From nobody Mon Jan 3 12:47:55 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 760EC3A0C53 for ; Mon, 3 Jan 2022 12:47:51 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.896 X-Spam-Level: X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8j7oafs9K0rb for ; Mon, 3 Jan 2022 12:47:47 -0800 (PST) Received: from p3plsmtpa11-08.prod.phx3.secureserver.net (p3plsmtpa11-08.prod.phx3.secureserver.net [68.178.252.109]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 380153A0C4E for ; Mon, 3 Jan 2022 12:47:47 -0800 (PST) Received: from [192.168.1.7] ([75.80.148.243]) by :SMTPAUTH: with ESMTPA id 4UF8nFypSBORP4UF8nxlRi; Mon, 03 Jan 2022 13:47:46 -0700 X-CMAE-Analysis: v=2.4 cv=P+3/OgMu c=1 sm=1 tr=0 ts=61d360f2 a=VPU1mRQhDhA4uSX60JRRww==:117 a=VPU1mRQhDhA4uSX60JRRww==:17 a=8pif782wAAAA:8 a=NEAV23lmAAAA:8 a=4nR6U8rv8BLKBLgfhJ0A:9 a=QEXdDO2ut3YA:10 a=dG9Sdz39o3PVhY4gsGsA:9 a=FSUiRACuK-2N1-oh:21 a=_W_S_7VecoQA:10 X-SECURESERVER-ACCT: lgl@island-resort.com From: Laurence Lundblade Content-Type: multipart/alternative; boundary="Apple-Mail=_B8246B39-1C65-41C9-9757-45BD139E2FFF" Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.17\)) Message-Id: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> Date: Mon, 3 Jan 2022 12:47:46 -0800 To: rats , teep X-Mailer: Apple Mail (2.3445.104.17) X-CMAE-Envelope: MS4xfCnLmAhahxVWizziUamaq3k/ZUQiF0GrtRKGXK1avNW55Gg2PjnutE09YEzFdX0TIU2ypSlpq5+zsC+kvEECZ5iUDH8HaXm0j8RaMGItSh4iyT8588ow Alrwfl1pts16eOYq3lvxhQ1SwbU19TXMUeKrnfCI2u8K+182IFJ7ZF2mJOZwTk4xgg+sK2gHWcxz2q3lsWoIAVa/C9+YECSu6Os= Archived-At: Subject: [Teep] Class ID claim (and other HW identification) X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jan 2022 20:47:52 -0000 --Apple-Mail=_B8246B39-1C65-41C9-9757-45BD139E2FFF Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 I talked to Dave which resulted in reorientation of my understanding of = Class ID in TEEP. Class ID basically identifies HW IP = = from a HW designer like Arm or Synopsis that is integrated into chips = made by various HW OEMs like Qualcomm, Samsung and Apple. The term used = frequently for this is =E2=80=9CIP=E2=80=9D (I know this well from my = days working on HW at Qualcomm). I=E2=80=99ve created a PR for HW Class = . Since what is identified spans OEMs, this must be a globally unique = identifier. We need to be explicit about that.=20 I know of four ways to have a global identifier: - Use OIDs - Use DNS / URI - Probabilistically using a big enough byte string - A new registry, perhaps IANA (but we probably don=E2=80=99t want this) The PR allows all but the last, but this could be reduced to just one or = two of the above. I don=E2=80=99t see this claim as essential for EAT, but I committed to = working through this with TEEP. I=E2=80=99m fine with this PR going into = a TEEP document rather than EAT. On to the other HW identification in EAT=E2=80=A6=20 Right now it stands as: - HW OEM ID, the manufacturer of the HW; globally unique by either IEEE = registry, PEN or probabilistically - HW Model number which distinguishes products by an OEM; this is unique = for an OEM; (this is previously what I thought was wanted for class ID) - HW Version; this is sortable =20 The text for these is merged in GitHub and I am happy with it. = Manufacturer and model are very common and well understood.=20 LL --Apple-Mail=_B8246B39-1C65-41C9-9757-45BD139E2FFF Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8 I = talked to Dave which resulted in reorientation of my understanding of = Class ID in TEEP.

Class ID basically identifies HW IP from a HW designer like Arm or Synopsis = that is integrated into chips made by various HW OEMs like Qualcomm, = Samsung and Apple. The term used frequently for this is =E2=80=9CIP=E2=80=9D= (I know this well from my days working on HW at Qualcomm).

I=E2=80=99ve created = a PR for HW Class.

Since what is identified spans OEMs, = this must be a globally unique identifier. We need to be explicit about = that. 

I = know of four ways to have a global identifier:
- = Use OIDs
- Use DNS / URI
- = Probabilistically using a big enough byte string
- A new registry, perhaps IANA (but we probably don=E2=80=99t = want this)

The PR allows all but the last, but this could be reduced to = just one or two of the above.

I don=E2=80=99t see this claim as = essential for EAT, but I committed to working through this with TEEP. = I=E2=80=99m fine with this PR going into a TEEP document rather than = EAT.



On = to the other HW identification in EAT=E2=80=A6 

Right now it stands = as:

- HW OEM = ID, the manufacturer of the HW; globally unique by either IEEE registry, = PEN or probabilistically
- HW Model number which = distinguishes products by an OEM; this is unique for an OEM; (this is = previously what I thought was wanted for class ID)
- = HW Version; this is sortable
 
The text for these is merged in GitHub and I am happy with = it. Manufacturer and model are very common and well = understood. 

