Re: [Teep] Charter Text

Jeremy O'Donoghue <jodonogh@qti.qualcomm.com> Mon, 30 October 2017 16:59 UTC

Return-Path: <jodonogh@qti.qualcomm.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B41518293 for <teep@ietfa.amsl.com>; Mon, 30 Oct 2017 09:59:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -5.01
X-Spam-Level:
X-Spam-Status: No, score=-5.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=qti.qualcomm.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Lprk6xOyNne5 for <teep@ietfa.amsl.com>; Mon, 30 Oct 2017 09:59:02 -0700 (PDT)
Received: from sabertooth01.qualcomm.com (sabertooth01.qualcomm.com [65.197.215.72]) (using TLSv1.2 with cipher AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 69EF2816D for <teep@ietf.org>; Mon, 30 Oct 2017 09:55:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=qti.qualcomm.com; i=@qti.qualcomm.com; q=dns/txt; s=qcdkim; t=1509382500; x=1540918500; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=ymEq6bfJBGjwMNkrMH2JLz8sD8s4cMeTP5SvOlQVD8I=; b=Muu+45GzpRt19NwwJbWIpAPBQuyhfK/OnSaDTu7p0hB96i4ZlC6ZxBnv CrN+8NZ6BoY+t0CtRGaKGvOnicWeMK8WNTjve7ZTNIbfTn/FLFXX9TbiZ xMMudbCvREkyLEK9GyfM4dNfhHi1VDYUIEDuSL2a9Ssjo04zQAelcZjeU I=;
X-IronPort-AV: E=Sophos;i="5.44,320,1505804400"; d="scan'208,217";a="116272451"
Received: from unknown (HELO ironmsg02-R.qualcomm.com) ([10.53.140.106]) by sabertooth01.qualcomm.com with ESMTP; 30 Oct 2017 09:54:59 -0700
X-IronPort-AV: E=McAfee;i="5900,7806,8699"; a="1060922546"
X-MGA-submission: MDFSgewtPLLHPYRJNznwZ56KpqlTjTxje1P+OCPX7rBnzOc4DuA9xqYCr5YVdIK0E5RcPzRJLuy3RmLqwQzKcEwy9857gXQlkmDn4568X3OPsBAUfyxAuA/8eSUBAiLYTZ3ASBbOoUgqC6ygbzR9fL1v
Received: from nasanexm03a.na.qualcomm.com ([10.85.0.103]) by ironmsg02-R.qualcomm.com with ESMTP/TLS/AES256-SHA; 30 Oct 2017 09:54:58 -0700
Received: from euamsexm01e.eu.qualcomm.com (10.251.127.42) by nasanexm03a.na.qualcomm.com (10.85.0.103) with Microsoft SMTP Server (TLS) id 15.0.1293.2; Mon, 30 Oct 2017 09:54:57 -0700
Received: from euamsexm01a.eu.qualcomm.com (10.251.127.40) by euamsexm01e.eu.qualcomm.com (10.251.127.42) with Microsoft SMTP Server (TLS) id 15.0.1293.2; Mon, 30 Oct 2017 17:54:53 +0100
Received: from euamsexm01a.eu.qualcomm.com ([10.251.127.40]) by euamsexm01a.eu.qualcomm.com ([10.251.127.40]) with mapi id 15.00.1293.002; Mon, 30 Oct 2017 17:54:53 +0100
From: Jeremy O'Donoghue <jodonogh@qti.qualcomm.com>
To: Dave Thaler <dthaler@microsoft.com>
CC: "Wheeler, David M" <david.m.wheeler@intel.com>, "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>, "teep@ietf.org" <teep@ietf.org>
Thread-Topic: [Teep] Charter Text
Thread-Index: AQHTM0gGdYnbyuqWOUmprbpTrO74vaLANEMAgAA1JACAAGwbAIAACYwAgDveX4CAAArbAA==
Date: Mon, 30 Oct 2017 16:54:53 +0000
Message-ID: <14B0990F-D945-489E-B190-7861E0931498@qti.qualcomm.com>
References: <6EFD27BC-CE56-4112-AD20-C787520BEE87@cisco.com> <DM5PR20MB1228DEC9757FCBDCA4254052AAA70@DM5PR20MB1228.namprd20.prod.outlook.com> <d6015c71-04de-3323-bb08-5ac66a5c21d0@mixmax.com> <35502548-8d02-4af2-b409-d8be73dd6a6d.max.ldp@alibaba-inc.com> <CAKcc6AdZV7HsUvTiKnSP7dXf9Q4PMfBmNyWnwMLnGF6re3aKAQ@mail.gmail.com> <201709221010555677461@bjleisen.com> <06E2371B-CD39-4205-B663-FF8C0AD300A6@cisco.com> <6573BB65-A7AD-4CF2-996D-A0C64B8BD8B8@qti.qualcomm.com> <0627F5240443D2498FAA65332EE46C8436743A75@CRSMSX102.amr.corp.intel.com> <F9296C1B-9EC8-438F-8C3F-7CCF19371DDF@qti.qualcomm.com> <CY4PR21MB0856AE0C84D1919C222EC7BBA3590@CY4PR21MB0856.namprd21.prod.outlook.com>
In-Reply-To: <CY4PR21MB0856AE0C84D1919C222EC7BBA3590@CY4PR21MB0856.namprd21.prod.outlook.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-mailer: Apple Mail (2.3273)
x-ms-exchange-messagesentrepresentingtype: 1
x-ms-exchange-transport-fromentityheader: Hosted
x-originating-ip: [10.222.224.82]
Content-Type: multipart/alternative; boundary="_000_14B0990FD945489EB1907861E0931498qtiqualcommcom_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/iWzbMHkCnvYKMDcMHyyyIRW4Z6Y>
Subject: Re: [Teep] Charter Text
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 30 Oct 2017 16:59:09 -0000

