+1 non-binding.

Thanks Flavio!

On Wed, Dec 16, 2015 at 9:42 AM, Flavio Junqueira <f...@apache.org> wrote:

> +1 binding.
>
> Great project, good luck.
>
> -Flavio
>
> > On 15 Dec 2015, at 21:27, Tom Barber <magicaltr...@apache.org> wrote:
> >
> > +1 binding
> >
> >
> > On Tue, Dec 15, 2015 at 6:30 PM, Sterling Hughes <
> > sterling.hughes.pub...@gmail.com> wrote:
> >
> >> +1 binding
> >>
> >>> On Dec 15, 2015, at 7:51 AM, Colm O hEigeartaigh <cohei...@apache.org>
> >> wrote:
> >>>
> >>> +1 (binding)
> >>>
> >>> Colm.
> >>>
> >>> On Tue, Dec 15, 2015 at 10:56 AM, Jean-Baptiste Onofré <
> j...@nanthrax.net>
> >>> wrote:
> >>>
> >>>> +1 (binding)
> >>>>
> >>>> Regards
> >>>> JB
> >>>>
> >>>>
> >>>>> On 12/15/2015 09:56 AM, Nick Kew wrote:
> >>>>>
> >>>>> I should like to call a vote to accept Milagro into
> >>>>> the Incubator.  The full proposal is available at
> >>>>> https://wiki.apache.org/incubator/MilagroProposal
> >>>>> as well as below.
> >>>>>
> >>>>> Note that the project was first discussed here under
> >>>>> the name OpenMiracl.  The adoption of the Milagro name
> >>>>> is a response to that discussion.
> >>>>>
> >>>>> [ ] +1 Accept Milagro into the Apache Incubator
> >>>>> [ ] 0
> >>>>> [ ] -1 Do not accept Milagro into the Apache Incubator ...
> >>>>>
> >>>>> The vote remains open until at least the end of the week.
> >>>>>
> >>>>> For myself:
> >>>>> [*] +1 Accept Milagro into the Apache Incubator
> >>>>>
> >>>>>
> >>>>> = Project Proposal: Milagro =
> >>>>> == Abstract ==
> >>>>> Milagro is a distributed cryptosystem for cloud computing. Its
> purpose
> >>>>> is to provide an open source alternative to proprietary key
> management
> >>>>> and certificate backed cryptosystems used for secure communication
> and
> >>>>> authentication. The adoption of Milagro will create a secure, free,
> >> open
> >>>>> source alternative to monolithic certificate authorities and
> eliminate
> >>>>> single points of failure.
> >>>>>
> >>>>> == Background ==
> >>>>> The Cloud Computing industry is using 40-year-old cryptographic
> >>>>> algorithms and infrastructure, invented for a different era when
> >>>>> client-server computing was the dominant paradigm. At the heart of
> it,
> >>>>> is the continued reliance on outdated, and problematic, monolithic
> >>>>> cryptographic trust hierarchies such as commercial certificate
> >>>>> authorities.
> >>>>>
> >>>>> A number of factors are aligning to make this the right time to bring
> >>>>> forth an alternative to the Internet's continued reliance on PKI.
> >>>>>
> >>>>> The Cloud Infrastructure as a Service (IaaS) industry as a whole
> >>>>> encounters friction bringing the largest customers in regulated
> >>>>> industries onto their platforms because issues of cryptographic
> trust,
> >>>>> data residency, and data governance prevent total adoption among
> >>>>> regulated industries.
> >>>>>
> >>>>> Devops teams tasked with running an IaaS provider's datacenter
> >>>>> automation encounter challenges scaling and automating data center
> >>>>> operations when confronted with the complexities of running
> encryption,
> >>>>> certificate and key management infrastructures built for a
> >> client-server
> >>>>> era.
> >>>>>
> >>>>> Enterprises in regulated industries find challenges to transform
> >>>>> entirely into digital businesses because the economics of cloud
> >>>>> computing are unavailable to them.
