Hi Mitch,


No confirm from security people yet, so that I?d recommend to use the time slot 
from this week OSWG.(wed)

There is already CTT status related session. Let me request to Dwarka to extend 
the topic for this issue also.



BR, Uze Choi

From: ??? (Uze Choi) [mailto:uzc...@samsung.com] 
Sent: Friday, May 26, 2017 2:39 PM
To: 'Mitch Kettrick'; 'Heldt-Sheller, Nathan'; 'Bell, Richard S'; '???'; 
'iotivity-dev at lists.iotivity.org'
Cc: 'Agis, Ed'; 'Kaufman, David R (AZ16)'
Subject: RE: RE: [dev] [State update-2 for RC3] [Triage Meeting] RE: 
[session2-Meeting minute]: [Triage CC schedule] [For 1.3 release RC2 ] list 
sharing and update request for some missing blocks



Let me reserve the session at this time.

If security people(Randeep, Nathan, Kevin, Dongik Lee, Sergiy: not all but..) 
agree to join, Let me create the session with CC.



BR, Uze Choi

From: Mitch Kettrick [mailto:c...@openconnectivity.org] 
Sent: Friday, May 26, 2017 2:49 AM
To: '??? (Uze Choi)'; 'Heldt-Sheller, Nathan'; 'Bell, Richard S'; '???'; 
iotivity-dev at lists.iotivity.org
Cc: 'Agis, Ed'; 'Kaufman, David R (AZ16)'
Subject: RE: RE: [dev] [State update-2 for RC3] [Triage Meeting] RE: 
[session2-Meeting minute]: [Triage CC schedule] [For 1.3 release RC2 ] list 
sharing and update request for some missing blocks



Hi Uze,



Monday is a holiday in the United States so my guess is that many of us will 
not be available.



How about Tuesday or Wednesday?



Note that CTT 1.5.7 has some known CTT bugs related to not having the newest 
schema fixes so aligning with 1.5.7 is actually impossible as far as I 
understand things.



Mitch



From: ??? (Uze Choi) [mailto:uzc...@samsung.com] 
Sent: Wednesday, May 24, 2017 9:44 PM
To: 'Mitch Kettrick'; 'Heldt-Sheller, Nathan'; 'Bell, Richard S'; '???'; 
iotivity-dev at lists.iotivity.org
Cc: 'Agis, Ed'; 'Kaufman, David R (AZ16)'
Subject: RE: RE: [dev] [State update-2 for RC3] [Triage Meeting] RE: 
[session2-Meeting minute]: [Triage CC schedule] [For 1.3 release RC2 ] list 
sharing and update request for some missing blocks



Hi Mitch,



Correctly you may right. Something like chicken and egg issue.



There can be two ideas for this release.

One is to Specify the coverage in which IoTivity passed at 1.5.7 on release 
note.

The other, completely remove CTT context, just no mentioning.



It is good idea to discuss how to deal with it. But it should be done with the 
security people engagement. (Randeep, Nathan, Kevin, Dongik Lee, Sergiy)

How about to have a meeting on next Monday afternoon in PST?



BR, Uze Choi

From: Mitch Kettrick [mailto:c...@openconnectivity.org] 
Sent: Wednesday, May 24, 2017 1:48 AM
To: uzchoi at samsung.com; 'Heldt-Sheller, Nathan'; 'Bell, Richard S'; '???'; 
iotivity-dev at lists.iotivity.org
Cc: 'Agis, Ed'; 'Kaufman, David R (AZ16)'
Subject: RE: RE: [dev] [State update-2 for RC3] [Triage Meeting] RE: 
[session2-Meeting minute]: [Triage CC schedule] [For 1.3 release RC2 ] list 
sharing and update request for some missing blocks



Hi Uze,



I want to clarify one thing that you said:  Then release version can pass the 
current version CTT test case excluding issues to be resolved from CTT.



I do not believe that IoTivity will automatically pass the current version of 
the CTT (not sure if you mean 1.5.7 or 1.5.8) once the bugs Nathan mentioned 
below are closed.  Many of the issues that are being worked on now are 
preventing many of the existing test cases to run all the way through.  



As an example, many of the schema issues related to the SVRs make it such that 
the CTT can't even complete the first step in the test case.  Once the CTT 
pulls in the latest schema files (which should be in CTT v1.5.8), the test 
cases should be able to run all the way through for the first time.  There is a 
good chance that clearing this first block issue with the schema files will 
expose additional bugs that we don't even know about yet.  This will lead to 
additional IoTivity bug fixes and/or CTT issues that have to be resolved.



We're constantly trying to hit a moving target since nothing is fully fleshed 
out including test cases (many of which have not been completely written yet), 
IoTivity and the CTT.  As I've said in other emails, it's going to take 2 to 3 
months until things stabilize and we have something that passes the CTT (and 
can be OCF 1.0 certified).



Said another way, there is no easy way to freeze the CTT and try to pass "the 
current version of the CTT" since we are constantly finding and fixing bugs in 
both the CTT and IoTivity.  Trying to freeze the CTT and pass makes little 
sense because every recent version of the CTT has bugs, many of which we 
haven't even uncovered yet.



