+1 non-binding. Thanks Flavio!
On Wed, Dec 16, 2015 at 9:42 AM, Flavio Junqueira <f...@apache.org> wrote: > +1 binding. > > Great project, good luck. > > -Flavio > > > On 15 Dec 2015, at 21:27, Tom Barber <magicaltr...@apache.org> wrote: > > > > +1 binding > > > > > > On Tue, Dec 15, 2015 at 6:30 PM, Sterling Hughes < > > sterling.hughes.pub...@gmail.com> wrote: > > > >> +1 binding > >> > >>> On Dec 15, 2015, at 7:51 AM, Colm O hEigeartaigh <cohei...@apache.org> > >> wrote: > >>> > >>> +1 (binding) > >>> > >>> Colm. > >>> > >>> On Tue, Dec 15, 2015 at 10:56 AM, Jean-Baptiste Onofré < > j...@nanthrax.net> > >>> wrote: > >>> > >>>> +1 (binding) > >>>> > >>>> Regards > >>>> JB > >>>> > >>>> > >>>>> On 12/15/2015 09:56 AM, Nick Kew wrote: > >>>>> > >>>>> I should like to call a vote to accept Milagro into > >>>>> the Incubator. The full proposal is available at > >>>>> https://wiki.apache.org/incubator/MilagroProposal > >>>>> as well as below. > >>>>> > >>>>> Note that the project was first discussed here under > >>>>> the name OpenMiracl. The adoption of the Milagro name > >>>>> is a response to that discussion. > >>>>> > >>>>> [ ] +1 Accept Milagro into the Apache Incubator > >>>>> [ ] 0 > >>>>> [ ] -1 Do not accept Milagro into the Apache Incubator ... > >>>>> > >>>>> The vote remains open until at least the end of the week. > >>>>> > >>>>> For myself: > >>>>> [*] +1 Accept Milagro into the Apache Incubator > >>>>> > >>>>> > >>>>> = Project Proposal: Milagro = > >>>>> == Abstract == > >>>>> Milagro is a distributed cryptosystem for cloud computing. Its > purpose > >>>>> is to provide an open source alternative to proprietary key > management > >>>>> and certificate backed cryptosystems used for secure communication > and > >>>>> authentication. The adoption of Milagro will create a secure, free, > >> open > >>>>> source alternative to monolithic certificate authorities and > eliminate > >>>>> single points of failure. > >>>>> > >>>>> == Background == > >>>>> The Cloud Computing industry is using 40-year-old cryptographic > >>>>> algorithms and infrastructure, invented for a different era when > >>>>> client-server computing was the dominant paradigm. At the heart of > it, > >>>>> is the continued reliance on outdated, and problematic, monolithic > >>>>> cryptographic trust hierarchies such as commercial certificate > >>>>> authorities. > >>>>> > >>>>> A number of factors are aligning to make this the right time to bring > >>>>> forth an alternative to the Internet's continued reliance on PKI. > >>>>> > >>>>> The Cloud Infrastructure as a Service (IaaS) industry as a whole > >>>>> encounters friction bringing the largest customers in regulated > >>>>> industries onto their platforms because issues of cryptographic > trust, > >>>>> data residency, and data governance prevent total adoption among > >>>>> regulated industries. > >>>>> > >>>>> Devops teams tasked with running an IaaS provider's datacenter > >>>>> automation encounter challenges scaling and automating data center > >>>>> operations when confronted with the complexities of running > encryption, > >>>>> certificate and key management infrastructures built for a > >> client-server > >>>>> era. > >>>>> > >>>>> Enterprises in regulated industries find challenges to transform > >>>>> entirely into digital businesses because the economics of cloud > >>>>> computing are unavailable to them. > >>>>> > >>>>> Despite the astounding growth of cloud infrastructure as a service > >>>>> platforms over the last few years, full adoption by organizations > with > >>>>> stringent data security requirements won’t be achieved until these > >>>>> fundamental capability issues get resolved. > >>>>> > >>>>> Lastly, the Internet as a whole is suffering from an erosion of trust > >>>>> following incidents with commercial certificate authorities industry, > >>>>> i.e., compromised root keys, and failures in due diligence issuing > real > >>>>> domain certificates. > >>>>> > >>>>> Indeed, mass surveillance, a lack of easy end-user encryption, a > >> growing > >>>>> demand for key escrow under legal oversight, and general certificate > >>>>> authority security concerns create the question: How appropriate is > the > >>>>> continued dependency on PKI when the goal is to advance the benefits > of > >>>>> cloud computing