> >>>>>
> >>>>> Despite the astounding growth of cloud infrastructure as a service
> >>>>> platforms over the last few years, full adoption by organizations
> with
> >>>>> stringent data security requirements won’t be achieved until these
> >>>>> fundamental capability issues get resolved.
> >>>>>
> >>>>> Lastly, the Internet as a whole is suffering from an erosion of trust
> >>>>> following incidents with commercial certificate authorities industry,
> >>>>> i.e., compromised root keys, and failures in due diligence issuing
> real
> >>>>> domain certificates.
> >>>>>
> >>>>> Indeed, mass surveillance, a lack of easy end-user encryption, a
> >> growing
> >>>>> demand for key escrow under legal oversight, and general certificate
> >>>>> authority security concerns create the question: How appropriate is
> the
> >>>>> continued dependency on PKI when the goal is to advance the benefits
> of
> >>>>> cloud computing across the technology landscape?
> >>>>>
> >>>>> Netcraft is the industry standard for monitoring Active TLS
> >>>>> certificates. In May 2015, they stated that “Although the global
> [TLS]
> >>>>> ecosystem is competitive, it is dominated by a handful of major CAs —
> >>>>> three certificate authorities (Symantec, Comodo, Godaddy) account for
> >>>>> three-quarters of all issued [TLS] certificates on public-facing web
> >>>>> servers.”
> >>>>>
> >>>>> The Internet Security Research Group's (ISRG) "Let's Encrypt"
> >> initiative
> >>>>> aims to make Secure Sockets Layer/Transport Layer Security (SSL/TLS)
> >>>>> certificates available for free in an automated fashion. This a step
> in
> >>>>> the right direction, in that it removes the risk of profit before
> >>>>> ethics. The real issue, which is one entity acts as a monolithic
> trust
> >>>>> hierarchy, is not addressed. The monolithic trust hierarchy is a
> >>>>> fundamental design flaw within PKI itself.
> >>>>>
> >>>>> The rate of attacks against certificate authorities seems to be
> >>>>> [increasing](http://wiki.cacert.org/Risk/History) as the obvious
> >> single
> >>>>> point of compromise design inherent to PKI is becoming a more popular
> >>>>> route to carry out attacks.
> >>>>>
> >>>>> == Proposal ==
> >>>>> Milagro is an open source, pairing-based cryptographic platform to
> >> solve
> >>>>> key management, secure communications, data governance and compliance
> >>>>> issues that are challenging Cloud Providers and their customers.
> >>>>>
> >>>>> It does this without the need for certificate authorities, putting
> into
> >>>>> place a new category of service providers called Distributed Trust
> >>>>> Authorities (D-TA's).
> >>>>>
> >>>>> The M-Pin protocol, and its existing open-source MIRACL
> implementation
> >>>>> on which Milagro will build, are already in use by Experian, NTT,
> Odin,
> >>>>> Gov.UK and are being rolled out at scale for zero password
> multi-factor
> >>>>> authentication and certificate-less HTTPS / secure channel.
> >>>>>
> >>>>> It is proposed that Milagro enter incubation at Apache.  At the same
> >>>>> time, a draft standard for M-Pin has been prepared and recently
> >>>>> submitted to IETF.  The standards process at IETF and the platform
> >>>>> implementation at Apache will run in parallel.
> >>>>>
> >>>>> === Why Pairing-Based Cryptography, why now? ===
> >>>>> Over the last decade, pairings on elliptic curves have been a very
> >>>>> active area of research in cryptography. Pairings map pairs of points
> >> on
> >>>>> an elliptic curve into the multiplicative group of a finite field.
> >> Their
> >>>>> unique properties have enabled many new cryptographic protocols that
> >> had
> >>>>> not previously been feasible.
> >>>>>
> >>>>> Standards bodies have already begun standardizing various
> pairing-based
> >>>>> schemes. These include the IEEE, ISO, and IETF. Besides
> identity-based
> >>>>> encryption (IBE), the standardized schemes include identity-based
> >>>>> signatures, identity-based signcryption, identity-based key
> >>>>> establishment mechanisms, and identity-based key distribution for use
> >> in
> >>>>> multimedia.
