) and privacy (Section 9)
>      reasons.  Those who implement SWIMA need to ensure that
>      appropriate NEA transport mechanisms are employed to meet
>      confidentiality requirements.
>=20
> Hopefully that makes things clearer. To more directly answer your =
question, PT-TLS is just TLS with some minor added constraints to fit =
with the NEA architecture. Likewise, PT-EAP is basically just EAP. SWIMA =
should be agnostic as to whether or not there are hops in the =
transmission and delegate all responsibility for maintaining =
confidentiality across any hops to the PT protocol in question. Does =
this help?

I=E2=80=99m still a bit confused; let me try to come at it from another =
angle:

The paragraph is labeled =E2=80=9CEnd-to-End Confidentiality=E2=80=9D.  =
The text delegates this to transport protocol, and gives PT-TLS and =
PT-EAP as examples. In the specific case of TLS: TLS does not normally =
offer =E2=80=9Cend-to-end=E2=80=9D confidentiality, rather it=E2=80=99s =
hop-by-hop. If there are intermediaries, TLS does not prevent them from =
seeing the data.  Now, there are exceptions (e.g. HTTPS proxies). And of =
course, if there are no intermediaries, then hop-by-hop becomes a =
trivial case of end-to-end.

So I guess what I am asking is why TLS is listed as an example transport =
in a paragraph about end-to-end confidentiality? Perhaps the paragraph =
is just about confidentiality in general? Or there are other aspects of =
the architecture that make TLS effectively end-to-end?



>=20
> Thanks again for the clarifications. Hopefully the new draft (-04) =
will address those remaining concerns.
>=20
> Charles
>=20
>> -----Original Message-----
>> From: sacm [mailto:sacm-bounces@ietf.org] On Behalf Of Ben Campbell
>> Sent: Thursday, March 01, 2018 9:19 PM
>> To: Schmidt, Charles M. <cmschmidt@mitre.org>
>> Cc: sacm-chairs@ietf.org; Karen O'Donoghue <odonoghue@isoc.org>; The
>> IESG <iesg@ietf.org>; sacm@ietf.org; draft-ietf-sacm-nea-swima-
>> patnc@ietf.org
>> Subject: Re: [sacm] Ben Campbell's Discuss on =
draft-ietf-sacm-nea-swima-
>> patnc-02: (with DISCUSS and COMMENT)
>>=20
>>=20
>>=20
>>> On Feb 24, 2018, at 1:01 AM, Schmidt, Charles M. =
<cmschmidt@mitre.org>
>> wrote:
>>>=20
>>> Hello,
>>>=20
>>> Thanks a bunch for your feedback. In general I agree with your =
comments
>> and made changes to address them. Some quick clarifications:
>>>=20
>>>> =C2=A72.4: This seems to assume there is never a need to hide =
information
>> from
>>>> intermediaries. Is that the intent? (Or maybe there aren't any
>>>> intermediaries?)
>>>=20
>>> This is not the intent. NEA has multiple parts and the intent is to =
clarify that
>> the SWIMA part isn't the part dealing with data confidentiality. The =
portion
>> that handles confidentiality is the PT layer of the NEA architecture. =
(PT-TLS
>> and PT-EAP) All I'm trying to do is emphasize that, if =
confidentiality is an issue,
>> make sure your NEA architecture is set up to support that.
>>=20
>> I think what is confusing me is the =E2=80=9Ctitle=E2=80=9D of the =
non-requirement is =E2=80=9CEnd to
>> End confidentiality=E2=80=9D. I admit to not knowing the sacm work =
well enought to
>> know what the =E2=80=9Cends=E2=80=9D are, but am I correct to assume =
that PT-TLS, like most
>> uses of TLS, is hop-by-hop? Does the data every cross more than one =
hop? Is
>> the answer the dame for PT-EAP?
>>=20
>>=20
>>=20
>>>=20
>>>> =C2=A73.4.3,
>>>> -- first paragraph: What is the expected scope of uniqueness for =
record
>>>> identifiers? -- In the sentence "The Record Identifier SHOULD =
remain
>>>> unchanged
>>>> if that record is modified.", why is the SHOULD not a MUST? What =
would
>>>> happen
>>>> if the identifier did change?
>>>=20
>>> It is SHOULD rather than MUST because, under some tracking =
conditions it
>> might not be possible to distinguish between a record being modified =
and a
>> record being deleted and a new record being created. Will add =
clarifying text
>> to this effect. If the system thinks that a modification is actually =
a
>> delete/create action, it would be treated as such with a new record =
identifier
>> being assigned to the "created" record.
>>>=20
>>=20
>> Okay; I think the mentioned clarifying text would help.
>>=20
>>=20
>>>> =C2=A77.1: " Some tools might not be designed to update records in =
the
>> Software
>>>> Inventory Evidence Collection in real time,..." Wasn't there a =
normative
>>>> requirement that they be capable of this?
>>>=20
>>> A subtle difference: The SWIMA-PC MUST detect changes to the =
Software
>> Inventory Evidence Collection in near real time, but the data sources =
might
>> not update the Software Inventory Evidence Collection in real time. I
>> reworded to clarify the difference between the SWIMA-PC reading the
>> Evidence Collection and the tool updating the Evidence Collection.
>>=20
>> Okay.
>>=20
>>>=20
>>>> =C2=A79: Nit: is there are reasons to violate the convention that =
IANA, security,
>>>> and privacy considerations are the last substantive sections in in =
the body
>> of
>>>> an RFC?
>>>=20
>>> I'm happy to reorder these - a quick random sample of RFCs seems to
>> provide a number of different orderings. I just followed the PA-TNC =
spec,
>> since I had that open most. Just let me know what the expected order =
is.
>>=20
>> Typically they are the last three =E2=80=9Csubstantive=E2=80=9D =
sections in the main body of an
>> RFC, not counting any appendices or =E2=80=9Cacknowledgements=E2=80=9D =
type sections. I
>> don=E2=80=99t think we are consistent in the order among those three.
>>=20
>> Thanks!
>>=20
>> Ben.
>>=20
>>>=20
>>> Thanks a bunch,
>>> Charles
>>>=20
>>>> -----Original Message-----
>>>> From: Ben Campbell [mailto:ben@nostrum.com]
>>>> Sent: Wednesday, February 21, 2018 9:10 PM
>>>> To: The IESG <iesg@ietf.org>
>>>> Cc: draft-ietf-sacm-nea-swima-patnc@ietf.org; sacm@ietf.org; Karen
>>>> O'Donoghue <odonoghue@isoc.org>; sacm-chairs@ietf.org;
>>>> odonoghue@isoc.org; sacm@ietf.org
>>>> Subject: Ben Campbell's Discuss on =
draft-ietf-sacm-nea-swima-patnc-02:
>>>> (with DISCUSS and COMMENT)
>>>>=20
>>>> Ben Campbell has entered the following ballot position for
>>>> draft-ietf-sacm-nea-swima-patnc-02: Discuss
>>>>=20
>>>> When responding, please keep the subject line intact and reply to =
all
>>>> email addresses included in the To and CC lines. (Feel free to cut =
this
>>>> introductory paragraph, however.)
>>>>=20
>>>>=20
>>>> Please refer to =
https://www.ietf.org/iesg/statement/discuss-criteria.html
>>>> for more information about IESG DISCUSS and COMMENT positions.
>>>>=20
>>>>=20
>>>> The document, along with other ballot positions, can be found here:
>>>> https://datatracker.ietf.org/doc/draft-ietf-sacm-nea-swima-patnc/
>>>>=20
>>>>=20
>>>>=20
>>>> =
----------------------------------------------------------------------
>>>> DISCUSS:
>>>> =
----------------------------------------------------------------------
>>>>=20
>>>> (This is related to one of Ekr's comments, but I don't think it's =
quite the
>>>> same.)
>>>>=20
>>>> In the first paragraph of =C2=A77.2, the conclusions seem to be =
based on the
>>>> following sentence:
>>>>=20
>>>> "This is generally not considered to be problematic, as
>>>>  those with access to the endpoint can usually learn of everything
>>>>  disclosed by that endpoint=E2=80=99s records simply by inspecting =
other parts
>>>>  of the endpoint."
>>>>=20
>>>> This doesn=E2=80=99t seem like a reasonable assumption. Multiuser =
endpoints may
>>>> well
>>>> have access controls that prevent a given user from seeing all =
software
>>>> packages installed on the system. This leads to the conclusion that =
the
>>>> records
>>>> on the endpoint are not sensitive. I do not think this document =
should
>> draw
>>>> that conclusion. Even if this were provably true for all existing =
systems,
>> such
>>>> an assumption could be problematic for future systems.
>>>>=20
>>>>=20
>>>> =
----------------------------------------------------------------------
>>>> COMMENT:
>>>> =
----------------------------------------------------------------------
>>>>=20
>>>> Substantive Comments:
>>>>=20
>>>> =C2=A72.4: This seems to assume there is never a need to hide =
information
>> from
>>>> intermediaries. Is that the intent? (Or maybe there aren't any
>>>> intermediaries?)
>>>>=20
>>>> =C2=A73.4.3,
>>>> -- first paragraph: What is the expected scope of uniqueness for =
record
>>>> identifiers? -- In the sentence "The Record Identifier SHOULD =
remain
>>>> unchanged
>>>> if that record is modified.", why is the SHOULD not a MUST? What =
would
>>>> happen
>>>> if the identifier did change?
>>>>=20
>>>> =C2=A73.4.4:
>>>>=20
>>>> -- "However, if that directory is shared by other software =
products, the
>>>> "location" SHOULD be the location of the primary executable
>>>>  associated with the software product."
>>>> I'm confused by the the condition, since sharing a directory with =
other
>>>> products doesn't seem to introduce the ambiguity that the rest of =
the
>>>> sentence
>>>> assumes. Perhaps this was meant to be about situations where a
>> software
>>>> package
>>>> is installed across multiple directories?
>>>>=20
>>>> -- "Even a probable location for a software product is preferable =
to using a
>>>> zero-length locator." This could use elaboration; do you expect the
>> collector
>>>> to guess?
>>>>=20
>>>> =C2=A77.1: " Some tools might not be designed to update records in =
the
>> Software
>>>> Inventory Evidence Collection in real time,..." Wasn't there a =
normative
>>>> requirement that they be capable of this?
>>>>=20
>>>> =C2=A78,
>>>> -- 2nd paragraph: It=E2=80=99s worth mentioning that in some =
contexts this sort of
>>>> information could expose the user to severe personal risk, =
including the
>> risk
>>>> of death. -- Last paragraph: "For this reason, privacy safeguards =
might be
>>>> necessary for collected inventory information." Can this be stated =
more
>>>> strongly than "might be necessary"?
>>>>=20
>>>> Editorial Comments and Nits:
>>>>=20
>>>> =C2=A73.8.5, first paragraph: "As noted in Section 3.6 SWIMA-PCs =
MUST ..."
>>>> Please reserve 2119 keywords for the authoritative statement of a
>>>> requirement;
>>>> that is, please do not use them to refer to requirements defined
>> elsewhere.
>>>> (Note that this pattern occurs multiple times in the draft.)
>>>>=20
>>>> =C2=A79: Nit: is there are reasons to violate the convention that =
IANA, security,
>>>> and privacy considerations are the last substantive sections in in =
the body
>> of
>>>> an RFC?
>>>>=20
>>>>=20
>>>=20
>=20


--Apple-Mail=_2D734FAE-CDAB-4916-B168-A358AC8A9E65
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
	filename=signature.asc
Content-Type: application/pgp-signature;
	name=signature.asc
Content-Description: Message signed with OpenPGP

-----BEGIN PGP SIGNATURE-----
Comment: GPGTools - https://gpgtools.org
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=0o4N
-----END PGP SIGNATURE-----

--Apple-Mail=_2D734FAE-CDAB-4916-B168-A358AC8A9E65--


From nobody Fri Mar  9 14:23:08 2018
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: sacm@ietf.org
Delivered-To: sacm@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id B61501270A0; Fri,  9 Mar 2018 14:23:02 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: "IETF-Announce" <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.74.0
Auto-Submitted: auto-generated
Precedence: bulk
Cc: sacm-chairs@ietf.org, sacm@ietf.org, odonoghue@isoc.org, The IESG <iesg@ietf.org>, Karen O'Donoghue <odonoghue@isoc.org>, Kathleen.Moriarty.ietf@gmail.com, draft-ietf-sacm-nea-swima-patnc@ietf.org, rfc-editor@rfc-editor.org
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
Message-ID: <152063418273.8929.2915045519382513941.idtracker@ietfa.amsl.com>
Date: Fri, 09 Mar 2018 14:23:02 -0800
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/xnAXzuWYdtY4m-J7oEkLtfsDZTk>
Subject: [sacm] Protocol Action: 'Software Inventory Message and Attributes (SWIMA) for PA-TNC' to Proposed Standard (draft-ietf-sacm-nea-swima-patnc-04.txt)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Mar 2018 22:23:03 -0000

The IESG has approved the following document:
- 'Software Inventory Message and Attributes (SWIMA) for PA-TNC'
  (draft-ietf-sacm-nea-swima-patnc-04.txt) as Proposed Standard

This document is the product of the Security Automation and Continuous
Monitoring Working Group.

The IESG contact persons are Kathleen Moriarty and Eric Rescorla.

A URL of this Internet Draft is:
https://datatracker.ietf.org/doc/draft-ietf-sacm-nea-swima-patnc/





Technical Summary

   This document extends "PA-TNC: A Posture Attribute (PA) Protocol
   Compatible with Truste Network Connect (TNC) (RFC 5792) by providing
   specific attributes and message exchanges to allow endpoints to
   report their installed software inventory information to a NEA
   server, as defined in "Network Endpoint Assessment (NEA): Overview
   and Requirements" (RFC 5209).

Working Group Summary

   Working group consensus was clear for this draft. 

Document Quality

   This work begin in the Trusted Network Computing Group
   and there are implementations.  The StrongSwan implementation
   was demonstrated at the IETF hackathon in Prague (IETF 99).

Personnel

   Karen O'Donoghue is acting as the Document Shepherd.  
Kathleen is the Responsible Area Director. 
  If the document requires IANA
   experts(s), insert 'The IANA Expert(s) for the registry established in section 10.4
   in this document are David Waltermire and Jessica Fitzgerald-McKay.'

IANA Note

  Section 10.4 establishes the "Software Data Model Types" registry
  with Specification required and expert review per RFC8126.
  Sections 10.1-10.3 add entries to existing registries.


From nobody Fri Mar  9 15:05:14 2018
Return-Path: <ietf-secretariat-reply@ietf.org>
X-Original-To: sacm@ietf.org
Delivered-To: sacm@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 3A3A6124234; Fri,  9 Mar 2018 15:05:11 -0800 (PST)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
To: <sacm-chairs@ietf.org>, <sacm@ietf.org>, <odonoghue@isoc.org>, "Karen O'Donoghue" <odonoghue@isoc.org>, <Kathleen.Moriarty.ietf@gmail.com>, <draft-ietf-sacm-nea-swima-patnc@ietf.org>, 
X-Test-IDTracker: no
X-IETF-IDTracker: 6.74.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <152063671123.14996.16902635343863229567.idtracker@ietfa.amsl.com>
Date: Fri, 09 Mar 2018 15:05:11 -0800
From: IETF Secretariat <ietf-secretariat-reply@ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/5Z185iBzFxIMT-HL68fN_IQ3xO8>
Subject: [sacm] Datatracker State Update Notice: <draft-ietf-sacm-nea-swima-patnc-04.txt>
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Mar 2018 23:05:11 -0000

IANA action state changed to "In Progress"
Datatracker URL: https://datatracker.ietf.org/doc/draft-ietf-sacm-nea-swima-patnc/


From nobody Sat Mar 10 20:27:41 2018
Return-Path: <cmschmidt@mitre.org>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 644F61204DA; Sat, 10 Mar 2018 20:27:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.21
X-Spam-Level: 
X-Spam-Status: No, score=-4.21 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_MED=-2.3, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mitre.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id quo-6F9UT_Bi; Sat, 10 Mar 2018 20:27:30 -0800 (PST)
Received: from smtpvmsrv1.mitre.org (smtpvmsrv1.mitre.org [192.52.194.136]) by ietfa.amsl.com (Postfix) with ESMTP id 7BD0F1200C5; Sat, 10 Mar 2018 20:27:30 -0800 (PST)
Received: from smtpvmsrv1.mitre.org (localhost.localdomain [127.0.0.1]) by localhost (Postfix) with SMTP id CCE136C0036; Sat, 10 Mar 2018 23:27:29 -0500 (EST)
Received: from imshyb01.MITRE.ORG (unknown [129.83.29.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by smtpvmsrv1.mitre.org (Postfix) with ESMTPS id B8B126C0001; Sat, 10 Mar 2018 23:27:29 -0500 (EST)
Received: from imshyb02.MITRE.ORG (129.83.29.3) by imshyb01.MITRE.ORG (129.83.29.2) with Microsoft SMTP Server (TLS) id 15.0.1263.5; Sat, 10 Mar 2018 23:27:28 -0500
Received: from gcc01-CY1-obe.outbound.protection.outlook.com (10.140.19.249) by imshyb02.MITRE.ORG (129.83.29.3) with Microsoft SMTP Server (TLS) id 15.0.1263.5 via Frontend Transport; Sat, 10 Mar 2018 23:27:28 -0500
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mitre.onmicrosoft.com;  s=selector1-mitre-org; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=i1JqSPcUMEi/VJ0qXGRKrOneC9e1em63JMm1ycJ0fx8=; b=uZh26sIkGQLpT3pCzgPxsUcaGMgxirqY3UhWXtqEkiuqo2ykfvYtoSrsIvpwKIOVybJ8t8xdlhF7GNq/hCZcJROxeWxJ+PjHcg5KDXFfNf6xWF5v7NfhYrA4k6p7rteb6DfpXo0AMdcUXpwRQUhZCZRwhE4A0rNKhyi8b/myrUg=
Received: from DM5PR0901MB2375.namprd09.prod.outlook.com (52.132.133.18) by DM5PR0901MB2374.namprd09.prod.outlook.com (52.132.133.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.548.13; Sun, 11 Mar 2018 04:27:25 +0000
Received: from DM5PR0901MB2375.namprd09.prod.outlook.com ([fe80::21b9:ccf6:187e:85e1]) by DM5PR0901MB2375.namprd09.prod.outlook.com ([fe80::21b9:ccf6:187e:85e1%13]) with mapi id 15.20.0548.020; Sun, 11 Mar 2018 04:27:25 +0000
From: "Schmidt, Charles M." <cmschmidt@mitre.org>
To: Ben Campbell <ben@nostrum.com>
CC: "draft-ietf-sacm-nea-swima-patnc@ietf.org" <draft-ietf-sacm-nea-swima-patnc@ietf.org>, "sacm-chairs@ietf.org" <sacm-chairs@ietf.org>, The IESG <iesg@ietf.org>, Karen O'Donoghue <odonoghue@isoc.org>, "sacm@ietf.org" <sacm@ietf.org>
Thread-Topic: [sacm] Ben Campbell's Discuss on draft-ietf-sacm-nea-swima-patnc-02: (with DISCUSS and COMMENT)
Thread-Index: AQHTt/UAFwhHe614e0GbGd57xJiPw6PKcHcA
Date: Sun, 11 Mar 2018 04:27:25 +0000
Message-ID: <DM5PR0901MB23755EB4BED4577A50AAE755ABDC0@DM5PR0901MB2375.namprd09.prod.outlook.com>
References: <151926897179.21101.1205735756502467820.idtracker@ietfa.amsl.com> <DM5PR0901MB2375564B76246A1DA5FCE4A7ABC30@DM5PR0901MB2375.namprd09.prod.outlook.com> <080CB857-150E-450C-B685-8A10FA0D3984@nostrum.com> <DM5PR0901MB23759238C98C5F9E82AB5D7CABD90@DM5PR0901MB2375.namprd09.prod.outlook.com> <4D1185F9-AE0F-4CDB-AEE9-2FD7248977AE@nostrum.com>
In-Reply-To: <4D1185F9-AE0F-4CDB-AEE9-2FD7248977AE@nostrum.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=cmschmidt@mitre.org; 
x-originating-ip: [192.160.51.88]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; DM5PR0901MB2374; 7:wgRFtBsg2w195GStAqvppBASjzkoQ5DwibnMS3nTNzvo0TwOqOKPqjmHZuKMPrTDUnkQgUYlfR0+vasXGNTMVQHnotOS5kpZN2N+V5iGPXASDiqU2zGXkfp4VZZT1D2+fPwLOFSirzO2xClo709a/WvIKFNmXEOCf5Q0DuGwXI/lyzI4NSOHfMvfxaxeey0fhSxkNoBibOyJN3JSpuZI3d4FiIK4R6u26qePNKQHxX54AO1sLa1L8BjCDlSDpHMt
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: eab9bad2-dfeb-4cff-244d-08d587086482
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:DM5PR0901MB2374; 
x-ms-traffictypediagnostic: DM5PR0901MB2374:
x-microsoft-antispam-prvs: <DM5PR0901MB23740A3F93F3381ABDCBE8AAABDC0@DM5PR0901MB2374.namprd09.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(120809045254105)(192374486261705);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(8121501046)(5005006)(3002001)(3231220)(944501244)(52105095)(10201501046)(93006095)(93001095)(6055026)(6041310)(20161123558120)(20161123560045)(20161123562045)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011); SRVR:DM5PR0901MB2374; BCL:0; PCL:0; RULEID:; SRVR:DM5PR0901MB2374; 
x-forefront-prvs: 0608DEDB67
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39380400002)(396003)(346002)(376002)(39850400004)(366004)(13464003)(51914003)(189003)(199004)(55016002)(2950100002)(8666007)(81166006)(8936002)(6916009)(186003)(53936002)(8676002)(33656002)(14454004)(25786009)(4326008)(7696005)(5250100002)(316002)(3280700002)(59450400001)(102836004)(6246003)(26005)(6506007)(53546011)(99286004)(9686003)(6306002)(66066001)(6436002)(229853002)(81156014)(54906003)(3660700001)(305945005)(2906002)(2900100001)(68736007)(76176011)(5660300001)(74316002)(86362001)(7736002)(93886005)(3846002)(6116002)(345774005)(478600001)(106356001)(97736004)(105586002)(966005); DIR:OUT; SFP:1101; SCL:1; SRVR:DM5PR0901MB2374; H:DM5PR0901MB2375.namprd09.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; 
received-spf: None (protection.outlook.com: mitre.org does not designate permitted sender hosts)
x-microsoft-antispam-message-info: mdX2gSVt6JNzIiGE0kMllQR9BptF9Y8qk5f1r2YpqNazyc0gdmp9Fs3OVUB5nkdijOnXIVbeufu/oYD4ML3GBiUaMsEYXtEpZZ7Msyq4d2zKegAHlv24+ASYcNcWZwIAkVLNe7tquOGUTyXzCnXtw9KB7YyuAK9WoDFRe8ebYjq2ltuNi+6ZHPylGhZVLT9cOOdWmXGooenaeEfiNG69lpCFiAhNvXrH6VxQmJY1l1/hy5Cs0ZDUfuGvUglxc0gFp8Oz0mIfmWOOJqAbiIAi6baWJ7/xLIsaE3c6qo2QogZuA0xLnA+y/upMcCVlHRn9AQ6u4POWiKXfQPradIB1kA==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: eab9bad2-dfeb-4cff-244d-08d587086482
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Mar 2018 04:27:25.6656 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: c620dc48-1d50-4952-8b39-df4d54d74d82
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR0901MB2374
X-OriginatorOrg: mitre.org
X-MITRE: 8GQsMWxq66rxk57w
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/XDSd-ilEXdXrUxYNpadM1NivhC8>
Subject: Re: [sacm] Ben Campbell's Discuss on draft-ietf-sacm-nea-swima-patnc-02: (with DISCUSS and COMMENT)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 11 Mar 2018 04:27:33 -0000
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From nobody Sat Mar 10 21:50:11 2018
Return-Path: <ben@nostrum.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 04253126C22; Sat, 10 Mar 2018 21:50:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.889
X-Spam-Level: 
X-Spam-Status: No, score=-1.889 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, MIME_QP_LONG_LINE=0.001, T_RP_MATCHES_RCVD=-0.01, T_SPF_HELO_PERMERROR=0.01, T_SPF_PERMERROR=0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DYCjpEX-3raH; Sat, 10 Mar 2018 21:50:00 -0800 (PST)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C5CF6126B6E; Sat, 10 Mar 2018 21:49:59 -0800 (PST)
Received: from [10.0.1.94] (cpe-66-25-7-22.tx.res.rr.com [66.25.7.22]) (authenticated bits=0) by nostrum.com (8.15.2/8.15.2) with ESMTPSA id w2B5nwSJ019831 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO); Sat, 10 Mar 2018 23:49:58 -0600 (CST) (envelope-from ben@nostrum.com)
X-Authentication-Warning: raven.nostrum.com: Host cpe-66-25-7-22.tx.res.rr.com [66.25.7.22] claimed to be [10.0.1.94]
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (1.0)
From: Ben Campbell <ben@nostrum.com>
X-Mailer: iPad Mail (15D100)
In-Reply-To: <DM5PR0901MB23755EB4BED4577A50AAE755ABDC0@DM5PR0901MB2375.namprd09.prod.outlook.com>
Date: Sat, 10 Mar 2018 23:49:57 -0600
Cc: "draft-ietf-sacm-nea-swima-patnc@ietf.org" <draft-ietf-sacm-nea-swima-patnc@ietf.org>,  "sacm-chairs@ietf.org" <sacm-chairs@ietf.org>, The IESG <iesg@ietf.org>, "Karen O'Donoghue" <odonoghue@isoc.org>, "sacm@ietf.org" <sacm@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <AEE72A56-77D4-4F70-80D1-656B943D4F81@nostrum.com>
References: <151926897179.21101.1205735756502467820.idtracker@ietfa.amsl.com> <DM5PR0901MB2375564B76246A1DA5FCE4A7ABC30@DM5PR0901MB2375.namprd09.prod.outlook.com> <080CB857-150E-450C-B685-8A10FA0D3984@nostrum.com> <DM5PR0901MB23759238C98C5F9E82AB5D7CABD90@DM5PR0901MB2375.namprd09.prod.outlook.com> <4D1185F9-AE0F-4CDB-AEE9-2FD7248977AE@nostrum.com> <DM5PR0901MB23755EB4BED4577A50AAE755ABDC0@DM5PR0901MB2375.namprd09.prod.outlook.com>
To: "Schmidt, Charles M." <cmschmidt@mitre.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/q5ccfHvbw-amQSDflRHQcF5V3rw>
Subject: Re: [sacm] Ben Campbell's Discuss on draft-ietf-sacm-nea-swima-patnc-02: (with DISCUSS and COMMENT)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 11 Mar 2018 05:50:04 -0000

Hi Charles,

That sounds like a perfectly good plan.

Thanks!

Ben.

> On Mar 10, 2018, at 10:27 PM, Schmidt, Charles M. <cmschmidt@mitre.org> wr=
ote:
>=20
> Hi Ben,
>=20
> Thank you for the clarification. I'm following you now.
>=20
> I agree that I misused "end-to-end" in the description of this requirement=
. "Confidentiality" would be a better section name. I'm sure the RFC editor w=
ill have some additional fixes for me to do, and I'll make the switch in the=
 next draft.
>=20
> Thanks,
> Charles
>=20
>> -----Original Message-----
>> From: sacm [mailto:sacm-bounces@ietf.org] On Behalf Of Ben Campbell
>> Sent: Friday, March 09, 2018 4:22 PM
>> To: Schmidt, Charles M. <cmschmidt@mitre.org>
>> Cc: draft-ietf-sacm-nea-swima-patnc@ietf.org; sacm-chairs@ietf.org; The
>> IESG <iesg@ietf.org>; Karen O'Donoghue <odonoghue@isoc.org>;
>> sacm@ietf.org
>> Subject: Re: [sacm] Ben Campbell's Discuss on draft-ietf-sacm-nea-swima-
>> patnc-02: (with DISCUSS and COMMENT)
>>=20
>> Thanks for the response. I still have a point of confusion, inline. Also,=
 keep in
>> mind that I have cleared my DISCUSS; this is a non-blocking comment and
>> you are welcome to handle it however you please.
>>=20
>> Ben.
>>=20
>>> On Mar 5, 2018, at 7:11 PM, Schmidt, Charles M. <cmschmidt@mitre.org>
>> wrote:
>>>=20
>>> Hi Ben,
>>>=20
>>> Thank you for the follow-up. I made some additional modifications (-04
>> draft) that I hope address your remaining comments.
>>>=20
>>> Regarding your nit, I moved the Relationship to Other Specifications bef=
ore
>> the Security Considerations. The last sections are now the three you note=
.
>>>=20
>>> Regarding your comment on 2.4:
>>>=20
>>>>>> =C2=A72.4: This seems to assume there is never a need to hide informa=
tion
>>>> from
>>>>>> intermediaries. Is that the intent? (Or maybe there aren't any
>>>>>> intermediaries?)
>>>>>=20
>>>>> This is not the intent. NEA has multiple parts and the intent is to cl=
arify
>> that
>>>> the SWIMA part isn't the part dealing with data confidentiality. The
>> portion
>>>> that handles confidentiality is the PT layer of the NEA architecture. (=
PT-TLS
>>>> and PT-EAP) All I'm trying to do is emphasize that, if confidentiality i=
s an
>> issue,
>>>> make sure your NEA architecture is set up to support that.
>>>>=20
>>>> I think what is confusing me is the =E2=80=9Ctitle=E2=80=9D of the non-=
requirement is =E2=80=9CEnd
>> to
>>>> End confidentiality=E2=80=9D. I admit to not knowing the sacm work well=
 enought
>> to
>>>> know what the =E2=80=9Cends=E2=80=9D are, but am I correct to assume th=
at PT-TLS, like
>> most
>>>> uses of TLS, is hop-by-hop? Does the data every cross more than one
>> hop? Is
>>>> the answer the dame for PT-EAP?
>>>=20
>>> Re-reading this section, I agree that the section was confusing. I renam=
ed
>> the section to "Non-SWIMA Requirements" (and renamed the preceding
>> section to "SWIMA Requirements"). Hopefully this clarifies that the
>> specification is not talking about what is and is not required, but simpl=
y
>> which requirements need to be addressed by SWIMA and which
>> requirements need to be addressed by other standards.
>>>=20
>>> I also changed the text as follows:
>>>=20
>>>  There are certain capabilities that users of the SWIMA specification
>>>  might require but which are beyond the scope of SWIMA itself and need
>>>  to be addressed by other standards.  This list is not exhaustive.
>>>=20
>>>  End to End Confidentiality:  The SWIMA specification does not define
>>>     a mechanism for confidentiality, nor is confidentiality
>>>     automatically provided by using the PA-TNC interface.  In the NEA
>>>     architecture, confidentiality is generally provided by the
>>>     underlying transport protocols, such as the PT Binding to TLS
>>>     [RFC6876] or PT-EAP Posture Transport for Tunneled EAP Methods
>>>     [RFC7171] - see Section 7 for more information on related
>>>     standards.  The information conveyed by SWIMA is often sensitive
>>>     in nature for both security (Section 8) and privacy (Section 9)
>>>     reasons.  Those who implement SWIMA need to ensure that
>>>     appropriate NEA transport mechanisms are employed to meet
>>>     confidentiality requirements.
>>>=20
>>> Hopefully that makes things clearer. To more directly answer your
>> question, PT-TLS is just TLS with some minor added constraints to fit wit=
h the
>> NEA architecture. Likewise, PT-EAP is basically just EAP. SWIMA should be=

>> agnostic as to whether or not there are hops in the transmission and
>> delegate all responsibility for maintaining confidentiality across any ho=
ps to
>> the PT protocol in question. Does this help?
>>=20
>> I=E2=80=99m still a bit confused; let me try to come at it from another a=
ngle:
>>=20
>> The paragraph is labeled =E2=80=9CEnd-to-End Confidentiality=E2=80=9D.  T=
he text delegates
>> this to transport protocol, and gives PT-TLS and PT-EAP as examples. In t=
he
>> specific case of TLS: TLS does not normally offer =E2=80=9Cend-to-end=E2=80=
=9D confidentiality,
>> rather it=E2=80=99s hop-by-hop. If there are intermediaries, TLS does not=
 prevent
>> them from seeing the data.  Now, there are exceptions (e.g. HTTPS proxies=
).
>> And of course, if there are no intermediaries, then hop-by-hop becomes a
>> trivial case of end-to-end.
>>=20
>> So I guess what I am asking is why TLS is listed as an example transport i=
n a
>> paragraph about end-to-end confidentiality? Perhaps the paragraph is just=

>> about confidentiality in general? Or there are other aspects of the
>> architecture that make TLS effectively end-to-end?
>>=20
>>=20
>>=20
>>>=20
>>> Thanks again for the clarifications. Hopefully the new draft (-04) will
>> address those remaining concerns.
>>>=20
>>> Charles
>>>=20
>>>> -----Original Message-----
>>>> From: sacm [mailto:sacm-bounces@ietf.org] On Behalf Of Ben Campbell
>>>> Sent: Thursday, March 01, 2018 9:19 PM
>>>> To: Schmidt, Charles M. <cmschmidt@mitre.org>
>>>> Cc: sacm-chairs@ietf.org; Karen O'Donoghue <odonoghue@isoc.org>; The
>>>> IESG <iesg@ietf.org>; sacm@ietf.org; draft-ietf-sacm-nea-swima-
>>>> patnc@ietf.org
>>>> Subject: Re: [sacm] Ben Campbell's Discuss on draft-ietf-sacm-nea-swima=
-
>>>> patnc-02: (with DISCUSS and COMMENT)
>>>>=20
>>>>=20
>>>>=20
>>>>> On Feb 24, 2018, at 1:01 AM, Schmidt, Charles M.
>> <cmschmidt@mitre.org>
>>>> wrote:
>>>>>=20
>>>>> Hello,
>>>>>=20
>>>>> Thanks a bunch for your feedback. In general I agree with your
>> comments
>>>> and made changes to address them. Some quick clarifications:
>>>>>=20
>>>>>> =C2=A72.4: This seems to assume there is never a need to hide informa=
tion
>>>> from
>>>>>> intermediaries. Is that the intent? (Or maybe there aren't any
>>>>>> intermediaries?)
>>>>>=20
>>>>> This is not the intent. NEA has multiple parts and the intent is to cl=
arify
>> that
>>>> the SWIMA part isn't the part dealing with data confidentiality. The
>> portion
>>>> that handles confidentiality is the PT layer of the NEA architecture. (=
PT-TLS
>>>> and PT-EAP) All I'm trying to do is emphasize that, if confidentiality i=
s an
>> issue,
>>>> make sure your NEA architecture is set up to support that.
>>>>=20
>>>> I think what is confusing me is the =E2=80=9Ctitle=E2=80=9D of the non-=
requirement is =E2=80=9CEnd
>> to
>>>> End confidentiality=E2=80=9D. I admit to not knowing the sacm work well=
 enought
>> to
>>>> know what the =E2=80=9Cends=E2=80=9D are, but am I correct to assume th=
at PT-TLS, like
>> most
>>>> uses of TLS, is hop-by-hop? Does the data every cross more than one
>> hop? Is
>>>> the answer the dame for PT-EAP?
>>>>=20
>>>>=20
>>>>=20
>>>>>=20
>>>>>> =C2=A73.4.3,
>>>>>> -- first paragraph: What is the expected scope of uniqueness for reco=
rd
>>>>>> identifiers? -- In the sentence "The Record Identifier SHOULD remain
>>>>>> unchanged
>>>>>> if that record is modified.", why is the SHOULD not a MUST? What
>> would
>>>>>> happen
>>>>>> if the identifier did change?
>>>>>=20
>>>>> It is SHOULD rather than MUST because, under some tracking conditions
>> it
>>>> might not be possible to distinguish between a record being modified an=
d
>> a
>>>> record being deleted and a new record being created. Will add clarifyin=
g
>> text
>>>> to this effect. If the system thinks that a modification is actually a
>>>> delete/create action, it would be treated as such with a new record
>> identifier
>>>> being assigned to the "created" record.
>>>>>=20
>>>>=20
>>>> Okay; I think the mentioned clarifying text would help.
>>>>=20
>>>>=20
>>>>>> =C2=A77.1: " Some tools might not be designed to update records in th=
e
>>>> Software
>>>>>> Inventory Evidence Collection in real time,..." Wasn't there a normat=
ive
>>>>>> requirement that they be capable of this?
>>>>>=20
>>>>> A subtle difference: The SWIMA-PC MUST detect changes to the Software
>>>> Inventory Evidence Collection in near real time, but the data sources
>> might
>>>> not update the Software Inventory Evidence Collection in real time. I
>>>> reworded to clarify the difference between the SWIMA-PC reading the
>>>> Evidence Collection and the tool updating the Evidence Collection.
>>>>=20
>>>> Okay.
>>>>=20
>>>>>=20
>>>>>> =C2=A79: Nit: is there are reasons to violate the convention that IAN=
A,
>> security,
>>>>>> and privacy considerations are the last substantive sections in in th=
e
>> body
>>>> of
>>>>>> an RFC?
>>>>>=20
>>>>> I'm happy to reorder these - a quick random sample of RFCs seems to
>>>> provide a number of different orderings. I just followed the PA-TNC spe=
c,
>>>> since I had that open most. Just let me know what the expected order is=
.
>>>>=20
>>>> Typically they are the last three =E2=80=9Csubstantive=E2=80=9D section=
s in the main body of
>> an
>>>> RFC, not counting any appendices or =E2=80=9Cacknowledgements=E2=80=9D t=
ype sections. I
>>>> don=E2=80=99t think we are consistent in the order among those three.
>>>>=20
>>>> Thanks!
>>>>=20
>>>> Ben.
>>>>=20
>>>>>=20
>>>>> Thanks a bunch,
>>>>> Charles
>>>>>=20
>>>>>> -----Original Message-----
>>>>>> From: Ben Campbell [mailto:ben@nostrum.com]
>>>>>> Sent: Wednesday, February 21, 2018 9:10 PM
>>>>>> To: The IESG <iesg@ietf.org>
>>>>>> Cc: draft-ietf-sacm-nea-swima-patnc@ietf.org; sacm@ietf.org; Karen
>>>>>> O'Donoghue <odonoghue@isoc.org>; sacm-chairs@ietf.org;
>>>>>> odonoghue@isoc.org; sacm@ietf.org
>>>>>> Subject: Ben Campbell's Discuss on draft-ietf-sacm-nea-swima-patnc-
>> 02:
>>>>>> (with DISCUSS and COMMENT)
>>>>>>=20
>>>>>> Ben Campbell has entered the following ballot position for
>>>>>> draft-ietf-sacm-nea-swima-patnc-02: Discuss
>>>>>>=20
>>>>>> When responding, please keep the subject line intact and reply to all=

>>>>>> email addresses included in the To and CC lines. (Feel free to cut th=
is
>>>>>> introductory paragraph, however.)
>>>>>>=20
>>>>>>=20
>>>>>> Please refer to https://www.ietf.org/iesg/statement/discuss-
>> criteria.html
>>>>>> for more information about IESG DISCUSS and COMMENT positions.
>>>>>>=20
>>>>>>=20
>>>>>> The document, along with other ballot positions, can be found here:
>>>>>> https://datatracker.ietf.org/doc/draft-ietf-sacm-nea-swima-patnc/
>>>>>>=20
>>>>>>=20
>>>>>>=20
>>>>>> ---------------------------------------------------------------------=
-
>>>>>> DISCUSS:
>>>>>> ---------------------------------------------------------------------=
-
>>>>>>=20
>>>>>> (This is related to one of Ekr's comments, but I don't think it's qui=
te the
>>>>>> same.)
>>>>>>=20
>>>>>> In the first paragraph of =C2=A77.2, the conclusions seem to be based=
 on the
>>>>>> following sentence:
>>>>>>=20
>>>>>> "This is generally not considered to be problematic, as
>>>>>> those with access to the endpoint can usually learn of everything
>>>>>> disclosed by that endpoint=E2=80=99s records simply by inspecting oth=
er parts
>>>>>> of the endpoint."
>>>>>>=20
>>>>>> This doesn=E2=80=99t seem like a reasonable assumption. Multiuser end=
points
>> may
>>>>>> well
>>>>>> have access controls that prevent a given user from seeing all softwa=
re
>>>>>> packages installed on the system. This leads to the conclusion that t=
he
>>>>>> records
>>>>>> on the endpoint are not sensitive. I do not think this document shoul=
d
>>>> draw
>>>>>> that conclusion. Even if this were provably true for all existing sys=
tems,
>>>> such
>>>>>> an assumption could be problematic for future systems.
>>>>>>=20
>>>>>>=20
>>>>>> ---------------------------------------------------------------------=
-
>>>>>> COMMENT:
>>>>>> ---------------------------------------------------------------------=
-
>>>>>>=20
>>>>>> Substantive Comments:
>>>>>>=20
>>>>>> =C2=A72.4: This seems to assume there is never a need to hide informa=
tion
>>>> from
>>>>>> intermediaries. Is that the intent? (Or maybe there aren't any
>>>>>> intermediaries?)
>>>>>>=20
>>>>>> =C2=A73.4.3,
>>>>>> -- first paragraph: What is the expected scope of uniqueness for reco=
rd
>>>>>> identifiers? -- In the sentence "The Record Identifier SHOULD remain
>>>>>> unchanged
>>>>>> if that record is modified.", why is the SHOULD not a MUST? What
>> would
>>>>>> happen
>>>>>> if the identifier did change?
>>>>>>=20
>>>>>> =C2=A73.4.4:
>>>>>>=20
>>>>>> -- "However, if that directory is shared by other software products, t=
he
>>>>>> "location" SHOULD be the location of the primary executable
>>>>>> associated with the software product."
>>>>>> I'm confused by the the condition, since sharing a directory with oth=
er
>>>>>> products doesn't seem to introduce the ambiguity that the rest of the=

>>>>>> sentence
>>>>>> assumes. Perhaps this was meant to be about situations where a
>>>> software
>>>>>> package
>>>>>> is installed across multiple directories?
>>>>>>=20
>>>>>> -- "Even a probable location for a software product is preferable to
>> using a
>>>>>> zero-length locator." This could use elaboration; do you expect the
>>>> collector
>>>>>> to guess?
>>>>>>=20
>>>>>> =C2=A77.1: " Some tools might not be designed to update records in th=
e
>>>> Software
>>>>>> Inventory Evidence Collection in real time,..." Wasn't there a normat=
ive
>>>>>> requirement that they be capable of this?
>>>>>>=20
>>>>>> =C2=A78,
>>>>>> -- 2nd paragraph: It=E2=80=99s worth mentioning that in some contexts=
 this sort
>> of
>>>>>> information could expose the user to severe personal risk, including t=
he
>>>> risk
>>>>>> of death. -- Last paragraph: "For this reason, privacy safeguards mig=
ht
>> be
>>>>>> necessary for collected inventory information." Can this be stated mo=
re
>>>>>> strongly than "might be necessary"?
>>>>>>=20
>>>>>> Editorial Comments and Nits:
>>>>>>=20
>>>>>> =C2=A73.8.5, first paragraph: "As noted in Section 3.6 SWIMA-PCs MUST=
 ..."
>>>>>> Please reserve 2119 keywords for the authoritative statement of a
>>>>>> requirement;
>>>>>> that is, please do not use them to refer to requirements defined
>>>> elsewhere.
>>>>>> (Note that this pattern occurs multiple times in the draft.)
>>>>>>=20
>>>>>> =C2=A79: Nit: is there are reasons to violate the convention that IAN=
A,
>> security,
>>>>>> and privacy considerations are the last substantive sections in in th=
e
>> body
>>>> of
>>>>>> an RFC?
>>>>>>=20
>>>>>>=20
>>>>>=20
>>>=20
>=20


From nobody Tue Mar 13 18:05:10 2018
Return-Path: <ietf-secretariat-reply@ietf.org>
X-Original-To: sacm@ietf.org
Delivered-To: sacm@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 2710D124BFA; Tue, 13 Mar 2018 18:05:09 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
To: <sacm-chairs@ietf.org>, <sacm@ietf.org>, <odonoghue@isoc.org>, "Karen O'Donoghue" <odonoghue@isoc.org>, <Kathleen.Moriarty.ietf@gmail.com>, <draft-ietf-sacm-nea-swima-patnc@ietf.org>, 
X-Test-IDTracker: no
X-IETF-IDTracker: 6.75.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <152098950915.12402.6508683670781818495.idtracker@ietfa.amsl.com>
Date: Tue, 13 Mar 2018 18:05:09 -0700
From: IETF Secretariat <ietf-secretariat-reply@ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/HJAHjedn9L4m2uXggYuok_zbRpg>
Subject: [sacm] Datatracker State Update Notice: <draft-ietf-sacm-nea-swima-patnc-04.txt>
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Mar 2018 01:05:09 -0000

IANA action state changed to "On Hold"
Datatracker URL: https://datatracker.ietf.org/doc/draft-ietf-sacm-nea-swima-patnc/


From nobody Thu Mar 15 08:40:25 2018
Return-Path: <iana-shared@icann.org>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8FF8212702E for <sacm@ietfa.amsl.com>; Tue, 13 Mar 2018 17:39:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.96
X-Spam-Level: 
X-Spam-Status: No, score=-2.96 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HEADER_FROM_DIFFERENT_DOMAINS=0.25, MISSING_HEADERS=1.021, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HmXOoD-_6Jxc for <sacm@ietfa.amsl.com>; Tue, 13 Mar 2018 17:39:27 -0700 (PDT)
Received: from smtp01.icann.org (smtp01.icann.org [192.0.46.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 48FB6127010 for <sacm@ietf.org>; Tue, 13 Mar 2018 17:39:27 -0700 (PDT)
Received: from request3.lax.icann.org (request1.lax.icann.org [10.32.11.221]) by smtp01.icann.org (Postfix) with ESMTP id 80D73E0A84; Wed, 14 Mar 2018 00:39:26 +0000 (UTC)
Received: by request3.lax.icann.org (Postfix, from userid 48) id 4334AC2050B; Wed, 14 Mar 2018 00:39:26 +0000 (UTC)
RT-Owner: amanda.baber
From: "Amanda Baber via RT" <drafts-approval@iana.org>
Reply-To: drafts-approval@iana.org
In-Reply-To: <152063418287.8929.14660637126166425888.idtracker@ietfa.amsl.com>
References: <RT-Ticket-1052969@icann.org> <152063418287.8929.14660637126166425888.idtracker@ietfa.amsl.com>
Message-ID: <rt-4.2.9-20952-1520987965-78.1052969-7-0@icann.org>
X-RT-Loop-Prevention: IANA
X-RT-Ticket: IANA #1052969
X-Managed-BY: RT 4.2.9 (http://www.bestpractical.com/rt/)
X-RT-Originator: amanda.baber@icann.org
CC: cmschmidt@mitre.org, dhaynes@mitre.org, ccoffin@mitre.org, david.waltermire@nist.gov, jmfitz2@radium.ncsc.mil, inacio@cert.org, adam.w.montville@gmail.com, odonoghue@isoc.org, Kathleen.Moriarty.ietf@gmail.com, ekr@rtfm.com, kaduk@mit.edu, odonoghue@isoc.org, sacm@ietf.org
Content-Type: text/plain; charset="utf-8"
X-RT-Original-Encoding: utf-8
Precedence: bulk
Date: Wed, 14 Mar 2018 00:39:26 +0000
MIME-Version: 1.0
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/uJ8oQyXYbORdrFXPzoD4esd_r7I>
X-Mailman-Approved-At: Thu, 15 Mar 2018 08:40:24 -0700
Subject: [sacm] [IANA #1052969] Protocol Action: 'Software Inventory Message and Attributes (SWIMA) for PA-TNC' to Proposed Standard (draft-ietf-sacm-nea-swima-patnc-04.txt)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 14 Mar 2018 00:39:28 -0000

Dear Authors/Chairs/AD,

We're labeling this document "On Hold" (in our queue only) while we wait for an expert to review the new RFC 5792 and RFC 5793 registrations.

