[Teep] Hardware for hackathons

Dave Thaler <dthaler@microsoft.com> Tue, 19 November 2019 02:16 UTC

Return-Path: <dthaler@microsoft.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2F0F91200B8 for <teep@ietfa.amsl.com>; Mon, 18 Nov 2019 18:16:13 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O2rGFqHlwRKl for <teep@ietfa.amsl.com>; Mon, 18 Nov 2019 18:16:07 -0800 (PST)
Received: from NAM02-BL2-obe.outbound.protection.outlook.com (mail-eopbgr750094.outbound.protection.outlook.com [40.107.75.94]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 53CB212002E for <teep@ietf.org>; Mon, 18 Nov 2019 18:16:07 -0800 (PST)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HtQpNmVfjzk5QNJdINKLEQDJoCINkCWAc+/YdxsesSU0Mgl68f9K2qXPOdKGMYneIKhp3W5O/L93MbrnNsCULfC1rn1Hx3rIwulwTGUfzxVw64Q1OLAbukb0s825WQL2m0/4Nq1AslI/8dh00g84NSA+41C4LYMhIj09Qp9s6zK+5MhXw4bbJFmzvTCNfUm8ChzbhRFUGNo5pVjYH/hImnntuGfe8m5f4gboVprET7cPi5Q3nvMHfxuQ0kM/jrnleZonKCbCRu6beWrJ/Ax+uvWXeP/O+HCifh89IYXdBBFxfHnrq73ayEpnQoJL0iZIrC5/j4u9Jgw2CpivZOkc9A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=T34bpki5OgN1U5+SOJVfe761fr/IhqFoF5T8uXQNh6A=; b=G2MlNUB5uLomVhP8UqC37DUpGKMIj5ahtNrH/06q7WDyw5HBJ5sCnU7t7ZQbXbwnb9YlQzpA6HoOH40nNPWWEV3ZdF886vWLG4toyT6Hk7dPgFbXuS9Vi2TA1kNzLUXD+NluXQCJ/WVHDEEcXAzGI5/oJp4/5oqeCopzgXgN0TUneWXZDCNQfnyi4AfxEqOUCOEFsmioWwBOf1xkNssFG4ud4v1j7K+/FlUb7P8Hvxroxz4uo0oQwDVku1SufiVXfvgfFRe0pdc4zLl/BqD++dtLxkeX4SzyMsDMZ8qKXjK4jBB2ji+kq1xdwp2dE1awAWQRQLRqN7z8+3ulrKl2vw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=T34bpki5OgN1U5+SOJVfe761fr/IhqFoF5T8uXQNh6A=; b=KK8+yX6WFDr0h9gIN7umGCl785mnzB+dwima15n482WCQOXA9ufGmsvQu5rdeByYbPZoiINjpuR2FakA1v4VgAq17sovTZKFtTsOKfu26RNXp87WXlCNNTg9tXXYwBWJAHnLmOxuU/hWhpPlO790rgzreGHkCjZ+vmGtLaJiG5w=
Received: from CY4PR21MB0773.namprd21.prod.outlook.com (10.173.192.19) by CY4PR21MB0792.namprd21.prod.outlook.com (10.175.121.146) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2495.3; Tue, 19 Nov 2019 02:16:04 +0000
Received: from CY4PR21MB0773.namprd21.prod.outlook.com ([fe80::48f6:a414:ac7d:e92]) by CY4PR21MB0773.namprd21.prod.outlook.com ([fe80::48f6:a414:ac7d:e92%11]) with mapi id 15.20.2495.004; Tue, 19 Nov 2019 02:16:04 +0000
From: Dave Thaler <dthaler@microsoft.com>
To: "teep@ietf.org" <teep@ietf.org>
Thread-Topic: Hardware for hackathons
Thread-Index: AdWef0pdz9KUdH7DRqu30fCyTdtLDg==
Date: Tue, 19 Nov 2019 02:16:04 +0000
Message-ID: <CY4PR21MB0773C2CEFF38942B2CA517C0A34C0@CY4PR21MB0773.namprd21.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Owner=dthaler@ntdev.microsoft.com; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2019-11-19T02:16:02.3781568Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=General; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Application=Microsoft Azure Information Protection; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=e9b56acb-48b4-4424-8448-3873745ed75f; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Extended_MSFT_Method=Automatic
