Re: [Teep] Call for adoption of draft-thaler-teep-otrp-over-http

Dave Thaler <dthaler@microsoft.com> Wed, 12 June 2019 21:42 UTC

Return-Path: <dthaler@microsoft.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DB275120199 for <teep@ietfa.amsl.com>; Wed, 12 Jun 2019 14:42:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level:
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QN3-ODSISvHZ for <teep@ietfa.amsl.com>; Wed, 12 Jun 2019 14:42:33 -0700 (PDT)
Received: from NAM04-BN3-obe.outbound.protection.outlook.com (mail-eopbgr680138.outbound.protection.outlook.com [40.107.68.138]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AB5481201A2 for <teep@ietf.org>; Wed, 12 Jun 2019 14:42:32 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=testarcselector01; d=microsoft.com; cv=none; b=m4TM3ak64YmE+1btiH2BeOt5rRKCcoczPQ2Mk3cEfVukQO92gN0DS6fZeNiKm6dO3excSiaK6uEX0AI2Gz0Qwsw9dQrbzX1BrVCA+4ooD2soFOUHiu0/q3IGi/eGVYRUdR8EIg8KK565ZOctHknd+YCtRJnaSnjlog86eR+hxAE=
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=testarcselector01; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QXBWv03yI4Ey9T0/Z2ULGSD4FirvHXSj1HpM8ggo8zw=; b=iL7UFIUAFruVMIUHKw62GA6aWNPkTXwWrDHW7VGEkx+Gh/8/tvOZ01AlKZ8LCupxKPN8/jfhtmytWuo4KwsQ+ZAkVKTN5wDQw/hrb6VIPqggduQ/NPqOAV7SUStOifkiGKjCVvHSF+YxyGSwDINi47+lpgvEa9V9+jsmoeU9TTg=
ARC-Authentication-Results: i=1; test.office365.com 1;spf=none;dmarc=none;dkim=none;arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QXBWv03yI4Ey9T0/Z2ULGSD4FirvHXSj1HpM8ggo8zw=; b=D83Xx0ZQuma1/8WLg3twvPoUx1hYu8EhytznFlq9irHupaCbSx33YY+vDM+0rvTc4hmvMc8pyB5THAfIgtRDRDC9Y+0xcBAUzrOnEu/knTl4DE4AgdiSr+pDT02HRHjfG2R1mVFLGFVEqzTCdXBP8fuCzFPCT+VyV1IukLq/bM0=
Received: from BN6PR21MB0497.namprd21.prod.outlook.com (2603:10b6:404:b3::7) by BN6PR21MB0274.namprd21.prod.outlook.com (2603:10b6:404:9b::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2008.1; Wed, 12 Jun 2019 21:42:30 +0000
Received: from BN6PR21MB0497.namprd21.prod.outlook.com ([fe80::8dec:7b59:4889:a0ae]) by BN6PR21MB0497.namprd21.prod.outlook.com ([fe80::8dec:7b59:4889:a0ae%4]) with mapi id 15.20.2008.002; Wed, 12 Jun 2019 21:42:30 +0000
From: Dave Thaler <dthaler@microsoft.com>
To: Mingliang Pei <Mingliang_Pei=40symantec.com@dmarc.ietf.org>, Anders Rundgren <anders.rundgren.net@gmail.com>, "Wheeler, David M" <david.m.wheeler@intel.com>, Hannes Tschofenig <Hannes.Tschofenig@arm.com>, "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>, "teep@ietf.org" <teep@ietf.org>
Thread-Topic: [Teep] Call for adoption of draft-thaler-teep-otrp-over-http
Thread-Index: AQHVFOGEwUKGBoO0w0ufhIS/wg0a4KaABlcAgADZDICAAUgp4IAACFwAgABCB4CAFZmwAIAAe+/Q
Date: Wed, 12 Jun 2019 21:42:30 +0000
Message-ID: <BN6PR21MB0497B4071A5701DD04871B44A3EC0@BN6PR21MB0497.namprd21.prod.outlook.com>
References: <B57377C9-72EC-45C4-B5C2-9A6443B8C073@cisco.com> <246ce79a-75a6-4e4d-d76a-2b54eb71cf75@gmail.com> <BN6PR21MB0497781C059E34E015875C55A31E0@BN6PR21MB0497.namprd21.prod.outlook.com> <VI1PR08MB5360C0AFED2E8DDA94734016FA1F0@VI1PR08MB5360.eurprd08.prod.outlook.com> <0627F5240443D2498FAA65332EE46C843B74679C@CRSMSX102.amr.corp.intel.com> <ce9c0b4c-8d18-1f29-9b53-b3e4220683b6@gmail.com> <AA45ADF2-3326-4017-8A83-A55B2DC40391@symantec.com>
