[Teep] IETF 104 hackathon

Dave Thaler <dthaler@microsoft.com> Mon, 21 January 2019 20:31 UTC

Return-Path: <dthaler@microsoft.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8F378124BE5 for <teep@ietfa.amsl.com>; Mon, 21 Jan 2019 12:31:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.553
X-Spam-Level:
X-Spam-Status: No, score=-6.553 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-4.553, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eJq4h8pGJKXN for <teep@ietfa.amsl.com>; Mon, 21 Jan 2019 12:31:32 -0800 (PST)
Received: from NAM03-DM3-obe.outbound.protection.outlook.com (mail-eopbgr800097.outbound.protection.outlook.com [40.107.80.97]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DD0F3124408 for <teep@ietf.org>; Mon, 21 Jan 2019 12:31:31 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=s8/RTdtJbY3DT/iCsQkAi49iq9fmPFF6+dnPxqxlxlo=; b=eu5+lbpzMJnC9oWrq8N8YdrlOIbnT/kgRRPm3smzeWC/gnqFanbAvpS1MqVKVBT/0Ym84qyQry8qEJwhPeWHVvFUTREUnsmEGPTAKLkPYqtU5HgFcJnxBcfd78dIDH3GQJr5u1iN6p0V9cae/Si+N7B3FLiNozLtOKj2TkLBh2I=
Received: from CY4PR21MB0168.namprd21.prod.outlook.com (10.173.192.150) by CY4PR21MB0631.namprd21.prod.outlook.com (10.175.115.21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1558.5; Mon, 21 Jan 2019 20:31:29 +0000
Received: from CY4PR21MB0168.namprd21.prod.outlook.com ([fe80::a170:a2b7:8ea1:b401]) by CY4PR21MB0168.namprd21.prod.outlook.com ([fe80::a170:a2b7:8ea1:b401%2]) with mapi id 15.20.1558.014; Mon, 21 Jan 2019 20:31:29 +0000
From: Dave Thaler <dthaler@microsoft.com>
To: teep <teep@ietf.org>
Thread-Topic: IETF 104 hackathon
Thread-Index: AdSxxyElFMT+0JdFS+WunS3ci119/w==
Date: Mon, 21 Jan 2019 20:31:29 +0000
Message-ID: <CY4PR21MB0168848287439D02CE213FCBA39F0@CY4PR21MB0168.namprd21.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Owner=dthaler@ntdev.microsoft.com; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2019-01-21T20:31:28.1857981Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=General; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Application=Microsoft Azure Information Protection; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=462e9c29-7c8a-43f3-b411-d64bcc0682b2; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Extended_MSFT_Method=Automatic
x-originating-ip: [73.59.106.235]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; CY4PR21MB0631; 6:HPM+VgMjEtAyCdIu9PFkKLhjdoOCojChUqZaDQKjzI+u/BGRSzTS9PCT+E6/7If9GCfHAWhy1ylT/n+WtnwM/Rr9I0v/LjdiYdIBJ81j34tWM2Pf05VrwRbkFr3qjDOSrUGmNsZMsfNeIwB9s7lq+syZQRptXsTjM+LCrizopc/TeLYOCnAW2wAOPqjGIM0dAQ7gDdQzm182kXB4LoPaAGkKLX/kT2Oet8q9ir7LTQ166XLNKBXpwPPOL1MGeOCIqeeShCIoY1ySvs4T2RBp/KLmzGS/ExOi7zuLCFqzvo+yyO/dd26vdvqHrJk2XjlqgrvCnqCcvZZTWO7gxNogeiiEa3JDC1zvccUwbX4cFpXUHzu4CfFvVy6RNBGu2zTPpZsDpkgDI9i9YO1Eh5kdZ2v0ADVar208Y0mQrzfupyXeppFiycM9X4ynMYLsExvHdTz5tUoYvVsefk9QHk/GWA==; 5:4NE4bNfQep1ewp2I8nHAQqosjY5+ENi3FGcyFYc9QN8S+R0+Z4GtaB4hqVQF/z5YSWWKyH8M86Tw4aEJFm8h1N1GeSn9FOSrCsL56fgHojYSU0/XOVyK8MqofU9BQL9R3CLFg/fks0AQBZk27WHBlateDIZq2bTfv7d9hGA7LlefA1a6ZK9sWZn2hKIPr00oYkPl3bAOb7l1FkIrfz4F8g==; 7:wb/zpytVQXV+CepgBDsrsgfoQW0MXlUohVmmlObqh2weERc8e6SfNIh7qTuAAvbMGCPR1MZr6+zqBqCGdkhhgatS68cgGLs0O27d7lvAsCi2HB7ZV/zlO2eFVhmd+KAHlwliicbn+ZTArwPtFArB0A==
