Re: [Teep] Confidential Computing Developer Summit

Dave Thaler <dthaler@microsoft.com> Fri, 11 June 2021 16:22 UTC

Return-Path: <dthaler@microsoft.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 36BD23A0E8D for <teep@ietfa.amsl.com>; Fri, 11 Jun 2021 09:22:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.798
X-Spam-Level:
X-Spam-Status: No, score=-2.798 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.698, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6CFmICPxZOs5 for <teep@ietfa.amsl.com>; Fri, 11 Jun 2021 09:22:31 -0700 (PDT)
Received: from NAM04-BN8-obe.outbound.protection.outlook.com (mail-bn8nam08on2127.outbound.protection.outlook.com [40.107.100.127]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2D7483A0E8C for <teep@ietf.org>; Fri, 11 Jun 2021 09:22:30 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=L93iRvWjQ/yzQIqgKx7/KB3sqP5dX3IFpwY7H4OmymPseegSX3oj7FLE4DmVIXeXlglSur74urjLPfY5SZw2lhs9YJzTAddwCPSqp0THZeKMaDJ6tvJWJT8k2COOVtERbMjq2SBONR+7HVrFSrlZuISA3CJbSFKk2W9DGSuuP9nmDP1NVC2Xq8PHYsHAfC9c+gQvtVqASBxz6XUbQcRVnRUnXpe2YF/RStzorV08cbjKOjucFg43LOkEH+MDqiywiCj8ZN7owaWAVRJyb5ImU71ARIM4KUj0CmJsGbSvBwKvGsnegxikhQbwx6FfmasrF87u6jcio5dQw08tjVwU7w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mCUeooTKvffj6ah8fSNsMI5K0bGKq+6KvuYXzQFVE7c=; b=C6ge0FQeEfWeP9EeMhSIyzxDOjtYofrc6mHYtPwaY8gjVYqrG7c+LH2FVB9R2FGpNPGmre6ctpBEc2Blz7A4wERVuPgzrF1Y4yyIw4rEfBrx98e/Y9Du+YpZod1TE24PiOcg/SOq5jwYmtr+p13Osn8wp/g6OosipwHSXvhLytoebT3xRLV+5NT3hkFGonCzqaY/MiDCckgm7OpKWbf798ChLSE/FZjN7T77nB0h6WKaKBGVKNBFXQid4Cy97m4fo/EmLY6u7hUXFpJ6YwsldM1Cuu+73xcp1c+9gUgTmtrANqhkdB/j61azakv3tZ/cxdaPkMUb+LOMW0TSEFyvFg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=mCUeooTKvffj6ah8fSNsMI5K0bGKq+6KvuYXzQFVE7c=; b=C9ibHwZjVYfFIjnqCpQbYkgo8wKzIKH8+w4q4mPFF14Lzz5eL6ZC7mDOkYVxvKnGHHcIilu+SL0CWQCERAjfZhNPlPWaKTKgkuzM2F15PTkzxk1pHQntEmJ4RKJ650lvT8fXWDhh/hf0F93dL5/NxnyYcxmWLX70KsnPT+62Mpg=
Received: from BYAPR21MB1736.namprd21.prod.outlook.com (2603:10b6:a02:ca::18) by SJ0PR21MB2037.namprd21.prod.outlook.com (2603:10b6:a03:38c::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4242.12; Fri, 11 Jun 2021 16:22:27 +0000
Received: from BYAPR21MB1736.namprd21.prod.outlook.com ([fe80::84c0:dbf3:d27e:4e63]) by BYAPR21MB1736.namprd21.prod.outlook.com ([fe80::84c0:dbf3:d27e:4e63%9]) with mapi id 15.20.4242.013; Fri, 11 Jun 2021 16:22:27 +0000
From: Dave Thaler <dthaler@microsoft.com>
To: "teep@ietf.org" <teep@ietf.org>
Thread-Topic: Confidential Computing Developer Summit
Thread-Index: AddYoDA4FgI8R/6XRV26gZBlduMGLgGPWL2A
Date: Fri, 11 Jun 2021 16:22:27 +0000
Message-ID: <BYAPR21MB1736252FF411AC64DD7A8611A3349@BYAPR21MB1736.namprd21.prod.outlook.com>
References: <BYAPR21MB1736DBB30F829E4780E72151A33C9@BYAPR21MB1736.namprd21.prod.outlook.com>
In-Reply-To: <BYAPR21MB1736DBB30F829E4780E72151A33C9@BYAPR21MB1736.namprd21.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=051c800f-d11e-487c-8282-cb78989f3fef; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2021-06-03T17:44:45Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47;
authentication-results: ietf.org; dkim=none (message not signed) header.d=none;ietf.org; dmarc=none action=none header.from=microsoft.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 5d9987f0-438a-4f9d-2c03-08d92cf51a83
x-ms-traffictypediagnostic: SJ0PR21MB2037:
x-microsoft-antispam-prvs: <SJ0PR21MB2037A68DE12939B48CB4E2F1A3349@SJ0PR21MB2037.namprd21.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8273;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR21MB1736.namprd21.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(71200400001)(3480700007)(9686003)(966005)(8990500004)(6506007)(2906002)(55016002)(186003)(53546011)(33656002)(7696005)(38100700002)(8676002)(5660300002)(66446008)(64756008)(52536014)(66946007)(86362001)(66556008)(66476007)(76116006)(8936002)(498600001)(82960400001)(82950400001)(6916009)(10290500003)(122000001)(166002); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
x-ms-exchange-transport-forked: True
Content-Type: multipart/alternative; boundary="_000_BYAPR21MB1736252FF411AC64DD7A8611A3349BYAPR21MB1736namp_"
MIME-Version: 1.0
X-OriginatorOrg: microsoft.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR21MB1736.namprd21.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5d9987f0-438a-4f9d-2c03-08d92cf51a83
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Jun 2021 16:22:27.2110 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: DAQafrIe2p1SMggVlHRk8KUpa5cvu2jNyUmYTLn5q6f5ESFBdF/dp1Ztpb3iR6tz5IbL7FTTb2cAiZC3tNWSxbOrTbOwXCgJCe16+fv/ISE=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR21MB2037
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/jUsOPxMoBOAM1nFs_7IwrJecPpI>
Subject: Re: [Teep] Confidential Computing Developer Summit
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 11 Jun 2021 16:22:36 -0000