LL

= --Apple-Mail=_B8246B39-1C65-41C9-9757-45BD139E2FFF-- From nobody Mon Jan 3 13:00:53 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0173A3A0CC1; Mon, 3 Jan 2022 13:00:48 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.678 X-Spam-Level: X-Spam-Status: No, score=-2.678 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.576, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XDTOaD91NH8C; Mon, 3 Jan 2022 13:00:42 -0800 (PST) Received: from na01-obe.outbound.protection.outlook.com (mail-cusazon11020018.outbound.protection.outlook.com [52.101.61.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CB4BE3A0CC2; Mon, 3 Jan 2022 13:00:42 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=NkctvKdl04warn3OcSn1Wu5FF9ZNMIsx5VHt9P3jM2/UlSMUi1iUW3xNe28QCcXqLVdzOXrVccOmGrkKANOJN+FjT2o+t+rLL+ZCzwDO8pVtRNgEXVis5hk0qQfnSPtzBaFtgeZowh69tx31or3NWSew45gtV0ZsugGfa1YD38lLPIVTtTP59e84q/cRJhCBIEZuvpFvbw+w28bp/adGUwR39g/SLvkDHZhd9jOvOmWlno14OcOouTUUy0QXXFlsi1aCZKXPeKxJTrgYnI7sQWrUwR/T9+WQGlh44dpAEcGAQlIKFE2uXnr5Cy8Ztpgjmn+wgbxRRfY2JB5koI/mwQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=j+23ZfEYJlt3rtI01kmHEwHCDC4QCfSoSbWpRGbmQKU=; b=oBEBqOs2O902Hxy95AfNhc9vW293CzpIt5W9ktR0hvBKOMfXqBY1MFxlz2Z3ToXOGvxcVRcfXnURJHWgKzG+iTTVPoSWGvBFiv1roYZGZTOIry46oIWu4YnMtSVRYZuAxW9VlRtFzggRV+y7Bsm8WKOFi5HEvPmlBghQqPIDMvbKjIZADDFCBlMW8yBW0F8DZKkPu2EAkaiZZr+r2isEgtaB+KuEcXvUiguRvJXP1NLl1gYW9x8z/mZ9jn/1OMNYIfvnZ0b8jsGxIgJsFwG1bEm4UOaxaUbPIZW8Erh++UwBzq3Iqpmg4QumSbIONESbZEhwLt/STIWhXPYIIRqPlg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=j+23ZfEYJlt3rtI01kmHEwHCDC4QCfSoSbWpRGbmQKU=; b=X8UJI2jZbRjjbHuY/TH4SC14Q+56K8nYaJpq12qL4ni5e03w4c5VLB6+vJB0Lk0IRiMTQ9rZPDY0PPfcxIpnqSJBjHe+FPtsUIhaOjdZsn8Ly0dsz+UMyYLQFRchsNHSEd4QOoSxlEYD9EKG0Nhsr+Y4FqGI5efYCcgyiK9djkk= Received: from CH2PR21MB1464.namprd21.prod.outlook.com (2603:10b6:610:89::16) by BN7PR21MB1731.namprd21.prod.outlook.com (2603:10b6:406:b7::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4867.3; Mon, 3 Jan 2022 21:00:39 +0000 Received: from CH2PR21MB1464.namprd21.prod.outlook.com ([fe80::69de:5ae:316f:e65a]) by CH2PR21MB1464.namprd21.prod.outlook.com ([fe80::69de:5ae:316f:e65a%8]) with mapi id 15.20.4867.003; Mon, 3 Jan 2022 21:00:39 +0000 From: Dave Thaler To: Laurence Lundblade , rats , teep Thread-Topic: [Rats] Class ID claim (and other HW identification) Thread-Index: AQHYAONYo5cG5GYq702OBNSj33pYiqxRxWvg Date: Mon, 3 Jan 2022 21:00:39 +0000 Message-ID: References: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> In-Reply-To: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=477db0fb-6106-4826-a508-a3a41327d61f; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2022-01-03T20:50:53Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: de052966-d1db-466d-c886-08d9cefc18df x-ms-traffictypediagnostic: BN7PR21MB1731:EE_ x-ms-exchange-atpmessageproperties: SA|SL x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:8882; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: Pki4vFxV6Z5jX/ViXTk3DhQoUfIx4dIEVPdlXlSbkfCZZyvhJGPx61GYMlpwHRCgM8u+VVym7M8j3oXiWEefD63gZ1Z+vcsjuQpu3YrffHM3FeF91hddSahahlVJ9nw7Hd9+n7bxy6H9IRE9TW7JIu5RLGXJPYj85cmplOklfUNmqvkdkCtTJe920LuxbOcPxHTvVojHIShfz3y7ID/0wQefyBbLAk5ybdMPD0MBNHi/4xPA322rIUN3AglnBHOoToyQkVRvNqbBacrT2339753hkmxYPMMPKfJ87SnmX+CNFObNNMMXhNzylm01km+ImYwjur5rKBcBsR/wtMVk/j3f1wa+kCSEQ1w0MqoRYYl5ml1Qs5tPYswfxjrdgXsJZF9dSamgEcRRjntifdfkrq5zW0U4Px5qkF57ZuWcqlpPj6ETq1zzGQnoUpdjSPaFqNQqmjng1RWreMgQ3UvZbt1YhEJE2R1dfzUkL0317IuBsnYGXxD0CRH+sn2rRWMP0w21S2Rxn+PhPMYuTUMUsv+5mEV5EBEE4P9HvOMjQogkavKst93B9H55/vHVQvjE+gRekNLStbtd7Ft5zHUBuLlMt3zJNIiM0v4BO8Af1qg4+Vkt3EawABsNiFL6JZHk+hidNLBhh9LuxQjK6yM7UcIGPi/k96NVCTS5ZAYWtBJIgD2Nshug1kEK4hmizVO6PlVrAgCAAUNM1jfcbELyuA1RlxXOrczMGWGCqwlcN8bs7AqFGDxts7U4gvQBUN65 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH2PR21MB1464.namprd21.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(2906002)(71200400001)(33656002)(64756008)(66446008)(508600001)(86362001)(6506007)(82950400001)(55016003)(82960400001)(10290500003)(38070700005)(9686003)(8936002)(83380400001)(7696005)(186003)(76116006)(66556008)(122000001)(38100700002)(8676002)(110136005)(66946007)(316002)(52536014)(66476007)(5660300002)(8990500004)(20210929001); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?oS2nrUhnaB7EcVyA67om9ghSmMdgB24S2x/xyMqYyKtWy9WrLekUUQMAgofH?= =?us-ascii?Q?SCvGJszNYdUw3xXUQfN9gE/QEyDIsazZ7GpIBD+rrW2cYDdEj8ef8qXhr2Aw?= =?us-ascii?Q?9ezauNKNNBSFM8bo9pBsTvkv5HAA4unNB+/QdpT4pn/3BHkfvXKCe172DPiw?= =?us-ascii?Q?3l1dsnCYbllRmBiSFPYSW5LItOx/Eov1IRX3zCU0jUTQf2H1s1XCiS1xuocD?= =?us-ascii?Q?8GywsQAnDtyNrHmskUf1XPlRT2GPFMN+Cfto2WklD8FVJ/4xLf3oULmQtwkY?= =?us-ascii?Q?aWZ+sMUyOZPlKGr69cKDtmmVBh7Iaf+QIdxziHnKSUp4cx1paXMm0b5THWh0?= =?us-ascii?Q?rVpnMHTbs/lwMbVSgJ1DsMCnxZUKPx6CxZE+zH39yPF5etjvYZGtnXwSnqI8?= =?us-ascii?Q?owSaW+TlPSWETz5K6ziyx9GmH3cZmK66bGfnccYYq6egDR77IsJqHV0jEfQ+?= =?us-ascii?Q?lfJX0hjpQU4usCHQRs6NaHWycUCAAKyzJUE9UDAyr3GOaVxsWoThUfE/Lq1h?= =?us-ascii?Q?wOCdLquQckmbDh0Mspqhb7epJH64XrX40NO62eebxSCD6bjF3YbCHNxfIJK2?= =?us-ascii?Q?3RlkGLf1vl5TZBJFKFuS6D2QRCCNgLSfGnlqLg7S1dZsIC5YqBli3meYhiWg?= =?us-ascii?Q?owY/zYggePuohaa6Y2PF+G3j0jdBedNJpbcwqOCSgorJY4K8NoqS47D1cgxq?= =?us-ascii?Q?vlTEHWJIS8gZKXUQ+Te0xrYLwzAG+1UDVx/FFstSlZ3CPrxXh6pl4aQ2oFtF?= =?us-ascii?Q?rUh3YK4wjmKLvl8Fhe/T2IWjYhwKWhJGJEkG0F1ZsRdfM3VTig3aehVF3vqo?= =?us-ascii?Q?tOX+gB+ISTg3rt++0aQ9h2Pxo2+xZ66I9pX91g8X8SFlOQDHmE/QF0o2VE48?= =?us-ascii?Q?1vJ0/qJdKAqa9PAvQ1FG+s3us6ffQncLerUXRkk2QY3iMlyGHLJVVTkU9u7e?= =?us-ascii?Q?LATAy9vp14a8fRpN5EMyGwkSerJoEin4vlrIbZlNaIRosy9/W1+K13cnLS7k?= =?us-ascii?Q?sJQCLfHBs/PjqdC70S06t7YhgQFUgLmihEAIrUSjVKvIfAKY/uDHfCapiYAn?= =?us-ascii?Q?WoJJnd/zqeFSQMmk950MJ9EETA0iH8lzS/SipnCaWdOY9C23AqGMPltN+9MD?= =?us-ascii?Q?kRssbvYKdpdDdz3oOVc+tA94YrRa2O6CF0bqP0HnS0LyIbkssfqVvfXSHp7C?= =?us-ascii?Q?uE6fvvG4QjTpqppwzg9bPMLOcwSdwaiWTRF1O9mbhQCNRP7NpRzb6SIH0Kew?= =?us-ascii?Q?qQ4dKls+W968Q4Oz3XyXL6hM8iwwU4hWNnH3NcmTU0+TAAnqAltgdZ9a+rCe?= =?us-ascii?Q?S8Cijr8zZF/2bbCH0z1O4P5sh2HFvfJIwd1+bCTnIAnqIw168dVOw1rJ/jVd?= =?us-ascii?Q?WnYdpHgLThEMUdKe0lYeJi7zEnjfj+GP5A5rB1TJUmZ75zkxIgqQksC1aFg/?= =?us-ascii?Q?qK6bDLZV+odLVuMLLaSyfFGobUJRuWN/+qMTe5aTFx/cyjabpQ9rmrUZengd?= =?us-ascii?Q?RoWkDa40rWgkeeR0CdgWAytncenhCXkptcBk1KRQtlxmhjLoXT+woahCHllh?= =?us-ascii?Q?IP1JczJylPtShidx9o2Wm0IVHjio9l8gd/uf9U22tO9++cQlwIFg1PIQpVpV?= =?us-ascii?Q?Caia3MNVycKJuLt9MiA8W3aQUNduQqUqtnJwVVCGRGIZUywhPqk4iVPXRJuT?= =?us-ascii?Q?df9JkkbCl8J9ndnQiNAdisqwoqucfl61KxLbOSkrZIpTxAJ9paJaWajfGQqz?= =?us-ascii?Q?ABwx82Hb7w=3D=3D?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: microsoft.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CH2PR21MB1464.namprd21.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: de052966-d1db-466d-c886-08d9cefc18df X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Jan 2022 21:00:39.3285 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: pcku05WtEkRRREKCp5zo8dkPXsvWS8u+kofi9BYnjK6PT6FISb+UPCOXocIZHHfPXpAD8/zcuqdQQOEUeG8EfM/7Ui0ssvyw0nJVNAHwkAI= X-MS-Exchange-Transport-CrossTenantHeadersStamped: BN7PR21MB1731 Archived-At: Subject: Re: [Teep] [Rats] Class ID claim (and other HW identification) X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 03 Jan 2022 21:00:48 -0000 Laurence Lundblade wrote: > I talked to Dave which resulted in reorientation of my understanding of C= lass ID in TEEP. >=20 > Class ID basically identifies HW IP from a HW designer like Arm or Synops= is that is integrated into chips made by various HW OEMs like Qualcomm, Sam= sung and Apple. The term used frequently for this is "IP" (I know this well= from my days working on HW at Qualcomm). >=20 > I've created a PR for HW Class. > > Since what is identified spans OEMs, this must be a globally unique ident= ifier. We need to be explicit about that.=20 >=09 > I know of four ways to have a global identifier: > - Use OIDs > - Use DNS / URI > - Probabilistically using a big enough byte string > - A new registry, perhaps IANA (but we probably don't want this) > > The PR allows all but the last, but this could be reduced to just one or = two of the above. PR looks great to me, except that would I agree with reducing it to one or = two. Since the ability to take a value and resolve it to something meaningful is= useful in many cases (logging, wireshark analysis, etc.), I would remove t= he third option. OIDs, encoded as int arrays, probably compress the best so if only one, the= n I'd pick that one. URIs are convenient though also so if two, then that'= s my second pick.=20 > I don't see this claim as essential for EAT, but I committed to working t= hrough this with TEEP. I'm fine with this PR going into a TEEP document rat= her than EAT. The notion of HW class ID is not specific to TEEs, hence the request to put= it in EAT rather than in anything that would imply use is limited to TEEs = (hence not in a TEEP document). -Dave From nobody Tue Jan 4 03:07:22 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2BB793A1AD3; Tue, 4 Jan 2022 03:07:15 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.899 X-Spam-Level: X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=FI2VK7nv; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=FI2VK7nv Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xdyGnQolj0hj; Tue, 4 Jan 2022 03:07:11 -0800 (PST) Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2077.outbound.protection.outlook.com [40.107.20.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C34783A1AD1; Tue, 4 Jan 2022 03:07:09 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Wd9QYmh4bs1vxcYm+3/PVtpMd+tULmsK+O23yCcl0Qs=; b=FI2VK7nvD0xaEeQ5aGpbxCyxKYclIbt5UYK2iY3Bue/KFposctu/bLnARltr4eDTy2hM7V4+8TKWseeMINmGfaw6ZUey7T6t4oVBUxSzd5BOVQPPxpuu/PcztK7mxcQthCwc3ypPG49wus7myG7jAERvyXC0Lv0g9TOmfo7CR2Y= Received: from DU2PR04CA0198.eurprd04.prod.outlook.com (2603:10a6:10:28d::23) by AM0PR08MB5314.eurprd08.prod.outlook.com (2603:10a6:208:184::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4844.15; Tue, 4 Jan 2022 11:07:05 +0000 Received: from DB5EUR03FT052.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:28d:cafe::b5) by DU2PR04CA0198.outlook.office365.com (2603:10a6:10:28d::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4844.14 via Frontend Transport; Tue, 4 Jan 2022 11:07:05 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB5EUR03FT052.mail.protection.outlook.com (10.152.21.82) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4844.14 via Frontend Transport; Tue, 4 Jan 2022 11:07:04 +0000 Received: ("Tessian outbound f493ab4f1fb8:v110"); Tue, 04 Jan 2022 11:07:04 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 2de81640790cb3e6 X-CR-MTA-TID: 64aa7808 Received: from 59a02a09a7a4.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 1F7DBEDA-5B5C-45E4-89F8-3EDB33C0CE1F.1; Tue, 04 Jan 2022 11:06:47 +0000 Received: from EUR04-HE1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 59a02a09a7a4.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Tue, 04 Jan 2022 11:06:47 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QzA50coQF2S9DbK2ow7/0mpq2PODfXkxiELx1e40/XK63dFtS3US1zTnImtn8ffhkoWmYX2C5uTGWB1dM4Z9lvxFYkvaT8FRwsroHUDqqiap4OjMrf2shOPoHVATzLDKflPj1UOMh3S+FfAMHwelEiCzladalQco/WP9BwD5mTfnwAV/1Mx0d96p6Z6dB4fuFOAaUs4xCCieTCyVSl4UYwmN5uxI3oqMqU8Uqb4PeMTY9Ssozq/IzrOj4wRRIUCoTt1hLroHDSMOm2S8ABUJa9FltwZiJMDswoP6KVXhYxRcGbYG8Z1Jt9PRo9PbCFCMReRWmXyukoTvLIhIn4fA3g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Wd9QYmh4bs1vxcYm+3/PVtpMd+tULmsK+O23yCcl0Qs=; b=CVlVv/5ovps9RG6OiN07Bz8uMAj+EmeWwjTyAlkWApdS2Si5ZHtGL/Z0hBBQ715Rfq+6SeGTIvWbtIbJrkqwhlS9wnawd/+T7pmhW8Et9AnMQ8YnruUSEkAyZUnxPo23VmnHHmobfXcU72qJsEHjkHBbvJptUUIlBq3PQHknfbYgWVu6TL4YRdZykcBS60suR9DxE8BLztI5pSjsdsmrdC4pxz1sNl+Su3XyI5tHg6FSSwZHYCqMTgis7AfMa0s54xwRshUJx7S+RhDvheNXtQk8ly4fpOzV6W67UMUuQehPN6uNsTXlBd3KNi8BAB11mwsXR2vd0MVjuRAwdBU8kQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Wd9QYmh4bs1vxcYm+3/PVtpMd+tULmsK+O23yCcl0Qs=; b=FI2VK7nvD0xaEeQ5aGpbxCyxKYclIbt5UYK2iY3Bue/KFposctu/bLnARltr4eDTy2hM7V4+8TKWseeMINmGfaw6ZUey7T6t4oVBUxSzd5BOVQPPxpuu/PcztK7mxcQthCwc3ypPG49wus7myG7jAERvyXC0Lv0g9TOmfo7CR2Y= Received: from DBAPR08MB5576.eurprd08.prod.outlook.com (2603:10a6:10:1ae::11) by DB8PR08MB4091.eurprd08.prod.outlook.com (2603:10a6:10:a2::29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4844.15; Tue, 4 Jan 2022 11:06:45 +0000 Received: from DBAPR08MB5576.eurprd08.prod.outlook.com ([fe80::fd4a:977c:9338:5139]) by DBAPR08MB5576.eurprd08.prod.outlook.com ([fe80::fd4a:977c:9338:5139%3]) with mapi id 15.20.4844.016; Tue, 4 Jan 2022 11:06:45 +0000 From: Brendan Moran To: Dave Thaler CC: Laurence Lundblade , rats , teep Thread-Topic: [Teep] [Rats] Class ID claim (and other HW identification) Thread-Index: AQHYAOUGouUkDy+rI0mTtLLYj5LA6KxStIYA Date: Tue, 4 Jan 2022 11:06:45 +0000 Message-ID: <8466B6E2-C335-4173-A2A2-3CCA555D28CA@arm.com> References: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-mailer: Apple Mail (2.3654.120.0.1.13) Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; X-MS-Office365-Filtering-Correlation-Id: 79c813b2-890e-4130-0ac1-08d9cf725737 x-ms-traffictypediagnostic: DB8PR08MB4091:EE_|DB5EUR03FT052:EE_|AM0PR08MB5314:EE_ X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true nodisclaimer: true x-ms-oob-tlc-oobclassifiers: OLM:8882;OLM:10000; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DBAPR08MB5576.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(966005)(2616005)(33656002)(6486002)(83380400001)(54906003)(38100700002)(166002)(71200400001)(6506007)(508600001)(6512007)(53546011)(66446008)(186003)(76116006)(66476007)(8676002)(4326008)(5660300002)(64756008)(66556008)(2906002)(26005)(38070700005)(316002)(86362001)(66946007)(122000001)(8936002)(91956017)(36756003)(45980500001); DIR:OUT; SFP:1101; Content-Type: multipart/alternative; boundary="_000_8466B6E2C3354173A2A23CCA555D28CAarmcom_" MIME-Version: 1.0 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB4091 Original-Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB5EUR03FT052.eop-EUR03.prod.protection.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: 9071cafb-a53a-4272-75f3-08d9cf724ba9 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(36840700001)(46966006)(316002)(5660300002)(8676002)(26005)(2906002)(54906003)(4326008)(8936002)(36756003)(70586007)(86362001)(356005)(70206006)(450100002)(166002)(6862004)(81166007)(53546011)(45080400002)(6486002)(966005)(36860700001)(82310400004)(2616005)(33656002)(336012)(47076005)(186003)(33964004)(6512007)(508600001)(6506007)(83380400001); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Jan 2022 11:07:04.5972 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 79c813b2-890e-4130-0ac1-08d9cf725737 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DB5EUR03FT052.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB5314 Archived-At: Subject: Re: [Teep] [Rats] Class ID claim (and other HW identification) X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Jan 2022 11:07:15 -0000 --_000_8466B6E2C3354173A2A23CCA555D28CAarmcom_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 SSB0aGluayBkZXZpY2VzIHdpbGwgbmVlZCB0byByZXBvcnQgbXVsdGlwbGUgdmVuZG9yL2NsYXNz IHBhaXJzLg0KDQpGb3IgZXhhbXBsZSwgQSBtb2JpbGUgZGV2aWNlIGNvdWxkIHBvdGVudGlhbGx5 IGNvbnRhaW46DQoxLiBBIE1vYmlsZSBEZXZpY2UgT0VNIFZlbmRvciBJRA0KMi4gQSBTaWxpY29u IHZlbmRvcuKAmXMgVmVuZG9yIElEDQozLiBBbiBJUCB2ZW5kb3LigJlzIFZlbmRvciBJRA0KDQpU aGlzIGlzIG5vdCBhbiBleGhhdXN0aXZlIGxpc3QuDQoNCkZvciBBcm0gVHJ1c3QgWm9uZSBURUVz LCBJIHdvdWxkIGV4cGVjdCB0byBzZWU6DQoxLiBUaGUgQXJtIFZlbmRvciBJRCArIHRoZSBwcm9j ZXNzb3IgY29yZeKAmXMgQ2xhc3MgSUQNCjIuIFRoZSBUcnVzdGVkIE9TIFZlbmRvciBJRCArIHRo ZSBUcnVzdGVkIE9TIENsYXNzIElEDQozLiBUaGUgU2lsaWNvbiB2ZW5kb3LigJlzIFZlbmRvciBJ RCArIHRoZSBwcm9jZXNzb3IgQ2xhc3MgSUQNCjQuIFRoZSBEZXZpY2UgT0VN4oCZcyBWZW5kb3Ig SUQgKyB0aGUgZGV2aWNlIENsYXNzIElEDQoNCkNoZWVycywNCkJyZW5kYW4NCg0KT24gMyBKYW4g MjAyMiwgYXQgMjE6MDAsIERhdmUgVGhhbGVyIDxkdGhhbGVyPTQwbWljcm9zb2Z0LmNvbUBkbWFy Yy5pZXRmLm9yZzxtYWlsdG86ZHRoYWxlcj00MG1pY3Jvc29mdC5jb21AZG1hcmMuaWV0Zi5vcmc+ PiB3cm90ZToNCg0KTGF1cmVuY2UgTHVuZGJsYWRlIHdyb3RlOg0KSSB0YWxrZWQgdG8gRGF2ZSB3 aGljaCByZXN1bHRlZCBpbiByZW9yaWVudGF0aW9uIG9mIG15IHVuZGVyc3RhbmRpbmcgb2YgQ2xh c3MgSUQgaW4gVEVFUC4NCg0KQ2xhc3MgSUQgYmFzaWNhbGx5IGlkZW50aWZpZXMgSFcgSVAgZnJv bSBhIEhXIGRlc2lnbmVyIGxpa2UgQXJtIG9yIFN5bm9wc2lzIHRoYXQgaXMgaW50ZWdyYXRlZCBp bnRvIGNoaXBzIG1hZGUgYnkgdmFyaW91cyBIVyBPRU1zIGxpa2UgUXVhbGNvbW0sIFNhbXN1bmcg YW5kIEFwcGxlLiBUaGUgdGVybSB1c2VkIGZyZXF1ZW50bHkgZm9yIHRoaXMgaXMgIklQIiAoSSBr bm93IHRoaXMgd2VsbCBmcm9tIG15IGRheXMgd29ya2luZyBvbiBIVyBhdCBRdWFsY29tbSkuDQoN CkkndmUgY3JlYXRlZCBhIFBSIGZvciBIVyBDbGFzcy4NCg0KU2luY2Ugd2hhdCBpcyBpZGVudGlm aWVkIHNwYW5zIE9FTXMsIHRoaXMgbXVzdCBiZSBhIGdsb2JhbGx5IHVuaXF1ZSBpZGVudGlmaWVy LiBXZSBuZWVkIHRvIGJlIGV4cGxpY2l0IGFib3V0IHRoYXQuDQoNCkkga25vdyBvZiBmb3VyIHdh eXMgdG8gaGF2ZSBhIGdsb2JhbCBpZGVudGlmaWVyOg0KLSBVc2UgT0lEcw0KLSBVc2UgRE5TIC8g VVJJDQotIFByb2JhYmlsaXN0aWNhbGx5IHVzaW5nIGEgYmlnIGVub3VnaCBieXRlIHN0cmluZw0K LSBBIG5ldyByZWdpc3RyeSwgcGVyaGFwcyBJQU5BIChidXQgd2UgcHJvYmFibHkgZG9uJ3Qgd2Fu dCB0aGlzKQ0KDQpUaGUgUFIgYWxsb3dzIGFsbCBidXQgdGhlIGxhc3QsIGJ1dCB0aGlzIGNvdWxk IGJlIHJlZHVjZWQgdG8ganVzdCBvbmUgb3IgdHdvIG9mIHRoZSBhYm92ZS4NCg0KUFIgbG9va3Mg Z3JlYXQgdG8gbWUsIGV4Y2VwdCB0aGF0IHdvdWxkIEkgYWdyZWUgd2l0aCByZWR1Y2luZyBpdCB0 byBvbmUgb3IgdHdvLg0KU2luY2UgdGhlIGFiaWxpdHkgdG8gdGFrZSBhIHZhbHVlIGFuZCByZXNv bHZlIGl0IHRvIHNvbWV0aGluZyBtZWFuaW5nZnVsIGlzIHVzZWZ1bCBpbiBtYW55IGNhc2VzIChs b2dnaW5nLCB3aXJlc2hhcmsgYW5hbHlzaXMsIGV0Yy4pLCBJIHdvdWxkIHJlbW92ZSB0aGUgdGhp cmQgb3B0aW9uLg0KDQpPSURzLCBlbmNvZGVkIGFzIGludCBhcnJheXMsIHByb2JhYmx5IGNvbXBy ZXNzIHRoZSBiZXN0IHNvIGlmIG9ubHkgb25lLCB0aGVuIEknZCBwaWNrIHRoYXQgb25lLiAgVVJJ cyBhcmUgY29udmVuaWVudCB0aG91Z2ggYWxzbyBzbyBpZiB0d28sIHRoZW4gdGhhdCdzIG15IHNl Y29uZCBwaWNrLg0KDQpJIGRvbid0IHNlZSB0aGlzIGNsYWltIGFzIGVzc2VudGlhbCBmb3IgRUFU LCBidXQgSSBjb21taXR0ZWQgdG8gd29ya2luZyB0aHJvdWdoIHRoaXMgd2l0aCBURUVQLiBJJ20g ZmluZSB3aXRoIHRoaXMgUFIgZ29pbmcgaW50byBhIFRFRVAgZG9jdW1lbnQgcmF0aGVyIHRoYW4g RUFULg0KDQpUaGUgbm90aW9uIG9mIEhXIGNsYXNzIElEIGlzIG5vdCBzcGVjaWZpYyB0byBURUVz LCBoZW5jZSB0aGUgcmVxdWVzdCB0byBwdXQgaXQgaW4gRUFUIHJhdGhlciB0aGFuIGluIGFueXRo aW5nIHRoYXQgd291bGQgaW1wbHkgdXNlIGlzIGxpbWl0ZWQgdG8gVEVFcyAoaGVuY2Ugbm90IGlu IGEgVEVFUCBkb2N1bWVudCkuDQoNCi1EYXZlDQoNCl9fX19fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fDQpURUVQIG1haWxpbmcgbGlzdA0KVEVFUEBpZXRmLm9yZzxt YWlsdG86VEVFUEBpZXRmLm9yZz4NCmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGlu Zm8vdGVlcA0KDQpJTVBPUlRBTlQgTk9USUNFOiBUaGUgY29udGVudHMgb2YgdGhpcyBlbWFpbCBh bmQgYW55IGF0dGFjaG1lbnRzIGFyZSBjb25maWRlbnRpYWwgYW5kIG1heSBhbHNvIGJlIHByaXZp bGVnZWQuIElmIHlvdSBhcmUgbm90IHRoZSBpbnRlbmRlZCByZWNpcGllbnQsIHBsZWFzZSBub3Rp ZnkgdGhlIHNlbmRlciBpbW1lZGlhdGVseSBhbmQgZG8gbm90IGRpc2Nsb3NlIHRoZSBjb250ZW50 cyB0byBhbnkgb3RoZXIgcGVyc29uLCB1c2UgaXQgZm9yIGFueSBwdXJwb3NlLCBvciBzdG9yZSBv ciBjb3B5IHRoZSBpbmZvcm1hdGlvbiBpbiBhbnkgbWVkaXVtLiBUaGFuayB5b3UuDQo= --_000_8466B6E2C3354173A2A23CCA555D28CAarmcom_ Content-Type: text/html; charset="utf-8" Content-ID: <7B9221447FA323459A73F55BFACC21AC@eurprd08.prod.outlook.com> Content-Transfer-Encoding: base64 PGh0bWw+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIgY29udGVudD0i dGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjwvaGVhZD4NCjxib2R5IHN0eWxlPSJ3b3JkLXdy YXA6IGJyZWFrLXdvcmQ7IC13ZWJraXQtbmJzcC1tb2RlOiBzcGFjZTsgbGluZS1icmVhazogYWZ0 ZXItd2hpdGUtc3BhY2U7IiBjbGFzcz0iIj4NCkkgdGhpbmsgZGV2aWNlcyB3aWxsIG5lZWQgdG8g cmVwb3J0IG11bHRpcGxlIHZlbmRvci9jbGFzcyBwYWlycy4NCjxkaXYgY2xhc3M9IiI+PGJyIGNs YXNzPSIiPg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPkZvciBleGFtcGxlLCBBIG1vYmlsZSBkZXZp Y2UgY291bGQgcG90ZW50aWFsbHkgY29udGFpbjoNCjxkaXYgY2xhc3M9IiI+MS4gQSBNb2JpbGUg RGV2aWNlIE9FTSBWZW5kb3IgSUQ8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+Mi4gQSBTaWxpY29uIHZl bmRvcuKAmXMgVmVuZG9yIElEPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjMuIEFuIElQIHZlbmRvcuKA mXMgVmVuZG9yIElEPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjwvZGl2Pg0K PGRpdiBjbGFzcz0iIj5UaGlzIGlzIG5vdCBhbiBleGhhdXN0aXZlIGxpc3QuPC9kaXY+DQo8ZGl2 IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjwvZGl2Pg0KPGRpdiBjbGFzcz0iIj5Gb3IgQXJtIFRy dXN0IFpvbmUgVEVFcywgSSB3b3VsZCBleHBlY3QgdG8gc2VlOjwvZGl2Pg0KPGRpdiBjbGFzcz0i Ij4xLiBUaGUgQXJtIFZlbmRvciBJRCArIHRoZSBwcm9jZXNzb3IgY29yZeKAmXMgQ2xhc3MgSUQ8 L2Rpdj4NCjxkaXYgY2xhc3M9IiI+Mi4gVGhlIFRydXN0ZWQgT1MgVmVuZG9yIElEICsgdGhlIFRy dXN0ZWQgT1MgQ2xhc3MgSUQ8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+My4gVGhlIFNpbGljb24gdmVu ZG9y4oCZcyBWZW5kb3IgSUQgKyB0aGUgcHJvY2Vzc29yIENsYXNzIElEPC9kaXY+DQo8ZGl2IGNs YXNzPSIiPjQuIFRoZSBEZXZpY2UgT0VN4oCZcyBWZW5kb3IgSUQgKyB0aGUgZGV2aWNlIENsYXNz IElEPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjwvZGl2Pg0KPGRpdiBjbGFz cz0iIj5DaGVlcnMsPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPkJyZW5kYW48L2Rpdj4NCjxkaXYgY2xh c3M9IiI+DQo8ZGl2PjxiciBjbGFzcz0iIj4NCjxibG9ja3F1b3RlIHR5cGU9ImNpdGUiIGNsYXNz PSIiPg0KPGRpdiBjbGFzcz0iIj5PbiAzIEphbiAyMDIyLCBhdCAyMTowMCwgRGF2ZSBUaGFsZXIg Jmx0OzxhIGhyZWY9Im1haWx0bzpkdGhhbGVyPTQwbWljcm9zb2Z0LmNvbUBkbWFyYy5pZXRmLm9y ZyIgY2xhc3M9IiI+ZHRoYWxlcj00MG1pY3Jvc29mdC5jb21AZG1hcmMuaWV0Zi5vcmc8L2E+Jmd0 OyB3cm90ZTo8L2Rpdj4NCjxiciBjbGFzcz0iQXBwbGUtaW50ZXJjaGFuZ2UtbmV3bGluZSI+DQo8 ZGl2IGNsYXNzPSIiPjxzcGFuIHN0eWxlPSJjYXJldC1jb2xvcjogcmdiKDAsIDAsIDApOyBmb250 LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZvbnQtc3R5bGU6IG5vcm1hbDsg Zm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6IG5vcm1hbDsgbGV0dGVyLXNw YWNpbmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7IHRleHQtaW5kZW50OiAwcHg7IHRleHQt dHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9ybWFsOyB3b3JkLXNwYWNpbmc6IDBweDsg LXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRlY29yYXRpb246IG5vbmU7IGZs b2F0OiBub25lOyBkaXNwbGF5OiBpbmxpbmUgIWltcG9ydGFudDsiIGNsYXNzPSIiPkxhdXJlbmNl DQogTHVuZGJsYWRlIHdyb3RlOjwvc3Bhbj48YnIgc3R5bGU9ImNhcmV0LWNvbG9yOiByZ2IoMCwg MCwgMCk7IGZvbnQtZmFtaWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1zdHls ZTogbm9ybWFsOyBmb250LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDogbm9ybWFs OyBsZXR0ZXItc3BhY2luZzogbm9ybWFsOyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4dC1pbmRlbnQ6 IDBweDsgdGV4dC10cmFuc2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7IHdvcmQtc3Bh Y2luZzogMHB4OyAtd2Via2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7IHRleHQtZGVjb3JhdGlv bjogbm9uZTsiIGNsYXNzPSIiPg0KPGJsb2NrcXVvdGUgdHlwZT0iY2l0ZSIgc3R5bGU9ImZvbnQt ZmFtaWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1zdHlsZTogbm9ybWFsOyBm b250LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDogbm9ybWFsOyBsZXR0ZXItc3Bh Y2luZzogbm9ybWFsOyBvcnBoYW5zOiBhdXRvOyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4dC1pbmRl bnQ6IDBweDsgdGV4dC10cmFuc2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7IHdpZG93 czogYXV0bzsgd29yZC1zcGFjaW5nOiAwcHg7IC13ZWJraXQtdGV4dC1zaXplLWFkanVzdDogYXV0 bzsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRlY29yYXRpb246IG5vbmU7 IiBjbGFzcz0iIj4NCkkgdGFsa2VkIHRvIERhdmUgd2hpY2ggcmVzdWx0ZWQgaW4gcmVvcmllbnRh dGlvbiBvZiBteSB1bmRlcnN0YW5kaW5nIG9mIENsYXNzIElEIGluIFRFRVAuPGJyIGNsYXNzPSIi Pg0KPGJyIGNsYXNzPSIiPg0KQ2xhc3MgSUQgYmFzaWNhbGx5IGlkZW50aWZpZXMgSFcgSVAgZnJv bSBhIEhXIGRlc2lnbmVyIGxpa2UgQXJtIG9yIFN5bm9wc2lzIHRoYXQgaXMgaW50ZWdyYXRlZCBp bnRvIGNoaXBzIG1hZGUgYnkgdmFyaW91cyBIVyBPRU1zIGxpa2UgUXVhbGNvbW0sIFNhbXN1bmcg YW5kIEFwcGxlLiBUaGUgdGVybSB1c2VkIGZyZXF1ZW50bHkgZm9yIHRoaXMgaXMgJnF1b3Q7SVAm cXVvdDsgKEkga25vdyB0aGlzIHdlbGwgZnJvbSBteSBkYXlzIHdvcmtpbmcgb24gSFcgYXQgUXVh bGNvbW0pLjxiciBjbGFzcz0iIj4NCjxiciBjbGFzcz0iIj4NCkkndmUgY3JlYXRlZCBhIFBSIGZv ciBIVyBDbGFzcy48YnIgY2xhc3M9IiI+DQo8YnIgY2xhc3M9IiI+DQo8c3BhbiBjbGFzcz0iQXBw bGUtdGFiLXNwYW4iIHN0eWxlPSJ3aGl0ZS1zcGFjZTogcHJlOyI+PC9zcGFuPlNpbmNlIHdoYXQg aXMgaWRlbnRpZmllZCBzcGFucyBPRU1zLCB0aGlzIG11c3QgYmUgYSBnbG9iYWxseSB1bmlxdWUg aWRlbnRpZmllci4gV2UgbmVlZCB0byBiZSBleHBsaWNpdCBhYm91dCB0aGF0LjxzcGFuIGNsYXNz PSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIgY2xhc3M9IiI+DQo8c3Bh biBjbGFzcz0iQXBwbGUtdGFiLXNwYW4iIHN0eWxlPSJ3aGl0ZS1zcGFjZTogcHJlOyI+PC9zcGFu PjxiciBjbGFzcz0iIj4NCkkga25vdyBvZiBmb3VyIHdheXMgdG8gaGF2ZSBhIGdsb2JhbCBpZGVu dGlmaWVyOjxiciBjbGFzcz0iIj4NCi0gVXNlIE9JRHM8YnIgY2xhc3M9IiI+DQotIFVzZSBETlMg LyBVUkk8YnIgY2xhc3M9IiI+DQotIFByb2JhYmlsaXN0aWNhbGx5IHVzaW5nIGEgYmlnIGVub3Vn aCBieXRlIHN0cmluZzxiciBjbGFzcz0iIj4NCi0gQSBuZXcgcmVnaXN0cnksIHBlcmhhcHMgSUFO QSAoYnV0IHdlIHByb2JhYmx5IGRvbid0IHdhbnQgdGhpcyk8YnIgY2xhc3M9IiI+DQo8YnIgY2xh c3M9IiI+DQpUaGUgUFIgYWxsb3dzIGFsbCBidXQgdGhlIGxhc3QsIGJ1dCB0aGlzIGNvdWxkIGJl IHJlZHVjZWQgdG8ganVzdCBvbmUgb3IgdHdvIG9mIHRoZSBhYm92ZS48YnIgY2xhc3M9IiI+DQo8 L2Jsb2NrcXVvdGU+DQo8YnIgc3R5bGU9ImNhcmV0LWNvbG9yOiByZ2IoMCwgMCwgMCk7IGZvbnQt ZmFtaWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1zdHlsZTogbm9ybWFsOyBm b250LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDogbm9ybWFsOyBsZXR0ZXItc3Bh Y2luZzogbm9ybWFsOyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4dC1pbmRlbnQ6IDBweDsgdGV4dC10 cmFuc2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7IHdvcmQtc3BhY2luZzogMHB4OyAt d2Via2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7IHRleHQtZGVjb3JhdGlvbjogbm9uZTsiIGNs YXNzPSIiPg0KPHNwYW4gc3R5bGU9ImNhcmV0LWNvbG9yOiByZ2IoMCwgMCwgMCk7IGZvbnQtZmFt aWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1zdHlsZTogbm9ybWFsOyBmb250 LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDogbm9ybWFsOyBsZXR0ZXItc3BhY2lu Zzogbm9ybWFsOyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4dC1pbmRlbnQ6IDBweDsgdGV4dC10cmFu c2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7IHdvcmQtc3BhY2luZzogMHB4OyAtd2Vi a2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7IHRleHQtZGVjb3JhdGlvbjogbm9uZTsgZmxvYXQ6 IG5vbmU7IGRpc3BsYXk6IGlubGluZSAhaW1wb3J0YW50OyIgY2xhc3M9IiI+UFINCiBsb29rcyBn cmVhdCB0byBtZSwgZXhjZXB0IHRoYXQgd291bGQgSSBhZ3JlZSB3aXRoIHJlZHVjaW5nIGl0IHRv IG9uZSBvciB0d28uPC9zcGFuPjxiciBzdHlsZT0iY2FyZXQtY29sb3I6IHJnYigwLCAwLCAwKTsg Zm9udC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAxMnB4OyBmb250LXN0eWxlOiBub3Jt YWw7IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQtd2VpZ2h0OiBub3JtYWw7IGxldHRl ci1zcGFjaW5nOiBub3JtYWw7IHRleHQtYWxpZ246IHN0YXJ0OyB0ZXh0LWluZGVudDogMHB4OyB0 ZXh0LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUtc3BhY2U6IG5vcm1hbDsgd29yZC1zcGFjaW5nOiAw cHg7IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsgdGV4dC1kZWNvcmF0aW9uOiBub25l OyIgY2xhc3M9IiI+DQo8c3BhbiBzdHlsZT0iY2FyZXQtY29sb3I6IHJnYigwLCAwLCAwKTsgZm9u dC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAxMnB4OyBmb250LXN0eWxlOiBub3JtYWw7 IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQtd2VpZ2h0OiBub3JtYWw7IGxldHRlci1z cGFjaW5nOiBub3JtYWw7IHRleHQtYWxpZ246IHN0YXJ0OyB0ZXh0LWluZGVudDogMHB4OyB0ZXh0 LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUtc3BhY2U6IG5vcm1hbDsgd29yZC1zcGFjaW5nOiAwcHg7 IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsgdGV4dC1kZWNvcmF0aW9uOiBub25lOyBm bG9hdDogbm9uZTsgZGlzcGxheTogaW5saW5lICFpbXBvcnRhbnQ7IiBjbGFzcz0iIj5TaW5jZQ0K IHRoZSBhYmlsaXR5IHRvIHRha2UgYSB2YWx1ZSBhbmQgcmVzb2x2ZSBpdCB0byBzb21ldGhpbmcg bWVhbmluZ2Z1bCBpcyB1c2VmdWwgaW4gbWFueSBjYXNlcyAobG9nZ2luZywgd2lyZXNoYXJrIGFu YWx5c2lzLCBldGMuKSwgSSB3b3VsZCByZW1vdmUgdGhlIHRoaXJkIG9wdGlvbi48L3NwYW4+PGJy IHN0eWxlPSJjYXJldC1jb2xvcjogcmdiKDAsIDAsIDApOyBmb250LWZhbWlseTogSGVsdmV0aWNh OyBmb250LXNpemU6IDEycHg7IGZvbnQtc3R5bGU6IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6 IG5vcm1hbDsgZm9udC13ZWlnaHQ6IG5vcm1hbDsgbGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgdGV4 dC1hbGlnbjogc3RhcnQ7IHRleHQtaW5kZW50OiAwcHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3 aGl0ZS1zcGFjZTogbm9ybWFsOyB3b3JkLXNwYWNpbmc6IDBweDsgLXdlYmtpdC10ZXh0LXN0cm9r ZS13aWR0aDogMHB4OyB0ZXh0LWRlY29yYXRpb246IG5vbmU7IiBjbGFzcz0iIj4NCjxiciBzdHls ZT0iY2FyZXQtY29sb3I6IHJnYigwLCAwLCAwKTsgZm9udC1mYW1pbHk6IEhlbHZldGljYTsgZm9u dC1zaXplOiAxMnB4OyBmb250LXN0eWxlOiBub3JtYWw7IGZvbnQtdmFyaWFudC1jYXBzOiBub3Jt YWw7IGZvbnQtd2VpZ2h0OiBub3JtYWw7IGxldHRlci1zcGFjaW5nOiBub3JtYWw7IHRleHQtYWxp Z246IHN0YXJ0OyB0ZXh0LWluZGVudDogMHB4OyB0ZXh0LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUt c3BhY2U6IG5vcm1hbDsgd29yZC1zcGFjaW5nOiAwcHg7IC13ZWJraXQtdGV4dC1zdHJva2Utd2lk dGg6IDBweDsgdGV4dC1kZWNvcmF0aW9uOiBub25lOyIgY2xhc3M9IiI+DQo8c3BhbiBzdHlsZT0i Y2FyZXQtY29sb3I6IHJnYigwLCAwLCAwKTsgZm9udC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1z aXplOiAxMnB4OyBmb250LXN0eWxlOiBub3JtYWw7IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7 IGZvbnQtd2VpZ2h0OiBub3JtYWw7IGxldHRlci1zcGFjaW5nOiBub3JtYWw7IHRleHQtYWxpZ246 IHN0YXJ0OyB0ZXh0LWluZGVudDogMHB4OyB0ZXh0LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUtc3Bh Y2U6IG5vcm1hbDsgd29yZC1zcGFjaW5nOiAwcHg7IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6 IDBweDsgdGV4dC1kZWNvcmF0aW9uOiBub25lOyBmbG9hdDogbm9uZTsgZGlzcGxheTogaW5saW5l ICFpbXBvcnRhbnQ7IiBjbGFzcz0iIj5PSURzLA0KIGVuY29kZWQgYXMgaW50IGFycmF5cywgcHJv YmFibHkgY29tcHJlc3MgdGhlIGJlc3Qgc28gaWYgb25seSBvbmUsIHRoZW4gSSdkIHBpY2sgdGhh dCBvbmUuICZuYnNwO1VSSXMgYXJlIGNvbnZlbmllbnQgdGhvdWdoIGFsc28gc28gaWYgdHdvLCB0 aGVuIHRoYXQncyBteSBzZWNvbmQgcGljay48c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNw YWNlIj4mbmJzcDs8L3NwYW4+PC9zcGFuPjxiciBzdHlsZT0iY2FyZXQtY29sb3I6IHJnYigwLCAw LCAwKTsgZm9udC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAxMnB4OyBmb250LXN0eWxl OiBub3JtYWw7IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQtd2VpZ2h0OiBub3JtYWw7 IGxldHRlci1zcGFjaW5nOiBub3JtYWw7IHRleHQtYWxpZ246IHN0YXJ0OyB0ZXh0LWluZGVudDog MHB4OyB0ZXh0LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUtc3BhY2U6IG5vcm1hbDsgd29yZC1zcGFj aW5nOiAwcHg7IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsgdGV4dC1kZWNvcmF0aW9u OiBub25lOyIgY2xhc3M9IiI+DQo8YnIgc3R5bGU9ImNhcmV0LWNvbG9yOiByZ2IoMCwgMCwgMCk7 IGZvbnQtZmFtaWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1zdHlsZTogbm9y bWFsOyBmb250LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDogbm9ybWFsOyBsZXR0 ZXItc3BhY2luZzogbm9ybWFsOyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4dC1pbmRlbnQ6IDBweDsg dGV4dC10cmFuc2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7IHdvcmQtc3BhY2luZzog MHB4OyAtd2Via2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7IHRleHQtZGVjb3JhdGlvbjogbm9u ZTsiIGNsYXNzPSIiPg0KPGJsb2NrcXVvdGUgdHlwZT0iY2l0ZSIgc3R5bGU9ImZvbnQtZmFtaWx5 OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1zdHlsZTogbm9ybWFsOyBmb250LXZh cmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDogbm9ybWFsOyBsZXR0ZXItc3BhY2luZzog bm9ybWFsOyBvcnBoYW5zOiBhdXRvOyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4dC1pbmRlbnQ6IDBw eDsgdGV4dC10cmFuc2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7IHdpZG93czogYXV0 bzsgd29yZC1zcGFjaW5nOiAwcHg7IC13ZWJraXQtdGV4dC1zaXplLWFkanVzdDogYXV0bzsgLXdl YmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRlY29yYXRpb246IG5vbmU7IiBjbGFz cz0iIj4NCkkgZG9uJ3Qgc2VlIHRoaXMgY2xhaW0gYXMgZXNzZW50aWFsIGZvciBFQVQsIGJ1dCBJ IGNvbW1pdHRlZCB0byB3b3JraW5nIHRocm91Z2ggdGhpcyB3aXRoIFRFRVAuIEknbSBmaW5lIHdp dGggdGhpcyBQUiBnb2luZyBpbnRvIGEgVEVFUCBkb2N1bWVudCByYXRoZXIgdGhhbiBFQVQuPGJy IGNsYXNzPSIiPg0KPC9ibG9ja3F1b3RlPg0KPGJyIHN0eWxlPSJjYXJldC1jb2xvcjogcmdiKDAs IDAsIDApOyBmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZvbnQtc3R5 bGU6IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6IG5vcm1h bDsgbGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7IHRleHQtaW5kZW50 OiAwcHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9ybWFsOyB3b3JkLXNw YWNpbmc6IDBweDsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRlY29yYXRp b246IG5vbmU7IiBjbGFzcz0iIj4NCjxzcGFuIHN0eWxlPSJjYXJldC1jb2xvcjogcmdiKDAsIDAs IDApOyBmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZvbnQtc3R5bGU6 IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6IG5vcm1hbDsg bGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7IHRleHQtaW5kZW50OiAw cHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9ybWFsOyB3b3JkLXNwYWNp bmc6IDBweDsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRlY29yYXRpb246 IG5vbmU7IGZsb2F0OiBub25lOyBkaXNwbGF5OiBpbmxpbmUgIWltcG9ydGFudDsiIGNsYXNzPSIi PlRoZQ0KIG5vdGlvbiBvZiBIVyBjbGFzcyBJRCBpcyBub3Qgc3BlY2lmaWMgdG8gVEVFcywgaGVu Y2UgdGhlIHJlcXVlc3QgdG8gcHV0IGl0IGluIEVBVCByYXRoZXIgdGhhbiBpbiBhbnl0aGluZyB0 aGF0IHdvdWxkIGltcGx5IHVzZSBpcyBsaW1pdGVkIHRvIFRFRXMgKGhlbmNlIG5vdCBpbiBhIFRF RVAgZG9jdW1lbnQpLjwvc3Bhbj48YnIgc3R5bGU9ImNhcmV0LWNvbG9yOiByZ2IoMCwgMCwgMCk7 IGZvbnQtZmFtaWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1zdHlsZTogbm9y bWFsOyBmb250LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDogbm9ybWFsOyBsZXR0 ZXItc3BhY2luZzogbm9ybWFsOyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4dC1pbmRlbnQ6IDBweDsg dGV4dC10cmFuc2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7IHdvcmQtc3BhY2luZzog MHB4OyAtd2Via2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7IHRleHQtZGVjb3JhdGlvbjogbm9u ZTsiIGNsYXNzPSIiPg0KPGJyIHN0eWxlPSJjYXJldC1jb2xvcjogcmdiKDAsIDAsIDApOyBmb250 LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZvbnQtc3R5bGU6IG5vcm1hbDsg Zm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6IG5vcm1hbDsgbGV0dGVyLXNw YWNpbmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7IHRleHQtaW5kZW50OiAwcHg7IHRleHQt dHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9ybWFsOyB3b3JkLXNwYWNpbmc6IDBweDsg LXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRlY29yYXRpb246IG5vbmU7IiBj bGFzcz0iIj4NCjxzcGFuIHN0eWxlPSJjYXJldC1jb2xvcjogcmdiKDAsIDAsIDApOyBmb250LWZh bWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZvbnQtc3R5bGU6IG5vcm1hbDsgZm9u dC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6IG5vcm1hbDsgbGV0dGVyLXNwYWNp bmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7IHRleHQtaW5kZW50OiAwcHg7IHRleHQtdHJh bnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9ybWFsOyB3b3JkLXNwYWNpbmc6IDBweDsgLXdl YmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRlY29yYXRpb246IG5vbmU7IGZsb2F0 OiBub25lOyBkaXNwbGF5OiBpbmxpbmUgIWltcG9ydGFudDsiIGNsYXNzPSIiPi1EYXZlPC9zcGFu PjxiciBzdHlsZT0iY2FyZXQtY29sb3I6IHJnYigwLCAwLCAwKTsgZm9udC1mYW1pbHk6IEhlbHZl dGljYTsgZm9udC1zaXplOiAxMnB4OyBmb250LXN0eWxlOiBub3JtYWw7IGZvbnQtdmFyaWFudC1j YXBzOiBub3JtYWw7IGZvbnQtd2VpZ2h0OiBub3JtYWw7IGxldHRlci1zcGFjaW5nOiBub3JtYWw7 IHRleHQtYWxpZ246IHN0YXJ0OyB0ZXh0LWluZGVudDogMHB4OyB0ZXh0LXRyYW5zZm9ybTogbm9u ZTsgd2hpdGUtc3BhY2U6IG5vcm1hbDsgd29yZC1zcGFjaW5nOiAwcHg7IC13ZWJraXQtdGV4dC1z dHJva2Utd2lkdGg6IDBweDsgdGV4dC1kZWNvcmF0aW9uOiBub25lOyIgY2xhc3M9IiI+DQo8YnIg c3R5bGU9ImNhcmV0LWNvbG9yOiByZ2IoMCwgMCwgMCk7IGZvbnQtZmFtaWx5OiBIZWx2ZXRpY2E7 IGZvbnQtc2l6ZTogMTJweDsgZm9udC1zdHlsZTogbm9ybWFsOyBmb250LXZhcmlhbnQtY2Fwczog bm9ybWFsOyBmb250LXdlaWdodDogbm9ybWFsOyBsZXR0ZXItc3BhY2luZzogbm9ybWFsOyB0ZXh0 LWFsaWduOiBzdGFydDsgdGV4dC1pbmRlbnQ6IDBweDsgdGV4dC10cmFuc2Zvcm06IG5vbmU7IHdo aXRlLXNwYWNlOiBub3JtYWw7IHdvcmQtc3BhY2luZzogMHB4OyAtd2Via2l0LXRleHQtc3Ryb2tl LXdpZHRoOiAwcHg7IHRleHQtZGVjb3JhdGlvbjogbm9uZTsiIGNsYXNzPSIiPg0KPHNwYW4gc3R5 bGU9ImNhcmV0LWNvbG9yOiByZ2IoMCwgMCwgMCk7IGZvbnQtZmFtaWx5OiBIZWx2ZXRpY2E7IGZv bnQtc2l6ZTogMTJweDsgZm9udC1zdHlsZTogbm9ybWFsOyBmb250LXZhcmlhbnQtY2Fwczogbm9y bWFsOyBmb250LXdlaWdodDogbm9ybWFsOyBsZXR0ZXItc3BhY2luZzogbm9ybWFsOyB0ZXh0LWFs aWduOiBzdGFydDsgdGV4dC1pbmRlbnQ6IDBweDsgdGV4dC10cmFuc2Zvcm06IG5vbmU7IHdoaXRl LXNwYWNlOiBub3JtYWw7IHdvcmQtc3BhY2luZzogMHB4OyAtd2Via2l0LXRleHQtc3Ryb2tlLXdp ZHRoOiAwcHg7IHRleHQtZGVjb3JhdGlvbjogbm9uZTsgZmxvYXQ6IG5vbmU7IGRpc3BsYXk6IGlu bGluZSAhaW1wb3J0YW50OyIgY2xhc3M9IiI+X19fX19fX19fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX188L3NwYW4+PGJyIHN0eWxlPSJjYXJldC1jb2xvcjogcmdiKDAsIDAs IDApOyBmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZvbnQtc3R5bGU6 IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6IG5vcm1hbDsg bGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7IHRleHQtaW5kZW50OiAw cHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9ybWFsOyB3b3JkLXNwYWNp bmc6IDBweDsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRlY29yYXRpb246 IG5vbmU7IiBjbGFzcz0iIj4NCjxzcGFuIHN0eWxlPSJjYXJldC1jb2xvcjogcmdiKDAsIDAsIDAp OyBmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZvbnQtc3R5bGU6IG5v cm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6IG5vcm1hbDsgbGV0 dGVyLXNwYWNpbmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7IHRleHQtaW5kZW50OiAwcHg7 IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9ybWFsOyB3b3JkLXNwYWNpbmc6 IDBweDsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRlY29yYXRpb246IG5v bmU7IGZsb2F0OiBub25lOyBkaXNwbGF5OiBpbmxpbmUgIWltcG9ydGFudDsiIGNsYXNzPSIiPlRF RVANCiBtYWlsaW5nIGxpc3Q8L3NwYW4+PGJyIHN0eWxlPSJjYXJldC1jb2xvcjogcmdiKDAsIDAs IDApOyBmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZvbnQtc3R5bGU6 IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6IG5vcm1hbDsg bGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7IHRleHQtaW5kZW50OiAw cHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9ybWFsOyB3b3JkLXNwYWNp bmc6IDBweDsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRlY29yYXRpb246 IG5vbmU7IiBjbGFzcz0iIj4NCjxhIGhyZWY9Im1haWx0bzpURUVQQGlldGYub3JnIiBzdHlsZT0i Zm9udC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAxMnB4OyBmb250LXN0eWxlOiBub3Jt YWw7IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQtd2VpZ2h0OiBub3JtYWw7IGxldHRl ci1zcGFjaW5nOiBub3JtYWw7IG9ycGhhbnM6IGF1dG87IHRleHQtYWxpZ246IHN0YXJ0OyB0ZXh0 LWluZGVudDogMHB4OyB0ZXh0LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUtc3BhY2U6IG5vcm1hbDsg d2lkb3dzOiBhdXRvOyB3b3JkLXNwYWNpbmc6IDBweDsgLXdlYmtpdC10ZXh0LXNpemUtYWRqdXN0 OiBhdXRvOyAtd2Via2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7IiBjbGFzcz0iIj5URUVQQGll dGYub3JnPC9hPjxiciBzdHlsZT0iY2FyZXQtY29sb3I6IHJnYigwLCAwLCAwKTsgZm9udC1mYW1p bHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAxMnB4OyBmb250LXN0eWxlOiBub3JtYWw7IGZvbnQt dmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQtd2VpZ2h0OiBub3JtYWw7IGxldHRlci1zcGFjaW5n OiBub3JtYWw7IHRleHQtYWxpZ246IHN0YXJ0OyB0ZXh0LWluZGVudDogMHB4OyB0ZXh0LXRyYW5z Zm9ybTogbm9uZTsgd2hpdGUtc3BhY2U6IG5vcm1hbDsgd29yZC1zcGFjaW5nOiAwcHg7IC13ZWJr aXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsgdGV4dC1kZWNvcmF0aW9uOiBub25lOyIgY2xhc3M9 IiI+DQo8YSBocmVmPSJodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL3RlZXAi IHN0eWxlPSJmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZvbnQtc3R5 bGU6IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6IG5vcm1h bDsgbGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgb3JwaGFuczogYXV0bzsgdGV4dC1hbGlnbjogc3Rh cnQ7IHRleHQtaW5kZW50OiAwcHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTog bm9ybWFsOyB3aWRvd3M6IGF1dG87IHdvcmQtc3BhY2luZzogMHB4OyAtd2Via2l0LXRleHQtc2l6 ZS1hZGp1c3Q6IGF1dG87IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsiIGNsYXNzPSIi Pmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vdGVlcDwvYT48L2Rpdj4NCjwv YmxvY2txdW90ZT4NCjwvZGl2Pg0KPGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8L2Rpdj4NCklNUE9S VEFOVCBOT1RJQ0U6IFRoZSBjb250ZW50cyBvZiB0aGlzIGVtYWlsIGFuZCBhbnkgYXR0YWNobWVu dHMgYXJlIGNvbmZpZGVudGlhbCBhbmQgbWF5IGFsc28gYmUgcHJpdmlsZWdlZC4gSWYgeW91IGFy ZSBub3QgdGhlIGludGVuZGVkIHJlY2lwaWVudCwgcGxlYXNlIG5vdGlmeSB0aGUgc2VuZGVyIGlt bWVkaWF0ZWx5IGFuZCBkbyBub3QgZGlzY2xvc2UgdGhlIGNvbnRlbnRzIHRvIGFueSBvdGhlciBw ZXJzb24sIHVzZSBpdCBmb3IgYW55IHB1cnBvc2UsDQogb3Igc3RvcmUgb3IgY29weSB0aGUgaW5m b3JtYXRpb24gaW4gYW55IG1lZGl1bS4gVGhhbmsgeW91Lg0KPC9ib2R5Pg0KPC9odG1sPg0K --_000_8466B6E2C3354173A2A23CCA555D28CAarmcom_-- From nobody Tue Jan 4 06:41:01 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9E4883A1D03; Tue, 4 Jan 2022 06:40:55 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.613 X-Spam-Level: X-Spam-Status: No, score=-2.613 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, NICE_REPLY_A=-0.714, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=fraunhofer.onmicrosoft.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7SK8MR_2AvqV; Tue, 4 Jan 2022 06:40:51 -0800 (PST) Received: from mail-edgeF24.fraunhofer.de (mail-edgef24.fraunhofer.de [192.102.164.24]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1CFBA3A1CFF; Tue, 4 Jan 2022 06:40:48 -0800 (PST) IronPort-SDR: ZGzvwxAfpY38qz8Wm/Z4hiXEAtQZlTmv0Ss8L9wgoHrqL3W2bmHKh5vK188sMN3p1+nreNA9Y6 gGtpaHnuEbJw== X-IPAS-Result: =?us-ascii?q?A2FYBAC2W9Rh/xmkZsBaHAEBAQEBAQcBARIBAQQEAQFAg?= =?us-ascii?q?VkCgVAtKH+BQoRIg0gBAYU5hQ6DAgObHoFCgREDGDMJCwEBAQEBAQEBAQgBK?= =?us-ascii?q?gsMBAEBAwSEfwKDPwElOBMBAgQBAQEBAwIDAQEBAQUBAQYBAQEBAQEFBAICg?= =?us-ascii?q?RiFLzkNQAEMAYMFTTsBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEFAkFHDDIBAQEDAQEQEQ8BBQgBASwCCQEPCxgCAiMDAgInCxQRBgEMA?= =?us-ascii?q?QUCAQEXB4JcASiCPQMuAQEOoHQBgToCih96gTGBAYIIAQEGBASCUoI5GFuBW?= =?us-ascii?q?wMGCQGBBioBgw2HHIQIJxCBVUSBFScPgXOBAT6CYwEBAoEpAQsHAU2CbIJlj?= =?us-ascii?q?ywTViorB1cCTQcFIAh6C48zgxhUq195NAeCD4E2gTUGC5cGhmMGFC6DcEOLR?= =?us-ascii?q?YYjkUyWNiChAByEawIEAgQFAg4BAQaBeIEOcE0kT4JpURkPhm+HMYEmAQKCS?= =?us-ascii?q?YUUhUtzAjYCBgEKAQEDCYhcg3yCRgEB?= IronPort-PHdr: A9a23:4gJaJxAjqs73E9N9xUzqUyQVYBdPi9zP1kY95pkmjudIdaKut9TnM VfE7PpgxFnOQc3A6v1ChuaX1sKoWWEJ7Zub9nxXdptKWkwJjMwMlFkmB8iIQUTwMP/taXk8G 8JPHF9o9n22Kw5bAsH7MkbTvju89zcPHBX4OwdvYOj4Sebv X-IronPort-Anti-Spam-Filtered: true X-IronPort-AV: E=Sophos;i="5.88,261,1635199200"; d="scan'208";a="35036866" Received: from mail-mtaf25.fraunhofer.de ([192.102.164.25]) by mail-edgeF24.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Jan 2022 15:40:45 +0100 IronPort-SDR: V8I4uMnHfZRtDUJnfDWyBhk1B8ZiCaFhdz+TaYfiWeCDdKofsutkPz/lmByzlY/5Ca6lsxQLml 5Vuy4auUdmBOA7GnieO3kdS+5JgV/7UdE= X-IPAS-Result: =?us-ascii?q?A0CxAwD3W9RhjH+zYZlaHAEBAQEBAQcBARIBAQQEAQFAC?= =?us-ascii?q?YFQAoFQLSh/WSZDhEeDSAEBhTmFDl6CJAM4AZplgUKBEQNUCwEDAQEBAQEIA?= =?us-ascii?q?SoLDAQBAYUGAoM8AiY4EwECBAEBAQEDAgMBAQEBBQEBBQEBAQIBAQUEFAEBA?= =?us-ascii?q?QENIWoGXgZogU+BYRMLNA1AAQwBhXUBAQEDAQEQEQ8BBQgBARQYAgkBDwsYA?= =?us-ascii?q?gIjAwICJwsHDREGAQwBBQIBARcHglwBKII9Ay4BAQ6gdAGBOgKKH3qBMYEBg?= =?us-ascii?q?ggBAQYEBIJSgjkYW4FbAwYJAYEGKgGDDYcchAg3gVVEgRUnD4FzgQE+gmMBA?= =?us-ascii?q?QKBKQELBwFNgmyCZY8sE1YqKwdXAk0HBSAIeguPM4MYVKtfeTQHgg+BNoE1B?= =?us-ascii?q?guXBoZjBhQug3BDi0WGI5FMljYgoQAchGsCBAIEBQIOAQEGgXiBDXBNJE+Ca?= =?us-ascii?q?U4BAgECDQECAgMBAgECCQEBAoZshzEZgQ0BAoJJhRSFS0IxAjYCBgEKAQEDC?= =?us-ascii?q?Yhcg3yCRgEB?= IronPort-PHdr: A9a23:9Uc+1hemfVkOffuBdVaJK49TlGM/vYqcDmcuAtIPh7FPd/Gl+JLvd Aza6O52hVDEFYPc97pfiuXQvqyhPA5I4ZuIvH0YNpAZURgDhJYamgU6C5uDDkv2ZPfhcy09G pFEU1lot3G2OERYAoDwfVrX92az8XgcABziMwpyKOnvXILf3KyK IronPort-Data: A9a23:fU/PBqI/dzhZLFPhFE+R15MlxSXFcZb7ZxGr2PjKsXjdYENS0DFVm GJLCmHTa62PYmejcotyO4rjo0wOvMTQzNNmQQUd+CA2RRqmiyZq6fd1jqvUF3nPRiEWZBs/t 63yUvGZd4ZpCCO0Si6FatANl1ElvU2zbue6WL6s1hxZH1c+En940U47wYbVv6Yx6TSHK1PV0 T/Ni5CHULOV82Yc3rU8sv/rRLtH5ZweiRtA1rAMTakjUGz2yxH5OKkiyZSZdBMUdGX08tmSH I4vxJnhlo/QEoxE5tmNyt4XeWVSKlLe0JTnZnd+A8CfbhZ+SiMazIE6EsRbe1ZrqxaHpM1Wk txgsI29YFJ8VkHMsLx1vxhwCCRiJetL6LTHZ3aluNGVz0rIfmGqz/gG4EMeZNBDvLcoRzgRp LpBcm9lghOr34paxJq7R+9vwM4iNsrrO4cNkmph0XfXF/87R5DETajQo9NVtNs1rpkQRq6BP pJBMFKDajybPjEWfWU9JqsBmcali2PyKWRXg3+s8P9fD2/7llUqieO9YbI5YOeiQcpRtkeDo mvA8yHjDwodLsDZwj2Amlqwi+LXtSL2RIxUE6e3ntZwiUGI7m0eFBNQUkG0ydG1lk63X99Ff hBM/yslt68p80K3CNL6WjW0pXeetVgdVsZeVeog52mwJrH8ulvCQzlbC2ceOZl/7pBwWzls3 RmHhdr0AzxovrCPD36QnluJkd+sETYyLEk8Ij0VcSsm7eL+h9s6oxfeQ/82RcZZkebJMT33x jmLqg03iLMSkdMH2s2HEbbv3mnESn/hEl5d2+nHYo62xl4gPt/0PORE/XCKsacZdO51W3Hb5 CBspiSI0AwZJb2g/BFhrc1UQerstqnAaWKNxAc1QN8/8nKmvXC5dJ1W4DZwKV0vPstsld7Vj K375Fg5CHx7ZiDCgUpLj2SZV55CIU/ITouNaxwsRoASCqWdjSfelM2UWWae3nr2jG8nmrwlN JGQfK6EVChGUP48kGTuH7tAi9fHIxzSI0uMGPgXKDz4idKjiIK9E+hUWLdzRr9ot/zc+lm9H yh3bZTTkUQ3vBLCjtn/q9dIdAtafBDX9Lj6ptFLbeWDLxEuFmY7EPTR3LUuYIpog7Y9qws71 i7VZ6Os83Ki1SyvAVjbMRhehEbHAc4XQYQTYXZ9Yj5FGhELPe6S0UvoX8dtIOR8qrU8laUco jtsU5zoP8mjgw/vo1w1BaQRZqQ5HPhyrQ7RbSejfhYleJtsG17A9tP+J1S97ygSSCStvNY4o 7qu2xmdTZdaH1ZuC8PfafSOyVKtvCFBybwoABaSeoFeKBf27YxnCy3tlftpccsCHhX0wGfI3 QihBxpF9/LGpJU48YWSiK3d99WpHuJyE1B0BW7e6brqZyDW8nD6nt1bUfrOcyrUSWX0/6uvf 6NZwqikYvEAmV9Ltat6EqpqlP5vuYGw+uUClgk9RSfFdVWmDL9kM0Kq58gXu/0f3KJdtCu3R lmLpItQN4KJD8W5QlQfEwwoM7aY3vYOlziOtvk4LRmo5CJz+7bbA0xeMwPW035GKadtdo41y udnttQf9gq/jRQnKJCKg3kMpWiLK3UBVYQht40bWdO61FB0lwsaOZGMWDXr5JyvaslXNhV4K DGjgqef1a9XwVDPciZuGHWRj/BRg48C5EJDwFMYfA/bw4eew65omUQOoHFuFFsT0BAB2KR9I GF2MU1yK6iUuTtl3ZARU2epEgBHJRuY5k2olwpXzjKEFRHwWzyfNnA5NMaM4FsdrzBWcA9d8 ezK023iSzvrIJz80yZatZSJcBA/oQGdLjH/pf0= IronPort-HdrOrdr: A9a23:YWlvaKk/fzvuqiys9SBVmHfA+NnpDfO5imdD5ihNYBxZY6Wkfp +V88jzhCWZtN9OYhwdcLC7WZVpQRvnhPpICPoqTMuftW7dyRSVxeBZnPbfKljbdREWmdQtrZ uIH5IObuEYSGIK9/oSgzPIY+rIouP3iZxA7N22pxwGLXAIV0gj1XYfNu/yKDwGeOAsP+taKH Pz3Lsjm9PtQwVtUiztbUN1IdQr6ue72a4PJnU9dmoawTjLqQntxK/xEhCe0BtbezRTwY06+W yAtwDi/K2sv9yy1xeZjgbonttrseqk7uEGKN2Hi8ATJDmpogG0ZL55U7nHmDwuuumg5Hsjjd GJiRY9OMZY7W/XYwiO0FfQ8jil9Axrx27pyFeej3emicvlRAgiA84Evo5degux0TtpgPhMlI Zwm06JvZteCh3N2A7n4cLTah1snk2o5VI/jO86lRVkIMsjQY4UibZa0FJeEZ8GEi6/wpsgCv NSAMbV4+sTWU+GbkreonJkzLWXLzUO9y+9Mwo/U/Guon1rdCgT9Tpd+CVfpAZPyHsFcegG2w yeWZ4Y042nTactHOtA7ak6MI2K41f2MGDx2VSpUCLa/ZE8SgHwQqHMkcAIDcGRCdc1JcgJ6d 78uG0xjx9ER6upM7zW4KF2 X-IronPort-Anti-Spam-Filtered: true X-IronPort-AV: E=Sophos;i="5.88,261,1635199200"; d="scan'208";a="163071001" Received: from 153-97-179-127.vm.c.fraunhofer.de (HELO smtp.exch.fraunhofer.de) ([153.97.179.127]) by mail-mtaF25.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 04 Jan 2022 15:40:43 +0100 Received: from XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) by XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Tue, 4 Jan 2022 15:40:43 +0100 Received: from EUR03-AM5-obe.outbound.protection.outlook.com (104.47.8.54) by XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Tue, 4 Jan 2022 15:40:43 +0100 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Cx2pPoKLYhjv/Uklp046vvFd/VIySQu0wpir/u0b9Mm6uAqPpsm1aZnqfI8/r2Cg5I0kKt6gCX3PLWIoHkVJSOp6TibjlKHCfS+AFO5g3ErJuGTVPl4EXpoctLu38V4TwowwMca4Ld14fMI/3ujezBvQKDN8rSJGJxshqi0hndGiGMvlfUKCMX12YvFqMDD6O3ciumQsz9+LGAm9B3pBsR//2X9HskxUSrnUZOowxarKkpU23OFw+GXgEDt4vGy+2AQNJP9FKjZowvWWn3ZDz7hmeKTbToCqF6bzvZhTq9o0P0gDTe87eK7SBjPu28vaaKqzt9kIQ6VfzfN9Y5p/Fw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=fF37CFxePyNRDeq0K2JM0e7DQJ0PkmcGGdST7YsDZUY=; b=RCRdXKsvUNVYA9b64jPX4Vu6+vqWWiF6U1IGC10vyKGGPGxU99L7FztqLwdNt7Sm4CVrR1C+bBH9yvbZlFxO5kqyOaUKe7KR52+h1Kb2GXuEmtKnKpgUBuBGS+MK9EUotA++HCcgGOTu/h6dFEKM/CtcYULo+G8t5xq32rV+5wFSQdh67x0LRR1QTvLBdxDFE+bCI9fI7aEWIBIYvkG/JRlomzakMEDF3IYd4FwU4cb9rc0LMcuUUwijL0VwfgBSSyojt/h1LxMwXnvgY14Qk4VeMXEJnxdQ2UN1G+LsYwy8sB661qOa+zzmQC6jNiwV0dWCfQOEPvpB7ZIbIl/ORA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=sit.fraunhofer.de; dmarc=pass action=none header.from=sit.fraunhofer.de; dkim=pass header.d=sit.fraunhofer.de; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fraunhofer.onmicrosoft.com; s=selector2-fraunhofer-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fF37CFxePyNRDeq0K2JM0e7DQJ0PkmcGGdST7YsDZUY=; b=N3yUuvGf7FubWDbU95AfgAyHxqrrCEsrTsFiRoZvZx+PqqE7bJBdoMDrMQz3m/ASgvzb5VwKZREtiBIqerexa+qVg9FCWd2SZsqTSkUY0HF5yaDoD5IYreANExxtHWR+khnd/Op6v8GI0LHWS9jQ/1ZlCxDCj/XANzzGRe6d9cM= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=sit.fraunhofer.de; Received: from DU2P194MB1709.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:276::9) by DB9P194MB1433.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:290::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4844.15; Tue, 4 Jan 2022 14:40:42 +0000 Received: from DU2P194MB1709.EURP194.PROD.OUTLOOK.COM ([fe80::9c76:d3ff:1ba4:5319]) by DU2P194MB1709.EURP194.PROD.OUTLOOK.COM ([fe80::9c76:d3ff:1ba4:5319%6]) with mapi id 15.20.4844.016; Tue, 4 Jan 2022 14:40:42 +0000 To: Brendan Moran , Dave Thaler CC: rats , teep , Laurence Lundblade References: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> <8466B6E2-C335-4173-A2A2-3CCA555D28CA@arm.com> From: Henk Birkholz Message-ID: <1b705a76-d162-ff1c-3ac8-0915bd733374@sit.fraunhofer.de> Date: Tue, 4 Jan 2022 15:40:39 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.14.0 In-Reply-To: <8466B6E2-C335-4173-A2A2-3CCA555D28CA@arm.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-ClientProxiedBy: AS8PR04CA0197.eurprd04.prod.outlook.com (2603:10a6:20b:2f3::22) To DU2P194MB1709.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:276::9) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 4df39b5c-8354-465c-707a-08d9cf902ee8 X-MS-TrafficTypeDiagnostic: DB9P194MB1433:EE_ X-LD-Processed: f930300c-c97d-4019-be03-add650a171c4,ExtAddr X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:10000; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU2P194MB1709.EURP194.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(4636009)(366004)(316002)(86362001)(53546011)(66556008)(66946007)(5660300002)(44832011)(2906002)(66476007)(54906003)(110136005)(4326008)(8676002)(26005)(82960400001)(508600001)(6486002)(2616005)(8936002)(38350700002)(6666004)(966005)(186003)(6512007)(38100700002)(6506007)(31686004)(52116002)(31696002)(83380400001)(43740500002)(45980500001); DIR:OUT; SFP:1102; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?dk5TZC9sOExkandEY1pEYUwvL0JoUnlkekJSWU9rY0tNT3M2S1orWDRMZ1A0?= =?utf-8?B?SmNhVi9QK211RUJhL0pUeFo2ZG5pU3dBaGptNmd6ajR1cUZTRzRWY012WlJv?= =?utf-8?B?WHZZRzhvVUdwY2pRaytWNE91UlppSzdOM1JqMWNkUXNHcDgra1VrRGpzUDB3?= =?utf-8?B?U3p2MlhZQ3Y5Nyt0K0J1eGZIQVVLL0JrZEU5Y1haSmVvOGdmaUZ4WXJTWi94?= =?utf-8?B?Y1JwVVdvb08zbDk3MVM3SU9mVUJySHl2SUtBMEJzZVRqUlRackk4ZGdYc1Z5?= =?utf-8?B?V2x2a2E4SlRkMU8rVW5Ja3NjNUgrTWVnRkZiVVRlK1J5eHcrb0lxWCtxbzRG?= =?utf-8?B?MWxoeGQ5ampCalEreHNRRjJMUUVQTFpRdUtZU1pOTmFBUlFOM3VPazZGdHZt?= =?utf-8?B?cVVrUzZ3c3kxNjkyQk5vYUU3dmN6RENJbXlEZFNVbEtzcmdPTkV0bnRRSndC?= =?utf-8?B?Ujd4S2cvYmtsMHpKYlNSM01EeUI2enJGM01QM1VJc1cwZzNWWVd4SWtGeXpF?= =?utf-8?B?MHpGc0VCdFJHcXNGVmxDYUNrMk5OOUlMMER1NU9NcEhtOStzc1o1ME9VV1Bl?= =?utf-8?B?ZGdGbmlZOWNyRnFtNGpDZHRTc3lFQWVMUFpWM3BiQlMycG80TDNMVU5UMUFH?= =?utf-8?B?c3J3RFRnMmhQQ1ppaXA5Yk9FTk15djk3dVc5SWxxcHNlTTRrTHhmKzFidEZB?= =?utf-8?B?bDB5TGt6OW80N1NIOTVrQURuT0ZGblpZUW5TU1FGVkNMV3NKRXQ4RldlSXRF?= =?utf-8?B?bUM4RFhzZW1jY2hxdHBWK0MxVWZwUWRtWmxYdTZJRktpU2x3SjIwT1FUSFpB?= =?utf-8?B?MkZsank0alZ3SmV4WUlqdEVWTlV1cHVHQ21VaGl0SFF3YWdaUjRHZkRObWxo?= =?utf-8?B?Tmx0Q083dGg3NEc4eXRqR3YweXMyd3d0dUZuaURpaXBXT1AzelVnQVFZZlQ3?= =?utf-8?B?NllmcXhwdUpmZXUxeit6VEJWUGFhV2lvTEQyeVBZODBWaHhmK280Q3Bhenhq?