Re: [Teep] Hardware for hackathons

Akira Tsukamoto <akira.tsukamoto@gmail.com> Wed, 27 November 2019 09:53 UTC

Return-Path: <akira.tsukamoto@gmail.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 44CAB120832 for <teep@ietfa.amsl.com>; Wed, 27 Nov 2019 01:53:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4EQFeP0SMKfy for <teep@ietfa.amsl.com>; Wed, 27 Nov 2019 01:53:50 -0800 (PST)
Received: from mail-wr1-x42c.google.com (mail-wr1-x42c.google.com [IPv6:2a00:1450:4864:20::42c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 197B81200F7 for <teep@ietf.org>; Wed, 27 Nov 2019 01:53:50 -0800 (PST)
Received: by mail-wr1-x42c.google.com with SMTP id b18so25875421wrj.8 for <teep@ietf.org>; Wed, 27 Nov 2019 01:53:50 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=a9hs7YfTgPd8QabmE9mTQ684znx89qsylnYjH5fAzkA=; b=t9yif4CFU1c0dqG6ZlWhj21dCXhmvCpSFL28GE80ynI5Ik591/vmJf4O08rcUNaAdO nPkkKxn3bN1oGTep6k/kSkfa57MUQor7zg58icnP+l83t9+z0XZQxGgqcY/8A7PkYU0u ZKlCIIwmgPjPf/ncYYbaLU5J8qhF//+cUlq2rYPzkDEK5ks6qMEU/utPX/r5RFhkfTa8 o9Mc+uRZFpq3atkT/HwZhFPWnrZstWIJNAXxxgYlEvqXyFSngGug6jiZXxqLvOHujSZp GUrVIadayYxq4nDFtuBU0noRhtFfsiTAKeIQpm/r3h8N5f16K5S+YYXyD8wxQltM63nZ +OXA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=a9hs7YfTgPd8QabmE9mTQ684znx89qsylnYjH5fAzkA=; b=rYTvsH3lmhY/JEyRHY7iF46c6Sg2i1O55hTGJMTFqmJMfUc6vv8B2gHYBmhI2AUvwo 4rDjjIub3lTYzNHUOEDnWyAuNQ2moY83ydJLQXWxjTDikq44NniVbpq4dSJUG7rEezvq Lk0Mgl2cyH8a/4/MIv7o9KLSif8ZS8JgwZbm3o6uJYEwp68Eod1sU9lcFaRplXMKfL01 B0YKeenQT4bOx4kkpxuSpVlMclVfEB1gQUrmzTqg4u/1m1ufj3833e/rCxhAf+w45FAW dKYoGEXYrxEWMI2+X0e2aYz0GeY++4eU5eEBm3/1pQel9FaRctIImPerE0ACe1Tg+qJR qnYQ==
X-Gm-Message-State: APjAAAWfsLpasG6kMWGzFGvfVNPFdxe5N+uptzU6jT0zhVCqFGAMGkyF 6AFv5Vf0XCsU2espPPIIe+fjdUJTQInAzy9VPSo=
X-Google-Smtp-Source: APXvYqyWNFQ4XM66zP2jOPAu3RSxYmlay13LKHh4EtkQcAn6GxFtfMEa90Ca25YzcGVD97+dsMpwQIa5mebKpWTSmLM=
X-Received: by 2002:adf:e550:: with SMTP id z16mr18333204wrm.315.1574848428391; Wed, 27 Nov 2019 01:53:48 -0800 (PST)
MIME-Version: 1.0
References: <CY4PR21MB0773C2CEFF38942B2CA517C0A34C0@CY4PR21MB0773.namprd21.prod.outlook.com> <CACuRN0NQSizzuqScEQJZJJwegsdJHi8mi=Gp_kqpK4CsJ2-OSQ@mail.gmail.com>
In-Reply-To: <CACuRN0NQSizzuqScEQJZJJwegsdJHi8mi=Gp_kqpK4CsJ2-OSQ@mail.gmail.com>
From: Akira Tsukamoto <akira.tsukamoto@gmail.com>
Date: Wed, 27 Nov 2019 18:53:36 +0900
Message-ID: <CACuRN0Pz=L0vS4ek81UPyFf7SGjTWecbfugHGJ=JBNTUFvQ=VQ@mail.gmail.com>
To: Dave Thaler <dthaler=40microsoft.com@dmarc.ietf.org>
Cc: "teep@ietf.org" <teep@ietf.org>, Hannes Tschofenig <Hannes.Tschofenig@arm.com>, Isobe Kohei <isobekohei+job@gmail.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/2gIi7bxeeP3kqq4nswFdHs4PKY8>
Subject: Re: [Teep] Hardware for hackathons
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Nov 2019 09:53:52 -0000

Hi Dave, Hannes and Isobe-san,

For the further discussion for the future hackathon, I searched
information of Grapeboard and STM32MP157C-DK2 (which is STM CortexA7
devboard, I will abbreviate as StmA7board).