> >>>>>
> >>>>> NIST has also recommended the standardization and adoption of
> >>>>> pairing-based cryptographic systems __for government agencies__. In
> the
> >>>>> NIST "Report on Pairing-based Cryptography" issued in February 2015,
> >>>>> they state:
> >>>>>
> >>>>> "It has been a decade since the first IBE schemes were proposed.
> These
> >>>>> schemes have received sufficient attention from the cryptographic
> >>>>> community and no weakness has been identified. IBE is being used
> >>>>> commercially, primarily by Voltage Security and Trend Micro. Intel’s
> >>>>> EPID scheme is another example of pairings being used commercially. >
> >> As
> >>>>> a result of our study, we believe there is a good case for allowing
> >>>>> government agencies to use pairings. Pairings have been shown to have
> >>>>> numerous applications, helping to solve problems that are impossible,
> >>>>> difficult, or inefficient with traditional public-key cryptography or
> >>>>> symmetric encryption."
> >>>>>
> >>>>> The biggest beneficiary of these new pairing-based cryptographic
> >>>>> protocols will be the Cloud Infrastructure as a Service industry.
> >>>>> Pairing-based cryptography can provide real world solutions, right
> now,
> >>>>> to the outstanding issues of cryptographic trust, data security,
> >>>>> governance and compliance that create roadblocks to adoption of the
> >>>>> Cloud by the industries that can most benefit from it.
> >>>>>
> >>>>> Pairing cryptography also makes possible the world in which a fleet
> of
> >>>>> geographically distributed and organizationally independent
> Distributed
> >>>>> Trust Authorities act as multiple private-key generators (PKGs) where
> >>>>> trust need not reside in a single entity.
> >>>>>
> >>>>> The difference between this new world of Distributed Trust
> Authorities
> >>>>> and the current PKI system will be a landscape that provides secure
> >>>>> ease-of-use encryption and authentication, does not rely upon a
> single
> >>>>> trusted third party, and yet allows for limited key escrow subject to
> >> an
> >>>>> end customer's requirement.
> >>>>>
> >>>>> === Milagro ===
> >>>>> The Milagro libraries and tools consist of:
> >>>>>
> >>>>> * Distributed Key Management Service API
> >>>>> * Distributed Key Management CLI
> >>>>> * Software Defined Distributed Security Module (SD-DSM) build
> platform
> >>>>> * Distributed Key Management Endpoints (software)
> >>>>> * Crypto Apps, consisting of:
> >>>>>  * M-Pin Authentication Platform (delivering password-less 2FA)
> >>>>>   * M-Pin Secure Channel (delivering certificate-less TLS-PSK)
> >>>>>   * M-Pin-in-Mobile Client Libraries for iOS, Android and Windows
> >> Phone
> >>>>>   * M-Pin-in-Javascript Libraries for Browsers
> >>>>>  * Cloud Encryption Gateway (under nascent development)
> >>>>>  * Distributed Trust Authority Crypto App
> >>>>>  * Generic library for IoT cryptographic library
> >>>>>
> >>>>> The startingpoint for these is the existing MIRACL library and tools
> at
> >>>>> http://github.com/Certivox/
> >>>>>
> >>>>> === Distributed Trust Authorities ===
> >>>>> The Milagro project introduces a service concept called a Distributed
> >>>>> Trust Authority, to replace either single-authority certificates or
> >>>>> public key infrastructure.
> >>>>>
> >>>>> The D-TA splits the functions of a pairing-based key generation
> server
> >>>>> into three services issuing thirds of private keys to distinct
> >>>>> identities. The shares of the private keys, received by Crypto App
> >>>>> clients or Distributed Key Management Endpoints, become the only
> >>>>> entities that possess any knowledge of the whole key created from the
> >>>>> shares.
