Re: [Teep] [EXT] Re: My BoF impression

Brian Witten <brian_witten@symantec.com> Wed, 05 April 2017 17:02 UTC

Return-Path: <brian_witten@symantec.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A906F129489 for <teep@ietfa.amsl.com>; Wed, 5 Apr 2017 10:02:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.222
X-Spam-Level:
X-Spam-Status: No, score=-4.222 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=symc.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O0sWF0pg0R1N for <teep@ietfa.amsl.com>; Wed, 5 Apr 2017 10:02:17 -0700 (PDT)
Received: from tussmtoutape01.symantec.com (Tussmtoutape01.symantec.com [155.64.38.231]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9AA0612945D for <teep@ietf.org>; Wed, 5 Apr 2017 10:02:17 -0700 (PDT)
Received: from tussmtmtaapi02.symc.symantec.com (tus3-f5-symc-ext-prd-snat4.net.symantec.com [10.44.130.4]) by tussmtoutape01.symantec.com (Symantec Messaging Gateway) with SMTP id D4.59.21377.51325E85; Wed, 5 Apr 2017 17:02:17 +0000 (GMT)
X-AuditID: 0a2c7e31-109ff70000005381-b2-58e523153284
Received: from TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (tus3-f5-symc-ext-prd-snat7.net.symantec.com [10.44.130.7]) by tussmtmtaapi02.symc.symantec.com (Symantec Messaging Gateway) with SMTP id 2C.C0.58529.51325E85; Wed, 5 Apr 2017 17:02:13 +0000 (GMT)
Received: from TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (10.44.91.34) by TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (10.44.91.34) with Microsoft SMTP Server (TLS) id 15.0.1236.3; Wed, 5 Apr 2017 10:02:12 -0700
Received: from NAM01-BY2-obe.outbound.protection.outlook.com (10.44.128.10) by TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (10.44.91.34) with Microsoft SMTP Server (TLS) id 15.0.1236.3 via Frontend Transport; Wed, 5 Apr 2017 10:02:12 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=symc.onmicrosoft.com; s=selector1-symantec-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=3/UGntcH4srOJAec0pR+7MZLkQiRHzemEpFuCeFDKOk=; b=rsXI7zpu1zdOcwdGU8XD/U0TlC/xy/WFy+hDXr4Tl/uLPlh395X8eQChq2QjCNv+PZW/QCfzjIvJOTcVIoHsaHLmC0jJ5vlqPNo1docvCy5YpcMTaU6iY57YknGKp3ghBjex7SlhCSgxqPchd0vs7Nybi6TeQ34cg/aA/pCWQuk=
Received: from MWHPR16MB1488.namprd16.prod.outlook.com (10.175.4.146) by MWHPR16MB1486.namprd16.prod.outlook.com (10.175.4.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1005.10; Wed, 5 Apr 2017 17:02:11 +0000
Received: from MWHPR16MB1488.namprd16.prod.outlook.com ([10.175.4.146]) by MWHPR16MB1488.namprd16.prod.outlook.com ([10.175.4.146]) with mapi id 15.01.1005.010; Wed, 5 Apr 2017 17:02:11 +0000
From: Brian Witten <brian_witten@symantec.com>
To: "Wheeler, David M" <david.m.wheeler@intel.com>, 'Jeremy O'Donoghue' <jodonogh@qti.qualcomm.com>, Tero Kivinen <kivinen@iki.fi>
CC: Hannes Tschofenig <Hannes.Tschofenig@arm.com>, teep <teep@ietf.org>
Thread-Topic: [EXT] Re: [Teep] My BoF impression
Thread-Index: AQHSrU2giPFLiSVgmkmb1dFDeX8IQaG2+mKAgAADRmQ=
Date: Wed, 05 Apr 2017 17:02:10 +0000
Message-ID: <MWHPR16MB148867B659709B96B2A30BB0930A0@MWHPR16MB1488.namprd16.prod.outlook.com>
References: <HE1PR0802MB2475515770704882F9CFBDBCFA080@HE1PR0802MB2475.eurprd08.prod.outlook.com> <22755.33183.740819.743679@fireball.acr.fi> <CB221FB1-18D2-4F7B-88D9-1E9F9828D468@qti.qualcomm.com>, <0627F5240443D2498FAA65332EE46C84366ED746@CRSMSX102.amr.corp.intel.com>
In-Reply-To: <0627F5240443D2498FAA65332EE46C84366ED746@CRSMSX102.amr.corp.intel.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: arm.com; dkim=none (message not signed) header.d=none;arm.com; dmarc=none action=none header.from=symantec.com;
x-originating-ip: [25.168.201.132]
x-microsoft-exchange-diagnostics: 1; MWHPR16MB1486; 7:G80d8d3CM5WbDeGLYbfvdiIyOISkdY2GeI6aWEKyrsAbqZ0SBd0tq3W4cWrCDUN1QO9ywO6flgE0aL8v2zCvfdblKo1G1HWG/LzJAKx4krTyHkMYqwJdjp0WUlu0MJ3HAgGcLc3092X9c5x5wQPYWbzzy5mqq3BY7EaUe1oKAUqZl7b3siElnzu+G/oDj0IuhIE/lg+C78HcVMvdkgZM6e65Qx/8MM+/ejfVVOYELXTP96AAYAYv9E1z1EZMuq6xYol5W6g8sg7U17zQz6njced8MOu+zkelYve+d51AlZrmH95WNTSihvPJsywiIT9nGael9dmVP7YsSXFJpJHBtQ==