Does it make sense to have a special meeting to discuss IoTivity v1.3 and what 
we're trying to accomplish with it so that we can put together a realistic 
plan?  I have to admit that I don't fully understand the current plan but from 
what I can see I'm not sure that what we're trying to accomplish is even 
possible?



Mitch



From: ??? [mailto:uzc...@samsung.com] 
Sent: Saturday, May 20, 2017 9:16 PM
To: Heldt-Sheller, Nathan; Bell, Richard S; ???; iotivity-dev at 
lists.iotivity.org
Cc: Mitch Kettrick; Agis, Ed
Subject: RE: RE: [dev] [State update-2 for RC3] [Triage Meeting] RE: 
[session2-Meeting minute]: [Triage CC schedule] [For 1.3 release RC2 ] list 
sharing and update request for some missing blocks



Hi Nathan,

I believe Patches for these issues will be merged by this week. (I mean by this 
Sunday)

Then release version can pass the current version CTT test case excluding 
issues to be resolved from CTT.

And better to include following but not necessary to include below I believe.

?         Bug     IOT-1928              Update mbedtls version before 1.3 
release

?         Improvement IOT-1896

BR Uze Choi

--------- Original Message ---------

Sender : Heldt-Sheller, Nathan <nathan.heldt-sheller at intel.com>

Date : 2017-05-21 08:12 (GMT+9)

Title : RE: [dev] [State update-2 for RC3] [Triage Meeting] RE: 
[session2-Meeting minute]: [Triage CC schedule] [For 1.3 release RC2 ] list 
sharing and update request for some missing blocks



Hi Uze,



As an update, all known P1 Security Issues have either been resolved, or have 
pending patches in Gerrit review; see JIRA for updated status:

All Open, In Progress, Assigned and Re-opened Issues with ?Security? tag, P1, 
and Fix In Version 1.3.0 
<https://jira.iotivity.org/issues/?jql=project%20%3D%20IOT%20AND%20status%20in%20(Open%2C%20%22In%20Progress%22%2C%20Reopened%2C%20Assigned)%20AND%20priority%20%3D%20P1%20AND%20fixVersion%20%3D%20%22IoTivity%201.3.0%22%20AND%20labels%20%3D%20security%20ORDER%20BY%20priority%20DESC%2C%20created%20DESC>
 



We are waiting on code review and/or Jenkins for 7 of the 8 open issues.  The 
mbedTLS update issue, you already known about.



However it should be noted that there are likely many outstanding issues other 
than these that will prevent OCF 1.0 certification.  I understand it is your 
intention to release 1.3.0 without passing complete CTT, but I wanted to be 
100% clear that there will almost surely be other certification blocking issues 
discovered as CTT and IoTivity bugs are fixed and more of the TCs are running.  
I hope the intention is to release again when complete CTT is passing.



Summary copy/paste from JIRA:



?         Bug     IOT-2293              [Security] /oic/sec/acl2 resource is 
being updated by payload for /oic/sec/acl resource

?         Bug     IOT-2292              [Security] 'creds->credusage' property 
of /oic/sec/cred resource is of string type, expected is array of string in 
OCF1.0

?         Bug     IOT-2281              [Security] /oic/sec/amacl resource is 
responding for GET request, but not for POST

?         Bug     IOT-2280              [Security] /oic/sec/doxm resource 
unable to update rowneruuid

?         Bug     IOT-2271              provisioningclient fails to discover 
sampleserver_randompin, when using default ACEs

?         Bug     IOT-2258              OCCreateResource() must allow Secure 
*and* Unsecure "ep"

?         Bug     IOT-1928              Update mbedtls version before 1.3 
release

?         Improvement IOT-1896              Implement privacy mitigation 
approach for unique identifiers

Thanks,
Nathan









  
<http://ext.samsung.net/mail/ext/v1/external/status/update?userid=uzchoi&do=bWFpbElEPTIwMTcwNTIxMDQxNTUxZXBjbXMxcDFmOTIzMjE4Nzg5NTYwZTI3YzVlYTNjZWY3Y2IyZjFkZCZyZWNpcGllbnRBZGRyZXNzPWNwbUBvcGVuY29ubmVjdGl2aXR5Lm9yZw__>
 




 
<http://www.avg.com/email-signature?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
 ?? ??? ??? ??????.

Virus-free.  
<http://www.avg.com/email-signature?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient>
 www.avg.com 



-------------- next part --------------
HTML ?????? ??????????????...
URL: 
<http://lists.iotivity.org/pipermail/iotivity-dev/attachments/20170530/f57011fc/attachment.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image001.gif
Type: image/gif
Size: 13402 bytes
Desc: ?????? ?? ????????.
URL: 
<http://lists.iotivity.org/pipermail/iotivity-dev/attachments/20170530/f57011fc/attachment.gif>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: image002.jpg
Type: image/jpeg
Size: 350 bytes
Desc: ?????? ?? ????????.
URL: 
<http://lists.iotivity.org/pipermail/iotivity-dev/attachments/20170530/f57011fc/attachment.jpg>

Reply via email to