Best regards,

Amanda Baber
Lead IANA Services Specialist


From nobody Thu Mar 15 09:08:52 2018
Return-Path: <adam.w.montville@gmail.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7DBF812D958; Thu, 15 Mar 2018 09:08:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.698
X-Spam-Level: 
X-Spam-Status: No, score=-2.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id agqaLKhhxduq; Thu, 15 Mar 2018 09:08:50 -0700 (PDT)
Received: from mail-oi0-x232.google.com (mail-oi0-x232.google.com [IPv6:2607:f8b0:4003:c06::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0E24B12D963; Thu, 15 Mar 2018 09:08:50 -0700 (PDT)
Received: by mail-oi0-x232.google.com with SMTP id x10so6155442oig.2; Thu, 15 Mar 2018 09:08:50 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=from:mime-version:subject:message-id:date:cc:to; bh=MwEYQTnhX/5w1perD3JHQ6Pxdfyvp5aYPWWE3pqQVaE=; b=hczracpdmGMGKp7yIwXPOqVXJRj2Uc9z1GUZTHBZahghIfF/docaCQWtnhSLpFf2+w RCuTEAOFuFIAhAS2hZmu15dErvHUD8lqsEDfFNCXMOJeSm/LwRyvhTryrHFHbCCTTEq3 rbSCdztLhpJz/w88+Im6LTx5z5aFOsZ4MsXJVvTJPqiWfxTKHlu+WnJrUFI3PeyKJFGx 53+lSg3Z9617nvr2m7rq8K/kw8cTdwPWN4FpH04+N7r5zyuhUxvJ8XIom75giYhh8LJr zQmOZX/b7MuSXdfXuD9UPimNzqVe/45LojmWh91y5Yah8OjgWpq3Kl+ynngGPZVRBLVh 1Txg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:mime-version:subject:message-id:date:cc:to; bh=MwEYQTnhX/5w1perD3JHQ6Pxdfyvp5aYPWWE3pqQVaE=; b=rF0bDCJUsSnLmWSg+1l/8i9xBtXTXvwR+NHQSn8aVBKuZDeh+VWs6Yk1mC7I6hGRbI L71GCxlTY0VXpazN+f815TKXpgEu9uNfuO5FDX3NNcF59cZn9KZTmkh0fHV70Vb7eerq 37tLIGeaiYshrwv1qSCXb96AgvwDWaic7mhSzotjwRuENTu0TTdMr19PyTnrK9wd8DIN jpeeZkQ5j0IFz63sdAg5zEwT2uiZv9VG0jWTl8wcAm//8Q2NKYrlXDiQ8pVOVQEEoQ3a +NJsJw9IsZSRx1KqhhIlrq3PEjJj+EBTpuAMdW/c5Ea06RVlQ4yjZBWq8ulCigGDR7jm 24rA==
X-Gm-Message-State: AElRT7EoMuf6Hl8XWTy7R4M3ucTZqqjf2Vhyl09ovknTN2H8cD1CetZq bYT7x7CnzpAoJry8JHkSoD+aoqZj
X-Google-Smtp-Source: AG47ELvdscybscFkVeuc9jyngVWakbrvQGhfNnhyc6ILXnhgFkACUyq7CtI9czA8wx8Tns79sQvflQ==
X-Received: by 10.202.172.138 with SMTP id v132mr5733232oie.320.1521130128773;  Thu, 15 Mar 2018 09:08:48 -0700 (PDT)
Received: from macbook.lan (99-64-100-131.lightspeed.austtx.sbcglobal.net. [99.64.100.131]) by smtp.gmail.com with ESMTPSA id r184sm2967795oib.39.2018.03.15.09.08.47 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 15 Mar 2018 09:08:47 -0700 (PDT)
From: Adam Montville <adam.w.montville@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_E9590679-30ED-43B5-8761-C5424288755D"
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
Message-Id: <6D96DBB3-EBF3-447F-94A7-5F3BA4A39BED@gmail.com>
Date: Thu, 15 Mar 2018 11:08:46 -0500
Cc: "<sacm@ietf.org>" <sacm@ietf.org>
To: "<sacm-chairs@ietf.org>" <sacm-chairs@ietf.org>
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/PO4VF47weSyyjA4RnFqEFVmI3L8>
Subject: [sacm] Agenda slot requests
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Mar 2018 16:08:51 -0000

--Apple-Mail=_E9590679-30ED-43B5-8761-C5424288755D
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Dear SACM Chairs,

Bill Munyan and I would like a couple of slots for our Thursday morning =
session. One slot would be about our architecture draft [1] - a quick =
introduction, some feedback we've heard about it, and our anticipated =
next steps for it. The other would be a relatively quick report out on =
our hackathon efforts [2].

I don't believe we need a slot for terminology, as we should be able to =
provide an update to that on the list.

Kind regards,

Adam

[1] https://datatracker.ietf.org/doc/draft-mandm-sacm-architecture/ =
<https://datatracker.ietf.org/doc/draft-mandm-sacm-architecture/>
[2] https://github.com/CISecurity/Integration =
<https://github.com/CISecurity/Integration>=

--Apple-Mail=_E9590679-30ED-43B5-8761-C5424288755D
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><body style=3D"word-wrap: break-word; -webkit-nbsp-mode: space; =
-webkit-line-break: after-white-space;" class=3D"">Dear SACM Chairs,<div =
class=3D""><br class=3D""></div><div class=3D"">Bill Munyan and I would =
like a couple of slots for our Thursday morning session. One slot would =
be about our architecture draft [1] - a quick introduction, some =
feedback we've heard about it, and our anticipated next steps for it. =
The other would be a relatively quick report out on our hackathon =
efforts [2].</div><div class=3D""><br class=3D""></div><div class=3D"">I =
don't believe we need a slot for terminology, as we should be able to =
provide an update to that on the list.</div><div class=3D""><br =
class=3D""></div><div class=3D"">Kind regards,</div><div class=3D""><br =
class=3D""></div><div class=3D"">Adam</div><div class=3D""><br =
class=3D""></div><div class=3D"">[1]&nbsp;<a =
href=3D"https://datatracker.ietf.org/doc/draft-mandm-sacm-architecture/" =
class=3D"">https://datatracker.ietf.org/doc/draft-mandm-sacm-architecture/=
</a></div><div class=3D"">[2]&nbsp;<a =
href=3D"https://github.com/CISecurity/Integration" =
class=3D"">https://github.com/CISecurity/Integration</a></div></body></htm=
l>=

--Apple-Mail=_E9590679-30ED-43B5-8761-C5424288755D--


From nobody Thu Mar 15 15:38:00 2018
Return-Path: <david.waltermire@nist.gov>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1CE9C127337; Thu, 15 Mar 2018 15:37:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nistgov.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TFFX1nMA6bxk; Thu, 15 Mar 2018 15:37:56 -0700 (PDT)
Received: from GCC01-DM2-obe.outbound.protection.outlook.com (mail-dm2gcc01on0102.outbound.protection.outlook.com [23.103.201.102]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 416CB1272E1; Thu, 15 Mar 2018 15:37:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nistgov.onmicrosoft.com; s=selector1-nist-gov; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=S7wuUMLEBQ6ofp+AnYW/O6QcQjY6uR7o8Hmg9R9M+zg=; b=JUnYAXZumShvYXMH4cOorHK1jOEjRvOL5r5Tz4V/k2EZtt/kaLK8He8Ixlz+zABKUyWpvdJErzabOCjR0Jzsp6Vz+glHgSKRq2R67tto63d0fHdAqVtw4HHY1/HpTVT4O5wtt625o1z9XJ3zQr426lixQOuXeWSWYAyR4LRG0HI=
Received: from MW2PR0901MB2313.namprd09.prod.outlook.com (52.132.147.27) by MW2PR0901MB2314.namprd09.prod.outlook.com (52.132.147.28) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.588.14; Thu, 15 Mar 2018 22:37:54 +0000
Received: from MW2PR0901MB2313.namprd09.prod.outlook.com ([fe80::70c1:9b22:8b43:4053]) by MW2PR0901MB2313.namprd09.prod.outlook.com ([fe80::70c1:9b22:8b43:4053%13]) with mapi id 15.20.0567.018; Thu, 15 Mar 2018 22:37:54 +0000
From: "Waltermire, David A. (Fed)" <david.waltermire@nist.gov>
To: "sacm@ietf.org" <sacm@ietf.org>, "sacm-chairs@ietf.org" <sacm-chairs@ietf.org>
Thread-Topic: CoSWID at IETF 101
Thread-Index: AQHTvK5Bwn0I/6bYNEOKTgLm1UkMjg==
Date: Thu, 15 Mar 2018 22:37:53 +0000
Message-ID: <pqin13ga82q7rtjn0ogu52q4.1521153433362@email.android.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=david.waltermire@nist.gov; 
x-originating-ip: [113.38.207.146]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; MW2PR0901MB2314; 7:cUsm/EFTmpsrIiRxaLnPVarPvs/ONupipO6HHyj3hkHuNdyJGRpOKWgfmltqBT6YiO580tZP9RSx3eYIBJv7WB5NHQl4YOWEQtV7WJLuLs69MsELxZhoyRkgmJpaOVw1OPfPgzQo3MH250QmaiS0XKQ6l3KIdoKpKbxBeZ32bjm9YueVoKoyIf1ywkjv0+cNIa6s8hpocRTYG8StDK9qvRvgYJYkd4rdqMhvrRBEcVIEmRZlj/VS6TqEwELftnu8
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: b821643b-b953-441c-9965-08d58ac5646a
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:MW2PR0901MB2314; 
x-ms-traffictypediagnostic: MW2PR0901MB2314:
x-microsoft-antispam-prvs: <MW2PR0901MB2314B9C8C9D89252E5951F67F0D00@MW2PR0901MB2314.namprd09.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:;
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(8121501046)(5005006)(10201501046)(3231221)(944501244)(52105095)(93006095)(93001095)(3002001)(6055026)(6041310)(20161123562045)(20161123560045)(20161123564045)(20161123558120)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(6072148)(201708071742011); SRVR:MW2PR0901MB2314; BCL:0; PCL:0; RULEID:; SRVR:MW2PR0901MB2314; 
x-forefront-prvs: 0612E553B4
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(376002)(396003)(39380400002)(39860400002)(366004)(189003)(199004)(2906002)(14454004)(186003)(106356001)(6506007)(53936002)(63666004)(86362001)(102836004)(7736002)(450100002)(8676002)(3280700002)(95246002)(66066001)(105586002)(81156014)(25786009)(8936002)(33896004)(26005)(305945005)(9686003)(478600001)(6512007)(110136005)(54896002)(51650200002)(6486002)(316002)(2501003)(5660300001)(2900100001)(99286004)(5250100002)(3846002)(81166006)(6436002)(97736004)(3660700001)(6116002)(558084003)(7116003)(68736007)(14943795004); DIR:OUT; SFP:1102; SCL:1; SRVR:MW2PR0901MB2314; H:MW2PR0901MB2313.namprd09.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; 
received-spf: None (protection.outlook.com: nist.gov does not designate permitted sender hosts)
x-microsoft-antispam-message-info: B9tlrZJJp+yukrEoG0Sgs38BsubgIAZDsO7ZFFhCay1BuU8phuX9dTEY0z8a1LhCNYJAZ4W9tIGKk//c7IozDE9x2IRhpLsXetafDdjZWbgPwuhOLvXR+AfZZmORYfxLvwNDI/qIQGyCp028N25ON3BZG/+uM2+G/y9Ubi9j+e2keQ97DwTIk07Rxx4EWnUBZSDDvUjE+7/ib4imdtJe6OlvSX54kdrYAU72SrJq2P36WFjPmzagImlm1K0OF/YtcKuz0I3kjl+KJ4J4Ku2P10Zo+8jbf0tsTAb8Er/dVRtCNZRCT1nPFXYXAdalQMtdbQjhePsn12RwD7SqlfUtvw==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_pqin13ga82q7rtjn0ogu52q41521153433362emailandroidcom_"
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-Network-Message-Id: b821643b-b953-441c-9965-08d58ac5646a
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Mar 2018 22:37:53.9910 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW2PR0901MB2314
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/hqg_Bxf2Ulz08WeVaIQJNdAgOmA>
Subject: [sacm] CoSWID at IETF 101
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Mar 2018 22:37:58 -0000

--_000_pqin13ga82q7rtjn0ogu52q41521153433362emailandroidcom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

V291bGQgaXQgYmUgcG9zc2libGUgdG8gZ2V0IDE1IG1pbnV0ZXMgb24gdGhlIGFnZW5kYSB0byBk
aXNjdXNzIHRoZSBDb1NXSUQgZHJhZnQ/DQoNClRoYW5rcywNCkRhdmUNCg==

--_000_pqin13ga82q7rtjn0ogu52q41521153433362emailandroidcom_
Content-Type: text/html; charset="utf-8"
Content-ID: <0BBFD8F71BEC5942B1B094C525AC9D5A@nistgov.onmicrosoft.com>
Content-Transfer-Encoding: base64

PGh0bWw+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIgY29udGVudD0i
dGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjwvaGVhZD4NCjxib2R5Pg0KV291bGQgaXQgYmUg
cG9zc2libGUgdG8gZ2V0IDE1IG1pbnV0ZXMgb24gdGhlIGFnZW5kYSB0byBkaXNjdXNzIHRoZSBD
b1NXSUQgZHJhZnQ/PGJyPg0KPGJyPg0KVGhhbmtzLDxicj4NCkRhdmUNCjwvYm9keT4NCjwvaHRt
bD4NCg==

--_000_pqin13ga82q7rtjn0ogu52q41521153433362emailandroidcom_--


From nobody Thu Mar 15 15:39:30 2018
Return-Path: <odonoghue@isoc.org>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 30DC7127419; Thu, 15 Mar 2018 15:39:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=isoc.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gfRE0YrMZmOa; Thu, 15 Mar 2018 15:39:26 -0700 (PDT)
Received: from NAM03-CO1-obe.outbound.protection.outlook.com (mail-co1nam03on0044.outbound.protection.outlook.com [104.47.40.44]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AD8001272E1; Thu, 15 Mar 2018 15:39:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=isoc.org; s=selector1;  h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=EkQBCbVYfrAv7boIZbWTtfOlAkIdSPrCcNu8+7LgK6Q=; b=uaz5x1cgfDEpXtsvjJq5R4SEL7zBc7wv9+IQRTUheD25io1WrZt19UVwwKfDJD74bH44vo/Mws8LR9nvtr/YvCNEf3T/jh7njNhAAYBNzIc5t+rK9yqTPVs4J/zVDIIzgM4YJD5vQq1axSiqdc3Xs7PKz/fT78eCZdeoPDWNyhc=
Received: from BN6PR06MB3108.namprd06.prod.outlook.com (10.174.232.12) by BN6PR06MB3298.namprd06.prod.outlook.com (10.174.235.30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.567.14; Thu, 15 Mar 2018 22:39:22 +0000
Received: from BN6PR06MB3108.namprd06.prod.outlook.com ([10.174.232.12]) by BN6PR06MB3108.namprd06.prod.outlook.com ([10.174.232.12]) with mapi id 15.20.0567.018; Thu, 15 Mar 2018 22:39:22 +0000
From: Karen O'Donoghue <odonoghue@isoc.org>
To: "Waltermire, David A. (Fed)" <david.waltermire@nist.gov>
CC: "sacm@ietf.org" <sacm@ietf.org>, "sacm-chairs@ietf.org" <sacm-chairs@ietf.org>
Thread-Topic: CoSWID at IETF 101
Thread-Index: AQHTvK5Bwn0I/6bYNEOKTgLm1UkMjqPR440A
Date: Thu, 15 Mar 2018 22:39:22 +0000
Message-ID: <9BA0D29D-5F37-416A-AA54-6D9A08C27970@isoc.org>
References: <pqin13ga82q7rtjn0ogu52q4.1521153433362@email.android.com>
In-Reply-To: <pqin13ga82q7rtjn0ogu52q4.1521153433362@email.android.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=odonoghue@isoc.org; 
x-originating-ip: [2001:67c:1232:144:951c:4e8f:c3ab:16f3]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BN6PR06MB3298; 7:UqfsOgtj/zKytUEIjpZZDpGVcjtMow8+IDes1xcJBvAxN896b8LYiSlDQcc/93OJSIMdrDEPIqGn1ZZhAzAVINUnBJuup0lCObsbxNHw/cdqonhSZrJj65WqV+JORYY77zkFjwiSYHMGb9CZWE8fov3wVaBnngnOJLs+icPCQTFerE5txP+aIUzWVq3IOCSom+Xc7vKkMjhnUDbFNQO0qrHw4vP6YC7m59Xt6wq/6kwYtZaS+oYk6BhL9S1ohgC8
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-correlation-id: f125ae48-2956-4585-be56-08d58ac598f5
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:BN6PR06MB3298; 
x-ms-traffictypediagnostic: BN6PR06MB3298:
x-microsoft-antispam-prvs: <BN6PR06MB3298DF0724ECE2954592011EC2D00@BN6PR06MB3298.namprd06.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(65766998875637);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(8121501046)(5005006)(3231221)(944501244)(52105095)(3002001)(93006095)(93001095)(10201501046)(6041310)(20161123560045)(20161123564045)(20161123562045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123558120)(6072148)(201708071742011); SRVR:BN6PR06MB3298; BCL:0; PCL:0; RULEID:; SRVR:BN6PR06MB3298; 
x-forefront-prvs: 0612E553B4
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(346002)(376002)(396003)(39840400004)(39380400002)(199004)(189003)(36756003)(8676002)(8936002)(478600001)(3280700002)(81166006)(81156014)(3660700001)(229853002)(2906002)(53936002)(6246003)(97736004)(6436002)(2900100001)(33656002)(6116002)(14454004)(6486002)(105586002)(68736007)(558084003)(6916009)(2950100002)(6512007)(82746002)(7116003)(83716003)(99286004)(102836004)(53546011)(6506007)(5660300001)(186003)(77096007)(25786009)(4326008)(8656006)(316002)(7736002)(86362001)(46003)(305945005)(106356001)(76176011)(54906003); DIR:OUT; SFP:1101; SCL:1; SRVR:BN6PR06MB3298; H:BN6PR06MB3108.namprd06.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords;  A:1; MX:1; LANG:en; 
received-spf: None (protection.outlook.com: isoc.org does not designate permitted sender hosts)
x-microsoft-antispam-message-info: U077ccnhRMjkcVQRH558JaaOzWOHWXJMD0rjVLVWGGehlDn4WdUkp0+AudwSkTCrhESZ6iO/jpLPEEGFye7FtrVMFHv1ZFejhCOoU1gLxzX5on78YLWmGlNDCSsQUoxzfcoG0Hd7x/e0lKX2R4F/RyF5TZZ3TV6wOCzPRPc0fLYfLnHJlJzRcGUYfgtk+19UFpIYkQMPPqttInUPqSu0QM1kRFh3mmcBbzOlrTllUcZzHQ7zHJuGivIl3ykZk7PjEeItbIOTwp+jCelw/Drujx4L6LLShiycivoFIzB7xrw3+iLMc56fuKThPuopEPqx+vVQCG6ytM93yfGDNnhb5Q==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <4B24D7D045B2C249833B4AB486EBB06C@namprd06.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: isoc.org
X-MS-Exchange-CrossTenant-Network-Message-Id: f125ae48-2956-4585-be56-08d58ac598f5
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Mar 2018 22:39:22.1600 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 89f84dfb-7285-4810-bc4d-8b9b5794554f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR06MB3298
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/5i2rcO_05dFlJwdqrevMulCZvdI>
Subject: Re: [sacm] CoSWID at IETF 101
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 15 Mar 2018 22:39:28 -0000

V2h5IHllc+KApiBpdCB3b3VsZOKApiANCg0KPiBPbiBNYXIgMTUsIDIwMTgsIGF0IDEwOjM3IFBN
LCBXYWx0ZXJtaXJlLCBEYXZpZCBBLiAoRmVkKSA8ZGF2aWQud2FsdGVybWlyZUBuaXN0Lmdvdj4g
d3JvdGU6DQo+IA0KPiBXb3VsZCBpdCBiZSBwb3NzaWJsZSB0byBnZXQgMTUgbWludXRlcyBvbiB0
aGUgYWdlbmRhIHRvIGRpc2N1c3MgdGhlIENvU1dJRCBkcmFmdD8NCj4gDQo+IFRoYW5rcywNCj4g
RGF2ZQ0KDQo=


From nobody Thu Mar 15 17:02:19 2018
Return-Path: <odonoghue@isoc.org>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F093126DD9 for <sacm@ietfa.amsl.com>; Thu, 15 Mar 2018 17:02:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level: 
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9,  DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=isoc.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kJ64wwBJIiQ0 for <sacm@ietfa.amsl.com>; Thu, 15 Mar 2018 17:02:10 -0700 (PDT)
Received: from NAM01-BN3-obe.outbound.protection.outlook.com (mail-bn3nam01on0058.outbound.protection.outlook.com [104.47.33.58]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 63FB7120713 for <sacm@ietf.org>; Thu, 15 Mar 2018 17:02:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=isoc.org; s=selector1;  h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=vSL2spjQUOKkCLQBypK6aSfyOjboCxKppRRjAyofw/8=; b=sdFzwQTy0WHP/6yvD6SeB+KA24LUmwoCRm+xLM90+b4cUiQPPPc6pZHQpnV5mjJoroVaIVBuwfXoVgLGanFD0tvhw48eUcZsWf+unPSAJ4Wu4oWWAZO7ndV4HBz6FBXPCKzf/jigi1QmeWmrwoWMq0VneiA0sFtEH2Dau/Sa42g=
Received: from BN6PR06MB3108.namprd06.prod.outlook.com (10.174.232.12) by BN6PR06MB3124.namprd06.prod.outlook.com (10.174.232.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.567.14; Fri, 16 Mar 2018 00:02:07 +0000
Received: from BN6PR06MB3108.namprd06.prod.outlook.com ([10.174.232.12]) by BN6PR06MB3108.namprd06.prod.outlook.com ([10.174.232.12]) with mapi id 15.20.0567.019; Fri, 16 Mar 2018 00:02:07 +0000
From: Karen O'Donoghue <odonoghue@isoc.org>
To: "sacm@ietf.org" <sacm@ietf.org>
Thread-Topic: Draft agenda for SACM @ IETF 101
Thread-Index: AQHTvLoF2gYVEABh/kyj5B2pQxZjnQ==
Date: Fri, 16 Mar 2018 00:02:07 +0000
Message-ID: <177E2129-E943-4434-812B-85AAF5A3A905@isoc.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=odonoghue@isoc.org; 
x-originating-ip: [2001:67c:1232:144:951c:4e8f:c3ab:16f3]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BN6PR06MB3124; 7:0GUIGWr3sJx0BsaAKJr35In3Azh8TrKTSccKRmHbbvPfb4AX+iReFdrtW9BuZdB00rcRWYPKy3nJfMTdyC13ns8uP37jZN6wZn5iv7wotEAalGvUhz38ybqsT1eSSNDPJZCTndFxciCIaX+2VsnkUarkobdRF3pFqDUh58bMkd3rbJCgkqzVHwLgWXGkvQjEVK6zZRO6scQiVS9/XtYM1G2SXOMp6azg2c4THrAJtNcPaZVwtvDfF9stzkN5AnNE
x-ms-exchange-antispam-srfa-diagnostics: SSOS;
x-ms-office365-filtering-correlation-id: c59722ed-f388-48c8-c84d-08d58ad1284a
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:BN6PR06MB3124; 
x-ms-traffictypediagnostic: BN6PR06MB3124:
x-microsoft-antispam-prvs: <BN6PR06MB31240371C15ADD0DB77819A3C2D70@BN6PR06MB3124.namprd06.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(72170088055959)(120809045254105)(166708455590820)(192374486261705); 
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(8121501046)(5005006)(3231221)(944501244)(52105095)(3002001)(93006095)(93001095)(10201501046)(6041310)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123562045)(20161123560045)(20161123558120)(6072148)(201708071742011); SRVR:BN6PR06MB3124; BCL:0; PCL:0; RULEID:; SRVR:BN6PR06MB3124; 
x-forefront-prvs: 0613912E23
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(376002)(39840400004)(39380400002)(346002)(396003)(199004)(189003)(97736004)(36756003)(5660300001)(305945005)(99286004)(7736002)(46003)(2501003)(8936002)(86362001)(2900100001)(3660700001)(3280700002)(82746002)(106356001)(2351001)(6116002)(186003)(8676002)(81156014)(1730700003)(81166006)(2906002)(68736007)(33656002)(6512007)(25786009)(6436002)(5640700003)(6306002)(77096007)(59450400001)(6916009)(105586002)(102836004)(6506007)(83716003)(316002)(966005)(478600001)(6486002)(14454004)(53936002); DIR:OUT; SFP:1101; SCL:1; SRVR:BN6PR06MB3124; H:BN6PR06MB3108.namprd06.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords;  A:1; MX:1; LANG:en; 
received-spf: None (protection.outlook.com: isoc.org does not designate permitted sender hosts)
x-microsoft-antispam-message-info: LaynyQciBoYwWLdQ35xV1iYYKpP+JxqQUbI9+cavWqrzWpQ/NEpsAssBv5A2d6PZjwNVpRrHkyfA2XsFjKMjixGGNf0mb6QbTsjOcM9o4k39udCrb/cpOJ/uJr2V+x/BrBKtQ0Pl7flkKUyGM7VxCvpHbCu1jlU78qS5dSJVXgmKAU/mK/8U74IE1Uc1CmkVO5UF3kG7Vmv+MTfA6e29H3Laz1zAURGLxVZLxlCVHTYGoVaB8sy4zO2fey67WiPreSsuEqx76taSHMEHbfoaQ/g0Jzc3NRUTsb1m2YSsW/DuaUMaWe/Cfs/ZdR+KlI3nnjZ3ZuBogFqxHyTWxALyUQ==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="utf-8"
Content-ID: <5B77FD6F08957043A3E2ECF0CC8324D3@namprd06.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: isoc.org
X-MS-Exchange-CrossTenant-Network-Message-Id: c59722ed-f388-48c8-c84d-08d58ad1284a
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Mar 2018 00:02:07.0643 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 89f84dfb-7285-4810-bc4d-8b9b5794554f
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR06MB3124
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/F1kFXSN-FzUoqtj73fB4jJz3rGU>
Subject: [sacm] Draft agenda for SACM @ IETF 101
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 16 Mar 2018 00:02:17 -0000
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From nobody Sun Mar 18 09:42:47 2018
Return-Path: <noreply@github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E05CB128961 for <sacm@ietfa.amsl.com>; Sun, 18 Mar 2018 09:42:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.464
X-Spam-Level: 
X-Spam-Status: No, score=-5.464 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_20=1.546, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hLBiCW7p1D0J for <sacm@ietfa.amsl.com>; Sun, 18 Mar 2018 09:42:44 -0700 (PDT)
Received: from out-7.smtp.github.com (out-7.smtp.github.com [192.30.252.198]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4B4A112895E for <sacm@ietf.org>; Sun, 18 Mar 2018 09:42:44 -0700 (PDT)
Date: Sun, 18 Mar 2018 09:42:43 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com; s=pf2014; t=1521391363; bh=c3VdneNZbx5KIWZhQvVRldRYuG/jmOOQPpYIvXjUtms=; h=Date:From:Reply-To:To:Cc:Subject:List-ID:List-Archive:List-Post: List-Unsubscribe:From; b=wfr0utDj/oLA6wzs4RP+pyccGJ8ZJrKDQLQ0JLqYWu7R6UFKLEU7wkCbgh6R2ynVE OwBL9jiMVsYUQgL/hUTD8w6nDyLUX/58B9DkNmwoccwY5xK0llIIV/38Mv8k7zKsX8 QhQz8bhLrbSq1j2C2bHWE1nXBa+7VypCWCimwWQ0=
From: adammontville <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-terminology <reply+00a6c4d108f981dcef1ec446701b6d5f632da7876ff1c31392cf0000000116c6590392a169ce124119c2@reply.github.com>
To: sacmwg/draft-ietf-sacm-terminology <draft-ietf-sacm-terminology@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-terminology/issues/86@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5aae970347291_68663fda8c636f2c645322"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: adammontville
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/h3OxPXFTB6Rj5-lp2viOhI7O0L0>
Subject: [sacm] [sacmwg/draft-ietf-sacm-terminology] Bring back expositional text (#86)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 18 Mar 2018 16:42:46 -0000

----==_mimepart_5aae970347291_68663fda8c636f2c645322
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Identify expositional text that was removed from 13 by 14 and replace it as expositional text - consider rewording them.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/86
----==_mimepart_5aae970347291_68663fda8c636f2c645322
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

<p>Identify expositional text that was removed from 13 by 14 and replace it as expositional text - consider rewording them.</p>

<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">&mdash;<br />You are receiving this because you are subscribed to this thread.<br />Reply to this email directly, <a href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/86">view it on GitHub</a>, or <a href="https://github.com/notifications/unsubscribe-auth/AKbE0XK4UOxAjzlWcaQvA8tiMa7czqBNks5tfo6DgaJpZM4SvRaJ">mute the thread</a>.<img src="https://github.com/notifications/beacon/AKbE0c76fqBMVE6lpcG5wOqtxdPl8uYDks5tfo6DgaJpZM4SvRaJ.gif" height="1" width="1" alt="" /></p>
<div itemscope itemtype="http://schema.org/EmailMessage">
<div itemprop="action" itemscope itemtype="http://schema.org/ViewAction">
  <link itemprop="url" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/86"></link>
  <meta itemprop="name" content="View Issue"></meta>
</div>
<meta itemprop="description" content="View this Issue on GitHub"></meta>
</div>

<script type="application/json" data-scope="inboxmarkup">{"api_version":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-terminology","title":"sacmwg/draft-ietf-sacm-terminology","subtitle":"GitHub repository","main_image_url":"https://cloud.githubusercontent.com/assets/143418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology"}},"updates":{"snippets":[{"icon":"DESCRIPTION","message":"Bring back expositional text (#86)"}],"action":{"name":"View Issue","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/86"}}}</script>
----==_mimepart_5aae970347291_68663fda8c636f2c645322--


From nobody Sun Mar 18 09:50:42 2018
Return-Path: <noreply@github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4CC2C126C25 for <sacm@ietfa.amsl.com>; Sun, 18 Mar 2018 09:50:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.464
X-Spam-Level: 
X-Spam-Status: No, score=-5.464 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_20=1.546, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dAjWkC79m30b for <sacm@ietfa.amsl.com>; Sun, 18 Mar 2018 09:50:32 -0700 (PDT)
Received: from out-6.smtp.github.com (out-6.smtp.github.com [192.30.252.197]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A76DF128961 for <sacm@ietf.org>; Sun, 18 Mar 2018 09:50:32 -0700 (PDT)
Date: Sun, 18 Mar 2018 09:50:31 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com; s=pf2014; t=1521391831; bh=e8VM4ECmyLq3hgkijkwSPN65JZv1u5ObtS1kQ1wcH6I=; h=Date:From:Reply-To:To:Cc:Subject:List-ID:List-Archive:List-Post: List-Unsubscribe:From; b=jFzTPZaXLVb/qd+9/FYnKUclxtd30LdIxdhoM/HW088jxJAwYlkk/45OrEOXF9G6s wHO/Cje4bqXGqdp5Oat62Gckeoc9kPhU+cELAalgJDMRg3mQ1VJ7EEhTSAkD0Ref+O giUPIzXxB/dMHR36RBvypzK3W7s6JkmsD9jlGvOQ=
From: adammontville <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-terminology <reply+00a6c4d143f5d76ed6ca280ab876aa358dbbe99a7cf6915d92cf0000000116c65ad792a169ce12411c3f@reply.github.com>
To: sacmwg/draft-ietf-sacm-terminology <draft-ietf-sacm-terminology@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-terminology/issues/87@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5aae98d7576b3_30e3fda8c636f2c652313"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: adammontville
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/YtvQ69js2dbkhjEnc_hHDRnjGdo>
Subject: [sacm] [sacmwg/draft-ietf-sacm-terminology] Bring back Hardware Component (#87)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 18 Mar 2018 16:50:34 -0000

----==_mimepart_5aae98d7576b3_30e3fda8c636f2c652313
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Hardware Component from 13 into 15... Segregate the definition from exposition.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/87
----==_mimepart_5aae98d7576b3_30e3fda8c636f2c652313
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

<p>Hardware Component from 13 into 15... Segregate the definition from exposition.</p>

<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">&mdash;<br />You are receiving this because you are subscribed to this thread.<br />Reply to this email directly, <a href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/87">view it on GitHub</a>, or <a href="https://github.com/notifications/unsubscribe-auth/AKbE0UIm6zJlGW2U8TJDU987fRTM9JyQks5tfpBXgaJpZM4SvRnV">mute the thread</a>.<img src="https://github.com/notifications/beacon/AKbE0QpbfJMtA5l6sjjdxHWarRRGCxFFks5tfpBXgaJpZM4SvRnV.gif" height="1" width="1" alt="" /></p>
<div itemscope itemtype="http://schema.org/EmailMessage">
<div itemprop="action" itemscope itemtype="http://schema.org/ViewAction">
  <link itemprop="url" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/87"></link>
  <meta itemprop="name" content="View Issue"></meta>
</div>
<meta itemprop="description" content="View this Issue on GitHub"></meta>
</div>

<script type="application/json" data-scope="inboxmarkup">{"api_version":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-terminology","title":"sacmwg/draft-ietf-sacm-terminology","subtitle":"GitHub repository","main_image_url":"https://cloud.githubusercontent.com/assets/143418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology"}},"updates":{"snippets":[{"icon":"DESCRIPTION","message":"Bring back Hardware Component (#87)"}],"action":{"name":"View Issue","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/87"}}}</script>
----==_mimepart_5aae98d7576b3_30e3fda8c636f2c652313--


From nobody Mon Mar 19 00:18:23 2018
Return-Path: <noreply@github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6898B120721 for <sacm@ietfa.amsl.com>; Mon, 19 Mar 2018 00:18:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.998
X-Spam-Level: 
X-Spam-Status: No, score=-6.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_32=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hoAS6AYJFyuf for <sacm@ietfa.amsl.com>; Mon, 19 Mar 2018 00:18:21 -0700 (PDT)
Received: from github-smtp2a-ext-cp1-prd.iad.github.net (github-smtp2-ext5.iad.github.net [192.30.252.196]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E34BE1201F2 for <sacm@ietf.org>; Mon, 19 Mar 2018 00:18:20 -0700 (PDT)
Date: Mon, 19 Mar 2018 00:18:20 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com; s=pf2014; t=1521443900; bh=623Iv1BNFnE9O8OSMQyYfE+qshFPzgsA8XmMlsZuE9s=; h=From:Reply-To:To:Cc:Subject:List-ID:List-Archive:List-Post: List-Unsubscribe:From; b=2f72ROq8+9uSzST1FIe76zi070PjSEjOapMGJjHhhzKBf2cEFDCxRHIeoXEuJIZKS KlpgD9A2DZCyeHNeAfLVG5eZN4sXcKmq8SOkjt7plYa0dudjMF8thEx9Tpc2LWlzvT 6B3YN57omUMQNrKPegzdOSgZYkaWsKUUnuF8gurs=
From: adammontville <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-terminology <reply+00a6c4d16c93740bd694bb496d7adfa0681503c3ff5dc3fe92cf0000000116c7263c92a169ce12429c13@reply.github.com>
To: sacmwg/draft-ietf-sacm-terminology <draft-ietf-sacm-terminology@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-terminology/pull/88@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5aaf643c415c8_22882adb7e41eec82686e0"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: adammontville
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/mdMGxPv0aKYStuLCnbs8lFgQvLU>
Subject: [sacm] [sacmwg/draft-ietf-sacm-terminology] Terminology reconciliation (#88)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Mar 2018 07:18:22 -0000