= =?utf-8?B?MHc0TEgwV1dESnhkdnlCRFhHUGlkTjFNYitmbDR6QjZPTUJYSTJNOS9mVGNK?= =?utf-8?B?bmpxQU4yR09ua0Yva1lJQ2o3SENIb1RDb0RGMkdCc2FoZ3JHTTVRUTBMTnVo?= =?utf-8?B?SlZ5UTFCQkJtSzhmUHlZejJPbWhvUVBpbTZYSjRjMHd5NUpyWWh4QVE3UVJp?= =?utf-8?B?MEZVUXBQYUtMOEdDNEhkM0ZMNGpZK1p6Um9kMEZ5eDY4M0lrblZpZVFVMWJa?= =?utf-8?B?TDgyZ0xiQTJVa1FoN28rbjkwd0w4czJGQS9DM1F2V3lWZE1LalFMeXMwRnNW?= =?utf-8?B?Rzh6UlNzUjJpZ1RWRHdFaHFvamMxcUtsZnQ4LytmcVRUVXJvRDZuK1pJb0JZ?= =?utf-8?B?OFN0YlBRMWJaUWhURjFMYy9TRXF1SnlZWVpiSmxKRXhMUGRvL1BYVUFOUFhX?= =?utf-8?B?V05JVStCQUFSNXFaMTgyaWRRdVl3V2ZZZVZjdjNBSkJvMDFFc1ZCVUFwcEhv?= =?utf-8?B?VzVEU0FGd0hjc1IrRGY4cThONUcwamw3MG5meGs5S2xDR0lHVGFiZEpDMEQr?= =?utf-8?B?SmFTeEhKS1hBSUdjTW9EQjJuT0l5d2pzS2x5b1NvdlJnU0hiZ0V6NEEreTFM?= =?utf-8?B?U3I2UitlRVNoanFhMFJyVHJQeDhxbzZFdXVXQnpzVlFGTzVHczZSMjFwZ1hY?= =?utf-8?B?U1hhdEtkQy9wcnhWYit5QjByR3R1K25rU0J6QWpiRHhZaVkwTEN4emFTbmIz?= =?utf-8?B?ZmRFeUxwV0w4bitPdmJuQlR1KzFYOFlYdXlnbFRsalNGK2sxRVkvVkJUc0Zo?= =?utf-8?B?NVA1WG5xQlRPOG5TZlM3LzdlRnMzMDRva0dWcU90bld3bS9aSGdUN0pITzBK?= =?utf-8?B?cHZBR3VhNlQvUWpEYjJQejJkVUV2QWhqMDdTOSt6WXllZXZWaU5OblZZODhF?= =?utf-8?B?OGRBaWE3M2dxcXY3WEtYa1VkT3pVYW93RHU3T3VnVmJGSE9JMmRMOUQyUG9n?= =?utf-8?B?UXVDbzFnZGZOdzdYN284MWpjQnpRUmdRcjd5a2JhTWI1NEVTRG1WZmNTVi9k?= =?utf-8?B?TTZMRURjaGs5TVk0aWpwZ242WFRyVVp3dmZvcTZkZkxqeU1HUFhybHBYampn?= =?utf-8?B?bTZOZkdIWGFsT2Yvcnl2VzRwVjlKM1kvMksrcGVjLzM4VmxwNmcvMVJjdVg4?= =?utf-8?B?VDduZG9wMkJzUGhqWVFaem9sVUx6c2x4YVFnR0hMNnRyOEsweXNFOW9oZ1NX?= =?utf-8?B?Z3JNekJkNmxEZnFjb0RVZ0FmeWN3PT0=?= X-MS-Exchange-CrossTenant-Network-Message-Id: 4df39b5c-8354-465c-707a-08d9cf902ee8 X-MS-Exchange-CrossTenant-AuthSource: DU2P194MB1709.EURP194.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Jan 2022 14:40:42.1673 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: f930300c-c97d-4019-be03-add650a171c4 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: h6IZVzpx0vZlvzqulwv0YHsUzWIikyASkQYcrnThbgYXtrdrLwAqA1bVvCDJG29f5MMXs6qEEGYAUBfEHXd/Wt7W26mO3U28bb0J/auMJJA= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB9P194MB1433 X-OriginatorOrg: sit.fraunhofer.de Archived-At: Subject: Re: [Teep] [Rats] Class ID claim (and other HW identification) X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Jan 2022 14:40:56 -0000 Hi all, while I understand the appeal of a nice and simple scopes solution, the truth is it often far more complex than two separate Claim types. I think Brendan highlighted something very important here: "multiple vendor/class pairs". This seems to be the direction where others solutions area also moving towards to, I think :-) Viele Grü0e, Henk On 04.01.22 12:06, Brendan Moran wrote: > I think devices will need to report multiple vendor/class pairs. > > For example, A mobile device could potentially contain: > 1. A Mobile Device OEM Vendor ID > 2. A Silicon vendor’s Vendor ID > 3. An IP vendor’s Vendor ID > > This is not an exhaustive list. > > For Arm Trust Zone TEEs, I would expect to see: > 1. The Arm Vendor ID + the processor core’s Class ID > 2. The Trusted OS Vendor ID + the Trusted OS Class ID > 3. The Silicon vendor’s Vendor ID + the processor Class ID > 4. The Device OEM’s Vendor ID + the device Class ID > > Cheers, > Brendan > >> On 3 Jan 2022, at 21:00, Dave Thaler >> > > wrote: >> >> Laurence Lundblade wrote: >>> I talked to Dave which resulted in reorientation of my understanding >>> of Class ID in TEEP. >>> >>> Class ID basically identifies HW IP from a HW designer like Arm or >>> Synopsis that is integrated into chips made by various HW OEMs like >>> Qualcomm, Samsung and Apple. The term used frequently for this is >>> "IP" (I know this well from my days working on HW at Qualcomm). >>> >>> I've created a PR for HW Class. >>> >>> Since what is identified spans OEMs, this must be a globally unique >>> identifier. We need to be explicit about that. >>> >>> I know of four ways to have a global identifier: >>> - Use OIDs >>> - Use DNS / URI >>> - Probabilistically using a big enough byte string >>> - A new registry, perhaps IANA (but we probably don't want this) >>> >>> The PR allows all but the last, but this could be reduced to just one >>> or two of the above. >> >> PR looks great to me, except that would I agree with reducing it to >> one or two. >> Since the ability to take a value and resolve it to something >> meaningful is useful in many cases (logging, wireshark analysis, >> etc.), I would remove the third option. >> >> OIDs, encoded as int arrays, probably compress the best so if only >> one, then I'd pick that one.  URIs are convenient though also so if >> two, then that's my second pick. >> >>> I don't see this claim as essential for EAT, but I committed to >>> working through this with TEEP. I'm fine with this PR going into a >>> TEEP document rather than EAT. >> >> The notion of HW class ID is not specific to TEEs, hence the request >> to put it in EAT rather than in anything that would imply use is >> limited to TEEs (hence not in a TEEP document). >> >> -Dave >> >> _______________________________________________ >> TEEP mailing list >> TEEP@ietf.org >> https://www.ietf.org/mailman/listinfo/teep >> > > IMPORTANT NOTICE: The contents of this email and any attachments are > confidential and may also be privileged. If you are not the intended > recipient, please notify the sender immediately and do not disclose the > contents to any other person, use it for any purpose, or store or copy > the information in any medium. Thank you. > > _______________________________________________ > TEEP mailing list > TEEP@ietf.org > https://www.ietf.org/mailman/listinfo/teep > From nobody Tue Jan 4 11:05:44 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 25A203A09AB; Tue, 4 Jan 2022 11:05:38 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.677 X-Spam-Level: X-Spam-Status: No, score=-2.677 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.576, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Gr0-QQzh9WsD; Tue, 4 Jan 2022 11:05:33 -0800 (PST) Received: from na01-obe.outbound.protection.outlook.com (mail-eus2azon11021018.outbound.protection.outlook.com [52.101.57.18]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C5F5F3A09A6; Tue, 4 Jan 2022 11:05:32 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=JoiJCUDQ2W/sksVPkieGMiMwZ73p/cEiPRxwjNgMQYU/iZMcWs2zY1POszkH2Hd4mDhoVY+BCgmmWNNL43uqBvdnRlXlygaEWjQGLWT2mNJMmsQnSYWImOPnyEWZwvS6YlIJlVYbkkeRsJSvfDkcP9HiLwvrBfCMfnU9G/8AmWdbpYXrLskXuH48pzFl25tiGAI08LzGm3TC2rfasWLnX5gLRXN/iOWaxqRaigLDAQauoApk7ASiBMiwMtM6iW58U8iheWTrNtUeT0rDP0jD0sA/ASBOx0jcOP++HM6OJq7iBV1rz8FguBHDNsLWruHTlDGr3i1gPRsJaf1zTXHtdw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=B7pPmzHm+3fXpXvXM8UhlEDdej9RNO7xWuJizF/FJT8=; b=KghpQDp0Z0v9xj3/4VenHHIZtw3dUg3rxwr4xvorlB8DJe8h+u1ECeFEmRrFNYe6mixC9HNba6smaI6Wpcm76d19viSEGbWiYfykGUNDEGhVkR7cF4Xib1Xu0+o1XvnBtbHHdOYLgqPaM7pQ9iynhHuB8d3p/ytlec2sLYulvBwF4wpkGsM5FMYlGfu9BGJjSv63FMgA3HjaFPnDMCrArYq+H0wRx5wFRhD0EVMW907qBFi2yLVOKxHKzcDdioG3AS6yU73FjZAfgmWm+45UCCNy/6f8jl2Iy6a8hpFii5gVaML7EMvYYGilkFCuquKlIRQcYZJSkKO9ChmQn66ROQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=B7pPmzHm+3fXpXvXM8UhlEDdej9RNO7xWuJizF/FJT8=; b=gm8plQP5BBfrhFOHVjEoJ7XIa8oXbMR/aAgxWAUdqIAnDX17et5chZmfJQbt4GO3jsm2Lxl5p6ONHGn8uq4BdjakIrsfdnOiOPjOrZLzm6qfi77KSgkGMnlp1WYZC3UZJZ7QsKtUcjbcEFVgHEosNChlDrZ95+sM0ubv+HZEMQk= Received: from CH2PR21MB1464.namprd21.prod.outlook.com (2603:10b6:610:89::16) by SN6PR2101MB0991.namprd21.prod.outlook.com (2603:10b6:805:4::32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4867.3; Tue, 4 Jan 2022 19:05:26 +0000 Received: from CH2PR21MB1464.namprd21.prod.outlook.com ([fe80::69de:5ae:316f:e65a]) by CH2PR21MB1464.namprd21.prod.outlook.com ([fe80::69de:5ae:316f:e65a%8]) with mapi id 15.20.4867.003; Tue, 4 Jan 2022 19:05:26 +0000 From: Dave Thaler To: Brendan Moran CC: rats , teep , Laurence Lundblade Thread-Topic: [Teep] [Rats] Class ID claim (and other HW identification) Thread-Index: AQHYAONYo5cG5GYq702OBNSj33pYiqxRxWvggADvIICAADvDgIAASR0Q Date: Tue, 4 Jan 2022 19:05:26 +0000 Message-ID: References: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> <8466B6E2-C335-4173-A2A2-3CCA555D28CA@arm.com> <1b705a76-d162-ff1c-3ac8-0915bd733374@sit.fraunhofer.de> In-Reply-To: <1b705a76-d162-ff1c-3ac8-0915bd733374@sit.fraunhofer.de> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=a8d9ffd2-5149-45d7-a5a9-3327a8b83ad1; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2022-01-04T19:02:19Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 5bee4783-98e9-47ca-3b06-08d9cfb52abd x-ms-traffictypediagnostic: SN6PR2101MB0991:EE_ x-ms-exchange-atpmessageproperties: SA|SL x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:8882; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: qOcO56r56sOSZnyGB4Bgou+3T4EFXtGhgFqDEPwxXZG67bp2pZi0zrX6BgeZhzrmpOP8sAFGIX0Bt9FJYfkWY0NAdvppFUrttwaLM4WfZ6LVRECQE7JJyW8zxGYDsoFWo6XWkJNmSQHQ2GYQl62QFfNMKq/Qcf68BO8xjV2bSmj/N3hBHFgzQXbOifid1NdH4Q4rIiB2B8Ls2jg/ZAH58S7gMBJU6FkDcDLKvc1Zt9k0fXxDdpaoytu2lYHPN5nY77OA73YHcSuHHwm0LUJEI35xjaE/RL1YgR6R42odHyvOQxc2EhpGhgzt5QDSmG5N/1/W1x7Eza4mbYtYkarNd0A6/KtzZ3ju/RAIrKVu7eTZpALAfhgQDh8fc5qMpF906+eEn+5VxJKyZjbFeSkbnkieYvAdSbqVtz/RLxp4IX7lrOK5jrfMGBNi7bs761KSTPadueBnE0bgMhnyJCJAVtM3eD4XuZp55voHRdeWWpd9NoeC9XV0QW8DErQhu7MkZyZgXikK+RD8/gSYb5Q0HUGjrkIntvHntFAiimHHPvN2Q4H4KzhdagrfuhCJCtAdA41xidwr1QX9Tg1VtBELnzdjHAoPapRFl8RAlZxxq4EEhmqxzSDzR+ufcHBUV98zGi8PbqzoTa01anhBnXMzuAT8di/9vP4L3XXgQsOgTQtq9ehU9p59LS6BgI5+C7GulJ6rsZ+/qICfxzupWFIYDfERX3ZwqfsljGIN3aXzwBUGumijM7/zsOou2YNnkcZy1IpyeupfT0dVC5RH31DVyTNWLxkQfiTv6Z9gq/IxcAoQzJggBhdhiVR0bXchXm045aCvgl4Y5NEJiQZPCba/gAXLjiAfXXyY8tznosMJgVEgMv/2zgeXD723b09QJT1g x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH2PR21MB1464.namprd21.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(2906002)(6916009)(38070700005)(71200400001)(186003)(6506007)(66556008)(38100700002)(122000001)(10290500003)(66946007)(66446008)(86362001)(508600001)(82950400001)(966005)(55016003)(53546011)(8676002)(54906003)(7696005)(82960400001)(64756008)(9686003)(83380400001)(8936002)(4326008)(5660300002)(52536014)(66476007)(76116006)(8990500004)(33656002)(316002)(20210929001); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?JK1zryrYjhchxA/gOyoLP44Im7/MQBkgjbm6uNvlREk9QdbPylsXYdb7Ng?= =?iso-8859-1?Q?IMUTmZ/GLKMprMrO/pBeEkdYrW8nofpwe8K+pVuqIcvNcahqzGfyGydiju?= =?iso-8859-1?Q?WoD2QM6BMkVocyX3Hi0d5v1YbkMrG+J0NyAV4tEvmjq0mSNsG39+UerlCe?= =?iso-8859-1?Q?TyNA7BHnqJLvI13CMAJy18Z+qOkmcp1t9gA4VCzJTv6uIA9gx+roHaMbtV?= =?iso-8859-1?Q?hvxF8wdACrzkh/mN46YeFVW6eyC5wR2Ch6obDaIfpP5JIEDVDU2QvgJzjK?= =?iso-8859-1?Q?YcBFPLb2zHVRGUORn1qYlqgT6LaMXvvXlrGk+VLdOvMEEKejpHClFVPIJ7?= =?iso-8859-1?Q?rW6sdssLsFA/ZW+8VIeFb5oZ8LflOsMy48CnFhKTcnVln25r7+L7FIM8T3?= =?iso-8859-1?Q?PW4ngzHpj9EZ/7reVnLq/mD6oLLyFOPHIqB9ljmyqkryNJZrCM4BhKKJx+?= =?iso-8859-1?Q?kAKHLHOzKXhEp3HOrdMIxGFwnd07CY228DqrVa600A6VZyq2Qv0xpDMHix?= =?iso-8859-1?Q?aDuB8Euly9WbHW5DzaH2KbykAiFjwHladuG/M/KWHJT4Q7zyqAXA6808l4?= =?iso-8859-1?Q?pSyIEyznv2xdF8cwjv64LYMWwM4EiEytwQs7ZRPwMhFRJcoffgfaaujYag?= =?iso-8859-1?Q?G0FPQ5u52jmmhrfNm+/F1ZIx2D/7xu8F5oTOwA6fPSyQE8oY2vuqXeAOuI?= =?iso-8859-1?Q?XpLbXL0oJ22ICK7Q5w2vK9qcjQn3/x/0vfkY7ijmi6k+dO3pYuOeVwzVnT?= =?iso-8859-1?Q?dMMh3lOIu9QUIbIJIfkALi3MCrf/XJo6on1IBUybdz+RuPZPW5GDK74cgw?= =?iso-8859-1?Q?z8LLoLvKrakSrI31HA5SrSXLMffWqiiFljj4nBnyF0GZw2aQlBEwHcZEjc?= =?iso-8859-1?Q?7ixN6B9iaZxmM9L0gncje7IXcHghFo6jSSePnY+bkZ7ZIoa/GKhOHevxEz?= =?iso-8859-1?Q?xdttLd+gmz3YytKWdxZTwRPCUbY7HRe8tR+VYxKH/lEIiCeisLFQpuj60z?= =?iso-8859-1?Q?QF/CIfjjMEkBJFuaCC0r3IE3XsUgCe0fBoH1oHekOaJwKBuT4l+1kWY0ur?= =?iso-8859-1?Q?6NizUgNw4AFAwyQLOi4Geu5peZkRq2DwnndNs/lTaYGGj44dakDvMLlzFB?= =?iso-8859-1?Q?PFjxnG00jaTbhpEHyX+Rgej5DBA1cs7HuaRKn59x6KzaH8u+Eh2BopGHmD?= =?iso-8859-1?Q?9m/5qpkWrAWythP+r+TQwiB9DPMQ3yt5JcuHHVbxEbesujYTyclw0PfJWt?= =?iso-8859-1?Q?vOLTFms1l5FE90y9g61HL17Hv/HnRPiQfLSY6fwNZhE5K9pErKQgeaEs/n?= =?iso-8859-1?Q?goGKIwD8XMkscghAM3fbu2SSmAjK8rs49P4wUFUdn2XXJacEAlBVZF/Ggy?= =?iso-8859-1?Q?XYRmbFB1G5jGRW0kD+hE0hU+9crUaXDx8naQuix/MlZxDPwYVoQx49ZYYY?= =?iso-8859-1?Q?8EGuaergxxY0s2D/1rqUHbov9DACGEfbowXkmGxicw5CC8EkEPTukWxXI4?= =?iso-8859-1?Q?eXrQo7VRr5ERu9H/lQgcatix0OZQ0Ba3dIAar+SB5qzje73VxbmozXbb8M?= =?iso-8859-1?Q?TBgK8mYSioVSgAYHXUaHnU5eFBpDG6FgdUUYcUnriyLROZ8HWaDQec69hq?= =?iso-8859-1?Q?SddeXeAd3ZBF11U+5ojMubqXimu5W0jZJGF4vjUVk4az54c95h47GKKCAo?= =?iso-8859-1?Q?JgFGiJqT1xwE6nD7//K/T1MgV0RbP+jPwwZeexg9GN26MppPET4dsKz4Jp?= =?iso-8859-1?Q?/WdmzZwZszwEANiIAHv1/rDQbghqJwIeOSx4VM2XX9rMWfd+zIWpnFleP2?= =?iso-8859-1?Q?HobNYCrgHQ=3D=3D?= Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: microsoft.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CH2PR21MB1464.namprd21.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 5bee4783-98e9-47ca-3b06-08d9cfb52abd X-MS-Exchange-CrossTenant-originalarrivaltime: 04 Jan 2022 19:05:26.2110 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: dRnzB4vpvPsAO+X8qLt65BI551lrvtTU3QZrG+fnCBFAlNbn+Mh14c8RE92cvVX+MxR7IOGctB9WFB0O4yuKou2AyvYLPzmcb2K3r28u+hU= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR2101MB0991 Archived-At: Subject: Re: [Teep] [Rats] Class ID claim (and other HW identification) X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Jan 2022 19:05:38 -0000 When Laurence and I chatted, I was unsure that we needed a class ID claim f= or software ("The Trusted OS Vendor ID + the Trusted OS Class ID" in Brenda= n's email) other than what a CoSWID already provides. If anyone thinks a CoSWID is not sufficient for software cases, please spea= k up. Dave -----Original Message----- From: TEEP On Behalf Of Henk Birkholz Sent: Tuesday, January 4, 2022 6:41 AM To: Brendan Moran ; Dave Thaler Cc: rats ; teep ; Laurence Lundblade Subject: Re: [Teep] [Rats] Class ID claim (and other HW identification) Hi all, while I understand the appeal of a nice and simple scopes solution, the tru= th is it often far more complex than two separate Claim types. I think Brendan highlighted something very important here: "multiple vendor= /class pairs". This seems to be the direction where others solutions area a= lso moving towards to, I think :-) Viele Gr=FC0e, Henk On 04.01.22 12:06, Brendan Moran wrote: > I think devices will need to report multiple vendor/class pairs. >=20 > For example, A mobile device could potentially contain: > 1. A Mobile Device OEM Vendor ID > 2. A Silicon vendor's Vendor ID > 3. An IP vendor's Vendor ID >=20 > This is not an exhaustive list. >=20 > For Arm Trust Zone TEEs, I would expect to see: > 1. The Arm Vendor ID + the processor core's Class ID 2. The Trusted OS=20 > Vendor ID + the Trusted OS Class ID 3. The Silicon vendor's Vendor ID=20 > + the processor Class ID 4. The Device OEM's Vendor ID + the device=20 > Class ID >=20 > Cheers, > Brendan >=20 >> On 3 Jan 2022, at 21:00, Dave Thaler=20 >> > > wrote: >> >> Laurence Lundblade wrote: >>> I talked to Dave which resulted in reorientation of my understanding=20 >>> of Class ID in TEEP. >>> >>> Class ID basically identifies HW IP from a HW designer like Arm or=20 >>> Synopsis that is integrated into chips made by various HW OEMs like=20 >>> Qualcomm, Samsung and Apple. The term used frequently for this is=20 >>> "IP" (I know this well from my days working on HW at Qualcomm). >>> >>> I've created a PR for HW Class. >>> >>> Since what is identified spans OEMs, this must be a globally unique=20 >>> identifier. We need to be explicit about that. >>> >>> I know of four ways to have a global identifier: >>> - Use OIDs >>> - Use DNS / URI >>> - Probabilistically using a big enough byte string >>> - A new registry, perhaps IANA (but we probably don't want this) >>> >>> The PR allows all but the last, but this could be reduced to just=20 >>> one or two of the above. >> >> PR looks great to me, except that would I agree with reducing it to=20 >> one or two. >> Since the ability to take a value and resolve it to something=20 >> meaningful is useful in many cases (logging, wireshark analysis,=20 >> etc.), I would remove the third option. >> >> OIDs, encoded as int arrays, probably compress the best so if only=20 >> one, then I'd pick that one. =A0URIs are convenient though also so if=20 >> two, then that's my second pick. >> >>> I don't see this claim as essential for EAT, but I committed to=20 >>> working through this with TEEP. I'm fine with this PR going into a=20 >>> TEEP document rather than EAT. >> >> The notion of HW class ID is not specific to TEEs, hence the request=20 >> to put it in EAT rather than in anything that would imply use is=20 >> limited to TEEs (hence not in a TEEP document). >> >> -Dave >> >> _______________________________________________ >> TEEP mailing list >> TEEP@ietf.org >> https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww >> .ietf.org%2Fmailman%2Flistinfo%2Fteep&data=3D04%7C01%7Cdthaler%40mi >> crosoft.com%7Cc48b2ec9ba054b78066a08d9cf903c6d%7C72f988bf86f141af91ab >> 2d7cd011db47%7C1%7C0%7C637769041163250085%7CUnknown%7CTWFpbGZsb3d8eyJ >> WIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C200 >> 0&sdata=3DEzozAFvWlhouvLI%2B1BVqneNi%2Bt7QYDpauVizouSOu3A%3D&re >> served=3D0=20 >> > w.ietf.org%2Fmailman%2Flistinfo%2Fteep&data=3D04%7C01%7Cdthaler%40m >> icrosoft.com%7Cc48b2ec9ba054b78066a08d9cf903c6d%7C72f988bf86f141af91a >> b2d7cd011db47%7C1%7C0%7C637769041163250085%7CUnknown%7CTWFpbGZsb3d8ey >> JWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C20 >> 00&sdata=3DEzozAFvWlhouvLI%2B1BVqneNi%2Bt7QYDpauVizouSOu3A%3D&r >> eserved=3D0> >=20 > IMPORTANT NOTICE: The contents of this email and any attachments are=20 > confidential and may also be privileged. If you are not the intended=20 > recipient, please notify the sender immediately and do not disclose=20 > the contents to any other person, use it for any purpose, or store or=20 > copy the information in any medium. Thank you. >=20 > _______________________________________________ > TEEP mailing list > TEEP@ietf.org > https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww. > ietf.org%2Fmailman%2Flistinfo%2Fteep&data=3D04%7C01%7Cdthaler%40micr > osoft.com%7Cc48b2ec9ba054b78066a08d9cf903c6d%7C72f988bf86f141af91ab2d7 > cd011db47%7C1%7C0%7C637769041163250085%7CUnknown%7CTWFpbGZsb3d8eyJWIjo > iMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000& > ;sdata=3DEzozAFvWlhouvLI%2B1BVqneNi%2Bt7QYDpauVizouSOu3A%3D&reserved > =3D0 >=20 _______________________________________________ TEEP mailing list TEEP@ietf.org https://nam06.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fwww.iet= f.org%2Fmailman%2Flistinfo%2Fteep&data=3D04%7C01%7Cdthaler%40microsoft.= com%7Cc48b2ec9ba054b78066a08d9cf903c6d%7C72f988bf86f141af91ab2d7cd011db47%7= C1%7C0%7C637769041163250085%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJ= QIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C2000&sdata=3DEzozAFvWlhou= vLI%2B1BVqneNi%2Bt7QYDpauVizouSOu3A%3D&reserved=3D0 From nobody Fri Jan 7 12:02:26 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9DBD53A12F0; Fri, 7 Jan 2022 12:02:24 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.497 X-Spam-Level: X-Spam-Status: No, score=-1.497 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, KHOP_HELO_FCRDNS=0.399, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=no autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6sl6gF-8kM6q; Fri, 7 Jan 2022 12:02:21 -0800 (PST) Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 99F073A1376; Fri, 7 Jan 2022 12:02:11 -0800 (PST) Received: from mit.edu ([24.16.140.251]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 207K1xwj015961 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 7 Jan 2022 15:02:07 -0500 Date: Fri, 7 Jan 2022 12:01:59 -0800 From: Benjamin Kaduk To: draft-ietf-teep-architecture.all@ietf.org Cc: teep@ietf.org Message-ID: <20220107200159.GP11486@mit.edu> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit Archived-At: Subject: [Teep] AD review of draft-ietf-teep-architecture-15 X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 07 Jan 2022 20:02:25 -0000 Overall this is in pretty good shape, but we'll want a new I-D before going to IETF Last Call. -Ben The shepherd writeup only answers the first part of item (1); there are two more questions to answer. I'm not entirely sure if this is better addressed in the architecture doc or the HTTP transport doc, but it seems to me that the "ProcessConnect" API is not really described well in either doc (in particular, why there's a need for it as a distinct option from ProcessTeepMessage). It may be that the concept of a "connect"ion is what we really want to explain, especially in terms of its relationship to a "session" (as discussed in the HTTP transport doc). I put some editorial nits in https://github.com/ietf-teep/architecture/pull/231 Section 1 In this TEE ecosystem, there often arises a need for an external trusted party to verify the identity, claims, and rights of TA developers, devices, and their TEEs. This trusted third party is the Trusted Application Manager (TAM). Do users or device owners have any rights that need to be enforced? Can the TAM do that? If the need only "often arises", that implies there are some instances where the need is not present. We might want to say that our architecture always has a TAM and make some remark about that not being very disruptive for the rare cases where there is no specific need for a TAM, as the entity provisioning the TA software could still run a TAM of their own and be able to use the TEEP protocol. Section 2 - Rich Execution Environment (REE): An environment that is provided and governed by a typical OS (e.g., Linux, Windows, Android, iOS), potentially in conjunction with other supporting operating systems and hypervisors; it is outside of any TEE. [...] At risk of being overly pedantic, "outside of any TEE" is a global/universal statement, which would seem to rule out some sort of "hierarchical" setup where (e.g.) a VM runs in a hypervisor-scale TEE and has individual smaller TEEs running inside of it. If we instead said something like "outside of the TEEs managed by the TEEP protocol" that would match up more directly with the natural protocol scope. - Trust Anchor: As defined in [RFC6024] and [I-D.ietf-suit-manifest], "A trust anchor represents an authoritative entity via a public key and associated data. The public key is used to verify digital signatures, and the associated data is used to constrain the types of information for which the trust anchor is authoritative." The Trust Anchor may be a certificate or it may be a raw public key along with additional data if necessary such as its public key algorithm and parameters. Our definition of raw public key (especially after my proposed edits) includes the algorithm and arguably its parameters as well, so this "such as" phrase doesn't seem to be adding much value. Section 4.1 A TAM may be publicly available for use by many Trusted Component Signers, or a TAM may be private, and accessible by only one or a limited number of Trusted Component Signers. It is expected that many manufacturers and network carriers will run their own private TAM. Might enterprises run their own TAM as well? Any entity is free to operate a TAM. For a TAM to be successful, it must have its public key or certificate installed in a device's Trust Anchor Store. [...] (probably editorial) We're slightly inconsistent about whether we always include the "or a certificate it chains up to" in the Trust Anchor Store. Personally I'm not terribly concerned about it, though some future reviewers may disagree. Section 4.3 As shown in Figure 2, a TEEP Broker provides communication between one or more TEEP Agents and one or more TAMs. The selection of which TAM to communicate with might be made with or without input from an Untrusted Application, but is ultimately the decision of a TEEP Agent. There is perhaps some subtlety in what we mean by "communicate with" -- a broker could go off and send network packets to arbitrary TAMs, but the TEEP Agent controls whether or not to act on messages/requests from each TAM. So maybe the final clause could be "but it is ultimately the decision of a TEEP Agent which TAM(s) to interact with" or similar. To be clear, it's probably also fine to leave it as-is. Section 4.4 There are three possible cases for bundling of an Untrusted Application, TA(s), and Personalization Data: This seems to be making some assumptions -- I count five possible ways to partition three items into one or more groups (one way with one group, one way with three groups, and three ways with two groups). While it may not make much sense to bundle the Untrusted Application and Personalization Data together without the TA(s), or bundle the TA(s) and Personalization Data together without the Untrusted Application, I'm not sure that we should silently discard those possibilities. Section 4.4.1 Untrusted Application in a trusted fashion. Finally, the Personalization Data would need to be sent out of the TEE (encrypted in an SGX enclave-to-enclave manner) to the REE's installation app, I'm not entirely sure that I have connected all the pieces that would require the enclave-to-[other-]enclave encryption here -- is it because the decryption of the bundled program happens in the TEEP Agent and the personalization data has to get sent to a separate enclave? Section 4.5 At step 4, since the Untrusted Application depends on the TA, installing the Untrusted Application will trigger TA installation by initiating communication with a TAM. The TEEP Agent will interact with TAM via a TEEP Broker that faciliates communications between a TAM and the TEEP Agent in TEE. The arrow in the figure points from TAM to device-with-TEE; is that the direction we want it to point at, given that this prose describes the operation being triggered on the device? (I think it probably is, given the way we discuss TAM requests and responses, but wanted to check.) Section 5 The TEE key pair and certificate are thus used for authenticating the TEE to a remote TAM, and for sending private data to the TEE. [...] This implies that the same key is used for both signing and encryption. I think I remember some previous discusions about needing to allow this because it's what's done in practice, and devices only including one key, but I think we can still mention that joint security of encryption and signature with a single key remains to some extent an open question in academic cryptography. Section 5.1 Before a TAM can begin operation in the marketplace to support a device with a particular TEE, it must obtain a TAM certificate from a CA or the raw public key of a TAM that is listed in the Trust Anchor Store of the TEEP Agent. Is this bit about a raw public key right? Right now it reads like the TAM obtains a TAM certificate from a RPK of a TAM listed in the trust anchor store; shouldn't it be more like getting the RPK listed in the trust anchor store, with no certificate? Section 5.2 A TEE determines whether TA binaries are allowed to execute by verifying whether their signature can be verified using certificate(s) or raw public key(s) in the TEE's Trust Anchor Store. I wonder if we could use more parallel paragraph structures across sections 5.1-5.3 -- the other two start "a TEEP Agent's Trust Anchor Store contains" and "the Trust Anchor Store in a TAM consists of", which are somewhat similar, but both are quite different from what's written here. That might also let us harmonize how we discuss certificates vs. raw public keys. Section 6.1 A TAM message may indicate the target TEE where a Trusted Component should be installed. A compliant TEEP protocol should include a target TEE identifier for a TEEP Broker when multiple TEEs are present. I'm a bit confused about the phrasing "a compliant TEEP protocol should include" -- does this mean anything other than "the TEEP protocol will"? Section 9 There's a couple more points that I think we should cover. The whole architecture is in some sense a "double-edged sword". It provides protection for users and device owners against malicious apps running on the device, at the cost of the owner having to trust that the TAM is providing the stated code. The owner doesn't necessarily have good mechanisms for getting visibility into what code is actually running in the TEE without being involved in the TAM operation, and in some cases the user will have no rights at all. The latter runs risk of conflicting with RFC 8890, so I really think we want some discussion of how there are ways for TEEP to provide value to users, acknowledge that there are cases where the main value of TEEP is to device owners potentially at risk of harm to users, and discuss the trade-offs involved. This architecture basically requires that the TAM know the device identity in all transactions (device identifying information is a required claim in 7); this has privacy implications that should be documented. The TAM is a trusted party in the ecosystem, but can still be a different party than device owner or administrator, so we need to document the new privacy exposure (and possibly the assumption that contractual controls will be available for it). Section 9.4 certificate. Such validation includes checking for certificate revocation. See Section 6 of [RFC5280] for details. Might OCSP (including stapling) or other non-CRL mechanisms be in scope? Is it worth mentioning RFC 6960 or 6961 as well as 5280 here? Section 9.8 Should we mention that in this scenario we cannot even rely on the TAM to report a public key of a TEE for use with encryption, since the TAM could misreport the key and provide one that it controls, thereby receiving the data that is supposed to be kept secret from it? It is a fairly straightforward attack, but maybe not obvious to all readers. It also seems that if the Trusted Component Signer can interact with the manufacturer directly, that may open up avenues for key distribution. (Whether or not this is sufficiently interesting to be worth mentioning in the document is something I'm not sure of.) From nobody Fri Jan 7 12:03:51 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E65A13A1379; Fri, 7 Jan 2022 12:03:49 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.496 X-Spam-Level: X-Spam-Status: No, score=-1.496 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, KHOP_HELO_FCRDNS=0.399, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z8q7zEcBQ1sI; Fri, 7 Jan 2022 12:03:45 -0800 (PST) Received: from outgoing.mit.edu (outgoing-auth-1.mit.edu [18.9.28.11]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 20A1D3A1377; Fri, 7 Jan 2022 12:03:41 -0800 (PST) Received: from mit.edu ([24.16.140.251]) (authenticated bits=56) (User authenticated as kaduk@ATHENA.MIT.EDU) by outgoing.mit.edu (8.14.7/8.12.4) with ESMTP id 207K3ZeN016602 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 7 Jan 2022 15:03:40 -0500 Date: Fri, 7 Jan 2022 12:03:34 -0800 From: Benjamin Kaduk To: draft-ietf-teep-otrp-over-http.all@ietf.org Cc: teep@ietf.org Message-ID: <20220107200334.GQ11486@mit.edu> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit Archived-At: Subject: [Teep] AD review of draft-ietf-teep-otrp-over-http-12 X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 07 Jan 2022 20:03:50 -0000 This is also in good shape, modulo 5.2, and will want a new I-D before IETF Last Call. -Ben It's possible that some of these topics might be more properly addressed in the architecture doc than here; I didn't put a huge amount of thought into that division, and trust that the author overlap will help make the right thing happen. I put some editorial nits in https://github.com/ietf-teep/otrp-over-http/pull/34 Section 4 When HTTPS is used, clients MUST use the procedures detailed in Section 6 of [RFC6125] to verify the authenticity of the server. See The RFC 6125 procedures rely on the consuming specification to provide a couple more inputs to the procedure. In particular, the client needs to have a list of acceptable reference identifiers, and protocols using the RFC 6125 procedures usually will say that the client needs to match against a particular type of name (I would expect DNS-ID here), and how to obtain the specific name to use for a given interaction. In this case, the DNS-ID would probably be obtained from the authority component of the TAM URI ... which is basically the same procedure described in https://datatracker.ietf.org/doc/html/draft-ietf-httpbis-semantics#section-4.3.4 . So we might consider using that as the primary reference, mentioning that it incorporates the RFC 6125 procedures but not directly incorporating the RFC 6125 procedures ourselves. [BCP195] for additional TLS recommendations and [RFC7925] for TLS recommendations related to IoT devices. I note that both RFC 6125 and RFC 7525 (BCP 195) have active "bis" drafts in UTA. If I remember correctly, some of the 6125bis changes are "big", but even so, we would likely want to pull in the updated versions if they are available by the time we are ready for publication, with the caveat that if we defer to httpbis-semantics, that would take precedence. (Since we'll be waiting for draft-ietf-teep-protocol, it's a little hard to predict exactly when that will be.) Section 5.1.1 If the TEEP Agent passes back a TAM URI with no message buffer, the TEEP/HTTP Client attempts to create session state, then sends an HTTP(S) POST to the TAM URI with an Accept header with the TEEP media type requested, and an empty body. [...] I'm having a bit of trouble around "with the TEEP media type requested", as it seems to imply that the TEEP Agent has requested a specific media type, and that media type request needs to be propagated through to the TAM. But in the previous section we only talked about a TAM URI being passed back, not a TAM URI and some other (meta)data. This makes me wonder if we're just saying "populate the Accept header field with the single media type application/teep+cbor", since that's the single defined media type for TEEP. But elsewhere in the document we seem to be careful about providing flexibility about what media type is in use. Section 5.2 This section overall seems kind of incohesive. It's supposed to be about what to do when an application tells a broker that a previously installed TA is not needed anymore; an "uninstall request", as it were. But then we go on to say: * Optionally, any requirements that may affect the choice of TEE, if multiple are available to the TEEP Broker. and When a TEEP Broker receives such a notification, it first identifies in an implementation-dependent way which TEE (if any) is appropriate based on the constraints expressed, as in Section 5.1. that talk about picking a TEE in the same way we would for an installation, as if there is no advance knowledge that the TA is already installed in some specific TEE. Now, it may not be feasible for the broker to track state on which TA is installed in which TEE at behest of which rich application, so we probably can't just say "use the TEE that had this TA installed due the request of this rich application", but we could frame the discussion to acknowledge that there *is* some single TEE that has the copy of the TA that we're trying to uninstall, and we're trying to use as reliable a procedure as possible to direct the uninstall-request to the right TEE. So, instead of the above, we might refer to any requirements "that would have affected the choice of TEE to originally install the TA into" and having the broker identify "which TEE is believed to contain the TA in need of uninstallation". The TEEP/HTTP Client then informs the TEEP Agent in that TEE by invoking an appropriate "UnrequestTA" API that identifies the unneeded TA. The TEEP/HTTP Client need not know whether the TEE actually has the TA installed. We also jumped from the TEEP Broker to the TEEP/HTTP Client, here, whereas in 5.1 we had the Broker delegate the action to "the TEEP/HTTP Client for that TEE". We should probably have a similar transition in this section. The TEEP Agent will either (a) pass no data back, (b) pass back a TAM URI to connect to, or (c) pass back a message buffer and TAM URI to send it to. The TAM URI passed back may or may not be the same as the TAM URI, if any, provided by the TEEP/HTTP Client, depending on the TEEP Agent's configuration. If they differ, the TEEP/HTTP Client MUST use the TAM URI passed back. This looks like just a copy/paste of the text from 5.1 ... but we didn't mention the possibility of getting a TAM URI from the application installer in this section, so (b) feels out of place without such a previous lead-in. Processing then continues as in Section 5.1.1. I might consider (but might not end up actually) mentioning here that we still have to create session state even for the UnrequestTA action, since the session state relates to an ongoing/active TEEP Agent/TAM exchange, and is not persistent during normal TA operation. Section 5.3 When a TEEP Agent passes a message buffer (and TAM URI) to a TEEP/ HTTP Client, the TEEP/HTTP Client MUST do the following, using the TEEP/HTTP Client's session state associated with its API call to the TEEP Agent. As written, this only covers case (c), but I'm inferring that we intend for it to also cover case (b). In order to cover case (b) as well as case (c), we'd need to not require that a message buffer is passed back (or at least, clarify that this buffer might be empty), and could instead talk about the client having an outstanding HTTP request (which might entail pushing the construction of the request back into an earlier section in the "got a message buffer" case). The TEEP/HTTP Client sends an HTTP POST request to the TAM URI with Accept and Content-Type headers with the TEEP media type in use, and a body containing the TEEP message buffer provided by the TEEP Agent. The HTTP request is then associated with the TEEP/HTTP Client's session state. The Content-Type requirement is already in place for responses due to the text in 4. It seems like we might incorporate the requirements on HTTP requests into that section (which, after all, is "Use of HTTP as a Transport") and avoid repeating them here. Section 5.6 If any HTTP request results in an HTTP error response or a lower layer error (e.g., network unreachable), the TEEP/HTTP Client calls the TEEP Agent's "ProcessError" API, and then deletes its session state and informs its caller of a failure. The lower-layer errors are often very unauthenticated (e.g., ICMP), and in some scenarios we see guidance to not act on such signals *immediately*, to give a competing successful response a chance to arrive. But I'm okay classifying such behavior as "quality of implementation" and leaving this text unchanged. Section 6 It seems like there needs to be some out-of-band agreement between TAM and TEEP/HTTP server as to what media type(s) are supported. That is probably worth mentioning somewhere, though I'm not sure if this is quite the best place to do so. Section 6.1 If the TAM does not receive the appropriate Content-Type header fields, the TAM SHOULD fail the request, returning a 415 Unsupported Media Type response. Similarly, if an appropriate Accept header Media Type response. Similarly, if an appropriate Accept header field is not present, the TAM SHOULD fail the request with an appropriate error response. [...] I just want to confirm that "SHOULD" is the right requirements level here. I do see that 4.13 of BCP56bis only indicates a need to require *clients* to fail on the wrong Content-Type, and this section applies to the server, so we may not want/need to have a hard requirement. When an HTTP POST request is received with an empty body, the TEEP/ HTTP Server invokes the TAM's "ProcessConnect" API. The TAM will then pass back a (possibly empty) message buffer. I'm a little confused at when the resulting message buffer would be empty, as the ProcessConnect API appears to exist in order to create a session so that TEEP Agent and TAM can communicate. At this point we don't have any information at all about which TEEP Agent is initiating the session, and thus it seems premature to make a conclusion that this TAM has nothing further to say to that TEEP Agent. Would the empty buffer only result in an error or execption case, e.g., if the TAM was shutting down? (I recall that the empty buffer will be treated by the TEEP/HTTP Client as a signal to destroy session state and make not further requests to that TAM.) Section 8 A few more topics that we might want to cover in these security considerations: Part of the design/requirements is a periodic check for policy changes (5.5); the listed options here all seem to place the Broker or TEEP/HTTP client in the critical path for the policy-check workflow. Since these are (to some extent) untrusted components, we could talk about the possibility for the periodic policy check to be missed, what risks that exposes the TEE/TAs to, and perhaps mention that there are countermeasures available to the TEEP Agent (with caveat that a "dead-man's switch" would give no service rather than vulnerable service and be subject to DoS attack). Similarly, the Broker as an untrusted component is involved in the mechanics of installing new TAs. It might be worth reiterating that the authority for what TAs are running in a given TEE is assigned amongst the TEEP Agent and the TAM, and while the Broker can in effect "make suggestions", it doesn't actually decide or enforce what runs where. (Modulo the ever-present DoS risk, of course.) In contrast to the previous point, the Broker does seem to have full control over which TEE a given installation request is directed at, and there might be some security considerations relating to how the broker picks amonst multiple TEEs to try to use. The authorization model for the UnrequestTA operation is quite weak, with essentially any untrusted application in the rich execution environment being able to request the operation. We might be able to do something vaguely like a "capability URL" where the "unique identifier of the TA" is hard to guess and acts as a bearer token, but I don't think the architecture allows anything better. I don't have a great sense for what countermeasures are available to respond to a (successful) malicious UnrequestTA operation; the main thing that comes to mind is to have the application in the rich execution environment that still needs the TA to notice its absence and request it back, but there are probably others, possibly even within the TEEP Agent or TAM. From nobody Fri Jan 7 15:56:30 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D80573A1156 for ; Fri, 7 Jan 2022 15:56:27 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.899 X-Spam-Level: X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hVuqwd5Pz61e for ; Fri, 7 Jan 2022 15:56:23 -0800 (PST) Received: from p3plsmtpa11-05.prod.phx3.secureserver.net (p3plsmtpa11-05.prod.phx3.secureserver.net [68.178.252.106]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 008F13A1154 for ; Fri, 7 Jan 2022 15:56:22 -0800 (PST) Received: from [192.168.1.7] ([75.80.148.243]) by :SMTPAUTH: with ESMTPA id 5z5pnGAFpDwxx5z5pnD6uh; Fri, 07 Jan 2022 16:56:21 -0700 X-CMAE-Analysis: v=2.4 cv=SOmH6MjH c=1 sm=1 tr=0 ts=61d8d325 a=VPU1mRQhDhA4uSX60JRRww==:117 a=VPU1mRQhDhA4uSX60JRRww==:17 a=7CQSdrXTAAAA:8 a=48vgC7mUAAAA:8 a=BXgsian9KPBbAShprPcA:9 a=QEXdDO2ut3YA:10 a=0VPePsbFh_lhO7uKDwAA:9 a=jgtYQDn9G-RZTu5B:21 a=_W_S_7VecoQA:10 a=a-qgeE7W1pNrGK8U0ZQC:22 a=w1C3t2QeGrPiZgrLijVG:22 X-SECURESERVER-ACCT: lgl@island-resort.com From: Laurence Lundblade Message-Id: <62743D24-49F4-4480-9561-F00DA513C9FF@island-resort.com> Content-Type: multipart/alternative; boundary="Apple-Mail=_8F3B30DC-3CD1-45CA-8014-F08E37D4B50E" Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.17\)) Date: Fri, 7 Jan 2022 15:56:21 -0800 In-Reply-To: <8466B6E2-C335-4173-A2A2-3CCA555D28CA@arm.com> Cc: Dave Thaler , rats , teep To: Brendan Moran References: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> <8466B6E2-C335-4173-A2A2-3CCA555D28CA@arm.com> X-Mailer: Apple Mail (2.3445.104.17) X-CMAE-Envelope: MS4xfG5Svxe0LJ1VFfJPhz1QpsZTtdScE9VJ5xubfW8YoYCNYh1nd2dNLwTcNHZFFWPaD7/DDsn4POxZXTYn5g5r3q9KWWAS68/W4gR/dIhiCPLIxG8Eea3h QLsr1m8/qlTYx7tqSMuVE+sKmxNJaWmg3507Zt6UByRv8EVDDXOuNLzgXdc3b+jqr/CUgCBrnKtHVjbnbBzlWpnKyXkhy1Z7hzhQNicjF8Xmm3hCOdoqvK5o Lud7b9mfVgfidz/EeWTL7Y1gvWPFmdgE/Kfna7s9nW5C5NnaWv6srhUNDDMHne0r Archived-At: Subject: Re: [Teep] [Rats] Class ID claim (and other HW identification) X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 07 Jan 2022 23:56:28 -0000 --Apple-Mail=_8F3B30DC-3CD1-45CA-8014-F08E37D4B50E Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 So rather than a HW Class, how about a HW IP claim? It would reuse the = same triple for identifying HW, OEM, Model, Version. It could occur = along side the HW OEM, model and version. This seems better than my = current PR and lines up better with Brendan=E2=80=99s examples and with = the reality that HW IP comes from a vendor, has models and versions. = I=E2=80=99ll write up a PR for it if I receive some positive feedback = here. The distinction between chip and device is intended to be handled by = submodules in EAT. Submodules can express arbitrarily complex = architectures and device compositions. I think it=E2=80=99s cleaner to keep the HW-identifying claims separate = from the SW-identify claims. Would really like the identification of the = Trusted OS Vendor be handled by CoSWID and friends. Trying to make some = claim suitable for identifying both SW and HW for all of attestation = seems over-ambitious. I also think it=E2=80=99s fine to define some claims better suited to = the TEE world in TEEP if we can=E2=80=99t find enough common ground = between TEEP and the very broadly applicable stuff that goes into EAT. LL Note: I find the use of the word =E2=80=9Cclass=E2=80=9D here confusing. = If I were putting TV=E2=80=99s into classes I=E2=80=99d uses classes = like smart/dumb, display type (LCD, CRT, OLED) and such that identify = characteristics of TVs independent of vendor and model. "Sony Bravia" is = not a class IMO. Nor is =E2=80=9CMicrosoft Windows=E2=80=9D (an OS the = runs on lots of HW platforms). I=E2=80=99d like to move away from the = word. > On Jan 4, 2022, at 3:06 AM, Brendan Moran = wrote: >=20 > I think devices will need to report multiple vendor/class pairs. >=20 > For example, A mobile device could potentially contain: > 1. A Mobile Device OEM Vendor ID > 2. A Silicon vendor=E2=80=99s Vendor ID > 3. An IP vendor=E2=80=99s Vendor ID >=20 > This is not an exhaustive list. >=20 > For Arm Trust Zone TEEs, I would expect to see: > 1. The Arm Vendor ID + the processor core=E2=80=99s Class ID > 2. The Trusted OS Vendor ID + the Trusted OS Class ID > 3. The Silicon vendor=E2=80=99s Vendor ID + the processor Class ID > 4. The Device OEM=E2=80=99s Vendor ID + the device Class ID >=20 > Cheers, > Brendan >=20 >> On 3 Jan 2022, at 21:00, Dave Thaler = > wrote: >>=20 >> Laurence Lundblade wrote: >>> I talked to Dave which resulted in reorientation of my understanding = of Class ID in TEEP. >>>=20 >>> Class ID basically identifies HW IP from a HW designer like Arm or = Synopsis that is integrated into chips made by various HW OEMs like = Qualcomm, Samsung and Apple. The term used frequently for this is "IP" = (I know this well from my days working on HW at Qualcomm). >>>=20 >>> I've created a PR for HW Class. >>>=20 >>> Since what is identified spans OEMs, this must be a globally unique = identifier. We need to be explicit about that.=20 >>>=20 >>> I know of four ways to have a global identifier: >>> - Use OIDs >>> - Use DNS / URI >>> - Probabilistically using a big enough byte string >>> - A new registry, perhaps IANA (but we probably don't want this) >>>=20 >>> The PR allows all but the last, but this could be reduced to just = one or two of the above. >>=20 >> PR looks great to me, except that would I agree with reducing it to = one or two. >> Since the ability to take a value and resolve it to something = meaningful is useful in many cases (logging, wireshark analysis, etc.), = I would remove the third option. >>=20 >> OIDs, encoded as int arrays, probably compress the best so if only = one, then I'd pick that one. URIs are convenient though also so if two, = then that's my second pick.=20 >>=20 >>> I don't see this claim as essential for EAT, but I committed to = working through this with TEEP. I'm fine with this PR going into a TEEP = document rather than EAT. >>=20 >> The notion of HW class ID is not specific to TEEs, hence the request = to put it in EAT rather than in anything that would imply use is limited = to TEEs (hence not in a TEEP document). >>=20 >> -Dave >>=20 >> _______________________________________________ >> TEEP mailing list >> TEEP@ietf.org >> https://www.ietf.org/mailman/listinfo/teep = > IMPORTANT NOTICE: The contents of this email and any attachments are = confidential and may also be privileged. If you are not the intended = recipient, please notify the sender immediately and do not disclose the = contents to any other person, use it for any purpose, or store or copy = the information in any medium. Thank you. --Apple-Mail=_8F3B30DC-3CD1-45CA-8014-F08E37D4B50E Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8 So = rather than a HW Class, how about a HW IP claim? It would reuse the same = triple for identifying HW, OEM, Model, Version. It could occur along = side the HW OEM, model and version. This seems better than my current PR = and lines up better with Brendan=E2=80=99s examples and with the reality = that HW IP comes from a vendor, has models and versions. I=E2=80=99ll = write up a PR for it if I receive some positive feedback here.


