Re: [Teep] [EXT] Re: [EXT] Re: [EXT] Re: Charter strawman proposal
Mingliang Pei <Mingliang_Pei@symantec.com> Wed, 26 April 2017 21:58 UTC
Return-Path: <Mingliang_Pei@symantec.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8ECD61252BA for <teep@ietfa.amsl.com>; Wed, 26 Apr 2017 14:58:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.222
X-Spam-Level:
X-Spam-Status: No, score=-4.222 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=symc.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6_huo08etRk6 for <teep@ietfa.amsl.com>; Wed, 26 Apr 2017 14:58:43 -0700 (PDT)
Received: from tussmtoutape01.symantec.com (Tussmtoutape01.symantec.com [155.64.38.231]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BE11112709D for <teep@ietf.org>; Wed, 26 Apr 2017 14:58:43 -0700 (PDT)
Received: from tussmtmtaapi02.symc.symantec.com (tus3-f5-symc-ext-prd-snat10.net.symantec.com [10.44.130.10]) by tussmtoutape01.symantec.com (Symantec Messaging Gateway) with SMTP id 84.7B.40682.31811095; Wed, 26 Apr 2017 21:58:43 +0000 (GMT)
X-AuditID: 0a2c7e31-dc6d39a000009eea-c0-59011813a523
Received: from tus3xchcaspin01.SYMC.SYMANTEC.COM (tus3-f5-symc-ext-prd-snat8.net.symantec.com [10.44.130.8]) by tussmtmtaapi02.symc.symantec.com (Symantec Messaging Gateway) with SMTP id D9.DE.58529.21811095; Wed, 26 Apr 2017 21:58:43 +0000 (GMT)
Received: from TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (10.44.91.34) by tus3xchcaspin01.SYMC.SYMANTEC.COM (10.44.91.13) with Microsoft SMTP Server (TLS) id 15.0.1236.3; Wed, 26 Apr 2017 14:58:42 -0700
Received: from NAM01-SN1-obe.outbound.protection.outlook.com (10.44.128.9) by TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (10.44.91.34) with Microsoft SMTP Server (TLS) id 15.0.1236.3 via Frontend Transport; Wed, 26 Apr 2017 14:58:42 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=symc.onmicrosoft.com; s=selector1-symantec-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=sxXDhTuK9e2Fi/HTDsHZCFA1BIBiwDhKp+/qMYtw3Cw=; b=sUgcFaozeiEgdqydmmi5eiylltc6nBJsPixL2znKy2zlczNLR/6gQ0Ruu9+GUi/EswqDQHS1IXyJ08rk84kzC8yGI3bVECMmgtG5d3/Eu5qGRLX//t6TWVFxUH6lmJVPQJ6tA8tZTXKpGx78PfyZj8sTfFQrQyG9j9zMMy+RSmc=
Received: from CY4PR1601MB1126.namprd16.prod.outlook.com (10.172.117.12) by CY4PR1601MB1125.namprd16.prod.outlook.com (10.172.117.11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1047.13; Wed, 26 Apr 2017 21:58:41 +0000
Received: from CY4PR1601MB1126.namprd16.prod.outlook.com ([10.172.117.12]) by CY4PR1601MB1126.namprd16.prod.outlook.com ([10.172.117.12]) with mapi id 15.01.1047.019; Wed, 26 Apr 2017 21:58:40 +0000
From: Mingliang Pei <Mingliang_Pei@symantec.com>
To: Mingliang Pei <Mingliang_Pei@symantec.com>, Brian Witten <brian_witten@symantec.com>, Nick Cook <Nick.Cook@intercede.com>
CC: "teep@ietf.org" <teep@ietf.org>
Thread-Topic: [EXT] Re: [Teep] [EXT] Re: [EXT] Re: Charter strawman proposal
Thread-Index: AQHSvthDvHrkfstNhkm8ryytlR6aLw==
Date: Wed, 26 Apr 2017 21:58:39 +0000
Message-ID: <D52665F7.33B20%mingliang_pei@symantec.com>
References: <HE1PR0802MB2475D750A62DFFAB28F1768CFA320@HE1PR0802MB2475.eurprd08.prod.outlook.com> <0627F5240443D2498FAA65332EE46C84366EA50D@CRSMSX102.amr.corp.intel.com> <HE1PR0802MB24757875E98E453BAFD35C40FA320@HE1PR0802MB2475.eurprd08.prod.outlook.com> <VI1PR06MB321539A06179D62B7C0001F0FF110@VI1PR06MB3215.eurprd06.prod.outlook.com> <57999A96-6EB4-45FF-A646-86353849B8DC@symantec.com> <D5266162.33B19%mingliang_pei@symantec.com>
