Re: [Teep] Call for adoption of draft-thaler-teep-otrp-over-http

Anders Rundgren <anders.rundgren.net@gmail.com> Wed, 29 May 2019 18:39 UTC

Return-Path: <anders.rundgren.net@gmail.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C44A120048 for <teep@ietfa.amsl.com>; Wed, 29 May 2019 11:39:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZnLJb5fpBBaV for <teep@ietfa.amsl.com>; Wed, 29 May 2019 11:39:35 -0700 (PDT)
Received: from mail-wr1-x42e.google.com (mail-wr1-x42e.google.com [IPv6:2a00:1450:4864:20::42e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E2162120114 for <teep@ietf.org>; Wed, 29 May 2019 11:39:33 -0700 (PDT)
Received: by mail-wr1-x42e.google.com with SMTP id f8so2517468wrt.1 for <teep@ietf.org>; Wed, 29 May 2019 11:39:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language:content-transfer-encoding; bh=yPdueOkZFDGZqEQvRW8Sw28immRO1p0L2N5ooR+GV7k=; b=a5QWAqssRBp6xXjeGhu11VXnNAuYZHsXejvyGPpPn25jknRjTR8AWWQSsJ32wY7Rg4 n40H0CdYFVTNj9usXOsMiRPg5ttI2BN5DhNOaaG+VT8f0eOabI4E3k0vBM03JJDD51Xp HMVeGnAjX9VFNZJ4avX047yfA6NmDmsrjmqKCLSgSOaIFn/bG+M6EBx/T3DdbH2RHTtD hGhHT8wzvyLufCihilFJ91FYjtHanG9ONWgmbX49px15Od8Hj/iZAELIlYS0wKYGCWCg +0UI4BPk6VaAZii1roeJNlahI4Drh3Qx3+AuIM3HxPUvPKVul+pCma+n2kDm6Lbsvxw3 EgYw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=yPdueOkZFDGZqEQvRW8Sw28immRO1p0L2N5ooR+GV7k=; b=XnRAR7hUmtoQ7P5Yzc5LdQrClh34YB7m2LmTbf0sWgtITLoxX76oT4e9TRlxa6Q5My 0v/59SORx/bsm/rTQH8fBH/NzzWP3tKa2+lTHDVW4HA9mzsd7Lbl8OPExNY242hJWZif 4OeFevp8VQQZ2sNA8u7VYyYznM1JPkUopV0UJn7PAPLxTd5dX1L4HUcWYlOBLZDDr2W1 b7yvY3xuUoO9qYX60NPQ8vaHYxcWtgsaZH+z9Kl+gG4pPC+4puh6yXzxK0N2QQJmm9IT Ysj4jcBSN1xZhjnZL6qRdF/0mdFIC1dR523uMl+kGq3OsSK5CxORZPfkn+CqhXiBQgrm RAMQ==
X-Gm-Message-State: APjAAAXq03w0nGmZUJguITpy4fDjWhYnqqAJktkZJIJMxm5svIkeJ0e/ VFo9sNNxgEst3B7WIg9XZ4Gn7TMQlYA=
X-Google-Smtp-Source: APXvYqxXPy7zrAzm7Sf/WIydEEcYM5o2loHbyY6/kzSmndJzqji5y6b5Si+5WWAeT13PkwSbS5KDHA==
X-Received: by 2002:a5d:554f:: with SMTP id g15mr27404186wrw.318.1559155171782; Wed, 29 May 2019 11:39:31 -0700 (PDT)
Received: from [192.168.1.79] (25.131.146.77.rev.sfr.net. [77.146.131.25]) by smtp.googlemail.com with ESMTPSA id b5sm429185wrx.22.2019.05.29.11.39.29 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Wed, 29 May 2019 11:39:30 -0700 (PDT)
To: "Wheeler, David M" <david.m.wheeler@intel.com>, Hannes Tschofenig <Hannes.Tschofenig@arm.com>, Dave Thaler <dthaler=40microsoft.com@dmarc.ietf.org>, "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>, "teep@ietf.org" <teep@ietf.org>
References: <B57377C9-72EC-45C4-B5C2-9A6443B8C073@cisco.com> <246ce79a-75a6-4e4d-d76a-2b54eb71cf75@gmail.com> <BN6PR21MB0497781C059E34E015875C55A31E0@BN6PR21MB0497.namprd21.prod.outlook.com> <VI1PR08MB5360C0AFED2E8DDA94734016FA1F0@VI1PR08MB5360.eurprd08.prod.outlook.com> <0627F5240443D2498FAA65332EE46C843B74679C@CRSMSX102.amr.corp.intel.com>
From: Anders Rundgren <anders.rundgren.net@gmail.com>
Message-ID: <ce9c0b4c-8d18-1f29-9b53-b3e4220683b6@gmail.com>
Date: Wed, 29 May 2019 20:39:29 +0200
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0
MIME-Version: 1.0
In-Reply-To: <0627F5240443D2498FAA65332EE46C843B74679C@CRSMSX102.amr.corp.intel.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/ddeSUkfDcAHY-xnoBP0dgDdmvzI>
Subject: Re: [Teep] Call for adoption of draft-thaler-teep-otrp-over-http
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 May 2019 18:39:36 -0000