> >>>>>
> >>>>> To effect anything resembling a root key compromise that can occur
> in a
> >>>>> traditional PKI or commercial certificate authority, ***ALL***
> >>>>> Distributed Trust Authority servers must be compromised.
> >>>>> Cryptographically, one compromise of a Distributed Trust Authority
> does
> >>>>> not yield an attacker any advantage, all Distributed Trust Authority
> >>>>> master secrets inside each D-TA providing shares must be compromised.
> >>>>> Note that all 3 D-TA's operate independently and are under separate
> >>>>> organizational control.
> >>>>>
> >>>>> For the following examples, envision a Distributed Trust Authority
> >> model
> >>>>> consisting of Cloud Provider (D-TA 1), Cloud Provider end customer
> >> (D-TA
> >>>>> 2) and neutral third party (D-TA 3).
> >>>>>
> >>>>> Under this three participant model, where each member is responsible
> >> for
> >>>>> the security of their D-TA, the Cloud Provider can not subvert the
> >>>>> security of the end customer, even with the collusion of the neutral
> >>>>> third party. The end customer will not suffer an internal insider
> >> attack
> >>>>> unless the Cloud Provider and neutral third party also collude.
> >>>>>
> >>>>> === Distributed Key Management API, CLI, Endpoints ===
> >>>>> The core infrastructure that consumes these thirds of private keys
> and
> >>>>> is responsible for their distribution is a message bus and API (D-KMS
> >>>>> API), a command line interface (CLI) and software (D-KMS Endpoints)
> >>>>> which builds the Crypto Applications from source.
> >>>>>
> >>>>> Any entity can run any mix or combination of components with other
> >>>>> entities, but there is no restriction on configuration. One party may
> >>>>> operate all three D-TAs, Endpoints and APIs if they wish.
> >>>>>
> >>>>> The D-KMS CLI communicates securely with the API. The API is
> >> responsible
> >>>>> for either creating cryptographic keys and secrets or protecting
> >>>>> existing keys and secrets through cryptographic encapsulation, via a
> >>>>> choice of pairing-based protocols. In either case, the API
> encapsulates
> >>>>> the keys and secrets for the identity of particular D-KMS Endpoints.
> >>>>>
> >>>>> The D-KMS Endpoints are server operating systems with D-KMS Endpoint
> >>>>> software installed. The D-KMS Endpoint software, in conjunction with
> >> the
> >>>>> D-KMS CLI, has the appropriate pairing-based cryptographic keys to be
> >>>>> able to de-encapsulate secrets and keys received from the D-KMS API.
> >>>>> These de-encapsulated secrets and keys can be stored, distributed or
> >>>>> used in Crypto Applications, such as M-Pin Authentication, Secure
> >>>>> Channel or Encryption Gateway.
> >>>>>
> >>>>> === SD-DSM / Crypto Applications ===
> >>>>> Software Defined Distributed Security Modules, otherwise known as
> >> Crypto
> >>>>> Applications "Crypto Apps" get compiled from source files on-demand.
> >>>>> Crypto App source files will be hosted on major public repositories
> >> such
> >>>>> as Github and Apache.
> >>>>>
> >>>>> Crypto Applications are scaled across the datacenter through the
> D-KMS
> >>>>> API in conjunction with orchestration tools such as Apache Mesos and
> >>>>> consume the de-encapsulated secrets and keys.
> >>>>>
> >>>>> ==== M-Pin Authentication and Secure Channel ====
> >>>>> M-Pin is already deployed by such organizations as NTT and Experian
> in
> >> a
> >>>>> two node Distributed Trust Authority model, where MIRACL and its
> >>>>> customer each host a D-TA node. In Experian's case, M-Pin was
> selected
> >>>>> to provide authentication for Experian's identity assurance platform,
> >>>>> contracted to the UK Government, for secure authentication of online
> >>>>> citizens into UK government websites, including HMRC (tax office).
> >> M-Pin
> >>>>> was selected based on its security efficacy and ability to scale to
> an
> >>>>> Internet scale user population (UK online citizenry).