I will be talking about TEEP at 1pm PDT at the summit, and the "applicability statement" topic we discussed as captured in Do we want an "applicability statement"? * Issue #217 * ietf-teep/architecture (github.com)<https://github.com/ietf-teep/architecture/issues/217>
that resulted in https://github.com/ietf-teep/architecture/pull/218 last year.

Goal is to have a discussion among developers in the confidential computing industry around what TEES/scenarios would want to use the TEEP protocol.

Dave

From: Dave Thaler
Sent: Thursday, June 3, 2021 10:54 AM
To: teep@ietf.org; rats@ietf.org
Subject: Confidential Computing Developer Summit

The Confidential Computing Consortium is having a (free) virtual "developer summit" on Friday June 11,
which is likely to be of interest to many TEEP and RATS participants:
https://events.linuxfoundation.org/confidential-computing-developer-summit/

The event will be an "unconference"-style day of collaborative learning, discussion, and demos. There
will be over-arching topics (Attestation, Cloud Native, and DevModels) and for each of those these topics,
participants will work with the moderator to create the agenda and determine the sub-topics, presenters,
and discussions during the event itself.  I expect that the attestation topic will be of particular interest to
RATS folks, and other sessions are relevant to TEEP.

A number of active RATS WG participants have already been active participants in CCC attestation discussions,
and we want to encourage collaboration between standards and open source projects, so I think this is a
great opportunity.

Dave