across the technology landscape? > >>>>> > >>>>> Netcraft is the industry standard for monitoring Active TLS > >>>>> certificates. In May 2015, they stated that “Although the global > [TLS] > >>>>> ecosystem is competitive, it is dominated by a handful of major CAs — > >>>>> three certificate authorities (Symantec, Comodo, Godaddy) account for > >>>>> three-quarters of all issued [TLS] certificates on public-facing web > >>>>> servers.” > >>>>> > >>>>> The Internet Security Research Group's (ISRG) "Let's Encrypt" > >> initiative > >>>>> aims to make Secure Sockets Layer/Transport Layer Security (SSL/TLS) > >>>>> certificates available for free in an automated fashion. This a step > in > >>>>> the right direction, in that it removes the risk of profit before > >>>>> ethics. The real issue, which is one entity acts as a monolithic > trust > >>>>> hierarchy, is not addressed. The monolithic trust hierarchy is a > >>>>> fundamental design flaw within PKI itself. > >>>>> > >>>>> The rate of attacks against certificate authorities seems to be > >>>>> [increasing](http://wiki.cacert.org/Risk/History) as the obvious > >> single > >>>>> point of compromise design inherent to PKI is becoming a more popular > >>>>> route to carry out attacks. > >>>>> > >>>>> == Proposal == > >>>>> Milagro is an open source, pairing-based cryptographic platform to > >> solve > >>>>> key management, secure communications, data governance and compliance > >>>>> issues that are challenging Cloud Providers and their customers. > >>>>> > >>>>> It does this without the need for certificate authorities, putting > into > >>>>> place a new category of service providers called Distributed Trust > >>>>> Authorities (D-TA's). > >>>>> > >>>>> The M-Pin protocol, and its existing open-source MIRACL > implementation > >>>>> on which Milagro will build, are already in use by Experian, NTT, > Odin, > >>>>> Gov.UK and are being rolled out at scale for zero password > multi-factor > >>>>> authentication and certificate-less HTTPS / secure channel. > >>>>> > >>>>> It is proposed that Milagro enter incubation at Apache. At the same > >>>>> time, a draft standard for M-Pin has been prepared and recently > >>>>> submitted to IETF. The standards process at IETF and the platform > >>>>> implementation at Apache will run in parallel. > >>>>> > >>>>> === Why Pairing-Based Cryptography, why now? === > >>>>> Over the last decade, pairings on elliptic curves have been a very > >>>>> active area of research in cryptography. Pairings map pairs of points > >> on > >>>>> an elliptic curve into the multiplicative group of a finite field. > >> Their > >>>>> unique properties have enabled many new cryptographic protocols that > >> had > >>>>> not previously been feasible. > >>>>> > >>>>> Standards bodies have already begun standardizing various > pairing-based > >>>>> schemes. These include the IEEE, ISO, and IETF. Besides > identity-based > >>>>> encryption (IBE), the standardized schemes include identity-based > >>>>> signatures, identity-based signcryption, identity-based key > >>>>> establishment mechanisms, and identity-based key distribution for use > >> in > >>>>> multimedia. > >>>>> > >>>>> NIST has also recommended the standardization and adoption of > >>>>> pairing-based cryptographic systems __for government agencies__. In > the > >>>>> NIST "Report on Pairing-based Cryptography" issued in February 2015, > >>>>> they state: > >>>>> > >>>>> "It has been a decade since the first IBE schemes were proposed. > These > >>>>> schemes have received sufficient attention from the cryptographic > >>>>> community and no weakness has been identified. IBE is being used > >>>>> commercially, primarily by Voltage Security and Trend Micro. Intel’s > >>>>> EPID scheme is another example of pairings being used commercially. > > >> As > >>>>> a result of our study, we believe there is a good case for allowing > >>>>> government agencies to use pairings. Pairings have been shown to have > >>>>> numerous applications, helping to solve problems that are impossible, > >>>>> difficult, or inefficient with traditional public-key cryptography or > >>>>> symmetric encryption." > >>>>> > >>>>> The biggest beneficiary of these new pairing-based cryptographic > >>>>> protocols will be the Cloud Infrastructure as a Service