[{"author": "Warren Kumari", "text": "
Please send MIC if you want something relayed to the mic (vs just general snark and chatting)
", "time": "2022-11-08T13:00:08Z"}, {"author": "Behcet Sarikaya", "text": "To Michael, why is this supply chain issue?
", "time": "2022-11-08T13:16:20Z"}, {"author": "Olle Johansson", "text": "I think that these kind of documents are important and useful
", "time": "2022-11-08T13:30:05Z"}, {"author": "Behcet Sarikaya", "text": "still more work to do
", "time": "2022-11-08T13:31:17Z"}, {"author": "Olle Johansson", "text": "One can not assume that it will ever be done, it is a process
", "time": "2022-11-08T13:31:57Z"}, {"author": "Matthew Gillmore", "text": "The scope does not seem clear to me. That is why I didn't raise my hand.
", "time": "2022-11-08T13:33:09Z"}, {"author": "Matthew Gillmore", "text": "I'll raise further questions on the list
", "time": "2022-11-08T13:36:18Z"}, {"author": "Adnan Rashid", "text": "It's still broad scope
", "time": "2022-11-08T13:36:19Z"}, {"author": "Behcet Sarikaya", "text": "PoA onboarding could take long time, all application layer heavy operations
", "time": "2022-11-08T13:43:12Z"}, {"author": "Behcet Sarikaya", "text": "I saw RSA SHA, wow!
", "time": "2022-11-08T13:45:41Z"}, {"author": "Olle Johansson", "text": "Too far from the mic
", "time": "2022-11-08T13:47:46Z"}, {"author": "Matthew Gillmore", "text": "+1
", "time": "2022-11-08T13:49:16Z"}, {"author": "Behcet Sarikaya", "text": "Maybe it is OATH, similar
", "time": "2022-11-08T13:49:28Z"}, {"author": "Ville Hallivuori", "text": "Why base64 encode hash inputs? Surely it accepts binary?
", "time": "2022-11-08T13:50:10Z"}, {"author": "Behcet Sarikaya", "text": "to Henk: maybe this draft should go to OAth WG?
", "time": "2022-11-08T13:50:36Z"}, {"author": "Brendan Moran", "text": "I don't want to distract from other discussion, but I will also say \"please no JSON in IoT\"
", "time": "2022-11-08T13:52:34Z"}, {"author": "Matthew Gillmore", "text": "+1 to Michael's comment about re-inventing the wheel
", "time": "2022-11-08T13:56:43Z"}, {"author": "Behcet Sarikaya", "text": "onboarding is a step before bootstrapping
", "time": "2022-11-08T13:58:55Z"}, {"author": "Behcet Sarikaya", "text": "Thanks Michael for clarifying
", "time": "2022-11-08T13:59:26Z"}, {"author": "Brendan Moran", "text": "I think that for PoA Onboarding, the best answer for revocation is probably a let's encrypt-style model: 1-day tokens. When they expire, they're no longer usable. That way you don't need revocation; you just don't renew.
", "time": "2022-11-08T14:01:37Z"}, {"author": "Warren Kumari", "text": "... unfortunately I have to drop for another meeting...
", "time": "2022-11-08T14:11:26Z"}, {"author": "Henk Birkholz", "text": "bye Warren!
", "time": "2022-11-08T14:12:29Z"}, {"author": "Henk Birkholz", "text": "thx for minutes!
", "time": "2022-11-08T14:12:33Z"}, {"author": "Matthew Gillmore", "text": "Could this attestation be abstracted about TLS? For example DTLS over UDP
", "time": "2022-11-08T14:15:08Z"}, {"author": "Matthew Gillmore", "text": "*not about.... from
", "time": "2022-11-08T14:17:32Z"}, {"author": "Henk Birkholz", "text": "@Matthew, I'd assume so
", "time": "2022-11-08T14:18:54Z"}, {"author": "Brendan Moran", "text": "I thought the point of long-running DTLS connections was to avoid performing public key operations. Attestation requires public key operations. At the end of the day, you might as well re-establish the session.
", "time": "2022-11-08T14:21:06Z"}, {"author": "Behcet Sarikaya", "text": "@Carsten Bormann I support it lets do it
", "time": "2022-11-08T14:27:05Z"}, {"author": "Matthew Gillmore", "text": "+1 to the AD's comments about closing LWIG
", "time": "2022-11-08T14:28:59Z"}, {"author": "Behcet Sarikaya", "text": "strong support
", "time": "2022-11-08T14:31:14Z"}]