Re: [Teep] [EXT] Re: Charter Text

Mingliang Pei <Mingliang_Pei@symantec.com> Thu, 20 July 2017 10:30 UTC

Return-Path: <Mingliang_Pei@symantec.com>
X-Original-To: teep@ietfa.amsl.com
Delivered-To: teep@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 87B0E131C05 for <teep@ietfa.amsl.com>; Thu, 20 Jul 2017 03:30:50 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.221
X-Spam-Level:
X-Spam-Status: No, score=-4.221 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RP_MATCHES_RCVD=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=symc.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nHik2G4iKgO6 for <teep@ietfa.amsl.com>; Thu, 20 Jul 2017 03:30:48 -0700 (PDT)
Received: from tussmtoutape01.symantec.com (Tussmtoutape01.symantec.com [155.64.38.231]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7725112EAF7 for <teep@ietf.org>; Thu, 20 Jul 2017 03:30:48 -0700 (PDT)
Received: from tussmtmtaapi02.symc.symantec.com (tus3-f5-symc-ext-prd-snat8.net.symantec.com [10.44.130.8]) by tussmtoutape01.symantec.com (Symantec Messaging Gateway) with SMTP id 97.FF.05891.55680795; Thu, 20 Jul 2017 10:30:48 +0000 (GMT)
X-AuditID: 0a2c7e31-11dff70000001703-2a-59708655f20a
Received: from TUSXCHMBXWPI01.SYMC.SYMANTEC.COM (tus3-f5-symc-ext-prd-snat8.net.symantec.com [10.44.130.8]) by tussmtmtaapi02.symc.symantec.com (Symantec Messaging Gateway) with SMTP id 2C.80.58529.25680795; Thu, 20 Jul 2017 10:30:43 +0000 (GMT)
Received: from TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (10.44.91.34) by TUSXCHMBXWPI01.SYMC.SYMANTEC.COM (10.44.91.33) with Microsoft SMTP Server (TLS) id 15.0.1236.3; Thu, 20 Jul 2017 03:30:41 -0700
Received: from NAM03-BY2-obe.outbound.protection.outlook.com (10.44.128.5) by TUSXCHMBXWPI02.SYMC.SYMANTEC.COM (10.44.91.34) with Microsoft SMTP Server (TLS) id 15.0.1236.3 via Frontend Transport; Thu, 20 Jul 2017 03:30:41 -0700
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=symc.onmicrosoft.com; s=selector1-symantec-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=6sgNExDMXEHPSaxNhKjz4VBRGuSRmy1EP2tX+CNnd7Y=; b=plfQMbL+rUlmq6bgZj3KxC5sUb0D+GhBLYRe+urO8AHWD3D7kt481efGqQITrEjYVLiXx2Qxnc88spaOAHH1HaUUzzJr/V1wrw8ECClPtGEIk0L6p2ikhdX7aSm8tszi9L7JBNMcRuiqSgKHOuUJDVny/TCwz7cAQoF8k8Kc8jg=
Received: from CY4PR1601MB1126.namprd16.prod.outlook.com (10.172.117.12) by CY4PR1601MB1127.namprd16.prod.outlook.com (10.172.117.13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1261.13; Thu, 20 Jul 2017 10:30:39 +0000
Received: from CY4PR1601MB1126.namprd16.prod.outlook.com ([10.172.117.12]) by CY4PR1601MB1126.namprd16.prod.outlook.com ([10.172.117.12]) with mapi id 15.01.1261.024; Thu, 20 Jul 2017 10:30:39 +0000
From: Mingliang Pei <Mingliang_Pei@symantec.com>
To: Kaarthik Sivakumar <kaarthik.sk@gmail.com>
CC: "Nancy Cam-Winget (ncamwing)" <ncamwing@cisco.com>, "teep@ietf.org" <teep@ietf.org>
Thread-Topic: [EXT] Re: [Teep] Charter Text
Thread-Index: AQHTAThsBXHtyZ7LNEq+qFu9wH0zKqJcea0AgAAKHQA=
