TEEP BOF Problem Statement
draft-liu-opentrustprotocol-usecase
IETF 100th, Singapore
1 IETF 100 - TEEP BoF
TEEP BOF Problem Statement draft-liu-opentrustprotocol-usecase IETF - - PowerPoint PPT Presentation
TEEP BOF Problem Statement draft-liu-opentrustprotocol-usecase IETF 100 th , Singapore IETF 100 - TEEP BoF 1 Background Hardware based security is desirable Todays processor technology supports various isolation concepts. Well
1 IETF 100 - TEEP BoF
2 IETF 100 - TEEP BoF
3 IETF 100 - TEEP BoF
Figure: Hardware Architectural View of REE and TEE, Global Platform, TEE System Architecture v1.1
4 IETF 100 - TEEP BoF
Figure: TEE Software Architecture, Global Platform, TEE System Architecture v1.1
5 IETF 100 - TEEP BoF
6 IETF 100 - TEEP BoF
7 IETF 100 - TEEP BoF
Secure World SD
8
Device with TEE
App Developer
TAM
OTA Provisioning and Management
Trusted Applications (TA)
Created
Hardware Platform
Normal World
Client Applications
TA SD TA
A TA often needs to be provided to TEE over-the-air and managed IETF 100 - TEEP BoF
App developer builds two components: 1) Normal App 2) Trusted App Developer includes a TAM library into normal app to handle the OTrP interaction App developer uploads their Normal App to a suitable app store. Trusted App could be
inside the Normal App. End user downloads Normal App from an app
Trusted App install. Normal App on first start communicates to TAM, and installs Trusted App into the TEE, where TEE interacts with TAM using OTrP End user enjoys a rich experience and the security of a TEE backed trusted component
App Developer End User
App developer sends their trusted app to a TAM provider. Optional if Trusted App was distributed via Normal App.
CAs
Provides certificates out of band to
Different CAs can be used for above.
2a 2b
9 IETF 100 - TEEP BoF
10
TEE A, B, C, … Firmware X, Y, Z
App Developers
Device Hardware Trusted Applications Normal Applications
Device Manufactures TEE Providers Firmware Providers
App Dev:
to trust?
device?
Trusted Applications
Devices with TEE
Normal Applications Device owner:
trust?
Manufacturer:
Apps update?
How to get FW and TEE packaged and verifiable? How to verify and allow many App Developers and Apps? How to get identified and trusted? Is FW trustworthy? IETF 100 - TEEP BoF
– App Developers / TAM trusts Device’s TEE / FW – Device trusts App Developers and Apps to be installed and updated
11 IETF 100 - TEEP BoF
12 IETF 100 - TEEP BoF
– Open for draft update in WG (e.g. JSON vs. CBOR, mandatory transport protocol support etc.)
Trusted Apps Trusted OS Rich OS, e.g. Linux Platform Hardware Trusted App Manager (TAM) App Developer Trusted App + Cmd Trusted App + Cmd
13 IETF 100 - TEEP BoF
14 IETF 100 - TEEP BoF
15 IETF 100 - TEEP BoF
16
– Don’t have the clout to talk to big OEMs – Don’t have the capital to build large infrastructure – Don’t have the Brains & Brawn to tackle security on the devices
Small to Medium ISVs/SPs Too Many Barriers to IoT Devices No Access to Big OEMs Not enough Capital to reach the Market Not enough Security Know-How Can’t Access Consumers
17
Small to Medium ISVs/SPs OTrP TSM Punctures the Barriers For Small to Medium Sized ISV’s & SP’s No Access to Big OEMs Not enough Capital to reach the Market Not enough Security Know-How Can’t Access Consumers
– TSM will make deals with big OEMs & Infrastructure players – TSM can afford to build out infrastructure, because costs are leveraged across many ISVs and SPs – TSM will hire the Brains & Brawn and manage the security (ISVs/SPs only need a single certificate) – OTrP TSM is a ready-to-go Cloud solution
OTrP TSM
Everyone Trusts Me Large SP’s can benefit from OTrP because they can scale their infrastructure investment to their available market easily at lower cost
18
Small to Medium SPs The Service Provider does not have the knowledge to build trusted apps for different platforms and TEEs. The Security Domain in OTrP allows the service provider to just buy trusted apps from ISVs, not have to even re-sign those apps or manage their attestation, and install them into their own TEE No Access to Big OEMs Not enough Capital to reach the Market Not enough Security Know-How Can’t Access Consumers
– Service Provider is given a Security Domain into which they may place their applications
– Allows Security Domain to host off-the- shelf/common trusted applications which are bound specifically to the Service Provider
OTrP TSM
Everyone Trusts Me
Secu cure App Problem Eve ven with acce ccess ss to the TEE, a Servi vice ce Provi vider may y not really y have ve the Secu curity y Exp xpertise se to cr create their own Trust sted Applica cations s to run insi side the TEE, or re-si sign so someone else se’s s apps
TEE App ISV’s