----==_mimepart_5aaf643c415c8_22882adb7e41eec82686e0
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Brought back Hardware Component and various expositional texts.
You can view, comment on, or merge this pull request online at:

  https://github.com/sacmwg/draft-ietf-sacm-terminology/pull/88

-- Commit Summary --

  * Segregating interaction model definition from exposition (Issue #65)
  * Addressed six issues
  * Removed "asset"
  * Reconciliation -13 to -14

-- File Changes --

    M draft-ietf-sacm-terminology.md (74)

-- Patch Links --

https://github.com/sacmwg/draft-ietf-sacm-terminology/pull/88.patch
https://github.com/sacmwg/draft-ietf-sacm-terminology/pull/88.diff

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-terminology/pull/88

----==_mimepart_5aaf643c415c8_22882adb7e41eec82686e0
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

<p>Brought back Hardware Component and various expositional texts.</p>

<hr>

<h4>You can view, comment on, or merge this pull request online at:</h4>
<p>&nbsp;&nbsp;<a href='https://github.com/sacmwg/draft-ietf-sacm-terminology/pull/88'>https://github.com/sacmwg/draft-ietf-sacm-terminology/pull/88</a></p>

<h4>Commit Summary</h4>
<ul>
  <li>Segregating interaction model definition from exposition (Issue #65)</li>
  <li>Addressed six issues</li>
  <li>Removed &quot;asset&quot;</li>
  <li>Reconciliation -13 to -14</li>
</ul>

<h4>File Changes</h4>
<ul>
  <li>
    <strong>M</strong>
    <a href="https://github.com/sacmwg/draft-ietf-sacm-terminology/pull/88/files#diff-0">draft-ietf-sacm-terminology.md</a>
    (74)
  </li>
</ul>

<h4>Patch Links:</h4>
<ul>
  <li><a href='https://github.com/sacmwg/draft-ietf-sacm-terminology/pull/88.patch'>https://github.com/sacmwg/draft-ietf-sacm-terminology/pull/88.patch</a></li>
  <li><a href='https://github.com/sacmwg/draft-ietf-sacm-terminology/pull/88.diff'>https://github.com/sacmwg/draft-ietf-sacm-terminology/pull/88.diff</a></li>
</ul>

<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">&mdash;<br />You are receiving this because you are subscribed to this thread.<br />Reply to this email directly, <a href="https://github.com/sacmwg/draft-ietf-sacm-terminology/pull/88">view it on GitHub</a>, or <a href="https://github.com/notifications/unsubscribe-auth/AKbE0Yg1ZMVT6GHmSBR5LIION2VfAXXXks5tf1u8gaJpZM4SvsH0">mute the thread</a>.<img src="https://github.com/notifications/beacon/AKbE0SjHYM0SSVkxRbHumDwQvXywuhT-ks5tf1u8gaJpZM4SvsH0.gif" height="1" width="1" alt="" /></p>
<div itemscope itemtype="http://schema.org/EmailMessage">
<div itemprop="action" itemscope itemtype="http://schema.org/ViewAction">
  <link itemprop="url" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/pull/88"></link>
  <meta itemprop="name" content="View Pull Request"></meta>
</div>
<meta itemprop="description" content="View this Pull Request on GitHub"></meta>
</div>

<script type="application/json" data-scope="inboxmarkup">{"api_version":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-terminology","title":"sacmwg/draft-ietf-sacm-terminology","subtitle":"GitHub repository","main_image_url":"https://cloud.githubusercontent.com/assets/143418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology"}},"updates":{"snippets":[{"icon":"DESCRIPTION","message":"Terminology reconciliation (#88)"}],"action":{"name":"View Pull Request","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology/pull/88"}}}</script>

----==_mimepart_5aaf643c415c8_22882adb7e41eec82686e0--


From nobody Mon Mar 19 00:18:49 2018
Return-Path: <bounces+848413-495d-sacm=ietf.org@sgmail.github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB83412420B for <sacm@ietfa.amsl.com>; Mon, 19 Mar 2018 00:18:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.391
X-Spam-Level: 
X-Spam-Status: No, score=-0.391 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_24=1.618, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MROp7VuEPbje for <sacm@ietfa.amsl.com>; Mon, 19 Mar 2018 00:18:45 -0700 (PDT)
Received: from o3.sgmail.github.com (o3.sgmail.github.com [192.254.112.98]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1D9CD1242F7 for <sacm@ietf.org>; Mon, 19 Mar 2018 00:18:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=github.com;  h=from:reply-to:to:cc:in-reply-to:references:subject:mime-version:content-type:content-transfer-encoding:list-id:list-archive:list-post:list-unsubscribe; s=s20150108; bh=g9frQDOfy1N49CkuW09V5pmrDU8=; b=eZQjoBJJPDx3z1P4 a+EehSXsEjXb0o5d8G3XcAqofawMiJd4WzvzMcPuAos7G/VDcNj8XicsKgFkh7nL qQtL/HF+HkhIiyUd73k5DEwxqPTdJNMyY0Pr/f2PXx9qHcgyTDR/3rsAiBj2ttKs n8EJD0kTBceCVWzaqwq1AY1dKvo=
Received: by filter0316p1iad2.sendgrid.net with SMTP id filter0316p1iad2-6792-5AAF6453-1F 2018-03-19 07:18:43.672966143 +0000 UTC
Received: from smtp.github.com (out-3.smtp.github.com [192.30.252.194]) by ismtpd0008p1iad1.sendgrid.net (SG) with ESMTP id ytyzKsAaTAKtQlK3-HJYPg for <sacm@ietf.org>; Mon, 19 Mar 2018 07:18:43.673 +0000 (UTC)
Date: Mon, 19 Mar 2018 07:18:43 +0000 (UTC)
From: adammontville <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-terminology <reply+00a6c4d193122f7a92308aff2cf8bef67d842cb8d7b7ccf292cf0000000116c7265392a169ce12429c13@reply.github.com>
To: sacmwg/draft-ietf-sacm-terminology <draft-ietf-sacm-terminology@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-terminology/pull/88/issue_event/1527824853@github.com>
In-Reply-To: <sacmwg/draft-ietf-sacm-terminology/pull/88@github.com>
References: <sacmwg/draft-ietf-sacm-terminology/pull/88@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5aaf6453928d1_7b2d2af94d57eed41972d4"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: adammontville
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
X-SG-EID: UtArl2HfP/Y+1oZ8SNY9HzJeq8qZPQgx8+9IjS+XGSiu3Ez9JICYklIy2e74KMwWH90Xj5QaRfjONp GleSmhtx7xVphldtbc/StSq/Q1ogHrcdRjyuhkjXjGJ1d0nHdbvYusK15BomcNlC/D3k21DntOE3of SdqxQj/6F1UcoF7IbP8/zYfoCzS1CKoFtRRL0SSsacMKwd7ks9Vr/sIQGA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/w50Rpypbuye4ORx0Qi3tQO7cVw4>
Subject: Re: [sacm] [sacmwg/draft-ietf-sacm-terminology] Terminology reconciliation (#88)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Mar 2018 07:18:47 -0000

----==_mimepart_5aaf6453928d1_7b2d2af94d57eed41972d4
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Merged #88.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-terminology/pull/88#event-1527824853
----==_mimepart_5aaf6453928d1_7b2d2af94d57eed41972d4
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

<p>Merged <a class="issue-link js-issue-link" data-error-text="Failed to load issue title" data-id="306355219" data-permission-text="Issue title is private" data-url="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/88" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/pull/88">#88</a>.</p>

<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">&mdash;<br />You are receiving this because you are subscribed to this thread.<br />Reply to this email directly, <a href="https://github.com/sacmwg/draft-ietf-sacm-terminology/pull/88#event-1527824853">view it on GitHub</a>, or <a href="https://github.com/notifications/unsubscribe-auth/AKbE0RJrntFKFHjX8gVfoQRX-xD1w1jmks5tf1vTgaJpZM4SvsH0">mute the thread</a>.<img src="https://github.com/notifications/beacon/AKbE0Xq6QAAfa5crOHji7emNWR1r7Vkdks5tf1vTgaJpZM4SvsH0.gif" height="1" width="1" alt="" /></p>
<div itemscope itemtype="http://schema.org/EmailMessage">
<div itemprop="action" itemscope itemtype="http://schema.org/ViewAction">
  <link itemprop="url" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/pull/88#event-1527824853"></link>
  <meta itemprop="name" content="View Pull Request"></meta>
</div>
<meta itemprop="description" content="View this Pull Request on GitHub"></meta>
</div>

<script type="application/json" data-scope="inboxmarkup">{"api_version":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-terminology","title":"sacmwg/draft-ietf-sacm-terminology","subtitle":"GitHub repository","main_image_url":"https://cloud.githubusercontent.com/assets/143418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology"}},"updates":{"snippets":[{"icon":"DESCRIPTION","message":"Merged #88."}],"action":{"name":"View Pull Request","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology/pull/88#event-1527824853"}}}</script>
----==_mimepart_5aaf6453928d1_7b2d2af94d57eed41972d4--


From nobody Mon Mar 19 08:03:20 2018
Return-Path: <inacio@cert.org>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A6F33126C0F; Mon, 19 Mar 2018 08:03:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cert.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Vp00iKMCD3xS; Mon, 19 Mar 2018 08:03:09 -0700 (PDT)
Received: from veto.sei.cmu.edu (veto.sei.cmu.edu [147.72.252.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E5C3812DA14; Mon, 19 Mar 2018 08:03:04 -0700 (PDT)
Received: from delp.sei.cmu.edu (delp.sei.cmu.edu [10.64.21.31]) by veto.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id w2JF33XQ014647; Mon, 19 Mar 2018 11:03:03 -0400
DKIM-Filter: OpenDKIM Filter v2.11.0 veto.sei.cmu.edu w2JF33XQ014647
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cert.org; s=yc2bmwvrj62m; t=1521471783; bh=Zp4IUdR7HQB/WciTIHtuXsplFGVKjbwztZ6kcRXfGl8=; h=From:To:CC:Subject:Date:From; b=L/F2JEjtDPGYHCmLY0mx8zQmmb4j2xMveKFhCsiA2ZOTKvfiBG/RIeAepXE3W+5j2 XmcSeLSg2NjEzEtQSZauUxK3PW+vGfz5uLlEWKshtx9jA/BjjQsemUc5WstTDT8Ri3 aJzpjJe6QE2h00YlIWo+P/X0IVyP+hb6m2tHmQmI=
Received: from CASCADE.ad.sei.cmu.edu (cascade.ad.sei.cmu.edu [10.64.28.248]) by delp.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id w2JF31UB046914; Mon, 19 Mar 2018 11:03:01 -0400
Received: from MARATHON.ad.sei.cmu.edu ([10.64.28.250]) by CASCADE.ad.sei.cmu.edu ([10.64.28.248]) with mapi id 14.03.0361.001; Mon, 19 Mar 2018 11:03:00 -0400
From: Chris Inacio <inacio@cert.org>
To: "draft-ietf-sacm-coswid@ietf.org" <draft-ietf-sacm-coswid@ietf.org>
CC: "sacm@ietf.org" <sacm@ietf.org>
Thread-Topic: coswid-04 review
Thread-Index: AQHTv5NfR6buMpaUpkWm9jPsZs9Zjw==
Date: Mon, 19 Mar 2018 15:03:00 +0000
Message-ID: <C01D9D77-CBA8-4652-A17B-F7458CE26F6F@cert.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.64.105.85]
Content-Type: multipart/alternative; boundary="_000_C01D9D77CBA84652A17BF7458CE26F6Fcertorg_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/UDaPOJ7irPAnzoySUm41oda2l7k>
Subject: [sacm] coswid-04 review
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 19 Mar 2018 15:03:18 -0000

--_000_C01D9D77CBA84652A17BF7458CE26F6Fcertorg_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_C01D9D77CBA84652A17BF7458CE26F6Fcertorg_
Content-Type: text/html; charset="utf-8"
Content-ID: <B5FA82E9C2BC6D41BDEB51FE203FE727@sei.cmu.edu>
Content-Transfer-Encoding: base64
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--_000_C01D9D77CBA84652A17BF7458CE26F6Fcertorg_--


From nobody Mon Mar 19 17:12:37 2018
Return-Path: <inacio@cert.org>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8ED5212D864; Mon, 19 Mar 2018 17:12:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.892
X-Spam-Level: 
X-Spam-Status: No, score=-0.892 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, LOCALPART_IN_SUBJECT=1.107, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cert.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TTRiaczGXRC3; Mon, 19 Mar 2018 17:12:34 -0700 (PDT)
Received: from veto.sei.cmu.edu (veto.sei.cmu.edu [147.72.252.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 696A0126BF6; Mon, 19 Mar 2018 17:12:31 -0700 (PDT)
Received: from delp.sei.cmu.edu (delp.sei.cmu.edu [10.64.21.31]) by veto.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id w2K0CUQU036660; Mon, 19 Mar 2018 20:12:30 -0400
DKIM-Filter: OpenDKIM Filter v2.11.0 veto.sei.cmu.edu w2K0CUQU036660
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cert.org; s=yc2bmwvrj62m; t=1521504750; bh=u0UojGvvXL6DQZMUOB4qzYh4q2jkuuJoQU9VWI9ROUI=; h=From:To:CC:Subject:Date:From; b=UmG7M9LTpn6hAXAbrvy8mJ2NtSDUfzVIuszEJBZN/ExrqsZPpQqGRC3UkXlqqMsOi b/dtUpftPnPVhkhXfMIST/Y1+yHJP+DA+DryC8yKM6sRZT7YK8UZWuTVkkM+o31Z6Q Fa1hY+AzcNNHD/mjiRshpvoeHHl4rYpQy1x38g2g=
Received: from CASCADE.ad.sei.cmu.edu (cascade.ad.sei.cmu.edu [10.64.28.248]) by delp.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id w2K0CPrS032822; Mon, 19 Mar 2018 20:12:25 -0400
Received: from MARATHON.ad.sei.cmu.edu ([10.64.28.250]) by CASCADE.ad.sei.cmu.edu ([10.64.28.248]) with mapi id 14.03.0361.001; Mon, 19 Mar 2018 20:12:24 -0400
From: Chris Inacio <inacio@cert.org>
To: "draft-ietf-sacm-rolie-softwaredescriptor@ietf.org" <draft-ietf-sacm-rolie-softwaredescriptor@ietf.org>
CC: "sacm@ietf.org" <sacm@ietf.org>
Thread-Topic: draft-ietf-sacm-rolie-softwaredescriptor
Thread-Index: AQHTv+AfHQd3Mmt8D0u2wDdHkvWqRA==
Date: Tue, 20 Mar 2018 00:12:24 +0000
Message-ID: <etPan.5ab0514f.c8aacbc.ee06@cert.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.64.104.116]
Content-Type: multipart/alternative; boundary="_000_etPan5ab0514fc8aacbcee06certorg_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/N38wVRaea3911yM09xlVSdrGt8g>
Subject: [sacm] draft-ietf-sacm-rolie-softwaredescriptor
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 20 Mar 2018 00:12:36 -0000

--_000_etPan5ab0514fc8aacbcee06certorg_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_etPan5ab0514fc8aacbcee06certorg_
Content-Type: text/html; charset="utf-8"
Content-ID: <5698E8A5B3FE3645AD53ECFEDDDB4B7C@sei.cmu.edu>
Content-Transfer-Encoding: base64

PGh0bWw+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIgY29udGVudD0i
dGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxzdHlsZT4NCmJvZHkgew0KCWZvbnQtZmFtaWx5
OiAiSGVsdmV0aWNhIE5ldWUiLCBIZWx2ZXRpY2EsIEFyaWFsLCBzYW5zLXNlcmlmOw0KCXBhZGRp
bmc6MWVtOw0KCW1hcmdpbjphdXRvOw0KCWJhY2tncm91bmQ6I2ZlZmVmZTsNCn0NCg0KaDEsIGgy
LCBoMywgaDQsIGg1LCBoNiB7DQoJZm9udC13ZWlnaHQ6IGJvbGQ7DQp9DQoNCmgxIHsNCgljb2xv
cjogIzAwMDAwMDsNCglmb250LXNpemU6IDI4cHQ7DQp9DQoNCmgyIHsNCglib3JkZXItYm90dG9t
OiAxcHggc29saWQgI0NDQ0NDQzsNCgljb2xvcjogIzAwMDAwMDsNCglmb250LXNpemU6IDI0cHg7
DQp9DQoNCmgzIHsNCglmb250LXNpemU6IDE4cHg7DQp9DQoNCmg0IHsNCglmb250LXNpemU6IDE2
cHg7DQp9DQoNCmg1IHsNCglmb250LXNpemU6IDE0cHg7DQp9DQoNCmg2IHsNCgljb2xvcjogIzc3
Nzc3NzsNCgliYWNrZ3JvdW5kLWNvbG9yOiBpbmhlcml0Ow0KCWZvbnQtc2l6ZTogMTRweDsNCn0N
Cg0KaHIgew0KCWhlaWdodDogMC4yZW07DQoJYm9yZGVyOiAwOw0KCWNvbG9yOiAjQ0NDQ0NDOw0K
CWJhY2tncm91bmQtY29sb3I6ICNDQ0NDQ0M7DQogICAgZGlzcGxheTogaW5oZXJpdDsNCn0NCg0K
cCwgYmxvY2txdW90ZSwgdWwsIG9sLCBkbCwgbGksIHRhYmxlLCBwcmUgew0KCW1hcmdpbjogMTVw
eCAwOw0KfQ0KDQphLCBhOnZpc2l0ZWQgew0KCWNvbG9yOiAjNDE4M0M0Ow0KCWJhY2tncm91bmQt
Y29sb3I6IGluaGVyaXQ7DQoJdGV4dC1kZWNvcmF0aW9uOiBub25lOw0KfQ0KDQojbWVzc2FnZSB7
DQoJYm9yZGVyLXJhZGl1czogNnB4Ow0KCWJvcmRlcjogMXB4IHNvbGlkICNjY2M7DQoJZGlzcGxh
eTpibG9jazsNCgl3aWR0aDoxMDAlOw0KCWhlaWdodDo2MHB4Ow0KCW1hcmdpbjo2cHggMHB4Ow0K
fQ0KDQpidXR0b24sICN3cyB7DQoJZm9udC1zaXplOiAxMiBwdDsNCglwYWRkaW5nOiA0cHggNnB4
Ow0KCWJvcmRlci1yYWRpdXM6IDVweDsNCglib3JkZXI6IDFweCBzb2xpZCAjYmJiOw0KCWJhY2tn
cm91bmQtY29sb3I6ICNlZWU7DQp9DQoNCmNvZGUsIHByZSwgI3dzLCAjbWVzc2FnZSB7DQoJZm9u
dC1mYW1pbHk6IE1vbmFjbzsNCglmb250LXNpemU6IDEwcHQ7DQoJYm9yZGVyLXJhZGl1czogM3B4
Ow0KCWJhY2tncm91bmQtY29sb3I6ICNGOEY4Rjg7DQoJY29sb3I6IGluaGVyaXQ7DQp9DQoNCmNv
ZGUgew0KCWJvcmRlcjogMXB4IHNvbGlkICNFQUVBRUE7DQoJbWFyZ2luOiAwIDJweDsNCglwYWRk
aW5nOiAwIDVweDsNCn0NCg0KcHJlIHsNCglib3JkZXI6IDFweCBzb2xpZCAjQ0NDQ0NDOw0KCW92
ZXJmbG93OiBhdXRvOw0KCXBhZGRpbmc6IDRweCA4cHg7DQp9DQoNCnByZSA+IGNvZGUgew0KCWJv
cmRlcjogMDsNCgltYXJnaW46IDA7DQoJcGFkZGluZzogMDsNCn0NCg0KI3dzIHsgYmFja2dyb3Vu
ZC1jb2xvcjogI2Y4ZjhmODsgfQ0KDQoNCi5ibG9vcF9tYXJrZG93biB0YWJsZSB7DQpib3JkZXIt
Y29sbGFwc2U6IGNvbGxhcHNlOyAgDQpmb250LWZhbWlseTogSGVsdmV0aWNhLCBhcmlhbCwgZnJl
ZXNhbnMsIGNsZWFuLCBzYW5zLXNlcmlmOyAgDQpjb2xvcjogcmdiKDUxLCA1MSwgNTEpOyAgDQpm
b250LXNpemU6IDE1cHg7IGxpbmUtaGVpZ2h0OiAyNXB4Ow0KcGFkZGluZzogMDsgfQ0KDQouYmxv
b3BfbWFya2Rvd24gdGFibGUgdHIgew0KYm9yZGVyLXRvcDogMXB4IHNvbGlkICNjY2NjY2M7DQpi
YWNrZ3JvdW5kLWNvbG9yOiB3aGl0ZTsNCm1hcmdpbjogMDsNCnBhZGRpbmc6IDA7IH0NCiAgICAg
DQouYmxvb3BfbWFya2Rvd24gdGFibGUgdHI6bnRoLWNoaWxkKDJuKSB7DQpiYWNrZ3JvdW5kLWNv
bG9yOiAjZjhmOGY4OyB9DQoNCi5ibG9vcF9tYXJrZG93biB0YWJsZSB0ciB0aCB7DQpmb250LXdl
aWdodDogYm9sZDsNCmJvcmRlcjogMXB4IHNvbGlkICNjY2NjY2M7DQptYXJnaW46IDA7DQpwYWRk
aW5nOiA2cHggMTNweDsgfQ0KDQouYmxvb3BfbWFya2Rvd24gdGFibGUgdHIgdGQgew0KYm9yZGVy
OiAxcHggc29saWQgI2NjY2NjYzsNCm1hcmdpbjogMDsNCnBhZGRpbmc6IDZweCAxM3B4OyB9DQoN
Ci5ibG9vcF9tYXJrZG93biB0YWJsZSB0ciB0aCA6Zmlyc3QtY2hpbGQsIHRhYmxlIHRyIHRkIDpm
aXJzdC1jaGlsZCB7DQptYXJnaW4tdG9wOiAwOyB9DQoNCi5ibG9vcF9tYXJrZG93biB0YWJsZSB0
ciB0aCA6bGFzdC1jaGlsZCwgdGFibGUgdHIgdGQgOmxhc3QtY2hpbGQgew0KbWFyZ2luLWJvdHRv
bTogMDsgfQ0KDQouYmxvb3BfbWFya2Rvd24gYmxvY2txdW90ZXsNCiAgYm9yZGVyLWxlZnQ6IDRw
eCBzb2xpZCAjZGRkZGRkOw0KICBwYWRkaW5nOiAwIDE1cHg7DQogIGNvbG9yOiAjNzc3Nzc3OyB9
DQogIGJsb2NrcXVvdGUgPiA6Zmlyc3QtY2hpbGQgew0KICAgIG1hcmdpbi10b3A6IDA7IH0NCiAg
YmxvY2txdW90ZSA+IDpsYXN0LWNoaWxkIHsNCiAgICBtYXJnaW4tYm90dG9tOiAwOyB9DQoNCmNv
ZGUsIHByZSwgI3dzLCAjbWVzc2FnZSB7DQogICAgd29yZC1icmVhazogbm9ybWFsOw0KICAgIHdv
cmQtd3JhcDogbm9ybWFsOw0KfQ0KDQpociB7DQogICAgZGlzcGxheTogaW5oZXJpdDsNCn0NCg0K
LmJsb29wX21hcmtkb3duIDpmaXJzdC1jaGlsZCB7DQogICAgLXdlYmtpdC1tYXJnaW4tYmVmb3Jl
OiAwOw0KfQ0KDQpjb2RlLCBwcmUsICN3cywgI21lc3NhZ2Ugew0KICAgIGZvbnQtZmFtaWx5OiBN
ZW5sbywgQ29uc29sYXMsIExpYmVyYXRpb24gTW9ubywgQ291cmllciwgbW9ub3NwYWNlOw0KfQ0K
DQoNCi5zZW5kIHsgY29sb3I6Izc3YmI3NzsgfQ0KLnNlcnZlciB7IGNvbG9yOiM3Nzk5YmI7IH0N
Ci5lcnJvciB7IGNvbG9yOiNBQTAwMDA7IH08L3N0eWxlPg0KPC9oZWFkPg0KPGJvZHkgc3R5bGU9
IndvcmQtd3JhcDogYnJlYWstd29yZDsgLXdlYmtpdC1uYnNwLW1vZGU6IHNwYWNlOyBsaW5lLWJy
ZWFrOiBhZnRlci13aGl0ZS1zcGFjZTsiPg0KPGRpdiBjbGFzcz0iYmxvb3BfbWFya2Rvd24iPg0K
PHA+NS4xIC0g4oCcTm90ZSB0aGF0IGFzIHBlciB0aGlzIGRlZmluaXRpb24sIHRoaXMgaW5mb3Jt
YXRpb24gdHlwZSBwZXJ0YWlucyB0byBzdGF0aWMgc29mdHdhcmUsIHRoYXQgaXMsIGNvZGUgb24g
dGhlIGRpc2Mu4oCdIC0gbm90IGEgZmFuIG9mIOKAnGNvZGUgb24gZGlzY+KAnSwgdGhhdCBzZWVt
cyB0byBpbXByZWNpc2UuPC9wPg0KPHA+QWRkaXRpb25hbGx5LCB0aGUgZGVmaW5pdGlvbiBvZiBz
b2Z0d2FyZSBpbiBSRkM0OTQ5IGRlc2NyaWJlcyBzb2Z0d2FyZSBhcyBiZWluZyB2b2xhdGlsZSBv
biB0aGUgc3lzdGVtLjwvcD4NCjxwPlRoZSBhY3JvbnltIOKAnFNXROKAnSBpcyB1c2VkIHdpdGhv
dXQgc3RhdGluZyDigJxTb2Z0d2FyZSBEZXNjcmlwdG9yIChTV0Qp4oCdIHNvbWV3aGVyZSBmaXJz
dC48L3A+DQo8cD48L3A+DQo8L2Rpdj4NCjxkaXYgY2xhc3M9ImJsb29wX29yaWdpbmFsX2h0bWwi
PjxzdHlsZT5ib2R5e2ZvbnQtZmFtaWx5OlNvdXJjZSBTYW5zIFBybyxBcmlhbDtmb250LXNpemU6
MTNweH08L3N0eWxlPg0KPGRpdiBpZD0iYmxvb3BfY3VzdG9tZm9udCIgc3R5bGU9ImZvbnQtZmFt
aWx5OlNvdXJjZSBTYW5zIFBybyxBcmlhbDtmb250LXNpemU6MTNweDsgY29sb3I6IHJnYmEoMCww
LDAsMS4wKTsgbWFyZ2luOiAwcHg7IGxpbmUtaGVpZ2h0OiBhdXRvOyI+DQo8YnI+DQo8L2Rpdj4N
CjxkaXYgY2xhc3M9ImJsb29wX2NvbnRhaW5lciI+DQo8ZGl2IGNsYXNzPSJibG9vcF9mcmFtZSI+
PC9kaXY+DQo8L2Rpdj4NCjxicj4NCjxkaXYgaWQ9ImJsb29wX3NpZ25fMTUyMTQ3NDM1OTk1Mjk2
NzE2OCIgY2xhc3M9ImJsb29wX3NpZ24iPg0KPGRpdiBjbGFzcz0iYmxvb3BfbWFya2Rvd24iPg0K
PHA+PC9wPg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSJibG9vcF9vcmlnaW5hbF9odG1sIj4NCjxkaXYg
c3R5bGU9ImZvbnQtZmFtaWx5OmhlbHZldGljYSxhcmlhbDtmb250LXNpemU6MTNweCI+LS0mbmJz
cDs8YnI+DQpDaHJpcyBJbmFjaW88YnI+DQo8YSBocmVmPSJtYWlsdG86aW5hY2lvQGNlcnQub3Jn
Ij5pbmFjaW9AY2VydC5vcmc8L2E+PC9kaXY+DQo8ZGl2IHN0eWxlPSJmb250LWZhbWlseTpoZWx2
ZXRpY2EsYXJpYWw7Zm9udC1zaXplOjEzcHgiPjxicj4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2IGNs
YXNzPSJibG9vcF9tYXJrZG93biI+DQo8cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9kaXY+DQo8
ZGl2IGNsYXNzPSJibG9vcF9tYXJrZG93biI+DQo8cD48L3A+DQo8L2Rpdj4NCjwvYm9keT4NCjwv
aHRtbD4NCg==

--_000_etPan5ab0514fc8aacbcee06certorg_--


From nobody Wed Mar 21 03:59:13 2018
Return-Path: <david.waltermire@nist.gov>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9F4DD12DA51; Wed, 21 Mar 2018 03:59:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nistgov.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VtL-1AHKfFme; Wed, 21 Mar 2018 03:58:58 -0700 (PDT)
Received: from GCC01-DM2-obe.outbound.protection.outlook.com (mail-dm2gcc01on0091.outbound.protection.outlook.com [23.103.201.91]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 58B0212DFDB; Wed, 21 Mar 2018 03:58:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=nistgov.onmicrosoft.com; s=selector1-nist-gov; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=muYTIp4mgzURZZl+YD8uwcGw+AyJ3SxorOaxf3aPplE=; b=mfwMR6xrIdQtZX9PR+UsPWVlJLPbfXXxrNm+EWKXWc9L/qNXbZRl5m13Ii+Xd10OKoypWne4n4xHOTPOg40X0LXhOkQknZu/mB4KHcWVDIcuCXZC1Ws+VrwyZMc1EfbAQFayFGCesh9dB5A7nki7Zltp9Ac14aE7lg6iyhP+QmE=
Received: from BL0PR0901MB2306.namprd09.prod.outlook.com (52.132.18.148) by BL0PR0901MB2305.namprd09.prod.outlook.com (52.132.18.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.609.10; Wed, 21 Mar 2018 10:58:55 +0000
Received: from BL0PR0901MB2306.namprd09.prod.outlook.com ([fe80::a493:b067:10e0:5d51]) by BL0PR0901MB2306.namprd09.prod.outlook.com ([fe80::a493:b067:10e0:5d51%13]) with mapi id 15.20.0609.010; Wed, 21 Mar 2018 10:58:55 +0000
From: "Waltermire, David A. (Fed)" <david.waltermire@nist.gov>
To: Chris Inacio <inacio@cert.org>, "draft-ietf-sacm-coswid@ietf.org" <draft-ietf-sacm-coswid@ietf.org>
CC: "sacm@ietf.org" <sacm@ietf.org>
Thread-Topic: coswid-04 review
Thread-Index: AQHTv5NfR6buMpaUpkWm9jPsZs9Zj6PX2cel
Date: Wed, 21 Mar 2018 10:58:54 +0000
Message-ID: <BL0PR0901MB2306BE4A1336F99FC79DF27CF0D40@BL0PR0901MB2306.namprd09.prod.outlook.com>
References: <C01D9D77-CBA8-4652-A17B-F7458CE26F6F@cert.org>
In-Reply-To: <C01D9D77-CBA8-4652-A17B-F7458CE26F6F@cert.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=david.waltermire@nist.gov; 
x-originating-ip: [129.6.219.147]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; BL0PR0901MB2305; 7:OD6tw9wo0oHgrEYqF6kCkKwIQPsZ0vbUFYTNDBsyr+rALQOHxYk0h0U9LYoya/iaC9JSJwl1cDEQUuOkaDpIbKJSFsbIe1gktSIUvheN7ko/8CpdaN4Tjh4olkMbaKTwftii+IOoApMSNUggax0MQcdft1ixDKJB/bRstoTfZj9PFC8EBUAlf5FUkvesvUhsoTv0opNlBx1+BmuIfNFIGPpUwboc+zDMAm0qJfEFfQ0pG1o6ZxaL/7PfFMe4IedG
x-ms-exchange-antispam-srfa-diagnostics: SOS;
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 55b595cb-c46b-4a8e-c055-08d58f1abd59
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(7020095)(4652020)(48565401081)(5600026)(4604075)(3008032)(4534165)(4627221)(201703031133081)(201702281549075)(2017052603328)(7153060)(7193020); SRVR:BL0PR0901MB2305; 
x-ms-traffictypediagnostic: BL0PR0901MB2305:
x-microsoft-antispam-prvs: <BL0PR0901MB2305690FB219333E40944917F0AA0@BL0PR0901MB2305.namprd09.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(28532068793085)(166708455590820)(189930954265078)(176295241369792)(219752817060721);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040522)(2401047)(8121501046)(5005006)(3002001)(10201501046)(3231221)(944501322)(52105095)(93006095)(93001095)(6055026)(6041310)(20161123562045)(20161123558120)(20161123564045)(201703131423095)(201702281528075)(20161123555045)(201703061421075)(201703061406153)(20161123560045)(6072148)(201708071742011); SRVR:BL0PR0901MB2305; BCL:0; PCL:0; RULEID:; SRVR:BL0PR0901MB2305; 
x-forefront-prvs: 0618E4E7E1
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(346002)(376002)(366004)(39860400002)(396003)(39380400002)(57704003)(25584004)(199004)(189003)(8936002)(25786009)(86362001)(33656002)(4326008)(316002)(186003)(26005)(59450400001)(6506007)(53546011)(2950100002)(6606003)(66066001)(102836004)(2906002)(966005)(3280700002)(478600001)(6116002)(14454004)(3846002)(2900100001)(229853002)(97736004)(105586002)(606006)(106356001)(55016002)(53946003)(236005)(9686003)(7696005)(54896002)(6306002)(6246003)(5250100002)(2501003)(110136005)(7736002)(53936002)(76176011)(68736007)(19627405001)(5660300001)(3660700001)(74316002)(6436002)(81166006)(81156014)(345774005)(99286004)(8676002)(559001)(579004); DIR:OUT; SFP:1102; SCL:1; SRVR:BL0PR0901MB2305; H:BL0PR0901MB2306.namprd09.prod.outlook.com; FPR:; SPF:None; PTR:InfoNoRecords; A:1; MX:1; LANG:en; 
received-spf: None (protection.outlook.com: nist.gov does not designate permitted sender hosts)
x-microsoft-antispam-message-info: 9Vu+CxkEIPV2fH7jwJH8nv2pVXnoMTEoC2J3yHniMB0qIc/SgOSRhzGwhePfE/A5is4j8fQ+DqMXgR/0Esd8dGrc11IA0CEmSUthEsbUGyiLzr5Xz2BaaaFtyqsjaZEWCAYAfup+cGdcoasLCLRZCukIi3NMFFB3/hPCS30N5iEbJ3BYstdU1vKkleKPPKBSaYZIixSZ8KCZn4yq1/foJ0R1U4lGeNC1XrfN1LBz0m09jBmBZA1buFG/61muTJm4IUnlKHICxWzvMmgYMrSoWjuYTLQ0FH2rx0Vs+Tzk/d41sRKw1F8vZxPHVcSv/6tEAApTMPRmG9eEuAuDoAPcoA==
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_BL0PR0901MB2306BE4A1336F99FC79DF27CF0D40BL0PR0901MB2306_"
MIME-Version: 1.0
X-OriginatorOrg: nist.gov
X-MS-Exchange-CrossTenant-Network-Message-Id: 55b595cb-c46b-4a8e-c055-08d58f1abd59
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Mar 2018 10:58:54.8209 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 2ab5d82f-d8fa-4797-a93e-054655c61dec
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR0901MB2305
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/PvPqBcVcckcSae893ge95oCRDlc>
Subject: Re: [sacm] coswid-04 review
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Mar 2018 10:59:12 -0000

--_000_BL0PR0901MB2306BE4A1336F99FC79DF27CF0D40BL0PR0901MB2306_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

Chris,


Thank you for the detailed feedback!


Comments inline below marked [daw:].

I have addressed all of your feedback in the version posted to https://gith=
ub.com/david-waltermire-nist/draft-ietf-sacm-coswid. I will post this as -0=
5 later today once I complete an editorial pass through the document.

Please let me know if you have any questions or comments on the changes I h=
ave made to the draft.

Thanks,
Dave

________________________________
From: Chris Inacio <inacio@cert.org>
Sent: Monday, March 19, 2018 11:03 AM
To: draft-ietf-sacm-coswid@ietf.org
Cc: sacm@ietf.org
Subject: coswid-04 review

I assume this is blocked by the CDDL draft - waiting for WG chair.

[daw: Yes. The draft is in WGLC waiting for chair go-ahead.]

Also, I can=92t find in the CDDL draft the positional notation used
key =3D (nn: type)
Is this still valid CDDL?

[daw: I believe the syntax is compliant with the group syntax described in =
section 2.1.2 in the CDDL draft. The group syntax can be in the form of:

 _keytype_ : _valuetype_

This appears to still be allowed syntax.]


Do we need section 1.1?  What is it adding to the purpose of the document?

[daw: Section 1.1 provides operational context for the use of a SWID/CoSWID=
. It answers the "why does this specification matter? question, which I bel=
ieve is important for implementers to understand. It defines tag types whic=
h are useful in describing co-constraints later in the document and the ope=
rational model for how tag types support software inventory. The section is=
 just under 3 pages in length, which I believe is worth including to provid=
e the additional context around the draft.

What are your specific concerns with this section?]

If we keep it, then shouldn=92t the diagram on top of page 4 (diagrams numb=
ered please) be fixed to include a circular part with patches until removal=
?
[daw: I will add this to -05 along with figure numbers.]

Formatting for 1.1 P4; I think those are supposed to be some type of bullet=
ed list.

[daw: This was a formatting issue, which is fixed in -05.]

2 P3:
"A typical endpoint is capable of storing

   the CoSWID tag of installed software, a constrained-node might lack
   that capability.  CoSWID address these constraints and the
   corresponding specification is augmented to retain their usefulness
   in the thing-2-thing domain.=94


First use of CoSWID should be SWID, right?


[daw: Yep. Fixed.]


2 P3: editorial NIT, ending a sentence with =93in=94.  Rephrase for improve=
d readability.


[daw: Fixed.]


2.1 P1: "The items are ordered ensure that tag=94 should be "ensuring=94.


[daw: I removed the ordering text since this information is actually unorde=
red in a CBOR map. We may want to consider using an array if ordering is im=
portant.]


2.1: should =93global-attributes=94 be included in the ordering list somewh=
ere?


[daw: See above.]


2.1: =93software-version=94 - is there any guidance on something like if a =
software item has 2 version numbers, ala =9316.0.3=94 and then also somethi=
ng like =93(a8e742)=94 or something like that.  Should this tag include bot=
h, the marketing number (16.0.3) or the build number version?


[daw: Some versioing schemes (e.g., SEMVER} allow build version information=
 to be provided. Providing multiple versions is not something allowed in SW=
ID tags. We have attempted to keep parity with the common information model=
 shared by both formats.


We could allow an array of versions, but this would increase the complexity=
 of the format. It may also increase ambiguity when determing which version=
 to display. To date I have not had someone raise this issue with either fo=
rmat. We may want to be cautious here about adding this feature to ensure w=
e understand all the downstream impacts.]


2.1: "item to represent a attributes=94 change =93a=94 to =93an=94


[daw: I adjusted the wording here.]


2.1: "A reference to any another item (can include

      details that are related to the CoSWID tag=94 change =93another=94 to=
 =93other=94


[daw: I rephrased this text to improve its content and readability.]


2.1: link-entry:  at the end of the description there is a use of =93their=
=94; I wasn=92t 100% what =93their=94 referred to, can =93their=94 be repla=
ced with a proper noun?


[daw: see above.]


2.1: any-element-entry: "which would be also any-elements)=94 change to =93=
also be=94


[daw: fixed.]


2.1.1: I find this confusing.  Who/What are are considering something a pri=
mary tag?  Or is that just a definition for human convenience?  What does i=
t mean if you have an unsupported tag?  There doesn=92t seem to be a conseq=
uence.  Lastly - stored/removed from where?


[daw: I added some text pointing to section 1.1 to clarify the tag type top=
ic. Does the new text help make this more understandable?]


2.1.2: "Only one of the corpus, patch, and supplemental items MUST be set t=
o "true=94,=94  - Is that really one and only one shall be true at a time?


[daw: Nope. This text was wrong. It should be correct now.]


2.1.2: =93suplements=94 is misspelled and quoted - is it quoted because its=
 purposefully misspelled?


[daw: Fixed.]


2.1.2: "This ensure that primary and corpus tags have=94 change to =93This =
ensures that the primary and corpus...=94.


[daw: Fixed.]


2.2:  I=92m confused by this definition:


any-attribute =3D (
     label =3D> text / int / [ 2* text ] / [ 2* int ]
   )

Doesn=92t that just say any string with with 1 or more characters or intege=
rs?  =93/=93 is or in CDDL; maybe some parenthesis were intended? Maybe som=
ething like (text/int)([2* text]/[2* int]) ??

[daw: I don't believe that we need grouping here. The point of this definit=
ion is to allow for the most concise representation in CBOR for either a ch=
aracter string, an integer value, or an array of these types if two or more=
 values need to be provided. By using a choice, fewer bytes can be used to =
represent single items as compared to how arrays are represented in CBOR.

Section 2.2.1 of CBOR (https://tools.ietf.org/html/rfc7049#section-2.2.1) d=
escribes how an array is encoded in the CBOR format. Encoding an array requ=
ires more data than just an individual string or integer value. We can save=
 the extra array-related data for single value arrays by not using an array=
 representation. This allows the format to be more concise in such cases.

Would it make sense to add a section in the front matter, or at the beginni=
ng of the model definition explaining why this syntax is used?]

2.4: extended-data =3D (30: any-element-map / [ 2* any-element-map ])
I=92m not sure about this CDDL; doesn=92t this just mean =93+ any-element-m=
ap=94?  And this is open ended, why is it required?

[daw: We could use + any-element-map, but use of an array requires addition=
al data in the encoding (see above). This construct allows both a single va=
lue and an array of two or more values to be both be allowed, making the da=
ta more concise in the single value case.]

2.4: "any role value, but the per-defined roles include:=94  change to =93p=
re-defined=94.

[daw: done.]

2,4=94. =93 "software-creator", "tag-creator=94 =93 add the missing =93and=
=94 before tag-creator.

[daw: fixed.]


