Re: [Teep] Security domain default 1-to-1 mapping to a TA proposal in TEEP

Mingliang Pei <Mingliang_Pei@symantec.com> Mon, 11 March 2019 06:29 UTC

Return-Path: <Mingliang_Pei@symantec.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 995AC130FC4 for <teep@ietfa.amsl.com>; Sun, 10 Mar 2019 23:29:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.301
X-Spam-Level:
X-Spam-Status: No, score=-4.301 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=symantec.com header.b=h/xNb07I; dkim=pass (1024-bit key) header.d=symantec.com header.b=FOLn7Kfq
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NqCajBDrjWpc for <teep@ietfa.amsl.com>; Sun, 10 Mar 2019 23:29:39 -0700 (PDT)
Received: from asbsmtoutape02.symantec.com (asbsmtoutape02.symantec.com [155.64.138.34]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 37F82130FB4 for <teep@ietf.org>; Sun, 10 Mar 2019 23:29:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; d=Symantec.com; s=2; c=relaxed/simple; q=dns/txt; i=@Symantec.com; t=1552285778; x=2416199378; h=From:Sender:Reply-To:Subject:Date:Message-ID:To:CC:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:List-Id: List-Help:List-Unsubscribe:List-Subscribe:List-Post:List-Owner:List-Archive; bh=1hG0bxQh9bOjLDvkVp85bNBGRu4mO68F7UYlZvNpXzs=; b=h/xNb07IH551tLY40CrSloI7Tx22hCVqEIpGaFubfeKe99ES+6Sm315YRe0K5yEM 3Ffq99nCOUddYy0hm/7Y8bqQERgIbEZK/GmJQMLIYTsBFCCsbE0F7OFJhd9+HrCF jNcidkecnraWCU/tSyUkAAx+fH8jCefpucub4T+dX24=;
Received: from asbsmtmtaapi02.symc.symantec.com (asb1-f5-symc-ext-prd-snat10.net.symantec.com [10.90.75.10]) by asbsmtoutape02.symantec.com (Symantec Messaging Gateway) with SMTP id 0C.30.06079.150068C5; Mon, 11 Mar 2019 06:29:37 +0000 (GMT)
X-AuditID: 0a5af81a-58aaf9e0000017bf-3d-5c860051119f
Received: from TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (asb1-f5-symc-ext-prd-snat9.net.symantec.com [10.90.75.9]) by asbsmtmtaapi02.symc.symantec.com (Symantec Messaging Gateway) with SMTP id 36.B1.05863.150068C5; Mon, 11 Mar 2019 06:29:37 +0000 (GMT)
Received: from tus3xchcaspin01.SYMC.SYMANTEC.COM (10.44.91.13) by TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (10.44.91.34) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Sun, 10 Mar 2019 23:29:36 -0700
Received: from NAM03-BY2-obe.outbound.protection.outlook.com (10.44.128.7) by tus3xchcaspin01.SYMC.SYMANTEC.COM (10.44.91.13) with Microsoft SMTP Server (TLS) id 15.0.1395.4 via Frontend Transport; Sun, 10 Mar 2019 23:29:36 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=symantec.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1hG0bxQh9bOjLDvkVp85bNBGRu4mO68F7UYlZvNpXzs=; b=FOLn7KfqGn+nP9Kaqs8DkX/mWv4AO/9UP3wEMLaoc625CRDltpMgvm1vi3d/zXvWYnLpNKVNlnkGdPLW3luq/Vf1nJzwIC7L8oG46sfxNDJF2MJgoZELpO62Lo0NyXqxdN3IERlXMyrPuGip5wkbN73MjGEqiAf5bIf/1ZvrhaY=
Received: from BY2PR16MB0854.namprd16.prod.outlook.com (10.164.172.140) by BY2PR16MB0725.namprd16.prod.outlook.com (10.164.171.151) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1686.19; Mon, 11 Mar 2019 06:29:33 +0000
