Re: [Teep] Hardware for hackathons

Akira Tsukamoto <akira.tsukamoto@gmail.com> Wed, 27 November 2019 12:41 UTC

Return-Path: <akira.tsukamoto@gmail.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6AC03120932 for <teep@ietfa.amsl.com>; Wed, 27 Nov 2019 04:41:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cNHkVkTbaHrK for <teep@ietfa.amsl.com>; Wed, 27 Nov 2019 04:41:16 -0800 (PST)
Received: from mail-wm1-x32e.google.com (mail-wm1-x32e.google.com [IPv6:2a00:1450:4864:20::32e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E3FF51208AD for <teep@ietf.org>; Wed, 27 Nov 2019 04:41:15 -0800 (PST)
Received: by mail-wm1-x32e.google.com with SMTP id y5so7290385wmi.5 for <teep@ietf.org>; Wed, 27 Nov 2019 04:41:15 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=+dgC3Fs0W8CK8/SqD+jmrqn2ubbGArNpisXBXWoDU7E=; b=iezeXAuRnO7rI5nlPNwi77Iitp+jc5BI4pYr2Do7SAsnVS6k9FYL17CxZX0QugKrU+ UPIdI+jVliEv5ZBVEE2xV9MTRcvYX7mEtyXnXojUaALbllga5QvNMP65+akXmWenHjXJ yuADiz9JZYax98vTtV1uvXelNpo5tifolws6KTkhywFq0RDwl0+2TcVmiI2TNrEOlUwS RIi5Z8DnVEX6gsHghJKCWcKAyKp5KBftgLnkzLdDCTKfsLbjfnc0vxwFiEWkHCR4UGGT 1GNRZExCAB6c5/HWpHkZpQrurtmRizXXYkbrHEVjJ166eBOLDWCFmahyis3aCDCcOsHP qnmQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=+dgC3Fs0W8CK8/SqD+jmrqn2ubbGArNpisXBXWoDU7E=; b=jJQBjUj+/f4aelacfvGhAtjE8TKfiN54hAWhr+D/EDYURGEQhDgq6Tmskd4PQzfyAE TSJXgtH0LqHNoUmifWyLvF2rmXGwrfYOvNva64LyqsYO1gLqxnQFlRsWiFKY7fTyOe3z q3A8sddpXckzxWL76Fh6Qj0jU96nMfnKBKCiSVvH/PG5NCO3K96j87k8OkcHCSHjKdIL NCLtbGhZFAVM1QzWtN9dADzLM9JHMun5Pk1DnH6eCjS8yBufjUyjuL1u7ETT0kK/uJC+ HLP1qW//9kppUKc1BA0JVaExoBzt8bzZP3lfB7WEQgklBXEThdEPL9Hn6YW9td2qWfgb yzaw==
X-Gm-Message-State: APjAAAX60zIWvnp0iebwuB045IiufkMa/hT8Hb+dsYfvklyzFzpwmpaN Nxp0mQ1PgkTu0Pspg+ckK3WxrwAyogfAADTJz0A=
X-Google-Smtp-Source: APXvYqzSzR/A2uDmaKXTCz1lEhSMnDTEeJrOn6YcwnEyR5YjqhZKwK0KXiKAeTUN8OhYbLw6nhyanZaT2xebo7Q5aXM=
X-Received: by 2002:a1c:2846:: with SMTP id o67mr4272339wmo.7.1574858474119; Wed, 27 Nov 2019 04:41:14 -0800 (PST)
MIME-Version: 1.0
References: <CY4PR21MB0773C2CEFF38942B2CA517C0A34C0@CY4PR21MB0773.namprd21.prod.outlook.com> <CACuRN0NQSizzuqScEQJZJJwegsdJHi8mi=Gp_kqpK4CsJ2-OSQ@mail.gmail.com> <CACuRN0Pz=L0vS4ek81UPyFf7SGjTWecbfugHGJ=JBNTUFvQ=VQ@mail.gmail.com>
In-Reply-To: <CACuRN0Pz=L0vS4ek81UPyFf7SGjTWecbfugHGJ=JBNTUFvQ=VQ@mail.gmail.com>
From: Akira Tsukamoto <akira.tsukamoto@gmail.com>
Date: Wed, 27 Nov 2019 21:41:05 +0900
Message-ID: <CACuRN0MS+aycTeGWJuB1r7z6LNsXFSBVeyCdaWSQL=PL0nhPpg@mail.gmail.com>
To: Dave Thaler <dthaler=40microsoft.com@dmarc.ietf.org>
Cc: "teep@ietf.org" <teep@ietf.org>, Hannes Tschofenig <Hannes.Tschofenig@arm.com>, Isobe Kohei <isobekohei+job@gmail.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/NIeZJ1Mgd2fEayg0iUN1gK3gYVw>
Subject: Re: [Teep] Hardware for hackathons
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Nov 2019 12:41:20 -0000

Hi,

I forgot to include about the CBOR parser.
I personally prefer to using CBOR parser at the next hackathon.

