Re: [Teep] Hardware for hackathons
Akira Tsukamoto <akira.tsukamoto@gmail.com> Wed, 27 November 2019 12:41 UTC
Return-Path: <akira.tsukamoto@gmail.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6AC03120932 for <teep@ietfa.amsl.com>; Wed, 27 Nov 2019 04:41:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cNHkVkTbaHrK for <teep@ietfa.amsl.com>; Wed, 27 Nov 2019 04:41:16 -0800 (PST)
Received: from mail-wm1-x32e.google.com (mail-wm1-x32e.google.com [IPv6:2a00:1450:4864:20::32e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E3FF51208AD for <teep@ietf.org>; Wed, 27 Nov 2019 04:41:15 -0800 (PST)
Received: by mail-wm1-x32e.google.com with SMTP id y5so7290385wmi.5 for <teep@ietf.org>; Wed, 27 Nov 2019 04:41:15 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=+dgC3Fs0W8CK8/SqD+jmrqn2ubbGArNpisXBXWoDU7E=; b=iezeXAuRnO7rI5nlPNwi77Iitp+jc5BI4pYr2Do7SAsnVS6k9FYL17CxZX0QugKrU+ UPIdI+jVliEv5ZBVEE2xV9MTRcvYX7mEtyXnXojUaALbllga5QvNMP65+akXmWenHjXJ yuADiz9JZYax98vTtV1uvXelNpo5tifolws6KTkhywFq0RDwl0+2TcVmiI2TNrEOlUwS RIi5Z8DnVEX6gsHghJKCWcKAyKp5KBftgLnkzLdDCTKfsLbjfnc0vxwFiEWkHCR4UGGT 1GNRZExCAB6c5/HWpHkZpQrurtmRizXXYkbrHEVjJ166eBOLDWCFmahyis3aCDCcOsHP qnmQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=+dgC3Fs0W8CK8/SqD+jmrqn2ubbGArNpisXBXWoDU7E=; b=jJQBjUj+/f4aelacfvGhAtjE8TKfiN54hAWhr+D/EDYURGEQhDgq6Tmskd4PQzfyAE TSJXgtH0LqHNoUmifWyLvF2rmXGwrfYOvNva64LyqsYO1gLqxnQFlRsWiFKY7fTyOe3z q3A8sddpXckzxWL76Fh6Qj0jU96nMfnKBKCiSVvH/PG5NCO3K96j87k8OkcHCSHjKdIL NCLtbGhZFAVM1QzWtN9dADzLM9JHMun5Pk1DnH6eCjS8yBufjUyjuL1u7ETT0kK/uJC+ HLP1qW//9kppUKc1BA0JVaExoBzt8bzZP3lfB7WEQgklBXEThdEPL9Hn6YW9td2qWfgb yzaw==
X-Gm-Message-State: APjAAAX60zIWvnp0iebwuB045IiufkMa/hT8Hb+dsYfvklyzFzpwmpaN Nxp0mQ1PgkTu0Pspg+ckK3WxrwAyogfAADTJz0A=
X-Google-Smtp-Source: APXvYqzSzR/A2uDmaKXTCz1lEhSMnDTEeJrOn6YcwnEyR5YjqhZKwK0KXiKAeTUN8OhYbLw6nhyanZaT2xebo7Q5aXM=
X-Received: by 2002:a1c:2846:: with SMTP id o67mr4272339wmo.7.1574858474119; Wed, 27 Nov 2019 04:41:14 -0800 (PST)
MIME-Version: 1.0
References: <CY4PR21MB0773C2CEFF38942B2CA517C0A34C0@CY4PR21MB0773.namprd21.prod.outlook.com> <CACuRN0NQSizzuqScEQJZJJwegsdJHi8mi=Gp_kqpK4CsJ2-OSQ@mail.gmail.com> <CACuRN0Pz=L0vS4ek81UPyFf7SGjTWecbfugHGJ=JBNTUFvQ=VQ@mail.gmail.com>
In-Reply-To: <CACuRN0Pz=L0vS4ek81UPyFf7SGjTWecbfugHGJ=JBNTUFvQ=VQ@mail.gmail.com>
From: Akira Tsukamoto <akira.tsukamoto@gmail.com>
Date: Wed, 27 Nov 2019 21:41:05 +0900
Message-ID: <CACuRN0MS+aycTeGWJuB1r7z6LNsXFSBVeyCdaWSQL=PL0nhPpg@mail.gmail.com>
To: Dave Thaler <dthaler=40microsoft.com@dmarc.ietf.org>
Cc: "teep@ietf.org" <teep@ietf.org>, Hannes Tschofenig <Hannes.Tschofenig@arm.com>, Isobe Kohei <isobekohei+job@gmail.com>
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/NIeZJ1Mgd2fEayg0iUN1gK3gYVw>
Subject: Re: [Teep] Hardware for hackathons
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Nov 2019 12:41:20 -0000
Hi, I forgot to include about the CBOR parser. I personally prefer to using CBOR parser at the next hackathon. Isobe-san, Do you mind looping Takita-san who had his CBOR parser at the hackathon some time ago? (BTW, should I be start using the first name instead of last name?) -Akira On Wed, Nov 27, 2019 at 6:53 PM Akira Tsukamoto <akira.tsukamoto@gmail.com> wrote: > > Hi Dave, Hannes and Isobe-san, > > For the further discussion for the future hackathon, I searched > information of Grapeboard and STM32MP157C-DK2 (which is STM CortexA7 > devboard, I will abbreviate as StmA7board). > > It is not mandatory but it would be nice to have/use unified > programing software stacks for the TEEP development on both TAM and > TEEP device. > I briefly mentioned about it on page 14 in the slide at IETF106. > https://datatracker.ietf.org/meeting/106/materials/slides-106-teep-sessb-teep-hackathon-report > > Also, I looked inside the Dave`s OTrP over http implementation. > https://github.com/dthaler/OTrP > > I have listed items for a discussion of the choices which were based > on what we used at the ietf106 hackathon. > Dave and Isobe-san, please correct me if I am wrong. :) > > *) JSON stack: > (1) jansson, which Dave is using > https://github.com/akheron/jansson > (2) node.js, Isobe-san`s TAM > (3) json parser in libwebsockets, which my prototype is using > https://github.com/warmcat/libwebsockets/tree/master/lib/jose > > *) JOSE stack: > (1) latchset/jose, which Dave is using > https://github.com/latchset/jose > (2) node.js?, Isobe-san`s TAM > (3) libwebsockets > > *) HTTP stack: > (1) from scratch?, In Dave`s > https://github.com/dthaler/OTrP/blob/master/TeepTamBrokerLib/HttpServer.cpp > (2) libwebsockets, In mine > > *) Crypto-tsl stack: > (1) openssl, Dave`s > (2) mbedtls, mine > Other than above, might good to use smaller libs, wolfSSL or s2n on > the device side? > > *) rootfs > (1) Ubuntu?, Dave`s > (2) buildroot, mine > > The default rootfs of dev boards introduced by Dave and Hannes. > *) Grapeboard > Ubuntu, customizable to Yocto/OE, OpenWRT and etc > *) StmA7board > Yocto/OE (OpenSTLinux) > > Also, we have to consider the hardware requirements of SGX, ARM > TrustZone and RISC-V too. > The SGX is pretty handy since it could use simulation mode on any pc. > The op-tee is able to run on qemu too. > > For the dev board, cross compiling is used so what to do on host pc, > Linux pc with ubuntu, win and etc. > > And it would be really nice to have docker image for the dev > environment which includes necessary software stacks for developing > teep/otrp at least for developing TAM side. > > The TAM and TEEP device do not have to be using the same software > stacks listed above. > > I honestly do not have any preference listed above. I was late on the > boat and did not know what others have done in the past. > > We do not have so much engineering resources at the moment, so I > thought it would be good to work on similar environment as possible to > able to focus on teep stack. > > Akira > > On Tue, Nov 19, 2019 at 12:30 PM Akira Tsukamoto > <akira.tsukamoto@gmail.com> wrote: > > > > Hi Dave and Hannes, > > > > The Grapeboard has more speed (single CortexA53, 64bit, 1GHz) compare to > > STM32MP157C-DK2 (dual CortexA7, 32bit, 650Mhz). > > > > The STM has 32-Gbit eMMC for rootfs while Grapeboard have to use SD > > card for rootfs. > > > > The Grapeboard have commonly used rootfs such as, Ubuntu and Yocto based Linux. > > > > I will look into them. > > > > -Akira > > > > On Tue, Nov 19, 2019 at 10:16 AM Dave Thaler > > <dthaler=40microsoft.com@dmarc.ietf.org> wrote: > > > > > > During the WG session today, in the discussion of potential hardware for future hackathons, I recommended the Grapeboard: > > > > > > https://www.grapeboard.com/ > > > > > > This is an NXP Cortex A53 based board. > > > > > > > > > > > > That’s the board that’s used in the commercial Scalys Trustbox routers: > > > > > > https://scalys.com/trustbox-home-router/ > > > > > > which is the device that got the cybersecurity innovation award at CES 2019: > > > > > > https://www.techrepublic.com/article/ces-2019-innovation-awards-honoree-trustbox-iot-security-router/ > > > > > > > > > > > > Dave > > > > > > _______________________________________________ > > > TEEP mailing list > > > TEEP@ietf.org > > > https://www.ietf.org/mailman/listinfo/teep
- [Teep] Hardware for hackathons Dave Thaler
- Re: [Teep] Hardware for hackathons Akira Tsukamoto
- Re: [Teep] Hardware for hackathons Akira Tsukamoto
- Re: [Teep] Hardware for hackathons Akira Tsukamoto
- Re: [Teep] [EXTERNAL] Re: Hardware for hackathons Dave Thaler
- Re: [Teep] Hardware for hackathons Michael Richardson
- Re: [Teep] Hardware for hackathons 塚本明
- Re: [Teep] Hardware for hackathons Hannes Tschofenig
- Re: [Teep] Hardware for hackathons Michael Richardson