Re: [Last-Call] Intdir telechat review of draft-ietf-teep-architecture-18

Bob Halley <rthalley@gmail.com> Mon, 29 August 2022 20:40 UTC

Return-Path: <rthalley@gmail.com>
X-Original-To: last-call@ietfa.amsl.com
Delivered-To: last-call@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 675E8C1522A7; Mon, 29 Aug 2022 13:40:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.104
X-Spam-Level:
X-Spam-Status: No, score=-2.104 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JJdRJ9Tn7fHn; Mon, 29 Aug 2022 13:40:29 -0700 (PDT)
Received: from mail-pg1-x529.google.com (mail-pg1-x529.google.com [IPv6:2607:f8b0:4864:20::529]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C4BA0C15257B; Mon, 29 Aug 2022 13:40:20 -0700 (PDT)
Received: by mail-pg1-x529.google.com with SMTP id bh13so8754744pgb.4; Mon, 29 Aug 2022 13:40:20 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=references:to:cc:in-reply-to:date:subject:mime-version:message-id :from:from:to:cc; bh=TeDJ53pWfkWqDLR8S93p2hisl0lRgZaxVAdHxm06ujE=; b=nF7wyeYNj812Q10FSWuYpVoM/nOiDdcM9iaFX8lyBFWdkDMkXfqpckxd8GgD/SlF+y wX5EEQJRG3pp88GJLoP+jbV5mGMcxZAp9f6y0H9fFimqBrx3C9dQwwiZ+9TJDhFHv6Mp atkSO5jRzj6jnGT8oTRkmy5zc/+IdLumZtj0apV7KIA+FySHLYhSYCNkUYxfE8D8yTNI Xav0o/MvsGtYn2urcW5jFg9rHx6dIQmX7CGTu+DD9wGkZ/dOBPZYPoFP2OZUatwJxHrx MTcIs43claZ37OAz8DfKckQyJrR7S4VDyudtsclLpglBJfN2ClfurP0JbLSTPVeJtDQd pCpA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=references:to:cc:in-reply-to:date:subject:mime-version:message-id :from:x-gm-message-state:from:to:cc; bh=TeDJ53pWfkWqDLR8S93p2hisl0lRgZaxVAdHxm06ujE=; b=ixQZcBNNy4/7qNyA9eu8FXMLrTdgiY7a/OU3xDDPSh2yoDfyudQAkBBSTLWyix99yX qBQ6B+4stmD1ezgcO11rLU6NbZBZjHx3mMXC7/Rn3GxxLbqBGC+HS9skZ49w1DdoM3xk TDdieQIdwVRjmMmpJrVioskuT7I9Xqb2CVSG1o/yDNuvyVER6aA3DeGOsS3CssUpUyaF db4Q6Oi2Z1LLyD2xlTuXatMwpqZpUVa4o4CS5dUW3DG7OCzEHwE2SmOlObpITIXGsdkO +WSjaDCbtbGUtN83fpD2hCFh+bolbi1XPAis3kFCA3ZiTo3Fb7rAoGPJecSeQveVqSVz cHPQ==
X-Gm-Message-State: ACgBeo2p7kXqYypVPEUpCqb0SD4GrIpVgzfspKz5n0nrdVP57PYjCP23 7qTW5FfKLVGaUuOVzBcphOBg08MgBMjm4w==
X-Google-Smtp-Source: AA6agR7MdQ3kS+VKq8N8uMTuXLdPZxXjNO9+X3G7w2fMef5i7caJyG3Q5spQ1JTtXtEnk2SL97BIxw==
X-Received: by 2002:a63:e807:0:b0:427:7f53:23ee with SMTP id s7-20020a63e807000000b004277f5323eemr15482443pgh.577.1661805619976; Mon, 29 Aug 2022 13:40:19 -0700 (PDT)
Received: from smtpclient.apple ([2600:1700:22f0:42bf:d86b:26b5:4dd7:3dd9]) by smtp.gmail.com with ESMTPSA id p10-20020a170902780a00b0016ee4b0bd60sm7901815pll.166.2022.08.29.13.40.19 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Mon, 29 Aug 2022 13:40:19 -0700 (PDT)
From: Bob Halley <rthalley@gmail.com>
Message-Id: <E8D7A304-6C54-4E56-9313-02EF1FEB7AEA@gmail.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_E3FD8EE4-E021-4A9A-ADF9-1525B0662538"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.120.41.1.1\))
Date: Mon, 29 Aug 2022 13:40:18 -0700
In-Reply-To: <CABDGos7z-ovPccN_XOAvdTt9JjbuLXrf6U=zSvLFcLQe5TDopA@mail.gmail.com>
Cc: int-dir@ietf.org, draft-ietf-teep-architecture.all@ietf.org, last-call@ietf.org, teep <teep@ietf.org>
To: Mingliang Pei <mingliang.pei@broadcom.com>
References: <166164334773.48837.6914695112065510821@ietfa.amsl.com> <CABDGos7z-ovPccN_XOAvdTt9JjbuLXrf6U=zSvLFcLQe5TDopA@mail.gmail.com>
X-Mailer: Apple Mail (2.3696.120.41.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/last-call/tadPZGlBAjrAIVf1eNeiXcr6dwk>
Subject: Re: [Last-Call] Intdir telechat review of draft-ietf-teep-architecture-18
X-BeenThere: last-call@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: IETF Last Calls <last-call.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/last-call>, <mailto:last-call-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/last-call/>
List-Post: <mailto:last-call@ietf.org>
List-Help: <mailto:last-call-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/last-call>, <mailto:last-call-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 29 Aug 2022 20:40:30 -0000


> [Ming] Right, we didn't elaborate what triggers a TEEP Broker to contact TAM in this definition section. It was elaborated in the later section, for example, 4.3 where it says
> 
> "When a TEEP Broker receives a request (see the RequestTA API in Section 6.2.1 <https://www.ietf.org/archive/id/draft-ietf-teep-architecture-18.html#apis>) from an Untrusted Application to install a Trusted Component...".
> 
> This is the most common case where a TA is installed and provisioned via an UA. By this, the call to TAM is on-demand, not too many. On the other hand, there could be periodic policy checks with a TAM if an application designs to do so, which the architecture allows it and leave the choice to an application.
>  
> Do you think the text is OK as is or would like to add a sentence to point the TEEP Broker triggering to the later sections in the definition?

I noticed this latter sentence; it was just not clear to me if this was meant to be the only use case, or if the architecture was meant to allow for broader management of TAs by TAMs in the future.  I’ve got no issue with the “UA wants to install a TA” case, and for that the trigger was fine.  But I was imaging a TAM wanting to proactively update TAs in the future and was concerned about polling.  Perhaps I exceeded the scope of the protocol there!

> 
> [Ming] Agreed. Will update it to not lose the meaning that a constraint may be also in force. How about the following revision?
> 
> "The TAM is trusted by a device if the TAM's public key is, or
>  chains up to, an authorized Trust Anchor in the device, and 
>  conforms with all constraints defined in the Trust Anchor."

That is good.

/Bob