Skip to main content

Minutes interim-2023-scitt-05: Mon 16:00
minutes-interim-2023-scitt-05-202302061600-00

Meeting Minutes Supply Chain Integrity, Transparency, and Trust (scitt) WG
Date and time 2023-02-06 16:00
Title Minutes interim-2023-scitt-05: Mon 16:00
State Active
Other versions markdown
Last updated 2023-02-14

minutes-interim-2023-scitt-05-202302061600-00

SCITT Interim WG Meeting (02/06/2023)

Chair: Hannes Tschofenig and Jon Geater

Note taker: Kiran Karunakaran

Agenda Bash

Use Case Discussion: Open PR for Monty's FW use case
Receipt ID Discussion
Architecture/Terminology Discussion
Sigstore Discussion

Use Case Discussion:

Yogesh: 1st use (verification that signing cert is authorized by
supplier) has been simplified per feedback from last meeting
https://github.com/ietf-scitt/draft-birkholz-scitt-software-supply-chain-use-cases/

Ray: User identity should be an item for future meeting. Authentication
and validation of identity
Steve: There's different "types of identities" and the policy can
accept/decline types of specific identities. But, a focused convo on the
topic would be helpful
Orie: Identity Assurance Levels... see also
https://pages.nist.gov/800-63-3/
Henk: Would Joshua and Zack like to contribute (Sigstore) to use case
document?
Zack: Yes.Next week or so for a draft, plenty of time to review before
the meeting
Kay will work with Yogesh to review all the open issues on use cases
Jon: We need to lock down use case doc this week. That will give us time
to work on architecure ID before IETF116. ID submission cut-off deadline
is in just 5 weeks (2023-03-13).
Henk: At the moment, these are living documents and we need to get them
to a stable version before publishing it.
Yogesh: Issue #19 and #20 are minor changes. Overuse of term trust
(Issue #14) needs to be cleaned out
Kay: Kay will open a PR to clean up the doc. Only use the term trust in
relevant and appropriate places. There are couple of 'trust
relationship' and 'trust bond' that needs to be modified
Ray: Build trust through evidence. Even a financial trust, like a trust
deed, is backed by interest in the property. No blind trust- Trust is
built via solid evidence.
Neal: +1 to avoiding murky terms like "trust relationship" and "trust
bond".
Dick: Trust is in the name of our group SCITT
Steve: I agree Trust is a good term to keep.Trust is established through
the policy and the verification of the identity through the notary
portion of the policy. Trust is also established through a verified
identity
Jon: +1 the evidence is your raw material from which to build trust.
SCITT doesn't itself GIVE trust. It ENABLES it. Deeper, richer
reputations
Neal: So re the phrasing in the document, I don't think we are creating
a "standardized way" to "manage trust relationships". We are
standardizing ways to manage the evidence via which relying parties can
use to develop and manage their own trust relationships in whatever ways
they do
Kay and Yogesh will work through the issues this week and close them out

Architecture,Receipt and Termonology Discussion:

Henk: Build a generic COSE profile (various Merkle tree) instead of
building it specific for SCITT. We'll have a draft to review soon.

Sigstore Discussion:

Neal: Re: sigstore. I missed the 01-23 SCITT meeting, but I think they
provide an excellent substratum for our work. as As I commented in the
video (https://youtu.be/nZHfOFN-Q7A), many in SCITT WG seem interested
in baking some policies in to the infrastructure. I'm wondering what the
options are for layering policies and well-known CA or auditor
identities on top of Sigstore to vouch for policy compliance and address
all the SCITT use cases.
Ray: Sigstore misses the larger view but does well for individual
pipelines and repos. Identity problem and additional layering need to be
resolved.There has to be levels of identification
Orie: https://datatracker.ietf.org/doc/draft-ietf-uta-rfc6125bis/
concept of identity (people vs service)
Hannes: We'll have OAuth co-chair come to SCITT interim WG meeting to
talk about identity