It is a little difficult to be certain since GlobalPlatform participation is organised by company, where IETF is individual.

However, based on the GlobalPlatform TEE Spec Working Group roster - this is the relevant e-mail reflector - I am aware of participants who are also subscribed to the TEEP list (snapshot of both lists at 16:21 UTC today) who are operating from e-mail addresses at the following companies (same e-mail address in all cases).


  *   Qualcomm (myself), ARM, Interceed, Symantec, Solacia (under than name “Hansol Secure”), Huawei, Oracle

Four of the five authors credited with OTrP draft 4 are on the GlobalPlatform TEE Spec Working Group e-mail roster. The fifth has just left his employer and left the GlobalPlatform roster approximately three weeks ago.

I cannot speak directly on behalf of GlobalPlatform, but as I wrote the document outlining the approach to be taken in GlobalPlatform, I can share the following:

- The guiding objective is to be able to implement both OTrP and TMF [1] (an existing GlobalPlatform remote management specification) using a common TEE Remote Admin Service
- Where OTrP and TMF are aligned (which is true for most cases) TMF applies unchanged. Where OTrP differs from TMF, align behaviour as far as possible and document the differences.
- Document OTrP requirements around the “Bootstrap Domain” (in TMF terminology this is a Security Domain that is typically instantiated at device manufacture, and may contain functionality that cannot be created using TMF commands)
- The following set of work products to be produced:
  - Modification to existing TMF specification to support OTrP
  - Addition to the SC-RAM [2] specification to accommodate and specify the OTrP agent
  - Write a new document detailing how JSON in OTrP maps to ASN.1 command set defined in TMF
  - Write a new security layer document (if required) to support OTrP
  - Write a configuration document for OTrP (this is the precursor to compliance program as it defines the testable set of functionality)
  - Write a new white paper describing OTrP and TMF

The GlobalPlatform working groups are open only to members. Published specifications are free to download, but reside behind a “click-through” license. GlobalPlatform is open in the sense that anyone wishing to pay the appropriate membership fee can participate.

Hope this helps. If more information is needed I believe it would be most appropriate to reach out to GlobalPlatform directly as I am speaking in a personal capacity here.

