[Teep] TEEP protocol issue status

Dave Thaler <dthaler@microsoft.com> Tue, 26 July 2022 14:37 UTC

Return-Path: <dthaler@microsoft.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5F017C13C526 for <teep@ietfa.amsl.com>; Tue, 26 Jul 2022 07:37:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.692
X-Spam-Level:
X-Spam-Status: No, score=-2.692 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.582, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ly97UDeuODj9 for <teep@ietfa.amsl.com>; Tue, 26 Jul 2022 07:37:04 -0700 (PDT)
Received: from na01-obe.outbound.protection.outlook.com (mail-centralusazon11021018.outbound.protection.outlook.com [52.101.62.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 55FF2C13C51E for <teep@ietf.org>; Tue, 26 Jul 2022 07:37:03 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Ehj7uEKvN0UxZzAGdaHxlv8kLjodS2Xo+7muPUgTUxylmI0k9ykAcD7fiHBfYZOkrswimlHueW/nIHFipRJcK7uLZnmpeYqFQcXEDXGS4MQg696+OUE9qf1uiM5UnFmktejs61W75qTwL96dPlOBHuUm0IQBPiPqBSMlQqBrTOSi8AExelCV9s9HU5XFu4dRZD2pj46KYseKgN+AECTu0s7X3wKg12gB9k3NYa90olmKjDRJxrCHqSTUvmF/IR9vuraqSgAvpXOER00PejmRvkUpV4+1JYx/qZA83rDn/yeVNB1+yZVntgUScLXswsbjWjuj7R0jKgUTV+vGTMkudA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=PPlFFUAChtW3+Zu/OpkUGVTjfUNz1330TvgDgFYxVFA=; b=eIFFZIEJ5YMvH8NuwxWFvmFVVXErcZGdsbseblXT99uf9jCEQZVEKB1a+JgJcEP0ccXwTvMbhU2vbNjyeG9WHKMVoPkeYwNnoEGkOsBYO5ZhVtIXEhn/Rg9w0W8Ti3aH8VGbcy7PiXNneCQaK6Fhi+W66d3Zfjrc1CZTROMNXlNRECbYcafNJV/IvJvbM4hWbzaM88bbZb2YijXppm6Kcg/UM1Ul+d1zQSjlmVJd7dqLfddb6i4jQHGVruGvhm2aslD/ql6g7w+kQMKs+51Mv4UxOpjgJQroicipGt/zsLNGdBjyjBnltUWal60KkCfehsyt+XeARnE84jF2Fg2h7Q==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=PPlFFUAChtW3+Zu/OpkUGVTjfUNz1330TvgDgFYxVFA=; b=E75BWMVFe7y+dmywYFKjbQ0P4ZmQHwldyIhZvyKKcqsxUwTT5HVca0M37t1rGGf70wBsKTArcM5GNsZWSEIcE1ljPdqQGcMmO6sgEC/TNUsLg8vpajTQmk7tAaX0QfoH5ThBUyTzhZImAJrj3m4nZZ3HhURbNvrLGqlc8TpxpCo=
Received: from CH2PR21MB1464.namprd21.prod.outlook.com (2603:10b6:610:89::16) by CY5PR21MB3710.namprd21.prod.outlook.com (2603:10b6:930:c::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5504.2; Tue, 26 Jul 2022 14:36:38 +0000
Received: from CH2PR21MB1464.namprd21.prod.outlook.com ([fe80::8514:302e:6ed4:8002]) by CH2PR21MB1464.namprd21.prod.outlook.com ([fe80::8514:302e:6ed4:8002%6]) with mapi id 15.20.5504.002; Tue, 26 Jul 2022 14:36:37 +0000
From: Dave Thaler <dthaler@microsoft.com>
To: "TEEP@ietf.org" <teep@ietf.org>
Thread-Topic: TEEP protocol issue status
Thread-Index: Adig/PDPt+3LLAXgTz+yi54OsUv5yw==
Date: Tue, 26 Jul 2022 14:36:37 +0000
Message-ID: <CH2PR21MB146402FF814A7FF25DE83566A3949@CH2PR21MB1464.namprd21.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=f7b94342-c72a-44c0-8cbc-e19294182636; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2022-07-26T14:35:07Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47;
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 73b8a96e-085a-4c73-4efc-08da6f143f59
x-ms-traffictypediagnostic: CY5PR21MB3710:EE_
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH2PR21MB1464.namprd21.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230016)(4636009)(366004)(376002)(396003)(346002)(39860400002)(136003)(451199009)(166002)(64756008)(8676002)(66446008)(66556008)(66476007)(316002)(6916009)(2906002)(66946007)(82960400001)(82950400001)(38100700002)(38070700005)(122000001)(8990500004)(76116006)(5660300002)(86362001)(478600001)(186003)(41300700001)(83380400001)(52536014)(8936002)(6506007)(10290500003)(7696005)(9686003)(966005)(55016003)(3480700007)(33656002)(71200400001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CH2PR21MB146402FF814A7FF25DE83566A3949CH2PR21MB1464namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH2PR21MB1464.namprd21.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 73b8a96e-085a-4c73-4efc-08da6f143f59
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Jul 2022 14:36:37.8568 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: urlXgjUGKzvA1aWwMsqZ5oHkKXox8YX8yWrJ8tCvxdFfNjj750Wgpm40fxk0iIkAmvJAep9Dt/PAj6FmOMHcLESdaTr8kEkMQ8QZCfP0ieU=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY5PR21MB3710
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/XYstnopdH4M_wL0ENXks1k1aSvM>
Subject: [Teep] TEEP protocol issue status
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Jul 2022 14:37:06 -0000

All issues (that we determined affect the draft itself) filed before and during the hackathon already have fixes merged in github waiting for a new draft to be posted.  During the hackathon, we not only found and discussed new issues, but we also authored and reviewed pull requests on the draft since we had 5 different implementers at the table. That is, we ended the hackathon with _no_ open issues.  This is a first for TEEP!
However, after the hackathon two issues were filed, which stemmed from follow-up from the hackathon.
Issue #235: Which freshness mechanisms are mandatory to implement
              See https://github.com/ietf-teep/teep-protocol/issues/235 for details.
              Will present this in the meeting, but if there are comments beforehand,
              please comment in the github issue.  (Any email responses will
              be manually copied into the issue.)
Issue #234: Which TEEP messages are protected with which ciphersuites
              See https://github.com/ietf-teep/teep-protocol/issues/234 for details.
              Similarly, will discuss in the meeting but please comment in the issue.
Thanks,
Dave