IETF 116 Reminders: Childcare, Standard Registration Deadline and General Information

2023-02-27 Thread IETF Secretariat
IETF 116 Childcare 

Through the generosity of our Gold Diversity and Inclusion sponsors,  Akamai, 
Cisco and Huawei, and Bronze sponsors Comcast, ICANN, and Identity Digital, we 
are happy to offer complimentary childcare services  at IETF 116 in Yokohama. 

We have not yet received any sign ups for the childcare service. If you are 
planning to utilize this offering, please sign up as soon as possible; if we do 
not receive advance registrations for childcare, we will  look at reducing 
coverage for the Rose Event Nanny care staff. Additional information and the 
form to sign up can be found on the IETF 116 Childcare page, linked below.

https://www.ietf.org/how/meetings/116/childcare/


Standard Registration Deadline

The deadline for standard registration is March 13, 2023 UTC 23:59. Be sure to 
register before the deadline passes! Fees for the weekly rate are outlined 
below.

Standard Registration Week Rates:
Onsite Early-Bird Registration: USD 875, if paid in full prior to 23:59 UTC 
2023-03-13
Remote Early-Bird Registration: USD 280, if paid in full prior to 23:59 UTC 
2023-03-13

NOTE: Payment is required at the time of registration. The Standard 
registration fee is available until March 13 at UTC 23:59. After March 13  at 
UTC 23:59, the registration fees will increase. 

Register online at: https://registration.ietf.org/116/

General Information

When booking your hotel, please be aware that the Intercontinental Yokohama 
Grand (the primary IETF hotel) is a ten minute walk from the meeting venue, 
PACIFICO Yokohama North. This meeting venue is different from the venue for 
IETF 94. Please refer to the map linked below for more information.
https://www.google.com/maps/d/u/0/viewer?mid=1bfjk4dz0vxG6jcixJkqaaV_pcA90L4c&ll=35.45612263743427%2C139.63493745&z=14


The IETF 116 Welcome Reception will take place over three hours (versus the 
typical two) from 1700-2000 on Sunday, March 26th at the PACIFICO Yokohama 
North. Featuring a number of demonstrations from WIDE members, the reception 
will also include more robust food and beverage options. 

The IETF 116 social event will take place on Thursday, March 30th. Please note 
the day change, as social events are typically held on Tuesdays of the meeting 
week. Thanks to our host WIDE, we are excited to announce that our social will 
be held at the Osanbashi Hall. Tickets are currently on sale with only a 
handful left. Purchase yours through your attendee dashboard.

https://registration.ietf.org/116/attendee-dashboard/

___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: (Discovering and Retrieving Software Transparency and Vulnerability Information) to Proposed Standard

2023-02-27 Thread The IESG


The IESG has received a request from the Operations and Management Area
Working Group WG (opsawg) to consider the following document: - 'Discovering
and Retrieving Software Transparency and Vulnerability
   Information'
   as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2023-03-13. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   To improve cybersecurity posture, automation is necessary to locate
   what software is running on a device, whether that software has known
   vulnerabilities, and what, if any recommendations suppliers may have.
   This memo extends the MUD YANG model to provide the locations of
   software bills of materials (SBOMS) and to vulnerability information.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-opsawg-sbom-access/



No IPR declarations have been submitted directly on this I-D.





___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce


Last Call: (Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)) to Informational RFC

2023-02-27 Thread The IESG


The IESG has received a request from the EAP Method Update WG (emu) to
consider the following document: - 'Forward Secrecy for the Extensible
Authentication Protocol Method for
   Authentication and Key Agreement (EAP-AKA' FS)'
   as Informational RFC

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
last-c...@ietf.org mailing lists by 2023-03-13. Exceptionally, comments may
be sent to i...@ietf.org instead. In either case, please retain the beginning
of the Subject line to allow automated sorting.

Abstract


   Many different attacks have been reported as part of revelations
   associated with pervasive surveillance.  Some of the reported attacks
   involved compromising the smart card supply chain, such as attacking
   SIM card manufacturers and operators in an effort to compromise
   shared secrets stored on these cards.  Since the publication of those
   reports, manufacturing and provisioning processes have gained much
   scrutiny and have improved.  However, the danger of resourceful
   attackers for these systems is still a concern.  Always assuming
   breach such as key compromise and minimizing the impact of breach are
   essential zero-trust principles.

   This specification updates RFC 9048, the improved Extensible
   Authentication Protocol Method for 3GPP Mobile Network Authentication
   and Key Agreement (EAP-AKA'), with an optional extension.  Similarly,
   this specification also updates the earlier version of the EAP-AKA'
   specification in RFC 5448.  The extension, when negotiated, provides
   Forward Secrecy for the session key generated as a part of the
   authentication run in EAP-AKA'.  This prevents an attacker who has
   gained access to the long-term pre-shared secret in a Subscriber
   Identity Module (SIM) card from being able to decrypt any past
   communications.  In addition, if the attacker stays merely a passive
   eavesdropper, the extension prevents attacks against future sessions.
   This forces attackers to use active attacks instead.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-emu-aka-pfs/


The following IPR Declarations may be related to this I-D:

   https://datatracker.ietf.org/ipr/3097/
   https://datatracker.ietf.org/ipr/3098/






___
IETF-Announce mailing list
IETF-Announce@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-announce