industry. > >>>>> Pairing-based cryptography can provide real world solutions, right > now, > >>>>> to the outstanding issues of cryptographic trust, data security, > >>>>> governance and compliance that create roadblocks to adoption of the > >>>>> Cloud by the industries that can most benefit from it. > >>>>> > >>>>> Pairing cryptography also makes possible the world in which a fleet > of > >>>>> geographically distributed and organizationally independent > Distributed > >>>>> Trust Authorities act as multiple private-key generators (PKGs) where > >>>>> trust need not reside in a single entity. > >>>>> > >>>>> The difference between this new world of Distributed Trust > Authorities > >>>>> and the current PKI system will be a landscape that provides secure > >>>>> ease-of-use encryption and authentication, does not rely upon a > single > >>>>> trusted third party, and yet allows for limited key escrow subject to > >> an > >>>>> end customer's requirement. > >>>>> > >>>>> === Milagro === > >>>>> The Milagro libraries and tools consist of: > >>>>> > >>>>> * Distributed Key Management Service API > >>>>> * Distributed Key Management CLI > >>>>> * Software Defined Distributed Security Module (SD-DSM) build > platform > >>>>> * Distributed Key Management Endpoints (software) > >>>>> * Crypto Apps, consisting of: > >>>>> * M-Pin Authentication Platform (delivering password-less 2FA) > >>>>> * M-Pin Secure Channel (delivering certificate-less TLS-PSK) > >>>>> * M-Pin-in-Mobile Client Libraries for iOS, Android and Windows > >> Phone > >>>>> * M-Pin-in-Javascript Libraries for Browsers > >>>>> * Cloud Encryption Gateway (under nascent development) > >>>>> * Distributed Trust Authority Crypto App > >>>>> * Generic library for IoT cryptographic library > >>>>> > >>>>> The startingpoint for these is the existing MIRACL library and tools > at > >>>>> http://github.com/Certivox/ > >>>>> > >>>>> === Distributed Trust Authorities === > >>>>> The Milagro project introduces a service concept called a Distributed > >>>>> Trust Authority, to replace either single-authority certificates or > >>>>> public key infrastructure. > >>>>> > >>>>> The D-TA splits the functions of a pairing-based key generation > server > >>>>> into three services issuing thirds of private keys to distinct > >>>>> identities. The shares of the private keys, received by Crypto App > >>>>> clients or Distributed Key Management Endpoints, become the only > >>>>> entities that possess any knowledge of the whole key created from the > >>>>> shares. > >>>>> > >>>>> To effect anything resembling a root key compromise that can occur > in a > >>>>> traditional PKI or commercial certificate authority, ***ALL*** > >>>>> Distributed Trust Authority servers must be compromised. > >>>>> Cryptographically, one compromise of a Distributed Trust Authority > does > >>>>> not yield an attacker any advantage, all Distributed Trust Authority > >>>>> master secrets inside each D-TA providing shares must be compromised. > >>>>> Note that all 3 D-TA's operate independently and are under separate > >>>>> organizational control. > >>>>> > >>>>> For the following examples, envision a Distributed Trust Authority > >> model > >>>>> consisting of Cloud Provider (D-TA 1), Cloud Provider end customer > >> (D-TA > >>>>> 2) and neutral third party (D-TA 3). > >>>>> > >>>>> Under this three participant model, where each member is responsible > >> for > >>>>> the security of their D-TA, the Cloud Provider can not subvert the > >>>>> security of the end customer, even with the collusion of the neutral > >>>>> third party. The end customer will not suffer an internal insider > >> attack > >>>>> unless the Cloud Provider and neutral third party also collude. > >>>>> > >>>>> === Distributed Key Management API, CLI, Endpoints === > >>>>> The core infrastructure that consumes these thirds of private keys > and > >>>>> is responsible for their distribution is a message bus and API (D-KMS > >>>>> API), a command line interface (CLI) and software (D-KMS Endpoints) > >>>>> which builds the Crypto Applications from source. > >>>>> > >>>>> Any entity can run any mix or combination of components with other > >>>>> entities, but there is no restriction on configuration. One party may > >>>>> operate all three D-TAs, Endpoints and APIs if they