Received: from BY2PR16MB0854.namprd16.prod.outlook.com ([fe80::7cd8:ec4e:f89c:82a6]) by BY2PR16MB0854.namprd16.prod.outlook.com ([fe80::7cd8:ec4e:f89c:82a6%7]) with mapi id 15.20.1665.022; Mon, 11 Mar 2019 06:29:33 +0000
From: Mingliang Pei <Mingliang_Pei@symantec.com>
To: Benjamin Kaduk <kaduk@mit.edu>
CC: Andrew Atyeo <andrew.atyeo@intercede.com>, "teep@ietf.org" <teep@ietf.org>
Thread-Topic: [Teep] Security domain default 1-to-1 mapping to a TA proposal in TEEP
Thread-Index: AQHU1VKRZgbX2HkEAk2k301Fswqim6YBZXtwgAB5yXqAAzrnAIAAbW2A
Date: Mon, 11 Mar 2019 06:29:33 +0000
Message-ID: <342E858A-7A4F-41EF-9E2F-1AFFF58ED590@symantec.com>
References: <F78A61D4-9B6B-4E83-8CF7-0C49E08718A9@symantec.com> <DB7PR10MB23489BA35BD7CDF8406DC6A9954D0@DB7PR10MB2348.EURPRD10.PROD.OUTLOOK.COM> <BY2PR16MB0854FBE72F059CDA5C0D45DDEC4D0@BY2PR16MB0854.namprd16.prod.outlook.com> <20190310165755.GA8182@kduck.mit.edu>
In-Reply-To: <20190310165755.GA8182@kduck.mit.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.d.1.180523
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Mingliang_Pei@symantec.com;
x-originating-ip: [65.118.77.72]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 9b2aed42-835e-4abd-61b8-08d6a5eaed18
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600127)(711020)(4605104)(2017052603328)(7153060)(7193020); SRVR:BY2PR16MB0725;
x-ms-traffictypediagnostic: BY2PR16MB0725:
x-ms-exchange-purlcount: 6
x-microsoft-exchange-diagnostics: 1;BY2PR16MB0725;23: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
x-microsoft-antispam-prvs: <BY2PR16MB0725FBE2F3D25DA3AEBB0343EC480@BY2PR16MB0725.namprd16.prod.outlook.com>
x-forefront-prvs: 09730BD177
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(346002)(39850400004)(396003)(366004)(376002)(199004)(189003)(76176011)(54906003)(2906002)(15650500001)(14444005)(256004)(68736007)(93886005)(10290500003)(36756003)(66066001)(58126008)(71190400001)(71200400001)(6916009)(97736004)(105586002)(229853002)(83716004)(6486002)(99286004)(6116002)(106356001)(3846002)(561944003)(33656002)(8936002)(53936002)(81156014)(8676002)(6512007)(81166006)(6506007)(6306002)(5660300002)(7736002)(80792005)(6436002)(2171002)(186003)(305945005)(102836004)(26005)(2616005)(4326008)(478600001)(486006)(82746002)(14454004)(316002)(72206003)(966005)(6246003)(86362001)(446003)(11346002)(53546011)(25786009)(476003); DIR:OUT; SFP:1101; SCL:1; SRVR:BY2PR16MB0725; H:BY2PR16MB0854.namprd16.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: symantec.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: G9HxmL5AbeSKLIilicfcbdxzaSW57KsJl8f5eaw93p806FGYX9hV3ARqe1nJbW+xnG8NVNA1+ePoGRpFJe/Y4LUcMxTh0X4lBftNUkO6G5bd7sz6a+ReOesFoNFoUgRNiNVCfsJW1uqIho7FLq1/FK9MdE/ogNF4GQqvkbg8vwHDYjnoNv2B6zpkMc4su0PvjLAzl94mje5VU97+cMfx5G2E/JKxrcPuPwXZ+b6JvFbnvz0S404hJwhijlHk5Sk5Z1DWQEztopL7KTyeO0o+3v3LCzgBiZwEgcZdE5PVWgu0iN3UMXaZ/mOVLZ4tL+xFtDVjAmNyBi94S+5fY2KY3Kf75BNCeOf/68LG83cRR8brW1IQlXUK/TOIFnWk7fEVjeLwoswxcoBRpgpGCT5v6oF4vAM0JhtsPjXkeFzrlfE=
