Tuesday, 5 November 2013: 1300-1400 10m Chairs/Administrivia 20m Problem statement - Jon Peterson http://datatracker.ietf.org/doc/draft-ietf-stir-problem-statement/ draft-ietf-stir-problem-statement-00.txt 30m Threats - Jon Peterson http://datatracker.ietf.org/doc/draft-ietf-stir-threats/ draft-ietf-stir-threats-00.txt Wednesday, 6 November 2013, 1550-1720 5m Administrivia 25m Constraints on signature construction and validation: Jon Peterson - what fields are included in the signature? - should that list be configurable? 40m Credential Acquisition: Jon Peterson and Hadriel Kaplan - how can signers and verifiers obtain the appropriate credentials? - what does a verifier need to access credentials (a number, a number range, some other hint)? - is access to the credentials public or private? - are credentials associated with a single number, a range, or an arbitrary set? 20m Gatewaying: Hadriel Kaplan - what constraints do we have on signature construction so that the signature is likely to survive transition through other protocols (can we build something that can be passed through UUI?) Reading for the second session: http://datatracker.ietf.org/doc/draft-kaplan-stir-cider/ (draft-kaplan-stir-cider-00.txt) http://datatracker.ietf.org/doc/draft-kaplan-stir-ikes-out/ (draft-kaplan-stir-ikes-out-00.txt) http://datatracker.ietf.org/doc/draft-jennings-stir-rfc4474bis/ (draft-jennings-stir-rfc4474bis-00.txt) http://datatracker.ietf.org/doc/draft-rescorla-stir-fallback/ (draft-rescorla-stir-fallback-00.txt)