Jeremy

[1]: TMF - https://globalplatform.org/specificationform.asp?fid=7866
[2] : SC-RAM - https://globalplatform.org/specificationform.asp?fid=7706

On 30 Oct 2017, at 16:16, Dave Thaler <dthaler@microsoft.com<mailto:dthaler@microsoft.com>> wrote:

Do we know who from GlobalPlatform is participating in IETF, and vice versa?

Is there a description of the work GlobalPlatform is proposing to do related to OTrP?

Where can IETF participants find GP’s discussion of OTrP?  Is it an open or closed forum?

Thanks,
Dave

From: TEEP [mailto:teep-bounces@ietf.org] On Behalf Of Jeremy O'Donoghue
Sent: Friday, September 22, 2017 8:01 AM
To: Wheeler, David M <david.m.wheeler@intel.com<mailto:david.m.wheeler@intel.com>>
Cc: Nancy Cam-Winget (ncamwing) <ncamwing@cisco.com<mailto:ncamwing@cisco.com>>; teep@ietf.org<mailto:teep@ietf.org>
Subject: Re: [Teep] Charter Text

Hi Dave,

On 22 Sep 2017, at 15:26, Wheeler, David M <david.m.wheeler@intel.com<mailto:david.m.wheeler@intel.com>> wrote:

I understand your perspective and concern (I think, but would like to hear more). From Intel’s side, we have some issues with “too close” relationship to GP, because GP’s definition of TEE security ties that security to trusted boot. I understand that TZ, and even some of Intel’s TEEs (Android Trusty implementation) require a trusted secure boot in order to themselves be secure, but Intel also has TEEs that are *completely separated* from secure boot, and therefore do not require a secure booted platform to retain security.

You are correct on this point. However, the GP notion of “trusted boot” allows quite a lot of wiggle room - the essential requirement is that the mechanism whereby the TEE is instantiated is bound to a secure root of trust on the SoC or on off-SoC security processor. I don’t know enough about SGX to be able to say whether it could meet this definition.

Most actual implementations of GP TEEs are bound to the ARM TZ architecture, so there may well be some bias to that in some of the informative material around a GP TEE.

However, implementations of most of the specifications e.g. the GP Internal Core API, Management Framework, OTrP etc. are not bound to that security definition. Both TMF and the GP approach to OTrP are explicitly designed to support management of non-GP TEE.

I do recognise that being outside the GP Security definition might pose commercial difficulties in such an approach.


Too close a relationship to GP will create issues around this definition. We need greater discussion around this, otherwise, by definition it rejects certain Intel TEEs (SGX primarily) and then Intel would consider this an implementation specific definition aligned to TrustZone, and not a general TEE protocol.

My suspicion is that it also rejects ARM Cortex-M Trustzone for similar reasons (which I think has some similarities to SGX in its approach)


I think we need to talk more about this. I agree there is a lot of good stuff in GP that we should leverage.

Are you open to changing some of these core definitions, and working through the implications of those changes with us? This will separate us somewhat form GP standards, I think.

I think there is a need to have standards supporting TEEs that are not rooted in a secure boot style root of trust, and (ideally) for these to behave similarly from a developer and management perspective to TEEs that have such a root.

I would have thought that the main effort in such a case would be to define a system architecture, security requirements and (eventually) a Protection Profile - this looks a long way from the charter as currently proposed.

I would need to discuss further internally as to whether that is an effort to which I would be able to contribute.

Best regards
Jeremy


Very interested in your thoughts and perspective.
Thanks,
Dave Wheeler

From: TEEP [mailto:teep-bounces@ietf.org] On Behalf Of Jeremy O'Donoghue
Sent: Friday, September 22, 2017 1:00 AM
To: Nancy Cam-Winget (ncamwing) <ncamwing@cisco.com<mailto:ncamwing@cisco.com>>
Cc: teep@ietf.org<mailto:teep@ietf.org>
Subject: Re: [Teep] Charter Text

Qualcomm would like to ensure that the charter and proposed deliverables are properly differentiated from work occurring in GlobalPlatform based on the OTrP contribution which has been accepted as a GlobalPlatform work item.

Since the proposed charter for teep includes a close relationship with GlobalPlatform, Qualcomm suggests some alignment between the organisations to ensure that there is a single, definitive, set of standards defining OTrP as the best outcome for all participants.

