[Rats] FYI: Confidential Computing webinar Nov 10

Dave Thaler <dthaler@microsoft.com> Fri, 30 October 2020 22:20 UTC

Return-Path: <dthaler@microsoft.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B43183A1288; Fri, 30 Oct 2020 15:20:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.101
X-Spam-Level:
X-Spam-Status: No, score=-2.101 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 92vefWkKZQm5; Fri, 30 Oct 2020 15:20:18 -0700 (PDT)
Received: from NAM10-DM6-obe.outbound.protection.outlook.com (mail-dm6nam10on2135.outbound.protection.outlook.com [40.107.93.135]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0B0D73A1285; Fri, 30 Oct 2020 15:20:17 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=nCjB9P2Bhux9qX0PJVZi6DZIvVzPnOZP1BiOmSlRRV29dj2ql8ERDo3CSm2WwhEpt932Z/sRcwfTXmmcXMztoUvtusJJKMAvLma4+PT96CdeI4Yf4OLMi6xng9vhX6eV6q7IbzxeTuTykaqcrMdl8eiNmgrgStJu1u6fqUjdHyZvch2M0Voml9MYSona1B11bQGRJLRxAtALsCwO01daQSIhRwVlW0aRqBMMtafzBqsj7K3cUWhEwbrYXBpYQRCCw8UTBl+TDFAcyR4Ds5tgHACfF7n7NyTT1B0AGANlOoRuF6uVF1gKQbGfl9NJetRruhh0ubOXlKzHmP2uAa9nCw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=t4jq6BXBscW7RQucPTFQ1Xok31jdbTsEfJ5kuVFFs6w=; b=MLA6tZy45FvDfAv7XTR1+4nUvZv21lC+o9lGRFf00jq5EGvF2PveRm6XfKrxlUygCTCE3bD8IUI6nsXSA/hG1x8aYjYtYKhF8nQGbSV9PjAOF5uw6C/Np4LIbwtBKJEPfTm6iUTorxCpEmxLdb/I8LAc20Q5xYtTMhwJf4sQx7nhcVSOxYiP50hAbhZ6ED/MBzd8DAZV6L04CEn4rynK/hOuXA9wn9b6p6syFQzVBinOXAFzN532IL5SX+p3yaIQ+wHPEW+lcscuYRApk5XAK+5d3P8CxEIR7prnICVQT5SsCleRcjWJnIGNpKDOlBmErHYVoKOQeZHuokc0J/qZ1g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=t4jq6BXBscW7RQucPTFQ1Xok31jdbTsEfJ5kuVFFs6w=; b=XVv+NhUx+iPWr3P7UdiLu63NG/+/miqVWtV04YZTj2U1BZs7ZCm9SiogfKvxLfsR4ZO5PJzQbH+SxGAHpiSWsYced28XOebFJo4+ICB+WeYJw+7kELNhfSDmp1kcMbU1AWLaKFut0RxMDm3C/V41pXcTimDJJvQQRL4Y46WtMNk=
Received: from BL0PR2101MB1027.namprd21.prod.outlook.com (2603:10b6:207:30::33) by BL0PR2101MB1105.namprd21.prod.outlook.com (2603:10b6:207:37::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3499.3; Fri, 30 Oct 2020 22:20:16 +0000
Received: from BL0PR2101MB1027.namprd21.prod.outlook.com ([fe80::4da:87a4:8d47:889f]) by BL0PR2101MB1027.namprd21.prod.outlook.com ([fe80::4da:87a4:8d47:889f%6]) with mapi id 15.20.3499.027; Fri, 30 Oct 2020 22:20:16 +0000
From: Dave Thaler <dthaler@microsoft.com>
To: teep <teep@ietf.org>
CC: "rats@ietf.org" <rats@ietf.org>
Thread-Topic: FYI: Confidential Computing webinar Nov 10
Thread-Index: AdavCsPRUAoVuBZfQu65AVlg+B2XXQ==
Date: Fri, 30 Oct 2020 22:20:15 +0000
Message-ID: <BL0PR2101MB102766F6A407C7DF9468CBE5A3150@BL0PR2101MB1027.namprd21.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2020-10-30T22:20:13Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=bcc40692-6fff-47ed-99ee-7f4268c443cc; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=microsoft.com;
x-originating-ip: [2601:600:9780:8d0:3d03:c139:8d7:e672]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: 1bf0e08c-77ae-4de8-e42d-08d87d21fa6f
x-ms-traffictypediagnostic: BL0PR2101MB1105:
x-microsoft-antispam-prvs: <BL0PR2101MB11056787098F3E1868FFEDD9A3150@BL0PR2101MB1105.namprd21.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: JjlAU/ftg8IBftRxz/X2r7Umjx1JDlkQeBMYJnocMNDMKMi39S2KpHf6/oMHt3uDKjBlOjX6QH5GIkboAftFTTg5q6aRVEvyFMK2uHWRqzKnViBNYetpGXIMTf5rLjTjOGB0+gVuhDYLbuYB1k3ntskZuYJD7QB/aJhZ1I+MBnc0vPHfDeAR+z1I8jCmSS1VOOCmLdES/d9aOh0W95MAohXYf5pbSFLJpAlK0Plto/RMFC/2gmpQPjAxXoDYf9EgPAalltPLAg1WumTlrhh/chpxcRj+tZvuYJB5O5gouMYk9enpf/+6fbtp1oyT37BVM8LCpQzf+RvpQ/CTxdfyUz+bTNnF5sOH6jlMgMi31a0O8auVIUGUFhrBRAHoQyAmZJGY7iDnKVBr5l3VYR9PrQ==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BL0PR2101MB1027.namprd21.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(39860400002)(366004)(136003)(346002)(396003)(376002)(186003)(8936002)(82950400001)(6506007)(82960400001)(6916009)(7696005)(450100002)(166002)(8676002)(10290500003)(86362001)(4326008)(83380400001)(52536014)(76116006)(9686003)(2906002)(66946007)(316002)(966005)(478600001)(64756008)(33656002)(55016002)(66476007)(66446008)(5660300002)(71200400001)(66556008)(8990500004); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata: 0lLmui2OIK7mZpVw4BiePAyILe3PwPtR/4PK0IbjRtzZm2WW0YbK6igaxoSVwJdKJGF4uXyRoeU6iML03z5qszHFVbciqdJJb3riYpPDex7Yh3dPCBzREs6rkhJfmuGcAMNiIQf44sM231ZvW8rtGncwOW0RUFEmv7eUs2rpyyx1YAdfAP521DbanfHI8zkkF/gLVsRAdJnF0/61qDGb3cfEP9U7JOEqIahNbRMWwPJA1vwzVo0WGrfvArcLnpk//H8tqiePI+8dOqjfVTkTwEgBMrQXGeXqj3C9YcoMbKAxtNurJrVeeddmvpyE+e4jqmJnKajuc3cDTf7VeTvt/oggJHDP7r/0R4ypdBI/kj+OBEyn/DWO1bkspKSJYVkolNt6pB/hKCz96TJNOF2P2fwGVOaQV/U2Fg9yTr8/2xNOQk0CNt9cMzo3VX+1OyYccHN5NxDsAj1ALtJ/wzWfhR11XWcuUNO5Nyfr9yUPwG652EcDz4SqVv4Lu3vsegzZTyokBYfxRrITk0b0MHpbHRxBqmF76rYZuh6qfVYkOsNk3iOQdWubPBl9mau6kj/YV3W7swNdBnEKflnZDFyHF7bNZMwqWgcj6by9i2VOapXF2U31X8A+7PPBh1uk0GP9eBVUsGDKlnwJCSQ9z7B8LA2O6nlejAZeO7mXfNUeIAey7BGxQTF6NPnBb/IPtjB886Ug8yUNjZu1L95Wl8gF+g==
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_BL0PR2101MB102766F6A407C7DF9468CBE5A3150BL0PR2101MB1027_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BL0PR2101MB1027.namprd21.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 1bf0e08c-77ae-4de8-e42d-08d87d21fa6f
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 Oct 2020 22:20:16.0115 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: v0XjiNUPtoEB2JryjNZN6KciVzw/ymy5sS+qwcqGtNQxjeqlVlgeqd07LGoXh9qXNecGCpBUofoiMvHMH+DSMr7eW6BQ7BM5o3kLVQCyUjU=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL0PR2101MB1105
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/HSXDExCmFGjJP6HNFYKw9ej9K3I>
Subject: [Rats] FYI: Confidential Computing webinar Nov 10
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 30 Oct 2020 22:20:20 -0000

In past TEEP WG meetings I have given a 1 slide summary of the
Confidential Computing Consortium, which is an org under the Linux Foundation,
focused on open source projects for on trusted execution environments.
And the CCC provided feedback on the TEEP arch doc about the definition of
a TEE which was incorporated and now CCC and TEEP use the same definition.
Similarly Mike Bursell was going to present a TEEP use case from Enarx (an open
source project under the CCC) at IETF last year but couldn't make it so I ended up
presenting his slides for him.

Anyway, the CCC is doing an open webinar on confidential computing next week
and I'm one of the co-presenters.   Because of the synergy between TEEP and the CCC
(and the TEE use case in RATS), I'm sharing the information here since we want to
continue to encourage collaboration between CCC (for open source)
and TEEP/RATS folks (for standards).

Tuesday November 10, 2020 at 8:30AM PT
https://confidentialcomputing.io/webinar/

CCC meetings are also open to the public and a couple of you have attended them,
this webinar is more an intro but potentially of interest to anyone working on TEEs.

Dave