The distinction between chip and device is intended to be = handled by submodules in EAT. Submodules can express arbitrarily complex = architectures and device compositions.

I think it=E2=80=99s cleaner to keep = the HW-identifying claims separate from the SW-identify claims. Would = really like the identification of the Trusted OS Vendor be handled by = CoSWID and friends. Trying to make some claim suitable for identifying = both SW and HW for all of attestation seems over-ambitious.

I also think it=E2=80=99s = fine to define some claims better suited to the TEE world in TEEP if we = can=E2=80=99t find enough common ground between TEEP and the very = broadly applicable stuff that goes into EAT.

LL


Note: I find the use of the word =E2=80=9Cclass=E2=80=9D here = confusing. If I were putting TV=E2=80=99s into classes I=E2=80=99d uses = classes like smart/dumb, display type (LCD, CRT, OLED) and such that = identify characteristics of TVs independent of vendor and model. "Sony = Bravia" is not a class IMO. Nor is =E2=80=9CMicrosoft Windows=E2=80=9D = (an OS the runs on lots of HW platforms). I=E2=80=99d like to move away = from the word.



On Jan 4, 2022, at 3:06 AM, Brendan Moran = <Brendan.Moran@arm.com> wrote:

I think devices will need to report multiple vendor/class pairs.

For example, A mobile device could potentially contain:
1. A Mobile Device OEM Vendor ID
2. A Silicon vendor=E2=80=99s Vendor ID
3. An IP vendor=E2=80=99s Vendor ID

This is not an exhaustive list.

For Arm Trust Zone TEEs, I would expect to see:
1. The Arm Vendor ID + the processor core=E2=80=99s = Class ID
2. The Trusted OS Vendor ID + the Trusted OS Class = ID
3. The Silicon vendor=E2=80=99s Vendor ID + the = processor Class ID
4. The Device OEM=E2=80=99s Vendor ID + the device Class = ID

Cheers,
Brendan

On 3 Jan 2022, at 21:00, Dave Thaler <dthaler=3D40microsoft.com@dmarc.ietf.org> wrote:

Laurence Lundblade wrote:
I talked to Dave which resulted in reorientation of my understanding of = Class ID in TEEP.

Class ID basically identifies HW IP from a HW designer like Arm or = Synopsis that is integrated into chips made by various HW OEMs like = Qualcomm, Samsung and Apple. The term used frequently for this is "IP" = (I know this well from my days working on HW at Qualcomm).

I've created a PR for HW Class.

Since = what is identified spans OEMs, this must be a globally unique = identifier. We need to be explicit about that. 

I know of four ways to have a global identifier:
- Use OIDs
- Use DNS / URI
- Probabilistically using a big enough byte string
- A new registry, perhaps IANA (but we probably don't want this)

The PR allows all but the last, but this could be reduced to just one or = two of the above.

PR looks great to me, except that would I agree with reducing it to one or = two.
Since the ability to take a value and resolve it to something meaningful is = useful in many cases (logging, wireshark analysis, etc.), I would remove = the third option.

OIDs, encoded as int arrays, probably compress the best so if only one, then = I'd pick that one.  URIs are convenient though also so if two, then = that's my second pick. 

I don't see this claim as essential for EAT, but I committed to working = through this with TEEP. I'm fine with this PR going into a TEEP document = rather than EAT.

The notion of HW class ID is not specific to TEEs, hence the request to put = it in EAT rather than in anything that would imply use is limited to = TEEs (hence not in a TEEP document).

-Dave
_______________________________________________
TEEP mailing list
TEEP@ietf.org
https://www.ietf.org/mailman/listinfo/teep

IMPORTANT NOTICE: The contents of this email and any attachments are = confidential and may also be privileged. If you are not the intended = recipient, please notify the sender immediately and do not disclose the = contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.

= --Apple-Mail=_8F3B30DC-3CD1-45CA-8014-F08E37D4B50E-- From nobody Fri Jan 7 16:07:32 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6D8533A117D; Fri, 7 Jan 2022 16:07:26 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.576 X-Spam-Level: X-Spam-Status: No, score=-2.576 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.576, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id D_5UV_BBXGDL; Fri, 7 Jan 2022 16:07:21 -0800 (PST) Received: from na01-obe.outbound.protection.outlook.com (mail-cusazon11020014.outbound.protection.outlook.com [52.101.61.14]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9398E3A1176; Fri, 7 Jan 2022 16:07:21 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kW1qqpfH00+Un2J/E2nFKD3c+CSYILCKb4G7GEiAKdIWo1MhzMqUWNoa+tGkmwEnR7cC28LG1VNjMVl1WcX9PXHQfjjwUddykKdhsKECzIxFwXRLbB1B1nh8hF/7XAeG24yX6bCCkbx+ezMPwk5KNYdq7PHdixPs4nV0/njBSv0VzL2z4FYGlo3/PR0y4CVN+TBBBFsIEZLpnB2LhsUXoXmPaE3SuOBjcRfcps0cZIoMWo7dZ5PoQgAeXqtZmWLBBdb0c2H461qkDQ1YOs7n5SU9dLbgAFPmgGCAhIKRfwr6XRV/C5yyA75hCbP/d96RLwRnScz7sQLUPamrxfsDtA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=vubNQssbGB7Ml3kGxJVYcPIwA/9ObIkoLme2AjJlCKA=; b=UXNiwo5cDXf8IfwPqFRTVwGB/fgsKviZ6oCMgeONXUWSldhTrdrKCIp9Z9NY7WWNCXBxNTNC6or33/ahcWZCKAgufYZGFRduJN9kPsz0r2DEDOnHwBB137f0GV3EgFgvhC1dTOlUrXr8Q89qvyCFguM8Xa3/a/7IML7ltBfsbL0wrfNd8cJgsXbfDc5Kq3Vt/xSqA0YmXehE9HjHjuCjIuTVqEqX7XyC7uUEnr71BJaEDvgqMJ3DVVldDcYeu1qmKDeUOBAdfszg9uSDc3ab/PNW+wYmsutktlI7TjeseExbMzjha0Q9qyvK1m4VZlCp6gjUCItGZOOMdZSrDmN8sQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=microsoft.com; dmarc=pass action=none header.from=microsoft.com; dkim=pass header.d=microsoft.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=vubNQssbGB7Ml3kGxJVYcPIwA/9ObIkoLme2AjJlCKA=; b=E0XaQqkbAIfhX4mhHEHkZQzYAw6Kgi2Kn4klzwwiHKVqBArtzBdKICWctoOEzUWeAPrGCrcllLZ2uSSqaCzuD8ixk+q6nDgWvEELBxXU+8HmFq897DYWzegrIu7YMtrJyNpi4WAk+MxZ4Lv0O+XFxHyBFUiM8nIQ6FB3Ykvx1V0= Received: from CH2PR21MB1464.namprd21.prod.outlook.com (2603:10b6:610:89::16) by MW2PR2101MB1066.namprd21.prod.outlook.com (2603:10b6:302:a::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4888.7; Sat, 8 Jan 2022 00:07:17 +0000 Received: from CH2PR21MB1464.namprd21.prod.outlook.com ([fe80::69de:5ae:316f:e65a]) by CH2PR21MB1464.namprd21.prod.outlook.com ([fe80::69de:5ae:316f:e65a%8]) with mapi id 15.20.4867.003; Sat, 8 Jan 2022 00:07:17 +0000 From: Dave Thaler To: Laurence Lundblade , Brendan Moran CC: Dave Thaler , teep , rats Thread-Topic: [Teep] [Rats] Class ID claim (and other HW identification) Thread-Index: AQHYAONYo5cG5GYq702OBNSj33pYiqxRxWvggADvIICABY4EgIAAApXA Date: Sat, 8 Jan 2022 00:07:17 +0000 Message-ID: References: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> <8466B6E2-C335-4173-A2A2-3CCA555D28CA@arm.com> <62743D24-49F4-4480-9561-F00DA513C9FF@island-resort.com> In-Reply-To: <62743D24-49F4-4480-9561-F00DA513C9FF@island-resort.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=d4f34548-80f5-4750-bbc1-dc5e8710a500; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2022-01-08T00:05:34Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 15673337-df3c-4a4c-ccb4-08d9d23ad530 x-ms-traffictypediagnostic: MW2PR2101MB1066:EE_ x-ms-exchange-atpmessageproperties: SA|SL x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:6430; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH2PR21MB1464.namprd21.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(76116006)(110136005)(316002)(122000001)(38100700002)(508600001)(66574015)(54906003)(66446008)(52536014)(64756008)(4326008)(66556008)(66946007)(8936002)(66476007)(8676002)(7696005)(53546011)(82950400001)(71200400001)(6506007)(966005)(10290500003)(82960400001)(55016003)(33656002)(38070700005)(2906002)(5660300002)(186003)(9686003)(166002)(86362001)(8990500004)(83380400001)(20210929001); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?hRMDuWiUcEL50p2EIeztASs3b8NTscW3x3ricw0PUzT4DJRhSavVQ2Kq5BXN?= =?us-ascii?Q?N39gF+vtZOXP5fPKg/F5tUWvQsXjDMbKV3rq8yQTVu8FX3xxqW6dU93M5mGO?= =?us-ascii?Q?lzzRGaN7ARmVb4yk0U3mzq8WyYKku+/uiZhUQrNYay1rlZ/LFeQOGmRm8Sfj?= =?us-ascii?Q?ZJme3mUiBrbCVnqi5H7m5JmziTf96T0xNsWI65FgfAp2s2vV6lnNyLkkG1y6?= =?us-ascii?Q?adDRj+LeAjM8dTVVr4kUv3SdO397JX5CI1z5mGVSGbre7ejJm6Nm7uOME2pQ?= =?us-ascii?Q?XM8XV3COotFJQP2jbg2a3ZspoKaEfsKFFVBmKmCaOU6vhPioxmmpt+zAlbue?= =?us-ascii?Q?VjVsRCc83FhbNOOO70NyWNyA4eSfGU4EWlWbR/EBmz6jvPxl/mRTrNyZbspx?= =?us-ascii?Q?WzVD7tnn5b5D/V4lkzuF9eQO25D0bjrGka1xhS5ziJcd19UE1mo9oBVKPWYy?= =?us-ascii?Q?SxPlQ3w13o346Zb+2wSw7t9gxHWf4GL4L1wuGxBKLsXyKrnq+h98Jm5QBrVu?= =?us-ascii?Q?QsbMsDhjwFJB8189cW8C5acl6G1proT1TaJ6OiFaBsbsJ/Et+mluIXplsjr1?= =?us-ascii?Q?xDGKcBeN48jSmkUkMjW4HAdmeqz0JJzo0igvTAdSotp/61thLDAp6a07UA4D?= =?us-ascii?Q?R0b3/Wc6nwfozYKCsZZKcvA2Lqj5PHvLjh4TRBDBpa8/ltG5p7vHo2HIcSvo?= =?us-ascii?Q?FU8b5RxT5w71YXyUfDzDWimoSOh+b6SjFBykXmKiKiLjce4HIVuaR2GZTYQn?= =?us-ascii?Q?D5PYKcg+6OEfjGJkQGkA31xsnNO4t8TfE77yA5ZyuBADxhV1khUVJRWE1/BT?= =?us-ascii?Q?uk5BYgmJA8cS3qJGhmIe/UAo2YN7wz3ECJqrDUSVm5gh8e0XCWVGSaWNdqCT?= =?us-ascii?Q?databf3FKsEtQu97IDEfJZzDjpyIiRuZjUQNMVhpmrDlEQACRZJEQDVwoRvE?= =?us-ascii?Q?pG8Xl5IG9IXQ4+0+3sVJbBJgPRGS52X2XHuu7pn3Fu6/vhwIrlpDyWDPER/l?= =?us-ascii?Q?Jii2Oxrtm1XlhOgcERsSrkXnCNeU4S8kJCUW9ZEcXunpzwJwm6b+lWlB3H5z?= =?us-ascii?Q?chuS0KpYBEke0GZ0JwNoMLuXClCDb7f16XQz8yyOrKu+o08R0P8AC7IBw12Q?= =?us-ascii?Q?RDLpncsXo6UYjLzEERbxmFDQuUjDC15NZWNjGspsAxe2jJRYLXQH+xIjAXfV?= =?us-ascii?Q?dW5GZBIiRvbWksdUq6LcAlcvBqJ9iiV8NwKSNgYjqYreG6A9VV6IqEvC5Cik?= =?us-ascii?Q?VNKIoJVLpD+wF/I2JCXhUE8y+ZbJ1k91tJCK8q0/xyAN2wRiyjoi2Ge6aKB+?= =?us-ascii?Q?byH0YqMdlMrk+KZdlwxUM8OaoX8QDBDV1w4rfjy5YLoplLFbMDyGo4JnZESv?= =?us-ascii?Q?TNdGKT1tG3K1sr5MTwcmgklHW9Og258LxOEJQ2HvhqaVdLXlZ8ADA2GUSQGd?= =?us-ascii?Q?sJF4Qts3bptVhR0xVnNefE1Uk36FOzNxrTkmT6ltQAmTaV+8cVxuDcdHxs/4?= =?us-ascii?Q?qU5ZM1flgc3El/KNndTAefUD1H9DE1t6zFiHmHomWdDV07Ace+qAYWQGY2wc?= =?us-ascii?Q?LkAObM+Ec1A8vWxGR4Jx3H/WZvyb4fVPdHUbT/buXjOojQV69uABTBt77RDB?= =?us-ascii?Q?Tp+c1AWfoTKtDtc3Pk67K+tlrLdT7OIfeudTejJgl5oCf7tEZYtz2CVo0UR2?= =?us-ascii?Q?XefgN6ftrRjEPN9IGqPUNrf/bv/GVxfSpmWxsrfwiCptQ9Yom2wC099frnM5?= =?us-ascii?Q?K4TVWSdOLA=3D=3D?= Content-Type: multipart/alternative; boundary="_000_CH2PR21MB146474664006422CAB07D956A34E9CH2PR21MB1464namp_" MIME-Version: 1.0 X-OriginatorOrg: microsoft.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CH2PR21MB1464.namprd21.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 15673337-df3c-4a4c-ccb4-08d9d23ad530 X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Jan 2022 00:07:17.5167 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: BTPFuyr1lYzgQeXYn33UczAQUwLNmMyChHjH8eBKk4YDKA3CbU4QiUztYrAJ8pBNRfyHxMpZndrFzgDedOWdRuTZI/gc2/Sx33wvxEWEYd0= X-MS-Exchange-Transport-CrossTenantHeadersStamped: MW2PR2101MB1066 Archived-At: Subject: Re: [Teep] [Rats] Class ID claim (and other HW identification) X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 08 Jan 2022 00:07:27 -0000 --_000_CH2PR21MB146474664006422CAB07D956A34E9CH2PR21MB1464namp_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable "IP" (as in Intellectual Property, not Internet Protocol) is not the right = term in my view since that implies there actually is some IP as opposed to = (say) conformance to a standard. I am fine with "Class" as you had it in t= he PR, but I think "IP" is too narrow in implication. Dave From: TEEP On Behalf Of Laurence Lundblade Sent: Friday, January 7, 2022 3:56 PM To: Brendan Moran Cc: Dave Thaler ; teep ; rats Subject: Re: [Teep] [Rats] Class ID claim (and other HW identification) So rather than a HW Class, how about a HW IP claim? It would reuse the same= triple for identifying HW, OEM, Model, Version. It could occur along side = the HW OEM, model and version. This seems better than my current PR and lin= es up better with Brendan's examples and with the reality that HW IP comes = from a vendor, has models and versions. I'll write up a PR for it if I rece= ive some positive feedback here. The distinction between chip and device is intended to be handled by submod= ules in EAT. Submodules can express arbitrarily complex architectures and d= evice compositions. I think it's cleaner to keep the HW-identifying claims separate from the SW= -identify claims. Would really like the identification of the Trusted OS Ve= ndor be handled by CoSWID and friends. Trying to make some claim suitable f= or identifying both SW and HW for all of attestation seems over-ambitious. I also think it's fine to define some claims better suited to the TEE world= in TEEP if we can't find enough common ground between TEEP and the very br= oadly applicable stuff that goes into EAT. LL Note: I find the use of the word "class" here confusing. If I were putting = TV's into classes I'd uses classes like smart/dumb, display type (LCD, CRT,= OLED) and such that identify characteristics of TVs independent of vendor = and model. "Sony Bravia" is not a class IMO. Nor is "Microsoft Windows" (an= OS the runs on lots of HW platforms). I'd like to move away from the word. On Jan 4, 2022, at 3:06 AM, Brendan Moran > wrote: I think devices will need to report multiple vendor/class pairs. For example, A mobile device could potentially contain: 1. A Mobile Device OEM Vendor ID 2. A Silicon vendor's Vendor ID 3. An IP vendor's Vendor ID This is not an exhaustive list. For Arm Trust Zone TEEs, I would expect to see: 1. The Arm Vendor ID + the processor core's Class ID 2. The Trusted OS Vendor ID + the Trusted OS Class ID 3. The Silicon vendor's Vendor ID + the processor Class ID 4. The Device OEM's Vendor ID + the device Class ID Cheers, Brendan On 3 Jan 2022, at 21:00, Dave Thaler > wrote: Laurence Lundblade wrote: I talked to Dave which resulted in reorientation of my understanding of Cla= ss ID in TEEP. Class ID basically identifies HW IP from a HW designer like Arm or Synopsis= that is integrated into chips made by various HW OEMs like Qualcomm, Samsu= ng and Apple. The term used frequently for this is "IP" (I know this well f= rom my days working on HW at Qualcomm). I've created a PR for HW Class. Since what is identified spans OEMs, this must be a globally unique identif= ier. We need to be explicit about that. I know of four ways to have a global identifier: - Use OIDs - Use DNS / URI - Probabilistically using a big enough byte string - A new registry, perhaps IANA (but we probably don't want this) The PR allows all but the last, but this could be reduced to just one or tw= o of the above. PR looks great to me, except that would I agree with reducing it to one or = two. Since the ability to take a value and resolve it to something meaningful is= useful in many cases (logging, wireshark analysis, etc.), I would remove t= he third option. OIDs, encoded as int arrays, probably compress the best so if only one, the= n I'd pick that one. URIs are convenient though also so if two, then that'= s my second pick. I don't see this claim as essential for EAT, but I committed to working thr= ough this with TEEP. I'm fine with this PR going into a TEEP document rathe= r than EAT. The notion of HW class ID is not specific to TEEs, hence the request to put= it in EAT rather than in anything that would imply use is limited to TEEs = (hence not in a TEEP document). -Dave _______________________________________________ TEEP mailing list TEEP@ietf.org https://www.ietf.org/mailman/listinfo/teep IMPORTANT NOTICE: The contents of this email and any attachments are confid= ential and may also be privileged. If you are not the intended recipient, p= lease notify the sender immediately and do not disclose the contents to any= other person, use it for any purpose, or store or copy the information in = any medium. Thank you. --_000_CH2PR21MB146474664006422CAB07D956A34E9CH2PR21MB1464namp_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