Date: Thu, 20 Jul 2017 10:30:39 +0000
Message-ID: <F34B91C6-EDBE-4F09-8302-19CECDDE781B@symantec.com>
References: <6EFD27BC-CE56-4112-AD20-C787520BEE87@cisco.com> <ec4426b9-3fdb-d58e-3c63-48db552dca69@gmail.com>
In-Reply-To: <ec4426b9-3fdb-d58e-3c63-48db552dca69@gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: gmail.com; dkim=none (message not signed) header.d=none;gmail.com; dmarc=none action=none header.from=symantec.com;
x-ms-exchange-messagesentrepresentingtype: 1
x-originating-ip: [70.197.3.4]
x-ms-publictraffictype: Email
x-microsoft-exchange-diagnostics: 1; CY4PR1601MB1127; 7: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
x-ms-office365-filtering-correlation-id: 156c04b4-0dd2-48b3-c875-08d4cf5a5e26
x-microsoft-antispam: UriScan:; BCL:0; PCL:0; RULEID:(300000500095)(300135000095)(300000501095)(300135300095)(22001)(300000502095)(300135100095)(2017030254075)(300000503095)(300135400095)(2017052603031)(201703131423075)(201703031133081)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095); SRVR:CY4PR1601MB1127;
x-ms-traffictypediagnostic: CY4PR1601MB1127:
x-exchange-antispam-report-test: UriScan:(125551606395959)(278178393323532)(158342451672863)(180628864354917)(278428928389397)(26388249023172)(236129657087228)(192374486261705)(48057245064654)(100405760836317);
x-microsoft-antispam-prvs: <CY4PR1601MB11274809563AD36E095A9CFFECA70@CY4PR1601MB1127.namprd16.prod.outlook.com>
x-exchange-antispam-report-cfa-test: BCL:0; PCL:0; RULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(601004)(2401047)(8121501046)(5005006)(2017060910075)(93006095)(93001095)(10201501046)(3002001)(100000703101)(100105400095)(6041248)(20161123564025)(20161123555025)(20161123562025)(20161123558100)(20161123560025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(6072148)(100000704101)(100105200095)(100000705101)(100105500095); SRVR:CY4PR1601MB1127; BCL:0; PCL:0; RULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095); SRVR:CY4PR1601MB1127;
x-forefront-prvs: 0374433C81
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39850400002)(39400400002)(39840400002)(39450400003)(39410400002)(377454003)(43784003)(24454002)(40434004)(36756003)(3660700001)(25786009)(6512007)(10290500003)(54906002)(39060400002)(606006)(72206003)(966005)(229853002)(102836003)(38730400002)(110136004)(6116002)(50986999)(3846002)(76176999)(54356999)(53936002)(2900100001)(6486002)(6246003)(99286003)(6306002)(54896002)(5890100001)(77096006)(2906002)(3280700002)(6916009)(80792005)(14454004)(2950100002)(6436002)(6506006)(53546010)(81166006)(33656002)(8676002)(236005)(345774005)(4326008)(478600001)(8936002)(189998001)(83716003)(5660300001)(86362001)(7736002)(66066001)(82746002); DIR:OUT; SFP:1101; SCL:1; SRVR:CY4PR1601MB1127; H:CY4PR1601MB1126.namprd16.prod.outlook.com; FPR:; SPF:None; MLV:ovrnspm; PTR:InfoNoRecords; LANG:en;
spamdiagnosticoutput: 1:99
spamdiagnosticmetadata: NSPM