> >>>>>
> >>>>> The M-Pin Authentication Platform serves as an example of what is
> >>>>> possible exploiting a pairing based protocol. M-Pin is capable of
> >>>>> running in a native browser mode, delivering two-factor
> authentication.
> >>>>> M-Pin binds to any identity (as long as it is worldly unique) and
> >>>>> improves the user authentication experience as it can be visualized
> in
> >> a
> >>>>> familiar ATM-style pin pad.
> >>>>>
> >>>>> It's most unique trait is the exploitation of zero knowledge proof
> >>>>> authentication. The M-Pin Client proves to the M-Pin Server it
> >> possesses
> >>>>> its cryptographic authentication key without revealing it to the
> >> server.
> >>>>> As a result, the M-Pin Server stores no authentication credentials,
> >>>>> eliminating the possibility of credential (i.e., password) smash n'
> >> grab
> >>>>> attacks.
> >>>>>
> >>>>> M-Pin Secure Channel extends the protocol to include authenticated
> key
> >>>>> agreement between server and client and mutual client-server
> >>>>> authentication. The 'agreed key' is unique for each session,
> possessing
> >>>>> perfect forward secrecy.
> >>>>>
> >>>>> M-Pin Secure Channel takes the agreed key and injects the key into a
> >>>>> TLS-PSK session between client and server, providing mutual
> >>>>> authentication and perfect forward secrecy without the need for PKI.
> >>>>> This cryptographic underpinning can be extended to create secure VPN
> >>>>> sessions over various protocols.
> >>>>>
> >>>>> In an M-Pin client and server context, clients and servers receive
> >> their
> >>>>> shares of their private keys from all three Distributed Trust
> >>>>> Authorities. In the previously mentioned example, this could be Cloud
> >>>>> Provider, end customer and neutral third party or any combination
> >>>>> thereof.
> >>>>>
> >>>>> M-Pin Client and Server code are already open source, having been
> >>>>> previously released under BSD-Clause-3.
> >>>>>
> >>>>> The next iteration and revision will be licensed under the Apache
> >>>>> License.
> >>>>>
> >>>>> ==== Cloud Encryption Gateway ====
> >>>>> Many proprietary solutions have appeared on the information security
> >>>>> market to solve data governance issues about securing data in the
> cloud
> >>>>> with encryption keys managed by an end customer. To date, most of
> these
> >>>>> solutions involve purchasing hardware or virtualized appliances to
> run
> >>>>> in an end customer's datacenter, with nothing more delivered than a
> >>>>> single encryption key under control of the end customer, performing
> >>>>> sub-optimum deterministic encryption on data sent to the cloud.
> >>>>>
> >>>>> The Milagro Cloud Encryption Gateway will be a virtualized or
> container
> >>>>> based software, deployed in an end customer's environment. This CEG
> >> will
> >>>>> exploit pairing-based capabilities such as attribute-based encryption
> >>>>> (anyone in possession of the correct set of attributes can decrypt)
> >> and,
> >>>>> more generally, predicate-based encryption (anyone in possession of
> the
> >>>>> right set of attributes and a decryption key corresponding to a
> >>>>> particular predicate can decrypt).
> >>>>>
> >>>>> Doing so increases the flexibility of the solution by being enabled
> to
> >>>>> address data residency and governance requirements such as
> geo-location
> >>>>> while allowing key management and rotation protocols to be enforced.
> >>>>>
> >>>>> == Rationale ==
> >>>>> The benefits of a strong authentication, secure channel and cloud
> >>>>> encryption via an identity framework for people and things are
> >>>>> self-evident, and the plethora of homebrew proprietary solutions and
> >>>>> password nightmares seen today is clear evidence of a need for better
> >>>>> solutions.
> >>>>>
> >>>>> Milagro's distributed trust model is particularly attractive, by
> virtue
> >>>>> of dispensing with need for (and potential for abuse of) any central
> >>>>> trust authority without requiring sophistication - such as
> >> understanding
> >>>>> a Web of Trust - from end users.
