IETF 116 Reminders: Childcare, Standard Registration Deadline and General Information
IETF 116 Childcare Through the generosity of our Gold Diversity and Inclusion sponsors, Akamai, Cisco and Huawei, and Bronze sponsors Comcast, ICANN, and Identity Digital, we are happy to offer complimentary childcare services at IETF 116 in Yokohama. We have not yet received any sign ups for the childcare service. If you are planning to utilize this offering, please sign up as soon as possible; if we do not receive advance registrations for childcare, we will look at reducing coverage for the Rose Event Nanny care staff. Additional information and the form to sign up can be found on the IETF 116 Childcare page, linked below. https://www.ietf.org/how/meetings/116/childcare/ Standard Registration Deadline The deadline for standard registration is March 13, 2023 UTC 23:59. Be sure to register before the deadline passes! Fees for the weekly rate are outlined below. Standard Registration Week Rates: Onsite Early-Bird Registration: USD 875, if paid in full prior to 23:59 UTC 2023-03-13 Remote Early-Bird Registration: USD 280, if paid in full prior to 23:59 UTC 2023-03-13 NOTE: Payment is required at the time of registration. The Standard registration fee is available until March 13 at UTC 23:59. After March 13 at UTC 23:59, the registration fees will increase. Register online at: https://registration.ietf.org/116/ General Information When booking your hotel, please be aware that the Intercontinental Yokohama Grand (the primary IETF hotel) is a ten minute walk from the meeting venue, PACIFICO Yokohama North. This meeting venue is different from the venue for IETF 94. Please refer to the map linked below for more information. https://www.google.com/maps/d/u/0/viewer?mid=1bfjk4dz0vxG6jcixJkqaaV_pcA90L4c&ll=35.45612263743427%2C139.63493745&z=14 The IETF 116 Welcome Reception will take place over three hours (versus the typical two) from 1700-2000 on Sunday, March 26th at the PACIFICO Yokohama North. Featuring a number of demonstrations from WIDE members, the reception will also include more robust food and beverage options. The IETF 116 social event will take place on Thursday, March 30th. Please note the day change, as social events are typically held on Tuesdays of the meeting week. Thanks to our host WIDE, we are excited to announce that our social will be held at the Osanbashi Hall. Tickets are currently on sale with only a handful left. Purchase yours through your attendee dashboard. https://registration.ietf.org/116/attendee-dashboard/ ___ IETF-Announce mailing list IETF-Announce@ietf.org https://www.ietf.org/mailman/listinfo/ietf-announce
Last Call: (Discovering and Retrieving Software Transparency and Vulnerability Information) to Proposed Standard
The IESG has received a request from the Operations and Management Area Working Group WG (opsawg) to consider the following document: - 'Discovering and Retrieving Software Transparency and Vulnerability Information' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-c...@ietf.org mailing lists by 2023-03-13. Exceptionally, comments may be sent to i...@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract To improve cybersecurity posture, automation is necessary to locate what software is running on a device, whether that software has known vulnerabilities, and what, if any recommendations suppliers may have. This memo extends the MUD YANG model to provide the locations of software bills of materials (SBOMS) and to vulnerability information. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-opsawg-sbom-access/ No IPR declarations have been submitted directly on this I-D. ___ IETF-Announce mailing list IETF-Announce@ietf.org https://www.ietf.org/mailman/listinfo/ietf-announce
Last Call: (Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)) to Informational RFC
The IESG has received a request from the EAP Method Update WG (emu) to consider the following document: - 'Forward Secrecy for the Extensible Authentication Protocol Method for Authentication and Key Agreement (EAP-AKA' FS)' as Informational RFC The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-c...@ietf.org mailing lists by 2023-03-13. Exceptionally, comments may be sent to i...@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract Many different attacks have been reported as part of revelations associated with pervasive surveillance. Some of the reported attacks involved compromising the smart card supply chain, such as attacking SIM card manufacturers and operators in an effort to compromise shared secrets stored on these cards. Since the publication of those reports, manufacturing and provisioning processes have gained much scrutiny and have improved. However, the danger of resourceful attackers for these systems is still a concern. Always assuming breach such as key compromise and minimizing the impact of breach are essential zero-trust principles. This specification updates RFC 9048, the improved Extensible Authentication Protocol Method for 3GPP Mobile Network Authentication and Key Agreement (EAP-AKA'), with an optional extension. Similarly, this specification also updates the earlier version of the EAP-AKA' specification in RFC 5448. The extension, when negotiated, provides Forward Secrecy for the session key generated as a part of the authentication run in EAP-AKA'. This prevents an attacker who has gained access to the long-term pre-shared secret in a Subscriber Identity Module (SIM) card from being able to decrypt any past communications. In addition, if the attacker stays merely a passive eavesdropper, the extension prevents attacks against future sessions. This forces attackers to use active attacks instead. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-emu-aka-pfs/ The following IPR Declarations may be related to this I-D: https://datatracker.ietf.org/ipr/3097/ https://datatracker.ietf.org/ipr/3098/ ___ IETF-Announce mailing list IETF-Announce@ietf.org https://www.ietf.org/mailman/listinfo/ietf-announce