Isobe-san,
Do you mind looping Takita-san who had his CBOR parser at the
hackathon some time ago?
(BTW, should I be start using the first name instead of last name?)

-Akira

On Wed, Nov 27, 2019 at 6:53 PM Akira Tsukamoto
<akira.tsukamoto@gmail.com>; wrote:
>
> Hi Dave, Hannes and Isobe-san,
>
> For the further discussion for the future hackathon, I searched
> information of Grapeboard and STM32MP157C-DK2 (which is STM CortexA7
> devboard, I will abbreviate as StmA7board).
>
> It is not mandatory but it would be nice to have/use unified
> programing software stacks for the TEEP development on both TAM and
> TEEP device.
> I briefly mentioned about it on page 14 in the slide at IETF106.
> https://datatracker.ietf.org/meeting/106/materials/slides-106-teep-sessb-teep-hackathon-report
>
> Also, I looked inside the Dave`s OTrP over http implementation.
> https://github.com/dthaler/OTrP
>
> I have listed items for a discussion of the choices which were based
> on what we used at the ietf106 hackathon.
> Dave and Isobe-san, please correct me if I am wrong. :)
>
> *) JSON stack:
> (1) jansson, which Dave is using
> https://github.com/akheron/jansson
> (2) node.js, Isobe-san`s TAM
> (3) json parser in libwebsockets, which my prototype is using
> https://github.com/warmcat/libwebsockets/tree/master/lib/jose
>
> *) JOSE stack:
> (1) latchset/jose, which Dave is using
> https://github.com/latchset/jose
> (2) node.js?, Isobe-san`s TAM
> (3) libwebsockets
>
> *) HTTP stack:
> (1) from scratch?, In Dave`s
> https://github.com/dthaler/OTrP/blob/master/TeepTamBrokerLib/HttpServer.cpp
> (2) libwebsockets, In mine
>
> *) Crypto-tsl stack:
> (1) openssl, Dave`s
> (2) mbedtls, mine
> Other than above, might good to use smaller libs, wolfSSL or s2n on
> the device side?
>
> *) rootfs
> (1) Ubuntu?, Dave`s
> (2) buildroot, mine
>
> The default rootfs of dev boards introduced by Dave and Hannes.
> *) Grapeboard
> Ubuntu, customizable to Yocto/OE, OpenWRT and etc
> *) StmA7board
> Yocto/OE (OpenSTLinux)
>
> Also, we have to consider the hardware requirements of SGX, ARM
> TrustZone and RISC-V too.
> The SGX is pretty handy since it could use simulation mode on any pc.
> The op-tee is able to run on qemu too.
>
> For the dev board, cross compiling is used so what to do on host pc,
> Linux pc with ubuntu, win and etc.
>
> And it would be really nice to have docker image for the dev
> environment which includes necessary software stacks for developing
> teep/otrp at least for developing TAM side.
>
> The TAM and TEEP device do not have to be using the same software
> stacks listed above.
>
> I honestly do not have any preference listed above. I was late on the
> boat and did not know what others have done in the past.
>
> We do not have so much engineering resources at the moment, so I
> thought it would be good to work on similar environment as possible to
> able to focus on teep stack.
>
> Akira
>
> On Tue, Nov 19, 2019 at 12:30 PM Akira Tsukamoto
> <akira.tsukamoto@gmail.com>; wrote:
> >
> > Hi Dave and Hannes,
> >
> > The Grapeboard has more speed (single CortexA53, 64bit, 1GHz) compare to
> > STM32MP157C-DK2 (dual CortexA7, 32bit, 650Mhz).
> >
> > The STM has 32-Gbit eMMC for rootfs while Grapeboard have to use SD
> > card for rootfs.
> >
> > The Grapeboard have commonly used rootfs such as, Ubuntu and Yocto based Linux.
> >
> > I will look into them.
> >
> > -Akira
> >
> > On Tue, Nov 19, 2019 at 10:16 AM Dave Thaler
> > <dthaler=40microsoft.com@dmarc.ietf.org>; wrote:
> > >
> > > During the WG session today, in the discussion of potential hardware for future hackathons, I recommended the Grapeboard:
> > >
> > > https://www.grapeboard.com/
> > >
> > > This is an NXP Cortex A53 based board.
> > >
> > >
> > >
> > > That’s the board that’s used in the commercial Scalys Trustbox routers:
> > >
> > > https://scalys.com/trustbox-home-router/
> > >
> > > which is the device that got the cybersecurity innovation award at CES 2019:
> > >
> > > https://www.techrepublic.com/article/ces-2019-innovation-awards-honoree-trustbox-iot-security-router/
> > >
> > >
> > >
> > > Dave
> > >
> > > _______________________________________________
> > > TEEP mailing list
> > > TEEP@ietf.org
> > > https://www.ietf.org/mailman/listinfo/teep