wish. > >>>>> > >>>>> The D-KMS CLI communicates securely with the API. The API is > >> responsible > >>>>> for either creating cryptographic keys and secrets or protecting > >>>>> existing keys and secrets through cryptographic encapsulation, via a > >>>>> choice of pairing-based protocols. In either case, the API > encapsulates > >>>>> the keys and secrets for the identity of particular D-KMS Endpoints. > >>>>> > >>>>> The D-KMS Endpoints are server operating systems with D-KMS Endpoint > >>>>> software installed. The D-KMS Endpoint software, in conjunction with > >> the > >>>>> D-KMS CLI, has the appropriate pairing-based cryptographic keys to be > >>>>> able to de-encapsulate secrets and keys received from the D-KMS API. > >>>>> These de-encapsulated secrets and keys can be stored, distributed or > >>>>> used in Crypto Applications, such as M-Pin Authentication, Secure > >>>>> Channel or Encryption Gateway. > >>>>> > >>>>> === SD-DSM / Crypto Applications === > >>>>> Software Defined Distributed Security Modules, otherwise known as > >> Crypto > >>>>> Applications "Crypto Apps" get compiled from source files on-demand. > >>>>> Crypto App source files will be hosted on major public repositories > >> such > >>>>> as Github and Apache. > >>>>> > >>>>> Crypto Applications are scaled across the datacenter through the > D-KMS > >>>>> API in conjunction with orchestration tools such as Apache Mesos and > >>>>> consume the de-encapsulated secrets and keys. > >>>>> > >>>>> ==== M-Pin Authentication and Secure Channel ==== > >>>>> M-Pin is already deployed by such organizations as NTT and Experian > in > >> a > >>>>> two node Distributed Trust Authority model, where MIRACL and its > >>>>> customer each host a D-TA node. In Experian's case, M-Pin was > selected > >>>>> to provide authentication for Experian's identity assurance platform, > >>>>> contracted to the UK Government, for secure authentication of online > >>>>> citizens into UK government websites, including HMRC (tax office). > >> M-Pin > >>>>> was selected based on its security efficacy and ability to scale to > an > >>>>> Internet scale user population (UK online citizenry). > >>>>> > >>>>> The M-Pin Authentication Platform serves as an example of what is > >>>>> possible exploiting a pairing based protocol. M-Pin is capable of > >>>>> running in a native browser mode, delivering two-factor > authentication. > >>>>> M-Pin binds to any identity (as long as it is worldly unique) and > >>>>> improves the user authentication experience as it can be visualized > in > >> a > >>>>> familiar ATM-style pin pad. > >>>>> > >>>>> It's most unique trait is the exploitation of zero knowledge proof > >>>>> authentication. The M-Pin Client proves to the M-Pin Server it > >> possesses > >>>>> its cryptographic authentication key without revealing it to the > >> server. > >>>>> As a result, the M-Pin Server stores no authentication credentials, > >>>>> eliminating the possibility of credential (i.e., password) smash n' > >> grab > >>>>> attacks. > >>>>> > >>>>> M-Pin Secure Channel extends the protocol to include authenticated > key > >>>>> agreement between server and client and mutual client-server > >>>>> authentication. The 'agreed key' is unique for each session, > possessing > >>>>> perfect forward secrecy. > >>>>> > >>>>> M-Pin Secure Channel takes the agreed key and injects the key into a > >>>>> TLS-PSK session between client and server, providing mutual > >>>>> authentication and perfect forward secrecy without the need for PKI. > >>>>> This cryptographic underpinning can be extended to create secure VPN > >>>>> sessions over various protocols. > >>>>> > >>>>> In an M-Pin client and server context, clients and servers receive > >> their > >>>>> shares of their private keys from all three Distributed Trust > >>>>> Authorities. In the previously mentioned example, this could be Cloud > >>>>> Provider, end customer and neutral third party or any combination > >>>>> thereof. > >>>>> > >>>>> M-Pin Client and Server code are already open source, having been > >>>>> previously released under BSD-Clause-3. > >>>>> > >>>>> The next iteration and revision will be licensed under the Apache > >>>>> License. > >>>>> > >>>>> ==== Cloud Encryption Gateway ==== > >>>>> Many proprietary solutions have appeared on the information