2.4: =94=85  of the signing entities certificate(s). .=94 extra period.

[daw: fixed.]

2.4 thumbprint - can we describe what goes into the hash, how, and which ha=
sh algorithm (even if that=92s a code point) should be used?

[daw: I added some text and updated the CDDL to address this. Is the new te=
xt sufficient?]

2.5: artifact - the text implies that everything called =93install.exe=94 i=
s the same file if it=92s on CD?  Or did I read that incorrectly? (In which=
 case it still needs a fix.)

[daw: The intent is that if the rel=3D"installation-media", then the artifa=
ct can point to the path to the file used to run the installation. I added =
some text to this effect. Does the new text address your concern?]

2.5: href - why are we generating/accepting a no-uri scheme?  How do we kno=
w that the scheme means?

[daw: The intent is to allow relative paths from the tag's location, where =
no scheme is provided. The resolved relative path would be resolved relativ=
e to the URI used to access the CoSWID tag.]

2.5: href - should that be labeled =93href=94?

[daw: Not sure which one you are referencing here. I think it is the first =
reference in the body of the text. I surrounded this with quotes.]

2.5: href - examples between coswid and XPATH tag are mislabeled (maybe an =
extra bullet point in the text)

[daw: fixed.]

2.5 media - I=92m not sure that this is sufficiently specified.  Is there a=
 media definition for DVD?  The reference talks about selecting a font for =
print vs. a font for screen.  Does this cover media statements for things l=
ike other source media?

[daw: This is underspecified in the SWID specification as well. Not sure wh=
at to do here. I'll raise this issue with the WG.]

2.6: Is "http://msdn.microsoft<https://na01.safelinks.protection.outlook.co=
m/?url=3Dhttp%3A%2F%2Fmsdn.microsoft.com%2Fen-us%2Flibrary%2Faa372375(v%3Dv=
s.85).aspx&data=3D02%7C01%7Cdavid.waltermire%40nist.gov%7C7e73d58ac101429e1=
0a208d58daa8c99%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C0%7C63657068600476=
3698&sdata=3Dmt9Pbb0XxYXSJ3JQnmRAtvi8jnMG%2FPIXYBwbdWRzfkg%3D&reserved=3D0>=
.com/en-us/library/aa372375(v=3Dvs.85).aspx<https://na01.safelinks.protecti=
on.outlook.com/?url=3Dhttp%3A%2F%2Fmsdn.microsoft.com%2Fen-us%2Flibrary%2Fa=
a372375(v%3Dvs.85).aspx&data=3D02%7C01%7Cdavid.waltermire%40nist.gov%7C7e73=
d58ac101429e10a208d58daa8c99%7C2ab5d82fd8fa4797a93e054655c61dec%7C1%7C0%7C6=
36570686004763698&sdata=3Dmt9Pbb0XxYXSJ3JQnmRAtvi8jnMG%2FPIXYBwbdWRzfkg%3D&=
reserved=3D0>=94 a stable reference for a standard?

[daw: I removed this example.]

2.6: unspc - why is this defined as =93text=94 when its limited to 8-charac=
ters?

[daw: I am not sure we want to constrain this for future agility reasons. I=
 also do not know how to constrain the length to be 8 characters. The CDDL =
.size control operator is in bytes, which is not the same as characters in =
Unicode. We could use the .regexp control operator to address your concern =
if you think we should still constrain it to 8 characters.]

2.6: "directory / [2 * directory]=94 - this pattern repeats in the document=
 and I don=92t understand why from the CDDL draft.  Help.


[daw: See previous comments on this.]

2.7.2: There is no place to specify an operating system.  If the file syste=
ms are very different, how to I make sense of things like file paths?  Word=
 on Windows vs. Word on Mac. - how do you understand those resources in tha=
t case?


[daw: In a NIST document I wrote, we created extensions in the SWID XML for=
mat to address this. We specified the "pathSeparator", "envVarPrefix", and =
"envVarSuffix" items to declare the conventions being used. Through this, t=
he conventions of a given platform could be substituted. Would it be useful=
 to add these extensions to this draft?]

2.7.3:  Payload extension - ???? - (specified as group socket to be specifi=
ed later in the CDDL)


[daw: Added text on the use of CDDL sockets for extension.]


2.7.4 - Evidence extension - ???? - (specified as group socket to be specif=
ied later in the CDDL)


[daw: see above.]


3.1 - SEMVER - is that a stable reference?

[daw: It is a web page that seems to be a stable reference for the SEMVER s=
pecification.]

5. "If the SWID tag was created by the software author, this generally mean=
s that it has undergone no change=94 - generally means, or implies?

[daw: I made some significant edits to this paragraph. Is the new text more=
 clear?]

5. "contain malicious content with the intend if creating non-deterministic=
=94 change intend to =93intent=94.

[daw: Fixed.]





--_000_BL0PR0901MB2306BE4A1336F99FC79DF27CF0D40BL0PR0901MB2306_
Content-Type: text/html; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3DWindows-1=
252">
<style type=3D"text/css" style=3D"display:none;"><!-- P {margin-top:0;margi=
n-bottom:0;} --></style>
</head>
<body dir=3D"ltr">
<div id=3D"divtagdefaultwrapper" style=3D"color: rgb(0, 0, 0); font-family:=
 Calibri,Helvetica,sans-serif,&quot;EmojiFont&quot;,&quot;Apple Color Emoji=
&quot;,&quot;Segoe UI Emoji&quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot=
;,&quot;Android Emoji&quot;,EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<p style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-serif,=
&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&qu=
ot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,Em=
ojiSymbols; font-size: 12pt; margin-top: 0px; margin-bottom: 0px;" dir=3D"l=
tr">
Chris,</p>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<p style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-serif,=
&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&qu=
ot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,Em=
ojiSymbols; font-size: 12pt; margin-top: 0px; margin-bottom: 0px;" dir=3D"l=
tr">
<br>
</p>
<p style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-serif,=
&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&qu=
ot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,Em=
ojiSymbols; font-size: 12pt; margin-top: 0px; margin-bottom: 0px;" dir=3D"l=
tr">
Thank you for the detailed feedback!</p>
<p style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-serif,=
&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&qu=
ot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,Em=
ojiSymbols; font-size: 12pt; margin-top: 0px; margin-bottom: 0px;" dir=3D"l=
tr">
<br>
</p>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<p style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-serif,=
&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&qu=
ot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,Em=
ojiSymbols; font-size: 12pt; margin-top: 0px; margin-bottom: 0px;" dir=3D"l=
tr">
Comments inline below marked [daw:].<br>
</p>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
I have addressed all of your feedback in the version posted to <a class=3D"=
OWAAutoLink" id=3D"LPlnk542560" href=3D"https://github.com/david-waltermire=
-nist/draft-ietf-sacm-coswid" previewremoved=3D"true">
https://github.com/david-waltermire-nist/draft-ietf-sacm-coswid</a>. I will=
 post this as -05 later today once I complete an editorial pass through the=
 document.</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
Please let me know if you have any questions or comments on the changes I h=
ave made to the&nbsp;draft.</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
Thanks,</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
Dave<br>
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<hr tabindex=3D"-1" style=3D"width: 98%; display: inline-block;">
<div id=3D"divRplyFwdMsg" dir=3D"ltr"><font color=3D"#000000" face=3D"Calib=
ri, sans-serif" style=3D"font-size: 11pt;"><b>From:</b> Chris Inacio &lt;in=
acio@cert.org&gt;<br>
<b>Sent:</b> Monday, March 19, 2018 11:03 AM<br>
<b>To:</b> draft-ietf-sacm-coswid@ietf.org<br>
<b>Cc:</b> sacm@ietf.org<br>
<b>Subject:</b> coswid-04 review</font>
<div>&nbsp;</div>
</div>
<div>
<div>I assume this is blocked by the CDDL draft - waiting for WG chair.</di=
v>
<div><br>
</div>
<div>[daw: Yes. The draft is in WGLC waiting for chair go-ahead.]</div>
<div><br>
</div>
<div>Also, I can=92t find in the CDDL draft the positional notation used</d=
iv>
<div><span class=3D"x_Apple-tab-span" style=3D"white-space: pre;"></span>ke=
y =3D (nn: type)</div>
<div>Is this still valid CDDL?</div>
<div><br>
</div>
<div>[daw: I believe the syntax is compliant with the group syntax describe=
d in section 2.1.2 in the CDDL draft. The group syntax can be in the form o=
f:</div>
<div><br>
</div>
<div>&nbsp;<span>_keytype_&nbsp;: _valuetype_</span></div>
<div><span><br>
</span></div>
<div>This appears to still be allowed syntax.]</div>
<p><br>
</p>
<div>Do we need section 1.1? &nbsp;What is it adding to the purpose of the =
document?</div>
<div><span class=3D"x_Apple-tab-span" style=3D"white-space: pre;"><br>
</span></div>
<div><span class=3D"x_Apple-tab-span" style=3D"white-space: pre;">[daw: Sec=
tion 1.1 provides operational context for&nbsp;the use of&nbsp;a SWID/CoSWI=
D. It answers the &quot;why does this specification matter? question, which=
 I believe is important for implementers to understand.
 It defines tag types which are useful in describing co-constraints later i=
n the document and the operational model for how tag types support software=
 inventory. The section is just under 3 pages in length, which I believe is=
 worth including to provide the
 additional&nbsp;context&nbsp;around the draft.</span></div>
<div><span class=3D"x_Apple-tab-span" style=3D"white-space: pre;"><br>
</span></div>
<div><span class=3D"x_Apple-tab-span" style=3D"white-space: pre;">What are =
your specific concerns with this section?]</span></div>
<div><br>
</div>
<div>If we keep it, then shouldn=92t the diagram on top of page 4 (diagrams=
 numbered please) be fixed to include a circular part with patches until re=
moval?</div>
<div><span class=3D"x_Apple-tab-span" style=3D"white-space: pre;"></span></=
div>
<div><span class=3D"x_Apple-tab-span" style=3D"white-space: pre;">[daw: I w=
ill add this to -05 along with figure numbers.]</span></div>
<div><br>
</div>
<div>Formatting for 1.1 P4; I think those are supposed to be some type of b=
ulleted list.</div>
<div><br>
</div>
<div><span>[daw: This was a formatting issue, which is fixed in -05.</span>=
]</div>
<div><br>
</div>
<div>2 P3:</div>
<div><span class=3D"x_Apple-tab-span" style=3D"white-space: pre;"></span>&q=
uot;<span style=3D"font-size: 13.33px;">A typical endpoint is capable of st=
oring</span></div>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">   the CoSWID tag of installed software, a constrained-nod=
e might lack=0A=
   that capability.  CoSWID address these constraints and the=0A=
   corresponding specification is augmented to retain their usefulness=0A=
   in the thing-2-thing domain.=94</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">First use of CoSWID should be SWID, right?</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">[daw: Yep. Fixed.]</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">2 P3: editorial NIT, ending a sentence with =93in=94.  Rep=
hrase for improved readability.</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">[daw: Fixed.]</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">2.1 P1: &quot;The items are ordered ensure that tag=94 sho=
uld be &quot;ensuring=94.</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">[daw: I removed the ordering text since this information i=
s actually unordered in a CBOR map. We may want to consider using an array =
if ordering is important.]</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">2.1: should =93global-attributes=94 be included in the ord=
ering list somewhere?</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">[daw: See above.]</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">2.1: =93software-version=94 - is there any guidance on som=
ething like if a software item has 2 version numbers, ala =9316.0.3=94 and =
then also something like =93(a8e742)=94 or something like that.  Should thi=
s tag include both, the marketing number (16.0.3) or the build number versi=
on?</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">[daw: Some versioing schemes (e.g., SEMVER} allow build ve=
rsion information to be provided. Providing multiple versions is not someth=
ing allowed in SWID tags. We have attempted to keep parity with the common =
information model shared by both formats.</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">We could allow an array of versions, but this would increa=
se the complexity of the format. It may also increase ambiguity when determ=
ing which version to display. To date I have not had someone raise this iss=
ue with either format. We may want to be cautious here about adding this fe=
ature to ensure we understand all the downstream impacts.]<br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">2.1: &quot;item to represent a attributes=94 change =93a=
=94 to =93an=94</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">[daw: I adjusted the wording here.]</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">2.1: &quot;A reference to any another item (can include</p=
re>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">      details that are related to the CoSWID tag=94 change=
 =93another=94 to =93other=94</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">[daw: I rephrased this text to improve its content and rea=
dability.]</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">2.1: link-entry:  at the end of the description there is a=
 use of =93their=94; I wasn=92t 100% what =93their=94 referred to, can =93t=
heir=94 be replaced with a proper noun?</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">[daw: see above.]<br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">2.1: any-element-entry: &quot;which would be also any-elem=
ents)=94 change to =93also be=94</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">[daw: fixed.]</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">2.1.1: I find this confusing.  Who/What are are considerin=
g something a primary tag?  Or is that just a definition for human convenie=
nce?  What does it mean if you have an unsupported tag?  There doesn=92t se=
em to be a consequence.  Lastly - stored/removed from where?</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">[daw: I added some text pointing to section 1.1 to clarify=
 the tag type topic. Does the new text help make this more understandable?]=
</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">2.1.2: &quot;Only one of the corpus, patch, and supplement=
al items MUST be set to &quot;true=94,=94  - Is that really one and only on=
e shall be true at a time?</pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">[daw: Nope. This text was wrong. It should be correct now.=
]<br></pre>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;"><pre class=3D"x_newpage" style=3D"margin-top: 0px; margin-=
bottom: 0px;"><br></pre><pre class=3D"x_newpage" style=3D"margin-top: 0px; =
margin-bottom: 0px;">2.1.2: =93suplements=94 is misspelled and quoted - is =
it quoted because its purposefully misspelled?</pre><pre class=3D"x_newpage=
" style=3D"margin-top: 0px; margin-bottom: 0px;"><br></pre><pre class=3D"x_=
newpage" style=3D"margin-top: 0px; margin-bottom: 0px;">[daw: Fixed.]</pre>=
<pre class=3D"x_newpage" style=3D"margin-top: 0px; margin-bottom: 0px;"><br=
></pre><pre class=3D"x_newpage" style=3D"margin-top: 0px; margin-bottom: 0p=
x;">2.1.2: &quot;This ensure that primary and corpus tags have=94 change to=
 =93This ensures that the primary and corpus...=94.</pre><pre class=3D"x_ne=
wpage" style=3D"margin-top: 0px; margin-bottom: 0px;"><pre class=3D"x_newpa=
ge" style=3D"margin-top: 0px; margin-bottom: 0px;"><br></pre><pre class=3D"=
x_newpage" style=3D"margin-top: 0px; margin-bottom: 0px;">[daw: Fixed.]</pr=
e></pre><p><br></p></pre>
<div>2.2: &nbsp;I=92m confused by this definition:</div>
<div><br>
</div>
<div>
<pre class=3D"x_newpage" style=3D"font-size: 13.33px; margin-top: 0px; marg=
in-bottom: 0px;">any-attribute =3D (=0A=
     label =3D&gt; text / int / [ 2* text ] / [ 2* int ]=0A=
   )</pre>
<div><br>
</div>
</div>
<div>Doesn=92t that just say any string with with 1 or more characters or i=
ntegers? &nbsp;=93/=93 is or in CDDL; maybe some parenthesis were intended?=
 Maybe something like (text/int)([2* text]/[2* int]) ??</div>
<div><br>
</div>
<div>[daw: I don't believe that we need grouping here. The point of this de=
finition is to allow for the most concise representation in CBOR&nbsp;for e=
ither a character string, an integer value, or an array of these types if t=
wo or more values need to be provided.
 By using a choice, fewer bytes can be used to represent single items as co=
mpared to how arrays are represented in CBOR.</div>
<div><br>
</div>
<div>Section 2.2.1 of CBOR (<a class=3D"OWAAutoLink" id=3D"LPlnk634121" hre=
f=3D"https://tools.ietf.org/html/rfc7049#section-2.2.1" previewremoved=3D"t=
rue">https://tools.ietf.org/html/rfc7049#section-2.2.1</a>) describes how a=
n array is encoded in the CBOR format. Encoding
 an array requires more data than just an individual string or integer valu=
e. We can save the extra array-related data for single value arrays by not =
using an array representation. This allows the format to be more concise in=
 such cases.</div>
<div><br>
</div>
<div>Would it make sense to add a section in the front matter, or at the be=
ginning of the model definition explaining why this syntax is used?]</div>
<div><br>
</div>
<div>2.4:&nbsp;<span style=3D"font-size: 13.33px;">extended-data =3D (30: a=
ny-element-map / [ 2* any-element-map ])</span></div>
<div><span class=3D"x_Apple-tab-span" style=3D"font-size: 13.33px; white-sp=
ace: pre;"></span><font size=3D"2">I=92m not sure about this CDDL; doesn=92=
t this just mean&nbsp;=93&#43; any-element-map=94? &nbsp;And this is open e=
nded, why is it required?</font></div>
<div><br>
</div>
<div>[daw: We could use &#43; any-element-map, but use of an array requires=
 additional data in the encoding (see above). This construct allows both a =
single value and an array of two or more values to be both be allowed, maki=
ng the data more concise in the single
 value case.]</div>
<div><br>
</div>
<div>2.4: &quot;<span style=3D"font-size: 13.33px;">any role value, but the=
&nbsp;</span><font size=3D"2">per-defined roles include:=94 &nbsp;change to=
&nbsp;=93pre-defined=94.</font></div>
</div>
<div><br>
</div>
<div><font size=3D"2">[daw: done.]</font></div>
<div>
<div><font size=3D"2"><br>
</font></div>
<font size=3D"2">2,4=94.&nbsp;=93&nbsp;&quot;software-creator&quot;, &quot;=
tag-creator=94&nbsp;=93 add the missing&nbsp;=93and=94 before tag-creator.<=
/font></div>
<div></div>
<div><font size=3D"2">
<div><font size=3D"2"><br>
</font></div>
<div><font size=3D"2">[daw: fixed.]</font></div>
</font>
<p><br>
</p>
</div>
<div></div>
<div><font size=3D"2">2.4: =94=85&nbsp;</font><span style=3D"font-size: 13.=
33px;">&nbsp;of the signing entities&nbsp;</span><font size=3D"2">certifica=
te(s). .=94 extra period.</font></div>
<div></div>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2"><br>
</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2">[daw: fixed.]</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2"><br>
</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2">2.4 thumbprint - can we describe what goes into the hash, =
how, and which hash algorithm (even if that=92s a code point) should be use=
d?</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2">[daw: I added some text and updated the CDDL to address th=
is. Is the new text sufficient?]</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2"><br>
</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2">2.5: artifact - the text implies that everything called&nb=
sp;=93install.exe=94 is the same file if it=92s on CD? &nbsp;Or did I read =
that incorrectly? (In which case it still needs a fix.)</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2"><br>
</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2">[daw: The intent is that if the rel=3D&quot;installation-m=
edia&quot;, then the artifact can point to the path to the file used to run=
 the installation. I added some text to this effect. Does the new text addr=
ess your concern?]</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
2.5: href - why are we generating/accepting a no-uri scheme? &nbsp;How do w=
e know that the scheme means?</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
[daw: The intent is to allow relative paths from the tag's location, where =
no scheme is provided. The resolved relative path would be resolved relativ=
e to the URI used to access the CoSWID tag.]</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
2.5: href - should that be labeled =93href=94?</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
[daw: Not sure which one you are referencing here. I think it is the first =
reference in the body of the text. I surrounded this with quotes.]</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
2.5: href - examples between coswid and XPATH tag are mislabeled (maybe an =
extra bullet point in the text)</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
[daw: fixed.]</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
2.5 media - I=92m not sure that this is sufficiently specified. &nbsp;Is th=
ere a media definition for DVD? &nbsp;The reference talks about selecting a=
 font for print vs. a font for screen. &nbsp;Does this cover media statemen=
ts for things like other source media?</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
[daw: This is underspecified in the SWID specification as well. Not sure wh=
at to do here. I'll raise this issue with the WG.]</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
2.6: Is &quot;<font size=3D"2"><a id=3D"LPlnk486975" href=3D"https://na01.s=
afelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fmsdn.microsoft.com%2Fen=
-us%2Flibrary%2Faa372375(v%3Dvs.85).aspx&amp;data=3D02%7C01%7Cdavid.walterm=
ire%40nist.gov%7C7e73d58ac101429e10a208d58daa8c99%7C2ab5d82fd8fa4797a93e054=
655c61dec%7C1%7C0%7C636570686004763698&amp;sdata=3Dmt9Pbb0XxYXSJ3JQnmRAtvi8=
jnMG%2FPIXYBwbdWRzfkg%3D&amp;reserved=3D0" previewremoved=3D"true">http://m=
sdn.microsoft</a></font><a id=3D"LPlnk91684" style=3D"font-size: 13.33px;" =
href=3D"https://na01.safelinks.protection.outlook.com/?url=3Dhttp%3A%2F%2Fm=
sdn.microsoft.com%2Fen-us%2Flibrary%2Faa372375(v%3Dvs.85).aspx&amp;data=3D0=
2%7C01%7Cdavid.waltermire%40nist.gov%7C7e73d58ac101429e10a208d58daa8c99%7C2=
ab5d82fd8fa4797a93e054655c61dec%7C1%7C0%7C636570686004763698&amp;sdata=3Dmt=
9Pbb0XxYXSJ3JQnmRAtvi8jnMG%2FPIXYBwbdWRzfkg%3D&amp;reserved=3D0" previewrem=
oved=3D"true">.com/en-us/library/aa372375(v=3Dvs.85).aspx</a><font size=3D"=
2">=94
 a stable reference for a standard?</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2"><br>
</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2">[daw: I removed this example.]</font></div>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2"><br>
</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2">2.6:&nbsp;unspc - why is this defined as&nbsp;=93text=94 w=
hen its limited to 8-characters?</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2"><br>
</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2">[daw: I am not sure we want to constrain this for future a=
gility reasons. I also do not know how to constrain the length to be 8 char=
acters. The CDDL .size control operator is in bytes, which is not the same =
as characters in Unicode. We could
 use the .regexp control operator to address your concern if you think we s=
hould still constrain it to 8 characters.]</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2"><br>
</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2">2.6: &quot;directory / [2 * directory]=94 - this pattern r=
epeats in the document and I don=92t understand why from the CDDL draft. &n=
bsp;Help.</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<p><br>
</p>
<p><font size=3D"2">[daw: See previous comments on this.]</font></p>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2"><br>
</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2">2.7.2: There is no place to specify an operating&nbsp;syst=
em. &nbsp;If the file&nbsp;systems are very different, how to I make sense =
of things like file paths? &nbsp;Word on Windows vs.&nbsp;Word on Mac. - ho=
w do you understand those resources in that case?</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<p><br>
</p>
<p><font size=3D"2">[daw: In a NIST document I wrote, we created extensions=
 in the SWID XML format to address this. We specified&nbsp;the &quot;pathSe=
parator&quot;, &quot;envVarPrefix&quot;, and &quot;envVarSuffix&quot; items=
 to declare the conventions being used. Through this, the conventions
 of a given platform could be substituted. Would it be useful to add these =
extensions to this draft?]</font></p>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2"><br>
</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2">2.7.3: &nbsp;Payload extension - ???? - (specified as grou=
p socket to be specified later in the CDDL)</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<p><br>
</p>
<p><font size=3D"2">[daw: Added text on the use of CDDL sockets for extensi=
on.]</font></p>
<p></p>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2"><font size=3D"2"><br>
</font></font></div>
<p></p>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2">2.7.4 - Evidence extension - ???? - (specified as group so=
cket to be specified later in the CDDL)</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<p><br>
</p>
<p>[daw: see above.]</p>
<p><font size=3D"2"><br>
</font></p>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2">3.1 - SEMVER - is that a stable reference?</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2"><br>
</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2">[daw: It is a web page that seems to be a stable reference=
&nbsp;for the SEMVER specification.]</font></div>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2"><br>
</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2">5. &quot;</font><span style=3D"font-size: 13.33px;">If the=
 SWID tag was created by the&nbsp;</span><font size=3D"2">software author, =
this generally means that it has undergone no change=94 - generally means, =
or implies?</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2"><br>
</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2">[daw: I&nbsp;made some significant edits to this paragraph=
. Is the new text more&nbsp;clear?]&nbsp;</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2"><br>
</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2">5. &quot;</font><span style=3D"font-size: 13.33px;">contai=
n malicious content with the intend&nbsp;</span><font size=3D"2">if creatin=
g non-deterministic=94 change intend to&nbsp;=93intent=94.</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2"><br>
</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2">[daw: Fixed.]<br>
</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2"><br>
</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<font size=3D"2"><br>
</font></div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
<br>
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
<div style=3D"color: rgb(0, 0, 0); font-family: Calibri,Helvetica,sans-seri=
f,&quot;EmojiFont&quot;,&quot;Apple Color Emoji&quot;,&quot;Segoe UI Emoji&=
quot;,NotoColorEmoji,&quot;Segoe UI Symbol&quot;,&quot;Android Emoji&quot;,=
EmojiSymbols; font-size: 12pt;" dir=3D"ltr">
</div>
</div>
</body>
</html>

--_000_BL0PR0901MB2306BE4A1336F99FC79DF27CF0D40BL0PR0901MB2306_--


From nobody Wed Mar 21 11:44:55 2018
Return-Path: <bounces+848413-495d-sacm=ietf.org@sgmail.github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4780512EB49 for <sacm@ietfa.amsl.com>; Wed, 21 Mar 2018 11:44:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.009
X-Spam-Level: 
X-Spam-Status: No, score=-2.009 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_32=0.001, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SnAIxUUu6TwT for <sacm@ietfa.amsl.com>; Wed, 21 Mar 2018 11:44:48 -0700 (PDT)
Received: from o4.sgmail.github.com (o4.sgmail.github.com [192.254.112.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AE87612DA03 for <sacm@ietf.org>; Wed, 21 Mar 2018 11:44:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=github.com;  h=from:reply-to:to:cc:subject:mime-version:content-type:content-transfer-encoding:list-id:list-archive:list-post:list-unsubscribe; s=s20150108; bh=4NBRv0GhkMv8FheJZ7mtdMqVMAo=; b=MNb81NUoHTw7Gg4A 66eXZNSIr5jgDEnkLvL6xU0gCZYmUwm82QIbM4fgS9hrbi954IovtszjhYQYWjz3 bPl3/5igCxO4rFQ9JDR3NynHzJ78vKXJF4cIgss3HtSjCcrtJcnTnv3dgu3o6Rfe VryKWBuyeQ6Lw1o81nsSW+TxnkA=
Received: by filter0037p1las1.sendgrid.net with SMTP id filter0037p1las1-25157-5AB2A812-25 2018-03-21 18:44:34.831238164 +0000 UTC
Received: from smtp.github.com (out-2.smtp.github.com [192.30.252.193]) by ismtpd0001p1maa1.sendgrid.net (SG) with ESMTP id 3ejDqL_PRni8QjFuGyCtiA for <sacm@ietf.org>; Wed, 21 Mar 2018 18:44:34.096 +0000 (UTC)
Date: Wed, 21 Mar 2018 18:44:34 +0000 (UTC)
From: David Waltermire <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-coswid <reply+00a6c4d157da4aa7e2290e9ee73c7932de671f896df3dc1c92cf0000000116ca6a0c92a169ce12522220@reply.github.com>
To: sacmwg/draft-ietf-sacm-coswid <draft-ietf-sacm-coswid@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-coswid/pull/3@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5ab2a80cd7d7d_386e2b1b1a032ec82744d7"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: david-waltermire-nist
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
X-SG-EID: UtArl2HfP/Y+1oZ8SNY9H+NmtJEAQ41FvPY/2uGEECIVLqWuJOug3dOrKtAvjTFvZhR8ij3QK7LoHo LI5vV7krVdddBotp9Te9/ECnjRnlmuhfEPNcs597UE7if8ZuMwSQhM7CJAtrGFZ+ppwxfy4H67MEAt XXI0rYSN6O/h3wY0RRm3E+w/K8Aaiy+RvLZGHVj+odRfu2Bv/sc/YbvC4KUg3/jKaKN1cTHeVQ8/Hx c=
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/e88EwHIyS4ZQizVm2DVGRLpPlkc>
Subject: [sacm] [sacmwg/draft-ietf-sacm-coswid] -05 revision (#3)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Mar 2018 18:44:53 -0000

----==_mimepart_5ab2a80cd7d7d_386e2b1b1a032ec82744d7
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Pulling the -05 revision.
You can view, comment on, or merge this pull request online at:

  https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/3

-- Commit Summary --

  * addressed comments from Chris Inacio making changes to text throughout the draft.
  * Editorial changes to improve readability and terminology use.
  * Merge remote-tracking branch 'upstream/master'

-- File Changes --

    M concise-software-identity.cddl (2)
    M draft-ietf-sacm-coswid.md (414)

-- Patch Links --

https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/3.patch
https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/3.diff

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/3

----==_mimepart_5ab2a80cd7d7d_386e2b1b1a032ec82744d7
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

<p>Pulling the -05 revision.</p>

<hr>

<h4>You can view, comment on, or merge this pull request online at:</h4>
<p>&nbsp;&nbsp;<a href='https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/3'>https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/3</a></p>

<h4>Commit Summary</h4>
<ul>
  <li>addressed comments from Chris Inacio making changes to text throughout the draft.</li>
  <li>Editorial changes to improve readability and terminology use.</li>
  <li>Merge remote-tracking branch &#39;upstream/master&#39;</li>
</ul>

<h4>File Changes</h4>
<ul>
  <li>
    <strong>M</strong>
    <a href="https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/3/files#diff-0">concise-software-identity.cddl</a>
    (2)
  </li>
  <li>
    <strong>M</strong>
    <a href="https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/3/files#diff-1">draft-ietf-sacm-coswid.md</a>
    (414)
  </li>
</ul>

<h4>Patch Links:</h4>
<ul>
  <li><a href='https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/3.patch'>https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/3.patch</a></li>
  <li><a href='https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/3.diff'>https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/3.diff</a></li>
</ul>

<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">&mdash;<br />You are receiving this because you are subscribed to this thread.<br />Reply to this email directly, <a href="https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/3">view it on GitHub</a>, or <a href="https://github.com/notifications/unsubscribe-auth/AKbE0ZB6n90pSbM88qapMOEARycn4jhlks5tgp-MgaJpZM4S1Pz5">mute the thread</a>.<img src="https://github.com/notifications/beacon/AKbE0Vb15GyG9BHcsg0haWKuHMg-z9a2ks5tgp-MgaJpZM4S1Pz5.gif" height="1" width="1" alt="" /></p>
<div itemscope itemtype="http://schema.org/EmailMessage">
<div itemprop="action" itemscope itemtype="http://schema.org/ViewAction">
  <link itemprop="url" href="https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/3"></link>
  <meta itemprop="name" content="View Pull Request"></meta>
</div>
<meta itemprop="description" content="View this Pull Request on GitHub"></meta>
</div>

<script type="application/json" data-scope="inboxmarkup">{"api_version":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-coswid","title":"sacmwg/draft-ietf-sacm-coswid","subtitle":"GitHub repository","main_image_url":"https://cloud.githubusercontent.com/assets/143418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"https://github.com/sacmwg/draft-ietf-sacm-coswid"}},"updates":{"snippets":[{"icon":"DESCRIPTION","message":"-05 revision (#3)"}],"action":{"name":"View Pull Request","url":"https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/3"}}}</script>

----==_mimepart_5ab2a80cd7d7d_386e2b1b1a032ec82744d7--


From nobody Wed Mar 21 11:45:05 2018
Return-Path: <bounces+848413-495d-sacm=ietf.org@sgmail.github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D2FE12EB70 for <sacm@ietfa.amsl.com>; Wed, 21 Mar 2018 11:45:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.392
X-Spam-Level: 
X-Spam-Status: No, score=-0.392 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_24=1.618, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U0xjsejskm6H for <sacm@ietfa.amsl.com>; Wed, 21 Mar 2018 11:44:56 -0700 (PDT)
Received: from o1.sgmail.github.com (o1.sgmail.github.com [192.254.114.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 888FF12E957 for <sacm@ietf.org>; Wed, 21 Mar 2018 11:44:49 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=github.com;  h=from:reply-to:to:cc:in-reply-to:references:subject:mime-version:content-type:content-transfer-encoding:list-id:list-archive:list-post:list-unsubscribe; s=s20150108; bh=niDsxMFqCAPLh6Ayh5rtwTZYJ5c=; b=NziBWu7/LxgVuc7k ogkOog2SVVuHpEHAb6QpL1kaI/Op5sV7AmvsZ57DkmcqBsmvvd6d8Ar5G8otny5p IZHZhzLBvNkHPoL+KCCMeHM8nueeFyOAtaaoeRfGcM9OrAFXEirrFaCXCclXoXZK 4x01IglDFHXkaYL+FLEYX7Oeznw=
Received: by filter0274p1las1.sendgrid.net with SMTP id filter0274p1las1-2315-5AB2A81B-22 2018-03-21 18:44:43.60437033 +0000 UTC
Received: from smtp.github.com (out-2.smtp.github.com [192.30.252.193]) by ismtpd0008p1maa1.sendgrid.net (SG) with ESMTP id -RiQe27pQWixvJnq-DtMag for <sacm@ietf.org>; Wed, 21 Mar 2018 18:44:42.832 +0000 (UTC)
Date: Wed, 21 Mar 2018 18:44:43 +0000 (UTC)
From: David Waltermire <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-coswid <reply+00a6c4d1ef920f7a9a173ec71d95c9f42944f00fabbaf4c092cf0000000116ca6a1492a169ce12522220@reply.github.com>
To: sacmwg/draft-ietf-sacm-coswid <draft-ietf-sacm-coswid@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-coswid/pull/3/issue_event/1533978785@github.com>
In-Reply-To: <sacmwg/draft-ietf-sacm-coswid/pull/3@github.com>
References: <sacmwg/draft-ietf-sacm-coswid/pull/3@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5ab2a814ac20_2e453fc98b464f3020715"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: david-waltermire-nist
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
X-SG-EID: UtArl2HfP/Y+1oZ8SNY9H9jDTk3nqFsaQ6Kd3Ez6nBnt1O6djX4lLmLdCS5LptqcwyWNlQSl8tjTUm 8HcSKc99Vrf+Y1xb/Y/E73Y0uvmEVmNUq6IoV90aXZMwzVp6UAkTYb2IfmRWOnlP0GsuJWGLZG3gsd zMciy49fcSx58pfSkCIKHYnFzEAxwh5/vPUBYxu0lCbrTJ7dxb7tjCLGO41OR0KLpH66kuvuzuiCMJ o=
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/fccNiuLeZ_5ZK6u8lQVoz7rtyRU>
Subject: Re: [sacm] [sacmwg/draft-ietf-sacm-coswid] -05 revision (#3)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Mar 2018 18:45:03 -0000

----==_mimepart_5ab2a814ac20_2e453fc98b464f3020715
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Merged #3.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/3#event-1533978785
----==_mimepart_5ab2a814ac20_2e453fc98b464f3020715
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

<p>Merged <a class="issue-link js-issue-link" data-error-text="Failed to load issue title" data-id="307372576" data-permission-text="Issue title is private" data-url="https://github.com/sacmwg/draft-ietf-sacm-coswid/issues/3" href="https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/3">#3</a>.</p>

<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">&mdash;<br />You are receiving this because you are subscribed to this thread.<br />Reply to this email directly, <a href="https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/3#event-1533978785">view it on GitHub</a>, or <a href="https://github.com/notifications/unsubscribe-auth/AKbE0T--MYhV8DTkYvXhsshLFODS8N2fks5tgp-UgaJpZM4S1Pz5">mute the thread</a>.<img src="https://github.com/notifications/beacon/AKbE0bO5yMgXdBxZjsts2M6dP0B5cNfAks5tgp-UgaJpZM4S1Pz5.gif" height="1" width="1" alt="" /></p>
<div itemscope itemtype="http://schema.org/EmailMessage">
<div itemprop="action" itemscope itemtype="http://schema.org/ViewAction">
  <link itemprop="url" href="https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/3#event-1533978785"></link>
  <meta itemprop="name" content="View Pull Request"></meta>
</div>
<meta itemprop="description" content="View this Pull Request on GitHub"></meta>
</div>

<script type="application/json" data-scope="inboxmarkup">{"api_version":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-coswid","title":"sacmwg/draft-ietf-sacm-coswid","subtitle":"GitHub repository","main_image_url":"https://cloud.githubusercontent.com/assets/143418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"https://github.com/sacmwg/draft-ietf-sacm-coswid"}},"updates":{"snippets":[{"icon":"DESCRIPTION","message":"Merged #3."}],"action":{"name":"View Pull Request","url":"https://github.com/sacmwg/draft-ietf-sacm-coswid/pull/3#event-1533978785"}}}</script>
----==_mimepart_5ab2a814ac20_2e453fc98b464f3020715--


From nobody Wed Mar 21 11:47:58 2018
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sacm@ietf.org
Delivered-To: sacm@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id D6C8012778D; Wed, 21 Mar 2018 11:47:55 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: sacm@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.76.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <152165807584.7370.441198588145820044@ietfa.amsl.com>
Date: Wed, 21 Mar 2018 11:47:55 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/SfCrMVQWZ70YKcSnuo2389XnTsQ>
Subject: [sacm] I-D Action: draft-ietf-sacm-coswid-05.txt
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Mar 2018 18:47:56 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Security Automation and Continuous Monitoring WG of the IETF.