x-ms-office365-filtering-correlation-id: 739d00fb-b160-4fbf-de2e-08d47c458020
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254075)(201703131423075)(201703031133081); SRVR:MWHPR16MB1486;
x-microsoft-antispam-prvs: <MWHPR16MB1486B604DF4C0541715077B5930A0@MWHPR16MB1486.namprd16.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(180628864354917)(278428928389397)(192374486261705)(228905959029699)(17755550239193);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(93006095)(93001095)(6041248)(201703131423075)(201702281528075)(201703061421075)(20161123564025)(20161123560025)(20161123555025)(20161123562025)(6072148); SRVR:MWHPR16MB1486; BCL:0; PCL:0; RULEID:; SRVR:MWHPR16MB1486;
x-forefront-prvs: 0268246AE7
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(6009001)(39850400002)(39450400003)(39840400002)(39410400002)(39400400002)(57704003)(377454003)(24454002)(51414003)(2906002)(189998001)(53546009)(25786009)(3280700002)(38730400002)(93886004)(8676002)(8936002)(74316002)(3660700001)(81166006)(122556002)(305945005)(7736002)(2900100001)(2950100002)(86362001)(102836003)(3846002)(33656002)(6116002)(4326008)(7696004)(6436002)(66066001)(5660300001)(6506006)(6246003)(229853002)(9686003)(55016002)(77096006)(99286003)(54906002)(53936002)(54356999)(50986999)(10290500002)(76176999); DIR:OUT; SFP:1101; SCL:1; SRVR:MWHPR16MB1486; H:MWHPR16MB1488.namprd16.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-originalarrivaltime: 05 Apr 2017 17:02:10.8306 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 3b217a9b-6c58-428b-b022-5ad741ce2016
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR16MB1486
X-OriginatorOrg: symantec.com
X-Brightmail-Tracker: H4sIAAAAAAAAA02Sa0iTYRTHfd7Lel3OnqbmyYR0iR9Kp4LFsJBMqEFZfSgaEdTQFx1OJ9uU TBCVVCZW3q94N41SCIkuOixng9JQV4E5DWxq3gLLUktL2953Ul8efuf8z/XhMKS4i/ZhVMl6 VpusVEsEQkoYlEMF7z0wowjNKkeyHMuAQDZWNUDI8kdeUDLz8KxAdvf3KnmclnfUdyB5a+sv Qt6/0kTJW4zzhLy5/DM6T18WHotj1ao0VhsSeU2YsGzuRSmTUdfbXhahLLQSXoBcGcDhUNOZ TRcgISPGywg6N39S20LVt7dOYQ1B1btJkjf6EdS1fUW8MYfAUL7FhVHYQMJK55QzrIyAkeza fzmWBQPhqCzAUjD/meBSPPFNBPd6N0iHQOJTsNjczbEHDoGON7M7HOyJQyGv7zbNcwRYSh7Z CzH2fgFQ1HrU4RbhKzBW/EzANysiwFa9zq3hii/AVv44VxPhPbA20EHwvbzBOt1A8KtiaDUO kzx7wfzUJjccwgYE7dXdzv+QgOHxALc14EISiru7nEIMLH3poXnOhNzSKYFjOsCJ0GM7ve3e +pBD87kWAoZsVmdnX5h71U4XIWnNf0PxHApLQw0kz4egrWmRYxHeDa+rp6lGRN1HfvpUnS5J r0nVK1PY0DCpLj0p1vEo7XcUK43VJHUh7pIyw54i28MzJoQZJHETVXjMKMS0Ms0eaULAkBJP UYmv3SWKU6bfYLWaq9pUNaszoX0MJfEWWeutCjGOV+rZRJZNYbXbKsG4+mQhN1PMuDTjwVzp 2GiUZZc5T3On86RuOih6p8/3Wyr1akv2+2CfyosBH0e9JhQuJ4LZlbNtkvjC2fB6M9N4KVJj G3R1N2UEGiurooy4z1oRMVRQtzzp7y+txWUe4WuaH4Epg5rD6sjcRuORsIQF3w0/osZl3Vul ev7pnHt06ZP9EkqXoAw7SGp1yr9j3LrGRQMAAA==
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFprOKsWRmVeSWpSXmKPExsXCpdPEriuq/DTC4OBlY4umi6fYLG7OOMVk 0X7hAIvF0fPP2SyW/vnG7MDqsWbeGkaPJUt+Mnkc/rqQxWPxnpdMHoumPmMMYI3isklJzcks Sy3St0vgyvh0dB9jwQPHimVHJjA2MH416WLk5JAQMJGY8fESaxcjF4eQwHdGiRmXHzBDOIcZ JeYu+8AI4bxglOic+h+sjEWgk1ni69rHUGVTmCQuNM5G6Ln4qpMJZDKbgJ7E0b93wFpEBFoY JVbs+80MkmAWcJd4vWgXmC0soC+x5sxzdhBbRMBAou1gHyuEbSVxcdIWoEEcQPtUJCYssQYJ 8wrESNycuJMNYtkEJolHM3+xgCQ4BUIk/rffBpvJKCAm8f3UGiaIXeISt57MZ4J4VUBiyZ7z zBC2qMTLx//AjmMU6GSUWD5zFwtEQkmic9spsK8lBHqYJSbu2gSV8JV4/2Y3K4RdJ9E6+TEb yHUSAtkSux95w4T/32hihei9yCRx7tEtqM0yEi9OLIdKbGaVeNc1jRHifSmJu1c6GScwas1C ci2EbSDx/tx8ZghbW2LZwtdgNq+AoMTJmU9YFjCyrGJUKCktLs4tyS1JTCzINDDSK67MTQYR icB0lKyXnJ+7iRGckpwldzAe+uNziFGAg1GJh3fB0ycRQqyJZUCVhxilOViUxHmX/7wVISSQ nliSmp2aWpBaFF9UmpNafIiRiYNTqoHRVVZ4Z63El0JPTVa9O3OXqc7TLFXs/CQRHr4l1/ri Npt/279KnjcqfPl4HecGgdaMrB09ZzXO2jt9j08457O8SGpegePnqapSge42/OkNq78Jis+0 NT7erbLs8iUPL9NdtRLGVbV/HQ+oOeRvyb7ZWhp9hUFu5uGr9gJXAjdNjEx68HWuxF4lluKM REMt5qLiRABkqW6BKgMAAA==
X-CFilter-Loop: TUS03
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/4pwKpZZF2kuzGGoLw6CDe82J4S0>
Subject: Re: [Teep] [EXT] Re: My BoF impression
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 05 Apr 2017 17:02:23 -0000