Content-Type: text/plain; charset="utf-8"
Content-ID: <33191D00F9A2D04AAFF7F0FB7AEC9640@namprd16.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 9b2aed42-835e-4abd-61b8-08d6a5eaed18
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Mar 2019 06:29:33.7091 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 3b217a9b-6c58-428b-b022-5ad741ce2016
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY2PR16MB0725
X-OriginatorOrg: symantec.com
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFlrKKsWRmVeSWpSXmKPExsXCFeXNpRvI0BZj8OeckcWOb/uZLJZvnMlk sfTPN2YHZo8lS34yeWxY8IDJo+nMUeYA5igum5TUnMyy1CJ9uwSujBd9C1gKGvQqllzoYm5g fKHTxcjJISFgIvGk4Rp7FyMXh5DAZ0aJt58Ws8Mkul+vY4NIfGOUmP+1kRXCOcoocW3FHlaQ KiGBl4wSdxtkQBIsAhOYJbb//MYEUTWVSWLCvXdQLY8YJVqnfwAaxsHBJmAgceFOHki3iICS xOKzLWwgNrOAn8TTA8uYQWxhgVCJiwfvsUDUhElM2tjNBmG7SSw6Op0JxGYRUJVo3PUR7FZe AXuJB1s2MEFc1MsksWtfHIjNKWAkcWBqK1icUUBM4vupNUwQu8Qlbj2ZzwTxp4DEkj3nmSFs UYmXj/+BfSYqoCfRs/MqG0RvrMTPlgeMEDUKEp837GOBsGUlLs3vhor7Sjxfd5YF5F8JgZuM EoePvYMaqiWx6N0TKFtK4uadpdAAbhSRWLxMewKjySwkN80CBhGzgKbE+l36EGEPiee/1jND 2IoSU7ofss8Ce1lQ4uTMJywLGFlXMSokFicV55bkl5YkFqQaGOkVV+Ymg4hEYNJJ1kvOz93E CE48P6R2MD6543OIUYCDUYmH1+19a4wQa2IZUOUhRgkOZiUR3nurgEK8KYmVValF+fFFpTmp xYcYpTlYlMR5N30vjhYSSE8sSc1OTS1ILYLJMnFwSjUw5hWsWcn8etWptuVX/4gf3Flrckvi Se7mz6ovTL3FWhIdftieSnq40VNlU12pZvVV++X77fl+qDcY7DF67MIyS98xVadu8TuRg8ms CY5ymslpPKEznuXz3vsc/yPCznriYW5NlYjvtVs0+cr71glEnObKVXdYvJrrWsfvnXmebXwt YV6sf/YrsRRnJBpqMRcVJwIApuJhTTgDAAA=
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFupkleLIzCtJLcpLzFFi42LhivLm1A1kaIsx2Lhbz2LHt/1MFss3zmSy WPrnG7MDs8eSJT+ZPDYseMDk0XTmKHMAcxSXTUpqTmZZapG+XQJXxou+BSwFDXoVSy50MTcw vtDpYuTkkBAwkeh+vY6ti5GLQ0jgG6PE/K+NrBDOUUaJayv2sIJUCQm8ZJS42yADkmARmMAs sf3nNyaIqqlMEhPuvYNqecQo0Tr9A9AwDg42AQOJC3fyQLpFBJQkFp9tYQOxmQX8JJ4eWMYM YgsLhEpcPHiPBaImTGLSxm42CNtNYtHR6UwgNouAqkTjro/sIDavgL3Egy0bmCAu6mWS2LUv DsTmFDCSODC1FSzOKCAm8f3UGiaIXeISt57MZ4L4U0BiyZ7zzBC2qMTLx//APhMV0JPo2XmV DaI3VuJnywNGiBoFic8b9rFA2LISl+Z3Q8V9JZ6vO8sC8q+EwE1GicPH3kEN1ZJY9O4JlC0l cfPOUnYIu1FEYvEybQg7W+Lhv91QB8lIzJr9gH0Co8EsJLfOAgYds4CmxPpd+hBhD4nnv9Yz Q9iKElO6H7LPAgeFoMTJmU9YFjCyrmJUSCxOKs4tyS1JTCzINDDSK67MTQYRicCUk6yXnJ+7 iRGcdn6L72A898fnEKMAB6MSD29CcmuMEGtiGVDlIUZpDhYlcd7NMV+ihQTSE0tSs1NTC1KL 4otKc1KLDzEycXBKNTDm7Dv3TnF616FbPfN4033LlPP4pHOzo2y/LHj8fbtt8taMZ+uvpb3d Xs9TEi55+l+BwoItU4/di1tgp3ZS3vPRFVVWvg3yAWGFQkXuduyf/I7lJLz4f23houcNZQdf GlxrP6URqNwfECm8TZo3/3w7u90vwwUTLlm/jrN0Ofr+X9EyrhJdcxMlluKMREMt5qLiRACn 5UhaHAMAAA==
X-CFilter-Loop: ASB01
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/KqHqOlsV0EUW7bb17qbZqONR4M0>
Subject: Re: [Teep] Security domain default 1-to-1 mapping to a TA proposal in TEEP
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Mar 2019 06:29:43 -0000