security > >>>>> market to solve data governance issues about securing data in the > cloud > >>>>> with encryption keys managed by an end customer. To date, most of > these > >>>>> solutions involve purchasing hardware or virtualized appliances to > run > >>>>> in an end customer's datacenter, with nothing more delivered than a > >>>>> single encryption key under control of the end customer, performing > >>>>> sub-optimum deterministic encryption on data sent to the cloud. > >>>>> > >>>>> The Milagro Cloud Encryption Gateway will be a virtualized or > container > >>>>> based software, deployed in an end customer's environment. This CEG > >> will > >>>>> exploit pairing-based capabilities such as attribute-based encryption > >>>>> (anyone in possession of the correct set of attributes can decrypt) > >> and, > >>>>> more generally, predicate-based encryption (anyone in possession of > the > >>>>> right set of attributes and a decryption key corresponding to a > >>>>> particular predicate can decrypt). > >>>>> > >>>>> Doing so increases the flexibility of the solution by being enabled > to > >>>>> address data residency and governance requirements such as > geo-location > >>>>> while allowing key management and rotation protocols to be enforced. > >>>>> > >>>>> == Rationale == > >>>>> The benefits of a strong authentication, secure channel and cloud > >>>>> encryption via an identity framework for people and things are > >>>>> self-evident, and the plethora of homebrew proprietary solutions and > >>>>> password nightmares seen today is clear evidence of a need for better > >>>>> solutions. > >>>>> > >>>>> Milagro's distributed trust model is particularly attractive, by > virtue > >>>>> of dispensing with need for (and potential for abuse of) any central > >>>>> trust authority without requiring sophistication - such as > >> understanding > >>>>> a Web of Trust - from end users. > >>>>> > >>>>> A move to incubation at Apache will help the community to grow and > take > >>>>> on new members in an environment that guarantees open development and > >>>>> protection of participants. > >>>>> > >>>>> This is particularly relevant right now as a second corporate team, > NTT > >>>>> Data, with its own culture joins as core developers. For the outside > >>>>> world, it offers the strong promise of openness. > >>>>> > >>>>> == Initial Goals == > >>>>> Milagro will seek to integrate the existing projects at Certivox (now > >>>>> MIRACL) and NTT, and will invite participation from a nascent broader > >>>>> community evidenced by the core MIRACL library's 65 watchers and 29 > >>>>> forks at Github. > >>>>> > >>>>> As well as looking to broaden direct participation, it will seek > >>>>> synergies with relevant Apache projects, for example by providing > >>>>> Milagro plugins for HTTPD and Trafficserver. > >>>>> > >>>>> The initial software products will be the current standing M-Pin Core > >>>>> platform, client libraries and the SD-DSM and Distributed Key > >> Management > >>>>> API and client CLI (as noted above). > >>>>> > >>>>> == Current Status == > >>>>> Certivox (now MIRACL) has developed open source software at Github > >> since > >>>>> 2014, though the core MIRACL library goes back much further. Projects > >>>>> currently at Github include the M-Pin Authentication Platform and the > >>>>> MIRACL cryptographic libraries under BSD-Clause-3 and AGPL licenses. > >>>>> > >>>>> These have attracted both community and corporate interest taking > them > >>>>> beyond the realm of a single-company project, with NTT being the > second > >>>>> corporate team to take a substantial part in development. The > project > >>>>> now seeks to transition smoothly to a full Open Development model. > >>>>> > >>>>> The core team at Certivox (now MIRACL) is geographically dispersed > and > >>>>> developers are well-accustomed to using online infrastructure and > tools > >>>>> for their everyday work. The team at NTTi3 and NTT DATA and other > >>>>> contributing developers are included amongst the initial committers. > >>>>> > >>>>> In addition to MIRACL operating a community D-TA, NTT, Experian and > >>>>> Dimension Data have all agreed to host no-charge community D-TAs. > >> Other > >>>>> cloud providers are considering and have been engaged. An open source > >>>>> platform