“IP” (as in Intellectual Property, not I= nternet Protocol) is not the right term in my view since that implies there= actually is some IP as opposed to (say) conformance to a standard.  I= am fine with “Class” as you had it in the PR, but I think “IP” is too narrow in implication.

 

Dave

 

From: TEEP <teep-bounces@ietf.org> O= n Behalf Of Laurence Lundblade
Sent: Friday, January 7, 2022 3:56 PM
To: Brendan Moran <Brendan.Moran@arm.com>
Cc: Dave Thaler <dthaler=3D40microsoft.com@dmarc.ietf.org>; te= ep <teep@ietf.org>; rats <rats@ietf.org>
Subject: Re: [Teep] [Rats] Class ID claim (and other HW identificati= on)

 

So rather than a HW Class, how about a HW IP claim? = It would reuse the same triple for identifying HW, OEM, Model, Version. It = could occur along side the HW OEM, model and version. This seems better tha= n my current PR and lines up better with Brendan’s examples and with the reality that HW IP comes from a= vendor, has models and versions. I’ll write up a PR for it if I rece= ive some positive feedback here.

 

 

The distinction between chip and device is intended = to be handled by submodules in EAT. Submodules can express arbitrarily comp= lex architectures and device compositions.

 

I think it’s cleaner to keep the HW-identifyin= g claims separate from the SW-identify claims. Would really like the identi= fication of the Trusted OS Vendor be handled by CoSWID and friends. Trying = to make some claim suitable for identifying both SW and HW for all of attestation seems over-ambitious.

 

I also think it’s fine to define some claims b= etter suited to the TEE world in TEEP if we can’t find enough common = ground between TEEP and the very broadly applicable stuff that goes into EA= T.

 

LL

 

 

Note: I find the use of the word “class”= here confusing. If I were putting TV’s into classes I’d uses c= lasses like smart/dumb, display type (LCD, CRT, OLED) and such that identif= y characteristics of TVs independent of vendor and model. "Sony Bravia" is not a class IMO. Nor is “Microsoft Window= s” (an OS the runs on lots of HW platforms). I’d like to move a= way from the word.

 

 



On Jan 4, 2022, at 3:06 AM, Brendan Moran <Brendan.Moran@arm.com> wrote:

 

I think devices will need to report multiple vendor/= class pairs.

 

For example, A mobile device could potentially conta= in:

1. A Mobile Device OEM Vendor ID

2. A Silicon vendor’s Vendor ID

3. An IP vendor’s Vendor ID

 

This is not an exhaustive list.

 

For Arm Trust Zone TEEs, I would expect to see:=

1. The Arm Vendor ID + the processor core’s Cl= ass ID

2. The Trusted OS Vendor ID + the Trusted OS Class I= D

3. The Silicon vendor’s Vendor ID + the proces= sor Class ID

4. The Device OEM’s Vendor ID + the device Cla= ss ID

 

Cheers,

Brendan



On 3 Jan 2022, at 21:00, Dave Thaler <dthaler=3D40microsoft.com@= dmarc.ietf.org> wrote:

 

Laurence Lundblade wrote:

I talked to Dave which resulted in reorientation o= f my understanding of Class ID in TEEP.

Class ID basically identifies HW IP from a HW designer like Arm or Synopsis= that is integrated into chips made by various HW OEMs like Qualcomm, Samsu= ng and Apple. The term used frequently for this is "IP" (I know t= his well from my days working on HW at Qualcomm).

I've created a PR for HW Class.

Since what is identified spans OEMs, this must be a globally unique identif= ier. We need to be explicit about that. 

I know of four ways to have a global identifier:
- Use OIDs
- Use DNS / URI
- Probabilistically using a big enough byte string
- A new registry, perhaps IANA (but we probably don't want this)

The PR allows all but the last, but this could be reduced to just one or tw= o of the above.


PR looks great to me, except that would I agree with reducing it to one or = two.
Since the ability to take a value and resolve it to something meaningful is= useful in many cases (logging, wireshark analysis, etc.), I would remove t= he third option.

OIDs, encoded as int arrays, probably compress the best so if only one, the= n I'd pick that one.  URIs are convenient though also so if two, then = that's my second pick. 

I don't see this claim as essential for EAT, but I= committed to working through this with TEEP. I'm fine with this PR going i= nto a TEEP document rather than EAT.


The notion of HW class ID is not specific to TEEs, hence the request to put= it in EAT rather than in anything that would imply use is limited to TEEs = (hence not in a TEEP document).

-Dave

_______________________________________________
TEEP mailing list
TEEP@ietf.org
ht= tps://www.ietf.org/mailman/listinfo/teep

 

IMPORTANT NOTICE: The contents of this email and any= attachments are confidential and may also be privileged. If you are not th= e intended recipient, please notify the sender immediately and do not discl= ose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Th= ank you.

 

--_000_CH2PR21MB146474664006422CAB07D956A34E9CH2PR21MB1464namp_-- From nobody Sat Jan 8 11:41:48 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4C8C63A0975 for ; Sat, 8 Jan 2022 11:41:46 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.799 X-Spam-Level: X-Spam-Status: No, score=-1.799 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NpQrAnfIbVv2 for ; Sat, 8 Jan 2022 11:41:41 -0800 (PST) Received: from p3plsmtpa12-09.prod.phx3.secureserver.net (p3plsmtpa12-09.prod.phx3.secureserver.net [68.178.252.238]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 82B003A096E for ; Sat, 8 Jan 2022 11:41:41 -0800 (PST) Received: from [192.168.1.7] ([75.80.148.243]) by :SMTPAUTH: with ESMTPA id 6Hatnc6WJSZ9g6HaunpV3P; Sat, 08 Jan 2022 12:41:40 -0700 X-CMAE-Analysis: v=2.4 cv=Pq5W0yA3 c=1 sm=1 tr=0 ts=61d9e8f4 a=VPU1mRQhDhA4uSX60JRRww==:117 a=VPU1mRQhDhA4uSX60JRRww==:17 a=jIQo8A4GAAAA:8 a=7CQSdrXTAAAA:8 a=8pif782wAAAA:8 a=OQsHCBUEAAAA:8 a=yMhMjlubAAAA:8 a=48vgC7mUAAAA:8 a=UqCG9HQmAAAA:8 a=bA_6NbKNi0Y2GvQtqbgA:9 a=QEXdDO2ut3YA:10 a=qf5j8Xw-Z7kA:10 a=uinoapfH_D4A:10 a=5vkTe6xVLTa1Au2yheIA:9 a=zxKlITUc_Tfv73Jg:21 a=_W_S_7VecoQA:10 a=Lf5xNeLK5dgiOs8hzIjU:22 a=a-qgeE7W1pNrGK8U0ZQC:22 a=4On3NvLLrbDfrzqrZumW:22 a=w1C3t2QeGrPiZgrLijVG:22 X-SECURESERVER-ACCT: lgl@island-resort.com From: Laurence Lundblade Message-Id: <825C5FD3-729A-4612-B60A-8DB44AF069BC@island-resort.com> Content-Type: multipart/alternative; boundary="Apple-Mail=_D2C894A8-3DF0-4008-BDC3-06AEF54B7D30" Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.17\)) Date: Sat, 8 Jan 2022 11:41:39 -0800 In-Reply-To: Cc: Brendan Moran , Dave Thaler , teep , rats To: Dave Thaler References: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> <8466B6E2-C335-4173-A2A2-3CCA555D28CA@arm.com> <62743D24-49F4-4480-9561-F00DA513C9FF@island-resort.com> X-Mailer: Apple Mail (2.3445.104.17) X-CMAE-Envelope: MS4xfPBwZwZLGmMmzzmb78GV3lnt0yfJSDNE7hoipJjUgl4wtMCp5SeKgfzFz59m/ampWx5Mc+nvod4fsviatyHAnTcub8gM/p86Hu08LS8EvQVXPAg81mL5 SwYpkWajip5bBdKE8kkzbjf06gg91PP2B5x+dFHwae3jJfjYkDUNx5DnLWYZND2xNssW6zWBx4y4OxNZEIWRr3a8Sgr86xn4MwRRm7lSM6YzVWdZT+pNTis3 BUCpyH4p6RdEhlBHjChDdptWctkjZ/OMVKz/0+JMiiVuqWcAk36RCp1OrdrnW3IRve799MyEMFT4HkyCtHMV6yGvUYoTZiQiWnKNHIBssyw= Archived-At: Subject: Re: [Teep] [Rats] Class ID claim (and other HW identification) X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 08 Jan 2022 19:41:46 -0000 --Apple-Mail=_D2C894A8-3DF0-4008-BDC3-06AEF54B7D30 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 Yeah, I was confused by the use of =E2=80=9CIP" when I first heard it = after joining the HW team at Qualcomm, but it is the phrase that is used = by the HW industry: https://www.synopsys.com/designware-ip.html https://www.arm.com/products/silicon-ip-security https://en.wikipedia.org/wiki/Semiconductor_intellectual_property_core https://www.imaginationtech.com/products/ =E2=80=9CIP=E2=80=9D is even in the URL=E2=80=99s. How about one of these? =E2=80=9CSilicon IP ID=E2=80=9D =E2=80=9CHW Design IP ID=E2=80=9D =E2=80=9CSemiconductor IP ID" We can add a sentence or two that gives some context for people that = haven=E2=80=99t run into this. More important than the name, I=E2=80=99d like to make the claim: a map or array that must contain an OEM ID of the vendor of the IP may contain a model indicator may contain a version I think this lines up with what Brendon suggests is needed and makes = more sense to me because it describes the very common convention of = identifying physically built things (cars, chips, refrigerators...). LL > On Jan 7, 2022, at 4:07 PM, Dave Thaler wrote: >=20 > =E2=80=9CIP=E2=80=9D (as in Intellectual Property, not Internet = Protocol) is not the right term in my view since that implies there = actually is some IP as opposed to (say) conformance to a standard. I am = fine with =E2=80=9CClass=E2=80=9D as you had it in the PR, but I think = =E2=80=9CIP=E2=80=9D is too narrow in implication. > =20 > Dave > =20 > From: TEEP On Behalf Of Laurence Lundblade > Sent: Friday, January 7, 2022 3:56 PM > To: Brendan Moran > Cc: Dave Thaler ; teep = ; rats > Subject: Re: [Teep] [Rats] Class ID claim (and other HW = identification) > =20 > So rather than a HW Class, how about a HW IP claim? It would reuse the = same triple for identifying HW, OEM, Model, Version. It could occur = along side the HW OEM, model and version. This seems better than my = current PR and lines up better with Brendan=E2=80=99s examples and with = the reality that HW IP comes from a vendor, has models and versions. = I=E2=80=99ll write up a PR for it if I receive some positive feedback = here. > =20 > =20 > The distinction between chip and device is intended to be handled by = submodules in EAT. Submodules can express arbitrarily complex = architectures and device compositions. > =20 > I think it=E2=80=99s cleaner to keep the HW-identifying claims = separate from the SW-identify claims. Would really like the = identification of the Trusted OS Vendor be handled by CoSWID and = friends. Trying to make some claim suitable for identifying both SW and = HW for all of attestation seems over-ambitious. > =20 > I also think it=E2=80=99s fine to define some claims better suited to = the TEE world in TEEP if we can=E2=80=99t find enough common ground = between TEEP and the very broadly applicable stuff that goes into EAT. > =20 > LL > =20 > =20 > Note: I find the use of the word =E2=80=9Cclass=E2=80=9D here = confusing. If I were putting TV=E2=80=99s into classes I=E2=80=99d uses = classes like smart/dumb, display type (LCD, CRT, OLED) and such that = identify characteristics of TVs independent of vendor and model. "Sony = Bravia" is not a class IMO. Nor is =E2=80=9CMicrosoft Windows=E2=80=9D = (an OS the runs on lots of HW platforms). I=E2=80=99d like to move away = from the word. > =20 > =20 >=20 >=20 > On Jan 4, 2022, at 3:06 AM, Brendan Moran > wrote: > =20 > I think devices will need to report multiple vendor/class pairs. > =20 > For example, A mobile device could potentially contain:=20 > 1. A Mobile Device OEM Vendor ID > 2. A Silicon vendor=E2=80=99s Vendor ID > 3. An IP vendor=E2=80=99s Vendor ID > =20 > This is not an exhaustive list. > =20 > For Arm Trust Zone TEEs, I would expect to see: > 1. The Arm Vendor ID + the processor core=E2=80=99s Class ID > 2. The Trusted OS Vendor ID + the Trusted OS Class ID > 3. The Silicon vendor=E2=80=99s Vendor ID + the processor Class ID > 4. The Device OEM=E2=80=99s Vendor ID + the device Class ID > =20 > Cheers, > Brendan >=20 >=20 > On 3 Jan 2022, at 21:00, Dave Thaler = > wrote: > =20 > Laurence Lundblade wrote: >=20 > I talked to Dave which resulted in reorientation of my understanding = of Class ID in TEEP. >=20 > Class ID basically identifies HW IP from a HW designer like Arm or = Synopsis that is integrated into chips made by various HW OEMs like = Qualcomm, Samsung and Apple. The term used frequently for this is "IP" = (I know this well from my days working on HW at Qualcomm). >=20 > I've created a PR for HW Class. >=20 > Since what is identified spans OEMs, this must be a globally unique = identifier. We need to be explicit about that.=20 >=20 > I know of four ways to have a global identifier: > - Use OIDs > - Use DNS / URI > - Probabilistically using a big enough byte string > - A new registry, perhaps IANA (but we probably don't want this) >=20 > The PR allows all but the last, but this could be reduced to just one = or two of the above. >=20 > PR looks great to me, except that would I agree with reducing it to = one or two. > Since the ability to take a value and resolve it to something = meaningful is useful in many cases (logging, wireshark analysis, etc.), = I would remove the third option. >=20 > OIDs, encoded as int arrays, probably compress the best so if only = one, then I'd pick that one. URIs are convenient though also so if two, = then that's my second pick.=20 >=20 >=20 > I don't see this claim as essential for EAT, but I committed to = working through this with TEEP. I'm fine with this PR going into a TEEP = document rather than EAT. >=20 > The notion of HW class ID is not specific to TEEs, hence the request = to put it in EAT rather than in anything that would imply use is limited = to TEEs (hence not in a TEEP document). >=20 > -Dave >=20 > _______________________________________________ > TEEP mailing list > TEEP@ietf.org > https://www.ietf.org/mailman/listinfo/teep = > =20 > IMPORTANT NOTICE: The contents of this email and any attachments are = confidential and may also be privileged. If you are not the intended = recipient, please notify the sender immediately and do not disclose the = contents to any other person, use it for any purpose, or store or copy = the information in any medium. Thank you. --Apple-Mail=_D2C894A8-3DF0-4008-BDC3-06AEF54B7D30 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8
Yeah, I was confused by the use of =E2=80=9CIP" when I first = heard it after joining the HW team at Qualcomm, but it is the phrase = that is used by the HW industry:


=E2=80=9CIP=E2=80=9D= is even in the URL=E2=80=99s.

How about one of these?
   =E2=80=9CSilicon IP ID=E2=80=9D
   =E2=80=9CHW Design IP ID=E2=80=9D
   =E2=80=9CSemiconductor IP ID"

We can add a sentence or = two that gives some context for people that haven=E2=80=99t run into = this.


More important than the name, I=E2=80=99d= like to make the claim:
   a map or array that
      must = contain an OEM ID of the vendor of the IP
      may = contain a model indicator
      may contain a = version

I= think this lines up with what Brendon suggests is needed and makes more = sense to me because it describes the very common convention of = identifying physically built things (cars, chips, = refrigerators...).

LL



On Jan = 7, 2022, at 4:07 PM, Dave Thaler <dthaler@microsoft.com> wrote:

=E2=80=9CIP=E2=80=9D (as = in Intellectual Property, not Internet Protocol) is not the right term = in my view since that implies there actually is some IP as opposed to = (say) conformance to a standard.  I am fine with =E2=80=9CClass=E2=80= =9D as you had it in the PR, but I think =E2=80=9CIP=E2=80=9D is too = narrow in implication.
 
Dave
 
From: TEEP <teep-bounces@ietf.org> On Behalf = Of Laurence = Lundblade
Sent: Friday, January 7, 2022 = 3:56 PM
To: Brendan Moran <Brendan.Moran@arm.com>
Cc: Dave = Thaler <dthaler=3D40microsoft.com@dmarc.ietf.org>; teep <teep@ietf.org>; rats = <rats@ietf.org>
Subject: Re: [Teep] [Rats] Class ID = claim (and other HW identification)
 
So rather than a HW Class, = how about a HW IP claim? It would reuse the same triple for identifying = HW, OEM, Model, Version. It could occur along side the HW OEM, model and = version. This seems better than my current PR and lines up better with = Brendan=E2=80=99s examples and with the reality that HW IP comes from a = vendor, has models and versions. I=E2=80=99ll write up a PR for it if I = receive some positive feedback here.
 
 
The = distinction between chip and device is intended to be handled by = submodules in EAT. Submodules can express arbitrarily complex = architectures and device compositions.
 
I = think it=E2=80=99s cleaner to keep the HW-identifying claims separate = from the SW-identify claims. Would really like the identification of the = Trusted OS Vendor be handled by CoSWID and friends. Trying to make some = claim suitable for identifying both SW and HW for all of attestation = seems over-ambitious.
 
I = also think it=E2=80=99s fine to define some claims better suited to the = TEE world in TEEP if we can=E2=80=99t find enough common ground between = TEEP and the very broadly applicable stuff that goes into EAT.
 
LL
 
 
Note: = I find the use of the word =E2=80=9Cclass=E2=80=9D here confusing. If I = were putting TV=E2=80=99s into classes I=E2=80=99d uses classes like = smart/dumb, display type (LCD, CRT, OLED) and such that identify = characteristics of TVs independent of vendor and model. "Sony Bravia" is = not a class IMO. Nor is =E2=80=9CMicrosoft Windows=E2=80=9D (an OS the = runs on lots of HW platforms). I=E2=80=99d like to move away from the = word.
 
 


On = Jan 4, 2022, at 3:06 AM, Brendan Moran <Brendan.Moran@arm.com> = wrote:
 
I think devices will need to report multiple = vendor/class pairs.
 
For example, A mobile device could = potentially contain: 
1. A = Mobile Device OEM Vendor ID
2. A Silicon vendor=E2=80=99s Vendor = ID
3. = An IP vendor=E2=80=99s Vendor ID
 
This = is not an exhaustive list.
 
For = Arm Trust Zone TEEs, I would expect to see:
1. The = Arm Vendor ID + the processor core=E2=80=99s Class ID
2. The = Trusted OS Vendor ID + the Trusted OS Class ID
3. The = Silicon vendor=E2=80=99s Vendor ID + the processor Class ID
4. The = Device OEM=E2=80=99s Vendor ID + the device Class ID
 
Cheers,
Brendan


On = 3 Jan 2022, at 21:00, Dave Thaler <dthaler=3D40microsoft.com@dmarc.ietf.org> wrote:
 
Laurence Lundblade wrote:

I talked to Dave which resulted in = reorientation of my understanding of Class ID in TEEP.

Class ID basically identifies HW IP from a HW designer like = Arm or Synopsis that is integrated into chips made by various HW OEMs = like Qualcomm, Samsung and Apple. The term used frequently for this is = "IP" (I know this well from my days working on HW at Qualcomm).

I've created a PR for HW Class.

Since what is identified spans OEMs, this must = be a globally unique identifier. We need to be explicit about that. 

I know of four ways to have a global identifier:
- Use OIDs
- Use DNS / URI
- = Probabilistically using a big enough byte string
- A new = registry, perhaps IANA (but we probably don't want this)
The PR allows all but the last, but this could be reduced to = just one or two of the above.

PR looks great to me, except that would I = agree with reducing it to one or two.
Since the ability to = take a value and resolve it to something meaningful is useful in many = cases (logging, wireshark analysis, etc.), I would remove the third = option.

OIDs, encoded as int arrays, = probably compress the best so if only one, then I'd pick that one. =  URIs are convenient though also so if two, then that's my second = pick. 

I don't see this claim as essential = for EAT, but I committed to working through this with TEEP. I'm fine = with this PR going into a TEEP document rather than EAT.

The notion of HW class ID is not specific to = TEEs, hence the request to put it in EAT rather than in anything that = would imply use is limited to TEEs (hence not in a TEEP document).

-Dave

_______________________________________________
TEEP mailing list
TEEP@ietf.org
https://www.ietf.org/mailman/listinfo/teep
 
IMPORTANT = NOTICE: The contents of this email and any attachments are confidential = and may also be privileged. If you are not the intended recipient, = please notify the sender immediately and do not disclose the contents to = any other person, use it for any purpose, or store or copy the = information in any medium. Thank = you.