In-Reply-To: <D5266162.33B19%mingliang_pei@symantec.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/14.7.0.161029
authentication-results: symantec.com; dkim=none (message not signed) header.d=none;symantec.com; dmarc=none action=none header.from=symantec.com;
x-originating-ip: [155.64.23.3]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; CY4PR1601MB1125; 7:6LfKyK/USo+Q/pgOatdxcL4QQVRjm+WxK997uDXEfuUkyCRC06dQ8D09PkgbtqUjRFBQCg2KhHavzWbu0FFUWU6vQ6vdTyWmHi7xKHcbIkd6amd8lZ9uEj7CDdSe7MdRcJsGqnSQr9liuIz03Bno1h36eU+jElhwKwviUlMrcXu439AX5LMMVAsbXnSt4WlP9p/OnLEKsTQv0Jaw/rlF4Ixh2Cxml9kEbSLjslLuorUz37/xzySLc1TBbuiZARhboxNZhiJq9gL+evk6dzbEA8yY4vNzkBiPnKQ5d7OODonOI0b3OCWqH8XBRU/LVj/RUPUEXx1Cbd656doskf4odA==
x-forefront-antispam-report: SFV:SKI; SCL:-1SFV:NSPM; SFS:(10009020)(6009001)(39840400002)(39850400002)(39410400002)(39450400003)(39400400002)(51414003)(13464003)(24454002)(377454003)(6436002)(83506001)(5890100001)(2900100001)(81166006)(6116002)(8936002)(36756003)(3846002)(6246003)(10290500003)(86362001)(66066001)(2950100002)(561944003)(3660700001)(3280700002)(6306002)(102836003)(77096006)(6506006)(6486002)(50986999)(76176999)(25786009)(99286003)(54356999)(38730400002)(229853002)(189998001)(53546009)(5660300001)(6512007)(4326008)(93886004)(53936002)(2906002)(80792005)(4001350100001)(122556002)(305945005)(7736002); DIR:OUT; SFP:1101; SCL:1; SRVR:CY4PR1601MB1125; H:CY4PR1601MB1126.namprd16.prod.outlook.com; FPR:; SPF:None; MLV:sfv; LANG:en;
x-ms-office365-filtering-correlation-id: 3a88848c-de34-4a08-fab6-08d48cef6613
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(22001)(2017030254075)(201703131423075)(201703031133081)(201702281549075); SRVR:CY4PR1601MB1125;
x-microsoft-antispam-prvs: <CY4PR1601MB112574D593A05280528198ECEC110@CY4PR1601MB1125.namprd16.prod.outlook.com>
x-exchange-antispam-report-test: UriScan:(158342451672863)(180628864354917)(278428928389397)(192374486261705)(228905959029699);
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(6040450)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(93006095)(93001095)(6041248)(20161123562025)(20161123560025)(20161123555025)(20161123564025)(201703131423075)(201702281528075)(201703061421075)(6072148); SRVR:CY4PR1601MB1125; BCL:0; PCL:0; RULEID:; SRVR:CY4PR1601MB1125;
x-forefront-prvs: 0289B6431E
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: text/plain; charset="us-ascii"
Content-ID: <481B80A6E4CF7247AA8B067D1EFE5D70@namprd16.prod.outlook.com>
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Apr 2017 21:58:39.9987 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 3b217a9b-6c58-428b-b022-5ad741ce2016
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR1601MB1125
X-OriginatorOrg: symantec.com
X-Brightmail-Tracker: H4sIAAAAAAAAA02SbUhTURjHO/fezetocJqaD4oUk0jM1EGQgZUfFIRUMijUohx6SWk63d2s Sdl0QWya5QsOX8otZ5BIiJKo2SrZgtSwWaKpUbZ9SDQQmy9pWLu7E/py+P3P/znneeGhSUm7 IIwuLFYzqmK5QioUUaKYKtHRIEDZ8VvPwxOWnd2ChM4/62QSkWq1/iZSe8zfiLNEjigxn1EU ljGquFO5ogLbciVR8jP5Rsd9Z4AOmU8YUSAN+BiYpgZJIxLREuxB8PB1Pdo1apr1At7YRPCl b8UvHAg8DW6/+IGg9tM0xQkKG0io3RwneKeVgAZbDeLFKIJt17jQiGhaiOPhw3wxlyQY34Zq k92XkMSRMDFkF3IchNNhWv9SyMdkwN32VwTPsTDUtE5w31D4EPSvRnHXYnwc9FVjvhAJHiDB NZHJcSBOgHXLZ4pjhPfDxmg3wacKhVl3O8H3icE6PEHyHAKLrh0BxyHeVK2NugCufIQbEPz1 tPoHcwDez1VSPEfAZHu1r0fAtSTUt5n8YkEAa9Uz/hfpMLNi9xt13uk93fEbSjCMzQkfIFnL f2XxHAPmF6tCnlOh0/WG4vkIPLEskS2+tvfBu2Y3ZUaCLnRQrWHZIrVSo5aXMPGyWFZblMcd cu/S5MXmKYt6kW9tKmQD6HtP2gjCNJLuFQ+IUbZEIC/zRo4goElpsDhqcU+2RJwv15YzKuUV lUbBsCMonKakoeLZR7NZEnxVrmauMUwJo9p1CTowTIes1/VKi3NQ9thWsWDSXu4bXCrtZXMu xV04b40+Xd+UaE8zmg/rk7PYSVZryP3qJutulifdcmRtOCRvPVu69LbGk8THc32usbkM0UWL pnPe1pxinnZG3HMsUW01CYrMSH1ofmnO8PyzHXYqJczS39WxNr992PDrzrgq58xojJRiC+Sy aFLFyv8BVzDsdzIDAAA=
