Re: [Teep] BoF call Mar 15th 7am PST (3pm CET, 10pm CST)

Mingliang Pei <Mingliang_Pei@symantec.com> Wed, 15 March 2017 16:44 UTC

Return-Path: <Mingliang_Pei@symantec.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 07D0E1316AA for <teep@ietfa.amsl.com>; Wed, 15 Mar 2017 09:44:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.22
X-Spam-Level:
X-Spam-Status: No, score=-4.22 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=symc.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZKvfUJ8Z4iTJ for <teep@ietfa.amsl.com>; Wed, 15 Mar 2017 09:44:32 -0700 (PDT)
Received: from tussmtoutape01.symantec.com (Tussmtoutape01.symantec.com [155.64.38.231]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D4CFC1316A1 for <teep@ietf.org>; Wed, 15 Mar 2017 09:44:31 -0700 (PDT)
Received: from tussmtmtaapi02.symc.symantec.com (tus3-f5-symc-ext-prd-snat10.net.symantec.com [10.44.130.10]) by tussmtoutape01.symantec.com (Symantec Messaging Gateway) with SMTP id 58.92.30096.F6F69C85; Wed, 15 Mar 2017 16:44:31 +0000 (GMT)
X-AuditID: 0a2c7e31-bbf679a000007590-b8-58c96f6f7ad1
Received: from TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (tus3-f5-symc-ext-prd-snat7.net.symantec.com [10.44.130.7]) by tussmtmtaapi02.symc.symantec.com (Symantec Messaging Gateway) with SMTP id F2.9A.58529.F6F69C85; Wed, 15 Mar 2017 16:44:31 +0000 (GMT)
Received: from tus3xchcaspin01.SYMC.SYMANTEC.COM (10.44.91.13) by TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (10.44.91.34) with Microsoft SMTP Server (TLS) id 15.0.1236.3; Wed, 15 Mar 2017 09:44:29 -0700
Received: from NAM02-SN1-obe.outbound.protection.outlook.com (10.44.128.9) by tus3xchcaspin01.SYMC.SYMANTEC.COM (10.44.91.13) with Microsoft SMTP Server (TLS) id 15.0.1236.3 via Frontend Transport; Wed, 15 Mar 2017 09:44:28 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=symc.onmicrosoft.com; s=selector1-symantec-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=rvc6pySN5azDrx68cM3Jiwb0rTmj2Pq2yiy2pbTAUu0=; b=IcAKiSzH4/F5jwdezSRYG0e9mbW9T/HGHfln0KR3gX7ZNmoQtMMc6IGF0dXbENdViyJ1O8l9Bp+cQD6EUgyNYMdjtF05xHvcbqdCuZnT8S1p5tYCU65WV3/XjCA4siIruQPKof03TJUMyrUUXdFxKXGHHqpUvJTTc+zIOXswtxA=
Received: from DM3PR16MB0554.namprd16.prod.outlook.com (10.164.245.138) by DM3PR16MB0554.namprd16.prod.outlook.com (10.164.245.138) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P384) id 15.1.977.11; Wed, 15 Mar 2017 16:44:27 +0000
Received: from DM3PR16MB0554.namprd16.prod.outlook.com ([10.164.245.138]) by DM3PR16MB0554.namprd16.prod.outlook.com ([10.164.245.138]) with mapi id 15.01.0977.010; Wed, 15 Mar 2017 16:44:27 +0000