= --Apple-Mail=_D2C894A8-3DF0-4008-BDC3-06AEF54B7D30-- From nobody Sat Jan 8 12:16:13 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3641A3A0AC1; Sat, 8 Jan 2022 12:16:03 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.899 X-Spam-Level: X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=qti.qualcomm.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id icuYGnwjJHZV; Sat, 8 Jan 2022 12:15:57 -0800 (PST) Received: from esa.hc3962-90.iphmx.com (esa.hc3962-90.iphmx.com [216.71.140.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1F0FD3A0ABC; Sat, 8 Jan 2022 12:15:56 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=qti.qualcomm.com; i=@qti.qualcomm.com; q=dns/txt; s=qccesdkim1; t=1641672956; x=1642277756; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=toa8vaLbxQekan4ILfewT2vlqGmQc/d0Yf56M6FimIE=; b=aJqyw2Fmxb3RkfczX1PfxM3s/4hH1gEz7NCSXrweApPvadyUQ0+LKIRh /mBNBN4JyELpGFcJq2ndXfmJ+shiM5mkcc651Pz+vE0UXEZgfTIdKEd17 RRbWaVaCzrEcm9/Z3QAbndTm6vFDohGQces/dxRKadPN+6h2XjWw8y0Pt g=; Received: from mail-mw2nam10lp2102.outbound.protection.outlook.com (HELO NAM10-MW2-obe.outbound.protection.outlook.com) ([104.47.55.102]) by ob1.hc3962-90.iphmx.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Jan 2022 20:15:55 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=gNqDqaFpQHmYyNFH8crp0Tta9gI8LCRBoJX33nimZc79Uk7DjD6y50sDD4hvY39sKjXQ+uioW3XJdpRIDCYeE3WqASYgJDi+L/SiLweDA9cCPwrC7gW/GXvxH6SA9ZPpx+EOuIQkiedk2hIWuSR5sg5wRrLp/llrin96VkkoC6LE8qP568aXPSOQpHMjKj61G1rkR8w9JyviC1MXcfmHwRSLdzUPMz0dlYXZzt5H4AlS/I68LvjcwyQbQoFqHj7mBjBKSKscRURnF2rqFdqegG5FPJzgykCxByAEYo28lehw7h3mi8ADhvm4vVO8aqQ6JPQFZz/BXcVpstHJEFx0aA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=toa8vaLbxQekan4ILfewT2vlqGmQc/d0Yf56M6FimIE=; b=BaCWxJwbl/yera2BGAsOrwNO8l5qK6Ep5D4j9+iRQlxdZ8BEn/JI2f/N7Fk/9gEizNSJQ4+ytif/Pv/ClTm78xFsBTpl1dmrdlYdsDef0SSGm35LYpkGLw3WFOkTRpnNu2CJJli0+LlPQtNX8+SWI4fVGH2CwgoTAenpuX+Iqg9EtUis49RQdUcdkX2SexepPEyJ57yzWOvlezbdgqI36luGNzGaEsCgIA4yRjWp6T33xo2JX1SuweTXGGOq//PIcdGYJRxyZhkTv+btrfaYJF6UwsRyCq3mLFZR3/H2z3MpM6g3A1WwZl9EctIdNu6RvIo72GKizagutS6HjgNnog== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=qti.qualcomm.com; dmarc=pass action=none header.from=qti.qualcomm.com; dkim=pass header.d=qti.qualcomm.com; arc=none Received: from SJ0PR02MB8353.namprd02.prod.outlook.com (2603:10b6:a03:3e4::7) by SJ0PR02MB7311.namprd02.prod.outlook.com (2603:10b6:a03:29f::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4867.7; Sat, 8 Jan 2022 20:15:51 +0000 Received: from SJ0PR02MB8353.namprd02.prod.outlook.com ([fe80::99da:604c:9db7:e163]) by SJ0PR02MB8353.namprd02.prod.outlook.com ([fe80::99da:604c:9db7:e163%5]) with mapi id 15.20.4867.011; Sat, 8 Jan 2022 20:15:51 +0000 From: Giridhar Mandyam To: Laurence Lundblade , Dave Thaler CC: Dave Thaler , teep , Brendan Moran , rats Thread-Topic: [Rats] [Teep] Class ID claim (and other HW identification) Thread-Index: AQHYAVtDZXz39cR0XUGMpmCW9CMkj6xYQaCAgAADDoCAAUgdgIAABxRw Date: Sat, 8 Jan 2022 20:15:51 +0000 Message-ID: References: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> <8466B6E2-C335-4173-A2A2-3CCA555D28CA@arm.com> <62743D24-49F4-4480-9561-F00DA513C9FF@island-resort.com> <825C5FD3-729A-4612-B60A-8DB44AF069BC@island-resort.com> In-Reply-To: <825C5FD3-729A-4612-B60A-8DB44AF069BC@island-resort.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=qti.qualcomm.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 4193d7b2-fa18-49a6-da70-08d9d2e3aa9f x-ms-traffictypediagnostic: SJ0PR02MB7311:EE_ x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:3513; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR02MB8353.namprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(76116006)(66476007)(66946007)(33656002)(508600001)(86362001)(45080400002)(8676002)(52536014)(64756008)(83380400001)(966005)(38070700005)(186003)(66574015)(166002)(110136005)(316002)(38100700002)(21615005)(54906003)(9686003)(6506007)(8936002)(53546011)(66446008)(5660300002)(66556008)(26005)(122000001)(7696005)(4326008)(2906002)(71200400001)(55016003); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?B?cnR0NGJaL3pCbHJQSmpOcmtLVGYvMitSQk5scjJnb281Rzk5K0xYM3plblMv?= =?utf-8?B?dXU2R0dwbXNlZFlHODBLQWE1QWsrSlQwbzd5K3o2K2w2QmZPWnFZVkJzTTd1?= =?utf-8?B?b214QzJSUSs0Y1h6VnA2MktmOWZ1Sm03UjVjUEFoV2NPZkllNkUveVdPV3BS?= =?utf-8?B?L2czSVNBZ254dUxwL3k4dms3VVpVQ3lvSnhrSmIzZ2Z6a3BBdjl4MXhLZFlp?= =?utf-8?B?bjBkQ1hJKzc1YlJpOEJwRTlRbGcwUldtNjhZN05icEdCZjdBc1QzSWRYU1I0?= =?utf-8?B?bmNlTTdrTldZTm1zcXR6TGg2TzFkV2JJQzAvMkd0WVp0aDBNSnhpVVRhSkc4?= =?utf-8?B?NWczUmZ1OFlocVhlc2VtZlUrU2VoVm14QkZsRUNDVTNnVkNLalVLMkQyOGlv?= =?utf-8?B?dHV5bnZDeTcwc29oYzdIakN2d3p3YnNtalVJNTBGOElwMEd2cUlaN0k0S3Nk?= =?utf-8?B?UnprWEdpTlJIZlViMEFRVDN2WHFjRkdDVUpPRzlNemV1M05YMjV4SHEvbkhB?= =?utf-8?B?clROb0Z3dTB1TGwvV29rb3B0ZVI5a1lmQ2FvKzkwOVNXV01JdnJaUU5rdXo0?= =?utf-8?B?SGVnMUpVWmNwNVFtaG9RZjJrWFJ4S0twZFBiQzIzMWVQN1pWV0pWOFZiVWIv?= =?utf-8?B?d2cxQUZ5THA5b3dBMzd6STdndDQrcWZPZFk0cU53Syt4bWxoR1BpUWlyRGRr?= =?utf-8?B?NGpreXF4cnRCWDM3YlBzR3RFbHJFNWxMeDNkdlRkWWZ5QUJqVGROU1FxVXh5?= =?utf-8?B?YlZUNm4zMVJsaytGbUwxOFNlSStpSU5xaFFyNUhsQStjYzBSTHJJQVVIZi9H?= =?utf-8?B?RUFOOXNmNzY3T1dySENFSHA5bnJRUFRaYTBiVzBYZVA1TEszTFArcHlQRGNK?= =?utf-8?B?TnhQczZ6VUk1YlJQOUtvUWxadjhpWEV3UUk0WXAxekRvZnhwRUpVYitEZi8x?= =?utf-8?B?SVE3aUlwdGtpZHFpZ1JDRUUvamI3R3p2QmgzNEUvcWxyOEErVXJtRkdWelRZ?= =?utf-8?B?U2xSQzl5RkxqWk1tZDdvVUJxenBoMXJCZWpEbXYzWStXZk9YMnEvcFhFRnhD?= =?utf-8?B?cjlBUFBCUzQ0YWsvQjhvNDQ4ejB6cUs2eHpEcXEwQWxYcTEwY3NxQjg5RmNT?= =?utf-8?B?Mk5FU3hrSkhSdkx0dENCWmRUZnZUQmJ3Yy9FZk1qVzdxYlp0U2RhQXEzL3RW?= =?utf-8?B?L1Q5YW81aU45cG43VVh2Y2ZhTVlZL2hYeHZJZmY5RDEzRzI1MXU3Sm4yR0J2?= =?utf-8?B?SEZZQTBOOVJYaVF1UVhGdVNPQ0tDZkk3bUZEWU9XMWYwbHZTMGxyS0tIaEVQ?= =?utf-8?B?UFVpUkFHeUM2dUUwQ29IZ2xUYnJBcjBFWjhZUW5rb1RObWd1cllQS0dsWE56?= =?utf-8?B?dElOaittc2NCd1hBZjBFc2JkTU5jbmkxS0VBQkFIRDBqMDVwZURuTmh2akNL?= =?utf-8?B?VjY0ZzhadTJabXc4bUUvaWd0NklMQjVxZlBSTjlqTlpzWHU4OVBvRDBPcVFr?= =?utf-8?B?Zi9sMkxBRDY5UXdBMjMvemQzRnpkNDNSbHl1R1d6VVY0aGFXNmg3UFIrT1NU?= =?utf-8?B?SUozUHBwYmVtR2dSWE11eFgyN2o2d0Qwb1BndDdMT1U3VklQMzkyVjZ6Uytv?= =?utf-8?B?TFBuUW9lNEJXc0hsR1hKbzhiWkVWYU83V2hOaGVpZllNSXk3ZEdYa2crbGhK?= =?utf-8?B?dFJXV2V6NXFmVkRjeDFmaEVMYi9EbXFJNG96WFMyNENKUnYreUgxN0RLZnor?= =?utf-8?B?QjRXNHl2NzFyb0RQRTQ1YU9lWEZ6b3Z1NkhNZUw0d29Ic2d1bFdrdXN6THQ0?= =?utf-8?B?eHQ2RTBVU2RXYSsrUE1BYVlQZmdWbTFVRVRKVVc0eGdLVElmWjZRSkJKT2pF?= =?utf-8?B?bXRRQkdiTFROa3lrbDdVNWd3RStOcDlyL082bnlHNTNIRWVtQVgzSWVYTWNl?= =?utf-8?B?NmVXZGsrWHZmQlh0RU9MeU43UzRSZDdWQlFVZFJEbk9UZExFZDNYVlZLc054?= =?utf-8?B?M25oWmpKdldIZVIyUkVmVkJmU3o3NGRHOFVPcjQ5UTkwb3RDTEtmeHN0UE5F?= =?utf-8?B?c3diT214UVJOMnZzNDJ5TjkwR2FnNTVzRm9HdlZEUDFURi8yQ2NLZmVGZjJ6?= =?utf-8?B?QVhPRnBObmRkVGtpVjFYc2tGbU4yOXpwMldNV2xWeVpZbnZTM2l5MGMrRU1E?= =?utf-8?B?ZElSeFRNNGFtc1k0VXBXNjhmZGlSYjBzQjh4YUhmd21Sdk9nSFRvR2diN1lH?= =?utf-8?B?SEo4aHFnd0RleVA0Sm56ZDdHQXBRPT0=?= Content-Type: multipart/alternative; boundary="_000_SJ0PR02MB835349B4342ED13265A7A55D814E9SJ0PR02MB8353namp_" MIME-Version: 1.0 X-OriginatorOrg: qti.qualcomm.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: SJ0PR02MB8353.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 4193d7b2-fa18-49a6-da70-08d9d2e3aa9f X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Jan 2022 20:15:51.0970 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 98e9ba89-e1a1-4e38-9007-8bdabc25de1d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 6yaYijO0uQtqvCFkUXPITmm5Z69N8MgqfCivkY6eZEjAy6ZQUWa9s+c9VOjWFYoYospru5uYmaCcNbOqwUUoZid2b1Ocy+oNI3CzKhrFoCk= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR02MB7311 Archived-At: Subject: Re: [Teep] [Rats] Class ID claim (and other HW identification) X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 08 Jan 2022 20:16:04 -0000 --_000_SJ0PR02MB835349B4342ED13265A7A55D814E9SJ0PR02MB8353namp_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 RHVyaW5nIHRoZSBSQVRTIG1lZXRpbmcgaW4gSUVURiAxMTIsIHRoZSBFQVQgZWRpdG9ycyB3ZXJl IGFzc3VyZWQgdGhhdCB0aGUgVEVFUCBXRyBoYWQgcmVhY2hlZCBhIGNvbnNlbnN1cyB0aGF0IGlm IHRoaXMgY2xhaW0gaXMgZGVmaW5lZCBhcyBvcGFxdWUgZGF0YSAoaHR0cHM6Ly9naXRodWIuY29t L2lldGYtcmF0cy13Zy9lYXQvcHVsbC8xMzkpIHRoZW4gdGhlIFRFRVAgcmVxdWlyZW1lbnQgd291 bGQgYmUgbWV0Lg0KDQpCYXNlZCBvbiB0aGUgZGlzY3Vzc2lvbiBiZWxvdywgdGhlIFRFRVAgV0cg aGFzIGNsZWFybHkgbm90IGFycml2ZWQgYXQgY29uc2Vuc3VzIGFzIHRvIHdoYXQgYSBIVyBjbGFz cyBjbGFpbSBpcyBzdXBwb3NlZCB0byBiZS4gIFJhdGhlciB0aGFuIHRvIGtlZXAgdHJ5aW5nIHRv IGl0ZXJhdGUgb24gYW4gRUFUIFBSIHRoYXQgbWF5IG9yIG1heSBub3QgcmVwcmVzZW50IFRFRVAg Y29uc2Vuc3VzLCBJIHdvdWxkIHN1Z2dlc3QgdGhlIFRFRVAgV0cgY29udGludWUgdGhlIGRpc2N1 c3Npb24gb24gdGhpcyB0b3BpYyBhbmQgcHJlc2VudCBhIGZvcm1hbCBwcm9wb3NhbCB0byB0aGUg UkFUUyBXRy4gIFdoZW4gSSBzYXkg4oCcVEVFUCBXR+KAnSwgSSBtZWFuIHRoYXQgdGhlIHByb3Bv c2FsIHNob3VsZCBiZSBwcm92aWRlZCBieSBvbmUgb3IgbW9yZSBpbmRpdmlkdWFscyB3aG8gY2Fu IGNyZWRpYmx5IGNsYWltIHRvIHNwZWFrIGZvciB0aGUgV0csIHN1Y2ggYXMgdGhlIFdvcmtpbmcg R3JvdXAgY2hhaXJzLg0KDQotR2lyaSBNYW5keWFtLCBjby1lZGl0b3Igb2YgRUFUDQoNCkZyb206 IFJBVFMgPHJhdHMtYm91bmNlc0BpZXRmLm9yZz4gT24gQmVoYWxmIE9mIExhdXJlbmNlIEx1bmRi bGFkZQ0KU2VudDogU2F0dXJkYXksIEphbnVhcnkgOCwgMjAyMiAxMTo0MiBBTQ0KVG86IERhdmUg VGhhbGVyIDxkdGhhbGVyQG1pY3Jvc29mdC5jb20+DQpDYzogRGF2ZSBUaGFsZXIgPGR0aGFsZXI9 NDBtaWNyb3NvZnQuY29tQGRtYXJjLmlldGYub3JnPjsgdGVlcCA8dGVlcEBpZXRmLm9yZz47IEJy ZW5kYW4gTW9yYW4gPEJyZW5kYW4uTW9yYW5AYXJtLmNvbT47IHJhdHMgPHJhdHNAaWV0Zi5vcmc+ DQpTdWJqZWN0OiBSZTogW1JhdHNdIFtUZWVwXSBDbGFzcyBJRCBjbGFpbSAoYW5kIG90aGVyIEhX IGlkZW50aWZpY2F0aW9uKQ0KDQpZZWFoLCBJIHdhcyBjb25mdXNlZCBieSB0aGUgdXNlIG9mIOKA nElQIiB3aGVuIEkgZmlyc3QgaGVhcmQgaXQgYWZ0ZXIgam9pbmluZyB0aGUgSFcgdGVhbSBhdCBR dWFsY29tbSwgYnV0IGl0IGlzIHRoZSBwaHJhc2UgdGhhdCBpcyB1c2VkIGJ5IHRoZSBIVyBpbmR1 c3RyeToNCg0KaHR0cHM6Ly93d3cuc3lub3BzeXMuY29tL2Rlc2lnbndhcmUtaXAuaHRtbA0KaHR0 cHM6Ly93d3cuYXJtLmNvbS9wcm9kdWN0cy9zaWxpY29uLWlwLXNlY3VyaXR5DQpodHRwczovL2Vu Lndpa2lwZWRpYS5vcmcvd2lraS9TZW1pY29uZHVjdG9yX2ludGVsbGVjdHVhbF9wcm9wZXJ0eV9j b3JlDQpodHRwczovL3d3dy5pbWFnaW5hdGlvbnRlY2guY29tL3Byb2R1Y3RzLw0KDQrigJxJUOKA nSBpcyBldmVuIGluIHRoZSBVUkzigJlzLg0KDQpIb3cgYWJvdXQgb25lIG9mIHRoZXNlPw0KICAg 4oCcU2lsaWNvbiBJUCBJROKAnQ0KICAg4oCcSFcgRGVzaWduIElQIElE4oCdDQogICDigJxTZW1p Y29uZHVjdG9yIElQIElEIg0KDQpXZSBjYW4gYWRkIGEgc2VudGVuY2Ugb3IgdHdvIHRoYXQgZ2l2 ZXMgc29tZSBjb250ZXh0IGZvciBwZW9wbGUgdGhhdCBoYXZlbuKAmXQgcnVuIGludG8gdGhpcy4N Cg0KDQpNb3JlIGltcG9ydGFudCB0aGFuIHRoZSBuYW1lLCBJ4oCZZCBsaWtlIHRvIG1ha2UgdGhl IGNsYWltOg0KICAgYSBtYXAgb3IgYXJyYXkgdGhhdA0KICAgICAgbXVzdCBjb250YWluIGFuIE9F TSBJRCBvZiB0aGUgdmVuZG9yIG9mIHRoZSBJUA0KICAgICAgbWF5IGNvbnRhaW4gYSBtb2RlbCBp bmRpY2F0b3INCiAgICAgIG1heSBjb250YWluIGEgdmVyc2lvbg0KDQpJIHRoaW5rIHRoaXMgbGlu ZXMgdXAgd2l0aCB3aGF0IEJyZW5kb24gc3VnZ2VzdHMgaXMgbmVlZGVkIGFuZCBtYWtlcyBtb3Jl IHNlbnNlIHRvIG1lIGJlY2F1c2UgaXQgZGVzY3JpYmVzIHRoZSB2ZXJ5IGNvbW1vbiBjb252ZW50 aW9uIG9mIGlkZW50aWZ5aW5nIHBoeXNpY2FsbHkgYnVpbHQgdGhpbmdzIChjYXJzLCBjaGlwcywg cmVmcmlnZXJhdG9ycy4uLikuDQoNCkxMDQoNCg0KDQoNCk9uIEphbiA3LCAyMDIyLCBhdCA0OjA3 IFBNLCBEYXZlIFRoYWxlciA8ZHRoYWxlckBtaWNyb3NvZnQuY29tPG1haWx0bzpkdGhhbGVyQG1p Y3Jvc29mdC5jb20+PiB3cm90ZToNCg0K4oCcSVDigJ0gKGFzIGluIEludGVsbGVjdHVhbCBQcm9w ZXJ0eSwgbm90IEludGVybmV0IFByb3RvY29sKSBpcyBub3QgdGhlIHJpZ2h0IHRlcm0gaW4gbXkg dmlldyBzaW5jZSB0aGF0IGltcGxpZXMgdGhlcmUgYWN0dWFsbHkgaXMgc29tZSBJUCBhcyBvcHBv c2VkIHRvIChzYXkpIGNvbmZvcm1hbmNlIHRvIGEgc3RhbmRhcmQuICBJIGFtIGZpbmUgd2l0aCDi gJxDbGFzc+KAnSBhcyB5b3UgaGFkIGl0IGluIHRoZSBQUiwgYnV0IEkgdGhpbmsg4oCcSVDigJ0g aXMgdG9vIG5hcnJvdyBpbiBpbXBsaWNhdGlvbi4NCg0KRGF2ZQ0KDQpGcm9tOiBURUVQIDx0ZWVw LWJvdW5jZXNAaWV0Zi5vcmc8bWFpbHRvOnRlZXAtYm91bmNlc0BpZXRmLm9yZz4+IE9uIEJlaGFs ZiBPZiBMYXVyZW5jZSBMdW5kYmxhZGUNClNlbnQ6IEZyaWRheSwgSmFudWFyeSA3LCAyMDIyIDM6 NTYgUE0NClRvOiBCcmVuZGFuIE1vcmFuIDxCcmVuZGFuLk1vcmFuQGFybS5jb208bWFpbHRvOkJy ZW5kYW4uTW9yYW5AYXJtLmNvbT4+DQpDYzogRGF2ZSBUaGFsZXIgPGR0aGFsZXI9NDBtaWNyb3Nv ZnQuY29tQGRtYXJjLmlldGYub3JnPG1haWx0bzpkdGhhbGVyPTQwbWljcm9zb2Z0LmNvbUBkbWFy Yy5pZXRmLm9yZz4+OyB0ZWVwIDx0ZWVwQGlldGYub3JnPG1haWx0bzp0ZWVwQGlldGYub3JnPj47 IHJhdHMgPHJhdHNAaWV0Zi5vcmc8bWFpbHRvOnJhdHNAaWV0Zi5vcmc+Pg0KU3ViamVjdDogUmU6 IFtUZWVwXSBbUmF0c10gQ2xhc3MgSUQgY2xhaW0gKGFuZCBvdGhlciBIVyBpZGVudGlmaWNhdGlv bikNCg0KU28gcmF0aGVyIHRoYW4gYSBIVyBDbGFzcywgaG93IGFib3V0IGEgSFcgSVAgY2xhaW0/ IEl0IHdvdWxkIHJldXNlIHRoZSBzYW1lIHRyaXBsZSBmb3IgaWRlbnRpZnlpbmcgSFcsIE9FTSwg TW9kZWwsIFZlcnNpb24uIEl0IGNvdWxkIG9jY3VyIGFsb25nIHNpZGUgdGhlIEhXIE9FTSwgbW9k ZWwgYW5kIHZlcnNpb24uIFRoaXMgc2VlbXMgYmV0dGVyIHRoYW4gbXkgY3VycmVudCBQUiBhbmQg bGluZXMgdXAgYmV0dGVyIHdpdGggQnJlbmRhbuKAmXMgZXhhbXBsZXMgYW5kIHdpdGggdGhlIHJl YWxpdHkgdGhhdCBIVyBJUCBjb21lcyBmcm9tIGEgdmVuZG9yLCBoYXMgbW9kZWxzIGFuZCB2ZXJz aW9ucy4gSeKAmWxsIHdyaXRlIHVwIGEgUFIgZm9yIGl0IGlmIEkgcmVjZWl2ZSBzb21lIHBvc2l0 aXZlIGZlZWRiYWNrIGhlcmUuDQoNCg0KVGhlIGRpc3RpbmN0aW9uIGJldHdlZW4gY2hpcCBhbmQg ZGV2aWNlIGlzIGludGVuZGVkIHRvIGJlIGhhbmRsZWQgYnkgc3VibW9kdWxlcyBpbiBFQVQuIFN1 Ym1vZHVsZXMgY2FuIGV4cHJlc3MgYXJiaXRyYXJpbHkgY29tcGxleCBhcmNoaXRlY3R1cmVzIGFu ZCBkZXZpY2UgY29tcG9zaXRpb25zLg0KDQpJIHRoaW5rIGl04oCZcyBjbGVhbmVyIHRvIGtlZXAg dGhlIEhXLWlkZW50aWZ5aW5nIGNsYWltcyBzZXBhcmF0ZSBmcm9tIHRoZSBTVy1pZGVudGlmeSBj bGFpbXMuIFdvdWxkIHJlYWxseSBsaWtlIHRoZSBpZGVudGlmaWNhdGlvbiBvZiB0aGUgVHJ1c3Rl ZCBPUyBWZW5kb3IgYmUgaGFuZGxlZCBieSBDb1NXSUQgYW5kIGZyaWVuZHMuIFRyeWluZyB0byBt YWtlIHNvbWUgY2xhaW0gc3VpdGFibGUgZm9yIGlkZW50aWZ5aW5nIGJvdGggU1cgYW5kIEhXIGZv ciBhbGwgb2YgYXR0ZXN0YXRpb24gc2VlbXMgb3Zlci1hbWJpdGlvdXMuDQoNCkkgYWxzbyB0aGlu ayBpdOKAmXMgZmluZSB0byBkZWZpbmUgc29tZSBjbGFpbXMgYmV0dGVyIHN1aXRlZCB0byB0aGUg VEVFIHdvcmxkIGluIFRFRVAgaWYgd2UgY2Fu4oCZdCBmaW5kIGVub3VnaCBjb21tb24gZ3JvdW5k IGJldHdlZW4gVEVFUCBhbmQgdGhlIHZlcnkgYnJvYWRseSBhcHBsaWNhYmxlIHN0dWZmIHRoYXQg Z29lcyBpbnRvIEVBVC4NCg0KTEwNCg0KDQpOb3RlOiBJIGZpbmQgdGhlIHVzZSBvZiB0aGUgd29y ZCDigJxjbGFzc+KAnSBoZXJlIGNvbmZ1c2luZy4gSWYgSSB3ZXJlIHB1dHRpbmcgVFbigJlzIGlu dG8gY2xhc3NlcyBJ4oCZZCB1c2VzIGNsYXNzZXMgbGlrZSBzbWFydC9kdW1iLCBkaXNwbGF5IHR5 cGUgKExDRCwgQ1JULCBPTEVEKSBhbmQgc3VjaCB0aGF0IGlkZW50aWZ5IGNoYXJhY3RlcmlzdGlj cyBvZiBUVnMgaW5kZXBlbmRlbnQgb2YgdmVuZG9yIGFuZCBtb2RlbC4gIlNvbnkgQnJhdmlhIiBp cyBub3QgYSBjbGFzcyBJTU8uIE5vciBpcyDigJxNaWNyb3NvZnQgV2luZG93c+KAnSAoYW4gT1Mg dGhlIHJ1bnMgb24gbG90cyBvZiBIVyBwbGF0Zm9ybXMpLiBJ4oCZZCBsaWtlIHRvIG1vdmUgYXdh eSBmcm9tIHRoZSB3b3JkLg0KDQoNCg0KDQoNCk9uIEphbiA0LCAyMDIyLCBhdCAzOjA2IEFNLCBC cmVuZGFuIE1vcmFuIDxCcmVuZGFuLk1vcmFuQGFybS5jb208bWFpbHRvOkJyZW5kYW4uTW9yYW5A YXJtLmNvbT4+IHdyb3RlOg0KDQpJIHRoaW5rIGRldmljZXMgd2lsbCBuZWVkIHRvIHJlcG9ydCBt dWx0aXBsZSB2ZW5kb3IvY2xhc3MgcGFpcnMuDQoNCkZvciBleGFtcGxlLCBBIG1vYmlsZSBkZXZp Y2UgY291bGQgcG90ZW50aWFsbHkgY29udGFpbjoNCjEuIEEgTW9iaWxlIERldmljZSBPRU0gVmVu ZG9yIElEDQoyLiBBIFNpbGljb24gdmVuZG9y4oCZcyBWZW5kb3IgSUQNCjMuIEFuIElQIHZlbmRv cuKAmXMgVmVuZG9yIElEDQoNClRoaXMgaXMgbm90IGFuIGV4aGF1c3RpdmUgbGlzdC4NCg0KRm9y IEFybSBUcnVzdCBab25lIFRFRXMsIEkgd291bGQgZXhwZWN0IHRvIHNlZToNCjEuIFRoZSBBcm0g VmVuZG9yIElEICsgdGhlIHByb2Nlc3NvciBjb3Jl4oCZcyBDbGFzcyBJRA0KMi4gVGhlIFRydXN0 ZWQgT1MgVmVuZG9yIElEICsgdGhlIFRydXN0ZWQgT1MgQ2xhc3MgSUQNCjMuIFRoZSBTaWxpY29u IHZlbmRvcuKAmXMgVmVuZG9yIElEICsgdGhlIHByb2Nlc3NvciBDbGFzcyBJRA0KNC4gVGhlIERl dmljZSBPRU3igJlzIFZlbmRvciBJRCArIHRoZSBkZXZpY2UgQ2xhc3MgSUQNCg0KQ2hlZXJzLA0K QnJlbmRhbg0KDQoNCg0KT24gMyBKYW4gMjAyMiwgYXQgMjE6MDAsIERhdmUgVGhhbGVyIDxkdGhh bGVyPTQwbWljcm9zb2Z0LmNvbUBkbWFyYy5pZXRmLm9yZzxtYWlsdG86ZHRoYWxlcj00MG1pY3Jv c29mdC5jb21AZG1hcmMuaWV0Zi5vcmc+PiB3cm90ZToNCg0KTGF1cmVuY2UgTHVuZGJsYWRlIHdy b3RlOg0KDQoNCkkgdGFsa2VkIHRvIERhdmUgd2hpY2ggcmVzdWx0ZWQgaW4gcmVvcmllbnRhdGlv biBvZiBteSB1bmRlcnN0YW5kaW5nIG9mIENsYXNzIElEIGluIFRFRVAuDQoNCkNsYXNzIElEIGJh c2ljYWxseSBpZGVudGlmaWVzIEhXIElQIGZyb20gYSBIVyBkZXNpZ25lciBsaWtlIEFybSBvciBT eW5vcHNpcyB0aGF0IGlzIGludGVncmF0ZWQgaW50byBjaGlwcyBtYWRlIGJ5IHZhcmlvdXMgSFcg T0VNcyBsaWtlIFF1YWxjb21tLCBTYW1zdW5nIGFuZCBBcHBsZS4gVGhlIHRlcm0gdXNlZCBmcmVx dWVudGx5IGZvciB0aGlzIGlzICJJUCIgKEkga25vdyB0aGlzIHdlbGwgZnJvbSBteSBkYXlzIHdv cmtpbmcgb24gSFcgYXQgUXVhbGNvbW0pLg0KDQpJJ3ZlIGNyZWF0ZWQgYSBQUiBmb3IgSFcgQ2xh c3MuDQoNClNpbmNlIHdoYXQgaXMgaWRlbnRpZmllZCBzcGFucyBPRU1zLCB0aGlzIG11c3QgYmUg YSBnbG9iYWxseSB1bmlxdWUgaWRlbnRpZmllci4gV2UgbmVlZCB0byBiZSBleHBsaWNpdCBhYm91 dCB0aGF0Lg0KDQpJIGtub3cgb2YgZm91ciB3YXlzIHRvIGhhdmUgYSBnbG9iYWwgaWRlbnRpZmll cjoNCi0gVXNlIE9JRHMNCi0gVXNlIEROUyAvIFVSSQ0KLSBQcm9iYWJpbGlzdGljYWxseSB1c2lu ZyBhIGJpZyBlbm91Z2ggYnl0ZSBzdHJpbmcNCi0gQSBuZXcgcmVnaXN0cnksIHBlcmhhcHMgSUFO QSAoYnV0IHdlIHByb2JhYmx5IGRvbid0IHdhbnQgdGhpcykNCg0KVGhlIFBSIGFsbG93cyBhbGwg YnV0IHRoZSBsYXN0LCBidXQgdGhpcyBjb3VsZCBiZSByZWR1Y2VkIHRvIGp1c3Qgb25lIG9yIHR3 byBvZiB0aGUgYWJvdmUuDQoNClBSIGxvb2tzIGdyZWF0IHRvIG1lLCBleGNlcHQgdGhhdCB3b3Vs ZCBJIGFncmVlIHdpdGggcmVkdWNpbmcgaXQgdG8gb25lIG9yIHR3by4NClNpbmNlIHRoZSBhYmls aXR5IHRvIHRha2UgYSB2YWx1ZSBhbmQgcmVzb2x2ZSBpdCB0byBzb21ldGhpbmcgbWVhbmluZ2Z1 bCBpcyB1c2VmdWwgaW4gbWFueSBjYXNlcyAobG9nZ2luZywgd2lyZXNoYXJrIGFuYWx5c2lzLCBl dGMuKSwgSSB3b3VsZCByZW1vdmUgdGhlIHRoaXJkIG9wdGlvbi4NCg0KT0lEcywgZW5jb2RlZCBh cyBpbnQgYXJyYXlzLCBwcm9iYWJseSBjb21wcmVzcyB0aGUgYmVzdCBzbyBpZiBvbmx5IG9uZSwg dGhlbiBJJ2QgcGljayB0aGF0IG9uZS4gIFVSSXMgYXJlIGNvbnZlbmllbnQgdGhvdWdoIGFsc28g c28gaWYgdHdvLCB0aGVuIHRoYXQncyBteSBzZWNvbmQgcGljay4NCg0KDQoNCkkgZG9uJ3Qgc2Vl IHRoaXMgY2xhaW0gYXMgZXNzZW50aWFsIGZvciBFQVQsIGJ1dCBJIGNvbW1pdHRlZCB0byB3b3Jr aW5nIHRocm91Z2ggdGhpcyB3aXRoIFRFRVAuIEknbSBmaW5lIHdpdGggdGhpcyBQUiBnb2luZyBp bnRvIGEgVEVFUCBkb2N1bWVudCByYXRoZXIgdGhhbiBFQVQuDQoNClRoZSBub3Rpb24gb2YgSFcg Y2xhc3MgSUQgaXMgbm90IHNwZWNpZmljIHRvIFRFRXMsIGhlbmNlIHRoZSByZXF1ZXN0IHRvIHB1 dCBpdCBpbiBFQVQgcmF0aGVyIHRoYW4gaW4gYW55dGhpbmcgdGhhdCB3b3VsZCBpbXBseSB1c2Ug aXMgbGltaXRlZCB0byBURUVzIChoZW5jZSBub3QgaW4gYSBURUVQIGRvY3VtZW50KS4NCg0KLURh dmUNCg0KX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX18NClRF RVAgbWFpbGluZyBsaXN0DQpURUVQQGlldGYub3JnPG1haWx0bzpURUVQQGlldGYub3JnPg0KaHR0 cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby90ZWVwPGh0dHBzOi8vbmFtMDYuc2Fm ZWxpbmtzLnByb3RlY3Rpb24ub3V0bG9vay5jb20vP3VybD1odHRwcyUzQSUyRiUyRnd3dy5pZXRm Lm9yZyUyRm1haWxtYW4lMkZsaXN0aW5mbyUyRnRlZXAmZGF0YT0wNCU3QzAxJTdDZHRoYWxlciU0 MG1pY3Jvc29mdC5jb20lN0NlZjY1MmRlNzBjMDQ0YzlmZjIzNDA4ZDlkMjM5NTU3MCU3QzcyZjk4 OGJmODZmMTQxYWY5MWFiMmQ3Y2QwMTFkYjQ3JTdDMSU3QzAlN0M2Mzc3NzE5NjY2NzgyODkyMTUl N0NVbmtub3duJTdDVFdGcGJHWnNiM2Q4ZXlKV0lqb2lNQzR3TGpBd01EQWlMQ0pRSWpvaVYybHVN eklpTENKQlRpSTZJazFoYVd3aUxDSlhWQ0k2TW4wJTNEJTdDMTAwMCZzZGF0YT1la2tTcmE5eWVW eHU1UGNzMldyVlBQU3M2MkxHYXRWVHhrcURjcHRwNVBRJTNEJnJlc2VydmVkPTA+DQoNCklNUE9S VEFOVCBOT1RJQ0U6IFRoZSBjb250ZW50cyBvZiB0aGlzIGVtYWlsIGFuZCBhbnkgYXR0YWNobWVu dHMgYXJlIGNvbmZpZGVudGlhbCBhbmQgbWF5IGFsc28gYmUgcHJpdmlsZWdlZC4gSWYgeW91IGFy ZSBub3QgdGhlIGludGVuZGVkIHJlY2lwaWVudCwgcGxlYXNlIG5vdGlmeSB0aGUgc2VuZGVyIGlt bWVkaWF0ZWx5IGFuZCBkbyBub3QgZGlzY2xvc2UgdGhlIGNvbnRlbnRzIHRvIGFueSBvdGhlciBw ZXJzb24sIHVzZSBpdCBmb3IgYW55IHB1cnBvc2UsIG9yIHN0b3JlIG9yIGNvcHkgdGhlIGluZm9y bWF0aW9uIGluIGFueSBtZWRpdW0uIFRoYW5rIHlvdS4NCg0K --_000_SJ0PR02MB835349B4342ED13265A7A55D814E9SJ0PR02MB8353namp_ Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: base64 PGh0bWwgeG1sbnM6dj0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTp2bWwiIHhtbG5zOm89InVy bjpzY2hlbWFzLW1pY3Jvc29mdC1jb206b2ZmaWNlOm9mZmljZSIgeG1sbnM6dz0idXJuOnNjaGVt YXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6d29yZCIgeG1sbnM6bT0iaHR0cDovL3NjaGVtYXMubWlj cm9zb2Z0LmNvbS9vZmZpY2UvMjAwNC8xMi9vbW1sIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcv VFIvUkVDLWh0bWw0MCI+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIg Y29udGVudD0idGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjxtZXRhIG5hbWU9IkdlbmVyYXRv ciIgY29udGVudD0iTWljcm9zb2Z0IFdvcmQgMTUgKGZpbHRlcmVkIG1lZGl1bSkiPg0KPHN0eWxl PjwhLS0NCi8qIEZvbnQgRGVmaW5pdGlvbnMgKi8NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6 SGVsdmV0aWNhOw0KCXBhbm9zZS0xOjIgMTEgNiA0IDIgMiAyIDIgMiA0O30NCkBmb250LWZhY2UN Cgl7Zm9udC1mYW1pbHk6Q291cmllcjsNCglwYW5vc2UtMToyIDcgNCA5IDIgMiA1IDIgNCA0O30N CkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6IkNhbWJyaWEgTWF0aCI7DQoJcGFub3NlLTE6MiA0 IDUgMyA1IDQgNiAzIDIgNDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OkNhbGlicmk7DQoJ cGFub3NlLTE6MiAxNSA1IDIgMiAyIDQgMyAyIDQ7fQ0KLyogU3R5bGUgRGVmaW5pdGlvbnMgKi8N CnAuTXNvTm9ybWFsLCBsaS5Nc29Ob3JtYWwsIGRpdi5Nc29Ob3JtYWwNCgl7bWFyZ2luOjBpbjsN Cglmb250LXNpemU6MTEuMHB0Ow0KCWZvbnQtZmFtaWx5OiJDYWxpYnJpIixzYW5zLXNlcmlmO30N CmE6bGluaywgc3Bhbi5Nc29IeXBlcmxpbmsNCgl7bXNvLXN0eWxlLXByaW9yaXR5Ojk5Ow0KCWNv bG9yOmJsdWU7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQpzcGFuLmFwcGxlLWNvbnZl cnRlZC1zcGFjZQ0KCXttc28tc3R5bGUtbmFtZTphcHBsZS1jb252ZXJ0ZWQtc3BhY2U7fQ0Kc3Bh bi5FbWFpbFN0eWxlMjENCgl7bXNvLXN0eWxlLXR5cGU6cGVyc29uYWwtcmVwbHk7DQoJZm9udC1m YW1pbHk6IkNhbGlicmkiLHNhbnMtc2VyaWY7DQoJY29sb3I6d2luZG93dGV4dDt9DQouTXNvQ2hw RGVmYXVsdA0KCXttc28tc3R5bGUtdHlwZTpleHBvcnQtb25seTsNCglmb250LXNpemU6MTAuMHB0 O30NCkBwYWdlIFdvcmRTZWN0aW9uMQ0KCXtzaXplOjguNWluIDExLjBpbjsNCgltYXJnaW46MS4w aW4gMS4waW4gMS4waW4gMS4waW47fQ0KZGl2LldvcmRTZWN0aW9uMQ0KCXtwYWdlOldvcmRTZWN0 aW9uMTt9DQotLT48L3N0eWxlPjwhLS1baWYgZ3RlIG1zbyA5XT48eG1sPg0KPG86c2hhcGVkZWZh dWx0cyB2OmV4dD0iZWRpdCIgc3BpZG1heD0iMTAyNiIgLz4NCjwveG1sPjwhW2VuZGlmXS0tPjwh LS1baWYgZ3RlIG1zbyA5XT48eG1sPg0KPG86c2hhcGVsYXlvdXQgdjpleHQ9ImVkaXQiPg0KPG86 aWRtYXAgdjpleHQ9ImVkaXQiIGRhdGE9IjEiIC8+DQo8L286c2hhcGVsYXlvdXQ+PC94bWw+PCFb ZW5kaWZdLS0+DQo8L2hlYWQ+DQo8Ym9keSBsYW5nPSJFTi1VUyIgbGluaz0iYmx1ZSIgdmxpbms9 InB1cnBsZSIgc3R5bGU9IndvcmQtd3JhcDpicmVhay13b3JkIj4NCjxkaXYgY2xhc3M9IldvcmRT ZWN0aW9uMSI+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5EdXJpbmcgdGhlIFJBVFMgbWVldGluZyBp biBJRVRGIDExMiwgdGhlIEVBVCBlZGl0b3JzIHdlcmUgYXNzdXJlZCB0aGF0IHRoZSBURUVQIFdH IGhhZCByZWFjaGVkIGEgY29uc2Vuc3VzIHRoYXQgaWYgdGhpcyBjbGFpbSBpcyBkZWZpbmVkIGFz IG9wYXF1ZSBkYXRhICg8YSBocmVmPSJodHRwczovL2dpdGh1Yi5jb20vaWV0Zi1yYXRzLXdnL2Vh dC9wdWxsLzEzOSI+aHR0cHM6Ly9naXRodWIuY29tL2lldGYtcmF0cy13Zy9lYXQvcHVsbC8xMzk8 L2E+KQ0KIHRoZW4gdGhlIFRFRVAgcmVxdWlyZW1lbnQgd291bGQgYmUgbWV0LiZuYnNwOyA8bzpw PjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+QmFzZWQgb24gdGhlIGRpc2N1c3Npb24gYmVsb3csIHRoZSBU RUVQIFdHIGhhcyBjbGVhcmx5IG5vdCBhcnJpdmVkIGF0IGNvbnNlbnN1cyBhcyB0byB3aGF0IGEg SFcgY2xhc3MgY2xhaW0gaXMgc3VwcG9zZWQgdG8gYmUuJm5ic3A7IFJhdGhlciB0aGFuIHRvIGtl ZXAgdHJ5aW5nIHRvIGl0ZXJhdGUgb24gYW4gRUFUIFBSIHRoYXQgbWF5IG9yIG1heSBub3QgcmVw cmVzZW50IFRFRVAgY29uc2Vuc3VzLCBJIHdvdWxkIHN1Z2dlc3QNCiB0aGUgVEVFUCBXRyBjb250 aW51ZSB0aGUgZGlzY3Vzc2lvbiBvbiB0aGlzIHRvcGljIGFuZCBwcmVzZW50IGEgZm9ybWFsIHBy b3Bvc2FsIHRvIHRoZSBSQVRTIFdHLiZuYnNwOyBXaGVuIEkgc2F5IOKAnFRFRVAgV0figJ0sIEkg bWVhbiB0aGF0IHRoZSBwcm9wb3NhbCBzaG91bGQgYmUgcHJvdmlkZWQgYnkgb25lIG9yIG1vcmUg aW5kaXZpZHVhbHMgd2hvIGNhbiBjcmVkaWJseSBjbGFpbSB0byBzcGVhayBmb3IgdGhlIFdHLCBz dWNoIGFzIHRoZSBXb3JraW5nIEdyb3VwDQogY2hhaXJzLjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xh c3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij4tR2lyaSBNYW5keWFtLCBjby1lZGl0b3Igb2YgRUFUIDxvOnA+PC9vOnA+PC9wPg0KPHAgY2xh c3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8ZGl2Pg0KPGRpdiBzdHlsZT0i Ym9yZGVyOm5vbmU7Ym9yZGVyLXRvcDpzb2xpZCAjRTFFMUUxIDEuMHB0O3BhZGRpbmc6My4wcHQg MGluIDBpbiAwaW4iPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGI+RnJvbTo8L2I+IFJBVFMgJmx0 O3JhdHMtYm91bmNlc0BpZXRmLm9yZyZndDsgPGI+T24gQmVoYWxmIE9mIDwvYj4NCkxhdXJlbmNl IEx1bmRibGFkZTxicj4NCjxiPlNlbnQ6PC9iPiBTYXR1cmRheSwgSmFudWFyeSA4LCAyMDIyIDEx OjQyIEFNPGJyPg0KPGI+VG86PC9iPiBEYXZlIFRoYWxlciAmbHQ7ZHRoYWxlckBtaWNyb3NvZnQu Y29tJmd0Ozxicj4NCjxiPkNjOjwvYj4gRGF2ZSBUaGFsZXIgJmx0O2R0aGFsZXI9NDBtaWNyb3Nv ZnQuY29tQGRtYXJjLmlldGYub3JnJmd0OzsgdGVlcCAmbHQ7dGVlcEBpZXRmLm9yZyZndDs7IEJy ZW5kYW4gTW9yYW4gJmx0O0JyZW5kYW4uTW9yYW5AYXJtLmNvbSZndDs7IHJhdHMgJmx0O3JhdHNA aWV0Zi5vcmcmZ3Q7PGJyPg0KPGI+U3ViamVjdDo8L2I+IFJlOiBbUmF0c10gW1RlZXBdIENsYXNz IElEIGNsYWltIChhbmQgb3RoZXIgSFcgaWRlbnRpZmljYXRpb24pPG86cD48L286cD48L3A+DQo8 L2Rpdj4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+ DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPlllYWgsIEkgd2FzIGNvbmZ1c2Vk IGJ5IHRoZSB1c2Ugb2Yg4oCcSVAmcXVvdDsgd2hlbiBJIGZpcnN0IGhlYXJkIGl0IGFmdGVyIGpv aW5pbmcgdGhlIEhXIHRlYW0gYXQgUXVhbGNvbW0sIGJ1dCBpdCBpcyB0aGUgcGhyYXNlIHRoYXQg aXMgdXNlZCBieSB0aGUgSFcgaW5kdXN0cnk6PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGJs b2NrcXVvdGUgc3R5bGU9Im1hcmdpbi1sZWZ0OjMwLjBwdDttYXJnaW4tcmlnaHQ6MGluIj4NCjxk aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48YSBocmVmPSJodHRwczovL3d3dy5zeW5vcHN5cy5j b20vZGVzaWdud2FyZS1pcC5odG1sIj5odHRwczovL3d3dy5zeW5vcHN5cy5jb20vZGVzaWdud2Fy ZS1pcC5odG1sPC9hPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z b05vcm1hbCI+PGEgaHJlZj0iaHR0cHM6Ly93d3cuYXJtLmNvbS9wcm9kdWN0cy9zaWxpY29uLWlw LXNlY3VyaXR5Ij5odHRwczovL3d3dy5hcm0uY29tL3Byb2R1Y3RzL3NpbGljb24taXAtc2VjdXJp dHk8L2E+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij48YSBocmVmPSJodHRwczovL2VuLndpa2lwZWRpYS5vcmcvd2lraS9TZW1pY29uZHVjdG9yX2lu dGVsbGVjdHVhbF9wcm9wZXJ0eV9jb3JlIj5odHRwczovL2VuLndpa2lwZWRpYS5vcmcvd2lraS9T ZW1pY29uZHVjdG9yX2ludGVsbGVjdHVhbF9wcm9wZXJ0eV9jb3JlPC9hPjxvOnA+PC9vOnA+PC9w Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGEgaHJlZj0iaHR0cHM6Ly93 d3cuaW1hZ2luYXRpb250ZWNoLmNvbS9wcm9kdWN0cy8iPmh0dHBzOi8vd3d3LmltYWdpbmF0aW9u dGVjaC5jb20vcHJvZHVjdHMvPC9hPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Jsb2NrcXVv dGU+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8 L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj7igJxJUOKAnSBpcyBldmVuIGluIHRo ZSBVUkzigJlzLjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv Tm9ybWFsIj5Ib3cgYWJvdXQgb25lIG9mIHRoZXNlPzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8 ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+Jm5ic3A7ICZuYnNwO+KAnFNpbGljb24gSVAgSUTi gJ08bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPiZu YnNwOyAmbmJzcDvigJxIVyBEZXNpZ24gSVAgSUTigJ08bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPiZuYnNwOyAmbmJzcDvigJxTZW1pY29uZHVjdG9y IElQIElEJnF1b3Q7PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv Tm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJN c29Ob3JtYWwiPldlIGNhbiBhZGQgYSBzZW50ZW5jZSBvciB0d28gdGhhdCBnaXZlcyBzb21lIGNv bnRleHQgZm9yIHBlb3BsZSB0aGF0IGhhdmVu4oCZdCBydW4gaW50byB0aGlzLjxvOnA+PC9vOnA+ PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286 cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwv bzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPk1vcmUgaW1wb3J0 YW50IHRoYW4gdGhlIG5hbWUsIEnigJlkIGxpa2UgdG8gbWFrZSB0aGUgY2xhaW06PG86cD48L286 cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0i Zm9udC1mYW1pbHk6Q291cmllciI+Jm5ic3A7ICZuYnNwO2EgbWFwIG9yJm5ic3A7YXJyYXkgdGhh dDwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt YWwiPjxzcGFuIHN0eWxlPSJmb250LWZhbWlseTpDb3VyaWVyIj4mbmJzcDsgJm5ic3A7ICZuYnNw OyBtdXN0IGNvbnRhaW4gYW4gT0VNIElEIG9mIHRoZSB2ZW5kb3Igb2YgdGhlIElQPC9zcGFuPjxv OnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4g c3R5bGU9ImZvbnQtZmFtaWx5OkNvdXJpZXIiPiZuYnNwOyAmbmJzcDsgJm5ic3A7IG1heSBjb250 YWluIGEgbW9kZWwgaW5kaWNhdG9yPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2 Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtZmFtaWx5OkNvdXJpZXIi PiZuYnNwOyAmbmJzcDsgJm5ic3A7IG1heSBjb250YWluIGEgdmVyc2lvbjwvc3Bhbj48bzpwPjwv bzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7 PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+SSB0aGluayB0 aGlzIGxpbmVzIHVwIHdpdGggd2hhdCBCcmVuZG9uIHN1Z2dlc3RzIGlzIG5lZWRlZCBhbmQgbWFr ZXMgbW9yZSBzZW5zZSB0byBtZSBiZWNhdXNlIGl0IGRlc2NyaWJlcyB0aGUgdmVyeSBjb21tb24g Y29udmVudGlvbiBvZiBpZGVudGlmeWluZyBwaHlzaWNhbGx5IGJ1aWx0IHRoaW5ncyAoY2Fycywg Y2hpcHMsIHJlZnJpZ2VyYXRvcnMuLi4pLjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5MTDxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0K PHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRp dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48YnI+DQo8YnI+DQo8bzpwPjwvbzpwPjwv cD4NCjxibG9ja3F1b3RlIHN0eWxlPSJtYXJnaW4tdG9wOjUuMHB0O21hcmdpbi1ib3R0b206NS4w cHQiPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPk9uIEphbiA3LCAyMDIyLCBhdCA0OjA3 IFBNLCBEYXZlIFRoYWxlciAmbHQ7PGEgaHJlZj0ibWFpbHRvOmR0aGFsZXJAbWljcm9zb2Z0LmNv bSI+ZHRoYWxlckBtaWNyb3NvZnQuY29tPC9hPiZndDsgd3JvdGU6PG86cD48L286cD48L3A+DQo8 L2Rpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9vOnA+PC9wPg0KPGRpdj4N CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj7igJxJUOKAnSAoYXMgaW4gSW50ZWxsZWN0dWFs IFByb3BlcnR5LCBub3QgSW50ZXJuZXQgUHJvdG9jb2wpIGlzIG5vdCB0aGUgcmlnaHQgdGVybSBp biBteSB2aWV3IHNpbmNlIHRoYXQgaW1wbGllcyB0aGVyZSBhY3R1YWxseSBpcyBzb21lIElQIGFz IG9wcG9zZWQgdG8gKHNheSkgY29uZm9ybWFuY2UgdG8gYSBzdGFuZGFyZC4mbmJzcDsgSSBhbSBm aW5lIHdpdGgg4oCcQ2xhc3PigJ0gYXMgeW91IGhhZCBpdCBpbiB0aGUgUFIsIGJ1dA0KIEkgdGhp bmsg4oCcSVDigJ0gaXMgdG9vIG5hcnJvdyBpbiBpbXBsaWNhdGlvbi48bzpwPjwvbzpwPjwvcD4N CjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPiZuYnNwOzxvOnA+PC9vOnA+PC9w Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+RGF2ZTxvOnA+PC9vOnA+PC9w Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+Jm5ic3A7PG86cD48L286cD48 L3A+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2IHN0eWxlPSJib3JkZXI6bm9uZTtib3JkZXItdG9wOnNv bGlkICNFMUUxRTEgMS4wcHQ7cGFkZGluZzozLjBwdCAwaW4gMGluIDBpbiI+DQo8ZGl2Pg0KPHAg Y2xhc3M9Ik1zb05vcm1hbCI+PGI+RnJvbTo8L2I+PHNwYW4gY2xhc3M9ImFwcGxlLWNvbnZlcnRl ZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPlRFRVAgJmx0OzxhIGhyZWY9Im1haWx0bzp0ZWVwLWJvdW5j ZXNAaWV0Zi5vcmciPnRlZXAtYm91bmNlc0BpZXRmLm9yZzwvYT4mZ3Q7PHNwYW4gY2xhc3M9ImFw cGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxiPk9uIEJlaGFsZiBPZjxzcGFuIGNs YXNzPSJhcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48L2I+TGF1cmVuY2UNCiBM dW5kYmxhZGU8YnI+DQo8Yj5TZW50OjwvYj48c3BhbiBjbGFzcz0iYXBwbGUtY29udmVydGVkLXNw YWNlIj4mbmJzcDs8L3NwYW4+RnJpZGF5LCBKYW51YXJ5IDcsIDIwMjIgMzo1NiBQTTxicj4NCjxi PlRvOjwvYj48c3BhbiBjbGFzcz0iYXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+ QnJlbmRhbiBNb3JhbiAmbHQ7PGEgaHJlZj0ibWFpbHRvOkJyZW5kYW4uTW9yYW5AYXJtLmNvbSI+ QnJlbmRhbi5Nb3JhbkBhcm0uY29tPC9hPiZndDs8YnI+DQo8Yj5DYzo8L2I+PHNwYW4gY2xhc3M9 ImFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPkRhdmUgVGhhbGVyICZsdDs8YSBo cmVmPSJtYWlsdG86ZHRoYWxlcj00MG1pY3Jvc29mdC5jb21AZG1hcmMuaWV0Zi5vcmciPmR0aGFs ZXI9NDBtaWNyb3NvZnQuY29tQGRtYXJjLmlldGYub3JnPC9hPiZndDs7IHRlZXAgJmx0OzxhIGhy ZWY9Im1haWx0bzp0ZWVwQGlldGYub3JnIj50ZWVwQGlldGYub3JnPC9hPiZndDs7IHJhdHMgJmx0 OzxhIGhyZWY9Im1haWx0bzpyYXRzQGlldGYub3JnIj5yYXRzQGlldGYub3JnPC9hPiZndDs8YnI+ DQo8Yj5TdWJqZWN0OjwvYj48c3BhbiBjbGFzcz0iYXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJz cDs8L3NwYW4+UmU6IFtUZWVwXSBbUmF0c10gQ2xhc3MgSUQgY2xhaW0gKGFuZCBvdGhlciBIVyBp ZGVudGlmaWNhdGlvbik8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Rpdj4NCjxk aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj4mbmJzcDs8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPlNvIHJhdGhlciB0aGFuIGEgSFcgQ2xhc3MsIGhv dyBhYm91dCBhIEhXIElQIGNsYWltPyBJdCB3b3VsZCByZXVzZSB0aGUgc2FtZSB0cmlwbGUgZm9y IGlkZW50aWZ5aW5nIEhXLCBPRU0sIE1vZGVsLCBWZXJzaW9uLiBJdCBjb3VsZCBvY2N1ciBhbG9u ZyBzaWRlIHRoZSBIVyBPRU0sIG1vZGVsIGFuZCB2ZXJzaW9uLiBUaGlzIHNlZW1zIGJldHRlciB0 aGFuIG15IGN1cnJlbnQgUFIgYW5kIGxpbmVzIHVwIGJldHRlcg0KIHdpdGggQnJlbmRhbuKAmXMg ZXhhbXBsZXMgYW5kIHdpdGggdGhlIHJlYWxpdHkgdGhhdCBIVyBJUCBjb21lcyBmcm9tIGEgdmVu ZG9yLCBoYXMgbW9kZWxzIGFuZCB2ZXJzaW9ucy4gSeKAmWxsIHdyaXRlIHVwIGEgUFIgZm9yIGl0 IGlmIEkgcmVjZWl2ZSBzb21lIHBvc2l0aXZlIGZlZWRiYWNrIGhlcmUuPG86cD48L286cD48L3A+ DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+Jm5ic3A7PG86cD48 L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj4mbmJzcDs8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pg0KPGRpdj4N CjxwIGNsYXNzPSJNc29Ob3JtYWwiPlRoZSBkaXN0aW5jdGlvbiBiZXR3ZWVuIGNoaXAgYW5kIGRl dmljZSBpcyBpbnRlbmRlZCB0byBiZSBoYW5kbGVkIGJ5IHN1Ym1vZHVsZXMgaW4gRUFULiBTdWJt b2R1bGVzIGNhbiBleHByZXNzIGFyYml0cmFyaWx5IGNvbXBsZXggYXJjaGl0ZWN0dXJlcyBhbmQg ZGV2aWNlIGNvbXBvc2l0aW9ucy48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2 Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9k aXY+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+SSB0aGluayBp dOKAmXMgY2xlYW5lciB0byBrZWVwIHRoZSBIVy1pZGVudGlmeWluZyBjbGFpbXMgc2VwYXJhdGUg ZnJvbSB0aGUgU1ctaWRlbnRpZnkgY2xhaW1zLiBXb3VsZCByZWFsbHkgbGlrZSB0aGUgaWRlbnRp ZmljYXRpb24gb2YgdGhlIFRydXN0ZWQgT1MgVmVuZG9yIGJlIGhhbmRsZWQgYnkgQ29TV0lEIGFu ZCBmcmllbmRzLiBUcnlpbmcgdG8gbWFrZSBzb21lIGNsYWltIHN1aXRhYmxlIGZvciBpZGVudGlm eWluZw0KIGJvdGggU1cgYW5kIEhXIGZvciBhbGwgb2YgYXR0ZXN0YXRpb24gc2VlbXMgb3Zlci1h bWJpdGlvdXMuPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxkaXY+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj4mbmJzcDs8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+ DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPkkgYWxzbyB0aGluayBpdOKAmXMg ZmluZSB0byBkZWZpbmUgc29tZSBjbGFpbXMgYmV0dGVyIHN1aXRlZCB0byB0aGUgVEVFIHdvcmxk IGluIFRFRVAgaWYgd2UgY2Fu4oCZdCBmaW5kIGVub3VnaCBjb21tb24gZ3JvdW5kIGJldHdlZW4g VEVFUCBhbmQgdGhlIHZlcnkgYnJvYWRseSBhcHBsaWNhYmxlIHN0dWZmIHRoYXQgZ29lcyBpbnRv IEVBVC48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNs YXNzPSJNc29Ob3JtYWwiPiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxk aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+TEw8bzpwPjwvbzpwPjwvcD4NCjwvZGl2 Pg0KPC9kaXY+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPiZuYnNwOzxvOnA+ PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+Jm5ic3A7PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxkaXY+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5Ob3RlOiBJIGZpbmQgdGhlIHVzZSBvZiB0aGUgd29yZCDi gJxjbGFzc+KAnSBoZXJlIGNvbmZ1c2luZy4gSWYgSSB3ZXJlIHB1dHRpbmcgVFbigJlzIGludG8g Y2xhc3NlcyBJ4oCZZCB1c2VzIGNsYXNzZXMgbGlrZSBzbWFydC9kdW1iLCBkaXNwbGF5IHR5cGUg KExDRCwgQ1JULCBPTEVEKSBhbmQgc3VjaCB0aGF0IGlkZW50aWZ5IGNoYXJhY3RlcmlzdGljcyBv ZiBUVnMgaW5kZXBlbmRlbnQgb2YgdmVuZG9yIGFuZCBtb2RlbC4NCiAmcXVvdDtTb255IEJyYXZp YSZxdW90OyBpcyBub3QgYSBjbGFzcyBJTU8uIE5vciBpcyDigJxNaWNyb3NvZnQgV2luZG93c+KA nSAoYW4gT1MgdGhlIHJ1bnMgb24gbG90cyBvZiBIVyBwbGF0Zm9ybXMpLiBJ4oCZZCBsaWtlIHRv IG1vdmUgYXdheSBmcm9tIHRoZSB3b3JkLjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4N CjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+Jm5ic3A7PG86cD48L286cD48L3A+ DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj4mbmJz cDs8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y bWFsIj48YnI+DQo8YnI+DQo8YnI+DQo8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGJsb2NrcXVv dGUgc3R5bGU9Im1hcmdpbi10b3A6NS4wcHQ7bWFyZ2luLWJvdHRvbTo1LjBwdCI+DQo8ZGl2Pg0K PGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPk9uIEphbiA0LCAyMDIyLCBhdCAzOjA2IEFNLCBC cmVuZGFuIE1vcmFuICZsdDs8YSBocmVmPSJtYWlsdG86QnJlbmRhbi5Nb3JhbkBhcm0uY29tIj5C cmVuZGFuLk1vcmFuQGFybS5jb208L2E+Jmd0OyB3cm90ZTo8bzpwPjwvbzpwPjwvcD4NCjwvZGl2 Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+Jm5ic3A7PG86cD48L286cD48 L3A+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPkkg dGhpbmsgZGV2aWNlcyB3aWxsIG5lZWQgdG8gcmVwb3J0IG11bHRpcGxlIHZlbmRvci9jbGFzcyBw YWlycy48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv Tm9ybWFsIj4mbmJzcDs8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pg0KPGRp dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPkZvciBleGFtcGxlLCBBIG1vYmlsZSBkZXZpY2UgY291 bGQgcG90ZW50aWFsbHkgY29udGFpbjo8c3BhbiBjbGFzcz0iYXBwbGUtY29udmVydGVkLXNwYWNl Ij4mbmJzcDs8L3NwYW4+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2Pg0KPHAg Y2xhc3M9Ik1zb05vcm1hbCI+MS4gQSBNb2JpbGUgRGV2aWNlIE9FTSBWZW5kb3IgSUQ8bzpwPjwv bzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt YWwiPjIuIEEgU2lsaWNvbiB2ZW5kb3LigJlzIFZlbmRvciBJRDxvOnA+PC9vOnA+PC9wPg0KPC9k aXY+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+My4gQW4gSVAg dmVuZG9y4oCZcyBWZW5kb3IgSUQ8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8ZGl2 Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9k aXY+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+VGhpcyBpcyBu b3QgYW4gZXhoYXVzdGl2ZSBsaXN0LjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxk aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+Jm5ic3A7PG86cD48L286cD48L3A+DQo8 L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5Gb3IgQXJt IFRydXN0IFpvbmUgVEVFcywgSSB3b3VsZCBleHBlY3QgdG8gc2VlOjxvOnA+PC9vOnA+PC9wPg0K PC9kaXY+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+MS4gVGhl IEFybSBWZW5kb3IgSUQgKyB0aGUgcHJvY2Vzc29yIGNvcmXigJlzIENsYXNzIElEPG86cD48L286 cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFs Ij4yLiBUaGUgVHJ1c3RlZCBPUyBWZW5kb3IgSUQgKyB0aGUgVHJ1c3RlZCBPUyBDbGFzcyBJRDxv OnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z b05vcm1hbCI+My4gVGhlIFNpbGljb24gdmVuZG9y4oCZcyBWZW5kb3IgSUQgKyB0aGUgcHJvY2Vz c29yIENsYXNzIElEPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxkaXY+ DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj40LiBUaGUgRGV2aWNlIE9FTeKAmXMgVmVuZG9yIElEICsg dGhlIGRldmljZSBDbGFzcyBJRDxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8L2Rpdj4NCjxkaXY+ DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+Jm5ic3A7PG86cD48L286cD48L3A+DQo8L2Rp dj4NCjwvZGl2Pg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5DaGVlcnMsPG86 cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv Tm9ybWFsIj5CcmVuZGFuPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxk aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PGJyPg0KPGJyPg0KPGJyPg0KPG86cD48 L286cD48L3A+DQo8L2Rpdj4NCjxibG9ja3F1b3RlIHN0eWxlPSJtYXJnaW4tdG9wOjUuMHB0O21h cmdpbi1ib3R0b206NS4wcHQiPg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5P biAzIEphbiAyMDIyLCBhdCAyMTowMCwgRGF2ZSBUaGFsZXIgJmx0OzxhIGhyZWY9Im1haWx0bzpk dGhhbGVyPTQwbWljcm9zb2Z0LmNvbUBkbWFyYy5pZXRmLm9yZyI+ZHRoYWxlcj00MG1pY3Jvc29m dC5jb21AZG1hcmMuaWV0Zi5vcmc8L2E+Jmd0OyB3cm90ZTo8bzpwPjwvbzpwPjwvcD4NCjwvZGl2 Pg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+Jm5ic3A7PG86cD48L286cD48 L3A+DQo8L2Rpdj4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5 bGU9ImZvbnQtc2l6ZTo5LjBwdDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDssc2Fu cy1zZXJpZiI+TGF1cmVuY2UgTHVuZGJsYWRlIHdyb3RlOjxicj4NCjxicj4NCjxicj4NCjwvc3Bh bj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGJsb2NrcXVvdGUgc3R5bGU9Im1hcmdpbi10b3A6 NS4wcHQ7bWFyZ2luLWJvdHRvbTo1LjBwdCI+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+ PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTo5LjBwdDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2Em cXVvdDssc2Fucy1zZXJpZiI+SSB0YWxrZWQgdG8gRGF2ZSB3aGljaCByZXN1bHRlZCBpbiByZW9y aWVudGF0aW9uIG9mIG15IHVuZGVyc3RhbmRpbmcgb2YgQ2xhc3MgSUQgaW4gVEVFUC48YnI+DQo8 YnI+DQpDbGFzcyBJRCBiYXNpY2FsbHkgaWRlbnRpZmllcyBIVyBJUCBmcm9tIGEgSFcgZGVzaWdu ZXIgbGlrZSBBcm0gb3IgU3lub3BzaXMgdGhhdCBpcyBpbnRlZ3JhdGVkIGludG8gY2hpcHMgbWFk ZSBieSB2YXJpb3VzIEhXIE9FTXMgbGlrZSBRdWFsY29tbSwgU2Ftc3VuZyBhbmQgQXBwbGUuIFRo ZSB0ZXJtIHVzZWQgZnJlcXVlbnRseSBmb3IgdGhpcyBpcyAmcXVvdDtJUCZxdW90OyAoSSBrbm93 IHRoaXMgd2VsbCBmcm9tIG15IGRheXMgd29ya2luZyBvbiBIVyBhdCBRdWFsY29tbSkuPGJyPg0K PGJyPg0KSSd2ZSBjcmVhdGVkIGEgUFIgZm9yIEhXIENsYXNzLjxicj4NCjxicj4NClNpbmNlIHdo YXQgaXMgaWRlbnRpZmllZCBzcGFucyBPRU1zLCB0aGlzIG11c3QgYmUgYSBnbG9iYWxseSB1bmlx dWUgaWRlbnRpZmllci4gV2UgbmVlZCB0byBiZSBleHBsaWNpdCBhYm91dCB0aGF0LjxzcGFuIGNs YXNzPSJhcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnI+DQo8YnI+DQpJIGtu b3cgb2YgZm91ciB3YXlzIHRvIGhhdmUgYSBnbG9iYWwgaWRlbnRpZmllcjo8YnI+DQotIFVzZSBP SURzPGJyPg0KLSBVc2UgRE5TIC8gVVJJPGJyPg0KLSBQcm9iYWJpbGlzdGljYWxseSB1c2luZyBh IGJpZyBlbm91Z2ggYnl0ZSBzdHJpbmc8YnI+DQotIEEgbmV3IHJlZ2lzdHJ5LCBwZXJoYXBzIElB TkEgKGJ1dCB3ZSBwcm9iYWJseSBkb24ndCB3YW50IHRoaXMpPGJyPg0KPGJyPg0KVGhlIFBSIGFs bG93cyBhbGwgYnV0IHRoZSBsYXN0LCBidXQgdGhpcyBjb3VsZCBiZSByZWR1Y2VkIHRvIGp1c3Qg b25lIG9yIHR3byBvZiB0aGUgYWJvdmUuPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8 L2Jsb2NrcXVvdGU+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gc3R5bGU9ImZv bnQtc2l6ZTo5LjBwdDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDssc2Fucy1zZXJp ZiI+PGJyPg0KUFIgbG9va3MgZ3JlYXQgdG8gbWUsIGV4Y2VwdCB0aGF0IHdvdWxkIEkgYWdyZWUg d2l0aCByZWR1Y2luZyBpdCB0byBvbmUgb3IgdHdvLjxicj4NClNpbmNlIHRoZSBhYmlsaXR5IHRv IHRha2UgYSB2YWx1ZSBhbmQgcmVzb2x2ZSBpdCB0byBzb21ldGhpbmcgbWVhbmluZ2Z1bCBpcyB1 c2VmdWwgaW4gbWFueSBjYXNlcyAobG9nZ2luZywgd2lyZXNoYXJrIGFuYWx5c2lzLCBldGMuKSwg SSB3b3VsZCByZW1vdmUgdGhlIHRoaXJkIG9wdGlvbi48YnI+DQo8YnI+DQpPSURzLCBlbmNvZGVk IGFzIGludCBhcnJheXMsIHByb2JhYmx5IGNvbXByZXNzIHRoZSBiZXN0IHNvIGlmIG9ubHkgb25l LCB0aGVuIEknZCBwaWNrIHRoYXQgb25lLiAmbmJzcDtVUklzIGFyZSBjb252ZW5pZW50IHRob3Vn aCBhbHNvIHNvIGlmIHR3bywgdGhlbiB0aGF0J3MgbXkgc2Vjb25kIHBpY2suPHNwYW4gY2xhc3M9 ImFwcGxlLWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjxicj4NCjxicj4NCjxicj4NCjxi cj4NCjwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGJsb2NrcXVvdGUgc3R5bGU9Im1h cmdpbi10b3A6NS4wcHQ7bWFyZ2luLWJvdHRvbTo1LjBwdCI+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z b05vcm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTo5LjBwdDtmb250LWZhbWlseTomcXVvdDtI ZWx2ZXRpY2EmcXVvdDssc2Fucy1zZXJpZiI+SSBkb24ndCBzZWUgdGhpcyBjbGFpbSBhcyBlc3Nl bnRpYWwgZm9yIEVBVCwgYnV0IEkgY29tbWl0dGVkIHRvIHdvcmtpbmcgdGhyb3VnaCB0aGlzIHdp dGggVEVFUC4gSSdtIGZpbmUgd2l0aCB0aGlzIFBSIGdvaW5nIGludG8gYSBURUVQIGRvY3VtZW50 IHJhdGhlciB0aGFuIEVBVC48L3NwYW4+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjwvYmxvY2tx dW90ZT4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXpl OjkuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90OyxzYW5zLXNlcmlmIj48YnI+ DQpUaGUgbm90aW9uIG9mIEhXIGNsYXNzIElEIGlzIG5vdCBzcGVjaWZpYyB0byBURUVzLCBoZW5j ZSB0aGUgcmVxdWVzdCB0byBwdXQgaXQgaW4gRUFUIHJhdGhlciB0aGFuIGluIGFueXRoaW5nIHRo YXQgd291bGQgaW1wbHkgdXNlIGlzIGxpbWl0ZWQgdG8gVEVFcyAoaGVuY2Ugbm90IGluIGEgVEVF UCBkb2N1bWVudCkuPGJyPg0KPGJyPg0KLURhdmU8YnI+DQo8YnI+DQpfX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXzxicj4NClRFRVAgbWFpbGluZyBsaXN0PGJy Pg0KPC9zcGFuPjxhIGhyZWY9Im1haWx0bzpURUVQQGlldGYub3JnIj48c3BhbiBzdHlsZT0iZm9u dC1zaXplOjkuMHB0O2ZvbnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90OyxzYW5zLXNlcmlm Ij5URUVQQGlldGYub3JnPC9zcGFuPjwvYT48c3BhbiBzdHlsZT0iZm9udC1zaXplOjkuMHB0O2Zv bnQtZmFtaWx5OiZxdW90O0hlbHZldGljYSZxdW90OyxzYW5zLXNlcmlmIj48YnI+DQo8L3NwYW4+ PGEgaHJlZj0iaHR0cHM6Ly9uYW0wNi5zYWZlbGlua3MucHJvdGVjdGlvbi5vdXRsb29rLmNvbS8/ dXJsPWh0dHBzJTNBJTJGJTJGd3d3LmlldGYub3JnJTJGbWFpbG1hbiUyRmxpc3RpbmZvJTJGdGVl cCZhbXA7ZGF0YT0wNCU3QzAxJTdDZHRoYWxlciU0MG1pY3Jvc29mdC5jb20lN0NlZjY1MmRlNzBj MDQ0YzlmZjIzNDA4ZDlkMjM5NTU3MCU3QzcyZjk4OGJmODZmMTQxYWY5MWFiMmQ3Y2QwMTFkYjQ3 JTdDMSU3QzAlN0M2Mzc3NzE5NjY2NzgyODkyMTUlN0NVbmtub3duJTdDVFdGcGJHWnNiM2Q4ZXlK V0lqb2lNQzR3TGpBd01EQWlMQ0pRSWpvaVYybHVNeklpTENKQlRpSTZJazFoYVd3aUxDSlhWQ0k2 TW4wJTNEJTdDMTAwMCZhbXA7c2RhdGE9ZWtrU3JhOXllVnh1NVBjczJXclZQUFNzNjJMR2F0VlR4 a3FEY3B0cDVQUSUzRCZhbXA7cmVzZXJ2ZWQ9MCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZTo5LjBw dDtmb250LWZhbWlseTomcXVvdDtIZWx2ZXRpY2EmcXVvdDssc2Fucy1zZXJpZiI+aHR0cHM6Ly93 d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby90ZWVwPC9zcGFuPjwvYT48bzpwPjwvbzpwPjwv cD4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Jsb2NrcXVvdGU+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFz cz0iTXNvTm9ybWFsIj4mbmJzcDs8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Rp dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5JTVBPUlRBTlQgTk9USUNFOiBUaGUgY29u dGVudHMgb2YgdGhpcyBlbWFpbCBhbmQgYW55IGF0dGFjaG1lbnRzIGFyZSBjb25maWRlbnRpYWwg YW5kIG1heSBhbHNvIGJlIHByaXZpbGVnZWQuIElmIHlvdSBhcmUgbm90IHRoZSBpbnRlbmRlZCBy ZWNpcGllbnQsIHBsZWFzZSBub3RpZnkgdGhlIHNlbmRlciBpbW1lZGlhdGVseSBhbmQgZG8gbm90 IGRpc2Nsb3NlIHRoZSBjb250ZW50cyB0byBhbnkgb3RoZXIgcGVyc29uLA0KIHVzZSBpdCBmb3Ig YW55IHB1cnBvc2UsIG9yIHN0b3JlIG9yIGNvcHkgdGhlIGluZm9ybWF0aW9uIGluIGFueSBtZWRp dW0uIFRoYW5rIHlvdS48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Rpdj4NCjwv YmxvY2txdW90ZT4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Rpdj4NCjwvYmxvY2txdW90ZT4NCjwvZGl2 Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rpdj4NCjwv ZGl2Pg0KPC9kaXY+DQo8L2JvZHk+DQo8L2h0bWw+DQo= --_000_SJ0PR02MB835349B4342ED13265A7A55D814E9SJ0PR02MB8353namp_-- From nobody Sat Jan 8 13:28:45 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA0E93A003C; Sat, 8 Jan 2022 13:28:38 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.899 X-Spam-Level: X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id r0520Mtdzwga; Sat, 8 Jan 2022 13:28:34 -0800 (PST) Received: from gabriel-smtp.zfn.uni-bremen.de (gabriel-smtp.zfn.uni-bremen.de [IPv6:2001:638:708:32::15]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 544FA3A00E9; Sat, 8 Jan 2022 13:28:34 -0800 (PST) Received: from smtpclient.apple (p5089a436.dip0.t-ipconnect.de [80.137.164.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-smtp.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4JWY9S6D76zDCcX; Sat, 8 Jan 2022 22:28:28 +0100 (CET) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 15.0 \(3693.40.0.1.81\)) From: Carsten Bormann In-Reply-To: Date: Sat, 8 Jan 2022 22:28:28 +0100 Cc: Laurence Lundblade , Brendan Moran , teep , rats Content-Transfer-Encoding: quoted-printable Message-Id: <4D76609F-2594-4EC1-88C0-A2D47A2EA199@tzi.org> References: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> <8466B6E2-C335-4173-A2A2-3CCA555D28CA@arm.com> <62743D24-49F4-4480-9561-F00DA513C9FF@island-resort.com> To: Dave Thaler X-Mailer: Apple Mail (2.3693.40.0.1.81) Archived-At: Subject: Re: [Teep] [Rats] Class ID claim (and other HW identification) X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 08 Jan 2022 21:28:39 -0000 On 8. Jan 2022, at 01:07, Dave Thaler = wrote: >=20 > =E2=80=9CIP=E2=80=9D (as in Intellectual Property, not Internet = Protocol) is not the right term in my view since that implies there = actually is some IP as opposed to (say) conformance to a standard. I am = fine with =E2=80=9CClass=E2=80=9D as you had it in the PR, but I think = =E2=80=9CIP=E2=80=9D is too narrow in implication. +1 about not wanting =E2=80=9CIP=E2=80=9D as in productized silicon = design library. The scope of the assertion you can make based on having = licensed such a package is not well-defined; I don=E2=80=99t know what a = TEEP party could do with such an identifier. As Brendan notes, a device may need to be in (subject of claims about) = multiple =E2=80=9Cclasses=E2=80=9D. The term =E2=80=9Cclass=E2=80=9D = can then be confusing to people who think about =E2=80=9Cthe class=E2=80=9D= of an item. Maybe it=E2=80=99s not productive to try to group these kinds of = identifiers into =E2=80=9Cclasses=E2=80=9D, =E2=80=9CIP=E2=80=9D, =E2=80=A6= =E2=80=94 maybe you just need an assertion about the device and an = identifier. Just using an opaque byte string here is not very = efficient, as these need to be long and random to be distinct (and you = can=E2=80=99t look them up, as Dave noted). On an unrelated point, if you *really* want to do something with ASN.1 = OIDs, there is also RFC 9090 (I=E2=80=99m just the messenger here, this = is not really =E2=80=9Cmy=E2=80=9D RFC=E2=80=A6). I=E2=80=99d rather do a new registry, though... Gr=C3=BC=C3=9Fe, Carsten From nobody Sat Jan 8 14:15:45 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D10863A1065 for ; Sat, 8 Jan 2022 14:15:43 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.896 X-Spam-Level: X-Spam-Status: No, score=-1.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TB-8T_f79Mkd for ; Sat, 8 Jan 2022 14:15:39 -0800 (PST) Received: from p3plsmtpa09-10.prod.phx3.secureserver.net (p3plsmtpa09-10.prod.phx3.secureserver.net [173.201.193.239]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A652C3A1069 for ; Sat, 8 Jan 2022 14:15:38 -0800 (PST) Received: from [192.168.1.3] ([75.80.148.243]) by :SMTPAUTH: with ESMTPSA id 6JztnpfqWY4u86JztnmxWm; Sat, 08 Jan 2022 15:15:38 -0700 X-CMAE-Analysis: v=2.4 cv=YIFadTKx c=1 sm=1 tr=0 ts=61da0d0a a=VPU1mRQhDhA4uSX60JRRww==:117 a=VPU1mRQhDhA4uSX60JRRww==:17 a=gKmFwSsBAAAA:8 a=SopJmN_s7HAEOkL2v2IA:9 a=QEXdDO2ut3YA:10 a=GtyggCoL_0u35hOK:21 a=_W_S_7VecoQA:10 a=nnPW6aIcBuj1ljLj_o6Q:22 X-SECURESERVER-ACCT: lgl@island-resort.com From: Laurence Lundblade Message-Id: Content-Type: multipart/alternative; boundary="Apple-Mail=_2912D947-AA1F-4CE4-A069-94AC6C99660C" Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.1\)) Date: Sat, 8 Jan 2022 14:15:37 -0800 In-Reply-To: <4D76609F-2594-4EC1-88C0-A2D47A2EA199@tzi.org> Cc: Dave Thaler , Brendan Moran , teep , rats To: Carsten Bormann References: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> <8466B6E2-C335-4173-A2A2-3CCA555D28CA@arm.com> <62743D24-49F4-4480-9561-F00DA513C9FF@island-resort.com> <4D76609F-2594-4EC1-88C0-A2D47A2EA199@tzi.org> X-Mailer: Apple Mail (2.3608.120.23.2.1) X-CMAE-Envelope: MS4xfMwXNsZ6BPB0cW/vtj5XHcDuTNQeHczCYe4qs/5+5YGZi6LEkbnqiU0Wynz5vL5LFNfJ6paRdi1KcVdjFe698imHTxnV2/Um9xwdvrAFScYHtlcsRMOJ 9/owRxJG9Qi590buME8OKv3XrapL1NtMP8ToELjYFRZnKKIbGltFPHhKaEW4dFG4WKPSfBM5aSlSzzArm8ct0L4/e16Cgz2ZbPWQiru2S91gRNKBhbmI1jo3 Fetsuh8JIy5GZ6BqQq/ZnorLjWofAgabcu+Jab1GAfs099yUfYNFY4ndTbENLMGfp2QwS7bvZFcpEA9jfADuyw== Archived-At: Subject: Re: [Teep] [Rats] Class ID claim (and other HW identification) X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 08 Jan 2022 22:15:44 -0000 --Apple-Mail=_2912D947-AA1F-4CE4-A069-94AC6C99660C Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 > On Jan 8, 2022, at 1:28 PM, Carsten Bormann wrote: >=20 > +1 about not wanting =E2=80=9CIP=E2=80=9D as in productized silicon = design library. The scope of the assertion you can make based on having = licensed such a package is not well-defined; I don=E2=80=99t know what a = TEEP party could do with such an identifier. The industry doesn=E2=80=99t use =E2=80=9CIP=E2=80=9D here to mean there = are actual patents filed or that it is even a product. It means =E2=80=9Ca= generic silicon design=E2=80=9D. Maybe think of it as =E2=80=9Cfunction=E2= =80=9D in SW. Seems that HW people started using the term this way = because there were often actual patents, but then it got applied = generically. People use words in weird ways sometimes. Just happens.=20 This is definitely not about anything legal, financial or ownership. I = agree legal status is not useful criteria in an attestation claim. The important question is whether a claim to identify generic silicon = designs is useful, what it looks like and how it actually gets used (by = TEEP). LL --Apple-Mail=_2912D947-AA1F-4CE4-A069-94AC6C99660C Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8
On = Jan 8, 2022, at 1:28 PM, Carsten Bormann <cabo@tzi.org> = wrote:

+1 about not wanting =E2=80=9CIP=E2= =80=9D as in productized silicon design library.  The scope of the = assertion you can make based on having licensed such a package is not = well-defined; I don=E2=80=99t know what a TEEP party could do with such = an identifier.

The industry doesn=E2=80=99t use =E2=80=9CIP=E2=80=9D here to = mean there are actual patents filed or that it is even a product. It = means =E2=80=9Ca generic silicon design=E2=80=9D. Maybe think of it as = =E2=80=9Cfunction=E2=80=9D in SW. Seems that HW people started using the = term this way because there were often actual patents, but then it got = applied generically.  People use words in weird ways sometimes. = Just happens. 

This is definitely not about anything legal, financial or = ownership. I agree legal status is not useful criteria in an attestation = claim.

The = important question is whether a claim to identify generic silicon = designs is useful, what it looks like and how it actually gets used (by = TEEP).

LL

= --Apple-Mail=_2912D947-AA1F-4CE4-A069-94AC6C99660C-- From nobody Sat Jan 8 14:23:35 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B3C183A1092; Sat, 8 Jan 2022 14:23:29 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.614 X-Spam-Level: X-Spam-Status: No, score=-2.614 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, NICE_REPLY_A=-0.714, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=fraunhofer.onmicrosoft.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xDb2JnBmc8Q5; Sat, 8 Jan 2022 14:23:25 -0800 (PST) Received: from mail-edgeDD24.fraunhofer.de (mail-edgeDD24.fraunhofer.de [192.102.167.24]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2A88F3A10AC; Sat, 8 Jan 2022 14:23:22 -0800 (PST) IronPort-SDR: a/T5dYi4wMVW7gVAK6ckD4BZaweqALnDf2FnLmknKUfcqyotMf0+PfYyAsExuzStySZ+O+xqk+ eTieLNurHvzA== X-IPAS-Result: =?us-ascii?q?A2H8AwDpDdph/xmkZsBQChsBAQEBAQEBAQUBAQESAQEBA?= =?us-ascii?q?wMBAQFAgVkCgVAtKH6BQgKERoNIAQGFOYUOXYF3LgOBE5oMgUKBEQMYFiAGC?= =?us-ascii?q?wEBAQEBAQEBAQgBKgsMBAEBAwSEfwKDRQElOBMBAgQBAQEBAwIDAQEBAQUBA?= =?us-ascii?q?QYBAQEBAQEFBAICgRiFLwwBByUNQAEBAQMHBIIfY0oDBjUBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEFAggFNBkFKQgEEgEBHQEBAQECA?= =?us-ascii?q?QEBEBEPAQUIAQEsAgkBBAsJAhEEAQEBAgIjAwICJwsUCQgGAQwBBQIBAR6CX?= =?us-ascii?q?AGCZQMNIAEBDpEojzYBgToCih96gTGBAYIIAQEGBASBNgGBG4I5GFuBWwMGC?= =?us-ascii?q?QGBBioBgw2HHIMNeycQgVVEJm8nD4FzSjc+gmMBAQEBAYEnAQEHBAcBTYJsg?= =?us-ascii?q?mWPaBNWJgQMHwcBHjYCAhI7BwULFQhUERULJDwSjkKDGBwTEw0FjRGeVXo0B?= =?us-ascii?q?4IPgTaBNgYLiTGNW4ZkBhQug3BDi0aGI5FPljogjGOUJAQYhGsCBAIEBQIOA?= =?us-ascii?q?QEGgXgyXHBNJE+CaVEZD4ZvgkqEZ4ElAQKCSYUUhUtzAgsrAgYBCgEBAwmIX?= =?us-ascii?q?IFTgimCRgEB?= IronPort-PHdr: A9a23:xBF6qBxnpZRuhXHXCzPRngc9DxPP8534PQ8Qv5wgjb8GMqGu5I/rM 0GX4/JxxETIUoPW57Mh6aLWvqnsVHZG7cOHt3YPI5BJXgUO3MMRmQFoCcWZCEr9efjtaSFyH MlLWFJ/uX+hNk0AA8fiIVPIq2C07TkcFw+5OQcmTtk= X-IronPort-Anti-Spam-Filtered: true X-IronPort-AV: E=Sophos;i="5.88,273,1635199200"; d="scan'208";a="48531312" Received: from mail-mtaf25.fraunhofer.de ([192.102.164.25]) by mail-edgeDD24.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Jan 2022 23:23:19 +0100 IronPort-SDR: oX4tYKAfCF5Pzyj17Y3turNum4n0wY/Qen5IMDS7A0Jots9u/BeHqU6zGH7wV4vEwhD0nPNDEj UV/QZ3vtnov1bdL7F+ziKeQZHnkSPqgzA= X-IPAS-Result: =?us-ascii?q?A0DTAABJDtphl3+zYZlQChsBAQEBAQEBAQUBAQESAQEBA?= =?us-ascii?q?wMBAQFACYFQAoFQLSh+WSZDAoRFg0gBAYU5hQ5dAYF2LgM4AVqaDIFCgREDV?= =?us-ascii?q?AsBAwEBAQEBCAEqCwwEAQGFBgKDQgImOBMBAgQBAQEBAwIDAQEBAQUBAQUBA?= =?us-ascii?q?QECAQEFBBQBAQEBAQEBAQkbBgwFDksGXgZogU+BYRMLBwEHJQ1AAQEBAwcEh?= =?us-ascii?q?XEBAQEBAgEBARARDwEFCAEBFBgCCQEECwkCEQQBAQECAiMDAgInCwcNCQgGA?= =?us-ascii?q?QwBBQIBAR6CXAGCZQMNIAEBDpEnjzYBgToCih96gTGBAYIIAQEGBASBNgGBG?= =?us-ascii?q?4I5GFuBWwMGCQGBBioBgw2HHIMNezeBVUQmbycPgXNKNz6CYwEBAQEBgScBA?= =?us-ascii?q?QcEBwFNgmyCZY9oE1YmBAwfBwEeNgICEjsHBQsVCFQRFQskPBKOQoMYHBMTD?= =?us-ascii?q?QWNEZ5VejQHgg+BNoE2BguJMY1bhmQGFC6DcEOLRoYjkU+WOiCMY5QkBBiEa?= =?us-ascii?q?wIEAgQFAg4BAQaBeDFccE0kT4JpTgECAQINAQICAwECAQIJAQEChmyCSoRnG?= =?us-ascii?q?YEMAQKCSYUUhUtCMQILKwIGAQoBAQMJiFyBU4IpgkYBAQ?= IronPort-PHdr: A9a23:1zee6ROTxOWA3NULVf0l6ncLWUAX0o4cdiYZ6Zsi3rRJdKnrv5HvJ 1fW6vgliljVFZ7a5PRJh6uz0ejgVGUM7IzHvCUEd5pBBBMAgN8dygonBsPNAEbnLfnsOio9G skKVFJs83yhd0ZPH8OrfFzO5HOo5CMUGhLxOBAzKummcrM= IronPort-Data: A9a23:UqJMUKloKhkamPesaisYMjzo5gxMIERdPkR7XQ2eYbSJt1+Wr1Gzt xIZDGvQMqmNYmL3fIslaIzgp04C757WnYVkQVFtpS02HltH+JHPbTi7wugcHM8ywunrFh8PA xA2M4GYRCwMZiaH4ErrbtANlFEkvU2ybuOU5NXsZ2YhFWeIdA970Ug5w7dh0tYy6TSEK1rlV e3a85W31GCNhmYc3lI8s8pvfzs24ZweEBtB1rAPTagjUG32zhH5P7pDTU2FFEYUd6EPdgKMq 0Yv+5nilo/R109F5tpICd8XeGVSKlLZFVDmZna7x8FOjzAazhHe3JrXO9IFVngP1DTTx+pgi /dAs7DrYAggAvf1zbF1vxlwS0mSPIVd/aPfZ3WvuszVwVfPbn3sxPtjFgc6MOX0+M4uXDoIp KNecW9cKEnZ2Ipaw5rjIgVorsQuKsqtNoIFuXFnySPxFvc6B57ZSrjM5dhW0S12is0m8fP2P pRCM2c1NEqZC/FJEns6OKJvlbeOuimlby9e91ispZt0zmeGmWSd15C3aYGMIYzbLSlPpW6Cr 37d12X0Hh9cM8aQoRKZ/3+0ru7CgS29X5gdfJW06v5jhFCJkzBLDRwdT1ygpvelzEW5XvpTL kUO8WwvoLQ8skuxQbHVUwG4qXqJpDYZWtFKFPY95h3Lwa3Riy6dCWwsTyVFYdoq8dU7Xjswy hmCmNaBLTlmtrGEQHe176uV6yqvMCweKmoHIyQDSGM4D8LL+dxoy0OQC488Qevs1IKzBzS2y HaEtiEjgbUUg8MRkam2lbzav96yjoH2cVZq51+PZHPmzA5/SNWMaIWUs2GOuJ6sM72lZlWGu XEFne2X4+YPEYyBmUSxrAMlQO/BCxGtbGy0vLJ/I3Uy32n0oS/yJui89BkveBYwaq7obBezO Be7hO9H2HNEFFeHBZKbjqroVp9vnPelTIu0E6mOMZxQZ956MgGd9TxoZUme0nqrnEVEfUAD1 XWzLJjE4ZUyU/8PIN+KqwE1iuNDKscWnjO7eHwD5077uYdynVbMIVv/DHOAb/oi8ISPqxjP/ tBUOqOikksDCbOgPHePqdJKfDjmyETX47ip8aS7kcbce2Jb9J0JUaCJqV/cU9M0xPsNzLugE o+VAREAkwaXaYL7xfWiMCk4Mei/DP6TXFo3MDEwJl2o1mNrb4G196wfap04Zr8q6P4L8BKHZ 6ZtRil0OdwWEm6v021ENfHV9dU+HDz21VPmF3f0O1AXIs8/LzElD/e5J2MDAgFVVXHp3Sb/y pX9vj7mrW0rHFU9XJ2IOaP2nztcfxE1wYpPYqcBGfELEG2EzWSgA3aZYiYfL55eJBPd6CGd0 grKUx4UqfOU/N0u8cWPi7qNsoGpFOVzBAxWEjCDv7qxMCDb+EulwJNBCbrZI2qCCTmsoKjyN /9Iy/zcMeEcmAgYuYRLE4FtkfA06ezpquII1Q9jBnjKMw+mB+o4cHmL1MVCrINXwbpdtVfkU 06D4IAFa66IJIXrClcMIgoiYOmZk/0Zw2GA4fMwKUT8xSl24LveDRQMZUbR0nQFIeIsYo0/w OontMoH0CCFi0InYoSckyRZ12WQNXheAa8pgZEtBtO5gAQczFwfM4fXDTX74c3UZthBbhsqL zuTiPaQjrhQ3BCZIWE2CWCL0PpWhdIAohlXyl8FKVmT3NbI36dl0BpU+DUxbwJU0hQej7MtY Dc2bRUtKPXc5SpsiehCQ3uoR1NLCiqf9xGj0FAOjmDYExSlWzCfNmE7IurRrkkV/3gHJWoCo erdmTmgCGm7OZirgW0sXAhu7fL5RMF39grMldrhE8ncR8s2Zj/sg6mPY2sUqkK7UJ1r2xCd/ bFnrLRqdKn2FS8MuKlnWYOU4rIdFUKfL2tYTPA9oa4EEAkwot1pNeRi9qxpRv5wGg== IronPort-HdrOrdr: A9a23:+nqTra2OyVdQAygKNnj1iAqjBSdyeYIsimQD101hICG9Lfb2qy n+ppgmPEHP5Qr5OEtApTiBUJPwJU80hqQFnbX5Wo3SIzUO2VHYUb2KiLGN/9SOIVyHygcw79 YHT0E6MqyLMbEYt7eL3ODbKadY/DDvysnB7o2/vhRQpENRGsZdBm9Ce3em+yZNNWt77PQCZf +hD4Z81kGdkSN9VLXEOpBJZZmPmzWN/6iWFSIuNloC0k2jnDmo4Ln1H1yx2QofaSpGxfMH/X LemwL0y62/u7XjoyWsmFP73tBzop/M29FDDMuDhow8LSjtsB+hYMBEV6eZtD44jemz4BIBkc XKoT0nI8NvgkmhMl2dkF/I4U3NwTwu43jtxRuxhmbim9XwQHYAB89IletiA1PkwntlmOs5/L NA3mqfuZYSJwjHhj7B69/BUAwvvlaooFI5+NRjz0B3YM87Uvt8vIYf9ERaHNMrByTh8r0qF+ FoEYX1+OtWS1WHdHrU11MfgeBEZk5DXCtuf3Jy//B8i1Nt7TREJgojtYIid047hdEAo8Iu3Z WCDkxq/Is+B/P+I5gNQtvpevHHeFAldyi8Rl56EW6XZ53vBEi93qIfwI9Fr91CK6Z4hqfbpv z6ISRlXCgJChvTNfE= X-IronPort-Anti-Spam-Filtered: true X-IronPort-AV: E=Sophos;i="5.88,273,1635199200"; d="scan'208";a="163252061" Received: from 153-97-179-127.vm.c.fraunhofer.de (HELO smtp.exch.fraunhofer.de) ([153.97.179.127]) by mail-mtaF25.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Jan 2022 23:23:13 +0100 Received: from XCH-HYBRID-03.ads.fraunhofer.de (10.225.9.57) by XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Sat, 8 Jan 2022 23:23:12 +0100 Received: from EUR04-DB3-obe.outbound.protection.outlook.com (104.47.12.54) by XCH-HYBRID-03.ads.fraunhofer.de (10.225.9.57) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Sat, 8 Jan 2022 23:23:12 +0100 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=CQqVyfRlGyM7F8LGlvtwgHHLqgyASHdxfewOnICHKRcy9otlVGX8pioyZLlMHag8gEc7svsd1C/l46MOfOwIkde/dZ72zFjCAI4/4bgN4+r6Yd/L1iz803oxrUGszCGbqK2Nh5Euo0m4jPuaJvlis88/4pIRm2S4QLVwZZSd4az3YaiGNN7vqeozixJ7dIm+xrd1laUtp9oxNkwXjpZysI26rwZeOCY+lzuwhxZcbno/plT2o1TyT3yBRiuTzLCW9QRWDKrv8DVYQ+mLnEWmb31m5L00Q7e4MooMEimrj6APtBv+PiDUO4TTRRpGVI8I0TLxJoWVOl8wXrJIKY/xIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=0ngF85ieeLx0bgRrBhh6RLF47MOC62jpykWmRGzDoGM=; b=c7fIW85sdDFgqFkIf2NY/pZDl5JUJrwidGq6KJ+1pp1hrvwh/aON63teBUaz/P+cCwYQVUQcARJml+SpmesK/mUKdmu1DMiE6M3pshQfZqLRQjvCwpnodnNWUrNnETxdWHEMaMiDxjiFYa5CYwZGs4YGQpWayRLdkCxKaOBYxd7OdknN2sXfkPcuIHiYFX1F5QPsk6/hV9E0v6bBtbJACri9KOEZm/GDaGBIXnTIplEoNfar0zeagW2qnMV82lbQSeHBIqClVUGlvNrKMJC8NG1vYg7xVh1l/J6XFcCE7T0DmJqx1fZEvjC/VM5TkfxRyr0mhkxbZaPZmsDpjmfRNA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=sit.fraunhofer.de; dmarc=pass action=none header.from=sit.fraunhofer.de; dkim=pass header.d=sit.fraunhofer.de; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fraunhofer.onmicrosoft.com; s=selector2-fraunhofer-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=0ngF85ieeLx0bgRrBhh6RLF47MOC62jpykWmRGzDoGM=; b=WgpfTlG56PGDm/iwrcOWP+cXr0bk3cxJcslPsGfy1TcGe+G5p2C48CWDZvhqBtPhdCBx4HS0DOuVLoxvJX6vQQlNRoIm4vdOGUKzsM0JjsQ3OKa6ul9Fdspvp4wLe2xcUeZZISLNyyO+nttVXb6/+wFEd+n8Xb1GHp2kEESQo0M= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=sit.fraunhofer.de; Received: from DU2P194MB1709.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:276::9) by DB8P194MB0743.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:16a::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4867.11; Sat, 8 Jan 2022 22:23:11 +0000 Received: from DU2P194MB1709.EURP194.PROD.OUTLOOK.COM ([fe80::a144:da10:fd89:c788]) by DU2P194MB1709.EURP194.PROD.OUTLOOK.COM ([fe80::a144:da10:fd89:c788%4]) with mapi id 15.20.4867.011; Sat, 8 Jan 2022 22:23:11 +0000 To: Giridhar Mandyam , Laurence Lundblade , Dave Thaler CC: Dave Thaler , teep , Brendan Moran , rats References: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> <8466B6E2-C335-4173-A2A2-3CCA555D28CA@arm.com> <62743D24-49F4-4480-9561-F00DA513C9FF@island-resort.com> <825C5FD3-729A-4612-B60A-8DB44AF069BC@island-resort.com> From: Henk Birkholz Message-ID: <9e7118fe-ece6-eb6c-a1c3-f73a804d704c@sit.fraunhofer.de> Date: Sat, 8 Jan 2022 23:23:09 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.14.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-ClientProxiedBy: AM6P195CA0021.EURP195.PROD.OUTLOOK.COM (2603:10a6:209:81::34) To DU2P194MB1709.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:276::9) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 04f5aaf9-348a-41fe-d202-08d9d2f5747c X-MS-TrafficTypeDiagnostic: DB8P194MB0743:EE_ X-LD-Processed: f930300c-c97d-4019-be03-add650a171c4,ExtAddr X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:3513; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: uxk0jkuAmNQkEDfMA+AHbzAWCTvpt1lJFcrYiP+WlKpekSvVZq0cgoiv/Hn0w7qXN01iJb+gqyMGVVJQdgkl9cMuZl4XmxnqbbOnz0FBGHM8iahEodFkWpnxlCGPUrTJtoI0I9CTQO3wS9z/VOtXQlzNfEJYOUoj7cFkoTWGYjBlx2cuvpOctxz+aakRkI7GCvnhBFqMQWHFpqYvy23t4LzUtWufPVWQ4cUoXrFVzkLOP5YV9coyhrxZax7LQ23hA5JOVyqdoLPbUVQQ8CS3htsZpMbb/toDDlH2aZ2daX7ItRD9GOxYCU7gjSHnG7OPJOBHBaCftoKlD5KNvnI1DiftorgDvLLLsFNIrKQwAX41rIR6T5HVMgSSB8wyN0VXpX3mH4XzfGYHEQfQS3vTvtR7z2jdj3nx6QFj9k/VcVWNc/G7QC8+JEHv6G3Y8djZI3Vw6VuY4pZVbJ82rFOY0vFhQh6fSRbYVjSzZWHRXEKI1jm8RKqvhSJPfWoWDVCeGFQWcv8bgXUQ8Gndb4hE0RkkyB9t0/TfwCWBmjHRSLwt/fWtQ0IbvqUKDY9cnUi74Pp9mamFSeR7NiVboFpYXuuY3clc8AHP27pbyExAJhS0pP1xJQ712xSBXyEEWH+/LZDrqfv1L1H3lU+EW+aV+B1hap7IJUwznZKt7Ef7m2hlX3hsdA/8k5QmYnoCsdCuUg/HX15nfgNFdamHv7JWVndf9VkCowzAqXKsqUsY6SBOOCm4wFb+5OfI8V1h4jl6U7c75utDOhk+/OC+vCNmK5SJ+hAzspcGTaFzOPPZSK29XeUnJ6Z+K2m+5aXS0Y2RL4JZurqkhNyypj6W/QfF3MtqpNDyZbYzd9USB86YzJtFB3dnl9PMfF3geHQBe7rv X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU2P194MB1709.EURP194.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(4636009)(366004)(8676002)(110136005)(31686004)(45080400002)(44832011)(5660300002)(508600001)(26005)(6506007)(2906002)(54906003)(31696002)(66574015)(83380400001)(53546011)(316002)(86362001)(6512007)(38350700002)(8936002)(4326008)(52116002)(6486002)(38100700002)(186003)(82960400001)(2616005)(66946007)(66556008)(66476007)(966005)(43740500002)(45980500001); DIR:OUT; SFP:1102; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?NE5zbCtKTU5VbFdTVUlWZitHK0xmREZDa2U5Vy9rL3ZxbUM0TkJacEs5SEdV?= =?utf-8?B?MjFIZzNWZ3VoSEFPYlBKeVUvYXRzdUIzWlBoTVlKY1AwWTZLNk9mZndzNU1F?= =?utf-8?B?dGw4TllEaGNLZFVsbFdzRmYzM09vSEtRRjM0SERzc2cvbGFvMGVxa0tFUm9h?= =?utf-8?B?d2gwS0NlQzIvTFNWZkRQa2cvWDZCNUxQdXdSZHBONkFIb3pSc3E5dGFOY3FT?= =?utf-8?B?aGRxS3Mxa2lpb3hXOFZmVnljamVwMGZPT1lOR0tmUlFXSDB0OXlxOHlFaXlE?= =?utf-8?B?a2haTkVaQ0V3ZzU0VmNMdnJyWVgvWmcwSWVlSXdjdm1nNjJKenc2SWduMm5x?= =?utf-8?B?M09KU3JtN0NmSS9xajZqU1Z3bUFuWVptbEZxbnY0dUVocjJGR25pU2dtakR4?= =?utf-8?B?bGhXVExCU3dhK1poN2ZMZWY4bEp0SmV6aXptVW9VV1hRNWF5TkxtTTBNa1pq?= =?utf-8?B?MVkvSWNFSS9uNitNb2g4UDRTZ2ZheFpoUFUzT2MrcjlUeGRlbTNjWU9QTmxK?= =?utf-8?B?UE1ydjFCTjNlaCtHMk5Ga2plL21PQUVUTVU0dHZwaVg3aGUvRUxPNGhxRjlZ?= =?utf-8?B?c3FCb3prcFN2SXp4VU40VFByNHZpZmlhSzhPL1NBKzA4cytTL3JnUU9SN1pr?= =?utf-8?B?RW9oeEdlTTBaeE00OUJoVUpPZlNrRE50Z3UzZnI3T21ESGxzQ3EyM1g3bldR?= =?utf-8?B?b0U2NjdEbHlvTGFUNEpSN0FUdVV6RGhaVG0wNmFpeWtjVGEyRGN4MlgvRWMx?= =?utf-8?B?eVBSWXJkcFdtZy81d3pkZksrRUVTb0IzT1dCanMxUktYWUZiOTRWWnhXMTJa?= =?utf-8?B?Tmg3KytqWTNucHd2dVF3L2xLbURXYnVmN28yaTRiZTE5WU9kWUZHeDJtMDNz?= =?utf-8?B?SjVwdnppK0lPTG5Ia1pDUjJRWmpZS3NJQUJpckVldE82Qi9VdXVBQW9MNmIw?= =?utf-8?B?MS95aTdtRUVVZGQyalloMTdRVkZ0SGY1bkUwRDFuWlpNUDRVR1BDbUc2czBs?= =?utf-8?B?U3V4RzVKNzlLQUhXZlBnOG1kcXk3MmZGOU80c0tCMEVvMDF1c3UzNVZBWkNl?= =?utf-8?B?Nmp4ZWYwREF6ME1YVGRONjJyeVA5cjBuOUNzVVZQSVhFOGM4N0RsQ2I5Yjkr?= =?utf-8?B?Q0pBeFlsb1Q3ZDJCRC81N1BoVUhhemNEblZ6WUh4RlR6UGxVcGdYTnoxKzN2?= =?utf-8?B?cG15ZGFGQmVmQmQ2R3RlcXVSUmxPQnJ5Q3M5aE02bW8wdEh0Q3FaOWZWbDFv?= =?utf-8?B?N1ZjYjZjYlRBdDhtVmZYVllQamhDbmpJTXhZK21OblVWdGpTWm1zbW5WUnly?= =?utf-8?B?c2Q3Ri9HMnI4Z2l0VzNidVZseG5sL3ZoeUk4Sk9IZWZjSUppMk4rM2s4bTNQ?= =?utf-8?B?T0szN1JBRE1oTGxOa3BMZHoxckZCNmJqZWxHemVQZXRTVDdxbHlpb3JIaDMz?= =?utf-8?B?VG5mcTZvd3RBWU1CMTR2eDBsMDAraHpZR0UzMFhDM2c0QlV1QVhXUythbDRw?= =?utf-8?B?NEQwbENnNng1amI4SmJUL0g1bDlhdHg1aHVaS1owYVMvN3IwU2pJTTRJUW1B?= =?utf-8?B?SDlDNkpVbXUyVkZwNGxvcXRIUmloUnFpekVuQzc3T2NtcVBvNHhERlJYZFdL?= =?utf-8?B?dC9aWGZJQ0x0ZFlNTzJQK2hCWUlNRXE3Vnp1cHltK1NmcWFZNGZVMzhZQ054?= =?utf-8?B?aFNYWmtHWlh3bjY3STFGNlg5TWthK3QzQ0gxeVBhejlnRnpqYy9FRVFCODY5?= =?utf-8?B?NWtleERSOGtxeGhkY1dOSG5PUmpNdU52MlRaRFN5RytsaVEzcUFaUTBHNnZa?= =?utf-8?B?b2h1NUU1UXZIVENWbGkzclJMeXdQN2c1QjhOTkFDSVVkbWxjUlB3c0NTeXdw?= =?utf-8?B?R1RUbFpTeEZhQ29hbTlBOXZoM3IrREViT1lKWkUxNTRoYTBRbDcydm9SbzZ1?= =?utf-8?B?bWJjM2FBb04xa1FORGhGUzBvcUJ2emZtd1NOZEFLQ3A1eVV2N1R3UVVzVXN2?= =?utf-8?B?OVArUDhLS043VlI4R1JYVWVJNTBTSUdYMVFROER5c0tDMjhXVUp2NDk0NXdX?= =?utf-8?B?OWNVYUxsNllzaFFyL3piSTJ1ZWRBNnd0REsraEZoclNwWnZlYUYwa3VLWFNB?= =?utf-8?B?WUtzVkRVdVdObFQ3WmtVM0J3QVA0S05abXo5UDhHL2tkUmR1VnZ2ck8reURD?= =?utf-8?B?dUpPM0cyT2NGK0Rrc01OWkRWT1BnWTBMNy9DQjdHY1hLa2htU1ltWmtxcjVo?= =?utf-8?B?OEkyd0kwc25SMlViYjJISHNTUk93PT0=?= X-MS-Exchange-CrossTenant-Network-Message-Id: 04f5aaf9-348a-41fe-d202-08d9d2f5747c X-MS-Exchange-CrossTenant-AuthSource: DU2P194MB1709.EURP194.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Jan 2022 22:23:11.5150 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: f930300c-c97d-4019-be03-add650a171c4 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: 3lg3B7kUVG+r+R6LA5LN8iAZVgO3GNx3nyfYdO+w+0pJwviwDjZgZgokeQJ600jzHRxyoBqcw2aQKGisCbhd/rJp/7QfX689SwDWIpSkODA= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8P194MB0743 X-OriginatorOrg: sit.fraunhofer.de Archived-At: Subject: Re: [Teep] [Rats] Class ID claim (and other HW identification) X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 08 Jan 2022 22:23:30 -0000 Hi Giri, TL;DR Are we waiting for this? How log will it take? so, is this a blocker to the EAT core document then? Could we split that topic out? If we are starting with a (hardware system component characteristics taxonomy here - while actually worthwhile and useful to attempt - that will take a while. Even, if the target would be simpler, agreeing on the target will again take time and I think that most agree that a line most be drawn at which point (sorry...) claims go to other documents. Viele Grüße, Henk On 08.01.22 21:15, Giridhar Mandyam wrote: > During the RATS meeting in IETF 112, the EAT editors were assured that > the TEEP WG had reached a consensus that if this claim is defined as > opaque data (https://github.com/ietf-rats-wg/eat/pull/139 > ) then the TEEP > requirement would be met. > > Based on the discussion below, the TEEP WG has clearly not arrived at > consensus as to what a HW class claim is supposed to be.  Rather than to > keep trying to iterate on an EAT PR that may or may not represent TEEP > consensus, I would suggest the TEEP WG continue the discussion on this > topic and present a formal proposal to the RATS WG.  When I say “TEEP > WG”, I mean that the proposal should be provided by one or more > individuals who can credibly claim to speak for the WG, such as the > Working Group chairs. > > -Giri Mandyam, co-editor of EAT > > *From:* RATS *On Behalf Of * Laurence Lundblade > *Sent:* Saturday, January 8, 2022 11:42 AM > *To:* Dave Thaler > *Cc:* Dave Thaler ; teep > ; Brendan Moran ; rats > *Subject:* Re: [Rats] [Teep] Class ID claim (and other HW identification) > > Yeah, I was confused by the use of “IP" when I first heard it after > joining the HW team at Qualcomm, but it is the phrase that is used by > the HW industry: > > https://www.synopsys.com/designware-ip.html > > > https://www.arm.com/products/silicon-ip-security > > > https://en.wikipedia.org/wiki/Semiconductor_intellectual_property_core > > > https://www.imaginationtech.com/products/ > > > “IP” is even in the URL’s. > > How about one of these? > >    “Silicon IP ID” > >    “HW Design IP ID” > >    “Semiconductor IP ID" > > We can add a sentence or two that gives some context for people that > haven’t run into this. > > More important than the name, I’d like to make the claim: > >    a map or array that > >       must contain an OEM ID of the vendor of the IP > >       may contain a model indicator > >       may contain a version > > I think this lines up with what Brendon suggests is needed and makes > more sense to me because it describes the very common convention of > identifying physically built things (cars, chips, refrigerators...). > > LL > > > > On Jan 7, 2022, at 4:07 PM, Dave Thaler > wrote: > > “IP” (as in Intellectual Property, not Internet Protocol) is not the > right term in my view since that implies there actually is some IP > as opposed to (say) conformance to a standard.  I am fine with > “Class” as you had it in the PR, but I think “IP” is too narrow in > implication. > > Dave > > *From:*TEEP >*On Behalf Of*Laurence Lundblade > *Sent:*Friday, January 7, 2022 3:56 PM > *To:*Brendan Moran > > *Cc:*Dave Thaler >; teep > >; rats > > *Subject:*Re: [Teep] [Rats] Class ID claim (and other HW identification) > > So rather than a HW Class, how about a HW IP claim? It would reuse > the same triple for identifying HW, OEM, Model, Version. It could > occur along side the HW OEM, model and version. This seems better > than my current PR and lines up better with Brendan’s examples and > with the reality that HW IP comes from a vendor, has models and > versions. I’ll write up a PR for it if I receive some positive > feedback here. > > The distinction between chip and device is intended to be handled by > submodules in EAT. Submodules can express arbitrarily complex > architectures and device compositions. > > I think it’s cleaner to keep the HW-identifying claims separate from > the SW-identify claims. Would really like the identification of the > Trusted OS Vendor be handled by CoSWID and friends. Trying to make > some claim suitable for identifying both SW and HW for all of > attestation seems over-ambitious. > > I also think it’s fine to define some claims better suited to the > TEE world in TEEP if we can’t find enough common ground between TEEP > and the very broadly applicable stuff that goes into EAT. > > LL > > Note: I find the use of the word “class” here confusing. If I were > putting TV’s into classes I’d uses classes like smart/dumb, display > type (LCD, CRT, OLED) and such that identify characteristics of TVs > independent of vendor and model. "Sony Bravia" is not a class IMO. > Nor is “Microsoft Windows” (an OS the runs on lots of HW platforms). > I’d like to move away from the word. > > > > > On Jan 4, 2022, at 3:06 AM, Brendan Moran > wrote: > > I think devices will need to report multiple vendor/class pairs. > > For example, A mobile device could potentially contain: > > 1. A Mobile Device OEM Vendor ID > > 2. A Silicon vendor’s Vendor ID > > 3. An IP vendor’s Vendor ID > > This is not an exhaustive list. > > For Arm Trust Zone TEEs, I would expect to see: > > 1. The Arm Vendor ID + the processor core’s Class ID > > 2. The Trusted OS Vendor ID + the Trusted OS Class ID > > 3. The Silicon vendor’s Vendor ID + the processor Class ID > > 4. The Device OEM’s Vendor ID + the device Class ID > > Cheers, > > Brendan > > > > > On 3 Jan 2022, at 21:00, Dave Thaler > > wrote: > > Laurence Lundblade wrote: > > > I talked to Dave which resulted in reorientation of my > understanding of Class ID in TEEP. > > Class ID basically identifies HW IP from a HW designer > like Arm or Synopsis that is integrated into chips made > by various HW OEMs like Qualcomm, Samsung and Apple. The > term used frequently for this is "IP" (I know this well > from my days working on HW at Qualcomm). > > I've created a PR for HW Class. > > Since what is identified spans OEMs, this must be a > globally unique identifier. We need to be explicit about > that. > > I know of four ways to have a global identifier: > - Use OIDs > - Use DNS / URI > - Probabilistically using a big enough byte string > - A new registry, perhaps IANA (but we probably don't > want this) > > The PR allows all but the last, but this could be > reduced to just one or two of the above. > > > PR looks great to me, except that would I agree with > reducing it to one or two. > Since the ability to take a value and resolve it to > something meaningful is useful in many cases (logging, > wireshark analysis, etc.), I would remove the third option. > > OIDs, encoded as int arrays, probably compress the best so > if only one, then I'd pick that one.  URIs are convenient > though also so if two, then that's my second pick. > > > > I don't see this claim as essential for EAT, but I > committed to working through this with TEEP. I'm fine > with this PR going into a TEEP document rather than EAT. > > > The notion of HW class ID is not specific to TEEs, hence the > request to put it in EAT rather than in anything that would > imply use is limited to TEEs (hence not in a TEEP document). > > -Dave > > _______________________________________________ > TEEP mailing list > TEEP@ietf.org > https://www.ietf.org/mailman/listinfo/teep > > > IMPORTANT NOTICE: The contents of this email and any attachments > are confidential and may also be privileged. If you are not the > intended recipient, please notify the sender immediately and do > not disclose the contents to any other person, use it for any > purpose, or store or copy the information in any medium. Thank you. > > > _______________________________________________ > RATS mailing list > RATS@ietf.org > https://www.ietf.org/mailman/listinfo/rats > From nobody Sat Jan 8 14:27:22 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 15A773A10A4; Sat, 8 Jan 2022 14:27:17 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.614 X-Spam-Level: X-Spam-Status: No, score=-2.614 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, NICE_REPLY_A=-0.714, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=fraunhofer.onmicrosoft.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q-g6JU8k84mh; Sat, 8 Jan 2022 14:27:12 -0800 (PST) Received: from mail-edgeDD24.fraunhofer.de (mail-edgeDD24.fraunhofer.de [192.102.167.24]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 321053A10A2; Sat, 8 Jan 2022 14:27:10 -0800 (PST) IronPort-SDR: m3XTmclH+9VvEH3A3RHI51U7B0RxpUfvKADqm3J+B/f0WRUAnwxU6AXRmBFeWXlRKmjoXCw2Jq L5GKzCOnxGOw== X-IPAS-Result: =?us-ascii?q?A2G+BgBFD9ph/xmnZsBaHAEBAQEBAQcBARIBAQQEAQFAg?= =?us-ascii?q?VkCgVBVfoFChEiDSAEBhTmFDl2Bdy4Dmx+CUwMYLg4LAQEBAQEBAQEBCAEqC?= =?us-ascii?q?wwEAQEDBIR/AoNFASU4EwECBAEBAQEDAgMBAQEBBQEBBgEBAQEBAQUEAgKBG?= =?us-ascii?q?IUvOQ1AAQwBgwVNOwEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBAQEBA?= =?us-ascii?q?QEBAQUCQUcMMgEBAQMBARARDwEFCAEBLAsBDwkCDgoCAiYCAicLJQYBDAEFA?= =?us-ascii?q?gEBHoJcAYJlAy0BAQ6RJ482AYE6AoofeoExgQGCCAEBBgQEglKCORhbgVsDB?= =?us-ascii?q?gkBgQYqAYMNhxyECCcQgVVEgRUnD4EGgW4+gmMBAQKEdoJlkFGBMwISRxAQI?= =?us-ascii?q?ASBSb8gNAeCD4E2gTYGC51wBhQulhyRT5Y6IKYOAgQCBAUCDgEBBoF4gX5NJ?= =?us-ascii?q?E+CaVEZD44gg3GFFIVLcwI2AgYBCgEBAwmIXIZCAQE?= IronPort-PHdr: A9a23:x4nm1BLp3NiEZ0XS5NmcuWkyDhhOgF28FgIW659yjbVIf+zj+pn5J 0XQ6L1ri0OBRoTU7f9Iyo+0+6DtUGAN+9CN5XYFdpEfWxoMk85DmQsmDYaMAlH6K/i/aSs8E YxCWVZp8mv9P1JSHZPlZkGUrGe78DgSHRvyL0x5K7edJw== X-IronPort-Anti-Spam-Filtered: true X-IronPort-AV: E=Sophos;i="5.88,273,1635199200"; d="scan'208";a="48531321" Received: from mail-mtadd25.fraunhofer.de ([192.102.167.25]) by mail-edgeDD24.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Jan 2022 23:27:07 +0100 IronPort-SDR: qPbysvgQMI1pMM700OKeaa41xvCGJpGE5qedhm7nT4ncfGcuFDFX1tjBhVlFK5ZMpOPiaieBja 6dlQ7zeoNBMrXFgW22Id+ltUdquASbbA0= X-IPAS-Result: =?us-ascii?q?A0BrAQDCDtphl3+zYZlaHAEBAQEBAQcBARIBAQQEAQFAC?= =?us-ascii?q?YFQAoFQVX5ZJkOER4NIAQGFOYUOXQGBdi4DOAGaZoJTA1QLAQMBAQEBAQgBK?= =?us-ascii?q?gsMBAEBhQYCg0ICJjgTAQIEAQEBAQMCAwEBAQEFAQEFAQEBAgEBBQQUAQEBA?= =?us-ascii?q?QEBAQEJGwYMBQ5LBl4GaIFPgWETCzQNQAEMAYV1AQEBAwEBEBEPAQUIAQEUG?= =?us-ascii?q?AsBDwkCDgoCAiYCAicLBx4GAQwBBQIBAR6CXAGCZQMtAQEOkSaPNgGBOgKKH?= =?us-ascii?q?3qBMYEBgggBAQYEBIJSgjkYW4FbAwYJAYEGKgGDDYcchAg3gVVEgRUnD4EGg?= =?us-ascii?q?W4+gmMBAQKEdoJlkFGBMwISRxAQIASBSb8gNAeCD4E2gTYGC51wBhQulhyRT?= =?us-ascii?q?5Y6IKYOAgQCBAUCDgEBBoF4gX1NJE+CaU4BAgECDQECAgMBAgECCQEBAo4dG?= =?us-ascii?q?YNYhRSFS0IxAjYCBgEKAQEDCYhchkIBAQ?= IronPort-PHdr: A9a23:nbQUEBZQ0PeIcx7JfCvlQ8z/LTAhhN3EVzX9orIriLNLJ6Kk+Zmqf EnS/u5kg1KBW4LHo+lFhOzbv+GFOyQA7J+NvWpEfMlKUBkI2skTlhYrVciCD0CzJfX2bis8S cJFUlIt/3yyPUVPXsjkYFiHuXyuqzAIEwj5NQ17K/6zFoOB5/k= IronPort-Data: A9a23:iuGdKKsXbp+JDUQMoaPHH/VkTufnVHZYMUV32f8akzHdYApBsoF/q tZmKT3Vb63fZzamf99zOtu0/U1XucKGxoVhTQI6+HxgFi4TgMeUXt7xwmUckM+xwm0vaGo9s q3yv/GZdJhcokf0/0zrb/69xZVF/fngqoDUUYYoAQgsA180IMsdoUg7wbRh29Y42YLR7z6l4 LseneWPYDdJ5BYpagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDf3Zw0/Df2VhNrXSq 9AvbF2O1jixEx8FUrtJm1tgG6EAaua60QOm0hK6V0U+6/RPjnRa70o1CBYTQWAQhRmRg8FA8 d8ThN+/Fwd5I5fRks1IBnG0EwkmVUFH0KTCPWD5vNyYzwvIaXLxxfVpAkwse4EVkgp1KTgTr rpJd3ZUMUHF3rjpqF64YrEEasALLMTtP8UVu2tjzTbdH949QIyFTb/D+NlY2zk9nIZCEJ4yY uJAMmAwPEufOEEn1lE/T5FjhuSio1DEYzgH+GK1g6oo5VP29VkkuFTqGICMIYXRFZQ9clyjj mbJ+0z4GRUTMtDa0zee9WiwwOTImEvTRI8fDJW5++JkxlqJyQQ7EhQKTnO6rOW3zEmkVLp3J 1AU8y4jt/1urEmqRcP6RBq2vDiPuRs0V99ZCeZ86QyRxOzT+QnxLmMNRDlpdM4n8sgsSlQXO kShxo6yQG0w9eTKGDfErOjSszb0Mm4bN2YfYy8DQwYfpdXuyG0usv7RZvEkHoKtkszEIDuu8 nOF8ihumo8Oh+degs1X4mv7qz6ro5HISCs86QPWQn+p42tFiGiNO9LABb/zsacoEWqJcrWSl CVdwZnPt4jiGbncyH3UGI3hCZnzv67tDdHKvbJ4N7UMnwlBFlb6INsVsW47fRg4d59eJnn3Z QnY/w1L7YJVPHykYLUxb4/Z5yUWIUrISIqNuhP8NIEmjn1NmOmvp30Giam4hDCFraTUuftjU ap3iO71ZZrgNYxpzSCtW8AW2qIxyyY1yAv7HM6nlkr5j+TGPCLMGN/p1WdiiMhmtstoRy2Kq r5i2zeikUoHOAEDSnaGqtFLdwxiwYYTXs6u8JA/mhG/zvpOQjh6UqSBkNvNiqRpkrlJjezI8 2r1VEhC01H/mHvIMgOHdmILVV8cdckXkJ7PBgR1ZQzA8yF6Oe6Htf5DH7NqLehP3LEylpZcE qhaE/hs99wSE1wrDRxGNsKjxGGjHTz27T+z092NO2lgL8U+Fl2QqrcJvGLHrUEzM8Z+juNmy 5XI6+8RacBrq91KAJmEZfSx4Um2uHRByut+U1GRfYtIeVmq/pJjNirxifE6OYcAJEyblDed0 g+XBzYepPXM+tNkroOW2Prc94r5QfFjGkd6HnXA6ejkPyft/l2lnd1KXtGOcG2PT2jz4qijO b5YwqikYv0KlVpHqaRmFLNvwf5s7tfjveYFnB9lADPFdV22DLNnLHScm8VC7/UfyrhcsAqwe 0SO5tgDZeTXYpy4SgZJKVN8POqZ1PwSlj3D1tgPIR33tH1t4b6KcUROJB3S2iZTG7tCNt93y +kWvsNLuRe0jQAnM4rdgy1ZqzaMI3gHX/l1v50WGtWw2BEu1kkEbIzXCmn4+piSbdVLPEQwZ DOZ3fKQi7NZz0vEUnwyCXmUgbsD38tT4kgSwQ9QPUmNl/rEmuQzgE9b/wMxQ1kH1R5Aye9yZ jVmOhEnP6mI5Ds01sFPU3r3QFMYWUbcqxO0kgRY0TSDEA+2UyrGamMnMPuL/EcX/ngacjUCp OOUz2PsUDDLesDt33JuCBA/9KG5FYR8pl/YhcSqP8WZBJ1mMzDrtamjODgToBz9DMJt2UDKq IGGJgqrhXEX6MLIn5AGNg== IronPort-HdrOrdr: A9a23:db9zna11zdtf+0hWqNGpvgqjBSdyeYIsimQD101hICG9Lfb2qy n+ppgmPEHP5Qr5OEtApTiBUJPwJU80hqQFnbX5Wo3SIzUO2VHYUb2KiLGN/9SOIVyHygcw79 YHT0E6MqyLMbEYt7eL3ODbKadY/DDvysnB7o2/vhRQpENRGsZdBm9Ce3em+yZNNWt77PQCZf +hD4Z81kGdkSN9VLXEOpBJZZmPmzWN/6iWFSIuNloC0k2jnDmo4Ln1H1yx2QofaSpGxfMH/X LemwL0y62/u7XjoyWsmFP73tBzop/M29FDDMuDhow8LSjtsB+hYMBEV6eZtD44jemz4BIBkc XKoT0nI8NvgkmhMl2dkF/I4U3NwTwu43jtxRuxhmbim9XwQHYAB89IletiA1PkwntlmOs5/L NA3mqfuZYSJwjHhj7B69/BUAwvvlaooFI5+NRjz0B3YM87Uvt8vIYf9ERaHNMrByTh8r0qF+ FoEYX1+OtWS1WHdHrU11MfgeBEZk5DXCtuf3Jy//B8i1Nt7TREJgojtYIid047hdEAo8Iu3Z WCDkxq/Is+B/P+I5gNQtvpevHHeFAldyi8Rl56EW6XZ53vBEi93qIfwI9Fr91CK6Z4hqfbpv z6ISRlXCgJChvTNfE= X-IronPort-Anti-Spam-Filtered: true X-IronPort-AV: E=Sophos;i="5.88,273,1635199200"; d="scan'208";a="132787734" Received: from 153-97-179-127.vm.c.fraunhofer.de (HELO smtp.exch.fraunhofer.de) ([153.97.179.127]) by mail-mtaDD25.fraunhofer.de with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Jan 2022 23:27:04 +0100 Received: from XCH-HYBRID-03.ads.fraunhofer.de (10.225.9.57) by XCH-HYBRID-04.ads.fraunhofer.de (10.225.9.46) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Sat, 8 Jan 2022 23:27:04 +0100 Received: from EUR04-DB3-obe.outbound.protection.outlook.com (104.47.12.56) by XCH-HYBRID-03.ads.fraunhofer.de (10.225.9.57) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Sat, 8 Jan 2022 23:27:04 +0100 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=HLq/WcSpCyaBGwEmzZ4T3pFO80cmFEB6G5RvJk9DbEYXMWnOaKov/Zllx65nj2YpWUE7e4NQTm//JAmhSCwpvU7w+hYf+h/PqQJk9qg2G61jnH2SeJzgnWn7eRrJM58eIbTXhZLWtQYh3LpvjvDegwJyNx/alXKGtTZtRlg4EjM49mpNzMY1FPvF1gZ+Q2P/Re4aumP4O5Ct89kGQQBsCBr6XcEjGioilvvX9pyyeytClSOmm7uPGMLk2CYHip7saDSC4fFBotOzS3ONqpw/7ST4DkPz+itML+fEzb/OC4RNCV67/Y4XImlhaowAyCeNw2xzbBsmmBZHBiwMZoxy5w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=lOyMjHASvYeVmW1/SBXkJ5zaSZ15TsNO007plMi06WQ=; b=f8dpKcy507zkzVlSnI6mDfNhx2tUlu94V7syfCqVYmlwegZ0NI8AvfF8xaq045KCq6MVBRMK84snYw+VZclN7f8ZgBfRYCznsFiXpRMNhgE/g+AO8/OYT+08EgRlC3TkpDTlfjessHFWI/LYvELqyzIwlgwuOG9Arz6MQHUXxZg4QcpW38BSAUXHglBgYqtf/7lQ9cZJ7k8hEWlyHmVpm5aEj449QFj+vnq9RilNtm/uiFcs2wtRHxsW18FFHC9okUl2HIf72+RRu+FYd/VyhEEssQPmiJifXDwbJLapoVICyYR+q16toHI2G8PVM0HTBLlH4a34iluKs8OVMcxdig== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=sit.fraunhofer.de; dmarc=pass action=none header.from=sit.fraunhofer.de; dkim=pass header.d=sit.fraunhofer.de; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fraunhofer.onmicrosoft.com; s=selector2-fraunhofer-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lOyMjHASvYeVmW1/SBXkJ5zaSZ15TsNO007plMi06WQ=; b=VlGI/WDTfGW624YDK6iU3JCeMeYtk22ncQEtERCqjhktqQ7wEEGZTVxyOWiLXMk3zm23yELtmuA/2ZE2HCNvwi54UGSEQPn/qnJTcLRPn72mDvljQ3wG4QcGgn6130L+66RUvkivw1ekWnzx1fquEY+MWORgFFcx1MB82hy/XgM= Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=sit.fraunhofer.de; Received: from DU2P194MB1709.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:276::9) by DB8P194MB0743.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:16a::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4867.11; Sat, 8 Jan 2022 22:27:03 +0000 Received: from DU2P194MB1709.EURP194.PROD.OUTLOOK.COM ([fe80::a144:da10:fd89:c788]) by DU2P194MB1709.EURP194.PROD.OUTLOOK.COM ([fe80::a144:da10:fd89:c788%4]) with mapi id 15.20.4867.011; Sat, 8 Jan 2022 22:27:02 +0000 To: Carsten Bormann , Dave Thaler CC: rats , teep , Brendan Moran , Laurence Lundblade References: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> <8466B6E2-C335-4173-A2A2-3CCA555D28CA@arm.com> <62743D24-49F4-4480-9561-F00DA513C9FF@island-resort.com> <4D76609F-2594-4EC1-88C0-A2D47A2EA199@tzi.org> From: Henk Birkholz Message-ID: <8fecc346-87b4-f032-e531-e00e09318b44@sit.fraunhofer.de> Date: Sat, 8 Jan 2022 23:27:00 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.14.0 In-Reply-To: <4D76609F-2594-4EC1-88C0-A2D47A2EA199@tzi.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-ClientProxiedBy: AS9PR06CA0393.eurprd06.prod.outlook.com (2603:10a6:20b:461::34) To DU2P194MB1709.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:276::9) MIME-Version: 1.0 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 2d9dbd99-f9a9-445e-738d-08d9d2f5fe5f X-MS-TrafficTypeDiagnostic: DB8P194MB0743:EE_ X-LD-Processed: f930300c-c97d-4019-be03-add650a171c4,ExtAddr X-Microsoft-Antispam-PRVS: X-MS-Oob-TLC-OOBClassifiers: OLM:10000; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DU2P194MB1709.EURP194.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(4636009)(366004)(82960400001)(38100700002)(186003)(66946007)(2616005)(52116002)(8936002)(4326008)(6486002)(966005)(66476007)(66556008)(38350700002)(44832011)(508600001)(26005)(5660300002)(110136005)(31686004)(8676002)(6506007)(53546011)(66574015)(83380400001)(6512007)(316002)(86362001)(54906003)(2906002)(31696002)(45980500001)(43740500002); DIR:OUT; SFP:1102; X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?ZmlmOStENUM1bHVHSjhQMlovM3BhK21pKzZ1SzVhdzE5T3Q1dXhYdlZWaTZt?= =?utf-8?B?OXhJVTVhbXJhaWJVQzBZcXVMRVBCcHNPQUJEVnc1NkNBTzhIOFI2T0pOdjdS?= =?utf-8?B?SEQ0SW8zaVZBanFjc1FEeGVpaEovR2Y4YW1YWDd0SFBOUzZjOGx2SE1sWXdN?= =?utf-8?B?TURadXRSSTYwclE0RUlFWmRaakgxN3RCa0MyWGNoY1cwVTlSczVTWmdSbzky?= =?utf-8?B?QlpVTkRPanFJejJFMTMxRjJCV2tXVG1UQWcycmQ1cEdLdjhVZjhtWDdGNGtO?= =?utf-8?B?NjJYcW9sUmlRSDlmY2MxaE5IVjNiODF4ZjN0QjhKNmtVVTdTSW1XUjlvNzl2?= =?utf-8?B?VWE4N0pLVXhvdzFNUGdYZmVicWFNbmVJYUdIYUNRWnVWRUZPWDhvcWpXdVBM?= =?utf-8?B?aW4xTWM5NGtEbUpDcVY5bE1FdlpzdWlEQmJMbkdJYXBZdDNOTTFIWDFkcjJJ?= =?utf-8?B?bVFzWDRvUVdpS0h4UjRUd0xGM1pvbmlvRDd4SEVlTXNIRkpIYUJTRUVPdWJE?= =?utf-8?B?UGQ0ajY2cDdheEplZ1pyUDEyWFZ2UWFGRkFHeVYrRkVtNFZnMEtqQ2wybGts?= =?utf-8?B?dXV6STNNUGZ2Nzg4UzJHdnhrNVVNV1R2YlppaWxTMy9BcGlXZ0NYWWs5N0lS?= =?utf-8?B?ZWRTdGJGQXFGdG1zSEEzdWoyVFhrRU1sNW1iaUNEaGdmVmVBMVd0NGRaMzRU?= =?utf-8?B?OHo2K3o0YnRreEc3SUw3ZUh0WDBDQ0RFb3g2NytjODQzMjFmZXJLeVM2Q1Zw?= =?utf-8?B?ekpONy9yVEpHT0JMYlRhSUZkRGdHQVkwb2ozRFVuVEFUN1NYSGZOKzR6VUlv?= =?utf-8?B?VTh0QWFkaitybnp4NmFVSGVQVmdRK0p3MURlWFdadXpPS29DR3pLN1czTUFz?= =?utf-8?B?bmVSVkx2VklhSkxSR1BoZ0U2SFhBQzBhU2ZPNElwb1RmaHN0dFdZNzBwdkhk?= =?utf-8?B?MU9OY3BJZmlvTG5MTGdoNUVsanBsckZ0ckpIeXFJNEdtY1V4S2FxT3U5TUFT?= =?utf-8?B?R3UreERmb1pwNWRlS1ZjaXpUbmE3bXFrL1RCYlMwWnZ1M2d2Vkg4bHZKWTdQ?= =?utf-8?B?Wi91T21rVk82eFg5NGlsaDVSN0tZTTd1SE9rOFZIMm92SmNOWkJLeFREek5l?= =?utf-8?B?R25tbXZ4N3BmbERQekZRSCthQjUzSEEyd2h1SzNncDZzc2ZYc1V6VHBlWWdz?= =?utf-8?B?Mmc4OGxoRzBmbXErbjdxdlVGYjNxdUhISWZjVFVRdlJENmpQRjA1STNqWkpl?= =?utf-8?B?T2FMSXV5M042cXpYdGE0bGt3Zm1RakdRdkVWaWhYZUdwRzVEMHZjNEdSN0RS?= =?utf-8?B?QVorazU1a3dDZ2ROVHd1MnZjUUd4emxlOFQ3aFhqUEk4UHE3ZGg2a2xqanky?= =?utf-8?B?ZnozbStobTdaaEE0ajJjckVDNUswcjBZWnFld3BrR2NrVnlVSGpiWFpsV0N6?= =?utf-8?B?U1UrOGtKUmt0aUJ5TXd4T3NDb2Q2WmZjdU90NVNmWFFNRDNVZGp0dXdjQTdB?= =?utf-8?B?OU93OHUrK3dmb0pJSTRYOG1xaFI4MFdxTTNhSnlSZnJ0RjB6TjQ2dGhvVEVq?= =?utf-8?B?c2dwM3VNT0VNeS9ZM0FhVkJRTW5kL3d3VnNZODJGL0lpZ3NMYTRxMUdoYUUz?= =?utf-8?B?bXVxSjVLT2xDN3JScmgrZXVONDdFNU5kVXBlY0tib3JBajd5dnM3U0NRMkwx?= =?utf-8?B?a2tiZWo5RlNsWUp2eldBTC90RnBrMXhYSXB5Y3hFakdPaUxRODZvSjk5akRj?= =?utf-8?B?SlowTFh5MS8yQXRYeEM1dklkZ2szU0JnSlprK1hZRmJjeG03RUZaRDlpejAw?= =?utf-8?B?MnJxSjYvVk04UkRCV01DenFGUzNoTHVIaWlTSDJkWnlqZzdwMGs2QzloU3JT?= =?utf-8?B?c2NCakFYdXhXVkRSMDM4RTlWZkFGYTN6VFphOGFBMmpHOXRGbHBmMCt5ZXVP?= =?utf-8?B?S1prbnRSV0xIVmNSOGF2R1A3eDVHWEJGNnhnTWR4b2V3SzZKQ1RidGtkQVRH?= =?utf-8?B?amdaNjIya2Y5SXNRZHZQeE9SVjJPdUg3TGQ0VzB2VWJyUHdLQWtNMjYzcHJv?= =?utf-8?B?N2hOU2QvdmZRMU1ieE92eWtUbmtlcGRiS2hudS9UWS9vRVNtTjJ2RW9zYndm?= =?utf-8?B?TUdhSlFmTzVuVlA4TkJQZGZpNU1pVTNWQ003V0lMcG5xM2k2WmdVK2VHa2ph?= =?utf-8?B?aUI3QThmdHNYRFJBb3lGMmZQVDhEeGh3bVNvbkdRdVFnMlBPRXQvODhYZGVU?= =?utf-8?B?K09VTHhhdlZFZkp1ZUNQQXg5WFRRPT0=?= X-MS-Exchange-CrossTenant-Network-Message-Id: 2d9dbd99-f9a9-445e-738d-08d9d2f5fe5f X-MS-Exchange-CrossTenant-AuthSource: DU2P194MB1709.EURP194.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 08 Jan 2022 22:27:02.7594 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: f930300c-c97d-4019-be03-add650a171c4 X-MS-Exchange-CrossTenant-MailboxType: HOSTED X-MS-Exchange-CrossTenant-UserPrincipalName: h4gbWRE5YqPqqZm0w/8ad8yUsIhdh8wC3x5SAKoKtF+6IUUqAaHJnmZrB9+7GQxFs/N86nfiSsqKqklpwPuh38vK55JmOaYgjurL6r6sUK8= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8P194MB0743 X-OriginatorOrg: sit.fraunhofer.de Archived-At: Subject: Re: [Teep] [Rats] Class ID claim (and other HW identification) X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 08 Jan 2022 22:27:17 -0000 I am not really happy with both the ambiguity of "IP" in our context, nor with the semantics of the intended concept. If we are going towards taxonomy of characteristics here, a registry would be helpful, I think. Viele Grüße, Henk On 08.01.22 22:28, Carsten Bormann wrote: > On 8. Jan 2022, at 01:07, Dave Thaler wrote: >> >> “IP” (as in Intellectual Property, not Internet Protocol) is not the right term in my view since that implies there actually is some IP as opposed to (say) conformance to a standard. I am fine with “Class” as you had it in the PR, but I think “IP” is too narrow in implication. > > +1 about not wanting “IP” as in productized silicon design library. The scope of the assertion you can make based on having licensed such a package is not well-defined; I don’t know what a TEEP party could do with such an identifier. > > As Brendan notes, a device may need to be in (subject of claims about) multiple “classes”. The term “class” can then be confusing to people who think about “the class” of an item. > > Maybe it’s not productive to try to group these kinds of identifiers into “classes”, “IP”, … — maybe you just need an assertion about the device and an identifier. Just using an opaque byte string here is not very efficient, as these need to be long and random to be distinct (and you can’t look them up, as Dave noted). > > On an unrelated point, if you *really* want to do something with ASN.1 OIDs, there is also RFC 9090 (I’m just the messenger here, this is not really “my” RFC…). > I’d rather do a new registry, though... > > Grüße, Carsten > > _______________________________________________ > RATS mailing list > RATS@ietf.org > https://www.ietf.org/mailman/listinfo/rats > From nobody Sun Jan 9 12:08:00 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B9B93A0654; Sun, 9 Jan 2022 12:07:53 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.001 X-Spam-Level: X-Spam-Status: No, score=-2.001 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=qti.qualcomm.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1WwSsAY2_uVO; Sun, 9 Jan 2022 12:07:47 -0800 (PST) Received: from esa.hc3962-90.iphmx.com (esa.hc3962-90.iphmx.com [216.71.142.165]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 546F13A0650; Sun, 9 Jan 2022 12:07:47 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=qti.qualcomm.com; i=@qti.qualcomm.com; q=dns/txt; s=qccesdkim1; t=1641758867; x=1642363667; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=mlnFaqePnAgmlcMKw0sBW8/5HOZNWg8+SuzlyoHhtdA=; b=KHaOddgk9NGfUMwSdCJxPzB++nPwhUHv0aV33fBKmcZZt1wocxaAQAyh E4ur+3wZ96SDKKvMxI00GdOtfDWyAC00GGo+306Kli3OSr84VHFmEQMgf cNuTIwez3iogKKZRT9yHL/1B/UPOpRoT7AAM1Zkimpjp6FeQds8Qtr6ie I=; Received: from mail-dm6nam10lp2108.outbound.protection.outlook.com (HELO NAM10-DM6-obe.outbound.protection.outlook.com) ([104.47.58.108]) by ob1.hc3962-90.iphmx.