> -----Original Message-----
> From: [EMAIL PROTECTED] 
> [mailto:[EMAIL PROTECTED] On Behalf Of 
> Stephen Kent
> Sent: Thursday, August 16, 2007 9:21 AM
> To: Cat Okita
> Cc: ietf-trust-anchor@vpnc.org
> Subject: RE: Issue with the requirements document: 
> PKIX-centric terminology
> 
> 
> At 10:28 PM -0400 8/14/07, Cat Okita wrote:
> >On Fri, 10 Aug 2007, Stephen Kent wrote:
> >>I think we should make decisions about what work to do in the IETF 
> >>based on who participates in the IETF work, not based on who we 
> >>believe may benefit.
> >
> >I think this is the attitude that leads many people to 
> believe that the 
> >IETF is a pointless waste of time.
> >
> >My understanding was that the goals of the IETF include 
> producing well 
> >considered and designed protocols that are a benefit to all, and 
> >readily used by all, not a group of inbred pedants intent 
> only on self-gratification.
> >
> >cheers!
> 
> A great many folks who are not part of the IETF process 
> benefit from the standards we generate. However, unless folks 
> actively participate in the process, there is no way to 
> ensure that external constituencies are well represented.  
> Moreover, someone who claims to represent such a constituency 
> is not intrinsically credible. Thus when we decide the scope 
> of work for a WG, it is common to make decisions based on who 
> chooses to contribute, and to focus on the IETF context. For 
> example, the IETF does not develop security standards 
> targeting the LAN environment unless the IEEE asks us to do so.
> 
> A closer to home example arises in the message Thomas sent recently. 
> He gave several good examples of uses cases for TAM.  
> Included in his list was the TCM context (use case #2) and 
> mobile phones (UC #4). 
> The TCM case might be problematic because the TCG defines how 
> TCMs work and TCG is a closed group (one has to pay a fee and 
> sign an HDA to be a member.)  So, only if all of the relevant 
> documents from TCG are publicly available could we reasonably 
> address this use case. 
> (Having Thomas as a contributor helps since he is the editor 
> of one or more TCG documents that deal with this area!)  The 
> mobile phone use case is likely to be more problematic, as I 
> believe there are no public standards for ALL mobile phones 
> re managing signed code validation, etc.  It may not make 
> sense for us to try to address problems in areas where the 
> IETF has no standing, where there are no public standards, etc.
> 
> Steve


Thanks Steve.

In my several years experience with the TCG, the TCG community typically
prefers to use existing standards from other bodies/organizations like
the IETF and Oasis (instead of re-inventing the wheel).

This is why the TCG several years ago decided on the X.509 standard for
the TPM-related certificates and profiles. Most (if not all) of the
relevant documents for UC#2 are now published documents (available at
the TCG website, under the Specs tab). No need to sign/enter anything to
download :)

In the mobile phone/carrier community, I believe that the Open Mobile
Alliance (OMA) and 3GPP also uses X.509.


/thomas/






Reply via email to