From: Mingliang Pei <Mingliang_Pei@symantec.com>
To: "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>, "teep@ietf.org" <teep@ietf.org>
Thread-Topic: [Teep] BoF call Mar 15th 7am PST (3pm CET, 10pm CST)
Thread-Index: AQHSnZWt9ZSn/XlMHESjbbYmkOl/GaGVpjyA
Date: Wed, 15 Mar 2017 16:44:27 +0000
Message-ID: <D4EEBD32.30C6D%mingliang_pei@symantec.com>
References: <BE9BF4AF-46B1-486F-8C1D-77E730998309@cisco.com>
In-Reply-To: <BE9BF4AF-46B1-486F-8C1D-77E730998309@cisco.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.7.0.161029
authentication-results: cisco.com; dkim=none (message not signed) header.d=none;cisco.com; dmarc=none action=none header.from=symantec.com;
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [155.64.23.3]
x-microsoft-exchange-diagnostics: 1; DM3PR16MB0554; 7:ZBlPXsdADdvOhLh8Cq+soods7nt+ksQ575ZlItIFbinHYFnIPSQweO5oRJEQgyzI8Do4LZIPsSdOq7HoM2Ks3Ji7R7mjMjozyem20LxEm+al7ootECqsyuc77MbfccPqU9SknX+mmGvISFG3+cY26JAEL7urvf/A9K0Rn5kc6+KVR39gG9MVMXKmuG4TbQtAkxNsV94k4AXGd2dxK66e8GHCYxPV/V9xlIsvlA3M9ozP61srBjCercrvGNR5Li3sOGt9EKw1w09HJzeae0KrK65A3pn2axaTh29/ZGWuOOIRhdrzw4liC3k4KpWQZQQJLB5zbldA15xxNJiTgDSiXg==
x-ms-office365-filtering-correlation-id: 9d1b16b1-4deb-4528-5407-08d46bc28b62
x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:DM3PR16MB0554;
x-microsoft-antispam-prvs: <DM3PR16MB05541A87C992BC923927D708EC270@DM3PR16MB0554.namprd16.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(278428928389397)(118321135141591)(265634631926514)(94707916325470)(95692535739014)(198313997877955)(21748063052155);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040375)(601004)(2401047)(5005006)(8121501046)(10201501046)(3002001)(6041248)(20161123564025)(20161123558025)(20161123562025)(20161123555025)(20161123560025)(6072148); SRVR:DM3PR16MB0554; BCL:0; PCL:0; RULEID:; SRVR:DM3PR16MB0554;
x-forefront-prvs: 02475B2A01
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39450400003)(377454003)(86362001)(2906002)(4001350100001)(6486002)(66066001)(77096006)(53946003)(6306002)(76176999)(50986999)(6512007)(54356999)(54896002)(6116002)(236005)(102836003)(3846002)(6506006)(99286003)(53936002)(6436002)(80792005)(551544002)(25786008)(606005)(8676002)(38730400002)(6246003)(15187005004)(81166006)(7906003)(16799955002)(229853002)(122556002)(3280700002)(7736002)(3660700001)(2950100002)(53546007)(2501003)(189998001)(5660300001)(8936002)(2900100001)(36756003)(10290500002)(579004)(559001); DIR:OUT; SFP:1101; SCL:1; SRVR:DM3PR16MB0554; H:DM3PR16MB0554.namprd16.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_D4EEBD3230C6Dmingliangpeisymanteccom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Mar 2017 16:44:27.0512 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 3b217a9b-6c58-428b-b022-5ad741ce2016
