Re: [Teep] Charter strawman proposal

Hannes Tschofenig <Hannes.Tschofenig@arm.com> Tue, 28 March 2017 22:39 UTC

Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D1A3C1293F8 for <teep@ietfa.amsl.com>; Tue, 28 Mar 2017 15:39:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.698
X-Spam-Level:
X-Spam-Status: No, score=-4.698 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-2.796, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p3Ku3hVSoy0u for <teep@ietfa.amsl.com>; Tue, 28 Mar 2017 15:39:33 -0700 (PDT)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00043.outbound.protection.outlook.com [40.107.0.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 26BDA128959 for <teep@ietf.org>; Tue, 28 Mar 2017 15:39:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector1-arm-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=9KfKe3KvpTy9ZP+f7fA/gRNSZkJQhHtHiDSoCoYSfsc=; b=dowqBgurgBm9k+xU9cKTP/SYnGlsK+VDVv2ZgDq5Wca9jSdY8tI9royyoixvOUUP1RwCedHUkc7rRz8rAj796LKh3EuKbMzmM+huQ3EbYL1BJELWBZH5im+sNqpkLBA7TzAXHl+E8sw48LTPifRQZpCASyP4mhI9Ouz2KZI1mpU=
Received: from HE1PR0802MB2475.eurprd08.prod.outlook.com (10.175.34.148) by HE1PR0802MB2474.eurprd08.prod.outlook.com (10.175.34.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1005.10; Tue, 28 Mar 2017 22:39:26 +0000
Received: from HE1PR0802MB2475.eurprd08.prod.outlook.com ([10.175.34.148]) by HE1PR0802MB2475.eurprd08.prod.outlook.com ([10.175.34.148]) with mapi id 15.01.0991.018; Tue, 28 Mar 2017 22:39:26 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: "Wheeler, David M" <david.m.wheeler@intel.com>, "teep@ietf.org" <teep@ietf.org>
Thread-Topic: Charter strawman proposal
Thread-Index: AdKn8psj9vu4dTTCT0CCPMegyCEPAAAAyoaAAAeKQnA=
Date: Tue, 28 Mar 2017 22:39:26 +0000
Message-ID: <HE1PR0802MB24757875E98E453BAFD35C40FA320@HE1PR0802MB2475.eurprd08.prod.outlook.com>
References: <HE1PR0802MB2475D750A62DFFAB28F1768CFA320@HE1PR0802MB2475.eurprd08.prod.outlook.com> <0627F5240443D2498FAA65332EE46C84366EA50D@CRSMSX102.amr.corp.intel.com>
In-Reply-To: <0627F5240443D2498FAA65332EE46C84366EA50D@CRSMSX102.amr.corp.intel.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=none action=none header.from=arm.com;
x-originating-ip: [31.133.136.32]
x-microsoft-exchange-diagnostics: 1; HE1PR0802MB2474; 7:+nmW/kZdHqCk3ge6loFA3b1vEbUmTXJbTpmotYRlhku1rIpgfHdAkrDdc3tJ83VZRDeDd+NOC01qQOwk9lbuBG9v1c1uRGBYQLeu0lU/akKF7FcDUpMwUWs4ZnLzlh8vasTXaCY74wpCpnNL3LHKqqoBVxBAMm0kK1+fTOL5Jky128ALksUAmPrI5I96+tk6WPaAPnwPJcyHFK9UQyogZT+Lqj1Pru4hcyu6sCVwRP4S3vDwNHwDqao8nVeZcQtJIqprYh++6WXip9LsWhCjAQcvw5mV/jKC3Sg0iQcbslxMgE6rbL/jCRANI73UjE2lmd6ocSHI9RfBxtthEYe+Xw==
x-ms-office365-filtering-correlation-id: a83d3fcf-2496-4be7-6922-08d4762b4a24
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254075)(48565401081); SRVR:HE1PR0802MB2474;
x-microsoft-antispam-prvs: <HE1PR0802MB24743284CD4857F4A19E7EC8FA320@HE1PR0802MB2474.eurprd08.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(158342451672863)(278428928389397)(192374486261705)(228905959029699);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040375)(601004)(2401047)(5005006)(8121501046)(3002001)(10201501046)(6055026)(6041248)(20161123562025)(20161123560025)(20161123558025)(20161123564025)(20161123555025)(6072148); SRVR:HE1PR0802MB2474; BCL:0; PCL:0; RULEID:; SRVR:HE1PR0802MB2474;
x-forefront-prvs: 0260457E99
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(6009001)(39850400002)(39410400002)(39450400003)(39840400002)(51414003)(13464003)(6116002)(3846002)(102836003)(3660700001)(99286003)(55016002)(6306002)(53936002)(9686003)(86362001)(25786009)(6246003)(38730400002)(5890100001)(2906002)(3480700004)(6506006)(6436002)(3280700002)(8936002)(8676002)(81166006)(2501003)(53546009)(77096006)(33656002)(2900100001)(561944003)(76176999)(189998001)(50986999)(54356999)(66066001)(229853002)(5660300001)(2950100002)(7116003)(122556002)(74316002)(7696004)(305945005)(7736002); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR0802MB2474; H:HE1PR0802MB2475.eurprd08.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 Mar 2017 22:39:26.3922 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0802MB2474
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/BvDvf8SOyOygj93Pv-6TDORr71U>
Subject: Re: [Teep] Charter strawman proposal
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Mar 2017 22:39:36 -0000