Thank You Dave!  I'd like to echo & agree with many of your points, but ask for a clarification on one aspect.  "First, I (believe) this is exactly the type of conversation we need to have. Thanks for kicking this off very directly."  Well Said, Thank You Both!  "I am motivated to work jointly on developing OTrP to address a wider set of concerns common to TEEs and their environments, with the purpose of expanding the ease with which the marketplace can utilize TEE mechanisms." Again, I'm motivated by the same purpose.  "Part of this development of OTrP (from my perspective) is being less normative about the exact location and instantiation of certain parties (particularly the TSM) and be specific on the operations and activities at particular 'service access points' of the protocol."  I believe that is a great suggestion, and I'm fully supportive.  Still my clarifying question relates to the desire "to define a more abstract definition of a TEE, and desiring a protocol that is applicable to a wide set of TEEs."  I'm eager to support a wide set of TEE, including both SGX and TZ based TEE.   My question is, "do we need to abandon the Global Platform (GP) definition of a TEE to support both SGX and TZ based TEE?"  I believe that we do Not need to abandon the GP definition of a TEE to support both SGX and TZ based TEE, but I'd be eager to get your view here as you've framed the rest so very well.  Last, either way, "I believe IETF is exactly the place to have this conversation and define a very open and inclusive protocol."  Again, I agree completely.  

Thank You Again!
Brian


From: TEEP <teep-bounces@ietf.org> on behalf of Wheeler, David M <david.m.wheeler@intel.com>
Sent: Wednesday, April 5, 2017 9:34 AM
To: 'Jeremy O'Donoghue'; Tero Kivinen
Cc: Hannes Tschofenig; teep
Subject: [EXT] Re: [Teep] My BoF impression
  

I’m a bit behind on the thread, but want to respond to Jeremy’s original comment.
 
First, I this is exactly the type of conversation we need to have. Thanks for kicking this off very directly.
I agree with your perception of the two groups, though I think it is important to understand the motivations in the second group, since they may be varied. 
 
