Re: [Teep] BoF call Mar 15th 7am PST (3pm CET, 10pm CST)

Mingliang Pei <Mingliang_Pei@symantec.com> Thu, 16 March 2017 21:09 UTC

Return-Path: <Mingliang_Pei@symantec.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 29936129A99 for <teep@ietfa.amsl.com>; Thu, 16 Mar 2017 14:09:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level:
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=symc.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IDtnVKwwotcG for <teep@ietfa.amsl.com>; Thu, 16 Mar 2017 14:09:39 -0700 (PDT)
Received: from tussmtoutape01.symantec.com (Tussmtoutape01.symantec.com [155.64.38.231]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E2A54129A90 for <teep@ietf.org>; Thu, 16 Mar 2017 14:09:38 -0700 (PDT)
Received: from tussmtmtaapi02.symc.symantec.com (tus3-f5-symc-ext-prd-snat2.net.symantec.com [10.44.130.2]) by tussmtoutape01.symantec.com (Symantec Messaging Gateway) with SMTP id 36.2A.30096.21FFAC85; Thu, 16 Mar 2017 21:09:38 +0000 (GMT)
X-AuditID: 0a2c7e31-bbf679a000007590-09-58caff12cabf
Received: from TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (tus3-f5-symc-ext-prd-snat9.net.symantec.com [10.44.130.9]) by tussmtmtaapi02.symc.symantec.com (Symantec Messaging Gateway) with SMTP id 95.D8.58529.11FFAC85; Thu, 16 Mar 2017 21:09:38 +0000 (GMT)
Received: from TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (10.44.91.34) by TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (10.44.91.34) with Microsoft SMTP Server (TLS) id 15.0.1236.3; Thu, 16 Mar 2017 14:09:36 -0700
Received: from NAM03-BY2-obe.outbound.protection.outlook.com (10.44.128.2) by TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (10.44.91.34) with Microsoft SMTP Server (TLS) id 15.0.1236.3 via Frontend Transport; Thu, 16 Mar 2017 14:09:36 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=symc.onmicrosoft.com; s=selector1-symantec-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=4ZKHclqxmNgqb79nklCAfGBbsHS/8SGhc+pN//Lr6B0=; b=EcV5KFd1r5UqcisqvR/ovqdiv2dC8GWrJBZWsqrWMvU7uyyJzOjho+qJAVZ4bCbc46eX2H6uDlVwDjMeijunxAJPF5UDbYfDLUdoJ0QsLCemO40prddHZ55oAkigncZgB26s0I0KWK/BzyDXqETfoKK0GZVCLg56d+NjsLDaUwM=
Received: from DM3PR16MB0554.namprd16.prod.outlook.com (10.164.245.138) by DM3PR16MB0554.namprd16.prod.outlook.com (10.164.245.138) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.977.11; Thu, 16 Mar 2017 21:09:35 +0000
Received: from DM3PR16MB0554.namprd16.prod.outlook.com ([10.164.245.138]) by DM3PR16MB0554.namprd16.prod.outlook.com ([10.164.245.138]) with mapi id 15.01.0977.010; Thu, 16 Mar 2017 21:09:35 +0000
From: Mingliang Pei <Mingliang_Pei@symantec.com>
To: "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>, "teep@ietf.org" <teep@ietf.org>
Thread-Topic: [Teep] BoF call Mar 15th 7am PST (3pm CET, 10pm CST)
Thread-Index: AQHSnZWt9ZSn/XlMHESjbbYmkOl/GaGVpjyAgAH0xoD//+ewAA==
Date: Thu, 16 Mar 2017 21:09:35 +0000
Message-ID: <D4F04CE0.30EC2%mingliang_pei@symantec.com>
References: <BE9BF4AF-46B1-486F-8C1D-77E730998309@cisco.com> <D4EEBD32.30C6D%mingliang_pei@symantec.com> <73B723F8-9209-4B48-9B93-543EE1686883@cisco.com>
In-Reply-To: <73B723F8-9209-4B48-9B93-543EE1686883@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.7.0.161029
authentication-results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=symantec.com;
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [155.64.23.3]
x-microsoft-exchange-diagnostics: 1; DM3PR16MB0554; 7:XRft6CDLV/LncT82QGBTjM2Ilwhl6a/jnXnlhbbAkkK3QYsnd7ivicLuNC5w7wiARRDs+nT/vJb77ikHh6k9m2w3BP71sljpvXwCwg0goN3ocQ1CqmKsesPxRQTVuckcXuVbtWCtUW+aKRnjyNXpl3Jrhp0IvBwCw8bGf85KKVjNbJ4n42cfwDqlU96JEgn5c6qCKEhPhFalBA3lxVBnrVManaaQefxstVubrLCJ6dEIj9xz/k6od6bl/nbXufZUttreIao4N6BM2vZYFBnw7Lzh4j8awCxnjoC7k6BY/UTr6V17SrKB07JoCcJh4Kr59jJ3uEt4ERL+zrTLPL4ifQ==
x-ms-office365-filtering-correlation-id: c26331af-21a7-464b-de48-08d46cb0bfcc