        Title           : Concise Software Identifiers
        Authors         : Henk Birkholz
                          Jessica Fitzgerald-McKay
                          Charles Schmidt
                          David Waltermire
	Filename        : draft-ietf-sacm-coswid-05.txt
	Pages           : 42
	Date            : 2018-03-21

Abstract:
   This document defines a concise representation of ISO/IEC
   19770-2:2015 Software Identification (SWID) tags that are
   interoperable with the XML schema definition of ISO/IEC 19770-2:2015
   and augmented for application in Constrained-Node Networks.  Next to
   the inherent capability of SWID tags to express arbitrary context
   information, Concise SWID (CoSWID) tags support the definition of
   additional semantics via well-defined data definitions incorporated
   by extension points.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sacm-coswid/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-sacm-coswid-05
https://datatracker.ietf.org/doc/html/draft-ietf-sacm-coswid-05

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sacm-coswid-05


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Wed Mar 21 18:12:59 2018
Return-Path: <inacio@cert.org>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 16430126B7E; Wed, 21 Mar 2018 18:12:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.893
X-Spam-Level: 
X-Spam-Status: No, score=-0.893 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, LOCALPART_IN_SUBJECT=1.107, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cert.org
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jelQ0yFa5ZHl; Wed, 21 Mar 2018 18:12:56 -0700 (PDT)
Received: from veto.sei.cmu.edu (veto.sei.cmu.edu [147.72.252.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2C5691200E5; Wed, 21 Mar 2018 18:12:52 -0700 (PDT)
Received: from delp.sei.cmu.edu (delp.sei.cmu.edu [10.64.21.31]) by veto.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id w2M1CpPK011982; Wed, 21 Mar 2018 21:12:52 -0400
DKIM-Filter: OpenDKIM Filter v2.11.0 veto.sei.cmu.edu w2M1CpPK011982
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cert.org; s=yc2bmwvrj62m; t=1521681172; bh=6k2xBX1ZZ86F2AifgsmArLokBLv7XLOsHpNj1yoGKCM=; h=From:To:CC:Subject:Date:From; b=Tb6t9bh2X5GdYDMspcP7XbjGxTw2+Nv8SH568+LK//8LegybnHKaefHNO2+5u/5iJ /OGidM3/LTQYX8+l2+qcneGXtQMTCEFb2wZgUzAoEqQfkJD0WJtOJ1ioErl4JMw8QX BQ4y5LMCMPtQ2wlhPLe6CcilFg0bNGGeelv+3vfE=
Received: from CASSINA.ad.sei.cmu.edu (cassina.ad.sei.cmu.edu [10.64.28.249]) by delp.sei.cmu.edu (8.14.7/8.14.7) with ESMTP id w2M1Cl07035243; Wed, 21 Mar 2018 21:12:47 -0400
Received: from MARATHON.ad.sei.cmu.edu ([10.64.28.250]) by CASSINA.ad.sei.cmu.edu ([10.64.28.249]) with mapi id 14.03.0361.001; Wed, 21 Mar 2018 21:12:47 -0400
From: Chris Inacio <inacio@cert.org>
To: "draft-ietf-sacm-ecp@ietf.org" <draft-ietf-sacm-ecp@ietf.org>
CC: "sacm@ietf.org" <sacm@ietf.org>
Thread-Topic: Draft-ietf-sacm-ecp
Thread-Index: AQHTwXrjZYI9hpj3Z0uER2r5CnPHyw==
Date: Thu, 22 Mar 2018 01:12:46 +0000
Message-ID: <AEC6CB01-B90D-4096-B87C-DFC99A305FE8@cert.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.64.105.82]
Content-Type: multipart/alternative; boundary="_000_AEC6CB01B90D4096B87CDFC99A305FE8certorg_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/mzRYfFPMqssTQnwkoURAkarZXag>
Subject: [sacm] Draft-ietf-sacm-ecp
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Mar 2018 01:12:58 -0000

--_000_AEC6CB01B90D4096B87CDFC99A305FE8certorg_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

DQpTbyB0aGVyZSBhcmUgb2J2aW91c2x5IGZvbGxvdy1vbiBkb2N1bWVudHMgdG8gdGhpcyBkb2N1
bWVudCBhbmQgd29yayB0aGF0IGlzIGludGVuZGVkIHRvIGJlIGJyb3VnaHQgdG8gdGhlIElFVEYu
ICBJcyB0aGF0IGNvcnJlY3Q/DQoNCg0KDQoNCjE6ICJTdGFuZGFkcmlkIGNvbGxlY3Rpb24gaW1w
cm92ZXMgbmV0d29yayBzZWN1cml0eSBieSBjb25maXJtaW5nIHRoYXQgZW5kcG9pbnRzIGFyZSBr
bm93biBhbmQNCg0KICAgYXV0aHJvc2l6ZWQsIGFuZCBhcmUgY29tcGxpYW50IHdpdGggbmV0d29y
ayBwb2xpY3ku4oCdICBGaXggc3BlbGxpbmc6ICBTdGFuZGFyZCBhbmQgYXV0aG9yaXplZC4NCg0K
DQoxOiAiQWRtaW5pc3RyYXRvcnMgd2lsbCBxdWVyeSB0aGUgcmVwb3NpdG9yeSB0byBkZXRlcm1p
bmUgdGhlIHBvc3R1cmUgc3RhdHVzIG9mIGFuIGVuZHBvaW50LuKAnSAgTWF5YmUgYWRtaW5pc3Ry
YXRvcnMgY2FuIC0gb3RoZXJ3aXNlIHdlIGNvdWxkIGp1c3Qgc2F5IGFkbWluaXN0cmF0b3JzIHdp
bGwgc2VjdXJlIHRoZWlyIG5ldHdvcmtzIGFuZCBlbnN1cmUgdGhleSBoYXZlIG5vIHZ1bG5lcmFi
bGUgYXBwcyBpbnN0YWxsZWQgYW5kIGJlIGRvbmUsIHJpZ2h0PyAgOikNCg0KDQoxLjE6IOKAnFRo
ZSB2YWx1ZSBvZiBjb250aW51b3VzIGVuZHBvaW50IHBvc3R1cmUgYXNzZXNzbWVudCBpcyB3ZWxs
DQoNCiAgIGVzdGFibGlzaGVkLuKAnSBDYW4gd2UgY2l0ZSB0aGlzIHN0YXRlbWVudD8NCg0KDQox
LjE6ICJyZXNwZWN0aXZlbHksIG9mIHRoZSBDSVMgIjIwIENyaXRpY2Fs4oCdIHBsZWFzZSBleHBh
bmQgQ2VudGVyIGZvciBJbnRlcm5ldCBTZWN1cml0eSAoQ0lTKSBvbiBpdHMgZmlyc3QgdXNlLg0K
DQoNCjEuMTogIkJ5IHNoYXJpbmcgcG9zdHVyZSBpbmZvcm1hdGlubyB3aXRoIHNlbnNvcnMgb24g
dGhlIG5ldHdvcmssIEVDUCBhaWRzIGluIHRoZQ0KDQogICBkZXRlY3Rpb24gb2YgYXR0YWNrcyBv
biBlbmRwb2ludHMgYW5kIGRyaXZlcyBmb2xsb3ctdXAgYWN0aW9ucy7igJ0gIFNwZWxsaW5nIGZv
ciBpbmZvcm1hdGlvbiBhbmQgSSBmaW5kIHRoaXMgc3RhdGVtZW50IHANCg0KDQoxLjM6ICJQb3N0
dXJlIGluZm9ybWF0aW9uIG11c3QgYmUgc2VudCBvdmVyIG1hdHVyZSwgc3RhbmRhcmRpemVkIHBy
b3RvY29scw0KDQogICB0byBlbnN1cmUgdGhlIGNvbmZpZGVudGlhbGl0eSBhbmQgYXV0aGVudGlj
aXR5IG9mIHRoaXMgZGF0YSB3aGlsZSBpbg0KICAgdHJhbnNpdC7igJ0gIEFuIGltcGxpY2F0aW9u
IG9mIHRoaXMgc2VudGVuY2UgaXMgdGhhdCBUTFMgMS4zIGlzIG5vdCAvIHdpbGwgbm90IGJlIHNl
Y3VyZS4gIEFyZSB3ZSByZWFsbHkgd2FudGluZyB0byBzYXkgdGhhdD8NCg0KDQoxLjM6ICJUaGUg
SUVURiBORUEgV0cgaGFzIGRlc2lnbmVkIGFuIGFyY2hpdGVjdHVyZSB0byBzdXBwb3J0IGVuZHBv
aW50DQoNCiAgIHBvc3R1cmUgYXNzZXNzbWVudC4gIEZpZ3VyZSAxIGlsbHVzdHJhdGVzIHRoZSBh
cmNoaXRlY3R1cmFsDQogICBjb21wb25lbnRzIHVzZWQgaW4gdGhlIEVuZHBvaW50IENvbXBsaWFu
Y2UgUHJvZmlsZTrigJ0NCg0KSSBjYW7igJl0IGZpbmQgbWVudGlvbiBvZiBhIHJlcG9zaXRvcnkg
aW4gUkZDNjg3NiBvciBSRkM1MjA5OyBJIGNhbuKAmXQgZmluZCB0aGUgZGlhZ3JhbSBlaXRoZXIs
IGJ1dCBJ4oCZbSBtb3N0bHkgb2theSB3aXRoIG5vdCBmaW5kaW5nIHRoZSBkaWFncmFtLg0KDQoN
CjEuMzogQ2FuIHdlIHBsZWFzZSB1c2UgdGhlIHNhbWUgdGVybWlub2xvZ3kgZnJvbSBORUEg4oCc
UG9zdHVyZSBUcmFuc3BvcnQgQ2xpZW504oCdIGluc3RlYWQgb2YgcmVtYWluaW5nIHRoaW5ncywg
ZS5nLiDigJxDb21tcyBDbGllbnTigJ0uDQoNCg0KMy4xOiAiVGhlIEVuZHBvaW50IENvbXBsaWFu
Y2UgUHJvZmlsZSAxLjAgZGVzY3JpYmVzIGhvdyBJRVRGIGFuZCBUTkMgZGF0YQ0KDQogICBtb2Rs
ZXMgYW5kIHByb3RvY29scyBtYWtl4oCdLiBNb2RlbHMgbWF5YmU/DQoNCg0KMy4yOiAiVXNlcyBv
ZiB0aGlzIGRhdGEgYXJlIGlubnVtZXJhYmxlLS0NCg0KICAgdnVsbmVyYWJpbGl0eSBtYW5hZ2Vt
ZW50LCBhc3NldCBtYW5hZ2VtZW50LCBzb2Z0d2FyZSBhc3NldA0KICAgbWFuYWdlbWVudCwgYW5k
IGNvbmZpZ3VyYXRpb24gbWFuYWdlbWVudCBzb2x1dGlvbnMsIGFuYWx5dGljcyB0b29scyzigKbi
gJ0gcmVtb3ZlIHRoZSBlcnJhbnQg4oCcYW5k4oCdIGluIHRoZSBtaWRkbGUgb2YgdGhlIHNlbnRl
bmNlLg0KDQoNCg0KMy4yOiBJIGZlZWwgbGlrZSB0aGVyZSBpcyBzb21lIHJlYWwgbWVhdCBtaXNz
aW5nIGhlcmUuICBJcyB0aGVyZSBtb3JlIHRvIGNvbWU/DQoNCg0KDQo0LjE6ICJlbmRwb2ludCBw
b3N0dXJlIGluZm9ybWF0aW9uIHMgYW5kIHRvIG1ha2UgaXQgYXZhaWxhYmxlIHRvIG90aGVyDQoN
CiAgIGF1dGhvcml6ZWQgcGFydGllcy7igJ0gLSByYW5kb20g4oCcc+KAnS4NCg0KDQoNCjQuMi4x
OiAiQSBuZXR3b3JrLWNvbm5lY3RlZCBlbmRwb2ludCBzZW5kcyBwb3N0dXJlIGluZm9ybWF0aW9u
IHVzaW5nIHN0YW5kYXJkDQoNCiAgIHNjaGVtYXMgYW4gcHJvdG9jb2xzLuKAnSDigJxhbiIgc2hv
dWxkIGJlIOKAnGFuZOKAnS4NCg0KDQo0LjIuMTogIjQuICBUaGUgU1dJRCBQb3N0dXJlIENvbGxl
Y3RvciBvbiB0aGUgZW5kcG9pbnQgY29sbGVjdHMgZnJvbSB0aGUgU1dJRA0KDQogICAgICAgdGFn
IGRpcmVjdG9yeSBvbiB0aGUgZW5kcG9pbnQuICBUaGlzIGRhdGEgaXMgc2VudCB2aWEgdGhlIE5F
QUMNCiAgICAgICBhbmQgUFRDIHRvIHRoZSBzZXJ2ZXIu4oCdICAgLSB0aGlzIGFzc3VtZXMgYSBm
YXQgY2xpZW50LCByaWdodC4gIOKAnFNlbnQgdmlhIHRoZSBORUFDIGFuZCBQVEPigJ0sIHdvdWxk
IHJld29yZGluZyB0aGF0IHRvIOKAnHNlbnQgdmlhIHRoZSBORUFDIG92ZXIgUFRD4oCdIG1heWJl
Pw0KDQoNCjQuMi4xOiAiNS4gIE9uY2UgdGhlIHBvc3R1cmUgaW5mb3JtYXRpb24gaXMgcmVjZWl2
ZWQgYnkgdGhlIFBUUywgaXQgaXMNCg0KICAgICAgIGZvcndhcmRlZCB0byB0aGUgU1dJRCBQb3N0
dXJlIFZhbGlkYXRvciB2aWEgdGhlIE5FQVMuICBUaGUgU1dJRA0KICAgICAgIFBvc3R1cmUgVmFs
aWRhdG9yIGFsc28gZm9yd2FyZHMgdGhlIHBvc3R1cmUgaW5mb3JtYXRpb24gdG8gdGhlDQogICAg
ICAgcmVwb3NpdG9yeS4gIFRoZSBwb3N0dXJlIGluZm9ybWF0aW9uIGlzIHN0b3JlZCBhbG9uZyB3
aXRoIHBhc3QNCiAgICAgICBwb3N0dXJlIGluZm9ybWF0aW9uIGNvbGxlY3RlZCBhYm91dCB0aGUg
ZW5kcG9pbnQu4oCdICAgLSBUaGlzIGlzIHJlYWxseSBjb25mdXNpbmcsIG5vdCB0aGUgbGVhc3Qg
b2Ygd2hpY2ggYmVjYXVzZSBub25lIG9mIHRoZSBuYW1lcyBtYXRjaCB0aGUgbmFtZXMgaW4gdGhl
IGRpYWdyYW0uDQoNCg0KNC4yLjI6ICJCZWNhdXNlIHRoZSBlbmRwb2ludCBwb3N0dXJlIGluZm9y
bWF0aW9uIHdhcyBzZW50IGluIGEgc3RhbmRhcmRzLQ0KDQogICBiYXNlZCBzY2hlbWEgKElTTy9J
RUMgMTk3NzAtMjoyMDA5KSBvdmVyIHNlY3VyZSwgc3RhbmRhcmRpemVkDQogICBwcm90b2NvbHMs
IGFuZCB0aGUgU1dJRCB0YWdzIGFyZSBzdG9yZWQgaW4gYSBjZW50cmFsaXplZCByZXBvc2l0b3J5
DQogICBsaW5rZWQgdG8gdW5pcXVlIGVuZHBvaW50IGlkZW50aWZpZXJzLCBhdXRob3JpemVkIHBh
cnRpZXMgYXJlIGFibGUgdG8NCiAgIGFjY2VzcyB0aGUgcG9zdHVyZSBpbmZvcm1hdGlvbi7igJ0g
LSB0aGlzIGp1c3Qgc2VlbXMgbGlrZSBhIGNvbXBsZXRlIG5vbi1zZXF1aXR1ci4NCg0KDQo0LjIu
MjogIkl0IHNob3VsZCBiZSBub3RlZCB0aGF0IHRoZSBuZWl0aGVyIHRoZSBFbmRwb2ludCBDb21w
bGlhbmNlIFByb2ZpbGUNCg0KICAgbm9yIHRoZSBwcm90b2NvbHMsIGludGVyZmFjZXMsIGFuZCBk
YXRhIG1vZGVscyB0aGF0IGl0IHJlZmVyZW5jZXMNCiAgIHByb3ZpZGUgc29sdXRpb25zIHRvIHRo
ZSBzZXJ2ZXIgY2FwYWJpbGl0aWVzIGxpc3RlZCBhYm92ZS4gIEhvd2V2ZXIsDQogICB0aGVzZSBj
YXBhYmlsaXRpZXMgYXJlIHVzZWZ1bCBhbmQgc29sdXRpb25zIGZvciB0aGVtIHNob3VsZCBiZQ0K
ICAgcHVyc3VlZCBpbiB0aGUgZnV0dXJlLuKAnSAtIGRvZXNu4oCZdCB0aGlzIG1ha2Ugc2VjdGlv
biAzLjMgYSBsb3QgZWFzaWVyIHRvIHdyaXRlPw0KDQoNCjQuMi4yLjE6IFRoZXNlIHNlZW0gb3V0
IG9mIHNjb3BlIGZvciB0aGUgZG9jdW1lbnQuICBJdCBzZWVtcyBsaWtlIHRoZXNlIGFyZSBlaXRo
ZXIgVUkgcmVxdWlyZW1lbnRzOyBvdGhlcndpc2Ugbm90IHN1cmUgaG93IHRoaXMgZml0cy4NCg0K
DQo0LjIuMzogV2h5IOKAnE5vbi1TdXBwb3J0ZWTigJ0gaW5zdGVhZCBvZiDigJxVbnN1cHBvcnRl
ZOKAnT8NCg0KDQo0LjIuMzogUHViL1N1YjogQ2FuIHRoaXMgYmUgcmV3b3JkZWQgdG8gcmVhZCBt
b3JlIGVhc2lseT8NCg0KNC4yLjQ6IOKAnEVhc3kgdG8gdXNlOuKAnSAgLSBJIGRvbuKAmXQgdGhp
bmsgdGhlIElFVEYgd2FudHMgdG8gZ2V0IGludG8gdGhlIHVzZXIgaW50ZXJmYWNlIHN0YW5kYXJk
cyAvIHJlY29tbWVuZGF0aW9ucyBidXNpbmVzcy4gIEFsc28sIEkgdGhpbmsgdGhpcyBtaWdodCBi
ZSBhIGdyZWF0IHBsYWNlIHdoZXJlIHRoZSBtYXJrZXQgY2FuIHJld2FyZCBhIGdvb2QgVUkgdnMu
IGEgYmFkIFVJIGVzcGVjaWFsbHkgd2l0aCBjb25zaWRlcmF0aW9uIG9mIGZ1bmN0aW9uYWxpdHkg
dnMuIGVhc2Ugb2YgdXNlLg0KDQo0LjIuNTog4oCcQ2VydGlmaWNhdGUgcHJvdmlzaW9uaW5n4oCd
IC0gdGhpcyBzZWVtcyB0byBzYXksIGVudGVycHJpc2VzIHdpbGwgdXNlIGNlcnRpZmljYXRlcyB0
byBzZWN1cmUgYW4gZW5kcG9pbnQgaWRlbnRpdHkgYW5kIGNvbW11bmljYXRpb25zLCB1bmxlc3Mg
dGhleSBkb27igJl0LiAgPz8/Pw0KDQoNCg0KPHN0b3BwZWQgcmVhZGluZyBhdCBzZWN0aW9uIDg+
DQoNCg0KDQoNCg==

--_000_AEC6CB01B90D4096B87CDFC99A305FE8certorg_
Content-Type: text/html; charset="utf-8"
Content-ID: <2C99ECDC0176DC43AE071AB2885A67F7@sei.cmu.edu>
Content-Transfer-Encoding: base64
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--_000_AEC6CB01B90D4096B87CDFC99A305FE8certorg_--


From nobody Thu Mar 22 02:24:44 2018
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sacm@ietf.org
Delivered-To: sacm@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 31A7B126CC4; Thu, 22 Mar 2018 02:24:39 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: sacm@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.76.0
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <152171067915.5697.18130555659798674871@ietfa.amsl.com>
Date: Thu, 22 Mar 2018 02:24:39 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/hLBLkVyOrokZdKdHqIDtG-8G7FI>
Subject: [sacm] I-D Action: draft-ietf-sacm-rolie-softwaredescriptor-02.txt
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Mar 2018 09:24:39 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Security Automation and Continuous Monitoring WG of the IETF.

        Title           : Definition of the ROLIE Software Descriptor Extension
        Authors         : David Waltermire
                          Stephen Banghart
	Filename        : draft-ietf-sacm-rolie-softwaredescriptor-02.txt
	Pages           : 13
	Date            : 2018-03-22

Abstract:
   This document extends the Resource-Oriented Lightweight Information
   Exchange (ROLIE) core to add the information type category and
   related requirements needed to support Software Record and Software
   Inventory use cases.  The 'software-descriptor' information type is
   defined as a ROLIE extension.  Additional supporting requirements are
   also defined that describe the use of specific formats and link
   relations pertaining to the new information type.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sacm-rolie-softwaredescriptor/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-sacm-rolie-softwaredescriptor-02
https://datatracker.ietf.org/doc/html/draft-ietf-sacm-rolie-softwaredescriptor-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sacm-rolie-softwaredescriptor-02


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Fri Mar 23 16:12:37 2018
Return-Path: <cherifmansour@gmail.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5770212E03E for <sacm@ietfa.amsl.com>; Fri, 23 Mar 2018 16:12:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6qTsHS4PwAJC for <sacm@ietfa.amsl.com>; Fri, 23 Mar 2018 16:12:34 -0700 (PDT)
Received: from mail-ua0-x234.google.com (mail-ua0-x234.google.com [IPv6:2607:f8b0:400c:c08::234]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A5ED7126DEE for <sacm@ietf.org>; Fri, 23 Mar 2018 16:12:34 -0700 (PDT)
Received: by mail-ua0-x234.google.com with SMTP id b13so8793407uam.10 for <sacm@ietf.org>; Fri, 23 Mar 2018 16:12:34 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:from:date:message-id:subject:to; bh=+74g/cw5vjJJOX1R4rAVoqCqeBC2OhXgjgC2b5zd2AA=; b=SDDVuf5w9lNYRTV4FF6js/OwOtDNKwvGKaPtAXLd1HUEcS1vNSDFRSy5SWdPvu6+6K xWIETNpDbR3/RszWz1tuqC2LvlaVepK4M7wHl1Coi9xzcb+HboHvVWXttZMf8V5ebPai A/z+ojZrZZCYCFFtuS5+G0u/r4c5z7alMXFjz5Nu7fsJ+9FK9r/5d7toFmRZdHRjw8NR GGls3t5zJHOyn/sNvAvryhoIZ1y7IFgJqhOHhiRcAIa7b03PECsKy/Q5X7uU58m2WoTd luYliykce3pxYls9+o7ujY9GdNGLUjcbDSSlRjobnqBg1ZrVXaUW0MU4IHR5OLnBhwpc JHew==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:from:date:message-id:subject:to; bh=+74g/cw5vjJJOX1R4rAVoqCqeBC2OhXgjgC2b5zd2AA=; b=ct2zmH3kQFD9i8jo6/7mvunZyahlDa/eAUHnnAJcnwkqVP8Sn3MAbBLxz13FlKO1kG Ml+IanVMnHnxI/N7TU/hNpdS3/U+lboAQeqpBF0Opq2va/4oPM99NAyldZPyO7epZZrX G7B5Gb0+89L/FUGUOlB0HoPzSNSz5XYZZfHemUtUwNTLtSf+BCLQp5eiB0uhfGD5+EgT aj7zc9DFj9pSgn6lOb037/i23G1pp041dt4QaDsql6P6F8Ek/0Qb0N52ML+KyyxaJlaK swHWwbctreM9YbchR8QA+65o745pNDROigwUYtGnh+ZjSw9AH5YNsF3RLv7mbd8w6yaQ 5Y+g==
X-Gm-Message-State: AElRT7E5j8zp4noT+m+/DI8pV9zwbVAsMLHG/pzYaLay5H7AY3siZIFU GDWj/9N9rxhVoYLW+apyOg+0zKdEu3vXjFHCGrVmRw==
X-Google-Smtp-Source: AG47ELud04LtBFn6TvcMZrUN8rlSrk/1RqOw+0YHuz4T1SdNitXCXHnbNjj76UFY42YR4bGs17W07DEY7SsuYanT8aA=
X-Received: by 10.176.25.108 with SMTP id u44mr15828471uag.190.1521846753535;  Fri, 23 Mar 2018 16:12:33 -0700 (PDT)
MIME-Version: 1.0
Received: by 10.103.202.22 with HTTP; Fri, 23 Mar 2018 16:12:32 -0700 (PDT)
From: Sherif Mansour <cherifmansour@gmail.com>
Date: Fri, 23 Mar 2018 23:12:32 +0000
Message-ID: <CAOxmg6sNU79N+d9ZLh_eRBDG4=KCEofaaeLHVAxP2ck+EqBmzA@mail.gmail.com>
To: sacm@ietf.org
Content-Type: multipart/alternative; boundary="f403043ecc2025ac9805681c8f90"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/aPvR4o5nxJHAwu-nv9WwE9zVQio>
Subject: [sacm] Safe Flight and Thank you for a Memorable IETF Meeting
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Mar 2018 23:12:36 -0000

--f403043ecc2025ac9805681c8f90
Content-Type: text/plain; charset="UTF-8"

Dear all,

Thank you for a great IETF meeting, this was my first meeting and I learned
a lot and quite enjoyed it. It was a pleasure talking to you all and
learning about all the exciting work taking place in that area.

I have added my notes to etherpad, but hope to do a better write up soon.

Kind regards,
Sherif Mansour

--f403043ecc2025ac9805681c8f90
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Dear all,<div><br></div><div>Thank you for a great IETF me=
eting, this was my first meeting and I learned a lot and quite enjoyed it. =
It was a pleasure talking to you all and learning about all the exciting wo=
rk taking place in that area.</div><div><br></div><div>I have added my note=
s to etherpad, but hope to do a better write up soon.</div><div><br></div><=
div>Kind regards,=C2=A0</div><div>Sherif Mansour</div></div>

--f403043ecc2025ac9805681c8f90--


From nobody Tue Mar 27 05:28:16 2018
Return-Path: <adam.w.montville@gmail.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B7C712DA01 for <sacm@ietfa.amsl.com>; Tue, 27 Mar 2018 05:28:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wuHgTAD99fhM for <sacm@ietfa.amsl.com>; Tue, 27 Mar 2018 05:28:12 -0700 (PDT)
Received: from mail-oi0-x236.google.com (mail-oi0-x236.google.com [IPv6:2607:f8b0:4003:c06::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A267212D95E for <sacm@ietf.org>; Tue, 27 Mar 2018 05:28:12 -0700 (PDT)
Received: by mail-oi0-x236.google.com with SMTP id z8-v6so553763oix.2 for <sacm@ietf.org>; Tue, 27 Mar 2018 05:28:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=is5Zy3Uc8JA1MB8R1Uc95BFIcgjTDkV/W+POuzd/gpo=; b=MOwp6CRXP3O5FZGwpoGQxIv32xR5aHACALb04ZYJovqtxzHE9MDBs/pQjFv+C344/y JCr8XPQDf4HfTKB2fwCZPksfqNeiqr0sJaoqZ2yLrYho6n1VYsUGJWDYcSTnxe2/2EMt 74tWDdSXxAGUp1kYbXIsT7tSA3NQi3kyChOxRTWSTGSAz+l0upsRbPrP6au8hYsSXg4G RxFPH+d6pjH5JV4fhlfo4u9+17ErCr7nkX+DTx+8R7CX+MKLgSbmzOZ25RkDrm+UuJsB +Ye1tY9XXmqh5dGn+NfLN/ohPUCjPLczj7/8DWrbea8Nbkl0kmD5Qy9yhBtxfR+FXeYK ZmAQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=is5Zy3Uc8JA1MB8R1Uc95BFIcgjTDkV/W+POuzd/gpo=; b=ZuBzccNRonkUF1fENUU50Y3uYj2D2PLXrQg5yAIwQLTkM9JSUlzT0UfLGdW+VnZF78 lpzkRbeaKMHIW29Qx6pz0T5QRA17KBnwWAujwOiIUng+KAkkMq/Kn/XiuWPs5WbItTLh eXa+525lAsEWPFF6Bho7q5Sak+YsanGSiR99hBAKjmAW3bNGbyVtFeyMHQ19gaQG8meu cQbQDhrcbN72pKvE1TrbQbRzOQqDtFMM2N1sUDYsDfL8fSqERWn8/zFIbT+bmug6Jml8 Z0yCyj9YH7n8gOkAqfMHsZXpryJKRKn4bhDIsUadLmitA4ta0vd4N79L1KKQk6VdGDdq SiCA==
X-Gm-Message-State: AElRT7HTl9QLGVS2pFDVEYfUPFugs4WdBlp19tw7KDdX6UmpB4Z7+q4v 3n96FNyG8mgbk+9nVlzUyVw=
X-Google-Smtp-Source: AG47ELthzRfygugbKrbhvhZlboa97/SeB/zfq+aXWNzbGT6+GZozYbTLDQ6LCrHIQCP/pt9vlqFhQQ==
X-Received: by 10.202.236.78 with SMTP id k75mr21656321oih.81.1522153691829; Tue, 27 Mar 2018 05:28:11 -0700 (PDT)
Received: from macbook-3.lan (99-64-100-131.lightspeed.austtx.sbcglobal.net. [99.64.100.131]) by smtp.gmail.com with ESMTPSA id x134-v6sm554972oif.58.2018.03.27.05.28.09 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 27 Mar 2018 05:28:10 -0700 (PDT)
Content-Type: text/plain; charset=us-ascii
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
From: Adam Montville <adam.w.montville@gmail.com>
In-Reply-To: <CAOxmg6sNU79N+d9ZLh_eRBDG4=KCEofaaeLHVAxP2ck+EqBmzA@mail.gmail.com>
Date: Tue, 27 Mar 2018 07:28:08 -0500
Cc: sacm@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <3BB7C54E-18EA-4B35-86B0-97A5C358D355@gmail.com>
References: <CAOxmg6sNU79N+d9ZLh_eRBDG4=KCEofaaeLHVAxP2ck+EqBmzA@mail.gmail.com>
To: Sherif Mansour <cherifmansour@gmail.com>
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/kwm85I6ua2CpsAPDD9QaKyOJrrs>
Subject: Re: [sacm] Safe Flight and Thank you for a Memorable IETF Meeting
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Mar 2018 12:28:15 -0000

Sherif,

Thanks for joining the meeting. You have some interesting and practical =
use cases we should consider, and I hope you continue to join our =
ongoing efforts!

Kind regards,

Adam


> On Mar 23, 2018, at 6:12 PM, Sherif Mansour <cherifmansour@gmail.com> =
wrote:
>=20
> Dear all,
>=20
> Thank you for a great IETF meeting, this was my first meeting and I =
learned a lot and quite enjoyed it. It was a pleasure talking to you all =
and learning about all the exciting work taking place in that area.
>=20
> I have added my notes to etherpad, but hope to do a better write up =
soon.
>=20
> Kind regards,=20
> Sherif Mansour
> _______________________________________________
> sacm mailing list
> sacm@ietf.org
> https://www.ietf.org/mailman/listinfo/sacm


From nobody Tue Mar 27 12:07:43 2018
Return-Path: <noreply@github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4382112DB6E for <sacm@ietfa.amsl.com>; Tue, 27 Mar 2018 12:07:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.392
X-Spam-Level: 
X-Spam-Status: No, score=-5.392 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_24=1.618, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hUNP_f2yt_lZ for <sacm@ietfa.amsl.com>; Tue, 27 Mar 2018 12:07:32 -0700 (PDT)
Received: from out-5.smtp.github.com (out-5.smtp.github.com [192.30.252.196]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E0853120227 for <sacm@ietf.org>; Tue, 27 Mar 2018 12:07:31 -0700 (PDT)
Date: Tue, 27 Mar 2018 12:07:31 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com; s=pf2014; t=1522177651; bh=gzXOzDW00PZKdHtYJxFZ0ZdvDGIy0mUdam5KE0pzf3c=; h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:List-ID: List-Archive:List-Post:List-Unsubscribe:From; b=nJ7NJeh1v0N/lupmPvGOsgKLPR2bw9jawXVoaXSuHj22dV7BAQG0+c3LgDCl/R+fi uPEDTJTsF0zNen/SV2StWdPhd05kpYZtkv+Kh4UGG/rJZteKvE207sQsP75dFpOzn+ jggV/MNHqufty/JZW6MfV3kz+c84O/dFsdxZbFOE=
From: adammontville <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-terminology <reply+00a6c4d13d9c064b4710f13cb0a9d47afc3ab3c1cc63935f92cf0000000116d2587392a169ce10bce81b@reply.github.com>
To: sacmwg/draft-ietf-sacm-terminology <draft-ietf-sacm-terminology@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-terminology/issue/61/issue_event/1544005297@github.com>
In-Reply-To: <sacmwg/draft-ietf-sacm-terminology/issues/61@github.com>
References: <sacmwg/draft-ietf-sacm-terminology/issues/61@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5aba967348916_3fa52abb52034ed0738f0"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: adammontville
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/Mf0qB0q__ZGrdXTCxVfEpRf-xNI>
Subject: Re: [sacm] [sacmwg/draft-ietf-sacm-terminology] Should we change "asset" to "SACM asset"? (#61)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Mar 2018 19:07:34 -0000

----==_mimepart_5aba967348916_3fa52abb52034ed0738f0
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Closed #61.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/61#event-1544005297
----==_mimepart_5aba967348916_3fa52abb52034ed0738f0
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

<p>Closed <a class="issue-link js-issue-link" data-error-text="Failed to load issue title" data-id="280815643" data-permission-text="Issue title is private" data-url="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/61" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/61">#61</a>.</p>

<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">&mdash;<br />You are receiving this because you are subscribed to this thread.<br />Reply to this email directly, <a href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/61#event-1544005297">view it on GitHub</a>, or <a href="https://github.com/notifications/unsubscribe-auth/AKbE0Zd6cw46EM8RRcHAPasxNfxUn6PDks5tio3zgaJpZM4Q8hXd">mute the thread</a>.<img src="https://github.com/notifications/beacon/AKbE0T-Wp-_sBX5n37sCe1Xr8O-XywvZks5tio3zgaJpZM4Q8hXd.gif" height="1" width="1" alt="" /></p>
<div itemscope itemtype="http://schema.org/EmailMessage">
<div itemprop="action" itemscope itemtype="http://schema.org/ViewAction">
  <link itemprop="url" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/61#event-1544005297"></link>
  <meta itemprop="name" content="View Issue"></meta>
</div>
<meta itemprop="description" content="View this Issue on GitHub"></meta>
</div>

<script type="application/json" data-scope="inboxmarkup">{"api_version":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-terminology","title":"sacmwg/draft-ietf-sacm-terminology","subtitle":"GitHub repository","main_image_url":"https://cloud.githubusercontent.com/assets/143418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology"}},"updates":{"snippets":[{"icon":"DESCRIPTION","message":"Closed #61."}],"action":{"name":"View Issue","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/61#event-1544005297"}}}</script>
----==_mimepart_5aba967348916_3fa52abb52034ed0738f0--


From nobody Tue Mar 27 12:07:48 2018
Return-Path: <noreply@github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5461D120227 for <sacm@ietfa.amsl.com>; Tue, 27 Mar 2018 12:07:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.392
X-Spam-Level: 
X-Spam-Status: No, score=-5.392 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_24=1.618, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KIE5IcJG5OJ2 for <sacm@ietfa.amsl.com>; Tue, 27 Mar 2018 12:07:32 -0700 (PDT)
Received: from out-5.smtp.github.com (out-5.smtp.github.com [192.30.252.196]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2917F12785F for <sacm@ietf.org>; Tue, 27 Mar 2018 12:07:32 -0700 (PDT)
Date: Tue, 27 Mar 2018 12:07:31 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com; s=pf2014; t=1522177651; bh=PbZ+AVyGN8ZdhwaVFVOXEWlEzuhVFGsO0j5+bgxWQEo=; h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:List-ID: List-Archive:List-Post:List-Unsubscribe:From; b=pGD39MaDmgLkUX61vhBPtGzGNnjWO5G9YbcsQqHO49jwFa8eMO/OnoWGLkBImPQ8l jP047r4AzJGieAHhSESlcBh4uPR5kpq1mxGqGiHGbJVOIIGU+bhtXPw2RDXtIhJMF4 23bXDG49wEdCNVQFarezATjLDTU6wus7IBnh7iT8=
From: adammontville <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-terminology <reply+00a6c4d1c1cb065e719b4fa52ed916a71cbc6659893548d092cf0000000116d2587392a169ce10bcf5e1@reply.github.com>
To: sacmwg/draft-ietf-sacm-terminology <draft-ietf-sacm-terminology@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-terminology/issue/69/issue_event/1544005306@github.com>
In-Reply-To: <sacmwg/draft-ietf-sacm-terminology/issues/69@github.com>
References: <sacmwg/draft-ietf-sacm-terminology/issues/69@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5aba967383cef_4e952aedd8638ecc3475b"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: adammontville
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/ZNIO6Vopq79ns6s352SyGz4H4pE>
Subject: Re: [sacm] [sacmwg/draft-ietf-sacm-terminology] Improve the definition of SACM Component Discovery (#69)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Mar 2018 19:07:35 -0000

----==_mimepart_5aba967383cef_4e952aedd8638ecc3475b
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Closed #69.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/69#event-1544005306
----==_mimepart_5aba967383cef_4e952aedd8638ecc3475b
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

<p>Closed <a class="issue-link js-issue-link" data-error-text="Failed to load issue title" data-id="280819169" data-permission-text="Issue title is private" data-url="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/69" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/69">#69</a>.</p>

<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">&mdash;<br />You are receiving this because you are subscribed to this thread.<br />Reply to this email directly, <a href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/69#event-1544005306">view it on GitHub</a>, or <a href="https://github.com/notifications/unsubscribe-auth/AKbE0aiLqZssrKJ3vfTnzhFB263sNFNnks5tio3zgaJpZM4Q8iY-">mute the thread</a>.<img src="https://github.com/notifications/beacon/AKbE0fW3FeNCepxv8HDJzc_kCG3w74ynks5tio3zgaJpZM4Q8iY-.gif" height="1" width="1" alt="" /></p>
<div itemscope itemtype="http://schema.org/EmailMessage">
<div itemprop="action" itemscope itemtype="http://schema.org/ViewAction">
  <link itemprop="url" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/69#event-1544005306"></link>
  <meta itemprop="name" content="View Issue"></meta>
</div>
<meta itemprop="description" content="View this Issue on GitHub"></meta>
</div>

<script type="application/json" data-scope="inboxmarkup">{"api_version":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-terminology","title":"sacmwg/draft-ietf-sacm-terminology","subtitle":"GitHub repository","main_image_url":"https://cloud.githubusercontent.com/assets/143418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology"}},"updates":{"snippets":[{"icon":"DESCRIPTION","message":"Closed #69."}],"action":{"name":"View Issue","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/69#event-1544005306"}}}</script>
----==_mimepart_5aba967383cef_4e952aedd8638ecc3475b--


From nobody Tue Mar 27 12:07:52 2018
Return-Path: <bounces+848413-495d-sacm=ietf.org@sgmail.github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CF60312DB6E for <sacm@ietfa.amsl.com>; Tue, 27 Mar 2018 12:07:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.392
X-Spam-Level: 
X-Spam-Status: No, score=-0.392 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_24=1.618, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SWDESA047tYz for <sacm@ietfa.amsl.com>; Tue, 27 Mar 2018 12:07:34 -0700 (PDT)
Received: from o4.sgmail.github.com (o4.sgmail.github.com [192.254.112.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 832E112D969 for <sacm@ietf.org>; Tue, 27 Mar 2018 12:07:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=github.com;  h=from:reply-to:to:cc:in-reply-to:references:subject:mime-version:content-type:content-transfer-encoding:list-id:list-archive:list-post:list-unsubscribe; s=s20150108; bh=qlsp/XFxZ/Gc7MF9GbTZWN37q1c=; b=ewAauGSaJkFRKN/e C8lO5cmzA2ddLnCmc8bew8Zz0o/scd2AowYH8sdIY9Nw85+3vlkhbzJDVKtY9Ubv Ha2OnoeN1LaHQdq6T4dkrBJURptaPAqZbdJPp4JnxzldIrMbe32oMp1G2+D91iER XsekGfa+xeKQBb4Cf0ZQSejI/xs=
Received: by filter0577p1las1.sendgrid.net with SMTP id filter0577p1las1-3540-5ABA9674-B 2018-03-27 19:07:32.153717557 +0000 UTC
Received: from smtp.github.com (out-5.smtp.github.com [192.30.252.196]) by ismtpd0022p1iad2.sendgrid.net (SG) with ESMTP id W5nALx48STqo2h7HRsZj8g for <sacm@ietf.org>; Tue, 27 Mar 2018 19:07:32.103 +0000 (UTC)
Date: Tue, 27 Mar 2018 19:07:32 +0000 (UTC)
From: adammontville <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-terminology <reply+00a6c4d18c27a7c2181217f40861b0154936c603d875901892cf0000000116d2587392a169ce10bcf876@reply.github.com>
To: sacmwg/draft-ietf-sacm-terminology <draft-ietf-sacm-terminology@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-terminology/issue/74/issue_event/1544005310@github.com>
In-Reply-To: <sacmwg/draft-ietf-sacm-terminology/issues/74@github.com>
References: <sacmwg/draft-ietf-sacm-terminology/issues/74@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5aba9674b0e_34ab3fe183c0af2c778dd"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: adammontville
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
X-SG-EID: UtArl2HfP/Y+1oZ8SNY9H6rXzGpPQITz8ikMri3C7WmlCLfetSxNL+y1fjsFNXrPEj0CsIDDcfnc2m 7nDiE143mym9jQbb2MePKFNg1UqkpT5lnGns+a/X1+YEDEVUb8ysUf72mNiEuXURCpZ/TJb+syLC3h PCZwYJA2dkmATZlaFs/Hoa9FkT0eGgYk4J8hEs6192dqLcpZrlVHCl811Q==
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/NG7WWFunwp5wtiHnOZQ0d-SDep8>
Subject: Re: [sacm] [sacmwg/draft-ietf-sacm-terminology] Propose to remove Target Endpoint Characterization (#74)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Mar 2018 19:07:36 -0000

----==_mimepart_5aba9674b0e_34ab3fe183c0af2c778dd
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Closed #74.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/74#event-1544005310
----==_mimepart_5aba9674b0e_34ab3fe183c0af2c778dd
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

<p>Closed <a class="issue-link js-issue-link" data-error-text="Failed to load issue title" data-id="280819830" data-permission-text="Issue title is private" data-url="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/74" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/74">#74</a>.</p>

<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">&mdash;<br />You are receiving this because you are subscribed to this thread.<br />Reply to this email directly, <a href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/74#event-1544005310">view it on GitHub</a>, or <a href="https://github.com/notifications/unsubscribe-auth/AKbE0SXDlhMI_vPcZQZ9_WsMKCn2lbIbks5tio30gaJpZM4Q8ilS">mute the thread</a>.<img src="https://github.com/notifications/beacon/AKbE0QsbfBln9Qp4Rvxre8B5WJJ4L9VOks5tio30gaJpZM4Q8ilS.gif" height="1" width="1" alt="" /></p>
<div itemscope itemtype="http://schema.org/EmailMessage">
<div itemprop="action" itemscope itemtype="http://schema.org/ViewAction">
  <link itemprop="url" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/74#event-1544005310"></link>
  <meta itemprop="name" content="View Issue"></meta>
</div>
<meta itemprop="description" content="View this Issue on GitHub"></meta>
</div>

<script type="application/json" data-scope="inboxmarkup">{"api_version":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-terminology","title":"sacmwg/draft-ietf-sacm-terminology","subtitle":"GitHub repository","main_image_url":"https://cloud.githubusercontent.com/assets/143418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology"}},"updates":{"snippets":[{"icon":"DESCRIPTION","message":"Closed #74."}],"action":{"name":"View Issue","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/74#event-1544005310"}}}</script>
----==_mimepart_5aba9674b0e_34ab3fe183c0af2c778dd--


From nobody Tue Mar 27 12:07:57 2018
Return-Path: <bounces+848413-495d-sacm=ietf.org@sgmail.github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D2C1120227 for <sacm@ietfa.amsl.com>; Tue, 27 Mar 2018 12:07:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.391
X-Spam-Level: 
X-Spam-Status: No, score=-0.391 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_24=1.618, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VVfxhaObStGE for <sacm@ietfa.amsl.com>; Tue, 27 Mar 2018 12:07:35 -0700 (PDT)
Received: from o1.sgmail.github.com (o1.sgmail.github.com [192.254.114.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8F48A12D96D for <sacm@ietf.org>; Tue, 27 Mar 2018 12:07:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=github.com;  h=from:reply-to:to:cc:in-reply-to:references:subject:mime-version:content-type:content-transfer-encoding:list-id:list-archive:list-post:list-unsubscribe; s=s20150108; bh=J94d70lrqnf4xh94rPHlUrtLpog=; b=ooqxi/UpWh9g2aUQ Tvrd6FVQuOvdPFb575BFGgpjMGNOXc7WpCtSgvpsK/v5fnES8Sua1a+o200WsdWQ aQVLdcB0QwjGpcZPfhfqJhQDMLWW3wiXZFjpH3YvzXeaWC65D6+6toOLR4ZFy2rX Ktfv9tLy4U/Bq150VkXijehfP0g=
Received: by filter0612p1las1.sendgrid.net with SMTP id filter0612p1las1-28328-5ABA9674-1 2018-03-27 19:07:32.067836046 +0000 UTC
Received: from smtp.github.com (out-2.smtp.github.com [192.30.252.193]) by ismtpd0004p1iad2.sendgrid.net (SG) with ESMTP id eW9T4uTYQ_y76QfLPiOQRw for <sacm@ietf.org>; Tue, 27 Mar 2018 19:07:32.002 +0000 (UTC)
Date: Tue, 27 Mar 2018 19:07:32 +0000 (UTC)
From: adammontville <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-terminology <reply+00a6c4d1ae036475237754bd6c42afed6c7d5c96bf07d52392cf0000000116d2587392a169ce10bcfaf9@reply.github.com>
To: sacmwg/draft-ietf-sacm-terminology <draft-ietf-sacm-terminology@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-terminology/issue/81/issue_event/1544005320@github.com>
In-Reply-To: <sacmwg/draft-ietf-sacm-terminology/issues/81@github.com>
References: <sacmwg/draft-ietf-sacm-terminology/issues/81@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5aba9673e8116_20022af960a8aec48063c"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: adammontville
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
X-SG-EID: UtArl2HfP/Y+1oZ8SNY9H5SIzNhhHYaEkCjoIBoBpX0HbNdvKVUuS7ggGHL1thmVVGzE+t/dRmCvT4 V7lsX3Hpa7rxMd3IVE3kxGB/2SKhdSoXikizdiQ1wapxQS9QhKhmwdnYPl5nSqiYqMpZg2JJ73eHQO QULVVpjIGRpYW92qmlasYutc2PAQJDi2JL/LBAbalQRjrAXm8qb8aPffNw==
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/kiDjzuYwO3lYLGhj6g4maEyROpc>
Subject: Re: [sacm] [sacmwg/draft-ietf-sacm-terminology] Either remove or actually define Virtual Component (#81)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Mar 2018 19:07:36 -0000