x-ms-office365-filtering-correlation-id: 0b24b060-6ad5-4802-772d-08d67fdf6cce
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600109)(711020)(4618075)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:CY4PR21MB0631;
x-ms-traffictypediagnostic: CY4PR21MB0631:
x-ms-exchange-purlcount: 3
authentication-results: spf=none (sender IP is ) smtp.mailfrom=dthaler@microsoft.com;
x-microsoft-antispam-prvs: <CY4PR21MB0631EFAE9399D681FA2B2C65A39F0@CY4PR21MB0631.namprd21.prod.outlook.com>
x-forefront-prvs: 0924C6A0D5
x-forefront-antispam-report: SFV:NSPM; SFS:(10019020)(366004)(376002)(39860400002)(346002)(136003)(396003)(189003)(199004)(71190400001)(81156014)(6506007)(53936002)(6306002)(71200400001)(6116002)(186003)(97736004)(26005)(3846002)(8676002)(81166006)(25786009)(7696005)(102836004)(74316002)(790700001)(55016002)(10290500003)(106356001)(7116003)(4744005)(7736002)(14444005)(10090500001)(6436002)(86362001)(486006)(2906002)(476003)(86612001)(6916009)(66066001)(105586002)(99286004)(22452003)(54896002)(316002)(8936002)(9686003)(606006)(478600001)(966005)(8990500004)(14454004)(236005)(68736007)(33656002)(256004); DIR:OUT; SFP:1102; SCL:1; SRVR:CY4PR21MB0631; H:CY4PR21MB0168.namprd21.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1;
received-spf: None (protection.outlook.com: microsoft.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: Kklg4AWzc07rB+VSHU69xkMH5ViXvR/5vs9Nx6u6UZFmG8cm8KSt+u7wgMCUxjO+YgUFbA8AxbzRgjWE9O+d75R046k3MKZMT84vL560MgSP4J8XznpbOjfb3H84n6xkbejtNnjSQDP/UC16Wfd9sYfi+O8z9K64aO0gETO19up/9+oG2myTwRKZsGaGU578l0EPLaPF3Pr0WuAvMYR6s1RXf69+ox/LFaxGoCSLjN26aW3A9iwBGFARJ3Wl3ZdnOm3O+zsSkOk/xX26lfWd3F3DZbd4OncDd/ZZjbIu73JO0iB9c1pNekaL2ppVIOObprt8M1L03LqCpHX5RjM0otNf8SiwJXgPdaWla/GMPjbLDVewbqDSZHLoPb5KoG+Cy8oHkeRMKZt6++CToe1B2ZTcFkkHkLIcYL7bP+2Gjq0=
Content-Type: multipart/alternative; boundary="_000_CY4PR21MB0168848287439D02CE213FCBA39F0CY4PR21MB0168namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0b24b060-6ad5-4802-772d-08d67fdf6cce
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 Jan 2019 20:31:29.7276 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR21MB0631
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/t58P3sLVAx7hBMSXrKXd9VcvYqQ>
Subject: [Teep] IETF 104 hackathon
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 21 Jan 2019 20:31:35 -0000

I am again planning to be at the hackathon and work on OTrP implementation, and interop with anyone
else working on one.

For anyone else who would like to be there, please register for the Hackathon at
https://www.ietf.org/registration/ietf104/hackathonregistration.py

More hackathon info is available at https://www.ietf.org/how/runningcode/hackathons/104-hackathon/

As a reminder, the report from the previous hackathon is at
https://datatracker.ietf.org/meeting/103/materials/slides-103-teep-hackathon-report-01

Dave