---
Jeremy O’Donoghue                            email: jodonogh@qti.qualcomm.com<mailto:jodonogh@qti.qualcomm.com>
Engineer, Principal/Manager                  tel:   +44 1252 363189
NFC & Secure Software and Systems




On 22 Sep 2017, at 05:49, Nancy Cam-Winget (ncamwing) <ncamwing@cisco.com<mailto:ncamwing@cisco.com>> wrote:

Thank you all for responding  and for demonstrating there is good support to move this work along.

It would be good to get discussions started on the current drafts and milestones as well.

                Nancy

From: TEEP <teep-bounces@ietf.org<mailto:teep-bounces@ietf.org>> on behalf of "zhoup@bjleisen.com<mailto:zhoup@bjleisen.com>" <zhoup@bjleisen.com<mailto:zhoup@bjleisen.com>>
Date: Thursday, September 21, 2017 at 7:10 PM
To: Dapeng Liu <maxpassion@gmail.com<mailto:maxpassion@gmail.com>>, Lubna Dajani <lubnadajani@gmail.com<mailto:lubnadajani@gmail.com>>, "ppeterka@verimatrix.com<mailto:ppeterka@verimatrix.com>" <ppeterka@verimatrix.com<mailto:ppeterka@verimatrix.com>>, teep-bounces <teep-bounces@ietf.org<mailto:teep-bounces@ietf.org>>, teep <teep@ietf.org<mailto:teep@ietf.org>>, Mingliang Pei <Mingliang_Pei@symantec.com<mailto:Mingliang_Pei@symantec.com>>, "Marc.Canel" <Marc.Canel@arm.com<mailto:Marc.Canel@arm.com>>, Richard Parris <richard.parris@intercede.com<mailto:richard.parris@intercede.com>>, Rob Coombs <rob.coombs@arm.com<mailto:rob.coombs@arm.com>>, "qingyang.meng" <qingyang.meng@beanpodtech.com<mailto:qingyang.meng@beanpodtech.com>>, Brian Witten <brian_witten@symantec.com<mailto:brian_witten@symantec.com>>, "henry.j.lee@samsung.com<mailto:henry.j.lee@samsung.com>" <henry.j.lee@samsung.com<mailto:henry.j.lee@samsung.com>>, Nick Cook <Nick.Cook@intercede.com<mailto:Nick.Cook@intercede.com>>, "Mike.M.Parsel@sprint.com<mailto:Mike.M.Parsel@sprint.com>" <Mike.M.Parsel@sprint.com<mailto:Mike.M.Parsel@sprint.com>>, Hannes Tschofenig <hannes.tschofenig@arm.com<mailto:hannes.tschofenig@arm.com>>, "zhijian.zhang" <zhijian.zhang@beanpodtech.com<mailto:zhijian.zhang@beanpodtech.com>>, 魏茂军<maojun.wei@watchdata.com<mailto:maojun.wei@watchdata.com>>, Dominique Bolignano <dominique.bolignano@provenrun.com<mailto:dominique.bolignano@provenrun.com>>, "heekwan.lee@samsung.com<mailto:heekwan.lee@samsung.com>" <heekwan.lee@samsung.com<mailto:heekwan.lee@samsung.com>>, Mike Hendrick <mike.hendrick@seqlabs.com<mailto:mike.hendrick@seqlabs.com>>, XiaYubin <xiayubin@trustkernel.com<mailto:xiayubin@trustkernel.com>>, "sangjin.park@hansol.com<mailto:sangjin.park@hansol.com>" <sangjin.park@hansol.com<mailto:sangjin.park@hansol.com>>, "Paczkowski, Lyle W [CTO]" <lyle.w.paczkowski@sprint.com<mailto:lyle.w.paczkowski@sprint.com>>, Pengcheng Zou <zoupc@thundersoft.com<mailto:zoupc@thundersoft.com>>, "fmw@whty.com.cn<mailto:fmw@whty.com.cn>" <fmw@whty.com.cn<mailto:fmw@whty.com.cn>>, "philip.attfield" <philip.attfield@seqlabs.com<mailto:philip.attfield@seqlabs.com>>, "Andrew.Atyeo" <Andrew.Atyeo@intercede.com<mailto:Andrew.Atyeo@intercede.com>>, paromix <paromix@sola-cia.com<mailto:paromix@sola-cia.com>>, ppeterkaa <ppeterkaa@verimatrix.com<mailto:ppeterkaa@verimatrix.com>>, "max.ldp@alibaba-inc.com<mailto:max.ldp@alibaba-inc.com>" <max.ldp@alibaba-inc.com<mailto:max.ldp@alibaba-inc.com>>
Subject: Re: [Teep] Charter Text

