Re: [Teep] [EXT] Re: [EXT] Re: [EXT] Re: Charter strawman proposal

Mingliang Pei <Mingliang_Pei@symantec.com> Wed, 26 April 2017 21:58 UTC

Return-Path: <Mingliang_Pei@symantec.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8ECD61252BA for <teep@ietfa.amsl.com>; Wed, 26 Apr 2017 14:58:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.222
X-Spam-Level:
X-Spam-Status: No, score=-4.222 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=symc.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6_huo08etRk6 for <teep@ietfa.amsl.com>; Wed, 26 Apr 2017 14:58:43 -0700 (PDT)
Received: from tussmtoutape01.symantec.com (Tussmtoutape01.symantec.com [155.64.38.231]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BE11112709D for <teep@ietf.org>; Wed, 26 Apr 2017 14:58:43 -0700 (PDT)
Received: from tussmtmtaapi02.symc.symantec.com (tus3-f5-symc-ext-prd-snat10.net.symantec.com [10.44.130.10]) by tussmtoutape01.symantec.com (Symantec Messaging Gateway) with SMTP id 84.7B.40682.31811095; Wed, 26 Apr 2017 21:58:43 +0000 (GMT)
X-AuditID: 0a2c7e31-dc6d39a000009eea-c0-59011813a523
Received: from tus3xchcaspin01.SYMC.SYMANTEC.COM (tus3-f5-symc-ext-prd-snat8.net.symantec.com [10.44.130.8]) by tussmtmtaapi02.symc.symantec.com (Symantec Messaging Gateway) with SMTP id D9.DE.58529.21811095; Wed, 26 Apr 2017 21:58:43 +0000 (GMT)
Received: from TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (10.44.91.34) by tus3xchcaspin01.SYMC.SYMANTEC.COM (10.44.91.13) with Microsoft SMTP Server (TLS) id 15.0.1236.3; Wed, 26 Apr 2017 14:58:42 -0700
Received: from NAM01-SN1-obe.outbound.protection.outlook.com (10.44.128.9) by TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (10.44.91.34) with Microsoft SMTP Server (TLS) id 15.0.1236.3 via Frontend Transport; Wed, 26 Apr 2017 14:58:42 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=symc.onmicrosoft.com; s=selector1-symantec-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=sxXDhTuK9e2Fi/HTDsHZCFA1BIBiwDhKp+/qMYtw3Cw=; b=sUgcFaozeiEgdqydmmi5eiylltc6nBJsPixL2znKy2zlczNLR/6gQ0Ruu9+GUi/EswqDQHS1IXyJ08rk84kzC8yGI3bVECMmgtG5d3/Eu5qGRLX//t6TWVFxUH6lmJVPQJ6tA8tZTXKpGx78PfyZj8sTfFQrQyG9j9zMMy+RSmc=
Received: from CY4PR1601MB1126.namprd16.prod.outlook.com (10.172.117.12) by CY4PR1601MB1125.namprd16.prod.outlook.com (10.172.117.11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1047.13; Wed, 26 Apr 2017 21:58:41 +0000
Received: from CY4PR1601MB1126.namprd16.prod.outlook.com ([10.172.117.12]) by CY4PR1601MB1126.namprd16.prod.outlook.com ([10.172.117.12]) with mapi id 15.01.1047.019; Wed, 26 Apr 2017 21:58:40 +0000
From: Mingliang Pei <Mingliang_Pei@symantec.com>
To: Mingliang Pei <Mingliang_Pei@symantec.com>, Brian Witten <brian_witten@symantec.com>, Nick Cook <Nick.Cook@intercede.com>
CC: "teep@ietf.org" <teep@ietf.org>
Thread-Topic: [EXT] Re: [Teep] [EXT] Re: [EXT] Re: Charter strawman proposal
Thread-Index: AQHSvthDvHrkfstNhkm8ryytlR6aLw==
Date: Wed, 26 Apr 2017 21:58:39 +0000
Message-ID: <D52665F7.33B20%mingliang_pei@symantec.com>