It is not mandatory but it would be nice to have/use unified
programing software stacks for the TEEP development on both TAM and
TEEP device.
I briefly mentioned about it on page 14 in the slide at IETF106.
https://datatracker.ietf.org/meeting/106/materials/slides-106-teep-sessb-teep-hackathon-report

Also, I looked inside the Dave`s OTrP over http implementation.
https://github.com/dthaler/OTrP

I have listed items for a discussion of the choices which were based
on what we used at the ietf106 hackathon.
Dave and Isobe-san, please correct me if I am wrong. :)

*) JSON stack:
(1) jansson, which Dave is using
https://github.com/akheron/jansson
(2) node.js, Isobe-san`s TAM
(3) json parser in libwebsockets, which my prototype is using
https://github.com/warmcat/libwebsockets/tree/master/lib/jose

*) JOSE stack:
(1) latchset/jose, which Dave is using
https://github.com/latchset/jose
(2) node.js?, Isobe-san`s TAM
(3) libwebsockets

*) HTTP stack:
(1) from scratch?, In Dave`s
https://github.com/dthaler/OTrP/blob/master/TeepTamBrokerLib/HttpServer.cpp
(2) libwebsockets, In mine

*) Crypto-tsl stack:
(1) openssl, Dave`s
(2) mbedtls, mine
Other than above, might good to use smaller libs, wolfSSL or s2n on
the device side?

*) rootfs
(1) Ubuntu?, Dave`s
(2) buildroot, mine

The default rootfs of dev boards introduced by Dave and Hannes.
*) Grapeboard
Ubuntu, customizable to Yocto/OE, OpenWRT and etc
*) StmA7board
Yocto/OE (OpenSTLinux)

Also, we have to consider the hardware requirements of SGX, ARM
TrustZone and RISC-V too.
The SGX is pretty handy since it could use simulation mode on any pc.
The op-tee is able to run on qemu too.

For the dev board, cross compiling is used so what to do on host pc,
Linux pc with ubuntu, win and etc.

And it would be really nice to have docker image for the dev
environment which includes necessary software stacks for developing
teep/otrp at least for developing TAM side.

The TAM and TEEP device do not have to be using the same software
stacks listed above.

I honestly do not have any preference listed above. I was late on the
boat and did not know what others have done in the past.

We do not have so much engineering resources at the moment, so I
thought it would be good to work on similar environment as possible to
able to focus on teep stack.

Akira

On Tue, Nov 19, 2019 at 12:30 PM Akira Tsukamoto
<akira.tsukamoto@gmail.com> wrote:
>
> Hi Dave and Hannes,
>
> The Grapeboard has more speed (single CortexA53, 64bit, 1GHz) compare to
> STM32MP157C-DK2 (dual CortexA7, 32bit, 650Mhz).
>
> The STM has 32-Gbit eMMC for rootfs while Grapeboard have to use SD
> card for rootfs.
>
> The Grapeboard have commonly used rootfs such as, Ubuntu and Yocto based Linux.
>
> I will look into them.
>
> -Akira
>
> On Tue, Nov 19, 2019 at 10:16 AM Dave Thaler
> <dthaler=40microsoft.com@dmarc.ietf.org> wrote:
> >
> > During the WG session today, in the discussion of potential hardware for future hackathons, I recommended the Grapeboard:
> >
> > https://www.grapeboard.com/
> >
> > This is an NXP Cortex A53 based board.
> >
> >
> >
> > That’s the board that’s used in the commercial Scalys Trustbox routers:
> >
> > https://scalys.com/trustbox-home-router/
> >
> > which is the device that got the cybersecurity innovation award at CES 2019:
> >
> > https://www.techrepublic.com/article/ces-2019-innovation-awards-honoree-trustbox-iot-security-router/
> >
> >
> >
> > Dave
> >
> > _______________________________________________
> > TEEP mailing list
> > TEEP@ietf.org
> > https://www.ietf.org/mailman/listinfo/teep