hi,

 Beijing Laser Tech. support it.thanks.

________________________________
周鹏
CEO
北京雷森科技发展有限公司
Beijing Laser Technology Development CO.,LTD
地址:西直门北大街甲43号金运大厦7层  邮编100044
手机:18910750012/15601105750/13911779990
网址:www.bjleisen.c<https://na01.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.opentsm.cn%2F&data=02%7C01%7Cdthaler%40microsoft.com%7Cb5effd332f214ff93f0e08d501caca62%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636416892865103785&sdata=QGZG4LJTJS0hN7R8hvne1U19a83LybyhnnbxQySBYNQ%3D&reserved=0>om

From: Dapeng Liu<mailto:maxpassion@gmail.com>
Date: 2017-09-13 00:49
To: Lubna Dajani<mailto:lubnadajani@gmail.com>; ppeterka<mailto:ppeterka@verimatrix.com>; teep-bounces<mailto:teep-bounces@ietf.org>; teep<mailto:teep@ietf.org>; Mingliang Pei<mailto:Mingliang_Pei@symantec.com>; Marc Canel<mailto:Marc.Canel@arm.com>; richard.parris@intercede.com<mailto:richard.parris@intercede.com>; Rob Coombs<mailto:rob.coombs@arm.com>; qingyang.meng<mailto:qingyang.meng@beanpodtech.com>; brian_witten<mailto:brian_witten@symantec.com>; henry.j.lee@samsung.com<mailto:henry.j.lee@samsung.com>; Nick Cook<mailto:Nick.Cook@intercede.com>; Mike.M.Parsel@sprint.com<mailto:Mike.M.Parsel@sprint.com>; Hannes Tschofenig<mailto:hannes.tschofenig@arm.com>; zhijian.zhang<mailto:zhijian.zhang@beanpodtech.com>; zhoup<mailto:zhoup@bjleisen.com>; maojun.wei<mailto:maojun.wei@watchdata.com>; dominique.bolignano<mailto:dominique.bolignano@provenrun.com>; heekwan.lee@samsung.com<mailto:heekwan.lee@samsung.com>; mike.hendrick@seqlabs.com<mailto:mike.hendrick@seqlabs.com>; xiayubin<mailto:xiayubin@trustkernel.com>; sangjin.park<mailto:sangjin.park@hansol.com>; lyle.w.paczkowski<mailto:lyle.w.paczkowski@sprint.com>; Pengcheng Zou<mailto:zoupc@thundersoft.com>; fmw<mailto:fmw@whty.com.cn>; philip.attfield<mailto:philip.attfield@seqlabs.com>; Andrew.Atyeo<mailto:Andrew.Atyeo@intercede.com>; paromix<mailto:paromix@sola-cia.com>; ppeterkaa<mailto:ppeterkaa@verimatrix.com>; 成 鹏<mailto:max.ldp@alibaba-inc.com>
Subject: re: [Teep] Charter Text
Hello Nancy,

Thanks!