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:DM3PR16MB0554;
x-microsoft-antispam-prvs: <DM3PR16MB055483D0EDCA862B3C457513EC260@DM3PR16MB0554.namprd16.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(278428928389397)(192374486261705)(118321135141591)(94707916325470)(95692535739014)(198313997877955)(21748063052155);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040375)(601004)(2401047)(5005006)(8121501046)(3002001)(10201501046)(6041248)(20161123555025)(20161123564025)(20161123562025)(20161123558025)(20161123560025)(6072148); SRVR:DM3PR16MB0554; BCL:0; PCL:0; RULEID:; SRVR:DM3PR16MB0554;
x-forefront-prvs: 024847EE92
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39450400003)(66654002)(377454003)(3280700002)(2950100002)(122556002)(2906002)(3660700001)(6486002)(7736002)(4001350100001)(36756003)(8936002)(16799955002)(54356999)(7906003)(229853002)(2900100001)(83506001)(10290500002)(2501003)(189998001)(5660300001)(53936002)(76176999)(99286003)(6436002)(50986999)(102836003)(236005)(6512007)(6506006)(6116002)(6306002)(86362001)(66066001)(77096006)(54896002)(81166006)(15187005004)(8676002)(6246003)(38730400002)(606005)(25786008)(551544002)(80792005)(53546008); DIR:OUT; SFP:1101; SCL:1; SRVR:DM3PR16MB0554; H:DM3PR16MB0554.namprd16.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_D4F04CE030EC2mingliangpeisymanteccom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Mar 2017 21:09:35.2125 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 3b217a9b-6c58-428b-b022-5ad741ce2016
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM3PR16MB0554
X-OriginatorOrg: symantec.com
X-Brightmail-Tracker: H4sIAAAAAAAAA02Sa0iTURjHO+/7zr2ORsep+WhEMvJDanNLQSUVCwoDowuEWoEtfcvhbWxT shuu/KBh4q2yWWo1jTTJCZGJ+mEIpjTXRVnl8JaVtXLecImyte2d4ZfD7//8n8t5DocmBQOc IFqWp2IUedIcoReP4oXfIPYKHEOpYuuzwJjq2hoipnl9hUwkkmrXdJwkrXaVOE6c5sVlMjmy QkYRkXCOl9X74S9X/rmBuNQyMkkUo851dAt504CjwPrS4GQeLcCLCCb75v4bHy1tBGvYEFQa l7ms6EegGawhWTGL4HW/neMSFC4joapt2uPUEVBS102x4g2C99+6nA1o2guL4Z05zzXED6fB qKOPcrEvPgANq88JNn4QGqdM1AZPz1vcTOEQGFYvcF3Mx9Ggta96hj1EUKd3cFyGN46HiTtv SRcjvB1sQ2xTEgfAl5lGgt0Og7bHSLLsDz+/2t21/lgE9bXF7kURvo2ga2yAYpPCwWCa8TzN LjCMqd2bAS4n4bHhnqfTURiZMKMNHi/r8xRng3qpisMWNCBYslRzWaEhYLRigqpEIs2mK7J8 Fhb0Okrj3tUHBu/PUGxcDNbhRpLlMGh5ZPFwBOiWDYjlJOgY7+ZszmlCdCsKVhUolbmq/AKV VM6IJSJlUW6G65A6P1eGKCM/txO5v9d1SRea7kjWI0wj4Vb+TttQqoAjLXRm6hHQpNCPnzLp DPEzpUWXGUV+uqIgh1Hq0Q6aEgbwjd/bUwX4olTFZDOMnFFsuATtHVSM0lTxh3rvXuHKXjWf SoxRfQrrzEqJPxbiW/LAYSkPi22ym7svhG7bP744dT6yUBw9vyCPvVpiespt1f0p5NXHrW8p C7zm2PekeveKwOf3j+Qz3PLSuSNeRmt6RW7kWnA/JyG2XW1+MX94j+nXzahjbb1am0yyOLue 0XMiuLTK72S3kFJmSSWhpEIp/Qcqui9OWgMAAA==
X-Brightmail-Tracker: H4sIAAAAAAAAA02Sa0iTYRTHed6Le7dcPk7No9nNikRtakVKmGQRGFT0oYtalC82nOjW2MVL dNGwD7MSb+FataVMoZRsQqBWhssyJTXTtFJcqUExqGSmaaa5va/gl4ff/1yfczgMKamjA5l0 pVamVrKZwR4iShR+RbhVstCZGDkx5htTWl5GxFTPTZF7iITyv1Y6wWKZIY4QyaLYs7LM9CyZ OiIuRSR/9u6PQPXRROTU9H8m8lDDHCpEQgbwDuhz1BKFSMRI8DSC4p5JASfaEBg7ykhOfEPQ 1DZPuwSF9SSU1I7yHgMBBYZmihOvEfR+bVwswDAeOBLeDitdTXxxErxfaKFc7IPjwTRTR3D2 vWD+Mkgt8egvh5spvBm68ycELhbjaLDMz/DN7iIw2BZol0OId4P95hvSxQivgulOriiJ/eHT uJngpsNgedpDcuwH38fm3bl+WAq3y/PcgyJ8A0HjUDvFBYVD1+A4v5p10DWU754M8HUSqroq +EqHoN8+jJZ4RN/CJ2dAvrOE5hJMCJyOUgEnjAS8L7LzUUHw0lrHlzXSUGppRsUo1Ljs7xyf ggmblTK6l+ANHbfGKc4eCT+7zSTHYVBT6eA5AqyTXYjjBHg00kwvj7mHmAdovVan0Si0Ci3L qtIjt0k1uYpU18MuHleqNPWcogG5z2tfQCOyzR20IcygYE8xNncmSmg2azHShlYzVLC/2BnV kCjBaaxWliGTqWTqM2pdpkxjQwQjDMxDwqTTYVerfdSzO1eUrnms824PDBwgAl7IY7dn600D ypDLXnLyd9xzvfR4eQraeCDebq8OrXjYW0z/W9nWeiJ6l65QajhZ271QlN0kbb22iTh84ZK2 W/ehvmVL8rE+L8PaIM/6oA1p9+FVVcidIZUz64e2cnZ/7pTookn8pOD80ZxgSiNno0JJtYb9 D2LgkzU/AwAA
X-CFilter-Loop: TUS01
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/LXZd35TSj9TPZeBd0uNJOvboGl0>
Subject: Re: [Teep] BoF call Mar 15th 7am PST (3pm CET, 10pm CST)
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 16 Mar 2017 21:09:42 -0000