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM3PR16MB0554
X-OriginatorOrg: symantec.com
X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFjrCKsWRmVeSWpSXmKPExsXCpdPEpZuffzLCYNdZGYtJUyYzWSz9843Z gcljyu+NrB5LlvxkCmCK4rJJSc3JLEst0rdL4MpY9GU9Y8H/XSwVF7sbWRoYF3xj7mLk5JAQ MJFoeHeatYuRi0NI4AujxK9LJ1hgEiuWNLNDJL4zShydcYUNwjnKKLF34hQWCOclo8Tp/c2s IC0sAp3MElMOZ0MkZjBJnH86G2rwCUaJ7sNHGbsYOTjYBAwkLtzJA2kQEYiUuPp/H9g+YQFH iXk/1zBBxJ0k5j+8zgJhG0l8WvkFaoGqxPErs8BqeAXMJbbPnccCMlJIwEbizH49kDCngK3E 2SMr2EBsRgExie+nIEYyC4hL3HoynwniNQGJJXvOQ/0vKvHy8T+w8aICehKzpzSAvcwo0Mso seP2cWhY6Eicvf6EEcKWlzh7uxHsewmBHmaJa5O2sEEkfCVutuxjgbHvdcLY2RIHnjcyQjTM Y5RonLUdypnFJPHl2R22CYx6s5CcCGHHSDx6sINtFtinghInZz5hgYgbSLw/N58ZwtaWWLbw NZStL7Hxy1lGCNtDYk/nEjZkNQsYOVYxKpSUFhfnluSXliQWpBoY6hVX5iaDiERgykrWS87P 3cQITlt1hjsYH23wOcQowMGoxMPLE3YyQog1sQyo8hCjBAezkghvWxZQiDclsbIqtSg/vqg0 J7X4EKM0B4uSOO/5Z2sjhATSE0tSs1NTC1KLYLJMHJxSDYw997IYmDn6LzZeVePIyHEp7DG8 EPWvwzb4H/tE+bJ5F43eygrcD5k2T1VMkn/2r/K/jj9enu8reusxP9H43sWMDa6XeSfJFf9+ NXdn+G/dptlxdYWNz06uE820FXd7HGh/U4M//bDq+wKnlDvxCkr+c6c93ffadM1BfuMNG/d0 S544a9CanK3EUpyRaKjFXFScCACxw76kVwMAAA==
X-Brightmail-Tracker: H4sIAAAAAAAAA02Sa0iTYRTHed733Xy3HD4tL0cLjNW+mOm0ID9YeCkakmB9sijsVV9SdGrb NKUPzfRDXgIvK2yiU5mhFoYSOWppzLxlyxIvecnMViF96DackmZuzwS/PPz+55z/eZ7zcFha 2iYIYjNztLw6h8uWCcWMOPSm1+Hc3JFkhX7VO6pGX0tFta6v0DGUUv+3S6A0mdaoJOqCODqd z84s4NXhJy6LM1ocj1De5lOm8F1FMaNDTSt0ORKxgI9Cm6nEqxyJWSl2IhiomxASMYDgebWe IWIZwWhficBlYXAZDfr+LJKoo2DsS72AiGEEFf0DqByxrBAr4O18jsvgi8/D5GYv4+I9OBYa 1x5SJB4Hxk/TDOFI+N3u8Fwgh6EJg7tGgo9BT0Mj42opxdHwui/MFRbh42B72SZ0McL+4HxF WtI4AGbtRoqMhsFkGfOM6QfLn/+52/vhMKjX69wjI3wbgXluiCFFoWCbtiPCwWCbK3ZPD7iS hqmax0KSSISZ0l5mmxfKtjkLXnwrRsTQiKDY0OMRBgocX+c97n2wMT8hINwugL719CoUYtjx dMIXYWnRLDS4f2A3jNyzMySugB9vjDThQ3C/+buHw6HLYUOElWApMwl31jQhtgPt1+ZrNCqt SstxeZmKyDBNkSrNdXBbi5UWlpar6kbu1YoPNCPr+hkrwiySeUuqEkeSpQKuYKvSivayjCxA 8ieiO1mKr3BaPovn83h1ijo/m9dYEcWKgnToXOH4Hf/AW1rn1M+unoPxo5UPTgVRMFxfkRBo yMsQ0YsS58nJmdaE6QJLzNjdX9mdOvVsl1Tp20IXRSQFQ1ys3KhZiVekPvF1UinPltS6wYXJ lXHL6nW6Y1fzpUkv72u1nVcP0IM+pTn20zeS3gf7fDCnNnyUyzfOyo4wLdUyRpPBRYTQag33 H+Br7AE7AwAA
X-CFilter-Loop: TUS02
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/VLSdREUQAo2h8qi84udWm6xObIg>
Subject: Re: [Teep] BoF call Mar 15th 7am PST (3pm CET, 10pm CST)
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 Mar 2017 16:44:34 -0000