References: <HE1PR0802MB2475D750A62DFFAB28F1768CFA320@HE1PR0802MB2475.eurprd08.prod.outlook.com> <0627F5240443D2498FAA65332EE46C84366EA50D@CRSMSX102.amr.corp.intel.com> <HE1PR0802MB24757875E98E453BAFD35C40FA320@HE1PR0802MB2475.eurprd08.prod.outlook.com> <VI1PR06MB321539A06179D62B7C0001F0FF110@VI1PR06MB3215.eurprd06.prod.outlook.com> <57999A96-6EB4-45FF-A646-86353849B8DC@symantec.com> <D5266162.33B19%mingliang_pei@symantec.com>
In-Reply-To: <D5266162.33B19%mingliang_pei@symantec.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.7.0.161029
authentication-results: symantec.com; dkim=none (message not signed) header.d=none;symantec.com; dmarc=none action=none header.from=symantec.com;
x-originating-ip: [155.64.23.3]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; CY4PR1601MB1125; 7:6LfKyK/USo+Q/pgOatdxcL4QQVRjm+WxK997uDXEfuUkyCRC06dQ8D09PkgbtqUjRFBQCg2KhHavzWbu0FFUWU6vQ6vdTyWmHi7xKHcbIkd6amd8lZ9uEj7CDdSe7MdRcJsGqnSQr9liuIz03Bno1h36eU+jElhwKwviUlMrcXu439AX5LMMVAsbXnSt4WlP9p/OnLEKsTQv0Jaw/rlF4Ixh2Cxml9kEbSLjslLuorUz37/xzySLc1TBbuiZARhboxNZhiJq9gL+evk6dzbEA8yY4vNzkBiPnKQ5d7OODonOI0b3OCWqH8XBRU/LVj/RUPUEXx1Cbd656doskf4odA==
x-forefront-antispam-report: SFV:SKI; SCL:-1SFV:NSPM; SFS:(10009020)(6009001)(39840400002)(39850400002)(39410400002)(39450400003)(39400400002)(51414003)(13464003)(24454002)(377454003)(6436002)(83506001)(5890100001)(2900100001)(81166006)(6116002)(8936002)(36756003)(3846002)(6246003)(10290500003)(86362001)(66066001)(2950100002)(561944003)(3660700001)(3280700002)(6306002)(102836003)(77096006)(6506006)(6486002)(50986999)(76176999)(25786009)(99286003)(54356999)(38730400002)(229853002)(189998001)(53546009)(5660300001)(6512007)(4326008)(93886004)(53936002)(2906002)(80792005)(4001350100001)(122556002)(305945005)(7736002); DIR:OUT; SFP:1101; SCL:1; SRVR:CY4PR1601MB1125; H:CY4PR1601MB1126.namprd16.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
x-ms-office365-filtering-correlation-id: 3a88848c-de34-4a08-fab6-08d48cef6613
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254075)(201703131423075)(201703031133081)(201702281549075); SRVR:CY4PR1601MB1125;
x-microsoft-antispam-prvs: <CY4PR1601MB112574D593A05280528198ECEC110@CY4PR1601MB1125.namprd16.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(158342451672863)(180628864354917)(278428928389397)(192374486261705)(228905959029699);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(93006095)(93001095)(6041248)(20161123562025)(20161123560025)(20161123555025)(20161123564025)(201703131423075)(201702281528075)(201703061421075)(6072148); SRVR:CY4PR1601MB1125; BCL:0; PCL:0; RULEID:; SRVR:CY4PR1601MB1125;
x-forefront-prvs: 0289B6431E
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-ID: <481B80A6E4CF7247AA8B067D1EFE5D70@namprd16.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Apr 2017 21:58:39.9987 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 3b217a9b-6c58-428b-b022-5ad741ce2016
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR1601MB1125
X-OriginatorOrg: symantec.com
