[{"author": "Warren Kumari", "text": "

Please send MIC if you want something relayed to the mic (vs just general snark and chatting)

", "time": "2022-11-08T13:00:08Z"}, {"author": "Behcet Sarikaya", "text": "

To Michael, why is this supply chain issue?

", "time": "2022-11-08T13:16:20Z"}, {"author": "Olle Johansson", "text": "

I think that these kind of documents are important and useful

", "time": "2022-11-08T13:30:05Z"}, {"author": "Behcet Sarikaya", "text": "

still more work to do

", "time": "2022-11-08T13:31:17Z"}, {"author": "Olle Johansson", "text": "

One can not assume that it will ever be done, it is a process

", "time": "2022-11-08T13:31:57Z"}, {"author": "Matthew Gillmore", "text": "

The scope does not seem clear to me. That is why I didn't raise my hand.

", "time": "2022-11-08T13:33:09Z"}, {"author": "Matthew Gillmore", "text": "

I'll raise further questions on the list

", "time": "2022-11-08T13:36:18Z"}, {"author": "Adnan Rashid", "text": "

It's still broad scope

", "time": "2022-11-08T13:36:19Z"}, {"author": "Behcet Sarikaya", "text": "

PoA onboarding could take long time, all application layer heavy operations

", "time": "2022-11-08T13:43:12Z"}, {"author": "Behcet Sarikaya", "text": "

I saw RSA SHA, wow!

", "time": "2022-11-08T13:45:41Z"}, {"author": "Olle Johansson", "text": "

Too far from the mic

", "time": "2022-11-08T13:47:46Z"}, {"author": "Matthew Gillmore", "text": "

+1

", "time": "2022-11-08T13:49:16Z"}, {"author": "Behcet Sarikaya", "text": "

Maybe it is OATH, similar

", "time": "2022-11-08T13:49:28Z"}, {"author": "Ville Hallivuori", "text": "

Why base64 encode hash inputs? Surely it accepts binary?

", "time": "2022-11-08T13:50:10Z"}, {"author": "Behcet Sarikaya", "text": "

to Henk: maybe this draft should go to OAth WG?

", "time": "2022-11-08T13:50:36Z"}, {"author": "Brendan Moran", "text": "

I don't want to distract from other discussion, but I will also say \"please no JSON in IoT\"

", "time": "2022-11-08T13:52:34Z"}, {"author": "Matthew Gillmore", "text": "

+1 to Michael's comment about re-inventing the wheel

", "time": "2022-11-08T13:56:43Z"}, {"author": "Behcet Sarikaya", "text": "

onboarding is a step before bootstrapping

", "time": "2022-11-08T13:58:55Z"}, {"author": "Behcet Sarikaya", "text": "

Thanks Michael for clarifying

", "time": "2022-11-08T13:59:26Z"}, {"author": "Brendan Moran", "text": "

I think that for PoA Onboarding, the best answer for revocation is probably a let's encrypt-style model: 1-day tokens. When they expire, they're no longer usable. That way you don't need revocation; you just don't renew.

", "time": "2022-11-08T14:01:37Z"}, {"author": "Warren Kumari", "text": "

... unfortunately I have to drop for another meeting...

", "time": "2022-11-08T14:11:26Z"}, {"author": "Henk Birkholz", "text": "

bye Warren!

", "time": "2022-11-08T14:12:29Z"}, {"author": "Henk Birkholz", "text": "

thx for minutes!

", "time": "2022-11-08T14:12:33Z"}, {"author": "Matthew Gillmore", "text": "

Could this attestation be abstracted about TLS? For example DTLS over UDP

", "time": "2022-11-08T14:15:08Z"}, {"author": "Matthew Gillmore", "text": "

*not about.... from

", "time": "2022-11-08T14:17:32Z"}, {"author": "Henk Birkholz", "text": "

@Matthew, I'd assume so

", "time": "2022-11-08T14:18:54Z"}, {"author": "Brendan Moran", "text": "

I thought the point of long-running DTLS connections was to avoid performing public key operations. Attestation requires public key operations. At the end of the day, you might as well re-establish the session.

", "time": "2022-11-08T14:21:06Z"}, {"author": "Behcet Sarikaya", "text": "

@Carsten Bormann I support it lets do it

", "time": "2022-11-08T14:27:05Z"}, {"author": "Matthew Gillmore", "text": "

+1 to the AD's comments about closing LWIG

", "time": "2022-11-08T14:28:59Z"}, {"author": "Behcet Sarikaya", "text": "

strong support

", "time": "2022-11-08T14:31:14Z"}]