Hi David,
Since you mention the unfinished architecture document, have you seen https://github.com/ietf-teep/architecture/issues/52#issuecomment-493652265 ?

This is about creating a *unified* (JSON/CBOR independent) TEE management API.

Ten years ago I had something similar to OTrP but felt it was becoming "clunky" and limiting, so I threw it out and haven't regretted it a second.
The switch wasn't that difficult after getting the core mechanics in place.
Much later when I was forced switching protocol format from XML to JSON, *not a single bit* changed in the API.

Regards,
Anders


On 2019-05-29 16:43, Wheeler, David M wrote:
> I am more in favor of a CBOR/CWT binding than JSON, although I agree that JSON and JWT is more commonly deployed at the moment.
> 
> The direction I think we should push this is toward CBOR. However, I think that it is fine to build JSON into the OTrP protocol spec and then have an alternative specification that provides CBOR bindings ā€“ I would be willing to work with Anders on a such a specification (after the arch document is complete šŸ˜‰ ).
> 
> Thanks,
> 
> Dave Wheeler
> 
> *From:* TEEP <teep-bounces@ietf.org> *On Behalf Of *Hannes Tschofenig
> *Sent:* Wednesday, May 29, 2019 7:35 AM
> *To:* Dave Thaler <dthaler=40microsoft.com@dmarc.ietf.org>; Anders Rundgren <anders.rundgren.net@gmail.com>; Nancy Cam-Winget (ncamwing) <ncamwing@cisco.com>; teep@ietf.org
> *Subject:* Re: [Teep] Call for adoption of draft-thaler-teep-otrp-over-http
> 
>   * The IoT market has adopted CBOR rather than JSON.
> 
>   * Thatā€™s a bit overstated, ā€œIoTā€ is very broad and hence there are _/many/_ IoT ā€œmarketsā€, and many of them have not adopted CBOR. For example, if you look in industrial IoT, the dominant protocol is OPC UA, which uses neither CBOR nor JSON. In consumer IoT like in devices on shelves now, I think you will find that JSON is far more deployed than CBOR is (e.g., Hue light bulbs and many other IoT devices use JSON-over-HTTP). It is true that /some/ of the IoT market has adopted CBOR.Ā  For example, OCF adopted CBOR, but OCF has very little actual deployment today.
> 
> I agree with Dave here. I think it is fair to say that the JWT has been implement and deployed by the Web community. Particularly in the OAuth context it is widely deployed.
> 
> CBOR has been suggested for IoT-related specifications but CBOR, COSE and CWT is definitely not widely implement and even less widely used.
> 
> The question I wonder is whether the current deployment status matters in our case and I donā€™t think it has any relationship to the call for adoption of draft-thaler-teep-otrp-over-http.
> 
> When the initial version of OTrP was written there was the assumption that the encoding of the protocol in JSON would be more convenient for Web developers given that the main deployment use case was for mobile phones and tablets.
> 
> Now, there is of course the question whether Web developers should be exposed to the details and the encoding of the OTrP protocol itself. I think thatā€™s an important question. Afterall, we are trying to make the life of developers simpler with this work.
> 
> Since the formation of the TEEP group we have also added other use cases extending our original goals for OTrP. This makes me believe that it is worthwhile to look into a CBOR-based encoding as well. I also would like to take advance of ongoing working work in SUIT & RATS.
> 
> Ciao
> Hannes
> 
> IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.
>