X-Brightmail-Tracker: H4sIAAAAAAAAA02SbUhTURjHO/fezetocJqaD4oUk0jM1EGQgZUfFIRUMijUohx6SWk63d2s Sdl0QWya5QsOX8otZ5BIiJKo2SrZgtSwWaKpUbZ9SDQQmy9pWLu7E/py+P3P/znneeGhSUm7 IIwuLFYzqmK5QioUUaKYKtHRIEDZ8VvPwxOWnd2ChM4/62QSkWq1/iZSe8zfiLNEjigxn1EU ljGquFO5ogLbciVR8jP5Rsd9Z4AOmU8YUSAN+BiYpgZJIxLREuxB8PB1Pdo1apr1At7YRPCl b8UvHAg8DW6/+IGg9tM0xQkKG0io3RwneKeVgAZbDeLFKIJt17jQiGhaiOPhw3wxlyQY34Zq k92XkMSRMDFkF3IchNNhWv9SyMdkwN32VwTPsTDUtE5w31D4EPSvRnHXYnwc9FVjvhAJHiDB NZHJcSBOgHXLZ4pjhPfDxmg3wacKhVl3O8H3icE6PEHyHAKLrh0BxyHeVK2NugCufIQbEPz1 tPoHcwDez1VSPEfAZHu1r0fAtSTUt5n8YkEAa9Uz/hfpMLNi9xt13uk93fEbSjCMzQkfIFnL f2XxHAPmF6tCnlOh0/WG4vkIPLEskS2+tvfBu2Y3ZUaCLnRQrWHZIrVSo5aXMPGyWFZblMcd cu/S5MXmKYt6kW9tKmQD6HtP2gjCNJLuFQ+IUbZEIC/zRo4goElpsDhqcU+2RJwv15YzKuUV lUbBsCMonKakoeLZR7NZEnxVrmauMUwJo9p1CTowTIes1/VKi3NQ9thWsWDSXu4bXCrtZXMu xV04b40+Xd+UaE8zmg/rk7PYSVZryP3qJutulifdcmRtOCRvPVu69LbGk8THc32usbkM0UWL pnPe1pxinnZG3HMsUW01CYrMSH1ofmnO8PyzHXYqJczS39WxNr992PDrzrgq58xojJRiC+Sy aFLFyv8BVzDsdzIDAAA=
X-Brightmail-Tracker: H4sIAAAAAAAAA02Sa0iTURjHPe/N15VwmqmPWjYmdvGWipRSdCEJiSztU0aky73kyM21TemG uqmUU7S0lLR01pYWBqEQYl5w2YfU2IxEmwWFgkVGMmzNlJXv3n3oy+H3P8//nOfCw5LiSjqc Vah0nEYlK5QyIkoUZ2DjgwDlJE4bAlIXJ7vpVMuaizxEZJjNK0TGc9NnIos4I9ov5woVJZxm 94E8UcHQop5Q/0i//Kh+0r8cmdKMKIAFnAK19ypoIxKxYuxG8Kl3ySdeI1hunPeJrwjq3k9T vKBwNQl17glCiLQS0DhUiwQxhmB1boIxIpZlcCLYP6r4JJtxGdQ0jyKeSRwFtv5RhucgnAnT FYOM4DkBN9qHCYEToL/JRfDfUDgaXjh38teBeC9UGMa9FjHuI2HOls1zAE4FV8cHimeEQ+D3 WDchpAoFx3w7IfSJwTxgIwUOhm9zHprn4PVUrXfK/fnyEW5E8He5FQmmbfB2Vk8JvBXetdd4 ewRcR0LD/Waf+ELDr5oZ34tMmFka9QVur0/viccXKILq8VlG4DJYcPRQgmmKAEvVM+YWim/5 r16B48D00skInAGWuRFK4Fh43PGdbPHOYxO8uTdPmRD9FEl0xVqtUqfUyWRqRWJygvaKMp8/ ZOtLk5+QX6TsQd61ORLWh6xrx60Is0i6MbDP5pcjpmUl604rimApaWhg54rjtBhfkOm4ixyn 5jS5muJCTmtFBBsQXo6qhtpj9T0l5FnTSIz6Z+TdpjyT62p9p06e5HSjU70Hc/8cPqYq7Wq7 drLfs9rr17wFcm867WHyFEkXl2WYssMlxa7r55KHI2oljgfFxu0WOb1vhRw46qhkzK4NlSUP FxrapOdb9IM4Mq0gCr9aEnnce1Kckmx7aciOpOh0KaUtkCXFkBqt7B/jc7uXFwMAAA==
X-CFilter-Loop: TUS04
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/lJCMPGTKwjbFfgFZKsT86D2SCKA>
Subject: Re: [Teep] [EXT] Re: [EXT] Re: [EXT] Re: Charter strawman proposal
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Apr 2017 21:58:51 -0000

I meant that any amendment too if needed. Thanks, Ming

On 4/26/17, 2:39 PM, "TEEP on behalf of Mingliang Pei"
<teep-bounces@ietf.org on behalf of Mingliang_Pei@symantec.com> wrote:

>Agreed too. We implicitly assume it is TEE definition by GP in the spec,
>and it is good to call this out explicitly, and also Security Domain
>definitions. Thanks, Ming
>
>On 4/26/17, 6:15 AM, "TEEP on behalf of Brian Witten"
><teep-bounces@ietf.org on behalf of brian_witten@symantec.com> wrote:
>
>>+1
>>
>>> On Apr 26, 2017, at 6:06 AM, Nick Cook <Nick.Cook@intercede.com> wrote:
>>> 
>>> I agree that these modifications all make sense. Rather than making a
>>>lightweight definition of TEE in the first paragraph I would prefer to
>>>call out the GP definition and identify any amendments to that which we
>>>are including in our usage of the acronym TEE in the TEEP/OTrP
>>>specification. This would clearly be a footnote definition to the
>>>charter.
