Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

post IETF 114 BoF charter proposal #18

Merged
merged 28 commits into from
Sep 1, 2022
Merged

Conversation

henkbirkholz
Copy link
Member

No description provided.

ietf-scitt-charter.md Outdated Show resolved Hide resolved
@@ -4,6 +4,8 @@ Over the years, rapid technological advancements have motivated organizations to
While these improvements help organizations increase efficiency and swiftly bring innovations to market, the rapid increase in scale, size, and complexity of supply chains has led to more frequent and sophisticated supply chain attacks.
The traditional methods of safeguarding supply chains (e.g., pre- and post-audit methodologies) are no longer adequate.

Scitt forms a building block that will allow implemeters to compose complex supply chain integrity systems. For example, public computer interface system could report its software composition and that can be compared against known software compositions for such a device, recorded in a public ledger, thus providing an individual using the system with confidence that it will behave as expected, when expected, and nothing/nowhen else.

Problem Statement
=================
It is challenging to manage the compliance of products across end-to-end, global supply chains.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please update the problem statement to match the BOF Problem statement

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Will do in another PR

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Minor suggestion, please consider replacing "and nothing/nowhen else." WITH
"consistently, without deviation."

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Saving 1st comment in issue & adding 2nd comment via commit.

Signed-off-by: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
henkbirkholz and others added 8 commits August 24, 2022 14:05
Co-authored-by: Yogesh Deshpande <yogesh.deshpande@arm.com>
Co-authored-by: Yogesh Deshpande <yogesh.deshpande@arm.com>
Signed-off-by: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Signed-off-by: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Signed-off-by: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Signed-off-by: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Signed-off-by: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
@henkbirkholz henkbirkholz mentioned this pull request Aug 29, 2022
Copy link
Contributor

@knight-brian knight-brian left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@henkbirkholz, the updates look great. Thank you.

Copy link

@SteveLasker SteveLasker left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM to merge, with incremental changes as needed.

2. There are no APIs defined for automated publishing, retrieval, or independent verification of the information above.
3. The absence of decentralized, globally interoperable, transparent services to publish the supply chain data.
4. The lack of sufficient standards for independently verifying the presence of supply chain data in tamper-proof data stores.
5. Software consumers have no trustworthy way to verify that a software signature on a software package is legitimate.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Since there are many folks out there who will tell you, my PGP verification system works just fine and is plenty trustworthy, perhaps we could focus instead on closing the gap from a methodology perspective of how the attestations generated are consumed in a uniform way across environments to allow for easy adoption by any existing ecosystem whose current status may fall under bullet 5

Suggested change
5. Software consumers have no trustworthy way to verify that a software signature on a software package is legitimate.
5. Fractured verification methodologies across software distribution ecosystems create inconsistent security guarantees for end users.

Copy link

@johnandersen777 johnandersen777 Aug 29, 2022

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

(5) sounds related to @rjb4standards's comment made here: https://www.youtube.com/watch?v=6B8Bv0naAIA&t=1584s

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It seems we could preserve the existing 5 and add the proposed new 5 as 6 as they both provide justification for the purpose
+6. Fractured verification methodologies across software distribution ecosystems create inconsistent security guarantees for end users.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

As the "old" (5.) is a verbatim quote from Dick at the BoF and he is okay with the change, I am okay with the change. Was about to merge, but will give folks 12h to object.

Copy link

@rjb4standards rjb4standards Aug 30, 2022

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Henk, my suggestion is to keep the old 5 and add John's recommendation as 6. His recommendation is far broader and a bit more abstract - it's good stuff, but my comment was from an actual, pointed encounter in the wild where SCITT can help.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No they are not independent statements, but can be clubbed using OR

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So it should be joined using OR, either lacking verifying methods or fragmented verifying methods

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@yogeshbdeshpande they are certainly all within the same context of verification, but the new 6 is more abstract. Using an ice cream analogy, 6 is like saying "ice cream is made from dairy products and other ingredients", which is also true for a more direct, less abstract statement, like the current 5, i.e. Chocolate ice cream is made from whole milk, sugar and chocolate flavoring, which the supplier of the chocolate flavoring cannot be determined or verified.

Copy link
Collaborator

@yogeshbdeshpande yogeshbdeshpande Aug 30, 2022

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ok, in that case, we should really swap (5) and (6).
Reason been current (6) talks about SW distribution systems while current (5) talks about end user!

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

No objections to swapping 5 and 6, so that John's proposal becomes 5 and the original 5 becomes 6.

Copy link
Collaborator

@yogeshbdeshpande yogeshbdeshpande left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Left few minor edits for you to look and correct please!

In general looks good to me!

ietf-scitt-charter.md Outdated Show resolved Hide resolved
yogeshbdeshpande and others added 2 commits September 1, 2022 16:21
Co-authored-by: Henk Birkholz <henkbirkholz@users.noreply.github.com>
Copy link
Contributor

@OR13 OR13 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

All of my comments, have been resolved, I am ok with merging.

@yogeshbdeshpande yogeshbdeshpande merged commit 0d727aa into master Sep 1, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

9 participants