Actually, there are lots of companies/experts are very interested in the proposed TEEP work. But they may not familiar with IETF process, I hope they would getting more active in the list after the long
summer vacation:)

Note: I have copied to all the experts that are interested in TEEP based on offline discussions.
To all the experts copied in this mail: Please subscribe to TEEP email list first if you want to reply.   Here is how to subscribe: https://www.ietf.org/mailman/listinfo/teep<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fteep&data=02%7C01%7Cdthaler%40microsoft.com%7Cb5effd332f214ff93f0e08d501caca62%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636416892865113798&sdata=foGdN4f%2FHSWJzYRrxXq%2Fi5aXMZJgwLQi9kcqu2cjN7M%3D&reserved=0>

Thanks,
Max
------------------------------------------------------------------
From:Nancy Cam-Winget (ncamwing) <ncamwing@cisco.com<mailto:ncamwing@cisco.com>>
Send Time:2017年9月12日(星期二) 23:50
To:Lubna Dajani <lubnadajani@gmail.com<mailto:lubnadajani@gmail.com>>; Petr Peterka <ppeterka@verimatrix.com<mailto:ppeterka@verimatrix.com>>
Cc:teep@ietf.org<mailto:Cc%3Ateep@ietf.org> <teep@ietf.org<mailto:teep@ietf.org>>
Subject:Re: [Teep] Charter Text

Thank you Lubna and Petr!

Would still like to hear from others and also solicit feedback on the proposed charter text.

Warm regards,
                Nancy

From: Lubna Dajani <lubnadajani@gmail.com<mailto:lubnadajani@gmail.com>>

Date: Tuesday, September 12, 2017 at 4:40 AM
To: Petr Peterka <ppeterka@verimatrix.com<mailto:ppeterka@verimatrix.com>>
Cc: "ncamwing@cisco.com<mailto:ncamwing@cisco.com>" <ncamwing@cisco.com<mailto:ncamwing@cisco.com>>, "teep@ietf.org<mailto:teep@ietf.org>" <teep@ietf.org<mailto:teep@ietf.org>>

Subject: Re: [Teep] Charter Text

please allow me to echo Petr's responses.
1. Yes
2. Yes
3. Yes
4. Yes
 I am personally very excited to see this WG form and I look forward to actively contributing to the evolution of this protocol as I have since the ideation stages of this protocol …

Thank you Nancy, Petr and everyone here…

Lubna
__________________________________________________
Lubna Dajani  I  Allternet Ltd.
@lubnadajani
@futuristasORG
+ 1 201 982 0934<tel:(201)%20982-0934>


Confidentiality Notice: The information contained in this email and any attachments is intended only for the recipient[s] listed above and may be privileged and confidential. Any dissemination, copying, or use of or reliance upon such information by or to anyone other than the recipient[s] listed above is prohibited. If you have received this message in error, please notify the sender immediately at the email address above and destroy any and all copies of this message.

Sent with Mixmax<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmixmax.com%2Fs%2FSjmasx74wNoX3uu2B%3Futm_source%3Dmixmax%26utm_medium%3Demail%26utm_campaign%3Dsignature_link%26utm_content%3Dsent_with_mixmax&data=02%7C01%7Cdthaler%40microsoft.com%7Cb5effd332f214ff93f0e08d501caca62%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636416892865113798&sdata=olYrJvtu8yvXScwR5fcT8IPl03hxFWkNVOdvTamoB0o%3D&reserved=0>


On Thu, Jul 20, 2017 2:48 AM, Petr Peterka ppeterka@verimatrix.com<mailto:ppeterka@verimatrix.com> wrote:
Hi Nancy
I think we had a very productive meeting yesterday. Here are my answers to your questions:

1) Do you understand what TEEP is trying to achieve?
ANSWER: Yes, I do. I’d like to add that the charter may re-emphasize that the proposed WG is not going to define the TEE or the TAM service themselves but just the protocol between them.

2) Is this work that should be done in general?
ANSWER: Yes, it should since there are going to be more and more trusted execution environments (lower case) especially with the proliferation of IoT devices which will need more security than what they have today.

3) Is this work that should be done in the IETF, or does it belong to somewhere else?
ANSWER: Since we are trying to define a protocol that is independent of the different TEE implementations, I believe that IETF is the right home for it.

4) Should we form a WG with given charter to work on this?
ANSWER: Yes, that is my recommendation.