>>> 
>>> 
>>> For the security domain part we should expand this to define what we
>>>mean by it specifically. I regard the use of security domain in OTrP as
>>>a protocol level grouping of a service provider's applications for
>>>management purposes and that there *must* be hardware isolation between
>>>security domains so that one security domain cannot be influenced by
>>>another, unless it exposes an API to allow it. The way that the trusted
>>>applications are implemented will be technology specific - again the
>>>protocol has requirements here (e.g. each TA to be manageable in its own
>>>right and to be able to be personalized) that we need to state but the
>>>protocol doesn't dictate the exact implementation.
>>> 
>>> We don't have the definitions in the draft spec and we will need to add
>>>that as we evolve it in the WG.
>>> 
>>> 
>>> 
>>> 
>>> 
>>> Nick Cook
>>> 
>>> -----Original Message-----
>>> From: Hannes Tschofenig [mailto:Hannes.Tschofenig@arm.com]
>>> Sent: 28 March 2017 23:39
>>> To: Wheeler, David M <david.m.wheeler@intel.com>; teep@ietf.org
>>> Subject: Re: [Teep] Charter strawman proposal
>>> 
>>> Thanks, David. Those are indeed useful suggestions. Your presentation
>>>today at the BOF also clarified some of these points and now make much
>>>more sense to me.
>>> 
>>> Let me try to incorporate your suggestions to see how well the text
>>>reads and whether it makes sense to others.
>>> 
>>> Ciao
>>> Hannes
>>> 
>>> -----Original Message-----
>>> From: Wheeler, David M [mailto:david.m.wheeler@intel.com]
>>> Sent: 28 March 2017 14:18
>>> To: Hannes Tschofenig; teep@ietf.org
>>> Subject: RE: Charter strawman proposal
>>> 
>>> Hannes,
>>> Thanks for drafting this. I look forward to great discussions around
>>>this topic. I have made some modifications below.
>>> 
>>> I have made the following types of modifications:
>>> * a protocol is not required in every case, therefore, a protocol may
>>>be advantageous to the marketplace (but not a requirement) a standard
>>>protocol will ease portability, create a level playing field/access for
>>>different TEEs, and increase adoption for more secure devices
>>> * a relay application on the rich OS side is not required - what is
>>>required is some service access onto the network stack for
>>>communications It is possible for some TEEs to provide trusted stacks -
>>>a service access point must be accessible to protocol entities outside
>>>the device
>>> * the server side architecture interacts with the application, but
>>>maintenance of the app is optional
>>> * discovery of actual TEE capabilities is important as well
>>> 
>>> I think security domains is an area for discussion, so I leave that
>>>alone. But hope to have more discussions and a better understanding of
>>>the requirements around SDs in the future.
>>> 
>>> It might be useful to discuss other potential standards groups that we
>>>should be aligned with, especially in the IoT space.
