Re: [Teep] Call for adoption of draft-thaler-teep-otrp-over-http

Hannes Tschofenig <Hannes.Tschofenig@arm.com> Wed, 29 May 2019 14:34 UTC

Return-Path: <Hannes.Tschofenig@arm.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E67E312004C for <teep@ietfa.amsl.com>; Wed, 29 May 2019 07:34:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JOB7jd_IC9My for <teep@ietfa.amsl.com>; Wed, 29 May 2019 07:34:34 -0700 (PDT)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-eopbgr140051.outbound.protection.outlook.com [40.107.14.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C827612004E for <teep@ietf.org>; Wed, 29 May 2019 07:34:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=L6aIqktwZoY/glgDBHi7ENwTUCf9+m3VHTHXLmGUElM=; b=kzn+SwDiN6Cp0ibxxm5hVpX5YaEhZljwIfMBle95PzgKuA8P1+Z/05RSeLAsfJRzPMPTRJhHjTN6UWX6N00OR3nkQtVjr7IW3VkuFlyWX8W3otajjTnVncy70VDeEGcBY/FjpGkiEFUcMgnZCyguDNEwFeQNrIIH+I8md9O/QUs=
Received: from VI1PR08MB5360.eurprd08.prod.outlook.com (52.133.244.88) by VI1PR08MB3213.eurprd08.prod.outlook.com (52.133.15.153) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1922.15; Wed, 29 May 2019 14:34:30 +0000
Received: from VI1PR08MB5360.eurprd08.prod.outlook.com ([fe80::f426:1919:2252:5df5]) by VI1PR08MB5360.eurprd08.prod.outlook.com ([fe80::f426:1919:2252:5df5%5]) with mapi id 15.20.1922.021; Wed, 29 May 2019 14:34:30 +0000
From: Hannes Tschofenig <Hannes.Tschofenig@arm.com>
To: Dave Thaler <dthaler=40microsoft.com@dmarc.ietf.org>, Anders Rundgren <anders.rundgren.net@gmail.com>, "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>, "teep@ietf.org" <teep@ietf.org>
Thread-Topic: [Teep] Call for adoption of draft-thaler-teep-otrp-over-http
Thread-Index: AQHVFOGEwUKGBoO0w0ufhIS/wg0a4KaABlcAgADZDICAAUgp4A==
Date: Wed, 29 May 2019 14:34:30 +0000
Message-ID: <VI1PR08MB5360C0AFED2E8DDA94734016FA1F0@VI1PR08MB5360.eurprd08.prod.outlook.com>
References: <B57377C9-72EC-45C4-B5C2-9A6443B8C073@cisco.com> <246ce79a-75a6-4e4d-d76a-2b54eb71cf75@gmail.com> <BN6PR21MB0497781C059E34E015875C55A31E0@BN6PR21MB0497.namprd21.prod.outlook.com>
In-Reply-To: <BN6PR21MB0497781C059E34E015875C55A31E0@BN6PR21MB0497.namprd21.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=True; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Owner=dthaler@ntdev.microsoft.com; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2019-05-28T18:47:55.6274725Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=General; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Application=Microsoft Azure Information Protection; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=c51dd14a-4779-4d25-aec3-998dcccb6a42; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Extended_MSFT_Method=Automatic
authentication-results: spf=none (sender IP is ) smtp.mailfrom=Hannes.Tschofenig@arm.com;
x-originating-ip: [80.92.123.119]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 0910a07b-c018-47a8-f63c-08d6e442c27b
x-ms-office365-filtering-ht: Tenant
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(4618075)(2017052603328)(7193020); SRVR:VI1PR08MB3213;
x-ms-traffictypediagnostic: VI1PR08MB3213:
x-microsoft-antispam-prvs: <VI1PR08MB321345E87B250DC49FD64FB6FA1F0@VI1PR08MB3213.eurprd08.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0052308DC6
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(199004)(189003)(40434004)(51444003)(66066001)(76176011)(790700001)(11346002)(14454004)(74316002)(102836004)(71190400001)(486006)(5660300002)(110136005)(66556008)(186003)(14444005)(476003)(7696005)(6246003)(3846002)(71200400001)(86362001)(26005)(6116002)(53936002)(6506007)(446003)(2501003)(498600001)(73956011)(76116006)(66946007)(66476007)(81166006)(52536014)(99286004)(7736002)(72206003)(55016002)(229853002)(54896002)(6306002)(64756008)(8676002)(9686003)(256004)(66446008)(68736007)(33656002)(6436002)(5024004)(25786009)(81156014)(8936002)(2906002); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR08MB3213; H:VI1PR08MB5360.eurprd08.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: arm.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: o/NCHwi4cTQkDb9wDJdFCQ0NwHxTBGJCjZAFr/UTkjvCNmIWK2dW+H2gQGH2L/MLSeOnZMbT2jQYfUsaPiq2i9S68xtuwxB2Fq0wYLR99tgrAYIKoR3Vp/V6V/NwNnLCvEAWojWPKoqzDNZNaVq+q4aQuDO/o12HLg2DHtSl3Z4p8c8z61ZyvzCdj5lISvGWkLhXF6h0hE6WP3wCW8OdBz/jhSOBdw7Mais1Jc01izuGOL8fU+BWYwy5BpLuePNKpQQPP/dlBwXJ6eRwajDrnsvBt+npU2w6Z8sJXHeL345rlcQrj5x+wpR9ux9/FQaJNJsLfwcyU1NwaSAuHOnM+Guuadt2cTKU+r6wSQ7KZT6dKNb7hwLTJ4nlADXhwY53E/kohlHa65j81TfJ8KjLFYejP6sOkLN3KAy664w2ZvE=
Content-Type: multipart/alternative; boundary="_000_VI1PR08MB5360C0AFED2E8DDA94734016FA1F0VI1PR08MB5360eurp_"
MIME-Version: 1.0
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 0910a07b-c018-47a8-f63c-08d6e442c27b
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 May 2019 14:34:30.0651 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Hannes.Tschofenig@arm.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB3213
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/meb3Iz4Z12Xud0CT9t97aRiyr2c>
Subject: Re: [Teep] Call for adoption of draft-thaler-teep-otrp-over-http
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 May 2019 14:34:37 -0000