Thanks Ben, will do, Ming

On 3/10/19, 9:58 AM, "Benjamin Kaduk" <kaduk@mit.edu> wrote:

    It would probably be good to get a summary of the discussion posted on the
    list once it's settled down, for archival purposes.
    
    -Ben
    
    On Fri, Mar 08, 2019 at 03:39:02PM +0000, Mingliang Pei wrote:
    > Thanks Andy, will follow up updates on the github, Ming
    > 
    > Sent from iPhone
    > 
    > ________________________________
    > From: Andrew Atyeo <andrew.atyeo@intercede.com>
    > Sent: Friday, March 8, 2019 1:42 AM
    > To: Mingliang Pei
    > Cc: teep@ietf.org
    > Subject: RE: Security domain default 1-to-1 mapping to a TA proposal in TEEP
    > 
    > Hi,
    > I have updated the github issue with my comments
    > https://clicktime.symantec.com/3UZcZZ4xTSsNvytS9paFjkp7Vc?u=https%3A%2F%2Fgithub.com%2Fietf-teep%2Farchitecture%2Fissues%2F7<https://clicktime.symantec.com/3DtasvM638D48u9sEW2edx47Vc?u=https%3A%2F%2Fgithub.com%2Fietf-teep%2Farchitecture%2Fissues%2F7>
    > 
    > basically I understand that there are some deployment types that might prefer a simpler approach, but I want to make sure that we know what would be ‘lost’ by not having a SD that is created separately. It might be that for some deployments the loss is no problem, or it might be that there could be alternative ways to give the same functionality but without need for a separate createSD that are worth exploring.
    > The github issue (link above) hopefully explains this better.
    > 
    > Regards,
    > 
    > Andrew Atyeo
    > Security Architect
    > Intercede
    > Digital trust    people ǀ devices ǀ apps
    > Office: +44 (0) 1455 558 111
    > https://clicktime.symantec.com/3VJerJ8soKqVyMNkw4JWG3s7Vc?u=www.intercede.com<https://clicktime.symantec.com/3Gqczp4aRiNtTy5rmhmPUeK7Vc?u=https%3A%2F%2Fwww.intercede.com%2F>
    > Legal Disclaimer <https://clicktime.symantec.com/3NQrLHmW1wfB1dzjQvLeV5f7Vc?u=https%3A%2F%2Fwww.intercede.com%2Fprivacy-cookies>
    > From: Mingliang Pei <Mingliang_Pei@symantec.com>
    > Sent: 08 March 2019 02:00
    > To: Andrew Atyeo <Andrew.Atyeo@intercede.com>
    > Cc: teep@ietf.org
    > Subject: Security domain default 1-to-1 mapping to a TA proposal in TEEP
    > 
    > Hi Andy,
    > 
    > We are working on to close this issue #7: clarifying meaning of Security Domain (SD)
    > 
    > https://clicktime.symantec.com/3UZcZZ4xTSsNvytS9paFjkp7Vc?u=https%3A%2F%2Fgithub.com%2Fietf-teep%2Farchitecture%2Fissues%2F7<https://clicktime.symantec.com/3DtasvM638D48u9sEW2edx47Vc?u=https%3A%2F%2Fgithub.com%2Fietf-teep%2Farchitecture%2Fissues%2F7>
    > 
    > We want to simplify it, and propose to create a SD per TA by default, without completely removing the SD for some existing use cases. It will be good to also have your input on the implications, considering you have more involved in this with a prior OTrP TAM POC implementation. Could you review the issue, and provide comments there?
    > 
    > Here is a quick recap on some discussion reasonings.
    > 
    > Historically we consider Security Domain as a first class entity in TEEP (OTrP). There have been some desires to simplify it, or not require it in the TEEP architecture as some use cases don’t use it as much as potential IoT use cases. On the other hand, we know that existing TEE implementations and other secure element related practices uses SD to isolate and associate protection boundary. There was some resource constraints on number of SDs that can be allocated in a TEE device.
    > 
    > To achieve broad support of both worlds, we consider to move to an “implicit” model as follows:
    > 
    > 
    >   *   One SD is created per TA when a TA is going to installed. This allows creation of TA without going through explicit SD creation and so on.
    >   *   The prior deletion of SD will delete all TAs within the same SD. Now each TA will be required to be explicitly deleted.
    > 
    > Thanks,
    > 
    > Ming
    > 
    
    > _______________________________________________
    > TEEP mailing list
    > TEEP@ietf.org
    > https://clicktime.symantec.com/3MCf2NsshWc1XzMuSUWKTSB7Vc?u=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fteep