Thanks
          Petr
 <x-msg://13/#m_4019887533134155472_this>
From: TEEP [mailto:teep-bounces@ietf.org<mailto:teep-bounces@ietf.org>] On Behalf Of Nancy Cam-Winget (ncamwing)
Sent: Thursday, July 20, 2017 11:13 AM
To: teep@ietf.org<mailto:teep@ietf.org>
Subject: Re: [Teep] Charter Text

All,
Please provide feedback on the results of yesterday’s side meeting.  In particular, we’d like to get feedback on whether this the right scope and if we have captured it appropriately. If it is not, also please comment and if possible, provide suggestions for improvement.

We would like to continue discussion over email and get consensus around the 2nd week of September so that we can have a path forward.  In particular we would like to get answers for:

1) Do you understand what TEEP is trying to achieve?
2) Is this work that should be done in general?
3) Is this work that should be done in the IETF, or does it belong to somewhere else?
4) Should we form a WG with given charter to work on this?

Warm regards,
    Nancy & Tero (TEEP BoF Chairs)

From: TEEP <teep-bounces@ietf.org<mailto:teep-bounces@ietf.org>> on behalf of Hannes Tschofenig <Hannes.Tschofenig@arm.com<mailto:Hannes.Tschofenig@arm.com>>
Date: Wednesday, July 19, 2017 at 5:56 AM
To: "teep@ietf.org<mailto:teep@ietf.org>" <teep@ietf.org<mailto:teep@ietf.org>>
Subject: [Teep] Charter Text

Here is the charter text we came up in the side-meeting today.

------




TEEP -- A Protocol for Dynamic Trusted Execution Environment Enablement Charter

The Trusted Execution Environment (TEE) is a secure area of a processor. The TEE provides security features, such as isolated execution, integrity of Trusted Applications along with confidentiality of their assets. In general terms, the TEE offers an execution space that provides a higher level of security than a "rich" operating system and more functionality than a secure element. For example, implementations of the TEE concept have been developed by ARM, and Intel using the TrustZone and the SGX technology, respectively.

To programmatically install, update, and delete applications running in the TEE, this protocol runs between a service running within the TEE, a relay application or service access point on the device's network stack and a server-side infrastructure that interacts with and optionally maintains the applications. Some tasks are security sensitive and the server side requires information about the device characteristics in form of attestation and the device-side may require information about the server.

Privacy considerations have to be taken into account with authentication features and attestation.

This working group aims to develop an application layer protocol providing TEEs with the following functionality,
* lifecycle management of trusted applications, and
* security domain management.

A security domain allows a service provider's applications to be isolated so that one security domain cannot be influenced by another, unless it exposes an API to allow it.

The solution approach must take a wide range of TEE and relevant technologies into account and will focus on the use of public key cryptography.

The group will produce the following deliverables. First, an architecture document describing the involved entities, their relationships, assumptions, the keying framework and relevant use cases. Second, a solution document that describes the above-described functionality. The choice of encoding format(s) will be decided in the working group. The group may document several attestation technologies considering the different hardware capabilities, performance, privacy and operational properties.

The group will maintain a close relationship with the GlobalPlatform, Trusted Computing Group,  and other relevant standards to ensure proper use of existing TEE-relevant application layer interfaces.

Milestones

Dec 2017     Submit "TEEP Architecture" document as WG item.

Feb 2018     Submit "TEEP Protocol" document as WG item.

July 2018     Submit "TEEP Architecture" to the IESG for publication as an Informational RFC.

Feb 2019     Submit "TEEP Protocol" to the IESG for publication as a Proposed Standard.

Additional calendar items:

Nov 2017     IETF #100 Hackathon to work on TEEP protocol prototype implementations.

Mar 2018     1st interoperability event (at IETF #101).

Jul 2018       2nd interoperability event (at IETF #102).

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.




_______________________________________________
TEEP mailing list
TEEP@ietf.org<mailto:TEEP@ietf.org>
https://www.ietf.org/mailman/listinfo/teep<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.ietf.org%2Fmailman%2Flistinfo%2Fteep&data=02%7C01%7Cdthaler%40microsoft.com%7Cb5effd332f214ff93f0e08d501caca62%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C636416892865113798&sdata=foGdN4f%2FHSWJzYRrxXq%2Fi5aXMZJgwLQi9kcqu2cjN7M%3D&reserved=0>