Content-Type: multipart/alternative; boundary="_000_F34B91C6EDBE4F09830219CECDDE781Bsymanteccom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-originalarrivaltime: 20 Jul 2017 10:30:39.9018 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 3b217a9b-6c58-428b-b022-5ad741ce2016
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR1601MB1127
X-OriginatorOrg: symantec.com
X-Brightmail-Tracker: H4sIAAAAAAAAA02Se0jTURTHub/fb9tvw8ltap2UUgdGmY8JIiL2wn/8wyKIsAWRP/RHaerm Nk2DIiPNVyGlpVNTY1qE5qskH0mNUhM1s/dr1hJ8lIQjn1Npv10D/7l8zv1+7znnHg5LKwZF nmxiqoHXpXLJSrGMkQVcYgOP5WrVqo4mcfjXxhwm/HrJDSq8bmWe3k9Hl9hbRNEdxm+SaJNp iTpMH5dFJvDJiRm8LnhvnOz0xHy+SFvxF2U+fDEtuYisM6gAsSzgUJh9H1aAZKwC2xDMto8w BUjqvO+ffi8mwgKC2ttlDAmeI6hoG5aQYBJBWfaiU2FwPg1f6lZpolRQ8Ky/lSLBgCNB3yNK qCjGKhj5mioUccdBUL7yWyQwjdVw9+20RLC4YX8obkwjlt1ws6aPIRwB96dKkcAM9oOhNZtY YDneB7kP7c40CqyBvAmL0yPFe+BJkdCPlEV4MywMNFCk1Bb4PF5NkX9iMHW/ogl7wNTPNZHQ MsJXEZhKF0RECIChD+OI8HZ4U9YuIbwNRqsLkfAAsFUMPfWT66aD8Kjzj5gI4xQ8qPos/p/J 3vtrfcSjCIqsXDFSGTd0RTgeWsZstNH5u03wsnycMToGQ+Nd0NQZTCy+UFL4Q0J4J+RUVq1z FOTM2emNnhrE3kc+hnS9PsWgSTdwWl4VEqTPSokXDs6xYfFB8ZqUVuTcsQshj5G1OcaMMIuU LnLjBa1aIeIyHE4zApZWust9Ljuu5Alc1jlepzmpS0/m9WbkxTLKLfKu5TC1Ap/iDPwZntfy uv8qxUo9L6KsA8pqS6Qh9kzTpMusl/ppwFmjx5FFhrG1JOA5ZWngPfM1P+/snhOvV6n8pYiJ owuLcctS3iXIs+PPrVjvK37BvZnK5oYxc23upzv1aRFc8Nt3oVbLSuVMQnGS2/zgcLfM9WPX 8RdRo21cjC3kfLrBvHWH63ffpLxDhiW75cmYktGf5kL8aZ2e+wdYzTw4XwMAAA==
X-Brightmail-Tracker: H4sIAAAAAAAAA02Sa0iTURjHOe9le7cSjmvpk6LkKDI1tTCTSBOEEioLDGJ90Zf5kpJzuk1R IzJNyxtYXpiaqaQmmoqmZtKFJC8JlpgpXjJdkrciEG8xs7YdA78cfg///3luPBwta2EduKgY vaCN4aMVIikj9UjljoRmxCq906ac/SYb0hm/BwX5lF/15hodSAcXmJrZ4BclX8TBVVW/qUv0 VempCCE6KkHQegWESyPn1jLZ2NIVlNjavShOQcafKAtJOMA+0Lc4IspCUk6G1xFUPjIwJHiH oPTZBzEJ5hEYbm9YFQZn0jBR/YcmSikFb/taKBL0mxP0tpkDjhNhbxicjLEUkWNPKN78wVqY xkp4Mrwotlj2YDfIa4gjFncoquhlCJ+EuoVCa38MPggDW8siC9vg05DRarKmkWEN3Jubsnok 2B9e5Vj6kXAI28F6/1OKlLKH8dlyisyJoerlR5rwXlj4tsVaWkY4F0FV4TpLBA8YGJ3dXowz fDK0iwk7wVB5NrJ8AGwUweua+W3TBWjr/CUiwiwFjWXjov+ZTD1LDOEhBDlGnrAG7hpXafLh MwuDhlwmD3mU7GiXsAqavy7TJdaxbeF98SxTYt4YjQ9DU6cXsbhAQfaMmLArpD8s2+YgSF81 0Ts9FYirQ/v18TqdWq/W83xslPcxT12SWmV5ePOJqTxVGnULsh5Z0L4O1LV5vgthDil220wL GqWM5RPMzi7kyDEKexufOrlShq/xeuG6IMQK2jBtfLSg60IUJ3FIQaE1W3Kjl/sbjW/nZkjI 9MzjiQS71MA0k8v3jPjalfw7YWO32u8vMBBQpI87Y+qWd7D1DmO7bP+ePSCTqZccqRPPy3N8 Ul2Tk5MiHI4v+W8gX4PCKXFAUzvntnxIHuUraa1pytYqwy/Xc9zwlSVZpaqx4GJ8wsi5qbUb PdKbowpGF8kfdaO1Ov4fbV8dWkUDAAA=
X-CFilter-Loop: TUS02
Archived-At: <https://mailarchive.ietf.org/arch/msg/teep/tawLoIPN2xN6lctH4oKMk6NsShk>
Subject: Re: [Teep] [EXT] Re: Charter Text
X-BeenThere: teep@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement <teep.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/teep>, <mailto:teep-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/teep/>
List-Post: <mailto:teep@ietf.org>
List-Help: <mailto:teep-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/teep>, <mailto:teep-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 20 Jul 2017 10:30:50 -0000