from which to offer these services is a necessary component > to > >>>>> finalizing and launching community D-TA's. > >>>>> > >>>>> == Meritocracy and Community == > >>>>> The project is moving from a single (startup) company open source > >>>>> project seeking a wider community, to embrace a second corporate > >>>>> development team and third-party developers. The project is > committed > >>>>> to broadening the community through meritocracy, and expects to > welcome > >>>>> contributions and recognize contributors. > >>>>> > >>>>> It is hoped that incubation at Apache will help with this broadening, > >> by > >>>>> providing a widely-recognised and well-understood framework for > working > >>>>> collaboratively, growing communities, and protecting contributors. > >>>>> > >>>>> == Core Developers == > >>>>> Dr. Michael Scott, Chief Cryptographer at Certivox (now MIRACL), has > >>>>> been a major open source and standards contributor to the field of > >>>>> elliptic curve cryptography for over twenty-five years. > >>>>> > >>>>> Others include > >>>>> > >>>>> === Existing team at Certivox/MIRACL: === > >>>>> . Patrick Hilt - CTO > >>>>> . Kealan Mccusker - Cryptographer > >>>>> . Stanislav Mihaylov - Architect > >>>>> . Simeon Aladhem - Developer > >>>>> > >>>>> === Existing team at NTT: === > >>>>> . Go Yamamoto - Cryptographer > >>>>> . Kenji Takahishi - Developer > >>>>> > >>>>> === Existing ASF Member: === > >>>>> . Nick Kew - Developer > >>>>> > >>>>> == Alignment: == > >>>>> Whereas Milagro has no track record of its own, the Certivox (now > >>>>> MIRACL) team have been working on related projects at Github. Being > >>>>> geographically diverse, the team is well-accustomed to day-to-day > >>>>> working in a similar environment to Apache and with similar tools and > >>>>> processes. The anticipated role of Apache is to help the community to > >>>>> grow without fragmentation of communities, code, or intellectual > >>>>> property. > >>>>> > >>>>> We are not aware of any link with existing Apache projects. However, > >> it > >>>>> is likely that several Apache projects may be interested in working > >> with > >>>>> Milagro to provide distributed identity services. Plugins for HTTPD > >> and > >>>>> Trafficserver are already anticipated. > >>>>> > >>>>> == Known Risks == > >>>>> === Orphaned products === > >>>>> Milagro, as successor to the existing MIRACL and M-Pin software at > >>>>> github, is at the core of Certivox (now MIRACL)'s business and > >> important > >>>>> to NTT, Experian, and other platform adopters who are in the process > of > >>>>> coming online. > >>>>> > >>>>> Interest, and with it both developer and user communities, are > expected > >>>>> to grow strongly. There is little risk of the project losing > momentum > >>>>> in the foreseeable future. > >>>>> > >>>>> === Experience with Open Source === > >>>>> The software has a history as open source, developed until recently > by > >> a > >>>>> geographically distributed team within a single company. Github > >> activity > >>>>> shows some evidence of a wider community. The major new development > >>>>> that leads the proposers to seek incubation at Apache is the coming > of > >>>>> new corporate interest: while both corporate teams have open-source > >>>>> experience, their cultures and backgrounds differ. > >>>>> > >>>>> We hope that incubation at Apache may help the teams collaborate in > an > >>>>> environment of mutual benefit, as well as attract independent > >> developers > >>>>> to play a full part. > >>>>> > >>>>> === Homogenous Developers. === > >>>>> The established corporate teams are dispersed across several European > >>>>> countries and Japan. Prospective developers (whose companies are > >>>>> interested in Milagro) are located in other countries, and we > >> anticipate > >>>>> a global community. > >>>>> > >>>>> === Reliance on Salaried Developers === > >>>>> Most of the initial committers are salaried developers from the core > >>>>> corporate teams. Github activity, including 29 forks of the Miracl > >>>>> library, indicates wider community interest, and it is hoped that the > >>>>> developer community will grow substantially at Apache. > >>>>> > >>>>> === Apache Brand === > >>>>> The Apache brand is of course seen as an advantage. However, the > >>>>> project is