X-Brightmail-Tracker: H4sIAAAAAAAAA02Sa0iTURjHPe/N15VwmqmPWjYmdvGWipRSdCEJiSztU0aky73kyM21TemG uqmUU7S0lLR01pYWBqEQYl5w2YfU2IxEmwWFgkVGMmzNlJXv3n3oy+H3P8//nOfCw5LiSjqc Vah0nEYlK5QyIkoUZ2DjgwDlJE4bAlIXJ7vpVMuaizxEZJjNK0TGc9NnIos4I9ov5woVJZxm 94E8UcHQop5Q/0i//Kh+0r8cmdKMKIAFnAK19ypoIxKxYuxG8Kl3ySdeI1hunPeJrwjq3k9T vKBwNQl17glCiLQS0DhUiwQxhmB1boIxIpZlcCLYP6r4JJtxGdQ0jyKeSRwFtv5RhucgnAnT FYOM4DkBN9qHCYEToL/JRfDfUDgaXjh38teBeC9UGMa9FjHuI2HOls1zAE4FV8cHimeEQ+D3 WDchpAoFx3w7IfSJwTxgIwUOhm9zHprn4PVUrXfK/fnyEW5E8He5FQmmbfB2Vk8JvBXetdd4 ewRcR0LD/Waf+ELDr5oZ34tMmFka9QVur0/viccXKILq8VlG4DJYcPRQgmmKAEvVM+YWim/5 r16B48D00skInAGWuRFK4Fh43PGdbPHOYxO8uTdPmRD9FEl0xVqtUqfUyWRqRWJygvaKMp8/ ZOtLk5+QX6TsQd61ORLWh6xrx60Is0i6MbDP5pcjpmUl604rimApaWhg54rjtBhfkOm4ixyn 5jS5muJCTmtFBBsQXo6qhtpj9T0l5FnTSIz6Z+TdpjyT62p9p06e5HSjU70Hc/8cPqYq7Wq7 drLfs9rr17wFcm867WHyFEkXl2WYssMlxa7r55KHI2oljgfFxu0WOb1vhRw46qhkzK4NlSUP FxrapOdb9IM4Mq0gCr9aEnnce1Kckmx7aciOpOh0KaUtkCXFkBqt7B/jc7uXFwMAAA==
X-CFilter-Loop: TUS04
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/lJCMPGTKwjbFfgFZKsT86D2SCKA>
Subject: Re: [Teep] [EXT] Re: [EXT] Re: [EXT] Re: Charter strawman proposal
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 26 Apr 2017 21:58:51 -0000
I meant that any amendment too if needed. Thanks, Ming On 4/26/17, 2:39 PM, "TEEP on behalf of Mingliang Pei" <teep-bounces@ietf.org on behalf of Mingliang_Pei@symantec.com> wrote: >Agreed too. We implicitly assume it is TEE definition by GP in the spec, >and it is good to call this out explicitly, and also Security Domain >definitions. Thanks, Ming > >On 4/26/17, 6:15 AM, "TEEP on behalf of Brian Witten" ><teep-bounces@ietf.org on behalf of brian_witten@symantec.com> wrote: > >>+1 >> >>> On Apr 26, 2017, at 6:06 AM, Nick Cook <Nick.Cook@intercede.com> wrote: >>> >>> I agree that these modifications all make sense. Rather than making a >>>lightweight definition of TEE in the first paragraph I would prefer to >>>call out the GP definition and identify any amendments to that which we >>>are including in our usage of the acronym TEE in the TEEP/OTrP >>>specification. This would clearly be a footnote definition to the >>>charter. >>> >>> >>> For the security domain part we should expand this to define what we >>>mean by it specifically. I regard the use of security domain in OTrP as >>>a protocol level grouping of a service provider's applications for >>>management purposes and that there *must* be hardware isolation between >>>security domains so that one security domain cannot be influenced by >>>another, unless it exposes an API to allow it. The way that the trusted >>>applications are implemented will be technology specific - again the >>>protocol has requirements here (e.g. each TA to be manageable in its own >>>right and to be able to be personalized) that we need to state but the >>>protocol doesn't dictate the exact implementation. >>> >>> We don't have the definitions in the draft spec and we will need to add >>>that as we evolve it in the WG. >>> >>> >>> >>> >>> >>> Nick Cook >>> >>> -----Original Message----- >>> From: Hannes Tschofenig [mailto:Hannes.Tschofenig@arm.com] >>> Sent: 28 March 2017 23:39 >>> To: Wheeler, David M <david.m.wheeler@intel.com>; teep@ietf.org >>> Subject: Re: [Teep] Charter