authentication-results: spf=none (sender IP is ) smtp.mailfrom=dthaler@microsoft.com;
x-originating-ip: [31.133.156.163]
x-ms-publictraffictype: Email
x-ms-office365-filtering-ht: Tenant
x-ms-office365-filtering-correlation-id: b002499c-6b86-4a25-1953-08d76c966e18
x-ms-traffictypediagnostic: CY4PR21MB0792:
x-microsoft-antispam-prvs: <CY4PR21MB07925FBBF46B33BA06A00A2DA34C0@CY4PR21MB0792.namprd21.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7219;
x-forefront-prvs: 022649CC2C
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(39860400002)(376002)(346002)(366004)(396003)(136003)(189003)(199004)(64756008)(6436002)(10090500001)(6506007)(66946007)(66446008)(76116006)(66476007)(66556008)(606006)(316002)(52536014)(5640700003)(66574012)(102836004)(7736002)(5660300002)(99286004)(81156014)(81166006)(2501003)(8936002)(8990500004)(71190400001)(3846002)(790700001)(6116002)(8676002)(22452003)(71200400001)(1730700003)(25786009)(33656002)(2906002)(2351001)(66066001)(7116003)(10290500003)(236005)(478600001)(54896002)(6306002)(3480700005)(86362001)(476003)(9686003)(55016002)(6916009)(26005)(186003)(14454004)(4744005)(486006)(74316002)(14444005)(256004)(966005)(7696005); DIR:OUT; SFP:1102; SCL:1; SRVR:CY4PR21MB0792; H:CY4PR21MB0773.namprd21.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: SAwJAJGkBqvkssxP2SOzjh7Eem9sruKB5flSYfB9li8Z5IeY0mKVBCsVuk8NHFBvBKWQCqOLS67FW9BB3/NyfFaDmws7IOo3uzx/E+uVVh2+sCH7exKapptF+7CnE5/dUjYky9YUC5GcBfgsELcSM5rj20MTwP48JUfketxCs+aE1NYjhnZLmPyLdoHmCJNen/hsol6W2Pmj1D1xh8h7w98Yv4rOeYp+2Byr8nSO4xe6hsfmDfTNHidqj+aZco0DyoAaQPn/ZRf8D80H44uWUE5yhUOYwzw097O2q0km+AaS2+pbWoU4nNrRCCzjLqXYGkCAd4ld2u63hZqn6cUl+KTtv+IzLGRMJb9lV9pL2Zqcz6EjixVD5KEofgHdKOxwrtM4iQ+AjLMAXWaMO4A2miRGOe5X8wef/66V/bE1yJsADz8e/yhKArfQhgzyEgrLc6Pe31qm0J7RJfvVal+P2dR2oEn9BKdDmfwJn2Y63EY=
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_CY4PR21MB0773C2CEFF38942B2CA517C0A34C0CY4PR21MB0773namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b002499c-6b86-4a25-1953-08d76c966e18
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Nov 2019 02:16:04.3462 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: E79WMKceoG+poNcucF34ZaI212Kg5SZEqLPZ3Xf6KEKv9jk+hQtoa3ZsBP0J+byz8449goPPK6JutLwDGodZFHfyKmCKSFTsSiMHDMHJdGI=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR21MB0792
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/HCR4_B6w-IndpFa7dJ1GZWg51is>
Subject: [Teep] Hardware for hackathons
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Nov 2019 02:16:13 -0000

During the WG session today, in the discussion of potential hardware for future hackathons, I recommended the Grapeboard:
https://www.grapeboard.com/
This is an NXP Cortex A53 based board.

That's the board that's used in the commercial Scalys Trustbox routers:
https://scalys.com/trustbox-home-router/
which is the device that got the cybersecurity innovation award at CES 2019:
https://www.techrepublic.com/article/ces-2019-innovation-awards-honoree-trustbox-iot-security-router/

Dave