more directly concerned with the Apache platform and > >>>>> environment to unite diverse teams. > >>>>> > >>>>> == Relationships with Other Apache Products == > >>>>> See Alignment above. > >>>>> > >>>>> == Documentation == > >>>>> Milagro derives from Certivox's existing M-Pin, MIRACL and associated > >>>>> tools at github.com/Certivox/ Documentation at > >> http://docs.certivox.com/ > >>>>> may also inform and feed into the Milagro project. > >>>>> > >>>>> == Initial Source and Intellectual Property == > >>>>> As soon as Milagro is accepted into the Incubator, Certivox (now > >> MIRACL) > >>>>> will transfer the source code and trademark to the ASF with a > Software > >>>>> Grant, and licensed under the Apache License 2.0. Certivox/MIRACL > >>>>> retains rights to its existing MIRACL mark. > >>>>> > >>>>> == External Dependencies == > >>>>> There are no external dependencies and all software is under the sole > >>>>> ownership of Certivox/MIRACL. > >>>>> > >>>>> == Cryptography == > >>>>> This is advanced cryptographic software, and as such may be subject > to > >>>>> government interest and red tape in some countries. However, the > >>>>> architecture by which SD-DSM / Crypto Apps are distributed, via open > >>>>> source freely available code repositories, is intentional to exploit > >> the > >>>>> near universal interpretation of the Wassenar agreement to permit > >> export > >>>>> of open source cryptography without restriction (in most cases). > >>>>> > >>>>> == Required Resources == > >>>>> Mailinglists: > >>>>> > >>>>> * private > >>>>> * dev > >>>>> * users > >>>>> > >>>>> Git repository (to mirror existing github repo) > >>>>> > >>>>> * https://git-wip-us.apache.org/repos/asf/incubator-milagro.git > >>>>> > >>>>> Issue Tracking > >>>>> > >>>>> * JIRA repository to be requested > >>>>> > >>>>> ==== Trust Authority Service ==== > >>>>> The podling would like to request a VM at > >>>>> "ta.milagro[.incubator].apache.org" with which to run a Community > >> Trust > >>>>> Authority. It is anticipated that this will serve as a test facility > >>>>> for developers and may become a Trust Authority for the community of > >> ASF > >>>>> committers. > >>>>> > >>>>> == Initial Committers == > >>>>> * Akira Nagai (NTT) > >>>>> * Brian Spector (Certivox/MIRACL) > >>>>> * Fuji Hitoshi (NTT) > >>>>> * Genoveffa Pagano (Certivox/MIRACL) > >>>>> * Go Yamamoto (NTT) > >>>>> * Jordan Katserov (Certivox/MIRACL) > >>>>> * Kealan Mccusker (Certivox/MIRACL) > >>>>> * Kenji Takahishi (NTT) > >>>>> * Michael Scott (Certivox/MIRACL) > >>>>> * Milen Rangelove (Certivox/MIRACL) > >>>>> * Mitko Yugovski (Certivox/MIRACL) > >>>>> * Michael Scott (Certivox/MIRACL) > >>>>> * Nick Kew (Apache) > >>>>> * Nick Pateman (Certivox/MIRACL) > >>>>> * Patrick Hilt (Certivox/MIRACL) > >>>>> * Simeon Aladhem (Certivox/MIRACL) > >>>>> * Stanislav Mihaylov (Certivox/MIRACL) > >>>>> * Tetsutaro Kobayashi (NTT) > >>>>> > >>>>> == Sponsors == > >>>>> === Champion === > >>>>> . Nick Kew > >>>>> > >>>>> === Mentors === > >>>>> * Sterling Hughes > >>>>> * Jan Willem Janssen > >>>>> * Nick Kew > >>>>> > >>>>> === Sponsoring Entity === > >>>>> . The Apache Incubator > >>>>> > >>>>> > >>>>> > >>>>> --------------------------------------------------------------------- > >>>>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org > >>>>> For additional commands, e-mail: general-h...@incubator.apache.org > >>>> -- > >>>> Jean-Baptiste Onofré > >>>> jbono...@apache.org > >>>> http://blog.nanthrax.net > >>>> Talend - http://www.talend.com > >>>> > >>>> > >>>> --------------------------------------------------------------------- > >>>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org > >>>> For additional commands, e-mail: general-h...@incubator.apache.org > >>> > >>> > >>> -- > >>> Colm O hEigeartaigh > >>> > >>> Talend Community Coder > >>> http://coders.talend.com > >> > >> --------------------------------------------------------------------- > >> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org > >> For additional commands, e-mail: general-h...@incubator.apache.org > >> > >> > > > --------------------------------------------------------------------- > To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org > For additional commands, e-mail: general-h...@incubator.apache.org > >