----==_mimepart_5aba9673e8116_20022af960a8aec48063c
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Closed #81.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/81#event-1544005320
----==_mimepart_5aba9673e8116_20022af960a8aec48063c
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

<p>Closed <a class="issue-link js-issue-link" data-error-text="Failed to load issue title" data-id="280820473" data-permission-text="Issue title is private" data-url="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/81" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/81">#81</a>.</p>

<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">&mdash;<br />You are receiving this because you are subscribed to this thread.<br />Reply to this email directly, <a href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/81#event-1544005320">view it on GitHub</a>, or <a href="https://github.com/notifications/unsubscribe-auth/AKbE0T32YaYSnMGcu2gnILZG5ZylqeLXks5tio3zgaJpZM4Q8ixQ">mute the thread</a>.<img src="https://github.com/notifications/beacon/AKbE0UGtII_jHpLMiJaJcpaPGrw-x6dEks5tio3zgaJpZM4Q8ixQ.gif" height="1" width="1" alt="" /></p>
<div itemscope itemtype="http://schema.org/EmailMessage">
<div itemprop="action" itemscope itemtype="http://schema.org/ViewAction">
  <link itemprop="url" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/81#event-1544005320"></link>
  <meta itemprop="name" content="View Issue"></meta>
</div>
<meta itemprop="description" content="View this Issue on GitHub"></meta>
</div>

<script type="application/json" data-scope="inboxmarkup">{"api_version":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-terminology","title":"sacmwg/draft-ietf-sacm-terminology","subtitle":"GitHub repository","main_image_url":"https://cloud.githubusercontent.com/assets/143418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology"}},"updates":{"snippets":[{"icon":"DESCRIPTION","message":"Closed #81."}],"action":{"name":"View Issue","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/81#event-1544005320"}}}</script>
----==_mimepart_5aba9673e8116_20022af960a8aec48063c--


From nobody Tue Mar 27 12:08:02 2018
Return-Path: <bounces+848413-495d-sacm=ietf.org@sgmail.github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C261F12DB6E for <sacm@ietfa.amsl.com>; Tue, 27 Mar 2018 12:07:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.391
X-Spam-Level: 
X-Spam-Status: No, score=-0.391 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_24=1.618, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id azrKyG0JS_hH for <sacm@ietfa.amsl.com>; Tue, 27 Mar 2018 12:07:35 -0700 (PDT)
Received: from o1.sgmail.github.com (o1.sgmail.github.com [192.254.114.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 15D0C12DA6B for <sacm@ietf.org>; Tue, 27 Mar 2018 12:07:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=github.com;  h=from:reply-to:to:cc:in-reply-to:references:subject:mime-version:content-type:content-transfer-encoding:list-id:list-archive:list-post:list-unsubscribe; s=s20150108; bh=L7cqOBYQHhqMfOSiT+dmSXZb9NM=; b=MsY/86xrhcIMgb8K +v0bokycWG+a6+9wo+92j7D+WiV57+argixO5GnIrmeEhgiPohAJO4i/l6uEmZ8A B194MW9g9ABce65tgh5A3MB1cHaUuA9o4jH99o1yTpi0vkiZ0BxPesqUAzOzlmsv U4nXcIdWp11vMjTNaY4m4xh7KC8=
Received: by filter0030p1las1.sendgrid.net with SMTP id filter0030p1las1-18845-5ABA9674-B 2018-03-27 19:07:32.152606446 +0000 UTC
Received: from smtp.github.com (out-2.smtp.github.com [192.30.252.193]) by ismtpd0005p1iad1.sendgrid.net (SG) with ESMTP id 309BC65nS2ORXz7guk01jA for <sacm@ietf.org>; Tue, 27 Mar 2018 19:07:32.098 +0000 (UTC)
Date: Tue, 27 Mar 2018 19:07:32 +0000 (UTC)
From: adammontville <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-terminology <reply+00a6c4d1c5d9269da5326de81e67622463435b4b94948bb292cf0000000116d2587492a169ce124119c2@reply.github.com>
To: sacmwg/draft-ietf-sacm-terminology <draft-ietf-sacm-terminology@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-terminology/issue/86/issue_event/1544005324@github.com>
In-Reply-To: <sacmwg/draft-ietf-sacm-terminology/issues/86@github.com>
References: <sacmwg/draft-ietf-sacm-terminology/issues/86@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5aba96745397_65522ac25ef36ed45861d"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: adammontville
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
X-SG-EID: UtArl2HfP/Y+1oZ8SNY9H+NmtJEAQ41FvPY/2uGEECLynVdQovunbmTEN8wVrWwoq2UbDz66yTLpQK CXqvULckUETsTp4qwYAC3wlMtQcutyOV+Rif48Y3HgpD2cgw9czUNfUe89oVda5n1uSuBM2OkasWDe yfTki+2NCAVsBabQ3geGYOUZTiV8hgVvgD3u1Dp3qioClPNNquiTlkYAFw==
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/BCJIbN4KlIlbGJTHY-Zv1i2JSms>
Subject: Re: [sacm] [sacmwg/draft-ietf-sacm-terminology] Bring back expositional text (#86)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Mar 2018 19:07:38 -0000

----==_mimepart_5aba96745397_65522ac25ef36ed45861d
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Closed #86.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/86#event-1544005324
----==_mimepart_5aba96745397_65522ac25ef36ed45861d
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

<p>Closed <a class="issue-link js-issue-link" data-error-text="Failed to load issue title" data-id="306256322" data-permission-text="Issue title is private" data-url="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/86" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/86">#86</a>.</p>

<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">&mdash;<br />You are receiving this because you are subscribed to this thread.<br />Reply to this email directly, <a href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/86#event-1544005324">view it on GitHub</a>, or <a href="https://github.com/notifications/unsubscribe-auth/AKbE0d9DxkZ1dK20LPCTkvkiZc2UsRiVks5tio30gaJpZM4SvRaJ">mute the thread</a>.<img src="https://github.com/notifications/beacon/AKbE0UAzIwaUzmxgzpm8GhKPZ0R8hvBKks5tio30gaJpZM4SvRaJ.gif" height="1" width="1" alt="" /></p>
<div itemscope itemtype="http://schema.org/EmailMessage">
<div itemprop="action" itemscope itemtype="http://schema.org/ViewAction">
  <link itemprop="url" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/86#event-1544005324"></link>
  <meta itemprop="name" content="View Issue"></meta>
</div>
<meta itemprop="description" content="View this Issue on GitHub"></meta>
</div>

<script type="application/json" data-scope="inboxmarkup">{"api_version":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-terminology","title":"sacmwg/draft-ietf-sacm-terminology","subtitle":"GitHub repository","main_image_url":"https://cloud.githubusercontent.com/assets/143418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology"}},"updates":{"snippets":[{"icon":"DESCRIPTION","message":"Closed #86."}],"action":{"name":"View Issue","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/86#event-1544005324"}}}</script>
----==_mimepart_5aba96745397_65522ac25ef36ed45861d--


From nobody Tue Mar 27 12:08:15 2018
Return-Path: <bounces+848413-495d-sacm=ietf.org@sgmail.github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 39DBC12E035 for <sacm@ietfa.amsl.com>; Tue, 27 Mar 2018 12:07:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.391
X-Spam-Level: 
X-Spam-Status: No, score=-0.391 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_24=1.618, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m4-Q0T3fAgd0 for <sacm@ietfa.amsl.com>; Tue, 27 Mar 2018 12:07:36 -0700 (PDT)
Received: from o9.sgmail.github.com (o9.sgmail.github.com [167.89.101.2]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E525F12DA53 for <sacm@ietf.org>; Tue, 27 Mar 2018 12:07:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=github.com;  h=from:reply-to:to:cc:in-reply-to:references:subject:mime-version:content-type:content-transfer-encoding:list-id:list-archive:list-post:list-unsubscribe; s=s20150108; bh=8qg6aGYDcDAXToMB1fl2meR0g2Q=; b=quFYc4WlNBwqEYZ3 rq2xIjp4GhIBmy54J+UVz79cfMbiQryxoGmXrPlNZCsdfl80PZ8cFvw0N0Qp0udZ kiOLm41GhU/nddeyxy6Yb9jIImpe1JOFNLdZF1jipsbyWazPpxYZXq4drhGY9ttP eGpriY114tGDB7+cyrxQ3KgoF2E=
Received: by filter0166p1iad2.sendgrid.net with SMTP id filter0166p1iad2-15016-5ABA9673-31 2018-03-27 19:07:31.647480034 +0000 UTC
Received: from smtp.github.com (out-5.smtp.github.com [192.30.252.196]) by ismtpd0024p1mdw1.sendgrid.net (SG) with ESMTP id QQ-tkv-QT5mBdTSA4ydblQ for <sacm@ietf.org>; Tue, 27 Mar 2018 19:07:31.599 +0000 (UTC)
Date: Tue, 27 Mar 2018 19:07:31 +0000 (UTC)
From: adammontville <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-terminology <reply+00a6c4d176aa92a8baecfa0e0e449dc53e7c21ccc3e129fc92cf0000000116d2587392a169ce10bcf52c@reply.github.com>
To: sacmwg/draft-ietf-sacm-terminology <draft-ietf-sacm-terminology@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-terminology/issue/68/issue_event/1544005304@github.com>
In-Reply-To: <sacmwg/draft-ietf-sacm-terminology/issues/68@github.com>
References: <sacmwg/draft-ietf-sacm-terminology/issues/68@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5aba967356f33_3f992abb52034ed0751bb"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: adammontville
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
X-SG-EID: UtArl2HfP/Y+1oZ8SNY9H5TSLzm+DI3Tw3Fqq0Z16069Z32J6d4ENzjwrZEb9ynAQMSlw8dHKiMz+R pYZ/BVDxp+vGqt0M/sBSfFiX+yZZSqMs8oI31/v1+lpFBG1lo8jJ7p2TMsKjJkiUeqQDREMZsKdnnJ qxW/+e9XpamJVGgP/ES+C9s3MWMoFYH3FC3gowSC/CaP5i4k12UQtgHOog==
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/t6pmxzZ77lFjaOewrEEssljBj8Y>
Subject: Re: [sacm] [sacmwg/draft-ietf-sacm-terminology] Proposal to remove the input/output details from definitions (#68)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Mar 2018 19:07:39 -0000

----==_mimepart_5aba967356f33_3f992abb52034ed0751bb
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Closed #68.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/68#event-1544005304
----==_mimepart_5aba967356f33_3f992abb52034ed0751bb
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

<p>Closed <a class="issue-link js-issue-link" data-error-text="Failed to load issue title" data-id="280818988" data-permission-text="Issue title is private" data-url="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/68" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/68">#68</a>.</p>

<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">&mdash;<br />You are receiving this because you are subscribed to this thread.<br />Reply to this email directly, <a href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/68#event-1544005304">view it on GitHub</a>, or <a href="https://github.com/notifications/unsubscribe-auth/AKbE0ShfCgiPkygwS5G-UkN7gcOqy6yWks5tio3zgaJpZM4Q8iVL">mute the thread</a>.<img src="https://github.com/notifications/beacon/AKbE0aVI3pu9N2t2W3Dhiq94L7CYzOxiks5tio3zgaJpZM4Q8iVL.gif" height="1" width="1" alt="" /></p>
<div itemscope itemtype="http://schema.org/EmailMessage">
<div itemprop="action" itemscope itemtype="http://schema.org/ViewAction">
  <link itemprop="url" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/68#event-1544005304"></link>
  <meta itemprop="name" content="View Issue"></meta>
</div>
<meta itemprop="description" content="View this Issue on GitHub"></meta>
</div>

<script type="application/json" data-scope="inboxmarkup">{"api_version":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-terminology","title":"sacmwg/draft-ietf-sacm-terminology","subtitle":"GitHub repository","main_image_url":"https://cloud.githubusercontent.com/assets/143418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology"}},"updates":{"snippets":[{"icon":"DESCRIPTION","message":"Closed #68."}],"action":{"name":"View Issue","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/68#event-1544005304"}}}</script>
----==_mimepart_5aba967356f33_3f992abb52034ed0751bb--


From nobody Tue Mar 27 12:08:28 2018
Return-Path: <bounces+848413-495d-sacm=ietf.org@sgmail.github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D13AC12E04D for <sacm@ietfa.amsl.com>; Tue, 27 Mar 2018 12:07:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.391
X-Spam-Level: 
X-Spam-Status: No, score=-0.391 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_24=1.618, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qo2aGPrPQvZk for <sacm@ietfa.amsl.com>; Tue, 27 Mar 2018 12:07:36 -0700 (PDT)
Received: from o5.sgmail.github.com (o5.sgmail.github.com [192.254.113.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4EFF612DA70 for <sacm@ietf.org>; Tue, 27 Mar 2018 12:07:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=github.com;  h=from:reply-to:to:cc:in-reply-to:references:subject:mime-version:content-type:content-transfer-encoding:list-id:list-archive:list-post:list-unsubscribe; s=s20150108; bh=rnRpgK+nYc3ZTzxO91sSExTGndU=; b=xEi86B7n+aVSSZ2N U80HzWJCfvkAmUbAddv4jV5jUmHMYE68jCocP2/axTkq822e8GYsaF9PXjzc2ork 9kBVpPmLg1NV2/yIXYHv0xNR3ga/kxDLPygbVA8eAEhm/7bz35/C3PIOVsgzhilj h7VmdK55j76IYixcz67SqV10tX4=
Received: by filter0230p1iad2.sendgrid.net with SMTP id filter0230p1iad2-14710-5ABA9673-2B 2018-03-27 19:07:31.721776093 +0000 UTC
Received: from smtp.github.com (out-2.smtp.github.com [192.30.252.193]) by ismtpd0020p1iad2.sendgrid.net (SG) with ESMTP id woV3_mmVQi-x7SnuNpls4g for <sacm@ietf.org>; Tue, 27 Mar 2018 19:07:31.792 +0000 (UTC)
Date: Tue, 27 Mar 2018 19:07:32 +0000 (UTC)
From: adammontville <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-terminology <reply+00a6c4d1309cea8ce590add0718b5bbae76cd550b37f02c592cf0000000116d2587392a169ce10bceb02@reply.github.com>
To: sacmwg/draft-ietf-sacm-terminology <draft-ietf-sacm-terminology@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-terminology/issue/65/issue_event/1544005300@github.com>
In-Reply-To: <sacmwg/draft-ietf-sacm-terminology/issues/65@github.com>
References: <sacmwg/draft-ietf-sacm-terminology/issues/65@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5aba9673990fc_339e3fe183c0af2c8455c"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: adammontville
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
X-SG-EID: UtArl2HfP/Y+1oZ8SNY9HzWmW516OlfXx+3L8PR5AlW3yZhEb0OXAeAPv5MtfYJzlRU0I2xvS8r7RC PiV7HqgXFy+vxC339Wm0iCpJ5BAZMilKJJcdCCN4Sf2eLnjgBo7gfOBYERRJKqOYE4nfDiH6zLpB9q ZT94MiUyqOwX2R8lzI38tVVMrsiAKM4L65sNuemBKiq1ZJmW9LMSwKKTBA==
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/riKWrFxDY4LhbM_frpZF_L7U6Cg>
Subject: Re: [sacm] [sacmwg/draft-ietf-sacm-terminology] Propose to remove Interaction Model from terminology (#65)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Mar 2018 19:07:43 -0000

----==_mimepart_5aba9673990fc_339e3fe183c0af2c8455c
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Closed #65.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/65#event-1544005300
----==_mimepart_5aba9673990fc_339e3fe183c0af2c8455c
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

<p>Closed <a class="issue-link js-issue-link" data-error-text="Failed to load issue title" data-id="280816386" data-permission-text="Issue title is private" data-url="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/65" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/65">#65</a>.</p>

<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">&mdash;<br />You are receiving this because you are subscribed to this thread.<br />Reply to this email directly, <a href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/65#event-1544005300">view it on GitHub</a>, or <a href="https://github.com/notifications/unsubscribe-auth/AKbE0Us-8OmLrmA2xFCzsHsYkEItHS6Lks5tio3zgaJpZM4Q8hl2">mute the thread</a>.<img src="https://github.com/notifications/beacon/AKbE0a3-5uZarE-MAM_rvRy41mctM1w0ks5tio3zgaJpZM4Q8hl2.gif" height="1" width="1" alt="" /></p>
<div itemscope itemtype="http://schema.org/EmailMessage">
<div itemprop="action" itemscope itemtype="http://schema.org/ViewAction">
  <link itemprop="url" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/65#event-1544005300"></link>
  <meta itemprop="name" content="View Issue"></meta>
</div>
<meta itemprop="description" content="View this Issue on GitHub"></meta>
</div>

<script type="application/json" data-scope="inboxmarkup">{"api_version":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-terminology","title":"sacmwg/draft-ietf-sacm-terminology","subtitle":"GitHub repository","main_image_url":"https://cloud.githubusercontent.com/assets/143418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology"}},"updates":{"snippets":[{"icon":"DESCRIPTION","message":"Closed #65."}],"action":{"name":"View Issue","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/65#event-1544005300"}}}</script>
----==_mimepart_5aba9673990fc_339e3fe183c0af2c8455c--


From nobody Tue Mar 27 12:08:32 2018
Return-Path: <bounces+848413-495d-sacm=ietf.org@sgmail.github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 27DCD12E054 for <sacm@ietfa.amsl.com>; Tue, 27 Mar 2018 12:08:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.392
X-Spam-Level: 
X-Spam-Status: No, score=-0.392 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_24=1.618, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZGcb3_nCt0AX for <sacm@ietfa.amsl.com>; Tue, 27 Mar 2018 12:08:14 -0700 (PDT)
Received: from o4.sgmail.github.com (o4.sgmail.github.com [192.254.112.99]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3C41B12E8C2 for <sacm@ietf.org>; Tue, 27 Mar 2018 12:08:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=github.com;  h=from:reply-to:to:cc:in-reply-to:references:subject:mime-version:content-type:content-transfer-encoding:list-id:list-archive:list-post:list-unsubscribe; s=s20150108; bh=QINRQqWaNti4qOvZpq9qRT3yReQ=; b=pYU60v0mWQ4cJBB/ 94OC3Bb7/7b9kjyTRuczu7jkgLrDvlhAJ88AplTy/6whPY9XRNc4Gj0dB6xiiU5M nqLu2XMKenMMnPo8crLz/VirPQLWHYeATBMVGzsByF/MjY7WGoBtLQlDIY3zpvRV 0V9iYgxGrWWX/Rr6GptOWYduhJQ=
Received: by filter0504p1iad2.sendgrid.net with SMTP id filter0504p1iad2-14626-5ABA9674-2 2018-03-27 19:07:32.039624862 +0000 UTC
Received: from smtp.github.com (out-5.smtp.github.com [192.30.252.196]) by ismtpd0003p1iad2.sendgrid.net (SG) with ESMTP id 3s6JiYNLQ9emRwirNLTygA for <sacm@ietf.org>; Tue, 27 Mar 2018 19:07:31.924 +0000 (UTC)
Date: Tue, 27 Mar 2018 19:07:32 +0000 (UTC)
From: adammontville <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-terminology <reply+00a6c4d10590b4514c1c626275a0e732ed201e5bc4fd8a2492cf0000000116d2587392a169ce10bcf99c@reply.github.com>
To: sacmwg/draft-ietf-sacm-terminology <draft-ietf-sacm-terminology@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-terminology/issue/79/issue_event/1544005315@github.com>
In-Reply-To: <sacmwg/draft-ietf-sacm-terminology/issues/79@github.com>
References: <sacmwg/draft-ietf-sacm-terminology/issues/79@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5aba9673dc05d_1ea43fc74180cf30848b1"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: adammontville
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
X-SG-EID: UtArl2HfP/Y+1oZ8SNY9H+NmtJEAQ41FvPY/2uGEECIWyilNRUqbKRLY9mN5AhG2WmnmTVOlad7E9x anRVyqAscV/tMlDcZvnp4B6yYf8FJmfs/Q1utrShcSmAke2ORAEp7i4+SWLEUpEib/6c1gkbKcVx7W Zdf9/raUmthUHN5iyKYVwMz+ZAeaMXc/Bk1TRugRYXfu4Jzz2kytVy4yEQ==
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/wprwpX6CdAuAlyjDOgzX2V2fOqg>
Subject: Re: [sacm] [sacmwg/draft-ietf-sacm-terminology] Propose to remove Target Endpoint Label (#79)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Mar 2018 19:08:22 -0000

----==_mimepart_5aba9673dc05d_1ea43fc74180cf30848b1
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Closed #79.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/79#event-1544005315
----==_mimepart_5aba9673dc05d_1ea43fc74180cf30848b1
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

<p>Closed <a class="issue-link js-issue-link" data-error-text="Failed to load issue title" data-id="280820124" data-permission-text="Issue title is private" data-url="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/79" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/79">#79</a>.</p>

<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">&mdash;<br />You are receiving this because you are subscribed to this thread.<br />Reply to this email directly, <a href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/79#event-1544005315">view it on GitHub</a>, or <a href="https://github.com/notifications/unsubscribe-auth/AKbE0f7-7Wf2Pk3gcU34cK0qbgwatuQkks5tio3zgaJpZM4Q8iqh">mute the thread</a>.<img src="https://github.com/notifications/beacon/AKbE0ed0gf3dRSB7TKqLkamAx91QgSw0ks5tio3zgaJpZM4Q8iqh.gif" height="1" width="1" alt="" /></p>
<div itemscope itemtype="http://schema.org/EmailMessage">
<div itemprop="action" itemscope itemtype="http://schema.org/ViewAction">
  <link itemprop="url" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/79#event-1544005315"></link>
  <meta itemprop="name" content="View Issue"></meta>
</div>
<meta itemprop="description" content="View this Issue on GitHub"></meta>
</div>

<script type="application/json" data-scope="inboxmarkup">{"api_version":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-terminology","title":"sacmwg/draft-ietf-sacm-terminology","subtitle":"GitHub repository","main_image_url":"https://cloud.githubusercontent.com/assets/143418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology"}},"updates":{"snippets":[{"icon":"DESCRIPTION","message":"Closed #79."}],"action":{"name":"View Issue","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/79#event-1544005315"}}}</script>
----==_mimepart_5aba9673dc05d_1ea43fc74180cf30848b1--


From nobody Tue Mar 27 12:15:45 2018
Return-Path: <noreply@github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 90C8812D969 for <sacm@ietfa.amsl.com>; Tue, 27 Mar 2018 12:15:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.392
X-Spam-Level: 
X-Spam-Status: No, score=-5.392 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_24=1.618, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tat02w3zNT_3 for <sacm@ietfa.amsl.com>; Tue, 27 Mar 2018 12:15:43 -0700 (PDT)
Received: from out-5.smtp.github.com (out-5.smtp.github.com [192.30.252.196]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3268412785F for <sacm@ietf.org>; Tue, 27 Mar 2018 12:15:43 -0700 (PDT)
Date: Tue, 27 Mar 2018 12:07:32 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com; s=pf2014; t=1522177652; bh=Bq7ifdwy6wT5dBR5c0WyLHBRPGwPAHP8V5XFuOeFfC8=; h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:List-ID: List-Archive:List-Post:List-Unsubscribe:From; b=ru5pNw4fW/qGGo25rn+B3Sy5bPbSp6wUW9dFJzJ/Vj5ki6C/l50lMPpPyx0gqU+5z b60JYeLm6nTeo6BmtujE2aX3YYfbkl2aHi2yz/cley1BQDcaaWY1rUxjmSFI8Hpwix MWbI1lKg0yjwbiPDT7Z4f84tmYaT+7IAkXek2BSk=
From: adammontville <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-terminology <reply+00a6c4d12423ae05f047f8960c6ac345791e3fb3fe79d85392cf0000000116d2587492a169ce12411c3f@reply.github.com>
To: sacmwg/draft-ietf-sacm-terminology <draft-ietf-sacm-terminology@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-terminology/issue/87/issue_event/1544005326@github.com>
In-Reply-To: <sacmwg/draft-ietf-sacm-terminology/issues/87@github.com>
References: <sacmwg/draft-ietf-sacm-terminology/issues/87@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5aba96742640e_2edf3f9cacc06f38349ab"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: adammontville
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/FfOuxUF6R3nUImHlVBsDC4ebwac>
Subject: Re: [sacm] [sacmwg/draft-ietf-sacm-terminology] Bring back Hardware Component (#87)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 27 Mar 2018 19:15:44 -0000

----==_mimepart_5aba96742640e_2edf3f9cacc06f38349ab
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Closed #87.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/87#event-1544005326
----==_mimepart_5aba96742640e_2edf3f9cacc06f38349ab
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

<p>Closed <a class="issue-link js-issue-link" data-error-text="Failed to load issue title" data-id="306256959" data-permission-text="Issue title is private" data-url="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/87" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/87">#87</a>.</p>

<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">&mdash;<br />You are receiving this because you are subscribed to this thread.<br />Reply to this email directly, <a href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/87#event-1544005326">view it on GitHub</a>, or <a href="https://github.com/notifications/unsubscribe-auth/AKbE0fdF15U5OUdADjLEX5G2B31KQ88lks5tio30gaJpZM4SvRnV">mute the thread</a>.<img src="https://github.com/notifications/beacon/AKbE0TBWMT1GEtDdHdNn1tKTqIoyAN6hks5tio30gaJpZM4SvRnV.gif" height="1" width="1" alt="" /></p>
<div itemscope itemtype="http://schema.org/EmailMessage">
<div itemprop="action" itemscope itemtype="http://schema.org/ViewAction">
  <link itemprop="url" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/87#event-1544005326"></link>
  <meta itemprop="name" content="View Issue"></meta>
</div>
<meta itemprop="description" content="View this Issue on GitHub"></meta>
</div>

<script type="application/json" data-scope="inboxmarkup">{"api_version":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-terminology","title":"sacmwg/draft-ietf-sacm-terminology","subtitle":"GitHub repository","main_image_url":"https://cloud.githubusercontent.com/assets/143418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology"}},"updates":{"snippets":[{"icon":"DESCRIPTION","message":"Closed #87."}],"action":{"name":"View Issue","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/87#event-1544005326"}}}</script>
----==_mimepart_5aba96742640e_2edf3f9cacc06f38349ab--


From nobody Wed Mar 28 07:06:27 2018
Return-Path: <noreply@github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4AD9612711E for <sacm@ietfa.amsl.com>; Wed, 28 Mar 2018 07:06:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.465
X-Spam-Level: 
X-Spam-Status: No, score=-5.465 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_20=1.546, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wGyKbRT56_6G for <sacm@ietfa.amsl.com>; Wed, 28 Mar 2018 07:06:24 -0700 (PDT)
Received: from out-3.smtp.github.com (out-3.smtp.github.com [192.30.252.194]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 375311241F8 for <sacm@ietf.org>; Wed, 28 Mar 2018 07:06:24 -0700 (PDT)
Date: Wed, 28 Mar 2018 07:06:23 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com; s=pf2014; t=1522245983; bh=hpV3RS16iVmAYmAqvR8TWCGZFDUzGmXREM4Hc/g015g=; h=Date:From:Reply-To:To:Cc:Subject:List-ID:List-Archive:List-Post: List-Unsubscribe:From; b=gQ2BpjtQY5+a2KLARA9+jyzUsINWXdfA0oYg9zF7AxxCUiVBem89nerEsTNUPZBEm fguGwrw06gF5UZ/Uq+vwO9UTINW69vOQMVuUjXfg751bvZR1DTgD9QFuN6mUe3x/QB kA9ewWurHE2lWV3ZsWNZvVAo6e1E+gtYIXrTWiZM=
From: adammontville <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-terminology <reply+00a6c4d19daa5c3c9baf3360e0b4be055a9757d6d487efb392cf0000000116d3635f92a169ce1270cd00@reply.github.com>
To: sacmwg/draft-ietf-sacm-terminology <draft-ietf-sacm-terminology@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-terminology/issues/89@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5abba15ff9c4_26462b264454aed01767b8"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: adammontville
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/4GQm9-BdsKSNW9-M8u-i0De9zxs>
Subject: [sacm] [sacmwg/draft-ietf-sacm-terminology] Consider bringing back "Network Address" (#89)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Mar 2018 14:06:26 -0000

----==_mimepart_5abba15ff9c4_26462b264454aed01767b8
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Mentioned by @henkbirkholz .

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/89
----==_mimepart_5abba15ff9c4_26462b264454aed01767b8
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

<p>Mentioned by <a class="user-mention" data-hovercard-user-id="12546130" href="https://github.com/henkbirkholz">@henkbirkholz</a> .</p>

<p style="font-size:small;-webkit-text-size-adjust:none;color:#666;">&mdash;<br />You are receiving this because you are subscribed to this thread.<br />Reply to this email directly, <a href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/89">view it on GitHub</a>, or <a href="https://github.com/notifications/unsubscribe-auth/AKbE0fRKlkM08cQqDmLxufDQK3NWnBA0ks5ti5jfgaJpZM4S-tnL">mute the thread</a>.<img src="https://github.com/notifications/beacon/AKbE0Tah2LcDTbQO70Sijse2KxYr4O-2ks5ti5jfgaJpZM4S-tnL.gif" height="1" width="1" alt="" /></p>
<div itemscope itemtype="http://schema.org/EmailMessage">
<div itemprop="action" itemscope itemtype="http://schema.org/ViewAction">
  <link itemprop="url" href="https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/89"></link>
  <meta itemprop="name" content="View Issue"></meta>
</div>
<meta itemprop="description" content="View this Issue on GitHub"></meta>
</div>

<script type="application/json" data-scope="inboxmarkup">{"api_version":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-terminology","title":"sacmwg/draft-ietf-sacm-terminology","subtitle":"GitHub repository","main_image_url":"https://cloud.githubusercontent.com/assets/143418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology"}},"updates":{"snippets":[{"icon":"DESCRIPTION","message":"Consider bringing back \"Network Address\" (#89)"}],"action":{"name":"View Issue","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/89"}}}</script>
----==_mimepart_5abba15ff9c4_26462b264454aed01767b8--


From nobody Wed Mar 28 07:17:12 2018
Return-Path: <adam.w.montville@gmail.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9CD6812711E for <sacm@ietfa.amsl.com>; Wed, 28 Mar 2018 07:17:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.699
X-Spam-Level: 
X-Spam-Status: No, score=-2.699 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ls5KZqsKc-ii for <sacm@ietfa.amsl.com>; Wed, 28 Mar 2018 07:17:08 -0700 (PDT)
Received: from mail-oi0-x236.google.com (mail-oi0-x236.google.com [IPv6:2607:f8b0:4003:c06::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A8CD512711B for <sacm@ietf.org>; Wed, 28 Mar 2018 07:17:08 -0700 (PDT)
Received: by mail-oi0-x236.google.com with SMTP id e8-v6so2262505oii.4 for <sacm@ietf.org>; Wed, 28 Mar 2018 07:17:08 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=from:mime-version:subject:message-id:references:to:date; bh=fdeBTaVnENL87FQHZFxXycw+cPon71p1UD3QTBSR0EA=; b=fj1T1K/Vfcf6+6X4Mj0oesuNB9quiDdktRxQ7MJ+dQtNNyL8VymY6mf2wANStvcLD/ 094NOJpycvAyehRX+fmvCgQBWdQd60kUlLCjC/9FSg8GWwSa/hHFftjhV7yzHPy2RUPf zYH+ujAsZHS+xC5hE41j7nu4T0TxuPG+6tf8DVnjTqjkiIj39psBzYARCuefFTWxULnn fRKitrIYgDaYAiDxB40lnI7tY8HoY5dJ0YWixcFWsnP9frF1Ps4Ug28PwLk94ADHKrjU zFOFxrCTA4j//andDsDoUJ7A3lohrc+g+ofS26HPOrTpwSR+JPmHvWQ2tHBR4Hr3/O90 2o/w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:mime-version:subject:message-id:references :to:date; bh=fdeBTaVnENL87FQHZFxXycw+cPon71p1UD3QTBSR0EA=; b=qffkZAyqQ9opJEuramR56fFoK0Zg8aRbJlz6BDzdCdLpaIse5/0lNxU/1HaMlj0NU1 1l+n0jPYisogi5FNalP8uQukkfWo328WltnxQ2DI+43EaeplIuA4A7SylWWzQl+57bWm G20P2sb/lfyMx7bm1I9l21napTM5b/sPq9qQs+b071MD3hRG1y5lrVLebnT1jqPJ2KFj SDQ5dyZ2YIq4mkDUCwqx76Pd5eWzqFfTbod0nxdVPX0V+2dyM+Jn5ePdTGI/a7YOImLp 24TQNFaxrFsp49Vfha3Xs37lLQlJSA0I1zUzRny57fksQr1KYHLZTr9ZHE5k6tpERcix si2g==
X-Gm-Message-State: ALQs6tARX2MLHcyIuLKnyUulzHAISRs4tjsH96lguY8NetC8DIJNaWVL h/yP3B6YZEvUzNLEZ3XYuoiKbvF2
X-Google-Smtp-Source: AIpwx4+Oz5yyjuSvLkEL6Zoj2R/iGRnjoXDykiyVl8/LxIJwh6kFI5e4czRIwjQQyGZ6GjVnnhDl+w==
X-Received: by 10.202.104.102 with SMTP id d99mr2207327oic.21.1522246627374; Wed, 28 Mar 2018 07:17:07 -0700 (PDT)
Received: from macbook-3.lan (99-64-100-131.lightspeed.austtx.sbcglobal.net. [99.64.100.131]) by smtp.gmail.com with ESMTPSA id v21-v6sm2061552ote.54.2018.03.28.07.17.05 for <sacm@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 28 Mar 2018 07:17:06 -0700 (PDT)
From: Adam Montville <adam.w.montville@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_74E045C0-1B58-4F9C-BFB7-42FD057A60B5"
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
Message-Id: <CF7B0A68-29A5-4701-BD82-19B10C685B15@gmail.com>
References: <152224635458.29901.3771407059199624346.idtracker@ietfa.amsl.com>
To: "<sacm@ietf.org>" <sacm@ietf.org>
Date: Wed, 28 Mar 2018 09:17:04 -0500
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/oHb5xR8ygWybvDOL_6gg-ujz2i4>
Subject: [sacm] Fwd: Confirm submission of I-D draft-mandm-sacm-architecture
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Mar 2018 14:17:11 -0000

--Apple-Mail=_74E045C0-1B58-4F9C-BFB7-42FD057A60B5
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Dear SACM WG:

After the IETF 101 hackathon work and the SACM session in London last =
week, we've made some updates to our "architecture" draft. Instead of =
positioning the draft as a "top down" view of an architecture, we have =
tried to create a draft that we can use to continue tracking our =
hackathon (and related) efforts. We've rearranged some sections and =
added more information.=20

Please review the draft and provide your comments/feedback here. =
Additionally, if you have ideas for the next steps in terms of =
exploration, we welcome your thoughts!

Kind regards,

Adam

> Begin forwarded message:
>=20
> From: IETF I-D Submission Tool <idsubmission@ietf.org>
> Subject: Confirm submission of I-D draft-mandm-sacm-architecture
> Date: March 28, 2018 at 9:12:34 AM CDT
> To: "Bill Munyan" <bill.munyan.ietf@gmail.com>, "Adam Montville" =
<adam.w.montville@gmail.com>
>=20
>=20
> Hi,
>=20
> The IETF datatracker draft submission service has received your draft
> draft-mandm-sacm-architecture-01, and requires a
> confirmation step in order to be able to complete the posting of
> the draft.
> Please follow this link to the page where you can confirm the posting:
>=20
> =
https://datatracker.ietf.org/submit/status/94496/confirm/eab0060c5c21647a9=
14809c331032c2a/
>=20
>=20
> Best regards,
>=20
> 	The IETF Secretariat
> 	through the draft submission service
>=20
>=20


--Apple-Mail=_74E045C0-1B58-4F9C-BFB7-42FD057A60B5
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">Dear =
SACM WG:<div class=3D""><br class=3D""></div><div class=3D"">After the =
IETF 101 hackathon work and the SACM session in London last week, we've =
made some updates to our "architecture" draft. Instead of positioning =
the draft as a "top down" view of an architecture, we have tried to =
create a draft that we can use to continue tracking our hackathon (and =
related) efforts. We've rearranged some sections and added more =
information.&nbsp;</div><div class=3D""><br class=3D""></div><div =
class=3D"">Please review the draft and provide your comments/feedback =
here. Additionally, if you have ideas for the next steps in terms of =
exploration, we welcome your thoughts!</div><div class=3D""><br =
class=3D""></div><div class=3D"">Kind regards,</div><div class=3D""><br =
class=3D""></div><div class=3D"">Adam<br class=3D""><div =
class=3D""><div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D"">Begin forwarded message:</div><br =
class=3D"Apple-interchange-newline"><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px;" class=3D""><span=
 style=3D"font-family: -webkit-system-font, Helvetica Neue, Helvetica, =
sans-serif; color:rgba(0, 0, 0, 1.0);" class=3D""><b class=3D"">From: =
</b></span><span style=3D"font-family: -webkit-system-font, Helvetica =
Neue, Helvetica, sans-serif;" class=3D"">IETF I-D Submission Tool &lt;<a =
href=3D"mailto:idsubmission@ietf.org" =
class=3D"">idsubmission@ietf.org</a>&gt;<br class=3D""></span></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px;" class=3D""><span style=3D"font-family: =
-webkit-system-font, Helvetica Neue, Helvetica, sans-serif; =
color:rgba(0, 0, 0, 1.0);" class=3D""><b class=3D"">Subject: =
</b></span><span style=3D"font-family: -webkit-system-font, Helvetica =
Neue, Helvetica, sans-serif;" class=3D""><b class=3D"">Confirm =
submission of I-D draft-mandm-sacm-architecture</b><br =
class=3D""></span></div><div style=3D"margin-top: 0px; margin-right: =
0px; margin-bottom: 0px; margin-left: 0px;" class=3D""><span =
style=3D"font-family: -webkit-system-font, Helvetica Neue, Helvetica, =
sans-serif; color:rgba(0, 0, 0, 1.0);" class=3D""><b class=3D"">Date: =
</b></span><span style=3D"font-family: -webkit-system-font, Helvetica =
Neue, Helvetica, sans-serif;" class=3D"">March 28, 2018 at 9:12:34 AM =
CDT<br class=3D""></span></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px;" class=3D""><span=
 style=3D"font-family: -webkit-system-font, Helvetica Neue, Helvetica, =
sans-serif; color:rgba(0, 0, 0, 1.0);" class=3D""><b class=3D"">To: =
</b></span><span style=3D"font-family: -webkit-system-font, Helvetica =
Neue, Helvetica, sans-serif;" class=3D"">"Bill Munyan" &lt;<a =
href=3D"mailto:bill.munyan.ietf@gmail.com" =
class=3D"">bill.munyan.ietf@gmail.com</a>&gt;, "Adam Montville" &lt;<a =
href=3D"mailto:adam.w.montville@gmail.com" =
class=3D"">adam.w.montville@gmail.com</a>&gt;<br =
class=3D""></span></div><br class=3D""><div class=3D""><div class=3D""><br=
 class=3D"">Hi,<br class=3D""><br class=3D"">The IETF datatracker draft =
submission service has received your draft<br =
class=3D"">draft-mandm-sacm-architecture-01, and requires a<br =
class=3D"">confirmation step in order to be able to complete the posting =
of<br class=3D"">the draft.<br class=3D"">Please follow this link to the =
page where you can confirm the posting:<br class=3D""><br class=3D""><a =
href=3D"https://datatracker.ietf.org/submit/status/94496/confirm/eab0060c5=
c21647a914809c331032c2a/" =
class=3D"">https://datatracker.ietf.org/submit/status/94496/confirm/eab006=
0c5c21647a914809c331032c2a/</a><br class=3D""><br class=3D""><br =
class=3D"">Best regards,<br class=3D""><br class=3D""><span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span>The IETF =
Secretariat<br class=3D""><span class=3D"Apple-tab-span" =
style=3D"white-space:pre">	</span>through the draft submission =
service<br class=3D""><br class=3D""><br =
class=3D""></div></div></blockquote></div><br =
class=3D""></div></div></body></html>=

--Apple-Mail=_74E045C0-1B58-4F9C-BFB7-42FD057A60B5--


From nobody Wed Mar 28 07:22:58 2018
Return-Path: <adam.w.montville@gmail.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A9C9C12711B for <sacm@ietfa.amsl.com>; Wed, 28 Mar 2018 07:22:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id m6VYBXd159N2 for <sacm@ietfa.amsl.com>; Wed, 28 Mar 2018 07:22:55 -0700 (PDT)
Received: from mail-ot0-x231.google.com (mail-ot0-x231.google.com [IPv6:2607:f8b0:4003:c0f::231]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7F32D1270FC for <sacm@ietf.org>; Wed, 28 Mar 2018 07:22:55 -0700 (PDT)
Received: by mail-ot0-x231.google.com with SMTP id y46-v6so2828463otd.4 for <sacm@ietf.org>; Wed, 28 Mar 2018 07:22:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=from:mime-version:subject:message-id:references:to:date; bh=arL+vXPF0ZaBhLEBbJTzcKq/FRnn17kBUCzUH9I6qY4=; b=k3RcODHHnE/VUroO/8ie91JUROrjAR2w1b1V5fz0M0UR4ipw9CRYVFIkCFxBH6ptAa dax9lUDh82tCYCsmWa+u1xRk8eopnm0HZmbJd1IoDJ1nLa60qjlM7RTnGGrRt1EVKdIn bN0VJjA6CK4A8d4LdVkUl4aKem5iYfXIfODUOVEhofHd/wcYrQDNAHlOPk1NyG8waKjS How9sNIz86jNNFCCtEYvWlUTJUBxRm9/lm7ZpZ4jSZ8j0domYGK5dpgi1/L8oB0L7E8C 58YlYeuxiiFT7HjcxW+JYBMWPEeZFj+qb6C1Vzc1lKWO3C671xUO9fWjuNvyx+U7+sG3 qK4w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:mime-version:subject:message-id:references :to:date; bh=arL+vXPF0ZaBhLEBbJTzcKq/FRnn17kBUCzUH9I6qY4=; b=OcqdDB72uy8HR2S+mpxG6oW/h6Vxi5DT0f4wJLNYRQgzYSv8STrX4ZUZF8ka7Avdb2 YccLOhTLXFY6LD2mVTldQvJbwPrtGUZ9bH+aUCf41cIr3d/salJW0SX0i/ER65yfW/jc SmXYuGw2VftiBmL/nxHrzcZ/MQJvwGY+QiU3E2gRENIR78kv/z0NZAfNBixzdo77xMoX bXXCB+ksZmqr8zlyeJaas4VAIh7AUvZhchmigHxgY8hbDk58tbmXoh96aNWCZk65eY+x G2X2ViqhTh/NFyEM248QgTXCpGMJ3b84yGHMl+Mc2DgW8Njmh1rX7CSO71EHKqFzdq88 8mpQ==
X-Gm-Message-State: ALQs6tCZQUno7SXM3CiC7M96Zt8pJCBrI3NGgJq80wlKMIFZdBqwt2RS oco8q7/+kQ4+sO/r3BFxrtNewwfh
X-Google-Smtp-Source: AIpwx4/SJVvyZTZHGchsUu8L6bn5odlEphnXSIG3KwhY/b1gUj5swF5K4zHIMRW+zbbCPqF3NRMUGg==
X-Received: by 2002:a9d:4598:: with SMTP id x24-v6mr2262656ote.126.1522246974272;  Wed, 28 Mar 2018 07:22:54 -0700 (PDT)
Received: from macbook-3.lan (99-64-100-131.lightspeed.austtx.sbcglobal.net. [99.64.100.131]) by smtp.gmail.com with ESMTPSA id b201-v6sm2245561oih.7.2018.03.28.07.22.52 for <sacm@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 28 Mar 2018 07:22:53 -0700 (PDT)
From: Adam Montville <adam.w.montville@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_C01695D7-68B4-401B-BDA6-BE6550298DD9"
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
Message-Id: <35A4AD54-07B6-4629-8FBB-EBA7E4311F4D@gmail.com>
References: <152224677422.29897.16660394699684816630.idtracker@ietfa.amsl.com>
To: "<sacm@ietf.org>" <sacm@ietf.org>
Date: Wed, 28 Mar 2018 09:22:50 -0500
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/A5x7UqF2mvmYYHCXTSU41s5JCNQ>
Subject: [sacm] Fwd: New Version Notification for draft-mandm-sacm-architecture-01.txt
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Mar 2018 14:22:58 -0000

--Apple-Mail=_C01695D7-68B4-401B-BDA6-BE6550298DD9
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Naturally, this is the e-mail I meant to respond to...apologies.