That you Nancy for the addition. On participants, I had Henk first and somehow missed in the copy. Ming

From: "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com<mailto:ncamwing@cisco.com>>
Date: Thursday, March 16, 2017 at 11:36 AM
To: Mingliang Pei <mingliang_pei@symantec.com<mailto:mingliang_pei@symantec.com>>, "teep@ietf.org<mailto:teep@ietf.org>" <teep@ietf.org<mailto:teep@ietf.org>>
Subject: Re: [Teep] BoF call Mar 15th 7am PST (3pm CET, 10pm CST)

Hi Ming,
Many thanks for taking and providing the notes for today’s prep call!

I have a couple of additions to make below:

From: Mingliang Pei <Mingliang_Pei@symantec.com<mailto:Mingliang_Pei@symantec.com>>
Date: Wednesday, March 15, 2017 at 9:44 AM
To: "ncamwing@cisco.com<mailto:ncamwing@cisco.com>" <ncamwing@cisco.com<mailto:ncamwing@cisco.com>>, "teep@ietf.org<mailto:teep@ietf.org>" <teep@ietf.org<mailto:teep@ietf.org>>
Subject: Re: [Teep] BoF call Mar 15th 7am PST (3pm CET, 10pm CST)

Meeting minutes for today’s call. Please correct or update if I have missed some major points. Thanks, Ming

————

TEEP meeting
03/14/2017

Participants: Nancy Cam-Winget, Kathleen Moriarty, Brian Witten, Dave Wheeler, Nick Cook, Mingliang Pei, Rashid Sangi, Tero Kivinen, Jeremy O’Donoghue, Tirumaleswar Reddy, Dapeng Liu, Michael Richardson
 [NCW] Henk Birkholz was also on the call.

Nancy hosted the meeting. Ming started to give a summary of use cases and comments by Michael in the mailing list.

Michael clarified that he wants to know why a smart door lock needs this where only a trusted environment is there. We (Brian, Hannes, Ming etc.) discussed that there are still needs to define trust where application injects TA from insecure side, being network, remote, or update.

The discussion indicates that we need to better see what the problem the charter tries to solve, who are stakeholders etc.

Dave suggested that we don’t put use cases too close to implementation. Some resource constraint devices don’t have full TEE.

Jeremy noted that some audiences don’t all know TEE. Hannes will introduce TEE in the BoF. To this note, Hannes prefers someone from Intel to introduce Intel SGX.

Nancy summarized two asks so far: introduction of TEE to set stage, and secondly show why the work needs to be done in IETF.