strawman proposal >>> >>> Thanks, David. Those are indeed useful suggestions. Your presentation >>>today at the BOF also clarified some of these points and now make much >>>more sense to me. >>> >>> Let me try to incorporate your suggestions to see how well the text >>>reads and whether it makes sense to others. >>> >>> Ciao >>> Hannes >>> >>> -----Original Message----- >>> From: Wheeler, David M [mailto:david.m.wheeler@intel.com] >>> Sent: 28 March 2017 14:18 >>> To: Hannes Tschofenig; teep@ietf.org >>> Subject: RE: Charter strawman proposal >>> >>> Hannes, >>> Thanks for drafting this. I look forward to great discussions around >>>this topic. I have made some modifications below. >>> >>> I have made the following types of modifications: >>> * a protocol is not required in every case, therefore, a protocol may >>>be advantageous to the marketplace (but not a requirement) a standard >>>protocol will ease portability, create a level playing field/access for >>>different TEEs, and increase adoption for more secure devices >>> * a relay application on the rich OS side is not required - what is >>>required is some service access onto the network stack for >>>communications It is possible for some TEEs to provide trusted stacks - >>>a service access point must be accessible to protocol entities outside >>>the device >>> * the server side architecture interacts with the application, but >>>maintenance of the app is optional >>> * discovery of actual TEE capabilities is important as well >>> >>> I think security domains is an area for discussion, so I leave that >>>alone. But hope to have more discussions and a better understanding of >>>the requirements around SDs in the future. >>> >>> It might be useful to discuss other potential standards groups that we >>>should be aligned with, especially in the IoT space. >>> >>> Thanks, >>> Dave Wheeler >>> >>> -------- >>> >>> TEEP -- A Protocol for Dynamic Trusted Execution Environment Enablement >>>Charter >>> >>> The Trusted Execution Environment (TEE) is a secure area of the main >>>processor. The TEE, as an isolated execution environment, provides >>>security features, such as isolated execution, integrity of Trusted >>>Applications along with confidentiality of their assets. In general >>>terms, the TEE offers an execution space that provides a higher level of >>>security than a "rich" operating system and more functionality than a >>>secure element. Implementations of the TEE concept have been developed >>>by ARM, and Intel using the TrustZone and the SGX technology, >>>respectively. >>> >>> [It may be advantageous to build the marketplace to have a protocol >>>that supports] programmatically install, update, and delete applications >>>running in the TEE. [ This ] protocol runs between a [trusted service] >>>running [within] the TEE, a relay application [or service access point >>>on the device's network stack ] and a server-side infrastructure [ that >>>interacts with and optionally maintains ] the applications. Since [ some >>>tasks ( such as management tasks) ] are security sensitive where the >>>server side requires information about the device capabilities (in form >>>of attestation), the client-side demands server-side authentication, and >>>privacy considerations have to be taken into account. >>> >>> This working group aims to develop an application layer protocol >>>providing TEEs with the following functionality, >>> * discovery of TEE capabilities >>> * management