Dear SACM WG:

After the IETF 101 hackathon work and the SACM session in London last =
week, we've made some updates to our "architecture" draft. Instead of =
positioning the draft as a "top down" view of an architecture, we have =
tried to create a draft that we can use to continue tracking our =
hackathon (and related) efforts. We've rearranged some sections and =
added more information.=20

Please review the draft and provide your comments/feedback here. =
Additionally, if you have ideas for the next steps in terms of =
exploration, we welcome your thoughts!

Kind regards,

Adam

> Begin forwarded message:
>=20
> From: internet-drafts@ietf.org
> Subject: New Version Notification for =
draft-mandm-sacm-architecture-01.txt
> Date: March 28, 2018 at 9:19:34 AM CDT
> To: "Adam W. Montville" <adam.w.montville@gmail.com>, "Bill Munyan" =
<bill.munyan.ietf@gmail.com>, "Adam Montville" =
<adam.w.montville@gmail.com>
>=20
>=20
> A new version of I-D, draft-mandm-sacm-architecture-01.txt
> has been successfully submitted by Adam W. Montville and posted to the
> IETF repository.
>=20
> Name:		draft-mandm-sacm-architecture
> Revision:	01
> Title:		Security Automation and Continuous Monitoring =
(SACM) Architecture
> Document date:	2018-03-28
> Group:		Individual Submission
> Pages:		18
> URL:            =
https://www.ietf.org/internet-drafts/draft-mandm-sacm-architecture-01.txt
> Status:         =
https://datatracker.ietf.org/doc/draft-mandm-sacm-architecture/
> Htmlized:       =
https://tools.ietf.org/html/draft-mandm-sacm-architecture-01
> Htmlized:       =
https://datatracker.ietf.org/doc/html/draft-mandm-sacm-architecture
> Diff:           =
https://www.ietf.org/rfcdiff?url2=3Ddraft-mandm-sacm-architecture-01
>=20
> Abstract:
>   This memo documents an exploration of a possible Security Automation
>   and Continuous Monitoring (SACM) architecture.  This work is built
>   upon [I-D.ietf-mile-xmpp-grid], and is predicated upon information
>   gleaned from SACM Use Cases and Requirements ([RFC7632] and =
[RFC8248]
>   respectively), and terminology as found in
>   [I-D.ietf-sacm-terminology].
>=20
>=20
>=20
>=20
> Please note that it may take a couple of minutes from the time of =
submission
> until the htmlized version and diff are available at tools.ietf.org.
>=20
> The IETF Secretariat
>=20


--Apple-Mail=_C01695D7-68B4-401B-BDA6-BE6550298DD9
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" =
class=3D"">Naturally, this is the e-mail I meant to respond =
to...apologies.<div class=3D""><br class=3D""></div><div class=3D"">Dear =
SACM WG:<div class=3D""><br class=3D""></div><div class=3D"">After the =
IETF 101 hackathon work and the SACM session in London last week, we've =
made some updates to our "architecture" draft. Instead of positioning =
the draft as a "top down" view of an architecture, we have tried to =
create a draft that we can use to continue tracking our hackathon (and =
related) efforts. We've rearranged some sections and added more =
information.&nbsp;</div><div class=3D""><br class=3D""></div><div =
class=3D"">Please review the draft and provide your comments/feedback =
here. Additionally, if you have ideas for the next steps in terms of =
exploration, we welcome your thoughts!</div><div class=3D""><br =
class=3D""></div><div class=3D"">Kind regards,</div><div class=3D""><br =
class=3D""></div><div class=3D"">Adam</div><div><br class=3D""><blockquote=
 type=3D"cite" class=3D""><div class=3D"">Begin forwarded =
message:</div><br class=3D"Apple-interchange-newline"><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px;" class=3D""><span style=3D"font-family: =
-webkit-system-font, Helvetica Neue, Helvetica, sans-serif; =
color:rgba(0, 0, 0, 1.0);" class=3D""><b class=3D"">From: =
</b></span><span style=3D"font-family: -webkit-system-font, Helvetica =
Neue, Helvetica, sans-serif;" class=3D""><a =
href=3D"mailto:internet-drafts@ietf.org" =
class=3D"">internet-drafts@ietf.org</a><br class=3D""></span></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px;" class=3D""><span style=3D"font-family: =
-webkit-system-font, Helvetica Neue, Helvetica, sans-serif; =
color:rgba(0, 0, 0, 1.0);" class=3D""><b class=3D"">Subject: =
</b></span><span style=3D"font-family: -webkit-system-font, Helvetica =
Neue, Helvetica, sans-serif;" class=3D""><b class=3D"">New Version =
Notification for draft-mandm-sacm-architecture-01.txt</b><br =
class=3D""></span></div><div style=3D"margin-top: 0px; margin-right: =
0px; margin-bottom: 0px; margin-left: 0px;" class=3D""><span =
style=3D"font-family: -webkit-system-font, Helvetica Neue, Helvetica, =
sans-serif; color:rgba(0, 0, 0, 1.0);" class=3D""><b class=3D"">Date: =
</b></span><span style=3D"font-family: -webkit-system-font, Helvetica =
Neue, Helvetica, sans-serif;" class=3D"">March 28, 2018 at 9:19:34 AM =
CDT<br class=3D""></span></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px;" class=3D""><span=
 style=3D"font-family: -webkit-system-font, Helvetica Neue, Helvetica, =
sans-serif; color:rgba(0, 0, 0, 1.0);" class=3D""><b class=3D"">To: =
</b></span><span style=3D"font-family: -webkit-system-font, Helvetica =
Neue, Helvetica, sans-serif;" class=3D"">"Adam W. Montville" &lt;<a =
href=3D"mailto:adam.w.montville@gmail.com" =
class=3D"">adam.w.montville@gmail.com</a>&gt;, "Bill Munyan" &lt;<a =
href=3D"mailto:bill.munyan.ietf@gmail.com" =
class=3D"">bill.munyan.ietf@gmail.com</a>&gt;, "Adam Montville" &lt;<a =
href=3D"mailto:adam.w.montville@gmail.com" =
class=3D"">adam.w.montville@gmail.com</a>&gt;<br =
class=3D""></span></div><br class=3D""><div class=3D""><div class=3D""><br=
 class=3D"">A new version of I-D, =
draft-mandm-sacm-architecture-01.txt<br class=3D"">has been successfully =
submitted by Adam W. Montville and posted to the<br class=3D"">IETF =
repository.<br class=3D""><br class=3D"">Name:<span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span><span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	=
</span>draft-mandm-sacm-architecture<br class=3D"">Revision:<span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span>01<br =
class=3D"">Title:<span class=3D"Apple-tab-span" style=3D"white-space:pre">=
	</span><span class=3D"Apple-tab-span" style=3D"white-space:pre">	=
</span>Security Automation and Continuous Monitoring (SACM) =
Architecture<br class=3D"">Document date:<span class=3D"Apple-tab-span" =
style=3D"white-space:pre">	</span>2018-03-28<br =
class=3D"">Group:<span class=3D"Apple-tab-span" style=3D"white-space:pre">=
	</span><span class=3D"Apple-tab-span" style=3D"white-space:pre">	=
</span>Individual Submission<br class=3D"">Pages:<span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span><span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span>18<br =
class=3D"">URL: =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a =
href=3D"https://www.ietf.org/internet-drafts/draft-mandm-sacm-architecture=
-01.txt" =
class=3D"">https://www.ietf.org/internet-drafts/draft-mandm-sacm-architect=
ure-01.txt</a><br class=3D"">Status: =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a =
href=3D"https://datatracker.ietf.org/doc/draft-mandm-sacm-architecture/" =
class=3D"">https://datatracker.ietf.org/doc/draft-mandm-sacm-architecture/=
</a><br class=3D"">Htmlized: &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a =
href=3D"https://tools.ietf.org/html/draft-mandm-sacm-architecture-01" =
class=3D"">https://tools.ietf.org/html/draft-mandm-sacm-architecture-01</a=
><br class=3D"">Htmlized: &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a =
href=3D"https://datatracker.ietf.org/doc/html/draft-mandm-sacm-architectur=
e" =
class=3D"">https://datatracker.ietf.org/doc/html/draft-mandm-sacm-architec=
ture</a><br class=3D"">Diff: =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a =
href=3D"https://www.ietf.org/rfcdiff?url2=3Ddraft-mandm-sacm-architecture-=
01" =
class=3D"">https://www.ietf.org/rfcdiff?url2=3Ddraft-mandm-sacm-architectu=
re-01</a><br class=3D""><br class=3D"">Abstract:<br class=3D""> =
&nbsp;&nbsp;This memo documents an exploration of a possible Security =
Automation<br class=3D""> &nbsp;&nbsp;and Continuous Monitoring (SACM) =
architecture. &nbsp;This work is built<br class=3D""> &nbsp;&nbsp;upon =
[I-D.ietf-mile-xmpp-grid], and is predicated upon information<br =
class=3D""> &nbsp;&nbsp;gleaned from SACM Use Cases and Requirements =
([RFC7632] and [RFC8248]<br class=3D""> &nbsp;&nbsp;respectively), and =
terminology as found in<br class=3D""> =
&nbsp;&nbsp;[I-D.ietf-sacm-terminology].<br class=3D""><br class=3D""><br =
class=3D""><br class=3D""><br class=3D"">Please note that it may take a =
couple of minutes from the time of submission<br class=3D"">until the =
htmlized version and diff are available at <a =
href=3D"http://tools.ietf.org" class=3D"">tools.ietf.org</a>.<br =
class=3D""><br class=3D"">The IETF Secretariat<br class=3D""><br =
class=3D""></div></div></blockquote></div><br =
class=3D""></div></body></html>=

--Apple-Mail=_C01695D7-68B4-401B-BDA6-BE6550298DD9--


From nobody Wed Mar 28 10:21:25 2018
Return-Path: <adam.w.montville@gmail.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DC5F2126DC2 for <sacm@ietfa.amsl.com>; Wed, 28 Mar 2018 10:21:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ODs8eP_75BfO for <sacm@ietfa.amsl.com>; Wed, 28 Mar 2018 10:21:20 -0700 (PDT)
Received: from mail-ot0-x22f.google.com (mail-ot0-x22f.google.com [IPv6:2607:f8b0:4003:c0f::22f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2E68A127369 for <sacm@ietf.org>; Wed, 28 Mar 2018 10:21:19 -0700 (PDT)
Received: by mail-ot0-x22f.google.com with SMTP id h55-v6so1968137ote.9 for <sacm@ietf.org>; Wed, 28 Mar 2018 10:21:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=from:mime-version:subject:message-id:references:to:date; bh=arL+vXPF0ZaBhLEBbJTzcKq/FRnn17kBUCzUH9I6qY4=; b=k3RcODHHnE/VUroO/8ie91JUROrjAR2w1b1V5fz0M0UR4ipw9CRYVFIkCFxBH6ptAa dax9lUDh82tCYCsmWa+u1xRk8eopnm0HZmbJd1IoDJ1nLa60qjlM7RTnGGrRt1EVKdIn bN0VJjA6CK4A8d4LdVkUl4aKem5iYfXIfODUOVEhofHd/wcYrQDNAHlOPk1NyG8waKjS How9sNIz86jNNFCCtEYvWlUTJUBxRm9/lm7ZpZ4jSZ8j0domYGK5dpgi1/L8oB0L7E8C 58YlYeuxiiFT7HjcxW+JYBMWPEeZFj+qb6C1Vzc1lKWO3C671xUO9fWjuNvyx+U7+sG3 qK4w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:mime-version:subject:message-id:references :to:date; bh=arL+vXPF0ZaBhLEBbJTzcKq/FRnn17kBUCzUH9I6qY4=; b=oFTx8KRfEKfuIyDtQ1t1tdJK49Mmk1iDo0Ln9ZCwvqHMJJzHInKqgacYR5zhM+xs8Y pMPuD0mersnpqwceStmROalMnzAO3iSAk26/CgJlrORuHOY08CKONGmpZCxeUTF26+7E 0lgH3iJ4utj83zk9OYYbjU8l/rIaqImefrbMHzPCuaZg/SQFh1eXLhHcqmcZwpZN2zHV B8MBsbBqKN+vQ0/E4nIutAxgN9Y4h+PDTAFwyoMSNQqFE0X7dV28P7xapzA8EVLTUzsL I06V7Kn93JUHAaat+yLDnbGZN92ezatiKK+gccZVzbKYJa+SpDbtNfXCbc+rpdVC1cWI xYgg==
X-Gm-Message-State: AElRT7GrTuh6yZztFwiRIpqG/zURnY0hGHo3yCMH1u8C1YjMAAtl/1jo ccPpR7eFFSXGQYTCdZAUIEKQ5V2x
X-Google-Smtp-Source: AIpwx4/B6KMw2U/+GoFSpKwD16qA/9iqMUIfKOY9h/ZU4ByxEbTJUVtw2vAWJlDYiFcBQXJlO1N5qw==
X-Received: by 2002:a9d:42ed:: with SMTP id c42-v6mr2638256otj.95.1522257677758;  Wed, 28 Mar 2018 10:21:17 -0700 (PDT)
Received: from macbook-3.lan (99-64-100-131.lightspeed.austtx.sbcglobal.net. [99.64.100.131]) by smtp.gmail.com with ESMTPSA id c3-v6sm2268910otk.8.2018.03.28.10.21.17 for <sacm@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 28 Mar 2018 10:21:17 -0700 (PDT)
From: Adam Montville <adam.w.montville@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_C01695D7-68B4-401B-BDA6-BE6550298DD9"
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
Message-Id: <35A4AD54-07B6-4629-8FBB-EBA7E4311F4D@gmail.com>
References: <152224677422.29897.16660394699684816630.idtracker@ietfa.amsl.com>
To: "<sacm@ietf.org>" <sacm@ietf.org>
Date: Wed, 28 Mar 2018 09:22:50 -0500
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/A5x7UqF2mvmYYHCXTSU41s5JCNQ>
Subject: [sacm] Fwd: New Version Notification for draft-mandm-sacm-architecture-01.txt
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 28 Mar 2018 17:21:24 -0000

--Apple-Mail=_C01695D7-68B4-401B-BDA6-BE6550298DD9
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

Naturally, this is the e-mail I meant to respond to...apologies.

Dear SACM WG:

After the IETF 101 hackathon work and the SACM session in London last =
week, we've made some updates to our "architecture" draft. Instead of =
positioning the draft as a "top down" view of an architecture, we have =
tried to create a draft that we can use to continue tracking our =
hackathon (and related) efforts. We've rearranged some sections and =
added more information.=20

Please review the draft and provide your comments/feedback here. =
Additionally, if you have ideas for the next steps in terms of =
exploration, we welcome your thoughts!

Kind regards,

Adam

> Begin forwarded message:
>=20
> From: internet-drafts@ietf.org
> Subject: New Version Notification for =
draft-mandm-sacm-architecture-01.txt
> Date: March 28, 2018 at 9:19:34 AM CDT
> To: "Adam W. Montville" <adam.w.montville@gmail.com>, "Bill Munyan" =
<bill.munyan.ietf@gmail.com>, "Adam Montville" =
<adam.w.montville@gmail.com>
>=20
>=20
> A new version of I-D, draft-mandm-sacm-architecture-01.txt
> has been successfully submitted by Adam W. Montville and posted to the
> IETF repository.
>=20
> Name:		draft-mandm-sacm-architecture
> Revision:	01
> Title:		Security Automation and Continuous Monitoring =
(SACM) Architecture
> Document date:	2018-03-28
> Group:		Individual Submission
> Pages:		18
> URL:            =
https://www.ietf.org/internet-drafts/draft-mandm-sacm-architecture-01.txt
> Status:         =
https://datatracker.ietf.org/doc/draft-mandm-sacm-architecture/
> Htmlized:       =
https://tools.ietf.org/html/draft-mandm-sacm-architecture-01
> Htmlized:       =
https://datatracker.ietf.org/doc/html/draft-mandm-sacm-architecture
> Diff:           =
https://www.ietf.org/rfcdiff?url2=3Ddraft-mandm-sacm-architecture-01
>=20
> Abstract:
>   This memo documents an exploration of a possible Security Automation
>   and Continuous Monitoring (SACM) architecture.  This work is built
>   upon [I-D.ietf-mile-xmpp-grid], and is predicated upon information
>   gleaned from SACM Use Cases and Requirements ([RFC7632] and =
[RFC8248]
>   respectively), and terminology as found in
>   [I-D.ietf-sacm-terminology].
>=20
>=20
>=20
>=20
> Please note that it may take a couple of minutes from the time of =
submission
> until the htmlized version and diff are available at tools.ietf.org.
>=20
> The IETF Secretariat
>=20


--Apple-Mail=_C01695D7-68B4-401B-BDA6-BE6550298DD9
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" =
class=3D"">Naturally, this is the e-mail I meant to respond =
to...apologies.<div class=3D""><br class=3D""></div><div class=3D"">Dear =
SACM WG:<div class=3D""><br class=3D""></div><div class=3D"">After the =
IETF 101 hackathon work and the SACM session in London last week, we've =
made some updates to our "architecture" draft. Instead of positioning =
the draft as a "top down" view of an architecture, we have tried to =
create a draft that we can use to continue tracking our hackathon (and =
related) efforts. We've rearranged some sections and added more =
information.&nbsp;</div><div class=3D""><br class=3D""></div><div =
class=3D"">Please review the draft and provide your comments/feedback =
here. Additionally, if you have ideas for the next steps in terms of =
exploration, we welcome your thoughts!</div><div class=3D""><br =
class=3D""></div><div class=3D"">Kind regards,</div><div class=3D""><br =
class=3D""></div><div class=3D"">Adam</div><div><br class=3D""><blockquote=
 type=3D"cite" class=3D""><div class=3D"">Begin forwarded =
message:</div><br class=3D"Apple-interchange-newline"><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px;" class=3D""><span style=3D"font-family: =
-webkit-system-font, Helvetica Neue, Helvetica, sans-serif; =
color:rgba(0, 0, 0, 1.0);" class=3D""><b class=3D"">From: =
</b></span><span style=3D"font-family: -webkit-system-font, Helvetica =
Neue, Helvetica, sans-serif;" class=3D""><a =
href=3D"mailto:internet-drafts@ietf.org" =
class=3D"">internet-drafts@ietf.org</a><br class=3D""></span></div><div =
style=3D"margin-top: 0px; margin-right: 0px; margin-bottom: 0px; =
margin-left: 0px;" class=3D""><span style=3D"font-family: =
-webkit-system-font, Helvetica Neue, Helvetica, sans-serif; =
color:rgba(0, 0, 0, 1.0);" class=3D""><b class=3D"">Subject: =
</b></span><span style=3D"font-family: -webkit-system-font, Helvetica =
Neue, Helvetica, sans-serif;" class=3D""><b class=3D"">New Version =
Notification for draft-mandm-sacm-architecture-01.txt</b><br =
class=3D""></span></div><div style=3D"margin-top: 0px; margin-right: =
0px; margin-bottom: 0px; margin-left: 0px;" class=3D""><span =
style=3D"font-family: -webkit-system-font, Helvetica Neue, Helvetica, =
sans-serif; color:rgba(0, 0, 0, 1.0);" class=3D""><b class=3D"">Date: =
</b></span><span style=3D"font-family: -webkit-system-font, Helvetica =
Neue, Helvetica, sans-serif;" class=3D"">March 28, 2018 at 9:19:34 AM =
CDT<br class=3D""></span></div><div style=3D"margin-top: 0px; =
margin-right: 0px; margin-bottom: 0px; margin-left: 0px;" class=3D""><span=
 style=3D"font-family: -webkit-system-font, Helvetica Neue, Helvetica, =
sans-serif; color:rgba(0, 0, 0, 1.0);" class=3D""><b class=3D"">To: =
</b></span><span style=3D"font-family: -webkit-system-font, Helvetica =
Neue, Helvetica, sans-serif;" class=3D"">"Adam W. Montville" &lt;<a =
href=3D"mailto:adam.w.montville@gmail.com" =
class=3D"">adam.w.montville@gmail.com</a>&gt;, "Bill Munyan" &lt;<a =
href=3D"mailto:bill.munyan.ietf@gmail.com" =
class=3D"">bill.munyan.ietf@gmail.com</a>&gt;, "Adam Montville" &lt;<a =
href=3D"mailto:adam.w.montville@gmail.com" =
class=3D"">adam.w.montville@gmail.com</a>&gt;<br =
class=3D""></span></div><br class=3D""><div class=3D""><div class=3D""><br=
 class=3D"">A new version of I-D, =
draft-mandm-sacm-architecture-01.txt<br class=3D"">has been successfully =
submitted by Adam W. Montville and posted to the<br class=3D"">IETF =
repository.<br class=3D""><br class=3D"">Name:<span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span><span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	=
</span>draft-mandm-sacm-architecture<br class=3D"">Revision:<span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span>01<br =
class=3D"">Title:<span class=3D"Apple-tab-span" style=3D"white-space:pre">=
	</span><span class=3D"Apple-tab-span" style=3D"white-space:pre">	=
</span>Security Automation and Continuous Monitoring (SACM) =
Architecture<br class=3D"">Document date:<span class=3D"Apple-tab-span" =
style=3D"white-space:pre">	</span>2018-03-28<br =
class=3D"">Group:<span class=3D"Apple-tab-span" style=3D"white-space:pre">=
	</span><span class=3D"Apple-tab-span" style=3D"white-space:pre">	=
</span>Individual Submission<br class=3D"">Pages:<span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span><span =
class=3D"Apple-tab-span" style=3D"white-space:pre">	</span>18<br =
class=3D"">URL: =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a =
href=3D"https://www.ietf.org/internet-drafts/draft-mandm-sacm-architecture=
-01.txt" =
class=3D"">https://www.ietf.org/internet-drafts/draft-mandm-sacm-architect=
ure-01.txt</a><br class=3D"">Status: =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a =
href=3D"https://datatracker.ietf.org/doc/draft-mandm-sacm-architecture/" =
class=3D"">https://datatracker.ietf.org/doc/draft-mandm-sacm-architecture/=
</a><br class=3D"">Htmlized: &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a =
href=3D"https://tools.ietf.org/html/draft-mandm-sacm-architecture-01" =
class=3D"">https://tools.ietf.org/html/draft-mandm-sacm-architecture-01</a=
><br class=3D"">Htmlized: &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a =
href=3D"https://datatracker.ietf.org/doc/html/draft-mandm-sacm-architectur=
e" =
class=3D"">https://datatracker.ietf.org/doc/html/draft-mandm-sacm-architec=
ture</a><br class=3D"">Diff: =
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<a =
href=3D"https://www.ietf.org/rfcdiff?url2=3Ddraft-mandm-sacm-architecture-=
01" =
class=3D"">https://www.ietf.org/rfcdiff?url2=3Ddraft-mandm-sacm-architectu=
re-01</a><br class=3D""><br class=3D"">Abstract:<br class=3D""> =
&nbsp;&nbsp;This memo documents an exploration of a possible Security =
Automation<br class=3D""> &nbsp;&nbsp;and Continuous Monitoring (SACM) =
architecture. &nbsp;This work is built<br class=3D""> &nbsp;&nbsp;upon =
[I-D.ietf-mile-xmpp-grid], and is predicated upon information<br =
class=3D""> &nbsp;&nbsp;gleaned from SACM Use Cases and Requirements =
([RFC7632] and [RFC8248]<br class=3D""> &nbsp;&nbsp;respectively), and =
terminology as found in<br class=3D""> =
&nbsp;&nbsp;[I-D.ietf-sacm-terminology].<br class=3D""><br class=3D""><br =
class=3D""><br class=3D""><br class=3D"">Please note that it may take a =
couple of minutes from the time of submission<br class=3D"">until the =
htmlized version and diff are available at <a =
href=3D"http://tools.ietf.org" class=3D"">tools.ietf.org</a>.<br =
class=3D""><br class=3D"">The IETF Secretariat<br class=3D""><br =
class=3D""></div></div></blockquote></div><br =
class=3D""></div></body></html>=

--Apple-Mail=_C01695D7-68B4-401B-BDA6-BE6550298DD9--


From nobody Thu Mar 29 04:55:57 2018
Return-Path: <adam.w.montville@gmail.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3716812DA07; Thu, 29 Mar 2018 04:55:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.7
X-Spam-Level: 
X-Spam-Status: No, score=-2.7 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9BZRRivhzHRL; Thu, 29 Mar 2018 04:55:54 -0700 (PDT)
Received: from mail-oi0-x236.google.com (mail-oi0-x236.google.com [IPv6:2607:f8b0:4003:c06::236]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B9C1612DA0A; Thu, 29 Mar 2018 04:55:54 -0700 (PDT)
Received: by mail-oi0-x236.google.com with SMTP id z8-v6so4918588oix.2; Thu, 29 Mar 2018 04:55:54 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=from:content-transfer-encoding:mime-version:subject:message-id:date :cc:to; bh=nkZbwEVzw8qNyfnMdmtdqWbg5t8RoVNJVk+qMJ7yQd8=; b=QtG6lWFpUberaDvvKuILxemTkiaJzNFZTFZ97WbLFxRTNv7HUgQYv4ZxH5jyAXyTmU T+yK6j0sbEETxRwkYZiqnHUnQ+Fyl8XNDL6Rq+G3kQFFQv6u4yT9lw3gls1xr3tXnTbe IlBhrj7TU91ks4KQum9wandAMnnX0LPggLNTQmN/ozUSxNyVt0kMM4COvjp5Aidf3jFs Ypna4urctW3bPZf7SZVOb8Pw8IaeGJMx2FA75lTAcRggWC7bD+gYLxa9RIKxRFRN4Pzh uVOXjULv1a72t2AAA9R8ssuIOXwvWG5htCy9m/WrRYTgDv4+p9VO1aD4sfBy1VTjbDug PAsA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:content-transfer-encoding:mime-version :subject:message-id:date:cc:to; bh=nkZbwEVzw8qNyfnMdmtdqWbg5t8RoVNJVk+qMJ7yQd8=; b=ffsjsI+eIVRz5PKIQS0zsjsC2Sco93TtecymwqMHibn5ose/8hgOFcSeAV3FHXp9Kk PfJU0T7oRIr9/pIr9J1HRIm/G9u8zlIsE9AqAfGfvSqrlJJYgzfEErTsKVw7UrPJAZFo kVM49mZHnQioP8DSDrww4QukfrgPorH4SUXABYeg2mN829i0yppE7h5/WMH6ywEPO8IB FQkIhiT+6th6/op6el+MEZ1b8Utjp9TnMSxM+VLgy5VYFGOT4MpFMD2kqOP3j0BHMPo+ vevCcJH3b013GmiZ09o89vIUnkZ7fV+BFR+NBYqTFAaQivrSZTGN25QlQgnCiH5rNhGB e56Q==
X-Gm-Message-State: ALQs6tAiizS7OWpkCrJL7p5bOt1c7KAyCK7mXBf+9VTLmU9witaaE9K0 /dn13coAfKqi1Dhzs6B8pOVdkQMJ
X-Google-Smtp-Source: AIpwx4/QsIWh9iZhow1ePgBqSURhIm3UYxozOSNceL+7sAGbizqeHRQqOPGDNmkOYqoidlDhJ4MTvg==
X-Received: by 10.202.76.133 with SMTP id z127mr3998617oia.144.1522324553640;  Thu, 29 Mar 2018 04:55:53 -0700 (PDT)
Received: from macbook-3.lan (99-64-100-131.lightspeed.austtx.sbcglobal.net. [99.64.100.131]) by smtp.gmail.com with ESMTPSA id q62-v6sm3273084oia.29.2018.03.29.04.55.52 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 29 Mar 2018 04:55:52 -0700 (PDT)
From: Adam Montville <adam.w.montville@gmail.com>
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
Message-Id: <1376B86F-167F-4A92-9152-52C55E797033@gmail.com>
Date: Thu, 29 Mar 2018 06:55:50 -0500
Cc: "<sacm@ietf.org>" <sacm@ietf.org>
To: draft-ietf-sacm-ecp@ietf.org, "<sacm-chairs@ietf.org>" <sacm-chairs@ietf.org>
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/rT_C2Yaole-pjt6MVOffrtUyA4c>
Subject: [sacm] Use of GitHub for ECP draft?
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Mar 2018 11:55:56 -0000

Hello ECP authors and SACM Chairs,

I've been spending some time with the latest ECP draft, and I would like =
to make some comments about it. I went to take a look at the GitHub =
repository [1] and saw that it's empty. I was going to ask if you'd =
prefer comments on the list directly or whether you'd prefer issues to =
be created.

Looks like I'll send comments to the list when they're ready. :-)

Have you any plans to use GitHub for the ECP draft? FWIW, I've found =
GitHub helpful when working with other drafts in this WG - not only for =
the added transparency of draft state, but for the project and issue =
management capabilities.=20

Kind regards,

Adam


From nobody Thu Mar 29 10:07:19 2018
Return-Path: <jmfitz2@radium.ncsc.mil>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 56EC312DA70; Thu, 29 Mar 2018 10:07:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id C_0UN_ND7PhA; Thu, 29 Mar 2018 10:07:15 -0700 (PDT)
Received: from USFB19PA13.eemsg.mail.mil (uphb19pa10.eemsg.mail.mil [214.24.26.84]) by ietfa.amsl.com (Postfix) with ESMTP id 51963120047; Thu, 29 Mar 2018 10:07:14 -0700 (PDT)
Received: from emsm-gh1-uea10.ncsc.mil ([214.29.60.2]) by USFB19PA13.eemsg.mail.mil with ESMTP/TLS/AES256-SHA; 29 Mar 2018 17:07:12 +0000
X-IronPort-AV: E=Sophos;i="5.48,376,1517875200"; d="scan'208";a="10171604"
IronPort-PHdr: =?us-ascii?q?9a23=3AZkeWwxHLBsAdynXPeGijrp1GYnF86YWxBRYc79?= =?us-ascii?q?8ds5kLTJ76pciybnLW6fgltlLVR4KTs6sC17KN9fi4EUU7or+5+EgYd5JNUx?= =?us-ascii?q?JXwe43pCcHRPC/NEvgMfTxZDY7FskRHHVs/nW8LFQHUJ2mPw6arXK99yMdFQ?= =?us-ascii?q?viPgRpOOv1BpTSj8Oq3Oyu5pHfeQpFiCazbL9oMBm6sRjau9ULj4dlNqs/0A?= =?us-ascii?q?bCrGFSe+RRy2NoJFaTkAj568yt4pNt8Dletuw4+cJYXqr0Y6o3TbpDDDQ7KG?= =?us-ascii?q?81/9HktQPCTQSU+HQRVHgdnwdSDAjE6BH6WYrxsjf/u+Fg1iSWIdH6QLYpUj?= =?us-ascii?q?m58axlVAHnhzsGNz4h8WHYlMpwjL5AoBm8oxBz2pPYbJ2JOPZ7eK7Sc8kaRW?= =?us-ascii?q?5cVchPUSJPDJ63Y48WA+cBOetUqo/wrEYMoxSjHwmhHOPhxCFViH/q06M00O?= =?us-ascii?q?ohHgPH3AM8ENwBv2/ZrMnsNKoITey50LXEwSvFYvhL2Tn98o/IchU5rP2CXb?= =?us-ascii?q?xwcNbRyEggFwzblFWfs4jlMC6M2uoKr2eV6vBvVOK3h2U6rw9+vCOvxtwtio?= =?us-ascii?q?bVnI0e11fK+Stky4syJ924TUB7Yd+4EJpRqS2XLJF2Tdk/TGFppSY6z6cKuZ?= =?us-ascii?q?incygR1Jsr3Rvfa/2Dc4WR5B/oSeWfIS9giX54ZL6znQi+/VWgx+HmSMW4zl?= =?us-ascii?q?RHojBYntTPq3wBzwHf5tSdRvdj40us2SyD2x7d5+xGO0w4i7fXJ4A5zrItl5?= =?us-ascii?q?cetV7PEjH2lUj5lqOaa0Up9vK15+nnbLjroIKXOZVuhQHkKKsun9SyAeE/Mg?= =?us-ascii?q?cTQWeW4f+81Lj//U3hR7VKk+E2nrHZsJ/EIcQboba0DQhI3Igh9RizFjao3t?= =?us-ascii?q?YFkXUeIl1Ldw6Kg5T3N13UPP/4Cu2/g0y2nDdt3PDJJKftAprKLnjdiLvhfL?= =?us-ascii?q?B95FBAyAcr0NxT+4hYBq8cLP/zQEP9qsLUAx0jPwCpwOvrFc1x1oYEVmKOBq?= =?us-ascii?q?+ZPrnSsViN5u83IemMYYEVuDfhK/kk+fLjlmU5lkUAcqmowJsXbWq0HvJ6LE?= =?us-ascii?q?WCfXXgmNIBEWYOvgYmVuzllEWCUSJPZ3a1R68z/Cw0B5ijDYvZSIGhmrmB3C?= =?us-ascii?q?C9Hp1KeGBGC1SMEXP2eIifVPcMbTidIs5lkjAeSbehTIoh3wm0tADm07pnMv?= =?us-ascii?q?bU+ioAuJ3+zth6/ePTlQ0r+Tx1Ecudz2+NQ3hvnmwSWzA22blzrlJhxVebyq?= =?us-ascii?q?V4guJXFcBd5/9TVQc6L5HcxfRgC9/uQgLBYsuJSFG+T9W9Gz4+Utcxz8YSbE?= =?us-ascii?q?Z9AdqijwrD3zGxDr8UibOLGJI0/rjb33jrKMZ302zG27U5j1k6XstPMnWrhr?= =?us-ascii?q?Vl+AfPAo7EiESZmLi2daQSxiLN832DzWXd9H1fBUFZXazAFVUYYFfIrND96w?= =?us-ascii?q?yKG7aiALFhLU1EzsieNKpObtDBglBPRfOlM9PbNSb50WuqDBiUg7KBcISvYG?= =?us-ascii?q?wW2WDQA1Askg0P8zCBLwd0TnOtuWvQEHlvGE7hJljl+uw7pXijZk450w/MaF?= =?us-ascii?q?dugf79sEoOjPeZDvgT17Meow8gpil6WlGn0IScQ46brgFkOa5caNIn+39G2H?= =?us-ascii?q?7X8QtnMcrzAbplgwtUXQVrrUzjzRxzBsBlmusjvTdi7gdpMqOT2RtkPXvM35?= =?us-ascii?q?X+O6HFcEHo9RyudquQ3FrF25CT+6NZu6dwkEnqoAz8ThlqyH5gydQAliLBt5?= =?us-ascii?q?g=3D?=
X-IPAS-Result: =?us-ascii?q?A2AZAwClHL1a/7Xj1wpeHAEBAQQBAQoBAYMXgiMKmkiBD?= =?us-ascii?q?4ZgjWuFDwKEOzcVAQIBAQEBAQECAYESgjgkAYJIAQEBAQM6PwwEAgEIEQQBA?= =?us-ascii?q?R8QIREdCAIEAQ0FCIRtA69UhwQNgSyCKoIqgxqDbz6BDIJWLoIRPoIigy6CJ?= =?us-ascii?q?AKBIwGVYywGAgKLLoQrhi+EVIlPh1AygXSBP4EdgSaDMQEMjQ9vAY1fgRcBA?= =?us-ascii?q?Q?=
Received: from msht-gh1-uea02.corp.nsa.gov ([10.215.227.181]) by EMSM-GH1-UEA10.NCSC.MIL with ESMTP; 29 Mar 2018 17:07:11 +0000
Received: from MSMR-GH1-UEA10.corp.nsa.gov ([169.254.15.153]) by MSHT-GH1-UEA02.corp.nsa.gov ([10.215.227.181]) with mapi id 14.03.0361.001; Thu, 29 Mar 2018 13:07:10 -0400
From: "Fitzgerald-McKay, Jessica M" <jmfitz2@radium.ncsc.mil>
To: 'Adam Montville' <adam.w.montville@gmail.com>, "draft-ietf-sacm-ecp@ietf.org" <draft-ietf-sacm-ecp@ietf.org>, "<sacm-chairs@ietf.org>" <sacm-chairs@ietf.org>
CC: "<sacm@ietf.org>" <sacm@ietf.org>
Thread-Topic: [Non-DoD Source] Use of GitHub for ECP draft?
Thread-Index: AQHTx1Tse59GnbdaGkK+Umnv6oZhdaPncPPw
Date: Thu, 29 Mar 2018 17:07:09 +0000
Message-ID: <F9582DD87D06A345BF3641AD5C12417A01C27C553D@MSMR-GH1-UEA10.corp.nsa.gov>
References: <1376B86F-167F-4A92-9152-52C55E797033@gmail.com>
In-Reply-To: <1376B86F-167F-4A92-9152-52C55E797033@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.215.237.212]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/M09vVDvZf8ao4XfBoZebB_1jjuc>
Subject: Re: [sacm] [Non-DoD Source] Use of GitHub for ECP draft?
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Mar 2018 17:07:18 -0000

Hello, all,

Adam, thanks for taking the time to read through the latest ECP draft. I'm =
looking forward to your comments. We haven't gotten many, and I appreciate =
the feedback.

Because we haven't received a lot of feedback yet, I am hesitant to use Git=
Hub to coordinate comments. Not everyone uses GitHub with regularity, and I=
 am worried it presents an additional barrier to getting any feedback at al=
l. And, we don't really need to help right now to organize our (current lac=
k of) comments. However, I appreciate the need for transparency. Is there a=
ny concern about using the list for comments? Is that less transparent than=
 using GitHub?

I could be persuaded that this is a better path, particularly if the chairs=
 want us to move in that direction. Karen, Chris, any thoughts?

Thanks,
Jess

-----Original Message-----
From: Adam Montville <adam.w.montville@gmail.com>=20
Sent: Thursday, March 29, 2018 7:56 AM
To: draft-ietf-sacm-ecp@ietf.org; <sacm-chairs@ietf.org> <sacm-chairs@ietf.=
org>
Cc: <sacm@ietf.org> <sacm@ietf.org>
Subject: [Non-DoD Source] Use of GitHub for ECP draft?

Hello ECP authors and SACM Chairs,

I've been spending some time with the latest ECP draft, and I would like to=
 make some comments about it. I went to take a look at the GitHub repositor=
y [1] and saw that it's empty. I was going to ask if you'd prefer comments =
on the list directly or whether you'd prefer issues to be created.

