attachment
<div dir="ltr"><div>Hi Alan,</div><div><br></div><div>[clarified wording of three ESRs from today's IDS WG discussion]</div><div><br></div><div><br></div><div>Per Gerry and Graydon's comments, change 3.b.i. from:</div><div><br></div><div>
HCD shall verify the integrity of initial boot, operating system, and application software/firmware. <br></div><div><br></div><div>to:</div><div><br></div><div>
HCD shall verify the hardware-anchored integrity of firmware/software,<br></div><div>including initial boot, operating system, and applications. <br></div><div><br></div><div>(delete both 3.a.ii. roots of trust and 3a.iii. secure boot ESRs)</div><div><br></div><div><br></div><div>Per Bill's comments, change second 4.a. from:</div><div><br></div><div>
<span><span style="font:7pt "Times New Roman""></span></span>(Conditionally
mandatory) Regardless embedded or Field-Replaceable, the nonvolatile
storage device should be encrypted to protect the document data and/or
HCD critical data. <br></div><div><br></div><div>to:</div><div><br></div><div>
<span><span style="font:7pt "Times New Roman""></span></span>(Conditionally
mandatory) If nonvolatile storage is present, then the nonvolatile
storage device (either embedded or Field-Replaceable) should be encrypted to protect the document data and/or
HCD critical data. <br></div><div><br></div><div>(revised to make the "condition" the prefix of the sentence)<br></div><div>Per today's discussion, change 4.c. from:</div><div><br></div><div>
Do
not store the encryption keys as a plaintext-form, obfuscated-form,
encoded-form or another obscure way. To protect these keys, HCD WG
strongly recommends using the dedicated security component such as TPM,
security element, or USB thumb drive.
</div><div><br></div><div>to:</div><div><br></div><div>
<div>Do
not store encryption keys in a plaintext-form, obfuscated-form,
encoded-form or another obscure way. To protect these encryption keys, HCD WG <br></div><div>strongly recommends using the dedicated security component such as a TCG TPM or Global Platform Secure Element. <br></div><div><br></div><div>(delete reference to the completely unsafe use of a USB stick for key storage</div><div></div><div>because, even when encrypted, the USB interface itself is unsafe and has</div><div>been hacked often, including embedded malware from nation-states)<br></div>
</div><div><br></div><div><br></div><div>All - any further comments?</div><div><br></div><div>Cheers,</div><div>- Ira</div><div><br></div><div><div><div dir="ltr" class="gmail_signature" data-smartmail="gmail_signature"><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr"><div><div dir="ltr">Ira McDonald (Musician / Software Architect)<br>Co-Chair - TCG Trusted Mobility Solutions WG</div><div>Co-Chair - TCG Metadata Access Protocol SG<br></div><div dir="ltr">Chair - Linux Foundation Open Printing WG<br>Secretary - IEEE-ISTO Printer Working Group<br>Co-Chair - IEEE-ISTO PWG Internet Printing Protocol WG<br>IETF Designated Expert - IPP & Printer MIB<br>Blue Roof Music / High North Inc<br><a style="color:rgb(51,51,255)" href="http://sites.google.com/site/blueroofmusic" target="_blank">http://sites.google.com/site/blueroofmusic</a><br><a style="color:rgb(102,0,204)" href="http://sites.google.com/site/highnorthinc" target="_blank">http://sites.google.com/site/highnorthinc</a><br>mailto: <a href="mailto:blueroofmusic@gmail.com" target="_blank">blueroofmusic@gmail.com</a><br>PO Box 221 Grand Marais, MI 49839 906-494-2434<br><br><div style="display:inline"></div><div style="display:inline"></div><div style="display:inline"></div><div></div><div></div><div></div><div></div></div></div></div></div></div></div></div></div></div></div></div>