> >>>>>
> >>>>> A move to incubation at Apache will help the community to grow and
> take
> >>>>> on new members in an environment that guarantees open development and
> >>>>> protection of participants.
> >>>>>
> >>>>> This is particularly relevant right now as a second corporate team,
> NTT
> >>>>> Data, with its own culture joins as core developers. For the outside
> >>>>> world, it offers the strong promise of openness.
> >>>>>
> >>>>> == Initial Goals ==
> >>>>> Milagro will seek to integrate the existing projects at Certivox (now
> >>>>> MIRACL) and NTT, and will invite participation from a nascent broader
> >>>>> community evidenced by the core MIRACL library's 65 watchers and 29
> >>>>> forks at Github.
> >>>>>
> >>>>> As well as looking to broaden direct participation, it will seek
> >>>>> synergies with relevant Apache projects, for example by providing
> >>>>> Milagro plugins for HTTPD and Trafficserver.
> >>>>>
> >>>>> The initial software products will be the current standing M-Pin Core
> >>>>> platform, client libraries and the SD-DSM and Distributed Key
> >> Management
> >>>>> API and client CLI (as noted above).
> >>>>>
> >>>>> == Current Status ==
> >>>>> Certivox (now MIRACL) has developed open source software at Github
> >> since
> >>>>> 2014, though the core MIRACL library goes back much further. Projects
> >>>>> currently at Github include the M-Pin Authentication Platform and the
> >>>>> MIRACL cryptographic libraries under BSD-Clause-3 and AGPL licenses.
> >>>>>
> >>>>> These have attracted both community and corporate interest taking
> them
> >>>>> beyond the realm of a single-company project, with NTT being the
> second
> >>>>> corporate team to take a substantial part in development.  The
> project
> >>>>> now seeks to transition smoothly to a full Open Development model.
> >>>>>
> >>>>> The core team at Certivox (now MIRACL) is geographically dispersed
> and
> >>>>> developers are well-accustomed to using online infrastructure and
> tools
> >>>>> for their everyday work.  The team at NTTi3 and NTT DATA and other
> >>>>> contributing developers are included amongst the initial committers.
> >>>>>
> >>>>> In addition to MIRACL operating a community D-TA, NTT, Experian and
> >>>>> Dimension Data have all agreed to host no-charge community D-TAs.
> >> Other
> >>>>> cloud providers are considering and have been engaged. An open source
> >>>>> platform from which to offer these services is a necessary component
> to
> >>>>> finalizing and launching community D-TA's.
> >>>>>
> >>>>> == Meritocracy and Community ==
> >>>>> The project is moving from a single (startup) company open source
> >>>>> project seeking a wider community, to embrace a second corporate
> >>>>> development team and third-party developers.  The project is
> committed
> >>>>> to broadening the community through meritocracy, and expects to
> welcome
> >>>>> contributions and recognize contributors.
> >>>>>
> >>>>> It is hoped that incubation at Apache will help with this broadening,
> >> by
> >>>>> providing a widely-recognised and well-understood framework for
> working
> >>>>> collaboratively, growing communities, and protecting contributors.
> >>>>>
> >>>>> == Core Developers ==
> >>>>> Dr. Michael Scott, Chief Cryptographer at Certivox (now MIRACL), has
> >>>>> been a major open source and standards contributor to the field of
> >>>>> elliptic curve cryptography for over twenty-five years.
> >>>>>
> >>>>> Others include
> >>>>>
> >>>>> === Existing team at Certivox/MIRACL: ===
> >>>>> . Patrick Hilt - CTO
> >>>>> . Kealan Mccusker - Cryptographer
> >>>>> . Stanislav Mihaylov - Architect
> >>>>> . Simeon Aladhem - Developer
> >>>>>
> >>>>> === Existing team at NTT: ===
> >>>>> . Go Yamamoto - Cryptographer
> >>>>> . Kenji Takahishi - Developer
> >>>>>
> >>>>> === Existing ASF Member: ===
> >>>>> . Nick Kew - Developer
> >>>>>
> >>>>> == Alignment: ==
> >>>>> Whereas Milagro has no track record of its own, the Certivox (now
> >>>>> MIRACL) team have been working on related projects at Github.  Being
> >>>>> geographically diverse, the team is well-accustomed to day-to-day
> >>>>> working in a similar environment to Apache and with similar tools and
> >>>>> processes. The anticipated role of Apache is to help the community to
> >>>>> grow without fragmentation of communities, code, or intellectual
> >>>>> property.