Thanks, David. Those are indeed useful suggestions. Your presentation today at the BOF also clarified some of these points and now make much more sense to me.

Let me try to incorporate your suggestions to see how well the text reads and whether it makes sense to others.

Ciao
Hannes

-----Original Message-----
From: Wheeler, David M [mailto:david.m.wheeler@intel.com]
Sent: 28 March 2017 14:18
To: Hannes Tschofenig; teep@ietf.org
Subject: RE: Charter strawman proposal

Hannes,
Thanks for drafting this. I look forward to great discussions around this topic. I have made some modifications below.

I have made the following types of modifications:
* a protocol is not required in every case, therefore, a protocol may be advantageous to the marketplace (but not a requirement)
a standard protocol will ease portability, create a level playing field/access for different TEEs, and
increase adoption for more secure devices
* a relay application on the rich OS side is not required - what is required is some service access onto the network stack for communications
It is possible for some TEEs to provide trusted stacks - a service access point must be accessible to protocol entities outside the device
* the server side architecture interacts with the application, but maintenance of the app is optional
* discovery of actual TEE capabilities is important as well

I think security domains is an area for discussion, so I leave that alone. But hope to have more discussions and a better understanding of the requirements around SDs in the future.

It might be useful to discuss other potential standards groups that we should be aligned with, especially in the IoT space.

Thanks,
Dave Wheeler

--------

TEEP -- A Protocol for Dynamic Trusted Execution Environment Enablement Charter

The Trusted Execution Environment (TEE) is a secure area of the main processor. The TEE, as an isolated execution environment, provides security features, such as isolated execution, integrity of Trusted Applications along with confidentiality of their assets. In general terms, the TEE offers an execution space that provides a higher level of security than a "rich" operating system and more functionality than a secure element. Implementations of the TEE concept have been developed by ARM, and Intel using the TrustZone and the SGX technology, respectively.

[It may be advantageous to build the marketplace to have a protocol that supports] programmatically install, update, and delete applications running in the TEE. [ This ] protocol runs between a [trusted service] running [within] the TEE, a relay application [or service access point on the device's network stack ] and a server-side infrastructure [ that interacts with and optionally maintains ] the applications. Since [ some tasks ( such as management tasks) ] are security sensitive where the server side requires information about the device capabilities (in form of attestation), the client-side demands server-side authentication, and privacy considerations have to be taken into account.

This working group aims to develop an application layer protocol providing TEEs with the following functionality,
 * discovery of TEE capabilities
 * management of trusted applications,
 * attestation, and
 * security domain management (which provides a logical space that contains the service provider's applications).

The solution approach must take a wide range of TEE technologies into account and will focus on the use of public key cryptography.

The group will produce the following deliverables. First, an architecture document describing the involved entities, their relationships, assumptions, the keying framework and relevant use cases. Second, a solution document that describes the above-described functionality. The use of the best possible encoding format will be decided in the working group. The group may document several attestation technologies considering the different hardware capabilities, performance, privacy and operational properties.

The group will maintain a close relationship with the GlobalPlatform to ensure proper use of existing TEE-relevant application layer interfaces and other abstractions used by GlobalPlatform-compliant TEE devices.

Milestones

Aug 2017     Submit "TEEP Architecture" document as WG item.

Oct 2017     Submit "TEEP Protocol" document as WG item.

Nov 2017     Participation in the IETF #100 Hackathon to work on the TEEP Protocol.

Dec 2017     Submit "TEEP Architecture" to the IESG for publication as an Informational RFC.

Mar 2017     Organization of an interoperability event at IETF #101.

Apr 2017     Submit "TEEP Protocol" to the IESG for publication as a Proposed Standard.

[1] Wikipedia, 'Trusted execution environment', URL: https://en.wikipedia.org/wiki/Trusted_execution_environment (March 2017).
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.

_______________________________________________
TEEP mailing list
TEEP@ietf.org
https://www.ietf.org/mailman/listinfo/teep
IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.