Nancy raised a personal view that we shouldn’t prescribe hardware architecture, and even there must be a hardware required to isolate. Some research has been using SW for isolation. People agree that this should be independent of hardware, ARM or Intel (SGX). On the requirement of hardware, this is generally considered yet – some isolation done by hardware and scope of assumption. We don’t want to get into a research project for the IETF work.
[NCW] My point on this was to raise 2 points: ensuring that the interfaces and protocols are hardware agnostic, and to the security aspects, how can assurance (or acknowledgement or attestation?) be provided that there is a true hardware based isolation.
I believe Henk also raised some points about the need for such attestation.

Dave from Intel indicated that SGX won’t have a root of trust at firmware level. Current OTrP assumes a trust from firmware to above. We will need to adjust on this as part of the IETF work.

Ming noted that we should work to define the scope of the spec this charter tries to address. We cannot leave it too open to solve everything. The current assumption of TEE presence is one. The assumption of hardware presence is one. Multiple different TEEs support and hardware independence are basic in scope assumption etc.

Jeremy raised a need to ensure specific interests should be guarded away from this work, and some kind of gate keeper (?). Brian commented to fully concur, and our work wants multiple TEEs, CAs etc. for competition and development. This doesn’t fully address Jeremy’s question, and we can think more.

Nick suggested that we also name sample applications that may make use the work while describing use cases.

To summarize, we came away with the following several planning work for BoF session candidates:


-          Clarify charter statement during BoF. From the call, not all people agree or have the same background with TEE, SGX and so on.

-          Introduction of TEE (Hannes, Dave on Intel SGX). A colleague of Dave will be attending BoF. Dave may join remotely.

-          Drive to define problem scope.

-          Discuss use cases that are in scope and those may be not

o   Discuss applications that may make use of the work of this charter, which can provide more concrete context.

-          Discuss stakeholders and protocol architecture

-          [NCW] Shaping what a charter might look like (I think Hannes may also start providing a template for this)

Action items:

-          Dave Wheeler from Intel provides SGX introduction slide, and prepare to present at BoF by his colleague, and him remotely

-          Discuss in mailing list to clarify charter and problem domain scope, use cases.

-          Discuss offline to clarify concerns Jeremy raised for openness / gate keepers (?)


From: TEEP <teep-bounces@ietf.org<mailto:teep-bounces@ietf.org>> on behalf of "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com<mailto:ncamwing@cisco.com>>
Date: Wednesday, March 15, 2017 at 7:08 AM
To: "teep@ietf.org<mailto:teep@ietf.org>" <teep@ietf.org<mailto:teep@ietf.org>>
Subject: Re: [Teep] BoF call Mar 15th 7am PST (3pm CET, 10pm CST)

All,

We are about to start the BoF now….please join the webex if you want to participate.

Thanks!  Nancy

From: TEEP <teep-bounces@ietf.org<mailto:teep-bounces@ietf.org>> on behalf of "ncamwing@cisco.com<mailto:ncamwing@cisco.com>" <ncamwing@cisco.com<mailto:ncamwing@cisco.com>>
Date: Saturday, March 11, 2017 at 5:10 PM
To: "teep@ietf.org<mailto:teep@ietf.org>" <teep@ietf.org<mailto:teep@ietf.org>>
Subject: [Teep] BoF call Mar 15th 7am PST (3pm CET, 10pm CST)

All,
We had a good majority for Mar 15th 7am PST (3pm CET, 10pm CST);  I’ve setup a webex for that time slot
Please see info below.

Please send us agenda items for the upcoming call.

Thanks, Nancy



JOIN WEBEX MEETING
https://cisco.webex.com/ciscosales/j.php?MTID=me9216d73c5905ad78110499a8c7c12bf
Meeting number (access code): 207 779 570
Meeting password: KEQ52p3W (53752739 from phones)



JOIN FROM A VIDEO SYSTEM OR APPLICATION
Dial sip:207779570@cisco.webex.com<mailto:207779570@cisco.webex.com>
>From the Cisco internal network, dial *267* and the 9-digit meeting number.  If you are the host, enter your PIN when prompted.


JOIN BY PHONE
+1-408-525-6800 Call-in toll number (US/Canada)
+1-866-432-9903 Call-in toll-free number (US/Canada)

Global call-in numbers:
https://cisco.webex.com/ciscosales/globalcallin.php?serviceType=MC&ED=379001592&tollFree=1

Toll-free dialing restrictions:
https://www.webex.com/pdf/tollfree_restrictions.pdf



Can't join the meeting?
https://help.webex.com/docs/DOC-5412


IMPORTANT NOTICE: Please note that this WebEx service allows audio and other information sent during the session to be recorded, which may be discoverable in a legal matter. By joining this session, you automatically consent to such recordings. If you do not consent to being recorded, discuss your concerns with the host or do not join the session.