Looks like I'll send comments to the list when they're ready. :-)

Have you any plans to use GitHub for the ECP draft? FWIW, I've found GitHub=
 helpful when working with other drafts in this WG - not only for the added=
 transparency of draft state, but for the project and issue management capa=
bilities.=20

Kind regards,

Adam



From nobody Thu Mar 29 10:19:43 2018
Return-Path: <adam.w.montville@gmail.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 98F7012D879; Thu, 29 Mar 2018 10:19:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SBZI-VbGxidc; Thu, 29 Mar 2018 10:19:38 -0700 (PDT)
Received: from mail-ot0-x232.google.com (mail-ot0-x232.google.com [IPv6:2607:f8b0:4003:c0f::232]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7ADCC127522; Thu, 29 Mar 2018 10:19:38 -0700 (PDT)
Received: by mail-ot0-x232.google.com with SMTP id i28-v6so7162856otf.8; Thu, 29 Mar 2018 10:19:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=cMJry3T4DrN3LiaPUlt/5jfiFbF0UjgmqUA3nfvf52g=; b=SEzK/5gWXvco+2gJSc9Fe4VSvDT8u1oI6eAAdlry0LCy8b7qpSPJ2IioLBl2hHVMQ0 GcORhrkNr9Uyd/uWEAo/FM7WCi9zPZdwor5CACdhTgsKKTv0a2gOoiwE+KuJxExxBHyM I51RFVBCcII9kDI+x3UuW0kZ2bMt0Q5cDsXNhuskL/GORzxayNX8aL8NJfh/mpFPFSGF sAfvs2QRUf4hr63ggnD6V9BcgCPd7WqLO1K40m8wC/N0mpw9+7KIRjXPQ9qqIVYmV9Yk KNWZ1/97upRmk1UQq/iOlCAkZiiFBLsmTMH/pGpr7UGpQ6jLddvApTQz3IR6k6DQ71Uf 2DOA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=cMJry3T4DrN3LiaPUlt/5jfiFbF0UjgmqUA3nfvf52g=; b=OD7japvLj1SyLeBnYjTXTjax/zNKz/KUb3VPfw23ZgdF1vc/oG7xfRmCUXRq492INr ypMx68xMpd++/wIMjN74EXzV2vP7mE8eTTFrAI0pnGS3MANvUvjnGhPA+uK6Qmj1yCVa QJ/t9yHKYxRkCmFOGwHckvOqWCDmn9uRDKINKMAygncRNiZOhQs1KqtlrqoKO9GrYLDT qjKp4/Nwj19lVvGOezJuas6mnpLtQJoFiHlAHEPz37IW5tLYNFNMV9JtESyKTn/rBlf8 hzwgmjd9uu2o46vOFHLKNeJt/ha1IlxyYYFKwCjkmOg146jjnrHOPpvlDpR9K9EAQfQl NMRw==
X-Gm-Message-State: AElRT7HgJQSVGbPAdOgJyWLvTlra/1nvEzYthDDzXrOyYCjtNLHxTuA6 NlhqbR4LmB89dBr0fu7s53ZbIoPc
X-Google-Smtp-Source: AIpwx4/VdcCgjsACFvEUhNGY2DnzcK0Cvx7b/Kyj5tBtKZWXgPckUxpjJaAavW037+UsWheFSAlLag==
X-Received: by 2002:a9d:242b:: with SMTP id p40-v6mr5147415ota.318.1522343977736;  Thu, 29 Mar 2018 10:19:37 -0700 (PDT)
Received: from macbook-3.lan (99-64-100-131.lightspeed.austtx.sbcglobal.net. [99.64.100.131]) by smtp.gmail.com with ESMTPSA id n96-v6sm3586240otn.80.2018.03.29.10.19.35 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Thu, 29 Mar 2018 10:19:36 -0700 (PDT)
From: Adam Montville <adam.w.montville@gmail.com>
Message-Id: <918DE619-94E8-4007-92D5-B3C5502CABEB@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_7DF8A791-90FA-4BF1-9D9D-3075ED25232A"
Mime-Version: 1.0 (Mac OS X Mail 11.2 \(3445.5.20\))
Date: Thu, 29 Mar 2018 12:19:34 -0500
In-Reply-To: <F9582DD87D06A345BF3641AD5C12417A01C27C553D@MSMR-GH1-UEA10.corp.nsa.gov>
Cc: "draft-ietf-sacm-ecp@ietf.org" <draft-ietf-sacm-ecp@ietf.org>, "<sacm-chairs@ietf.org>" <sacm-chairs@ietf.org>, "<sacm@ietf.org>" <sacm@ietf.org>
To: "Fitzgerald-McKay, Jessica M" <jmfitz2@radium.ncsc.mil>
References: <1376B86F-167F-4A92-9152-52C55E797033@gmail.com> <F9582DD87D06A345BF3641AD5C12417A01C27C553D@MSMR-GH1-UEA10.corp.nsa.gov>
X-Mailer: Apple Mail (2.3445.5.20)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/ldfcAPktNmzmGb7MxtdhOyMYA8g>
Subject: Re: [sacm] [Non-DoD Source] Use of GitHub for ECP draft?
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Mar 2018 17:19:42 -0000

--Apple-Mail=_7DF8A791-90FA-4BF1-9D9D-3075ED25232A
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=us-ascii

I have no reservation about using the list. My comment on additional =
transparency was about the editor's copy being readily available (i.e. =
like the terminology draft is: =
https://github.com/sacmwg/draft-ietf-sacm-terminology =
<https://github.com/sacmwg/draft-ietf-sacm-terminology>) - of course, =
using the list and submitted, numbered drafts is inherently transparent.

I agree with you, though, that whatever gets (and keeps) the =
conversation going is the way we should roll.

Adam

> On Mar 29, 2018, at 12:07 PM, Fitzgerald-McKay, Jessica M =
<jmfitz2@radium.ncsc.mil> wrote:
>=20
> Hello, all,
>=20
> Adam, thanks for taking the time to read through the latest ECP draft. =
I'm looking forward to your comments. We haven't gotten many, and I =
appreciate the feedback.
>=20
> Because we haven't received a lot of feedback yet, I am hesitant to =
use GitHub to coordinate comments. Not everyone uses GitHub with =
regularity, and I am worried it presents an additional barrier to =
getting any feedback at all. And, we don't really need to help right now =
to organize our (current lack of) comments. However, I appreciate the =
need for transparency. Is there any concern about using the list for =
comments? Is that less transparent than using GitHub?
>=20
> I could be persuaded that this is a better path, particularly if the =
chairs want us to move in that direction. Karen, Chris, any thoughts?
>=20
> Thanks,
> Jess
>=20
> -----Original Message-----
> From: Adam Montville <adam.w.montville@gmail.com>=20
> Sent: Thursday, March 29, 2018 7:56 AM
> To: draft-ietf-sacm-ecp@ietf.org; <sacm-chairs@ietf.org> =
<sacm-chairs@ietf.org>
> Cc: <sacm@ietf.org> <sacm@ietf.org>
> Subject: [Non-DoD Source] Use of GitHub for ECP draft?
>=20
> Hello ECP authors and SACM Chairs,
>=20
> I've been spending some time with the latest ECP draft, and I would =
like to make some comments about it. I went to take a look at the GitHub =
repository [1] and saw that it's empty. I was going to ask if you'd =
prefer comments on the list directly or whether you'd prefer issues to =
be created.
>=20
> Looks like I'll send comments to the list when they're ready. :-)
>=20
> Have you any plans to use GitHub for the ECP draft? FWIW, I've found =
GitHub helpful when working with other drafts in this WG - not only for =
the added transparency of draft state, but for the project and issue =
management capabilities.=20
>=20
> Kind regards,
>=20
> Adam
>=20
>=20


--Apple-Mail=_7DF8A791-90FA-4BF1-9D9D-3075ED25232A
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=us-ascii

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D"">I =
have no reservation about using the list. My comment on additional =
transparency was about the editor's copy being readily available (i.e. =
like the terminology draft is:&nbsp;<a =
href=3D"https://github.com/sacmwg/draft-ietf-sacm-terminology" =
class=3D"">https://github.com/sacmwg/draft-ietf-sacm-terminology</a>) - =
of course, using the list and submitted, numbered drafts is inherently =
transparent.<div class=3D""><br class=3D""></div><div class=3D"">I agree =
with you, though, that whatever gets (and keeps) the conversation going =
is the way we should roll.</div><div class=3D""><br class=3D""></div><div =
class=3D"">Adam<br class=3D""><div><br class=3D""><blockquote =
type=3D"cite" class=3D""><div class=3D"">On Mar 29, 2018, at 12:07 PM, =
Fitzgerald-McKay, Jessica M &lt;<a href=3D"mailto:jmfitz2@radium.ncsc.mil"=
 class=3D"">jmfitz2@radium.ncsc.mil</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div class=3D"">Hello,=
 all,<br class=3D""><br class=3D"">Adam, thanks for taking the time to =
read through the latest ECP draft. I'm looking forward to your comments. =
We haven't gotten many, and I appreciate the feedback.<br class=3D""><br =
class=3D"">Because we haven't received a lot of feedback yet, I am =
hesitant to use GitHub to coordinate comments. Not everyone uses GitHub =
with regularity, and I am worried it presents an additional barrier to =
getting any feedback at all. And, we don't really need to help right now =
to organize our (current lack of) comments. However, I appreciate the =
need for transparency. Is there any concern about using the list for =
comments? Is that less transparent than using GitHub?<br class=3D""><br =
class=3D"">I could be persuaded that this is a better path, particularly =
if the chairs want us to move in that direction. Karen, Chris, any =
thoughts?<br class=3D""><br class=3D"">Thanks,<br class=3D"">Jess<br =
class=3D""><br class=3D"">-----Original Message-----<br class=3D"">From: =
Adam Montville &lt;<a href=3D"mailto:adam.w.montville@gmail.com" =
class=3D"">adam.w.montville@gmail.com</a>&gt; <br class=3D"">Sent: =
Thursday, March 29, 2018 7:56 AM<br class=3D"">To: <a =
href=3D"mailto:draft-ietf-sacm-ecp@ietf.org" =
class=3D"">draft-ietf-sacm-ecp@ietf.org</a>; &lt;<a =
href=3D"mailto:sacm-chairs@ietf.org" =
class=3D"">sacm-chairs@ietf.org</a>&gt; &lt;<a =
href=3D"mailto:sacm-chairs@ietf.org" =
class=3D"">sacm-chairs@ietf.org</a>&gt;<br class=3D"">Cc: &lt;<a =
href=3D"mailto:sacm@ietf.org" class=3D"">sacm@ietf.org</a>&gt; &lt;<a =
href=3D"mailto:sacm@ietf.org" class=3D"">sacm@ietf.org</a>&gt;<br =
class=3D"">Subject: [Non-DoD Source] Use of GitHub for ECP draft?<br =
class=3D""><br class=3D"">Hello ECP authors and SACM Chairs,<br =
class=3D""><br class=3D"">I've been spending some time with the latest =
ECP draft, and I would like to make some comments about it. I went to =
take a look at the GitHub repository [1] and saw that it's empty. I was =
going to ask if you'd prefer comments on the list directly or whether =
you'd prefer issues to be created.<br class=3D""><br class=3D"">Looks =
like I'll send comments to the list when they're ready. :-)<br =
class=3D""><br class=3D"">Have you any plans to use GitHub for the ECP =
draft? FWIW, I've found GitHub helpful when working with other drafts in =
this WG - not only for the added transparency of draft state, but for =
the project and issue management capabilities. <br class=3D""><br =
class=3D"">Kind regards,<br class=3D""><br class=3D"">Adam<br =
class=3D""><br class=3D""><br =
class=3D""></div></div></blockquote></div><br =
class=3D""></div></body></html>=

--Apple-Mail=_7DF8A791-90FA-4BF1-9D9D-3075ED25232A--


From nobody Fri Mar 30 06:36:43 2018
Return-Path: <noreply@github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F2631126E64 for <sacm@ietfa.amsl.com>; Fri, 30 Mar 2018 06:36:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.01
X-Spam-Level: 
X-Spam-Status: No, score=-7.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZM1vU86wZhcN for <sacm@ietfa.amsl.com>; Fri, 30 Mar 2018 06:36:40 -0700 (PDT)
Received: from out-7.smtp.github.com (out-7.smtp.github.com [192.30.252.198]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1AFD6124239 for <sacm@ietf.org>; Fri, 30 Mar 2018 06:36:40 -0700 (PDT)
Date: Fri, 30 Mar 2018 06:36:39 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com; s=pf2014; t=1522416999; bh=Og4KAEWQXDFC7gVXGA5DRWM8Y2vWmNT6fYcYWdeDcqw=; h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:List-ID: List-Archive:List-Post:List-Unsubscribe:From; b=JX14MrXrF0IWH6JwskdGKDeG9gBurSjk2UzJr9ODXTfUEbSbMbsNddh0LHmMMexxM oJOY31V58OEoqIcaQwusBV7g5W4dQ8N7qwjkFfKH3BQmYJjRJcQAmghK2M1fXcUKbK IHAwgU5Ab38mXcaeapkDihiGiCLSBfkE3/YGuzGA=
From: adammontville <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-terminology <reply+00a6c4d1e2994a1664653671a85d39cc06ebd08001417d3592cf0000000116d5ff6792a169ce1270cd00@reply.github.com>
To: sacmwg/draft-ietf-sacm-terminology <draft-ietf-sacm-terminology@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-terminology/issues/89/377525577@github.com>
In-Reply-To: <sacmwg/draft-ietf-sacm-terminology/issues/89@github.com>
References: <sacmwg/draft-ietf-sacm-terminology/issues/89@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5abe3d67177cf_73b43fc0f8c12f34915c"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: adammontville
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/Ii1rmrenUughaeBd4C-QBHZEcUg>
Subject: Re: [sacm] [sacmwg/draft-ietf-sacm-terminology] Consider bringing back "Network Address" (#89)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Mar 2018 13:36:42 -0000

----==_mimepart_5abe3d67177cf_73b43fc0f8c12f34915c
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Henk mentioned that we might like to bring back the term "Network Address". Here's what that looked like:

>Network Address:  Network addresses are layer specific and follow layer specific address schemes.  Each interface of a specific layer can be associated with one or more addresses appropriate for that layer.  There is no guarantee that an address is globally unique.  In general, there is a scope to an address in which it is intended to be unique.

>Examples include: physical Ethernet port with a MAC address, layer 2 VLAN interface with a MAC address, layer 3 interface with multiple IPv6 addresses, layer 3 tunnel ingress or egress with an IPv4 address.

What if we change this to something like the following:

>Network Address: An address that is layer-specific and follows layer-specific address schemes.

>Each interface of a specific layer can be associated with one or more addresses appropriate for that layer, and there is no guarantee that an address is globally unique, though there is generally a network scope to which the address is intended to be unique. Examples of network addresses include: A physical ethernet port with a MAC address, a layer 2 VLAN interface with a MAC address, a layer 3 interface with multiple IPv6 addresses, a layer 3 tunnel ingress or egress with an IPv4 address.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/89#issuecomment-377525577
----==_mimepart_5abe3d67177cf_73b43fc0f8c12f34915c
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<p>Henk mentioned that we might like to bring back the term "Network Addr=
ess". Here's what that looked like:</p>
<blockquote>
<p>Network Address:  Network addresses are layer specific and follow laye=
r specific address schemes.  Each interface of a specific layer can be as=
sociated with one or more addresses appropriate for that layer.  There is=
 no guarantee that an address is globally unique.  In general, there is a=
 scope to an address in which it is intended to be unique.</p>
</blockquote>
<blockquote>
<p>Examples include: physical Ethernet port with a MAC address, layer 2 V=
LAN interface with a MAC address, layer 3 interface with multiple IPv6 ad=
dresses, layer 3 tunnel ingress or egress with an IPv4 address.</p>
</blockquote>
<p>What if we change this to something like the following:</p>
<blockquote>
<p>Network Address: An address that is layer-specific and follows layer-s=
pecific address schemes.</p>
</blockquote>
<blockquote>
<p>Each interface of a specific layer can be associated with one or more =
addresses appropriate for that layer, and there is no guarantee that an a=
ddress is globally unique, though there is generally a network scope to w=
hich the address is intended to be unique. Examples of network addresses =
include: A physical ethernet port with a MAC address, a layer 2 VLAN inte=
rface with a MAC address, a layer 3 interface with multiple IPv6 addresse=
s, a layer 3 tunnel ingress or egress with an IPv4 address.</p>
</blockquote>

<p style=3D"font-size:small;-webkit-text-size-adjust:none;color:#666;">&m=
dash;<br />You are receiving this because you are subscribed to this thre=
ad.<br />Reply to this email directly, <a href=3D"https://github.com/sacm=
wg/draft-ietf-sacm-terminology/issues/89#issuecomment-377525577">view it =
on GitHub</a>, or <a href=3D"https://github.com/notifications/unsubscribe=
-auth/AKbE0XTH2gwnioTI4xLWTWyB1Xxm_M7Sks5tjjTngaJpZM4S-tnL">mute the thre=
ad</a>.<img src=3D"https://github.com/notifications/beacon/AKbE0XZHM6l_jR=
GRQs7_VP7AK10X2WGPks5tjjTngaJpZM4S-tnL.gif" height=3D"1" width=3D"1" alt=3D=
"" /></p>
<div itemscope itemtype=3D"http://schema.org/EmailMessage">
<div itemprop=3D"action" itemscope itemtype=3D"http://schema.org/ViewActi=
on">
  <link itemprop=3D"url" href=3D"https://github.com/sacmwg/draft-ietf-sac=
m-terminology/issues/89#issuecomment-377525577"></link>
  <meta itemprop=3D"name" content=3D"View Issue"></meta>
</div>
<meta itemprop=3D"description" content=3D"View this Issue on GitHub"></me=
ta>
</div>

<script type=3D"application/json" data-scope=3D"inboxmarkup">{"api_versio=
n":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name"=
:"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-termin=
ology","title":"sacmwg/draft-ietf-sacm-terminology","subtitle":"GitHub re=
pository","main_image_url":"https://cloud.githubusercontent.com/assets/14=
3418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url=
":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c=
0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"h=
ttps://github.com/sacmwg/draft-ietf-sacm-terminology"}},"updates":{"snipp=
ets":[{"icon":"PERSON","message":"@adammontville in #89: Henk mentioned t=
hat we might like to bring back the term \"Network Address\". Here's what=
 that looked like:\r\n\r\n\u003eNetwork Address:  Network addresses are l=
ayer specific and follow layer specific address schemes.  Each interface =
of a specific layer can be associated with one or more addresses appropri=
ate for that layer.  There is no guarantee that an address is globally un=
ique.  In general, there is a scope to an address in which it is intended=
 to be unique.\r\n\r\n\u003eExamples include: physical Ethernet port with=
 a MAC address, layer 2 VLAN interface with a MAC address, layer 3 interf=
ace with multiple IPv6 addresses, layer 3 tunnel ingress or egress with a=
n IPv4 address.\r\n\r\nWhat if we change this to something like the follo=
wing:\r\n\r\n\u003eNetwork Address: An address that is layer-specific and=
 follows layer-specific address schemes.\r\n\r\n\u003eEach interface of a=
 specific layer can be associated with one or more addresses appropriate =
for that layer, and there is no guarantee that an address is globally uni=
que, though there is generally a network scope to which the address is in=
tended to be unique. Examples of network addresses include: A physical et=
hernet port with a MAC address, a layer 2 VLAN interface with a MAC addre=
ss, a layer 3 interface with multiple IPv6 addresses, a layer 3 tunnel in=
gress or egress with an IPv4 address."}],"action":{"name":"View Issue","u=
rl":"https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/89#issu=
ecomment-377525577"}}}</script>=

----==_mimepart_5abe3d67177cf_73b43fc0f8c12f34915c--


From nobody Fri Mar 30 06:58:14 2018
Return-Path: <bounces+848413-495d-sacm=ietf.org@sgmail.github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CE38112D7EF for <sacm@ietfa.amsl.com>; Fri, 30 Mar 2018 06:58:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level: 
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tmGB-TtXTJMa for <sacm@ietfa.amsl.com>; Fri, 30 Mar 2018 06:58:11 -0700 (PDT)
Received: from o1.sgmail.github.com (o1.sgmail.github.com [192.254.114.176]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0F5BE126DCA for <sacm@ietf.org>; Fri, 30 Mar 2018 06:58:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=github.com;  h=from:reply-to:to:cc:in-reply-to:references:subject:mime-version:content-type:content-transfer-encoding:list-id:list-archive:list-post:list-unsubscribe; s=s20150108; bh=v9lbse028+C9p9KGj2EibGUitYc=; b=IWmN6A665kLTHM9K xfnyHLdtJFqpyY95CmJEODVHttwqQmp1p14Wtuo+eVrihPAAhjTM54R/q0Mgj3uB CW2j8p+0ZO7EOyLvzg10kkzy5qgBYZeWKAc7eSnKsmbe1mqX9Oq7wsSo1SskJnBt xxrru/L2CsK0aveyh9H013xVJGo=
Received: by filter0149p1las1.sendgrid.net with SMTP id filter0149p1las1-10366-5ABE4272-5 2018-03-30 13:58:10.26765564 +0000 UTC
Received: from smtp.github.com (out-2.smtp.github.com [192.30.252.193]) by ismtpd0003p1iad2.sendgrid.net (SG) with ESMTP id EvXesWCdRM21CZXT3LG6xg for <sacm@ietf.org>; Fri, 30 Mar 2018 13:58:10.391 +0000 (UTC)
Date: Fri, 30 Mar 2018 13:58:10 +0000 (UTC)
From: adammontville <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-terminology <reply+00a6c4d19faf9741941ebe8242a807d12c8b5c84e00f2d2c92cf0000000116d6047292a169ce07aa0be1@reply.github.com>
To: sacmwg/draft-ietf-sacm-terminology <draft-ietf-sacm-terminology@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-terminology/issues/28/377529805@github.com>
In-Reply-To: <sacmwg/draft-ietf-sacm-terminology/issues/28@github.com>
References: <sacmwg/draft-ietf-sacm-terminology/issues/28@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5abe427232676_2a403fe5c6f8af341084e"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: adammontville
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
X-SG-EID: UtArl2HfP/Y+1oZ8SNY9H5pf2RHFR3mrlgtRj/+GYV45E3B3YMQhG3N8Yag2iDzEbU0d0PTtqeUs1N DY3EKROxkYdIcLkBYZuvbJpBRc6D0y7O9pNRGwSeP23MWnruCVCyiUglQ0QAaHuCqfnFytsZfAe5fz aEro05O1KR3/9IGU4RQiyeua/UeQa7gxFC4UjMU17ZWlCL82Iws+OLnSIg==
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/_nnIkx6Rr6zt1HdBxf1xkE4cgNQ>
Subject: Re: [sacm] [sacmwg/draft-ietf-sacm-terminology] Definition Tasks (#28)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Mar 2018 13:58:13 -0000

----==_mimepart_5abe427232676_2a403fe5c6f8af341084e
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

Can someone (@henkbirkholz ?) figure out where this is coming from? I can't find "Attribute Definition" in the current or previous draft.

In terms of the bigger question: Are certain "artifacts" not necessarily conducted by a SACM component? I think the answer is yes. I think activities like defining a policy (i.e. like a CIS Benchmark or a USGCB checklist or a DISA STIG) are largely manual processes. There may be some cases where certain recommendations could be inferred by a SACM component based on different guidance (but at some point the guidance relied upon comes from an organization, which is likely to be a manual process).

What is the action to be taken from this issue?

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/28#issuecomment-377529805
----==_mimepart_5abe427232676_2a403fe5c6f8af341084e
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<p>Can someone (<a class=3D"user-mention" data-hovercard-user-id=3D"1254613=
0" href=3D"https://github.com/henkbirkholz">@henkbirkholz</a> ?) figure out=
 where this is coming from? I can't find "Attribute Definition" in the curr=
ent or previous draft.</p>
<p>In terms of the bigger question: Are certain "artifacts" not necessarily=
 conducted by a SACM component? I think the answer is yes. I think activiti=
es like defining a policy (i.e. like a CIS Benchmark or a USGCB checklist o=
r a DISA STIG) are largely manual processes. There may be some cases where =
certain recommendations could be inferred by a SACM component based on diff=
erent guidance (but at some point the guidance relied upon comes from an or=
ganization, which is likely to be a manual process).</p>
<p>What is the action to be taken from this issue?</p>

<p style=3D"font-size:small;-webkit-text-size-adjust:none;color:#666;">&mda=
sh;<br />You are receiving this because you are subscribed to this thread.<=
br />Reply to this email directly, <a href=3D"https://github.com/sacmwg/dra=
ft-ietf-sacm-terminology/issues/28#issuecomment-377529805">view it on GitHu=
b</a>, or <a href=3D"https://github.com/notifications/unsubscribe-auth/AKbE=
0eQ1xILPb0h4p8SMgF9Y45e8gUSmks5tjjnygaJpZM4HLxf1">mute the thread</a>.<img =
src=3D"https://github.com/notifications/beacon/AKbE0d2ANtDfOtvcA9NAwsNxhUcz=
03Hpks5tjjnygaJpZM4HLxf1.gif" height=3D"1" width=3D"1" alt=3D"" /></p>
<div itemscope itemtype=3D"http://schema.org/EmailMessage">
<div itemprop=3D"action" itemscope itemtype=3D"http://schema.org/ViewAction=
">
  <link itemprop=3D"url" href=3D"https://github.com/sacmwg/draft-ietf-sacm-=
terminology/issues/28#issuecomment-377529805"></link>
  <meta itemprop=3D"name" content=3D"View Issue"></meta>
</div>
<meta itemprop=3D"description" content=3D"View this Issue on GitHub"></meta>
</div>

<script type=3D"application/json" data-scope=3D"inboxmarkup">{"api_version"=
:"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"Gi=
tHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-terminology"=
,"title":"sacmwg/draft-ietf-sacm-terminology","subtitle":"GitHub repository=
","main_image_url":"https://cloud.githubusercontent.com/assets/143418/17495=
839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url":"https://c=
loud.githubusercontent.com/assets/143418/15842166/7c72db34-2c0b-11e6-9aed-b=
52498112777.png","action":{"name":"Open in GitHub","url":"https://github.co=
m/sacmwg/draft-ietf-sacm-terminology"}},"updates":{"snippets":[{"icon":"PER=
SON","message":"@adammontville in #28: Can someone (@henkbirkholz ?) figure=
 out where this is coming from? I can't find \"Attribute Definition\" in th=
e current or previous draft.\r\n\r\nIn terms of the bigger question: Are ce=
rtain \"artifacts\" not necessarily conducted by a SACM component? I think =
the answer is yes. I think activities like defining a policy (i.e. like a C=
IS Benchmark or a USGCB checklist or a DISA STIG) are largely manual proces=
ses. There may be some cases where certain recommendations could be inferre=
d by a SACM component based on different guidance (but at some point the gu=
idance relied upon comes from an organization, which is likely to be a manu=
al process).\r\n\r\nWhat is the action to be taken from this issue?"}],"act=
ion":{"name":"View Issue","url":"https://github.com/sacmwg/draft-ietf-sacm-=
terminology/issues/28#issuecomment-377529805"}}}</script>=

----==_mimepart_5abe427232676_2a403fe5c6f8af341084e--


From nobody Fri Mar 30 07:02:42 2018
Return-Path: <bounces+848413-495d-sacm=ietf.org@sgmail.github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 09833127058 for <sacm@ietfa.amsl.com>; Fri, 30 Mar 2018 07:02:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.009
X-Spam-Level: 
X-Spam-Status: No, score=-2.009 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_32=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yhZAy2OB4Fmd for <sacm@ietfa.amsl.com>; Fri, 30 Mar 2018 07:02:39 -0700 (PDT)
Received: from o10.sgmail.github.com (o10.sgmail.github.com [167.89.101.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 398D7126DCA for <sacm@ietf.org>; Fri, 30 Mar 2018 07:02:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha1; c=relaxed/relaxed; d=github.com;  h=from:reply-to:to:cc:in-reply-to:references:subject:mime-version:content-type:content-transfer-encoding:list-id:list-archive:list-post:list-unsubscribe; s=s20150108; bh=ddU6ItnhhfFqtkxbPWJxbFO6dLE=; b=L7nPB0Fz0XZYjAhD Pe0HVyLBoV5UwQPOS+h1uu3MrM3PsTJ2FMDsCWzFutY3kE32C2Z7jfVXEEhiJ3in n48lV1MDJGVtNsYIEllM3lDG1c/3iz4msGo3Q5hGAQHkGm1h7QpKKcAWZuI3ScyX r6DLWdnDBBN7vTTkH3tA2LZJDtU=
Received: by filter0106p1las1.sendgrid.net with SMTP id filter0106p1las1-18098-5ABE437E-15 2018-03-30 14:02:38.379516811 +0000 UTC
Received: from smtp.github.com (out-3.smtp.github.com [192.30.252.194]) by ismtpd0008p1iad2.sendgrid.net (SG) with ESMTP id OjY1uOQpSH6QHAjzBHW7IA for <sacm@ietf.org>; Fri, 30 Mar 2018 14:02:38.719 +0000 (UTC)
Date: Fri, 30 Mar 2018 14:02:38 +0000 (UTC)
From: adammontville <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-terminology <reply+00a6c4d15bc7a8b3ce4c9b6ecd15655d7adc442a5e910c1a92cf0000000116d6057e92a169ce07aa0a6f@reply.github.com>
To: sacmwg/draft-ietf-sacm-terminology <draft-ietf-sacm-terminology@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-terminology/issues/27/377530721@github.com>
In-Reply-To: <sacmwg/draft-ietf-sacm-terminology/issues/27@github.com>
References: <sacmwg/draft-ietf-sacm-terminology/issues/27@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5abe437e3202c_2a433fe5c6f8af3492611"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: adammontville
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
X-SG-EID: UtArl2HfP/Y+1oZ8SNY9H45woNWSkZwb6bWf2UEkeIiPV0ALfO/kYS6hs1B1oSAXkL+rSEYKgGww0x stb1UZde/r3NQdDp//bjE+2IR8eOFv4NH7BT1RSnMvRV9ouBfMQUn1CVlzKZnSNscd8mtzcumYk4SA o7ba+oDFyuoTbI2v14T6nB+emohVg7ijE3lp+PsRelJqBA7W1F6FdYcstDt6VyEBZHHQZiPdpVyXGy g=
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/VokvDQQ0vwd4iiVPq2NN2DEkx5s>
Subject: Re: [sacm] [sacmwg/draft-ietf-sacm-terminology] SACM Tasks (#27)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Mar 2018 14:02:41 -0000

----==_mimepart_5abe437e3202c_2a433fe5c6f8af3492611
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

The list of defined tasks in the terminology draft are: 

 * Target Endpoint Discovery
 * Target Endpoint Characterization
 * Target Endpoint Classification
 * Collection
 * Evaluation [TBD]
 * Information Sharing [TBD]
 * SACM Component Discovery
 * SACM Component Authentication [TBD]
 * SACM Component Authorization [TBD]
 * SACM Component Registration [TBD]  

Assessment is defined in the terminology draft as well, as being the process of collecting and subsequent evaluation. 

Does this issue still need to exist, or can we close it without taking any action?

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/27#issuecomment-377530721
----==_mimepart_5abe437e3202c_2a433fe5c6f8af3492611
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<p>The list of defined tasks in the terminology draft are:</p>
<ul>
<li>Target Endpoint Discovery</li>
<li>Target Endpoint Characterization</li>
<li>Target Endpoint Classification</li>
<li>Collection</li>
<li>Evaluation [TBD]</li>
<li>Information Sharing [TBD]</li>
<li>SACM Component Discovery</li>
<li>SACM Component Authentication [TBD]</li>
<li>SACM Component Authorization [TBD]</li>
<li>SACM Component Registration [TBD]</li>
</ul>
<p>Assessment is defined in the terminology draft as well, as being the pro=
cess of collecting and subsequent evaluation.</p>
<p>Does this issue still need to exist, or can we close it without taking a=
ny action?</p>

<p style=3D"font-size:small;-webkit-text-size-adjust:none;color:#666;">&mda=
sh;<br />You are receiving this because you are subscribed to this thread.<=
br />Reply to this email directly, <a href=3D"https://github.com/sacmwg/dra=
ft-ietf-sacm-terminology/issues/27#issuecomment-377530721">view it on GitHu=
b</a>, or <a href=3D"https://github.com/notifications/unsubscribe-auth/AKbE=
0QlVmRZK2tBA1Wmjnzm2UFyGIDi1ks5tjjr-gaJpZM4HLxZR">mute the thread</a>.<img =
src=3D"https://github.com/notifications/beacon/AKbE0d0wfHPvMu54SphSRZ3K-lOv=
h4Qvks5tjjr-gaJpZM4HLxZR.gif" height=3D"1" width=3D"1" alt=3D"" /></p>
<div itemscope itemtype=3D"http://schema.org/EmailMessage">
<div itemprop=3D"action" itemscope itemtype=3D"http://schema.org/ViewAction=
">
  <link itemprop=3D"url" href=3D"https://github.com/sacmwg/draft-ietf-sacm-=
terminology/issues/27#issuecomment-377530721"></link>
  <meta itemprop=3D"name" content=3D"View Issue"></meta>
</div>
<meta itemprop=3D"description" content=3D"View this Issue on GitHub"></meta>
</div>

<script type=3D"application/json" data-scope=3D"inboxmarkup">{"api_version"=
:"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name":"Gi=
tHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-terminology"=
,"title":"sacmwg/draft-ietf-sacm-terminology","subtitle":"GitHub repository=
","main_image_url":"https://cloud.githubusercontent.com/assets/143418/17495=
839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url":"https://c=
loud.githubusercontent.com/assets/143418/15842166/7c72db34-2c0b-11e6-9aed-b=
52498112777.png","action":{"name":"Open in GitHub","url":"https://github.co=
m/sacmwg/draft-ietf-sacm-terminology"}},"updates":{"snippets":[{"icon":"PER=
SON","message":"@adammontville in #27: The list of defined tasks in the ter=
minology draft are: \r\n\r\n * Target Endpoint Discovery\r\n * Target Endpo=
int Characterization\r\n * Target Endpoint Classification\r\n * Collection\=
r\n * Evaluation [TBD]\r\n * Information Sharing [TBD]\r\n * SACM Component=
 Discovery\r\n * SACM Component Authentication [TBD]\r\n * SACM Component A=
uthorization [TBD]\r\n * SACM Component Registration [TBD]  \r\n\r\nAssessm=
ent is defined in the terminology draft as well, as being the process of co=
llecting and subsequent evaluation. \r\n\r\nDoes this issue still need to e=
xist, or can we close it without taking any action?"}],"action":{"name":"Vi=
ew Issue","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology/issu=
es/27#issuecomment-377530721"}}}</script>=

----==_mimepart_5abe437e3202c_2a433fe5c6f8af3492611--


From nobody Fri Mar 30 07:06:58 2018
Return-Path: <noreply@github.com>
X-Original-To: sacm@ietfa.amsl.com
Delivered-To: sacm@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E514812D7EF for <sacm@ietfa.amsl.com>; Fri, 30 Mar 2018 07:06:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.606
X-Spam-Level: 
X-Spam-Status: No, score=-5.606 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_IMAGE_ONLY_28=1.404, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=github.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OoWUAL0L7mCr for <sacm@ietfa.amsl.com>; Fri, 30 Mar 2018 07:06:54 -0700 (PDT)
Received: from out-7.smtp.github.com (out-7.smtp.github.com [192.30.252.198]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 28337126DCA for <sacm@ietf.org>; Fri, 30 Mar 2018 07:06:53 -0700 (PDT)
Date: Fri, 30 Mar 2018 07:06:52 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=github.com; s=pf2014; t=1522418812; bh=dHi35njOZnSntCMLCihj+quqB7jlQ/8+ybDjugKlUJc=; h=Date:From:Reply-To:To:Cc:In-Reply-To:References:Subject:List-ID: List-Archive:List-Post:List-Unsubscribe:From; b=Mw3BJotxyOOPsS6sEW3/ysTvjF4I0WPwdVdN4/ppGniML5ntmt/+oGeVU/Eh+/16J 4Rrwk3cx/kPRDdxYfRoK8TuSwe0+5mv+56S47zs7cQhRl9ppE+mqHOs5bMe5Eyk+xF AcpysfnZzJrWv+e0v8t6f1Jj2ir0MlhgX3So4yS0=
From: adammontville <notifications@github.com>
Reply-To: sacmwg/draft-ietf-sacm-terminology <reply+00a6c4d12d4158b25ca86989fbec7ed3352c206d8632f66792cf0000000116d6067c92a169ce10bcea48@reply.github.com>
To: sacmwg/draft-ietf-sacm-terminology <draft-ietf-sacm-terminology@noreply.github.com>
Cc: Subscribed <subscribed@noreply.github.com>
Message-ID: <sacmwg/draft-ietf-sacm-terminology/issues/64/377531588@github.com>
In-Reply-To: <sacmwg/draft-ietf-sacm-terminology/issues/64@github.com>
References: <sacmwg/draft-ietf-sacm-terminology/issues/64@github.com>
Mime-Version: 1.0
Content-Type: multipart/alternative; boundary="--==_mimepart_5abe447ce30cf_f3d3fe1decfef2c2595a3"; charset=UTF-8
Content-Transfer-Encoding: 7bit
Precedence: list
X-GitHub-Sender: adammontville
X-GitHub-Recipient: sacm
X-GitHub-Reason: subscribed
X-Auto-Response-Suppress: All
X-GitHub-Recipient-Address: sacm@ietf.org
Archived-At: <https://mailarchive.ietf.org/arch/msg/sacm/xubUSZX59r4qtqd7JXrKxUTmKx4>
Subject: Re: [sacm] [sacmwg/draft-ietf-sacm-terminology] Should SACM scope statements belong in the terminology draft? (#64)
X-BeenThere: sacm@ietf.org
X-Mailman-Version: 2.1.22
List-Id: SACM WG mail list <sacm.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sacm>, <mailto:sacm-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sacm/>
List-Post: <mailto:sacm@ietf.org>
List-Help: <mailto:sacm-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sacm>, <mailto:sacm-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Mar 2018 14:06:56 -0000

----==_mimepart_5abe447ce30cf_f3d3fe1decfef2c2595a3
Content-Type: text/plain;
 charset=UTF-8
Content-Transfer-Encoding: 7bit

I would propose that we remove "The SACM architecture and corresponding models focus on data in motion" from the definition of Data In Motion; I also proposed that we remove "In the context of SACM, data models for data at rest are out of scope" from the definition of Data At Rest.

-- 
You are receiving this because you are subscribed to this thread.
Reply to this email directly or view it on GitHub:
https://github.com/sacmwg/draft-ietf-sacm-terminology/issues/64#issuecomment-377531588
----==_mimepart_5abe447ce30cf_f3d3fe1decfef2c2595a3
Content-Type: text/html;
 charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<p>I would propose that we remove "The SACM architecture and correspondin=
g models focus on data in motion" from the definition of Data In Motion; =
I also proposed that we remove "In the context of SACM, data models for d=
ata at rest are out of scope" from the definition of Data At Rest.</p>

<p style=3D"font-size:small;-webkit-text-size-adjust:none;color:#666;">&m=
dash;<br />You are receiving this because you are subscribed to this thre=
ad.<br />Reply to this email directly, <a href=3D"https://github.com/sacm=
wg/draft-ietf-sacm-terminology/issues/64#issuecomment-377531588">view it =
on GitHub</a>, or <a href=3D"https://github.com/notifications/unsubscribe=
-auth/AKbE0c9vfCRrlfOOvpBmu0USyzNiPCuKks5tjjv8gaJpZM4Q8hiP">mute the thre=
ad</a>.<img src=3D"https://github.com/notifications/beacon/AKbE0XeEkRRDnR=
B8NUFBJWeQuyWo6Y_Uks5tjjv8gaJpZM4Q8hiP.gif" height=3D"1" width=3D"1" alt=3D=
"" /></p>
<div itemscope itemtype=3D"http://schema.org/EmailMessage">
<div itemprop=3D"action" itemscope itemtype=3D"http://schema.org/ViewActi=
on">
  <link itemprop=3D"url" href=3D"https://github.com/sacmwg/draft-ietf-sac=
m-terminology/issues/64#issuecomment-377531588"></link>
  <meta itemprop=3D"name" content=3D"View Issue"></meta>
</div>
<meta itemprop=3D"description" content=3D"View this Issue on GitHub"></me=
ta>
</div>

<script type=3D"application/json" data-scope=3D"inboxmarkup">{"api_versio=
n":"1.0","publisher":{"api_key":"05dde50f1d1a384dd78767c55493e4bb","name"=
:"GitHub"},"entity":{"external_key":"github/sacmwg/draft-ietf-sacm-termin=
ology","title":"sacmwg/draft-ietf-sacm-terminology","subtitle":"GitHub re=
pository","main_image_url":"https://cloud.githubusercontent.com/assets/14=
3418/17495839/a5054eac-5d88-11e6-95fc-7290892c7bb5.png","avatar_image_url=
":"https://cloud.githubusercontent.com/assets/143418/15842166/7c72db34-2c=
0b-11e6-9aed-b52498112777.png","action":{"name":"Open in GitHub","url":"h=
ttps://github.com/sacmwg/draft-ietf-sacm-terminology"}},"updates":{"snipp=
ets":[{"icon":"PERSON","message":"@adammontville in #64: I would propose =
that we remove \"The SACM architecture and corresponding models focus on =
data in motion\" from the definition of Data In Motion; I also proposed t=
hat we remove \"In the context of SACM, data models for data at rest are =
out of scope\" from the definition of Data At Rest."}],"action":{"name":"=
View Issue","url":"https://github.com/sacmwg/draft-ietf-sacm-terminology/=
issues/64#issuecomment-377531588"}}}</script>=

----==_mimepart_5abe447ce30cf_f3d3fe1decfef2c2595a3--