>>> 
>>> Thanks,
>>> Dave Wheeler
>>> 
>>> --------
>>> 
>>> TEEP -- A Protocol for Dynamic Trusted Execution Environment Enablement
>>>Charter
>>> 
>>> The Trusted Execution Environment (TEE) is a secure area of the main
>>>processor. The TEE, as an isolated execution environment, provides
>>>security features, such as isolated execution, integrity of Trusted
>>>Applications along with confidentiality of their assets. In general
>>>terms, the TEE offers an execution space that provides a higher level of
>>>security than a "rich" operating system and more functionality than a
>>>secure element. Implementations of the TEE concept have been developed
>>>by ARM, and Intel using the TrustZone and the SGX technology,
>>>respectively.
>>> 
>>> [It may be advantageous to build the marketplace to have a protocol
>>>that supports] programmatically install, update, and delete applications
>>>running in the TEE. [ This ] protocol runs between a [trusted service]
>>>running [within] the TEE, a relay application [or service access point
>>>on the device's network stack ] and a server-side infrastructure [ that
>>>interacts with and optionally maintains ] the applications. Since [ some
>>>tasks ( such as management tasks) ] are security sensitive where the
>>>server side requires information about the device capabilities (in form
>>>of attestation), the client-side demands server-side authentication, and
>>>privacy considerations have to be taken into account.
>>> 
>>> This working group aims to develop an application layer protocol
>>>providing TEEs with the following functionality,
>>> * discovery of TEE capabilities
>>> * management of trusted applications,
>>> * attestation, and
>>> * security domain management (which provides a logical space that
>>>contains the service provider's applications).
>>> 
>>> The solution approach must take a wide range of TEE technologies into
>>>account and will focus on the use of public key cryptography.
>>> 
>>> The group will produce the following deliverables. First, an
>>>architecture document describing the involved entities, their
>>>relationships, assumptions, the keying framework and relevant use cases.
>>>Second, a solution document that describes the above-described
>>>functionality. The use of the best possible encoding format will be
>>>decided in the working group. The group may document several attestation
>>>technologies considering the different hardware capabilities,
>>>performance, privacy and operational properties.
>>> 
>>> The group will maintain a close relationship with the GlobalPlatform to
>>>ensure proper use of existing TEE-relevant application layer interfaces
>>>and other abstractions used by GlobalPlatform-compliant TEE devices.
>>> 
>>> Milestones
>>> 
>>> Aug 2017     Submit "TEEP Architecture" document as WG item.
>>> 
>>> Oct 2017     Submit "TEEP Protocol" document as WG item.
>>> 
>>> Nov 2017     Participation in the IETF #100 Hackathon to work on the
>>>TEEP Protocol.
>>> 
>>> Dec 2017     Submit "TEEP Architecture" to the IESG for publication as
>>>an Informational RFC.
>>> 
>>> Mar 2017     Organization of an interoperability event at IETF #101.
>>> 
>>> Apr 2017     Submit "TEEP Protocol" to the IESG for publication as a
>>>Proposed Standard.
>>> 
>>> [1] Wikipedia, 'Trusted execution environment', URL:
>>>https://en.wikipedia.org/wiki/Trusted_execution_environment (March
>>>2017).
>>> IMPORTANT NOTICE: The contents of this email and any attachments are
>>>confidential and may also be privileged. If you are not the intended
>>>recipient, please notify the sender immediately and do not disclose the
>>>contents to any other person, use it for any purpose, or store or copy
>>>the information in any medium. Thank you.
>>> 
>>> _______________________________________________
>>> TEEP mailing list
>>> TEEP@ietf.org
>>> https://www.ietf.org/mailman/listinfo/teep
>>> IMPORTANT NOTICE: The contents of this email and any attachments are
>>>confidential and may also be privileged. If you are not the intended
>>>recipient, please notify the sender immediately and do not disclose the
>>>contents to any other person, use it for any purpose, or store or copy
>>>the information in any medium. Thank you.
>>> 
>>> 
>>> _______________________________________________
>>> TEEP mailing list
>>> TEEP@ietf.org
>>> https://www.ietf.org/mailman/listinfo/teep
>>
>>_______________________________________________
>>TEEP mailing list
>>TEEP@ietf.org
>>https://www.ietf.org/mailman/listinfo/teep
>
>_______________________________________________
>TEEP mailing list
>TEEP@ietf.org
>https://www.ietf.org/mailman/listinfo/teep