  *   The IoT market has adopted CBOR rather than JSON.



  *   That’s a bit overstated, “IoT” is very broad and hence there are _many_ IoT “markets”, and many of them have not adopted CBOR. For example, if you look in industrial IoT, the dominant protocol is OPC UA, which uses neither CBOR nor JSON. In consumer IoT like in devices on shelves now, I think you will find that JSON is far more deployed than CBOR is (e.g., Hue light bulbs and many other IoT devices use JSON-over-HTTP). It is true that some of the IoT market has adopted CBOR.  For example, OCF adopted CBOR, but OCF has very little actual deployment today.



I agree with Dave here. I think it is fair to say that the JWT has been implement and deployed by the Web community. Particularly in the OAuth context it is widely deployed.



CBOR has been suggested for IoT-related specifications but CBOR, COSE and CWT is definitely not widely implement and even less widely used.



The question I wonder is whether the current deployment status matters in our case and I don’t think it has any relationship to the call for adoption of draft-thaler-teep-otrp-over-http.

When the initial version of OTrP was written there was the assumption that the encoding of the protocol in JSON would be more convenient for Web developers given that the main deployment use case was for mobile phones and tablets.



Now, there is of course the question whether Web developers should be exposed to the details and the encoding of the OTrP protocol itself. I think that’s an important question. Afterall, we are trying to make the life of developers simpler with this work.



Since the formation of the TEEP group we have also added other use cases extending our original goals for OTrP. This makes me believe that it is worthwhile to look into a CBOR-based encoding as well. I also would like to take advance of ongoing working work in SUIT & RATS.



Ciao
Hannes



IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.