> >>>>>
> >>>>> We are not aware of any link with existing Apache projects.  However,
> >> it
> >>>>> is likely that several Apache projects may be interested in working
> >> with
> >>>>> Milagro to provide distributed identity services.  Plugins for HTTPD
> >> and
> >>>>> Trafficserver are already anticipated.
> >>>>>
> >>>>> == Known Risks ==
> >>>>> === Orphaned products ===
> >>>>> Milagro, as successor to the existing MIRACL and M-Pin software at
> >>>>> github, is at the core of Certivox (now MIRACL)'s business and
> >> important
> >>>>> to NTT, Experian, and other platform adopters who are in the process
> of
> >>>>> coming online.
> >>>>>
> >>>>> Interest, and with it both developer and user communities, are
> expected
> >>>>> to grow strongly.  There is little risk of the project losing
> momentum
> >>>>> in the foreseeable future.
> >>>>>
> >>>>> === Experience with Open Source ===
> >>>>> The software has a history as open source, developed until recently
> by
> >> a
> >>>>> geographically distributed team within a single company. Github
> >> activity
> >>>>> shows some evidence of a wider community.  The major new development
> >>>>> that leads the proposers to seek incubation at Apache is the coming
> of
> >>>>> new corporate interest: while both corporate teams have open-source
> >>>>> experience, their cultures and backgrounds differ.
> >>>>>
> >>>>> We hope that incubation at Apache may help the teams collaborate in
> an
> >>>>> environment of mutual benefit, as well as attract independent
> >> developers
> >>>>> to play a full part.
> >>>>>
> >>>>> === Homogenous Developers. ===
> >>>>> The established corporate teams are dispersed across several European
> >>>>> countries and Japan.  Prospective developers (whose companies are
> >>>>> interested in Milagro) are located in other countries, and we
> >> anticipate
> >>>>> a global community.
> >>>>>
> >>>>> === Reliance on Salaried Developers ===
> >>>>> Most of the initial committers are salaried developers from the core
> >>>>> corporate teams.  Github activity, including 29 forks of the Miracl
> >>>>> library, indicates wider community interest, and it is hoped that the
> >>>>> developer community will grow substantially at Apache.
> >>>>>
> >>>>> === Apache Brand ===
> >>>>> The Apache brand is of course seen as an advantage.  However, the
> >>>>> project is more directly concerned with the Apache platform and
> >>>>> environment to unite diverse teams.
> >>>>>
> >>>>> == Relationships with Other Apache Products ==
> >>>>> See Alignment above.
> >>>>>
> >>>>> == Documentation ==
> >>>>> Milagro derives from Certivox's existing M-Pin, MIRACL and associated
> >>>>> tools at github.com/Certivox/ Documentation at
> >> http://docs.certivox.com/
> >>>>> may also inform and feed into the Milagro project.
> >>>>>
> >>>>> == Initial Source and Intellectual Property ==
> >>>>> As soon as Milagro is accepted into the Incubator, Certivox (now
> >> MIRACL)
> >>>>> will transfer the source code and trademark to the ASF with a
> Software
> >>>>> Grant, and licensed under the Apache License 2.0. Certivox/MIRACL
> >>>>> retains rights to its existing MIRACL mark.
> >>>>>
> >>>>> == External Dependencies ==
> >>>>> There are no external dependencies and all software is under the sole
> >>>>> ownership of Certivox/MIRACL.