I will put myself voluntarily in the second bucket. I will present my personal perspective, which may be different from others in the “second group”.
 
For myself, I am looking to define a more abstract definition of a TEE, and desiring a protocol that is applicable to a wide set of TEEs. From my perspective,  looking at TEEs that Intel has in the marketplace, and also having worked for several years on Intel’s XScale processors (and am thus familiar with TZ), the current OTrP draft addresses Trust Zone concerns without really considering other TEEs. This is my  perception, of course.
 
It is also my opinion that an IETF protocol should do more than address implementation specific concerns.
I am motivated to work jointly on developing OTrP to address a wider set of concerns common to TEEs and their environments, with the purpose of expanding the  ease with which the marketplace can utilize TEE mechanisms.
 
Part of this development of OTrP (from my perspective) is being less normative about the exact location and instantiation of certain parties (particularly the  TSM) and be specific on the operations and activities at particular “service access points” of the protocol. My point here is that OTrP in its current rendition is <emphasis> too </emphasis> implementation specific and too normative in its description of the  marketplace. I believe this is fine as an example, but not as part of the protocol.
 
I believe IETF is exactly the place to have this conversation and define a very open and inclusive protocol. I realize that takes some time. I look forward  to having this conversation in more detail.
 
Thanks,
Dave Wheeler
 


From: TEEP [mailto:teep-bounces@ietf.org] On Behalf Of Jeremy O'Donoghue
Sent: Tuesday, April 4, 2017 7:13 AM
To: Tero Kivinen <kivinen@iki.fi>
Cc: Hannes Tschofenig <Hannes.Tschofenig@arm.com>; teep <teep@ietf.org>
Subject: Re: [Teep] My BoF impression
   
 


On 4 Apr 2017, at 12:21, Tero Kivinen <kivinen@iki.fi> wrote:
 


My feeling that the main question what people did not understand was:

What is the real difference between TEEP and just normal
application download. I.e., why separate protocol is needed.
How is this different from just having perhaps encrypted
signed application blob from the marketplace and installing
that.

At least that was my main question when we discussed this before the
BoF.

Of course it does not help, that when you ask that question from
different people you get different answer, as the idea of what TEEP is
different for different people…
   
 
 
I think there is a degree of talking at cross-purposes.
 
 
 
There is one group - essentially those sponsoring the creation of this group - which has a very clear understanding of what it would like TEEP to be, which is essentially three things:
 
 
 
 A mechanism for managing Trusted Applications and their associated secrets and key material in a GlobalPlatform TEE or something that is conceptually very similar.
A mechanism for establishing a chain of trust rooted in firmware and covering the TEE and possibly other system components up to and including the executing Task in a Security Domain.
A mechanism - targeted at phone and tablet type devices - which operates independently of the “App Store” mechanism, and is based on a PKI infrastructure allowing Service Providers to manage the Trusted Applications they control  without the need for user intervention.
 
 
 
The draft specification very clearly addresses such a system. Understanding it fully requires considerable familiarity with the GlobalPlatform TEE specifications, since much of the terminology and architectural assumptions are derived from  these.
 
 
 
There is a second group which is starting from a more abstract position of what a TEE should look like and what security services it might then provide to a system and how the control of these could be structured. This is a completely different  problem, and likely a much broader one which is difficult to encapsulate in a small scope.
 

 

Trying to make the architecture too generic also confuses things. It
might be better to have more concrete example with more limited scope,
that would explain things what TEEP should provide.

For example:

1) TEEP provides a way to install software from the Secure
trusted application marketplace to the TEE running inside
device.

2) The Secure trusted appliation marketplace needs to be able
to verify that the TEE wanting to install an application is
actual TEE, and not some fake device, for example using
signature from the key installed by the manufacturer which is
used to sign the installation request.

3) The Secure trusted application marketplace can then encrypt
the trusted application with TEE specific key, so that nobody
else than TEE can decrypt and install it. This will prevent
leaking out confidential material inside the application.
Trusted application instlal package might also be personalized
for the specific TEE. Secure trusted application marketplace
will also sign the trusted application install package, so TEE
can verify it is authentic.

4) TEE will verify the signature of the trusted application
install package, and check that signer is trusted, and then it
will decrypt the package, and install it.

5) The application running on the REE side might need to
verify that the trusted application part of it has been
properly installed to real TEE, so it can trust it doing its
job. I am not sure if this will be part of the TEEP or not...

Is my understanding of TEEP correct? I do not know, and I assume other
people have different ideas what should or should not be part of it.
   
 
 
I think this is a pretty good explanation of what the first group would like to see.
  
 
Best regards
 
Jeremy