In-Reply-To: <AA45ADF2-3326-4017-8A83-A55B2DC40391@symantec.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Owner=dthaler@ntdev.microsoft.com; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2019-06-12T21:42:26.8244377Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=General; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Application=Microsoft Azure Information Protection; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=e3ae4f8c-9857-40a4-85f2-aa9e58f0f2e9; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Extended_MSFT_Method=Automatic
authentication-results: spf=none (sender IP is ) smtp.mailfrom=dthaler@microsoft.com;
x-originating-ip: [2001:4898:80e8:f:6ccf:89cc:ffff:947]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 36efc245-2ce8-4f46-5708-08d6ef7edf2a
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(4618075)(2017052603328)(7193020); SRVR:BN6PR21MB0274;
x-ms-traffictypediagnostic: BN6PR21MB0274:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <BN6PR21MB0274A933D2A2D37697B38770A3EC0@BN6PR21MB0274.namprd21.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0066D63CE6
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(376002)(39860400002)(136003)(396003)(346002)(366004)(189003)(199004)(51444003)(40434004)(13464003)(229853002)(76176011)(6306002)(6436002)(9686003)(102836004)(86362001)(33656002)(25786009)(6506007)(52396003)(73956011)(7696005)(53936002)(76116006)(66946007)(10090500001)(53546011)(8990500004)(2501003)(316002)(305945005)(74316002)(99286004)(66476007)(5660300002)(22452003)(8936002)(6246003)(52536014)(7736002)(110136005)(8676002)(64756008)(81166006)(66556008)(66446008)(71190400001)(71200400001)(81156014)(10290500003)(5024004)(256004)(14444005)(6116002)(2906002)(68736007)(11346002)(186003)(486006)(476003)(478600001)(46003)(966005)(446003)(55016002)(14454004); DIR:OUT; SFP:1102; SCL:1; SRVR:BN6PR21MB0274; H:BN6PR21MB0497.namprd21.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: MSvADYkW9ovr+3b6sD21pSfMqN649KCZi0k7QnsTIEQlRSdxIeHmAxn/Ss9Yt2yyE+hyFuQDAGL7U3/UXrwxKZ7Ku0gUQkNWB5IGcEURECaRJ0SjDIkuj6CX72EUJJ5cCIEIuofIiTukclBoHrtTetlXD43NoiVcyLVedWOAIDI8gLtQ7FrMTR89KWznTx0WUnWRzgDUiRT0+6DWIPPfjFXtSfQWGDzOrfFeqydLB7/kj6wVB0H30vvi+rgTq9FyRLUqeArAKDSjCFNrTszbtZSqcfsFIWz7I+2RDgyDA9SsYNm5wRWI0lBiGZTe/BRQJ2J98CZQxuBadQBwC19bTADHwEDuj5tCJWQPNrL69AwaFSln/T8r53aPQHCqb6F/dUDNCI970KlDKgf8O35Rb5XUIWaLsd6UhziCOKqT8DM=
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 36efc245-2ce8-4f46-5708-08d6ef7edf2a
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Jun 2019 21:42:30.5696 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: dthaler@ntdev.microsoft.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN6PR21MB0274
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/6DtQRYt_xIusLzrRjzPBTnzMGZo>
Subject: Re: [Teep] Call for adoption of draft-thaler-teep-otrp-over-http
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 12 Jun 2019 21:42:38 -0000