of trusted applications, >>> * attestation, and >>> * security domain management (which provides a logical space that >>>contains the service provider's applications). >>> >>> The solution approach must take a wide range of TEE technologies into >>>account and will focus on the use of public key cryptography. >>> >>> The group will produce the following deliverables. First, an >>>architecture document describing the involved entities, their >>>relationships, assumptions, the keying framework and relevant use cases. >>>Second, a solution document that describes the above-described >>>functionality. The use of the best possible encoding format will be >>>decided in the working group. The group may document several attestation >>>technologies considering the different hardware capabilities, >>>performance, privacy and operational properties. >>> >>> The group will maintain a close relationship with the GlobalPlatform to >>>ensure proper use of existing TEE-relevant application layer interfaces >>>and other abstractions used by GlobalPlatform-compliant TEE devices. >>> >>> Milestones >>> >>> Aug 2017 Submit "TEEP Architecture" document as WG item. >>> >>> Oct 2017 Submit "TEEP Protocol" document as WG item. >>> >>> Nov 2017 Participation in the IETF #100 Hackathon to work on the >>>TEEP Protocol. >>> >>> Dec 2017 Submit "TEEP Architecture" to the IESG for publication as >>>an Informational RFC. >>> >>> Mar 2017 Organization of an interoperability event at IETF #101. >>> >>> Apr 2017 Submit "TEEP Protocol" to the IESG for publication as a >>>Proposed Standard. >>> >>> [1] Wikipedia, 'Trusted execution environment', URL: >>>https://en.wikipedia.org/wiki/Trusted_execution_environment (March >>>2017). >>> IMPORTANT NOTICE: The contents of this email and any attachments are >>>confidential and may also be privileged. If you are not the intended >>>recipient, please notify the sender immediately and do not disclose the >>>contents to any other person, use it for any purpose, or store or copy >>>the information in any medium. Thank you. >>> >>> _______________________________________________ >>> TEEP mailing list >>> TEEP@ietf.org >>> https://www.ietf.org/mailman/listinfo/teep >>> IMPORTANT NOTICE: The contents of this email and any attachments are >>>confidential and may also be privileged. If you are not the intended >>>recipient, please notify the sender immediately and do not disclose the >>>contents to any other person, use it for any purpose, or store or copy >>>the information in any medium. Thank you. >>> >>> >>> _______________________________________________ >>> TEEP mailing list >>> TEEP@ietf.org >>> https://www.ietf.org/mailman/listinfo/teep >> >>_______________________________________________ >>TEEP mailing list >>TEEP@ietf.org >>https://www.ietf.org/mailman/listinfo/teep > >_______________________________________________ >TEEP mailing list >TEEP@ietf.org >https://www.ietf.org/mailman/listinfo/teep
- Re: [Teep] [EXT] Re: Charter strawman proposal Brian Witten
- Re: [Teep] Charter strawman proposal Nick Cook
- Re: [Teep] [EXT] Re: [EXT] Re: [EXT] Re: Charter … Mingliang Pei
- Re: [Teep] [EXT] Re: [EXT] Re: Charter strawman p… Mingliang Pei
- [Teep] Charter strawman proposal Hannes Tschofenig
- Re: [Teep] Charter strawman proposal Wheeler, David M
- Re: [Teep] Charter strawman proposal Hannes Tschofenig
- Re: [Teep] Charter strawman proposal Erik Nordmark
- Re: [Teep] Charter strawman proposal Chris Inacio