Skip to main content

Minutes IETF109: teep
minutes-109-teep-00

Meeting Minutes Trusted Execution Environment Provisioning (teep) WG
Date and time 2020-11-18 07:30
Title Minutes IETF109: teep
State Active
Other versions plain text
Last updated 2021-02-19

minutes-109-teep-00

IETF 109 TEEP
Wednesday Nov. 18, 2020 Session II

Chairs: Nancy Cam-Winget, Tiru Reddy

Note takers: Tiru Reddy

    Agenda bashing, Logistics

Nancy will schedule TEEP interim soon to resolve dependencies with TEEP
protocol.

    Architecture – Dave Thaler
    • Draft: draft-ietf-teep-architecture
    • Issues: https://github.com/ietf-teep/architecture/issues

Brendan agreed with PR#215 change (remove parapraph related to security domain).
Dave: GSMA and OTrP specs are domain-specific, they are already a deployed
protocol and no incentive to switch. It looks a lot like TEEP architecture.
TEEP has more extensibility and its need to be discussed in the presense of
ortp. Hannes: no need to discuss the prior domain-specific work in ortp.

    TEEP over HTTP update – Dave Thaler
    • Draft: https://datatracker.ietf.org/doc/draft-ietf-teep-otrp-over-http/
    • Issues: https://github.com/ietf-teep/otrp-over-http/issues

    Hackathon Report – Akira Tsukamoto

Akira presented hackathon report.

    TEEP Protocol – Dave Thaler (25 min)
    • Draft: https://datatracker.ietf.org/doc/draft-ietf-teep-protocol/
    • Issues: https://github.com/ietf-teep/teep-protocol/issues

Dave: Is token needed for install/delete or can we rely on SUIT report?
Hannes: The need to associate a request to response because of multiple TEEP
Agents. Dave to have a follow-up discussion in SUIT WG. Cipher suites (1 and 2)
+1 for both on TAM, and (2) mandatory to challenged entity. 2 is suitable for
constrained devices. Actually, both are useful for constrained devices but 2 is
frequently implemented in hardware. Conclusion not to use TEEP specific claims.

Ben suggested to go with a side meeting in the RATS slot.