JSON vs CBOR (or anything else) should not affect the transport draft as currently specified.  The transport just carries a generic payload and feeds it into the Agent as an opaque buffer.
The broker has no visibility into the encoding, it just transports raw payloads.  Only the OTrP implementation knows whether it's JSON or CBOR or whatever, so in my view that's a discussion
on the OTrP spec not the otrp-over-http spec.

Dave

-----Original Message-----
From: Mingliang Pei <Mingliang_Pei=40symantec.com@dmarc.ietf.org> 
Sent: Wednesday, June 12, 2019 12:31 PM
To: Anders Rundgren <anders.rundgren.net@gmail.com>; Wheeler, David M <david.m.wheeler@intel.com>; Hannes Tschofenig <Hannes.Tschofenig@arm.com>; Dave Thaler <dthaler@microsoft.com>; Nancy Cam-Winget (ncamwing) <ncamwing@cisco.com>; teep@ietf.org
Subject: Re: [Teep] Call for adoption of draft-thaler-teep-otrp-over-http

Sorry for late catch up on email thread. I think we need to support CBOR too, and favor to add it as a subsequent separate draft. I also endorse the adoption of the transport draft.

Thanks,

Ming

On 5/29/19, 11:40 AM, "TEEP on behalf of Anders Rundgren" <teep-bounces@ietf.org on behalf of anders.rundgren.net@gmail.com> wrote:

    Hi David,
    Since you mention the unfinished architecture document, have you seen https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fietf-teep%2Farchitecture%2Fissues%2F52%23issuecomment-493652265&amp;data=02%7C01%7Cdthaler%40microsoft.com%7C6e15170aecc640e93c7508d6ef6c85b8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636959646713484101&amp;sdata=mRuPRP7F%2Fv8s6F2eSbsA8V%2F4NycbmK4U3Xn7rIedpKE%3D&amp;reserved=0 ?
    
    This is about creating a *unified* (JSON/CBOR independent) TEE management API.
    
    Ten years ago I had something similar to OTrP but felt it was becoming "clunky" and limiting, so I threw it out and haven't regretted it a second.
    The switch wasn't that difficult after getting the core mechanics in place.
    Much later when I was forced switching protocol format from XML to JSON, *not a single bit* changed in the API.
    
    Regards,
    Anders
    
    
    On 2019-05-29 16:43, Wheeler, David M wrote:
    > I am more in favor of a CBOR/CWT binding than JSON, although I agree that JSON and JWT is more commonly deployed at the moment.
    > 
    > The direction I think we should push this is toward CBOR. However, I think that it is fine to build JSON into the OTrP protocol spec and then have an alternative specification that provides CBOR bindings – I would be willing to work with Anders on a such a specification (after the arch document is complete 😉 ).
    > 
    > Thanks,
    > 
    > Dave Wheeler
    > 
    > *From:* TEEP <teep-bounces@ietf.org> *On Behalf Of *Hannes Tschofenig
    > *Sent:* Wednesday, May 29, 2019 7:35 AM
    > *To:* Dave Thaler <dthaler=40microsoft.com@dmarc.ietf.org>; Anders Rundgren <anders.rundgren.net@gmail.com>; Nancy Cam-Winget (ncamwing) <ncamwing@cisco.com>; teep@ietf.org
    > *Subject:* Re: [Teep] Call for adoption of draft-thaler-teep-otrp-over-http
    > 
    >   * The IoT market has adopted CBOR rather than JSON.
    > 
    >   * That’s a bit overstated, “IoT” is very broad and hence there are _/many/_ IoT “markets”, and many of them have not adopted CBOR. For example, if you look in industrial IoT, the dominant protocol is OPC UA, which uses neither CBOR nor JSON. In consumer IoT like in devices on shelves now, I think you will find that JSON is far more deployed than CBOR is (e.g., Hue light bulbs and many other IoT devices use JSON-over-HTTP). It is true that /some/ of the IoT market has adopted CBOR.  For example, OCF adopted CBOR, but OCF has very little actual deployment today.
    > 
    > I agree with Dave here. I think it is fair to say that the JWT has been implement and deployed by the Web community. Particularly in the OAuth context it is widely deployed.
    > 
    > CBOR has been suggested for IoT-related specifications but CBOR, COSE and CWT is definitely not widely implement and even less widely used.
    > 
    > The question I wonder is whether the current deployment status matters in our case and I don’t think it has any relationship to the call for adoption of draft-thaler-teep-otrp-over-http.
    > 
    > When the initial version of OTrP was written there was the assumption that the encoding of the protocol in JSON would be more convenient for Web developers given that the main deployment use case was for mobile phones and tablets.
    > 
    > Now, there is of course the question whether Web developers should be exposed to the details and the encoding of the OTrP protocol itself. I think that’s an important question. Afterall, we are trying to make the life of developers simpler with this work.
    > 
    > Since the formation of the TEEP group we have also added other use cases extending our original goals for OTrP. This makes me believe that it is worthwhile to look into a CBOR-based encoding as well. I also would like to take advance of ongoing working work in SUIT & RATS.
    > 
    > Ciao
    > Hannes
    > 
    > IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.
    > 
    
    _______________________________________________
    TEEP mailing list
    TEEP@ietf.org
    https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fteep&amp;data=02%7C01%7Cdthaler%40microsoft.com%7C6e15170aecc640e93c7508d6ef6c85b8%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636959646713494087&amp;sdata=TiFDthL%2BxRuHOHfHH9hbed6mmLfKG8I5E6sdo4Tuu5M%3D&amp;reserved=0