> >>>>>
> >>>>> == Cryptography ==
> >>>>> This is advanced cryptographic software, and as such may be subject
> to
> >>>>> government interest and red tape in some countries. However, the
> >>>>> architecture by which SD-DSM / Crypto Apps are distributed, via open
> >>>>> source freely available code repositories, is intentional to exploit
> >> the
> >>>>> near universal interpretation of the Wassenar agreement to permit
> >> export
> >>>>> of open source cryptography without restriction (in most cases).
> >>>>>
> >>>>> == Required Resources ==
> >>>>> Mailinglists:
> >>>>>
> >>>>> * private
> >>>>> * dev
> >>>>> * users
> >>>>>
> >>>>> Git repository (to mirror existing github repo)
> >>>>>
> >>>>> * https://git-wip-us.apache.org/repos/asf/incubator-milagro.git
> >>>>>
> >>>>> Issue Tracking
> >>>>>
> >>>>> * JIRA repository to be requested
> >>>>>
> >>>>> ==== Trust Authority Service ====
> >>>>> The podling would like to request a VM at
> >>>>> "ta.milagro[.incubator].apache.org" with which to run a Community
> >> Trust
> >>>>> Authority.  It is anticipated that this will serve as a test facility
> >>>>> for developers and may become a Trust Authority for the community of
> >> ASF
> >>>>> committers.
> >>>>>
> >>>>> == Initial Committers ==
> >>>>> * Akira Nagai             (NTT)
> >>>>> * Brian Spector           (Certivox/MIRACL)
> >>>>> * Fuji Hitoshi            (NTT)
> >>>>> * Genoveffa Pagano        (Certivox/MIRACL)
> >>>>> * Go Yamamoto             (NTT)
> >>>>> * Jordan Katserov         (Certivox/MIRACL)
> >>>>> * Kealan Mccusker         (Certivox/MIRACL)
> >>>>> * Kenji Takahishi         (NTT)
> >>>>> * Michael Scott           (Certivox/MIRACL)
> >>>>> * Milen Rangelove         (Certivox/MIRACL)
> >>>>> * Mitko Yugovski          (Certivox/MIRACL)
> >>>>> * Michael Scott           (Certivox/MIRACL)
> >>>>> * Nick Kew                (Apache)
> >>>>> * Nick Pateman            (Certivox/MIRACL)
> >>>>> * Patrick Hilt            (Certivox/MIRACL)
> >>>>> * Simeon Aladhem          (Certivox/MIRACL)
> >>>>> * Stanislav Mihaylov      (Certivox/MIRACL)
> >>>>> * Tetsutaro Kobayashi     (NTT)
> >>>>>
> >>>>> == Sponsors ==
> >>>>> === Champion ===
> >>>>> . Nick Kew
> >>>>>
> >>>>> === Mentors ===
> >>>>> * Sterling Hughes
> >>>>> * Jan Willem Janssen
> >>>>> * Nick Kew
> >>>>>
> >>>>> === Sponsoring Entity ===
> >>>>> . The Apache Incubator
> >>>>>
> >>>>>
> >>>>>
> >>>>> ---------------------------------------------------------------------
> >>>>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
> >>>>> For additional commands, e-mail: general-h...@incubator.apache.org
> >>>> --
> >>>> Jean-Baptiste Onofré
> >>>> jbono...@apache.org
> >>>> http://blog.nanthrax.net
> >>>> Talend - http://www.talend.com
> >>>>
> >>>>
> >>>> ---------------------------------------------------------------------
> >>>> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
> >>>> For additional commands, e-mail: general-h...@incubator.apache.org
> >>>
> >>>
> >>> --
> >>> Colm O hEigeartaigh
> >>>
> >>> Talend Community Coder
> >>> http://coders.talend.com
> >>
> >> ---------------------------------------------------------------------
> >> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
> >> For additional commands, e-mail: general-h...@incubator.apache.org
> >>
> >>
>
>
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: general-unsubscr...@incubator.apache.org
> For additional commands, e-mail: general-h...@incubator.apache.org
>
>

Reply via email to