Hi Kaarthik,

Thanks. I took your comment yesterday, and showed the architecture overview diagram that shows the device with TEE and remote TAM; I also recall multiple voice to say it as separate. It might get lost while the chat was fast. Let me try confirm and clarify here.

No, TEE is expected in device and TAM is expected to be remote. A TAM will generally manage many devices for one or more applications. The scope diagram intends to emphasize the TEE and TAM message exchange where the device icon is put below the TEE line. Thank you for pointing out the vague part of the picture. I took your comment and will revise the diagram to be explicit on this device and TAM host separation.

Does this help clarify the question 1? Thanks again,

Ming

Sent from iPhone

On Jul 20, 2017, at 11:54 AM, Kaarthik Sivakumar <kaarthik.sk@gmail.com<mailto:kaarthik.sk@gmail.com>> wrote:


One question. I was at the TEEP meeting yesterday and saw a (version of the) picture that showed TEE and TAM on the same hardware. The picture was later modified with a vertical bar between the TAM and TEE, but are they still expected to be in the same hardware device? Is that picture available somewhere?

I guess my answer to your first question is "not completely".

-kaarthik-

On 20/07/17 11:13 AM, Nancy Cam-Winget (ncamwing) wrote:
All,
Please provide feedback on the results of yesterday’s side meeting.  In particular, we’d like to get feedback on whether this the right scope and if we have captured it appropriately. If it is not, also please comment and if possible, provide suggestions for improvement.

We would like to continue discussion over email and get consensus around the 2nd week of September so that we can have a path forward.  In particular we would like to get answers for:

1) Do you understand what TEEP is trying to achieve?
2) Is this work that should be done in general?
3) Is this work that should be done in the IETF, or does it belong to somewhere else?
4) Should we form a WG with given charter to work on this?

Warm regards,
    Nancy & Tero (TEEP BoF Chairs)

From: TEEP <teep-bounces@ietf.org><mailto:teep-bounces@ietf.org> on behalf of Hannes Tschofenig <Hannes.Tschofenig@arm.com><mailto:Hannes.Tschofenig@arm.com>
Date: Wednesday, July 19, 2017 at 5:56 AM
To: "teep@ietf.org"<mailto:teep@ietf.org> <teep@ietf.org><mailto:teep@ietf.org>
Subject: [Teep] Charter Text

Here is the charter text we came up in the side-meeting today.

------



TEEP -- A Protocol for Dynamic Trusted Execution Environment Enablement Charter

The Trusted Execution Environment (TEE) is a secure area of a processor. The TEE provides security features, such as isolated execution, integrity of Trusted Applications along with confidentiality of their assets. In general terms, the TEE offers an execution space that provides a higher level of security than a "rich" operating system and more functionality than a secure element. For example, implementations of the TEE concept have been developed by ARM, and Intel using the TrustZone and the SGX technology, respectively.

To programmatically install, update, and delete applications running in the TEE, this protocol runs between a service running within the TEE, a relay application or service access point on the device's network stack and a server-side infrastructure that interacts with and optionally maintains the applications. Some tasks are security sensitive and the server side requires information about the device characteristics in form of attestation and the device-side may require information about the server.

Privacy considerations have to be taken into account with authentication features and attestation.

This working group aims to develop an application layer protocol providing TEEs with the following functionality,
* lifecycle management of trusted applications, and
* security domain management.

A security domain allows a service provider's applications to be isolated so that one security domain cannot be influenced by another, unless it exposes an API to allow it.

The solution approach must take a wide range of TEE and relevant technologies into account and will focus on the use of public key cryptography.

The group will produce the following deliverables. First, an architecture document describing the involved entities, their relationships, assumptions, the keying framework and relevant use cases. Second, a solution document that describes the above-described functionality. The choice of encoding format(s) will be decided in the working group. The group may document several attestation technologies considering the different hardware capabilities, performance, privacy and operational properties.

The group will maintain a close relationship with the GlobalPlatform, Trusted Computing Group,  and other relevant standards to ensure proper use of existing TEE-relevant application layer interfaces.

Milestones

Dec 2017     Submit "TEEP Architecture" document as WG item.

Feb 2018     Submit "TEEP Protocol" document as WG item.

July 2018     Submit "TEEP Architecture" to the IESG for publication as an Informational RFC.

Feb 2019     Submit "TEEP Protocol" to the IESG for publication as a Proposed Standard.

Additional calendar items:

Nov 2017     IETF #100 Hackathon to work on TEEP protocol prototype implementations.

Mar 2018     1st interoperability event (at IETF #101).

Jul 2018       2nd interoperability event (at IETF #102).

IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.



_______________________________________________
TEEP mailing list
TEEP@ietf.org<mailto:TEEP@ietf.org>
https://www.ietf.org/mailman/listinfo/teep


_______________________________________________
TEEP mailing list
TEEP@ietf.org<mailto:TEEP@ietf.org>
https://www.ietf.org/mailman/listinfo/teep