Meeting minutes for today’s call. Please correct or update if I have missed some major points. Thanks, Ming

————

TEEP meeting
03/14/2017

Participants: Nancy Cam-Winget, Kathleen Moriarty, Brian Witten, Dave Wheeler, Nick Cook, Mingliang Pei, Rashid Sangi, Tero Kivinen, Jeremy O’Donoghue, Tirumaleswar Reddy, Dapeng Liu, Michael Richardson

Nancy hosted the meeting. Ming started to give a summary of use cases and comments by Michael in the mailing list.

Michael clarified that he wants to know why a smart door lock needs this where only a trusted environment is there. We (Brian, Hannes, Ming etc.) discussed that there are still needs to define trust where application injects TA from insecure side, being network, remote, or update.

The discussion indicates that we need to better see what the problem the charter tries to solve, who are stakeholders etc.

Dave suggested that we don’t put use cases too close to implementation. Some resource constraint devices don’t have full TEE.

Jeremy noted that some audiences don’t all know TEE. Hannes will introduce TEE in the BoF. To this note, Hannes prefers someone from Intel to introduce Intel SGX.

Nancy summarized two asks so far: introduction of TEE to set stage, and secondly show why the work needs to be done in IETF.

Nancy raised a personal view that we shouldn’t prescribe hardware architecture, and even there must be a hardware required to isolate. Some research has been using SW for isolation. People agree that this should be independent of hardware, ARM or Intel (SGX). On the requirement of hardware, this is generally considered yet – some isolation done by hardware and scope of assumption. We don’t want to get into a research project for the IETF work.

Dave from Intel indicated that SGX won’t have a root of trust at firmware level. Current OTrP assumes a trust from firmware to above. We will need to adjust on this as part of the IETF work.

Ming noted that we should work to define the scope of the spec this charter tries to address. We cannot leave it too open to solve everything. The current assumption of TEE presence is one. The assumption of hardware presence is one. Multiple different TEEs support and hardware independence are basic in scope assumption etc.

Jeremy raised a need to ensure specific interests should be guarded away from this work, and some kind of gate keeper (?). Brian commented to fully concur, and our work wants multiple TEEs, CAs etc. for competition and development. This doesn’t fully address Jeremy’s question, and we can think more.

Nick suggested that we also name sample applications that may make use the work while describing use cases.

To summarize, we came away with the following several planning work for BoF session candidates:


-       Clarify charter statement during BoF. From the call, not all people agree or have the same background with TEE, SGX and so on.

-       Introduction of TEE (Hannes, Dave on Intel SGX). A colleague of Dave will be attending BoF. Dave may join remotely.

-       Drive to define problem scope.

-       Discuss use cases that are in scope and those may be not

o   Discuss applications that may make use of the work of this charter, which can provide more concrete context.

-       Discuss stakeholders and protocol architecture

Action items:

-       Dave Wheeler from Intel provides SGX introduction slide, and prepare to present at BoF by his colleague, and him remotely

-       Discuss in mailing list to clarify charter and problem domain scope, use cases.

-       Discuss offline to clarify concerns Jeremy raised for openness / gate keepers (?)


From: TEEP <teep-bounces@ietf.org<mailto:teep-bounces@ietf.org>> on behalf of "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com<mailto:ncamwing@cisco.com>>
Date: Wednesday, March 15, 2017 at 7:08 AM
To: "teep@ietf.org<mailto:teep@ietf.org>" <teep@ietf.org<mailto:teep@ietf.org>>
Subject: Re: [Teep] BoF call Mar 15th 7am PST (3pm CET, 10pm CST)

All,

We are about to start the BoF now….please join the webex if you want to participate.

Thanks!  Nancy

From: TEEP <teep-bounces@ietf.org<mailto:teep-bounces@ietf.org>> on behalf of "ncamwing@cisco.com<mailto:ncamwing@cisco.com>" <ncamwing@cisco.com<mailto:ncamwing@cisco.com>>
Date: Saturday, March 11, 2017 at 5:10 PM
To: "teep@ietf.org<mailto:teep@ietf.org>" <teep@ietf.org<mailto:teep@ietf.org>>
Subject: [Teep] BoF call Mar 15th 7am PST (3pm CET, 10pm CST)

All,
We had a good majority for Mar 15th 7am PST (3pm CET, 10pm CST);  I’ve setup a webex for that time slot
Please see info below.

Please send us agenda items for the upcoming call.

Thanks, Nancy



JOIN WEBEX MEETING
https://cisco.webex.com/ciscosales/j.php?MTID=me9216d73c5905ad78110499a8c7c12bf
Meeting number (access code): 207 779 570
Meeting password: KEQ52p3W (53752739 from phones)



JOIN FROM A VIDEO SYSTEM OR APPLICATION
Dial sip:207779570@cisco.webex.com<mailto:207779570@cisco.webex.com>
>From the Cisco internal network, dial *267* and the 9-digit meeting number.  If you are the host, enter your PIN when prompted.


JOIN BY PHONE
+1-408-525-6800 Call-in toll number (US/Canada)
+1-866-432-9903 Call-in toll-free number (US/Canada)

Global call-in numbers:
https://cisco.webex.com/ciscosales/globalcallin.php?serviceType=MC&ED=379001592&tollFree=1

Toll-free dialing restrictions:
https://www.webex.com/pdf/tollfree_restrictions.pdf



Can't join the meeting?
https://help.webex.com/docs/DOC-5412


IMPORTANT NOTICE: Please note that this WebEx service allows audio and other information sent during the session to be recorded, which may be discoverable in a legal matter. By joining this session, you automatically consent to such recordings. If you do not consent to being recorded, discuss your concerns with the host or do not join the session.