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 Jan 2022 20:07:45 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=FwcwgESh/q0zYKqD8vDdHX1W8Fgq+T0i8IHlApq0Vahxu3k/8dyfJXI/B4eyZYIqpPidL8uDAtsDGFTwOGjNPN+PJn3wgFeQjT3vMxCOWom/kbAayEtadjEoyk56ipss1S835wOmCepUAzkDqz9PokODhihiI0eC3+/0EoTWYwByVJHo3jcOXfc05KwPZIRmIGJfXE1qLAndDbrkYoZvIzDNqUraVPmgrvukxIrNBHLz9E3KQ3mEh0AkNMYhSIZM/8QHaqRdsnOw1QPv3G4xJ9PbxHf7C3IKrUi96M0eb1fPIS+EvtmxhdIlNn9tppTZp5UZKzfyZBRtQujJFphXHA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=mlnFaqePnAgmlcMKw0sBW8/5HOZNWg8+SuzlyoHhtdA=; b=CmMhWMGZT9pa248yNL6OuJ7877a9nGNwgyeeo5yYHtp09XtEbJtW5aja5hOh/RpU8CiVcZiwyxhesrbK/kZN5K4Tfm1Lu2ApnpYoWES3dg+/JrY/7nIond9Bv0M2KDXhu5j0+4SYVcrCNp1FunDWxA2/7lyz9JYMPv3jdEvYovpty9bDWwz9MxygaZK9YQ0PgO5ZbUVAuRP7Syn2Nk4JLLCmG2zVlvi9lWrFyf3Nbe09Y0zluXnrIuuN+8YOF2GmVu5dUQgMS8UPVY0dnk53kxzYLS0Eb+EiHxbEjh8SlQlT7P6/o48kqYwiwZtsBFXbvoccKY6gFNOjWV3+5R0u9g== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=qti.qualcomm.com; dmarc=pass action=none header.from=qti.qualcomm.com; dkim=pass header.d=qti.qualcomm.com; arc=none Received: from SJ0PR02MB8353.namprd02.prod.outlook.com (2603:10b6:a03:3e4::7) by BY5PR02MB6578.namprd02.prod.outlook.com (2603:10b6:a03:20b::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4867.7; Sun, 9 Jan 2022 20:07:29 +0000 Received: from SJ0PR02MB8353.namprd02.prod.outlook.com ([fe80::99da:604c:9db7:e163]) by SJ0PR02MB8353.namprd02.prod.outlook.com ([fe80::99da:604c:9db7:e163%5]) with mapi id 15.20.4867.011; Sun, 9 Jan 2022 20:07:28 +0000 From: Giridhar Mandyam To: Henk Birkholz , Laurence Lundblade , Dave Thaler CC: Dave Thaler , teep , Brendan Moran , rats Thread-Topic: [Rats] [Teep] Class ID claim (and other HW identification) Thread-Index: AQHYBN5hdSREgFdyDUmYZ1YqBO4UAaxbGmfQ Date: Sun, 9 Jan 2022 20:07:28 +0000 Message-ID: References: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> <8466B6E2-C335-4173-A2A2-3CCA555D28CA@arm.com> <62743D24-49F4-4480-9561-F00DA513C9FF@island-resort.com> <825C5FD3-729A-4612-B60A-8DB44AF069BC@island-resort.com> <9e7118fe-ece6-eb6c-a1c3-f73a804d704c@sit.fraunhofer.de> In-Reply-To: <9e7118fe-ece6-eb6c-a1c3-f73a804d704c@sit.fraunhofer.de> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=qti.qualcomm.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 22ea9713-eb65-4bc7-78bf-08d9d3aba9b2 x-ms-traffictypediagnostic: BY5PR02MB6578:EE_ x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:3513; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR02MB8353.namprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(122000001)(2906002)(55016003)(7696005)(66946007)(66446008)(966005)(9686003)(66476007)(316002)(508600001)(66556008)(45080400002)(71200400001)(64756008)(76116006)(38070700005)(53546011)(186003)(6506007)(52536014)(4326008)(26005)(33656002)(5660300002)(8676002)(38100700002)(8936002)(54906003)(110136005)(86362001)(83380400001)(66574015); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?B?NE91YXZ3RS94dElyMUhoYis4bjl1aGxkQjU3MTFFdk4zejhBdVQ3OWptc1BT?= =?utf-8?B?RnNKM2NNM0hndXdpWGcvd1hhL3hyNGRTOHIySFNrWkViNXY3UlZFM0ZxLzlM?= =?utf-8?B?T2Jnd2N0N2U4dk5JVDRHaDFGSUVKMHdTNU8vUVJIWlo3c25HZ29TdnAyQVBw?= =?utf-8?B?NkZ2ZzYwSzlBZVBxL1U0MDZzdnpWMkF6ODJtVFprN3Z0Tzd3SlF1ajdRQTc5?= =?utf-8?B?NVBSSXpkWEMyTytVb25SZ1dnU0pySTFwaFI5M09aZnJrNmRubW9taFR3WWNx?= =?utf-8?B?MzU5SkV0MHEyOFpZblZBUDdEcmZmejQ4WklvSmxYSDNza3VnZUJ5dWFxT2ZF?= =?utf-8?B?MVI4OXlPTGpHK0laUmhURWZLTm1OTWhmSS9MMDhqckVyeUx6dFJLaEpISTVH?= =?utf-8?B?UFlwWFk3WllINHI4cllBOG9HQitiZ1ZFQ0E5bXVmSHFkcmVValJBL3ZiTE5a?= =?utf-8?B?dWszb2dVZTFvVzlEV2lBQ25uWE5FdHVRQ25ibUJZK1JxMkYrcTBLd0J4MDdm?= =?utf-8?B?aXZIcEtzL29oVVVKYnVHWmRmUElBOUlOVjdCTU5rZ1BzQzFiWmw3ZEdVTEov?= =?utf-8?B?Qm5scE44S2hlbk9kb1dFbmcxM3dwaGVkMWNSV0NxN1JYZVdMZkZnT2V3b3Bv?= =?utf-8?B?M3FRNTB6Q0ZZdk1zMERmeFVkK1JqZTJWdXB5TWFwZVR6UHlVMHNESTY3K0s0?= =?utf-8?B?clhrTEYzc296UC9PWXdGUit1NTdNcmxaRGlzZTZpMmI4VXlMbWYvTHhacy9v?= =?utf-8?B?Z3NScFlOQVB4RXgwSXJNRzRhbW4rYnQ5NEdTZ0JYUmZPVVpxNHhZK2ZJR3pU?= =?utf-8?B?WFFnRXhQNmt2UnZGK2JNSm0vZnhaVmI5ZUtTeWFhV1NycVgzOXkxWmpQdXJZ?= =?utf-8?B?RlpsKzFqTVhlakxyK2VrZFJGY2hPVVNTL0R0Ry8wUnc3VVRDTzFDbkJYZEs2?= =?utf-8?B?YmFldjRIV3VPVEpzY2kzN0lleVcvNUJoenRNSlZnK1RWSzVqZUoyaU1mamRh?= =?utf-8?B?OW5ET2hLb0tMK05uV21ONFJieEZRQklqQ1VoMHNVZzlReUFmakRpRXV2SU5h?= =?utf-8?B?MStOWFlHOUdSU1c4c0JEYWJUVHNsR1F1UjdYV2c5RVZFQ3M1cWoxbXovazhq?= =?utf-8?B?S3VqRWpraEZjSE5BOXcvQncwVGFScVBnVG9QRy9uR05meEZvSjRQZ0ZhM0Fj?= =?utf-8?B?dUI5MDNRa01QR1dYM0dGUTdoejhwN2RtUnlqL1ZUZlNWUFhvSWtVbmZCcGhS?= =?utf-8?B?dG1kWGZVbHE3V1haaGN1KytlNldvUTR0V1F3RkNHY240aUl6MWprQ1FpZjhz?= =?utf-8?B?bHJqZXViZmZCdFNQM0pFWlpqdTllMHI4bWhGVWpodlp0YVpvZlVhVjdZMHh6?= =?utf-8?B?cUlib3A5VHI5aDY3cVVyMy9UYjNCSTNoWTFITTRoeVJ2dkgvU05BSzZOZlhj?= =?utf-8?B?TzA0VWYvaVJPdUhnZWFTSkExQjdsL3Y3VDRndlIzdXNRTW9DSFhMaVNCT1lo?= =?utf-8?B?QWF6TzJ1ekYxMTQxMlhsaWwxYWxaanVhRVREWEJDSzBndXpPSHM4WFFrdVJW?= =?utf-8?B?aC9ZWjQ5TFlxc2VlUzlRNmxveFZ0ekVrNjg0S3p6RHRDdExSK2wzdERSSWNu?= =?utf-8?B?OFpHZFFJUXdmbEUyRks0SFpKZzNULzRBVVNRTEh0WTNjYStCcHVZeG5pZXZh?= =?utf-8?B?RDZ4UU5Cc2JEZnJRN0Q1cVB4U1YrR3NZd2pEZW5GU2haMFJzK1hNK1BDNHBo?= =?utf-8?B?cm1Jc3hBdWVabVR4d0I2bkltbnhZU2JhMk5VM3BpZHM0dXhvcnRyN0ZYWWx3?= =?utf-8?B?RytRbmIzcWI2Y1ZmKzBoc3ZCY1dpams2MlNQN2NBa0U1aTl0cUMyUHhXNks0?= =?utf-8?B?TEYvNEhRb3IwbGVJbzNHaWprUU1JcHMrQ0JmamJmRXVhRW9NTnJjNmNhTEk3?= =?utf-8?B?aWhxZUkvQXpxYUNDVUFHVVNPeTFsSmt4aHYzMTB1cGE0aWl0TTZKSktnNW1h?= =?utf-8?B?aml6aWpQNEJ0eEtVaXBNQnNnV0Z4KzFmYW9oK2xLQUM0U0VlMm11bG5mR0xZ?= =?utf-8?B?OHJBMWtEMzR6U3lpRkhtanhyODdaV01vTUhoT1Y5Y2hSUHBoMUo3V3JNalBq?= =?utf-8?B?bzFYK1h4aGtVaXhSYjRaWW5wK2hNTzlGSlk3eXg1dmFYWTVLOENVWlZWVU10?= =?utf-8?B?TmhlUWh6VzZoT0VRcUhmcVIzb2FzQmI5cVZ5VGQydDllL1h6RTdmdXBobm9X?= =?utf-8?B?SXhMMVZzSkNFSkVsQUR0VGJUNDFnPT0=?= Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 MIME-Version: 1.0 X-OriginatorOrg: qti.qualcomm.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: SJ0PR02MB8353.namprd02.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 22ea9713-eb65-4bc7-78bf-08d9d3aba9b2 X-MS-Exchange-CrossTenant-originalarrivaltime: 09 Jan 2022 20:07:28.8872 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 98e9ba89-e1a1-4e38-9007-8bdabc25de1d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: Gz5wc7VzFbXwS6H3Sh1pUKCFn/trcAAvOe5rckexJQY0uiW0JNGqyEYNYtyVXvQDva18uvSGpcqNkUzTHpCcPinEHo/CF/uadqp5L47FcV0= X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR02MB6578 Archived-At: Subject: Re: [Teep] [Rats] Class ID claim (and other HW identification) X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 09 Jan 2022 20:07:53 -0000 PiBzbywgaXMgdGhpcyBhIGJsb2NrZXIgdG8gdGhlIEVBVCBjb3JlIGRvY3VtZW50IHRoZW4/IENv dWxkIHdlIHNwbGl0IHRoYXQgdG9waWMgb3V0Pw0KDQpXZSBjZXJ0YWlubHkgaGF2ZSB0aGUgb3B0 aW9uIG5vdCB0byBtYWtlIGl0IGEgYmxvY2tlciBmb3IgRUFUIGFuZCB0YWtlIGl0IG91dCBvZiBz Y29wZSBmb3IgdGhlIEVBVCBkb2N1bWVudC4gIEkgdGhpbmsgdGhhdCBpcyB0aGUgYmVzdCBhcHBy b2FjaCBnaXZlbiB0aGUgY3VycmVudCBsYWNrIG9mIGNvbnNlbnN1cyBvbiB3aGF0IHRoaXMgY2xh aW0gaXMgc3VwcG9zZWQgdG8gYmUuDQoNCj4gRXZlbiwgaWYgdGhlIHRhcmdldCB3b3VsZCBiZSBz aW1wbGVyLCBhZ3JlZWluZyBvbiB0aGUgdGFyZ2V0IHdpbGwgYWdhaW4gdGFrZSB0aW1lIGFuZCBJ IHRoaW5rIHRoYXQgbW9zdCBhZ3JlZSB0aGF0IGEgbGluZSBtb3N0IGJlIGRyYXduIGF0IHdoaWNo IHBvaW50IChzb3JyeS4uLikgY2xhaW1zIGdvIHRvIG90aGVyIGRvY3VtZW50cy4NCg0KSSBkb24n dCB1bmRlcnN0YW5kIHRoZSBwdXJwb3NlIG9mIHRoZSBIVyBjbGFzcyBjbGFpbSBvciBob3cgaXQg cHJvdmlkZXMgYW55IGFkZGl0aW9uYWwgc2VjdXJpdHkgYXNzdXJhbmNlcyBmb3IgYSByZWx5aW5n IHBhcnR5LiAgSSBqdXN0IGFzc3VtZWQgdGhhdCB0aGUgVEVFUCBXRyBoYWQgYWxyZWFkeSBkaXNj dXNzZWQgdGhpcyBhbmQgY29tZSB1cCB3aXRoIG9uZSBvciBtb3JlIHZhbGlkIHVzZSBjYXNlcyBm b3IgdGhpcyBjbGFpbS4gIFRoaXMgZG9lcyBub3QgYXBwZWFyIHRvIGJlIHRoZSBjYXNlLiAgTWF5 YmUgdGhlIGRpc2N1c3Npb24gc2hvdWxkIGJlIHVwLWxldmVsZWQgdG8gZ2V0IGEgYmV0dGVyIHVu ZGVyc3RhbmRpbmcgb2YgdGhlIGdvYWwocykgYmVmb3JlIHN0YXJ0aW5nIGEgZGlzY3Vzc2lvbiBv biBjbGFpbSBzZW1hbnRpY3MuICANCg0KRm9yIGluc3RhbmNlLCBpZiB0aGUgSFcgc3Vic3lzdGVt IGluIHF1ZXN0aW9uIGlzIHNlbGYtYXR0ZXN0YWJsZSB0aGVuIGl0IGNhbiBhbHJlYWR5IG1ha2Ug dXNlIG9mIHRoZSBleGlzdGluZyBDV1QgaXNzdWVyIGNsYWltIChodHRwczovL2RhdGF0cmFja2Vy LmlldGYub3JnL2RvYy9odG1sL3JmYzgzOTIjc2VjdGlvbi0zLjEuMSkgLSB3aGljaCBpcyBhbHNv IGEgcGVyZmVjdGx5IHZhbGlkIGNsYWltIHRvIGluY2x1ZGUgaW4gYW4gRUFULiAgSWYgdGhlIEhX IHN1YnN5c3RlbSBpc3N1ZXMgYW4gRUFUIHdoZXJlIHRoZSBpc3MgZmllbGQgaWRlbnRpZmllZCB0 aGUgbWFrZS9tb2RlbC92ZXJzaW9uIG9mIHRoZSBIVyB0aGVuIHdvdWxkIHRoYXQgYmUgc3VmZmlj aWVudCBmb3IgdGhlIHRhcmdldGVkIHVzZSBjYXNlPyAgSWYgbm90LCB3aGF0IGlzIHJlcXVpcmVk IGluIGFkZGl0aW9uIGFuZCB3b3VsZCB0aGUgcHJvcG9zZWQgbmV3IGNsYWltIHByb3ZpZGUgYWRk aXRpb25hbCBpbmZvcm1hdGlvbiB0byBhIHJlbHlpbmcgcGFydHkgYWJvdXQgdGhlIHNlY3VyaXR5 IGFzc3VyYW5jZSBvZmZlcmVkIGJ5IHRoZSBIVyBzdWJzeXN0ZW0/DQoNCi1HaXJpDQoNCi0tLS0t T3JpZ2luYWwgTWVzc2FnZS0tLS0tDQpGcm9tOiBIZW5rIEJpcmtob2x6IDxoZW5rLmJpcmtob2x6 QHNpdC5mcmF1bmhvZmVyLmRlPiANClNlbnQ6IFNhdHVyZGF5LCBKYW51YXJ5IDgsIDIwMjIgMjoy MyBQTQ0KVG86IEdpcmlkaGFyIE1hbmR5YW0gPG1hbmR5YW1AcXRpLnF1YWxjb21tLmNvbT47IExh dXJlbmNlIEx1bmRibGFkZSA8bGdsQGlzbGFuZC1yZXNvcnQuY29tPjsgRGF2ZSBUaGFsZXIgPGR0 aGFsZXJAbWljcm9zb2Z0LmNvbT4NCkNjOiBEYXZlIFRoYWxlciA8ZHRoYWxlcj00MG1pY3Jvc29m dC5jb21AZG1hcmMuaWV0Zi5vcmc+OyB0ZWVwIDx0ZWVwQGlldGYub3JnPjsgQnJlbmRhbiBNb3Jh biA8QnJlbmRhbi5Nb3JhbkBhcm0uY29tPjsgcmF0cyA8cmF0c0BpZXRmLm9yZz4NClN1YmplY3Q6 IFJlOiBbUmF0c10gW1RlZXBdIENsYXNzIElEIGNsYWltIChhbmQgb3RoZXIgSFcgaWRlbnRpZmlj YXRpb24pDQoNCldBUk5JTkc6IFRoaXMgZW1haWwgb3JpZ2luYXRlZCBmcm9tIG91dHNpZGUgb2Yg UXVhbGNvbW0uIFBsZWFzZSBiZSB3YXJ5IG9mIGFueSBsaW5rcyBvciBhdHRhY2htZW50cywgYW5k IGRvIG5vdCBlbmFibGUgbWFjcm9zLg0KDQpIaSBHaXJpLA0KDQpUTDtEUiBBcmUgd2Ugd2FpdGlu ZyBmb3IgdGhpcz8gSG93IGxvZyB3aWxsIGl0IHRha2U/DQoNCnNvLCBpcyB0aGlzIGEgYmxvY2tl ciB0byB0aGUgRUFUIGNvcmUgZG9jdW1lbnQgdGhlbj8gQ291bGQgd2Ugc3BsaXQgdGhhdCB0b3Bp YyBvdXQ/IElmIHdlIGFyZSBzdGFydGluZyB3aXRoIGEgKGhhcmR3YXJlIHN5c3RlbSBjb21wb25l bnQgY2hhcmFjdGVyaXN0aWNzIHRheG9ub215IGhlcmUgLSB3aGlsZSBhY3R1YWxseSB3b3J0aHdo aWxlIGFuZCB1c2VmdWwgdG8gYXR0ZW1wdCAtIHRoYXQgd2lsbCB0YWtlIGEgd2hpbGUuIEV2ZW4s IGlmIHRoZSB0YXJnZXQgd291bGQgYmUgc2ltcGxlciwgYWdyZWVpbmcgb24gdGhlIHRhcmdldCB3 aWxsIGFnYWluIHRha2UgdGltZSBhbmQgSSB0aGluayB0aGF0IG1vc3QgYWdyZWUgdGhhdCBhIGxp bmUgbW9zdCBiZSBkcmF3biBhdCB3aGljaCBwb2ludCAoc29ycnkuLi4pIGNsYWltcyBnbyB0byBv dGhlciBkb2N1bWVudHMuDQoNClZpZWxlIEdyw7zDn2UsDQoNCkhlbmsNCg0KT24gMDguMDEuMjIg MjE6MTUsIEdpcmlkaGFyIE1hbmR5YW0gd3JvdGU6DQo+IER1cmluZyB0aGUgUkFUUyBtZWV0aW5n IGluIElFVEYgMTEyLCB0aGUgRUFUIGVkaXRvcnMgd2VyZSBhc3N1cmVkIHRoYXQgDQo+IHRoZSBU RUVQIFdHIGhhZCByZWFjaGVkIGEgY29uc2Vuc3VzIHRoYXQgaWYgdGhpcyBjbGFpbSBpcyBkZWZp bmVkIGFzIA0KPiBvcGFxdWUgZGF0YSAoaHR0cHM6Ly9naXRodWIuY29tL2lldGYtcmF0cy13Zy9l YXQvcHVsbC8xMzkNCj4gPGh0dHBzOi8vZ2l0aHViLmNvbS9pZXRmLXJhdHMtd2cvZWF0L3B1bGwv MTM5PikgdGhlbiB0aGUgVEVFUCANCj4gcmVxdWlyZW1lbnQgd291bGQgYmUgbWV0Lg0KPg0KPiBC YXNlZCBvbiB0aGUgZGlzY3Vzc2lvbiBiZWxvdywgdGhlIFRFRVAgV0cgaGFzIGNsZWFybHkgbm90 IGFycml2ZWQgYXQgDQo+IGNvbnNlbnN1cyBhcyB0byB3aGF0IGEgSFcgY2xhc3MgY2xhaW0gaXMg c3VwcG9zZWQgdG8gYmUuICBSYXRoZXIgdGhhbiANCj4gdG8ga2VlcCB0cnlpbmcgdG8gaXRlcmF0 ZSBvbiBhbiBFQVQgUFIgdGhhdCBtYXkgb3IgbWF5IG5vdCByZXByZXNlbnQgDQo+IFRFRVAgY29u c2Vuc3VzLCBJIHdvdWxkIHN1Z2dlc3QgdGhlIFRFRVAgV0cgY29udGludWUgdGhlIGRpc2N1c3Np b24gb24gDQo+IHRoaXMgdG9waWMgYW5kIHByZXNlbnQgYSBmb3JtYWwgcHJvcG9zYWwgdG8gdGhl IFJBVFMgV0cuICBXaGVuIEkgc2F5IA0KPiDigJxURUVQIFdH4oCdLCBJIG1lYW4gdGhhdCB0aGUg cHJvcG9zYWwgc2hvdWxkIGJlIHByb3ZpZGVkIGJ5IG9uZSBvciBtb3JlIA0KPiBpbmRpdmlkdWFs cyB3aG8gY2FuIGNyZWRpYmx5IGNsYWltIHRvIHNwZWFrIGZvciB0aGUgV0csIHN1Y2ggYXMgdGhl IA0KPiBXb3JraW5nIEdyb3VwIGNoYWlycy4NCj4NCj4gLUdpcmkgTWFuZHlhbSwgY28tZWRpdG9y IG9mIEVBVA0KPg0KPiAqRnJvbToqIFJBVFMgPHJhdHMtYm91bmNlc0BpZXRmLm9yZz4gKk9uIEJl aGFsZiBPZiAqIExhdXJlbmNlIA0KPiBMdW5kYmxhZGUNCj4gKlNlbnQ6KiBTYXR1cmRheSwgSmFu dWFyeSA4LCAyMDIyIDExOjQyIEFNDQo+ICpUbzoqIERhdmUgVGhhbGVyIDxkdGhhbGVyQG1pY3Jv c29mdC5jb20+DQo+ICpDYzoqIERhdmUgVGhhbGVyIDxkdGhhbGVyPTQwbWljcm9zb2Z0LmNvbUBk bWFyYy5pZXRmLm9yZz47IHRlZXAgDQo+IDx0ZWVwQGlldGYub3JnPjsgQnJlbmRhbiBNb3JhbiA8 QnJlbmRhbi5Nb3JhbkBhcm0uY29tPjsgcmF0cyANCj4gPHJhdHNAaWV0Zi5vcmc+DQo+ICpTdWJq ZWN0OiogUmU6IFtSYXRzXSBbVGVlcF0gQ2xhc3MgSUQgY2xhaW0gKGFuZCBvdGhlciBIVyANCj4g aWRlbnRpZmljYXRpb24pDQo+DQo+IFllYWgsIEkgd2FzIGNvbmZ1c2VkIGJ5IHRoZSB1c2Ugb2Yg 4oCcSVAiIHdoZW4gSSBmaXJzdCBoZWFyZCBpdCBhZnRlciANCj4gam9pbmluZyB0aGUgSFcgdGVh bSBhdCBRdWFsY29tbSwgYnV0IGl0IGlzIHRoZSBwaHJhc2UgdGhhdCBpcyB1c2VkIGJ5IA0KPiB0 aGUgSFcgaW5kdXN0cnk6DQo+DQo+ICAgICBodHRwczovL3d3dy5zeW5vcHN5cy5jb20vZGVzaWdu d2FyZS1pcC5odG1sDQo+ICAgICA8aHR0cHM6Ly93d3cuc3lub3BzeXMuY29tL2Rlc2lnbndhcmUt aXAuaHRtbD4NCj4NCj4gICAgIGh0dHBzOi8vd3d3LmFybS5jb20vcHJvZHVjdHMvc2lsaWNvbi1p cC1zZWN1cml0eQ0KPiAgICAgPGh0dHBzOi8vd3d3LmFybS5jb20vcHJvZHVjdHMvc2lsaWNvbi1p cC1zZWN1cml0eT4NCj4NCj4gICAgIGh0dHBzOi8vZW4ud2lraXBlZGlhLm9yZy93aWtpL1NlbWlj b25kdWN0b3JfaW50ZWxsZWN0dWFsX3Byb3BlcnR5X2NvcmUNCj4gICAgIA0KPiA8aHR0cHM6Ly9l bi53aWtpcGVkaWEub3JnL3dpa2kvU2VtaWNvbmR1Y3Rvcl9pbnRlbGxlY3R1YWxfcHJvcGVydHlf Y29yDQo+IGU+DQo+DQo+ICAgICBodHRwczovL3d3dy5pbWFnaW5hdGlvbnRlY2guY29tL3Byb2R1 Y3RzLw0KPiAgICAgPGh0dHBzOi8vd3d3LmltYWdpbmF0aW9udGVjaC5jb20vcHJvZHVjdHMvPg0K Pg0KPiDigJxJUOKAnSBpcyBldmVuIGluIHRoZSBVUkzigJlzLg0KPg0KPiBIb3cgYWJvdXQgb25l IG9mIHRoZXNlPw0KPg0KPiAgICAg4oCcU2lsaWNvbiBJUCBJROKAnQ0KPg0KPiAgICAg4oCcSFcg RGVzaWduIElQIElE4oCdDQo+DQo+ICAgICDigJxTZW1pY29uZHVjdG9yIElQIElEIg0KPg0KPiBX ZSBjYW4gYWRkIGEgc2VudGVuY2Ugb3IgdHdvIHRoYXQgZ2l2ZXMgc29tZSBjb250ZXh0IGZvciBw ZW9wbGUgdGhhdCANCj4gaGF2ZW7igJl0IHJ1biBpbnRvIHRoaXMuDQo+DQo+IE1vcmUgaW1wb3J0 YW50IHRoYW4gdGhlIG5hbWUsIEnigJlkIGxpa2UgdG8gbWFrZSB0aGUgY2xhaW06DQo+DQo+ICAg ICBhIG1hcCBvciBhcnJheSB0aGF0DQo+DQo+ICAgICAgICBtdXN0IGNvbnRhaW4gYW4gT0VNIElE IG9mIHRoZSB2ZW5kb3Igb2YgdGhlIElQDQo+DQo+ICAgICAgICBtYXkgY29udGFpbiBhIG1vZGVs IGluZGljYXRvcg0KPg0KPiAgICAgICAgbWF5IGNvbnRhaW4gYSB2ZXJzaW9uDQo+DQo+IEkgdGhp bmsgdGhpcyBsaW5lcyB1cCB3aXRoIHdoYXQgQnJlbmRvbiBzdWdnZXN0cyBpcyBuZWVkZWQgYW5k IG1ha2VzIA0KPiBtb3JlIHNlbnNlIHRvIG1lIGJlY2F1c2UgaXQgZGVzY3JpYmVzIHRoZSB2ZXJ5 IGNvbW1vbiBjb252ZW50aW9uIG9mIA0KPiBpZGVudGlmeWluZyBwaHlzaWNhbGx5IGJ1aWx0IHRo aW5ncyAoY2FycywgY2hpcHMsIHJlZnJpZ2VyYXRvcnMuLi4pLg0KPg0KPiBMTA0KPg0KPg0KPg0K PiAgICAgT24gSmFuIDcsIDIwMjIsIGF0IDQ6MDcgUE0sIERhdmUgVGhhbGVyIDxkdGhhbGVyQG1p Y3Jvc29mdC5jb20NCj4gICAgIDxtYWlsdG86ZHRoYWxlckBtaWNyb3NvZnQuY29tPj4gd3JvdGU6 DQo+DQo+ICAgICDigJxJUOKAnSAoYXMgaW4gSW50ZWxsZWN0dWFsIFByb3BlcnR5LCBub3QgSW50 ZXJuZXQgUHJvdG9jb2wpIGlzIG5vdCB0aGUNCj4gICAgIHJpZ2h0IHRlcm0gaW4gbXkgdmlldyBz aW5jZSB0aGF0IGltcGxpZXMgdGhlcmUgYWN0dWFsbHkgaXMgc29tZSBJUA0KPiAgICAgYXMgb3Bw b3NlZCB0byAoc2F5KSBjb25mb3JtYW5jZSB0byBhIHN0YW5kYXJkLiAgSSBhbSBmaW5lIHdpdGgN Cj4gICAgIOKAnENsYXNz4oCdIGFzIHlvdSBoYWQgaXQgaW4gdGhlIFBSLCBidXQgSSB0aGluayDi gJxJUOKAnSBpcyB0b28gbmFycm93IGluDQo+ICAgICBpbXBsaWNhdGlvbi4NCj4NCj4gICAgIERh dmUNCj4NCj4gICAgICpGcm9tOipURUVQIDx0ZWVwLWJvdW5jZXNAaWV0Zi5vcmcNCj4gICAgIDxt YWlsdG86dGVlcC1ib3VuY2VzQGlldGYub3JnPj4qT24gQmVoYWxmIE9mKkxhdXJlbmNlIEx1bmRi bGFkZQ0KPiAgICAgKlNlbnQ6KkZyaWRheSwgSmFudWFyeSA3LCAyMDIyIDM6NTYgUE0NCj4gICAg ICpUbzoqQnJlbmRhbiBNb3JhbiA8QnJlbmRhbi5Nb3JhbkBhcm0uY29tDQo+ICAgICA8bWFpbHRv OkJyZW5kYW4uTW9yYW5AYXJtLmNvbT4+DQo+ICAgICAqQ2M6KkRhdmUgVGhhbGVyIDxkdGhhbGVy PTQwbWljcm9zb2Z0LmNvbUBkbWFyYy5pZXRmLm9yZw0KPiAgICAgPG1haWx0bzpkdGhhbGVyPTQw bWljcm9zb2Z0LmNvbUBkbWFyYy5pZXRmLm9yZz4+OyB0ZWVwDQo+ICAgICA8dGVlcEBpZXRmLm9y ZyA8bWFpbHRvOnRlZXBAaWV0Zi5vcmc+PjsgcmF0cyA8cmF0c0BpZXRmLm9yZw0KPiAgICAgPG1h aWx0bzpyYXRzQGlldGYub3JnPj4NCj4gICAgICpTdWJqZWN0OipSZTogW1RlZXBdIFtSYXRzXSBD bGFzcyBJRCBjbGFpbSAoYW5kIG90aGVyIEhXIA0KPiBpZGVudGlmaWNhdGlvbikNCj4NCj4gICAg IFNvIHJhdGhlciB0aGFuIGEgSFcgQ2xhc3MsIGhvdyBhYm91dCBhIEhXIElQIGNsYWltPyBJdCB3 b3VsZCByZXVzZQ0KPiAgICAgdGhlIHNhbWUgdHJpcGxlIGZvciBpZGVudGlmeWluZyBIVywgT0VN LCBNb2RlbCwgVmVyc2lvbi4gSXQgY291bGQNCj4gICAgIG9jY3VyIGFsb25nIHNpZGUgdGhlIEhX IE9FTSwgbW9kZWwgYW5kIHZlcnNpb24uIFRoaXMgc2VlbXMgYmV0dGVyDQo+ICAgICB0aGFuIG15 IGN1cnJlbnQgUFIgYW5kIGxpbmVzIHVwIGJldHRlciB3aXRoIEJyZW5kYW7igJlzIGV4YW1wbGVz IGFuZA0KPiAgICAgd2l0aCB0aGUgcmVhbGl0eSB0aGF0IEhXIElQIGNvbWVzIGZyb20gYSB2ZW5k b3IsIGhhcyBtb2RlbHMgYW5kDQo+ICAgICB2ZXJzaW9ucy4gSeKAmWxsIHdyaXRlIHVwIGEgUFIg Zm9yIGl0IGlmIEkgcmVjZWl2ZSBzb21lIHBvc2l0aXZlDQo+ICAgICBmZWVkYmFjayBoZXJlLg0K Pg0KPiAgICAgVGhlIGRpc3RpbmN0aW9uIGJldHdlZW4gY2hpcCBhbmQgZGV2aWNlIGlzIGludGVu ZGVkIHRvIGJlIGhhbmRsZWQgYnkNCj4gICAgIHN1Ym1vZHVsZXMgaW4gRUFULiBTdWJtb2R1bGVz IGNhbiBleHByZXNzIGFyYml0cmFyaWx5IGNvbXBsZXgNCj4gICAgIGFyY2hpdGVjdHVyZXMgYW5k IGRldmljZSBjb21wb3NpdGlvbnMuDQo+DQo+ICAgICBJIHRoaW5rIGl04oCZcyBjbGVhbmVyIHRv IGtlZXAgdGhlIEhXLWlkZW50aWZ5aW5nIGNsYWltcyBzZXBhcmF0ZSBmcm9tDQo+ICAgICB0aGUg U1ctaWRlbnRpZnkgY2xhaW1zLiBXb3VsZCByZWFsbHkgbGlrZSB0aGUgaWRlbnRpZmljYXRpb24g b2YgdGhlDQo+ICAgICBUcnVzdGVkIE9TIFZlbmRvciBiZSBoYW5kbGVkIGJ5IENvU1dJRCBhbmQg ZnJpZW5kcy4gVHJ5aW5nIHRvIG1ha2UNCj4gICAgIHNvbWUgY2xhaW0gc3VpdGFibGUgZm9yIGlk ZW50aWZ5aW5nIGJvdGggU1cgYW5kIEhXIGZvciBhbGwgb2YNCj4gICAgIGF0dGVzdGF0aW9uIHNl ZW1zIG92ZXItYW1iaXRpb3VzLg0KPg0KPiAgICAgSSBhbHNvIHRoaW5rIGl04oCZcyBmaW5lIHRv IGRlZmluZSBzb21lIGNsYWltcyBiZXR0ZXIgc3VpdGVkIHRvIHRoZQ0KPiAgICAgVEVFIHdvcmxk IGluIFRFRVAgaWYgd2UgY2Fu4oCZdCBmaW5kIGVub3VnaCBjb21tb24gZ3JvdW5kIGJldHdlZW4g VEVFUA0KPiAgICAgYW5kIHRoZSB2ZXJ5IGJyb2FkbHkgYXBwbGljYWJsZSBzdHVmZiB0aGF0IGdv ZXMgaW50byBFQVQuDQo+DQo+ICAgICBMTA0KPg0KPiAgICAgTm90ZTogSSBmaW5kIHRoZSB1c2Ug b2YgdGhlIHdvcmQg4oCcY2xhc3PigJ0gaGVyZSBjb25mdXNpbmcuIElmIEkgd2VyZQ0KPiAgICAg cHV0dGluZyBUVuKAmXMgaW50byBjbGFzc2VzIEnigJlkIHVzZXMgY2xhc3NlcyBsaWtlIHNtYXJ0 L2R1bWIsIGRpc3BsYXkNCj4gICAgIHR5cGUgKExDRCwgQ1JULCBPTEVEKSBhbmQgc3VjaCB0aGF0 IGlkZW50aWZ5IGNoYXJhY3RlcmlzdGljcyBvZiBUVnMNCj4gICAgIGluZGVwZW5kZW50IG9mIHZl bmRvciBhbmQgbW9kZWwuICJTb255IEJyYXZpYSIgaXMgbm90IGEgY2xhc3MgSU1PLg0KPiAgICAg Tm9yIGlzIOKAnE1pY3Jvc29mdCBXaW5kb3dz4oCdIChhbiBPUyB0aGUgcnVucyBvbiBsb3RzIG9m IEhXIHBsYXRmb3JtcykuDQo+ICAgICBJ4oCZZCBsaWtlIHRvIG1vdmUgYXdheSBmcm9tIHRoZSB3 b3JkLg0KPg0KPg0KPg0KPg0KPiAgICAgICAgIE9uIEphbiA0LCAyMDIyLCBhdCAzOjA2IEFNLCBC cmVuZGFuIE1vcmFuIDxCcmVuZGFuLk1vcmFuQGFybS5jb20NCj4gICAgICAgICA8bWFpbHRvOkJy ZW5kYW4uTW9yYW5AYXJtLmNvbT4+IHdyb3RlOg0KPg0KPiAgICAgICAgIEkgdGhpbmsgZGV2aWNl cyB3aWxsIG5lZWQgdG8gcmVwb3J0IG11bHRpcGxlIHZlbmRvci9jbGFzcyBwYWlycy4NCj4NCj4g ICAgICAgICBGb3IgZXhhbXBsZSwgQSBtb2JpbGUgZGV2aWNlIGNvdWxkIHBvdGVudGlhbGx5IGNv bnRhaW46DQo+DQo+ICAgICAgICAgMS4gQSBNb2JpbGUgRGV2aWNlIE9FTSBWZW5kb3IgSUQNCj4N Cj4gICAgICAgICAyLiBBIFNpbGljb24gdmVuZG9y4oCZcyBWZW5kb3IgSUQNCj4NCj4gICAgICAg ICAzLiBBbiBJUCB2ZW5kb3LigJlzIFZlbmRvciBJRA0KPg0KPiAgICAgICAgIFRoaXMgaXMgbm90 IGFuIGV4aGF1c3RpdmUgbGlzdC4NCj4NCj4gICAgICAgICBGb3IgQXJtIFRydXN0IFpvbmUgVEVF cywgSSB3b3VsZCBleHBlY3QgdG8gc2VlOg0KPg0KPiAgICAgICAgIDEuIFRoZSBBcm0gVmVuZG9y IElEICsgdGhlIHByb2Nlc3NvciBjb3Jl4oCZcyBDbGFzcyBJRA0KPg0KPiAgICAgICAgIDIuIFRo ZSBUcnVzdGVkIE9TIFZlbmRvciBJRCArIHRoZSBUcnVzdGVkIE9TIENsYXNzIElEDQo+DQo+ICAg ICAgICAgMy4gVGhlIFNpbGljb24gdmVuZG9y4oCZcyBWZW5kb3IgSUQgKyB0aGUgcHJvY2Vzc29y IENsYXNzIElEDQo+DQo+ICAgICAgICAgNC4gVGhlIERldmljZSBPRU3igJlzIFZlbmRvciBJRCAr IHRoZSBkZXZpY2UgQ2xhc3MgSUQNCj4NCj4gICAgICAgICBDaGVlcnMsDQo+DQo+ICAgICAgICAg QnJlbmRhbg0KPg0KPg0KPg0KPg0KPiAgICAgICAgICAgICBPbiAzIEphbiAyMDIyLCBhdCAyMTow MCwgRGF2ZSBUaGFsZXINCj4gICAgICAgICAgICAgPGR0aGFsZXI9NDBtaWNyb3NvZnQuY29tQGRt YXJjLmlldGYub3JnDQo+ICAgICAgICAgICAgIDxtYWlsdG86ZHRoYWxlcj00MG1pY3Jvc29mdC5j b21AZG1hcmMuaWV0Zi5vcmc+PiB3cm90ZToNCj4NCj4gICAgICAgICAgICAgTGF1cmVuY2UgTHVu ZGJsYWRlIHdyb3RlOg0KPg0KPg0KPiAgICAgICAgICAgICAgICAgSSB0YWxrZWQgdG8gRGF2ZSB3 aGljaCByZXN1bHRlZCBpbiByZW9yaWVudGF0aW9uIG9mIG15DQo+ICAgICAgICAgICAgICAgICB1 bmRlcnN0YW5kaW5nIG9mIENsYXNzIElEIGluIFRFRVAuDQo+DQo+ICAgICAgICAgICAgICAgICBD bGFzcyBJRCBiYXNpY2FsbHkgaWRlbnRpZmllcyBIVyBJUCBmcm9tIGEgSFcgZGVzaWduZXINCj4g ICAgICAgICAgICAgICAgIGxpa2UgQXJtIG9yIFN5bm9wc2lzIHRoYXQgaXMgaW50ZWdyYXRlZCBp bnRvIGNoaXBzIG1hZGUNCj4gICAgICAgICAgICAgICAgIGJ5IHZhcmlvdXMgSFcgT0VNcyBsaWtl IFF1YWxjb21tLCBTYW1zdW5nIGFuZCBBcHBsZS4gVGhlDQo+ICAgICAgICAgICAgICAgICB0ZXJt IHVzZWQgZnJlcXVlbnRseSBmb3IgdGhpcyBpcyAiSVAiIChJIGtub3cgdGhpcyB3ZWxsDQo+ICAg ICAgICAgICAgICAgICBmcm9tIG15IGRheXMgd29ya2luZyBvbiBIVyBhdCBRdWFsY29tbSkuDQo+ DQo+ICAgICAgICAgICAgICAgICBJJ3ZlIGNyZWF0ZWQgYSBQUiBmb3IgSFcgQ2xhc3MuDQo+DQo+ ICAgICAgICAgICAgICAgICBTaW5jZSB3aGF0IGlzIGlkZW50aWZpZWQgc3BhbnMgT0VNcywgdGhp cyBtdXN0IGJlIGENCj4gICAgICAgICAgICAgICAgIGdsb2JhbGx5IHVuaXF1ZSBpZGVudGlmaWVy LiBXZSBuZWVkIHRvIGJlIGV4cGxpY2l0IGFib3V0DQo+ICAgICAgICAgICAgICAgICB0aGF0Lg0K Pg0KPiAgICAgICAgICAgICAgICAgSSBrbm93IG9mIGZvdXIgd2F5cyB0byBoYXZlIGEgZ2xvYmFs IGlkZW50aWZpZXI6DQo+ICAgICAgICAgICAgICAgICAtIFVzZSBPSURzDQo+ICAgICAgICAgICAg ICAgICAtIFVzZSBETlMgLyBVUkkNCj4gICAgICAgICAgICAgICAgIC0gUHJvYmFiaWxpc3RpY2Fs bHkgdXNpbmcgYSBiaWcgZW5vdWdoIGJ5dGUgc3RyaW5nDQo+ICAgICAgICAgICAgICAgICAtIEEg bmV3IHJlZ2lzdHJ5LCBwZXJoYXBzIElBTkEgKGJ1dCB3ZSBwcm9iYWJseSBkb24ndA0KPiAgICAg ICAgICAgICAgICAgd2FudCB0aGlzKQ0KPg0KPiAgICAgICAgICAgICAgICAgVGhlIFBSIGFsbG93 cyBhbGwgYnV0IHRoZSBsYXN0LCBidXQgdGhpcyBjb3VsZCBiZQ0KPiAgICAgICAgICAgICAgICAg cmVkdWNlZCB0byBqdXN0IG9uZSBvciB0d28gb2YgdGhlIGFib3ZlLg0KPg0KPg0KPiAgICAgICAg ICAgICBQUiBsb29rcyBncmVhdCB0byBtZSwgZXhjZXB0IHRoYXQgd291bGQgSSBhZ3JlZSB3aXRo DQo+ICAgICAgICAgICAgIHJlZHVjaW5nIGl0IHRvIG9uZSBvciB0d28uDQo+ICAgICAgICAgICAg IFNpbmNlIHRoZSBhYmlsaXR5IHRvIHRha2UgYSB2YWx1ZSBhbmQgcmVzb2x2ZSBpdCB0bw0KPiAg ICAgICAgICAgICBzb21ldGhpbmcgbWVhbmluZ2Z1bCBpcyB1c2VmdWwgaW4gbWFueSBjYXNlcyAo bG9nZ2luZywNCj4gICAgICAgICAgICAgd2lyZXNoYXJrIGFuYWx5c2lzLCBldGMuKSwgSSB3b3Vs ZCByZW1vdmUgdGhlIHRoaXJkIG9wdGlvbi4NCj4NCj4gICAgICAgICAgICAgT0lEcywgZW5jb2Rl ZCBhcyBpbnQgYXJyYXlzLCBwcm9iYWJseSBjb21wcmVzcyB0aGUgYmVzdCBzbw0KPiAgICAgICAg ICAgICBpZiBvbmx5IG9uZSwgdGhlbiBJJ2QgcGljayB0aGF0IG9uZS4gIFVSSXMgYXJlIGNvbnZl bmllbnQNCj4gICAgICAgICAgICAgdGhvdWdoIGFsc28gc28gaWYgdHdvLCB0aGVuIHRoYXQncyBt eSBzZWNvbmQgcGljay4NCj4NCj4NCj4NCj4gICAgICAgICAgICAgICAgIEkgZG9uJ3Qgc2VlIHRo aXMgY2xhaW0gYXMgZXNzZW50aWFsIGZvciBFQVQsIGJ1dCBJDQo+ICAgICAgICAgICAgICAgICBj b21taXR0ZWQgdG8gd29ya2luZyB0aHJvdWdoIHRoaXMgd2l0aCBURUVQLiBJJ20gZmluZQ0KPiAg ICAgICAgICAgICAgICAgd2l0aCB0aGlzIFBSIGdvaW5nIGludG8gYSBURUVQIGRvY3VtZW50IHJh dGhlciB0aGFuIEVBVC4NCj4NCj4NCj4gICAgICAgICAgICAgVGhlIG5vdGlvbiBvZiBIVyBjbGFz cyBJRCBpcyBub3Qgc3BlY2lmaWMgdG8gVEVFcywgaGVuY2UgdGhlDQo+ICAgICAgICAgICAgIHJl cXVlc3QgdG8gcHV0IGl0IGluIEVBVCByYXRoZXIgdGhhbiBpbiBhbnl0aGluZyB0aGF0IHdvdWxk DQo+ICAgICAgICAgICAgIGltcGx5IHVzZSBpcyBsaW1pdGVkIHRvIFRFRXMgKGhlbmNlIG5vdCBp biBhIFRFRVAgZG9jdW1lbnQpLg0KPg0KPiAgICAgICAgICAgICAtRGF2ZQ0KPg0KPiAgICAgICAg ICAgICBfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0KPiAg ICAgICAgICAgICBURUVQIG1haWxpbmcgbGlzdA0KPiAgICAgICAgICAgICBURUVQQGlldGYub3Jn IDxtYWlsdG86VEVFUEBpZXRmLm9yZz4NCj4gICAgICAgICAgICAgaHR0cHM6Ly93d3cuaWV0Zi5v cmcvbWFpbG1hbi9saXN0aW5mby90ZWVwDQo+ICAgICAgICAgICAgIA0KPiA8aHR0cHM6Ly9uYW0w Ni5zYWZlbGlua3MucHJvdGVjdGlvbi5vdXRsb29rLmNvbS8/dXJsPWh0dHBzJTNBJTJGJTJGd3d3 DQo+IC5pZXRmLm9yZyUyRm1haWxtYW4lMkZsaXN0aW5mbyUyRnRlZXAmZGF0YT0wNCU3QzAxJTdD ZHRoYWxlciU0MG1pY3Jvc28NCj4gZnQuY29tJTdDZWY2NTJkZTcwYzA0NGM5ZmYyMzQwOGQ5ZDIz OTU1NzAlN0M3MmY5ODhiZjg2ZjE0MWFmOTFhYjJkN2NkMA0KPiAxMWRiNDclN0MxJTdDMCU3QzYz Nzc3MTk2NjY3ODI4OTIxNSU3Q1Vua25vd24lN0NUV0ZwYkdac2IzZDhleUpXSWpvaU1DDQo+IDR3 TGpBd01EQWlMQ0pRSWpvaVYybHVNeklpTENKQlRpSTZJazFoYVd3aUxDSlhWQ0k2TW4wJTNEJTdD MTAwMCZzZGF0YT0NCj4gZWtrU3JhOXllVnh1NVBjczJXclZQUFNzNjJMR2F0VlR4a3FEY3B0cDVQ USUzRCZyZXNlcnZlZD0wPg0KPg0KPiAgICAgICAgIElNUE9SVEFOVCBOT1RJQ0U6IFRoZSBjb250 ZW50cyBvZiB0aGlzIGVtYWlsIGFuZCBhbnkgYXR0YWNobWVudHMNCj4gICAgICAgICBhcmUgY29u ZmlkZW50aWFsIGFuZCBtYXkgYWxzbyBiZSBwcml2aWxlZ2VkLiBJZiB5b3UgYXJlIG5vdCB0aGUN Cj4gICAgICAgICBpbnRlbmRlZCByZWNpcGllbnQsIHBsZWFzZSBub3RpZnkgdGhlIHNlbmRlciBp bW1lZGlhdGVseSBhbmQgZG8NCj4gICAgICAgICBub3QgZGlzY2xvc2UgdGhlIGNvbnRlbnRzIHRv IGFueSBvdGhlciBwZXJzb24sIHVzZSBpdCBmb3IgYW55DQo+ICAgICAgICAgcHVycG9zZSwgb3Ig c3RvcmUgb3IgY29weSB0aGUgaW5mb3JtYXRpb24gaW4gYW55IG1lZGl1bS4gVGhhbmsgeW91Lg0K Pg0KPg0KPiBfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXw0K PiBSQVRTIG1haWxpbmcgbGlzdA0KPiBSQVRTQGlldGYub3JnDQo+IGh0dHBzOi8vd3d3LmlldGYu b3JnL21haWxtYW4vbGlzdGluZm8vcmF0cw0KPg0K From nobody Mon Jan 10 07:06:08 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 04BF73A1223; Mon, 10 Jan 2022 07:06:02 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.099 X-Spam-Level: X-Spam-Status: No, score=-2.099 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=sandelman.ca Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id px5AHohzLiww; Mon, 10 Jan 2022 07:05:57 -0800 (PST) Received: from tuna.sandelman.ca (tuna.sandelman.ca [209.87.249.19]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CA17F3A121A; Mon, 10 Jan 2022 07:05:56 -0800 (PST) Received: from localhost (localhost [127.0.0.1]) by tuna.sandelman.ca (Postfix) with ESMTP id C996E39103; Mon, 10 Jan 2022 10:11:43 -0500 (EST) Received: from tuna.sandelman.ca ([127.0.0.1]) by localhost (localhost [127.0.0.1]) (amavisd-new, port 10024) with LMTP id SiW035MlAolQ; Mon, 10 Jan 2022 10:11:43 -0500 (EST) Received: from sandelman.ca (obiwan.sandelman.ca [209.87.249.21]) by tuna.sandelman.ca (Postfix) with ESMTP id 3889E39102; Mon, 10 Jan 2022 10:11:43 -0500 (EST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=sandelman.ca; s=mail; t=1641827503; bh=leaHP/di+OKf5WguyI8ij4aj8h21e2wI1iERF2l6GMs=; h=Subject:To:References:From:Date:In-Reply-To:From; b=c7ktzQM7oQexcmEto0f1DvL8nm/sOvdF0th1ERqkqu3fxPj4tZrlhda0x8v1VtjLH PBLHJsNGUVb/TKNbmWGiavDRtukIQkoh0qgJB9IVXqlYJr1HoZnuprH7iKb6RkbQ7A c4pZEhpUEkccYDiKiP4TXqoTQ2hGWTqM4OAEJ2Ic1SNVIaPIF4PJFWYUD5k6u7aA1F jeWzOfO8efoZuPm/sZEff1/h0v7zEd9A7Ss188ANDLe5QpkRsVM+j3SwgkQQDl07LB JO10QvMrAgDNtgaemJ1F0wl1e0FztGaP37+MKIMoTE7EpJS2CKQ7GbpwIdF7oWj5UO xBWSXZkuUZX9g== Received: from [IPv6:::1] (localhost [IPv6:::1]) by sandelman.ca (Postfix) with ESMTP id B5385116E; Mon, 10 Jan 2022 10:05:54 -0500 (EST) To: rats@ietf.org, teep@ietf.org References: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> <8466B6E2-C335-4173-A2A2-3CCA555D28CA@arm.com> <62743D24-49F4-4480-9561-F00DA513C9FF@island-resort.com> <825C5FD3-729A-4612-B60A-8DB44AF069BC@island-resort.com> <9e7118fe-ece6-eb6c-a1c3-f73a804d704c@sit.fraunhofer.de> From: Michael Richardson Message-ID: Date: Mon, 10 Jan 2022 10:05:54 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.14.0 MIME-Version: 1.0 In-Reply-To: <9e7118fe-ece6-eb6c-a1c3-f73a804d704c@sit.fraunhofer.de> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Archived-At: Subject: [Teep] Moving the Class ID claim from EAT -> TEEP X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 10 Jan 2022 15:06:02 -0000 On 2022-01-08 5:23 p.m., Henk Birkholz wrote: > Hi Giri, > > TL;DR Are we waiting for this? How log will it take? > > so, is this a blocker to the EAT core document then? Could we split that > topic out? If we are starting with a (hardware system component > characteristics taxonomy here - while actually worthwhile and useful to > attempt - that will take a while. Even, if the target would be simpler, > agreeing on the target will again take time and I think that most agree > that a line most be drawn at which point (sorry...) claims go to other > documents. Removing many of the claims from the EAT document, and re-structuring the document was the main point of my review back in November. I think that it's okay if we wind up with a dozen three page documents that progress through XYZ WG (with review from RATS) that define claims. The DHC WG DHCP option model is the one that we want to emulate. With a good crystal ball, we should be able to know when we should collect a bunch of related claims into a single document, and when we should split them out into smaller documents because it is easier to cite "RFCXXXX" rather than "RFCYYYY section 4". Of course, lacking such a perfectly predictive palantir, we'll make mistakes, but that's okay. That's why we have Proposed Standards and Internet Standards as two steps. So, could we please remove this Claim from EAT, and put it into an appropriate TEEP document? From nobody Mon Jan 10 13:13:02 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 284DC3A0ACC; Mon, 10 Jan 2022 13:12:53 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.899 X-Spam-Level: X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=3dYnkvsc; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=3dYnkvsc Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L8MF1MyYM1SV; Mon, 10 Jan 2022 13:12:48 -0800 (PST) Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-eopbgr10040.outbound.protection.outlook.com [40.107.1.40]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7038A3A0AC5; Mon, 10 Jan 2022 13:12:47 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=x2v67NbIHLvtIiRAox9ECHfnMlVEJZHOEj3391ChPHw=; b=3dYnkvscefmIq0KH77zp0wBsxCvBRZQjxy+NYyKWPpgYL3o5LD8nvQtIMg8GeifBBSnj/GPmRMql7UGL8SaJiQ667SmDdsGftnTorQZfdvTpJ2eD8ioIJum94h95JI8TgyvO1wPBxt8KSERSeX/FJyZ13B6uL+4Bga41GzrSzp8= Received: from AM5P194CA0008.EURP194.PROD.OUTLOOK.COM (2603:10a6:203:8f::18) by PAXPR08MB6446.eurprd08.prod.outlook.com (2603:10a6:102:12d::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4867.9; Mon, 10 Jan 2022 21:12:43 +0000 Received: from AM5EUR03FT060.eop-EUR03.prod.protection.outlook.com (2603:10a6:203:8f:cafe::46) by AM5P194CA0008.outlook.office365.com (2603:10a6:203:8f::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4867.7 via Frontend Transport; Mon, 10 Jan 2022 21:12:43 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT060.mail.protection.outlook.com (10.152.16.160) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4867.10 via Frontend Transport; Mon, 10 Jan 2022 21:12:42 +0000 Received: ("Tessian outbound f493ab4f1fb8:v110"); Mon, 10 Jan 2022 21:12:42 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: 8d7255e0e6a3e9db X-CR-MTA-TID: 64aa7808 Received: from 26bd1418bf8a.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 4DFFCA4F-ED7D-4B24-A0A0-EB42681F0BF0.1; Mon, 10 Jan 2022 21:12:35 +0000 Received: from EUR05-VI1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 26bd1418bf8a.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Mon, 10 Jan 2022 21:12:35 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=af8cgqT5tBI2MEvIRjE1j4DbWtvHtSLw1ksMtInUOeNKkOkEX9GS/tFvNjx1lXDzIRNjhSSQkh0+EB3zkQXgabK0MYF78+pawmNxa3HKu3mRG9k2/a5bl7LfUPGWXtoC0RiDCARI+79N/dmKeplUvZ9+mtjCWAoD10JEDI9GByojhUlsEBM8K2aRqe+jdjIth8/Z7b8wYMb7Tfyh2FB6LXGVswbRl4+epXUTcLRWVxoz/BNbauWQCZUYKUHw6DoqSRNVXWvKggXyH2DDM1X+GhR8i3/PzQ3txBzgiKF5hCxVui301P1X6DhzNazilgSxluPHpD+0WpuVvkW62+DEcQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=x2v67NbIHLvtIiRAox9ECHfnMlVEJZHOEj3391ChPHw=; b=FZ8x2ChaCHHvGE7XhUv08RnWxu/9QF3NSgCN0cioUWrMKUruDyWch6lTEdsqiy57rNLT/d4IQfHg4tkAfcLbvmxt0r9VCzrLUEGtQ7mG49/61rV17xaDO3xoxeaqGL05xOMASJ8s8tpvEn0MrZZi2EPBF8h56esssI/T1aHDUfOInx4nCjZx031HmD55Vv1drjPQkAoosh00e0qBLjLlFsDnNn8WwjogD/tcslS8tPy7SYD+brljnlBTIQuiQXYiWj9PGmcSAz0O4E/OLe3P1zoIBN2ll1SMZVBdzQnQ2agSsBoT3BnQBdRiXzcOMKOqpNikZWkKYqPm/lrjczS2Pg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=x2v67NbIHLvtIiRAox9ECHfnMlVEJZHOEj3391ChPHw=; b=3dYnkvscefmIq0KH77zp0wBsxCvBRZQjxy+NYyKWPpgYL3o5LD8nvQtIMg8GeifBBSnj/GPmRMql7UGL8SaJiQ667SmDdsGftnTorQZfdvTpJ2eD8ioIJum94h95JI8TgyvO1wPBxt8KSERSeX/FJyZ13B6uL+4Bga41GzrSzp8= Received: from DBAPR08MB5576.eurprd08.prod.outlook.com (2603:10a6:10:1ae::11) by DB6PR0801MB1863.eurprd08.prod.outlook.com (2603:10a6:4:76::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4867.11; Mon, 10 Jan 2022 21:12:33 +0000 Received: from DBAPR08MB5576.eurprd08.prod.outlook.com ([fe80::fd4a:977c:9338:5139]) by DBAPR08MB5576.eurprd08.prod.outlook.com ([fe80::fd4a:977c:9338:5139%4]) with mapi id 15.20.4867.012; Mon, 10 Jan 2022 21:12:31 +0000 From: Brendan Moran To: Laurence Lundblade CC: Dave Thaler , rats , teep Thread-Topic: [Teep] [Rats] Class ID claim (and other HW identification) Thread-Index: AQHYAOUGouUkDy+rI0mTtLLYj5LA6KxStIYAgAWOBoCABIk3AA== Date: Mon, 10 Jan 2022 21:12:31 +0000 Message-ID: <17B0A124-1BDF-41A1-8680-B44C2A540941@arm.com> References: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> <8466B6E2-C335-4173-A2A2-3CCA555D28CA@arm.com> <62743D24-49F4-4480-9561-F00DA513C9FF@island-resort.com> In-Reply-To: <62743D24-49F4-4480-9561-F00DA513C9FF@island-resort.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-mailer: Apple Mail (2.3654.120.0.1.13) Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; X-MS-Office365-Filtering-Correlation-Id: 3abfa4eb-6393-4f8d-f9c5-08d9d47df0e0 x-ms-traffictypediagnostic: DB6PR0801MB1863:EE_|AM5EUR03FT060:EE_|PAXPR08MB6446:EE_ X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true nodisclaimer: true x-ms-oob-tlc-oobclassifiers: OLM:6790;OLM:6790; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DBAPR08MB5576.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(86362001)(508600001)(4326008)(966005)(6916009)(66476007)(6486002)(45080400002)(26005)(6512007)(2906002)(66446008)(38100700002)(38070700005)(122000001)(64756008)(186003)(66946007)(2616005)(91956017)(76116006)(54906003)(166002)(83380400001)(66556008)(6506007)(53546011)(316002)(71200400001)(8936002)(36756003)(8676002)(5660300002)(33656002)(45980500001); DIR:OUT; SFP:1101; Content-Type: multipart/alternative; boundary="_000_17B0A1241BDF41A18680B44C2A540941armcom_" MIME-Version: 1.0 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0801MB1863 Original-Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT060.eop-EUR03.prod.protection.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: 491c8931-b475-492f-4587-08d9d47dea21 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(46966006)(36840700001)(40470700002)(6512007)(316002)(166002)(6506007)(40460700001)(82310400004)(966005)(53546011)(83380400001)(45080400002)(33964004)(508600001)(8676002)(2616005)(5660300002)(336012)(450100002)(186003)(54906003)(6486002)(36756003)(356005)(6862004)(26005)(81166007)(33656002)(8936002)(70206006)(70586007)(30864003)(47076005)(86362001)(36860700001)(2906002)(4326008); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Jan 2022 21:12:42.5974 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 3abfa4eb-6393-4f8d-f9c5-08d9d47df0e0 X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AM5EUR03FT060.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PAXPR08MB6446 Archived-At: Subject: Re: [Teep] [Rats] Class ID claim (and other HW identification) X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 10 Jan 2022 21:12:54 -0000 --_000_17B0A1241BDF41A18680B44C2A540941armcom_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 SU1PLCBhZGRpbmcgYSBuZXcgY2xhaW0gbGlrZSB0aGlzIGlzIGNvdW50ZXJwcm9kdWN0aXZlLiBJ dCBwcmVzdXBwb3NlcyB0aGF0IHdlIGNhbiBwcmVkaWN0IGFsbCBjbGFzc2VzIHRoYXQgYSBkZXZp Y2UgbWF5IGJlbG9uZyB0by4gU3VyZSwgd2UgY2FuIG1ha2UgYSByZWdpc3RyeSBvZiBkaWZmZXJl bnQga2luZHMgb2YgY2xhc3NlcyB0aGF0IGEgZGV2aWNlIGNhbiBiZWxvbmcgdG8sIGJ1dCB3aHk/ IEZyYW5rbHksIHRoZSBuYWl2ZSBhcHByb2FjaCBpcyBiZXR0ZXIgdGhhbiB0aGlzOiB5b3UgaGF2 ZSBhIGRhdGFiYXNlIHRoYXQgbWFwcyBPRU0gKyBtb2RlbCArIHJldmlzaW9uIGludG8gYW4gYXBw bGljYXRpb24tc3BlY2lmaWMgdGF4b25vbXkuIE9mIGNvdXJzZSwgbm93IHNvbWVvbmUgaGFzIHRv IGFjdHVhbGx5IG1haW50YWluIHRoYXQgZGF0YWJhc2UuIEhhdmUgZnVuLg0KDQpXaHkgbm90IHRh a2UgdGhlIGVhc3kgcm91dGU/IEl04oCZcyBmYXIgc2ltcGxlciBmb3IgYSBkZXZpY2UgdG8gYmUg dGhlIGludGVyc2VjdGlvbiBvZiBBTlkgcHJvcGVydGllcyB0aGF0IG1ha2UgaXQgZGlzdGluY3Qu IFRoZSBlbnRpdHkgY29uc3VtaW5nIGFuIEVBVCBuZWVkcyB0aG9zZSBhbnl3YXkuIEFuZCBhcyB0 byB3aHkgSSBkb27igJl0IHdhbnQgYSB0YXhvbm9teT8gQmVjYXVzZSBpdOKAmXMgdW5uZWNlc3Nh cnkuIFRvIHVzZSBhbnkgb2YgdGhlc2UgaWRlbnRpZmllcnMsIHlvdSBoYXZlIHRvIHVzZSBhIGRh dGFiYXNlIHRvIGNvbnZlcnQgdGhlIGlkZW50aWZpZXIgaW50byB3aGF0ZXZlciBpdCBpcyB0aGF0 IHlvdSBhY3R1YWxseSBjYXJlIGFib3V0LiBUaGF0IGRhdGFiYXNlIGNhbiBqdXN0IGFzIGVhc2ls eSBjb250YWluIGFueSB0YXhvbm9teSB5b3UgbGlrZS4NCg0KV2XigJlyZSB0YWxraW5nIGFib3V0 IGFkZGluZyBtb3JlIGNvbXBsZXhpdHkgdG8gYSBzcGVjaWZpY2F0aW9uIGluIG9yZGVyIHRvIGRp c3Rpbmd1aXNoIGJldHdlZW46DQoNClNFTEVDVCAqIEZST00gaHdfaXBfaWRlbnRpZmllcnMgV0hF UkUgaWQ9JHtJRH0NClZzDQpTRUxFQ1QgKiBGUk9NIGh3X2lkZW50aWZpZXJzIFdIRVJFIGlkPSR7 SUR9IEFORCB0YXhvbm9teT3igJxod2lwIg0KDQpXaHkgd291bGQgd2UgY29tcGxpY2F0ZSB0aGUg c3BlYyB0byBhZGQgdGF4b25vbWllcyBpbiBvcmRlciB0byBzaW1wbGlmeSBhIGRhdGFiYXNlIGlu IHN1Y2ggYSB0cml2aWFsIHdheT8NCg0KSW4gbXkgb3Bpbmlvbiwgd2Ugc2hvdWxkIGxvb2sgYXQg YSBzaW5nbGUgcGh5c2ljYWwgZGV2aWNlIGFzIHRoZSBpbnRlcnNlY3Rpb24gb2Ygc2V2ZXJhbCBz ZXRzOg0KKiB0aGUgT0VN4oCZcyBtb2RlbCBpZGVudGlmaWVyIChpbmNsLiBIVyByZXZpc2lvbikN CiogdGhlIFNvQyBpZGVudGlmaWVyIChpbmNsLiBTb0MgcmV2aXNpb24pDQoqIHRoZSBwcm9jZXNz b3LigJlzIHR5cGUvdmVyc2lvbi9yZXZpc2lvbg0KKiB0aGUgdHJ1c3RlZCBPU+KAmXMgdmVyc2lv bi9yZXZpc2lvbg0KKiB0aGUgYm9vdCBsb2FkZXIgKGVzcGVjaWFsbHkgaWYgaXTigJlzIGluIFJP TSkgdmVyc2lvbi9yZXZpc2lvbi4NCg0KQWxsIG9mIHRoZXNlIG1hdHRlciAoSSB0aGluaykgdG8g VEVFUC4gV2UgbmVlZCB0byByZXBvcnQgdGhlbSBhbGwuIEJ1dCBpcyB0aGUgbGlzdCBleGhhdXN0 aXZlPyBQcm9iYWJseSBub3QuIFdoaWxlIGEgcmVnaXN0cnkgZm9yIHRoZSBkaWZmZXJlbnQgdGF4 b25vbWllcyBtYXkgYmUgcmVsZXZhbnQsIEkgZG91YnQgaXQgbWF0dGVycyBpbiBFQVQgaXRzZWxm LiBUaGF0IG9ubHkgbWF0dGVycyB3aGVuIGxvb2tpbmcgdXAgYW4gaWRlbnRpZmllci4NCg0KV2hh dCBpcyB0aGUgY29uY3JldGUgdmFsdWUgb2Ygc3BlY2lmeWluZyB0aGUgdGF4b25vbXkgb2YgYW4g b3BhcXVlIGJsb2IgaW4gYW4gaW50ZXJjaGFuZ2UgZG9jdW1lbnQ/DQoNClRoYW5rcywNCkJyZW5k YW4NCg0KDQoNCg0KDQpPbiA3IEphbiAyMDIyLCBhdCAyMzo1NiwgTGF1cmVuY2UgTHVuZGJsYWRl IDxsZ2xAaXNsYW5kLXJlc29ydC5jb208bWFpbHRvOmxnbEBpc2xhbmQtcmVzb3J0LmNvbT4+IHdy b3RlOg0KDQpTbyByYXRoZXIgdGhhbiBhIEhXIENsYXNzLCBob3cgYWJvdXQgYSBIVyBJUCBjbGFp bT8gSXQgd291bGQgcmV1c2UgdGhlIHNhbWUgdHJpcGxlIGZvciBpZGVudGlmeWluZyBIVywgT0VN LCBNb2RlbCwgVmVyc2lvbi4gSXQgY291bGQgb2NjdXIgYWxvbmcgc2lkZSB0aGUgSFcgT0VNLCBt b2RlbCBhbmQgdmVyc2lvbi4gVGhpcyBzZWVtcyBiZXR0ZXIgdGhhbiBteSBjdXJyZW50IFBSIGFu ZCBsaW5lcyB1cCBiZXR0ZXIgd2l0aCBCcmVuZGFu4oCZcyBleGFtcGxlcyBhbmQgd2l0aCB0aGUg cmVhbGl0eSB0aGF0IEhXIElQIGNvbWVzIGZyb20gYSB2ZW5kb3IsIGhhcyBtb2RlbHMgYW5kIHZl cnNpb25zLiBJ4oCZbGwgd3JpdGUgdXAgYSBQUiBmb3IgaXQgaWYgSSByZWNlaXZlIHNvbWUgcG9z aXRpdmUgZmVlZGJhY2sgaGVyZS4NCg0KDQpUaGUgZGlzdGluY3Rpb24gYmV0d2VlbiBjaGlwIGFu ZCBkZXZpY2UgaXMgaW50ZW5kZWQgdG8gYmUgaGFuZGxlZCBieSBzdWJtb2R1bGVzIGluIEVBVC4g U3VibW9kdWxlcyBjYW4gZXhwcmVzcyBhcmJpdHJhcmlseSBjb21wbGV4IGFyY2hpdGVjdHVyZXMg YW5kIGRldmljZSBjb21wb3NpdGlvbnMuDQoNCkkgdGhpbmsgaXTigJlzIGNsZWFuZXIgdG8ga2Vl cCB0aGUgSFctaWRlbnRpZnlpbmcgY2xhaW1zIHNlcGFyYXRlIGZyb20gdGhlIFNXLWlkZW50aWZ5 IGNsYWltcy4gV291bGQgcmVhbGx5IGxpa2UgdGhlIGlkZW50aWZpY2F0aW9uIG9mIHRoZSBUcnVz dGVkIE9TIFZlbmRvciBiZSBoYW5kbGVkIGJ5IENvU1dJRCBhbmQgZnJpZW5kcy4gVHJ5aW5nIHRv IG1ha2Ugc29tZSBjbGFpbSBzdWl0YWJsZSBmb3IgaWRlbnRpZnlpbmcgYm90aCBTVyBhbmQgSFcg Zm9yIGFsbCBvZiBhdHRlc3RhdGlvbiBzZWVtcyBvdmVyLWFtYml0aW91cy4NCg0KSSBhbHNvIHRo aW5rIGl04oCZcyBmaW5lIHRvIGRlZmluZSBzb21lIGNsYWltcyBiZXR0ZXIgc3VpdGVkIHRvIHRo ZSBURUUgd29ybGQgaW4gVEVFUCBpZiB3ZSBjYW7igJl0IGZpbmQgZW5vdWdoIGNvbW1vbiBncm91 bmQgYmV0d2VlbiBURUVQIGFuZCB0aGUgdmVyeSBicm9hZGx5IGFwcGxpY2FibGUgc3R1ZmYgdGhh dCBnb2VzIGludG8gRUFULg0KDQpMTA0KDQoNCk5vdGU6IEkgZmluZCB0aGUgdXNlIG9mIHRoZSB3 b3JkIOKAnGNsYXNz4oCdIGhlcmUgY29uZnVzaW5nLiBJZiBJIHdlcmUgcHV0dGluZyBUVuKAmXMg aW50byBjbGFzc2VzIEnigJlkIHVzZXMgY2xhc3NlcyBsaWtlIHNtYXJ0L2R1bWIsIGRpc3BsYXkg dHlwZSAoTENELCBDUlQsIE9MRUQpIGFuZCBzdWNoIHRoYXQgaWRlbnRpZnkgY2hhcmFjdGVyaXN0 aWNzIG9mIFRWcyBpbmRlcGVuZGVudCBvZiB2ZW5kb3IgYW5kIG1vZGVsLiAiU29ueSBCcmF2aWEi IGlzIG5vdCBhIGNsYXNzIElNTy4gTm9yIGlzIOKAnE1pY3Jvc29mdCBXaW5kb3dz4oCdIChhbiBP UyB0aGUgcnVucyBvbiBsb3RzIG9mIEhXIHBsYXRmb3JtcykuIEnigJlkIGxpa2UgdG8gbW92ZSBh d2F5IGZyb20gdGhlIHdvcmQuDQoNCg0KDQpPbiBKYW4gNCwgMjAyMiwgYXQgMzowNiBBTSwgQnJl bmRhbiBNb3JhbiA8QnJlbmRhbi5Nb3JhbkBhcm0uY29tPG1haWx0bzpCcmVuZGFuLk1vcmFuQGFy bS5jb20+PiB3cm90ZToNCg0KSSB0aGluayBkZXZpY2VzIHdpbGwgbmVlZCB0byByZXBvcnQgbXVs dGlwbGUgdmVuZG9yL2NsYXNzIHBhaXJzLg0KDQpGb3IgZXhhbXBsZSwgQSBtb2JpbGUgZGV2aWNl IGNvdWxkIHBvdGVudGlhbGx5IGNvbnRhaW46DQoxLiBBIE1vYmlsZSBEZXZpY2UgT0VNIFZlbmRv ciBJRA0KMi4gQSBTaWxpY29uIHZlbmRvcuKAmXMgVmVuZG9yIElEDQozLiBBbiBJUCB2ZW5kb3Li gJlzIFZlbmRvciBJRA0KDQpUaGlzIGlzIG5vdCBhbiBleGhhdXN0aXZlIGxpc3QuDQoNCkZvciBB cm0gVHJ1c3QgWm9uZSBURUVzLCBJIHdvdWxkIGV4cGVjdCB0byBzZWU6DQoxLiBUaGUgQXJtIFZl bmRvciBJRCArIHRoZSBwcm9jZXNzb3IgY29yZeKAmXMgQ2xhc3MgSUQNCjIuIFRoZSBUcnVzdGVk IE9TIFZlbmRvciBJRCArIHRoZSBUcnVzdGVkIE9TIENsYXNzIElEDQozLiBUaGUgU2lsaWNvbiB2 ZW5kb3LigJlzIFZlbmRvciBJRCArIHRoZSBwcm9jZXNzb3IgQ2xhc3MgSUQNCjQuIFRoZSBEZXZp Y2UgT0VN4oCZcyBWZW5kb3IgSUQgKyB0aGUgZGV2aWNlIENsYXNzIElEDQoNCkNoZWVycywNCkJy ZW5kYW4NCg0KT24gMyBKYW4gMjAyMiwgYXQgMjE6MDAsIERhdmUgVGhhbGVyIDxkdGhhbGVyPTQw bWljcm9zb2Z0LmNvbUBkbWFyYy5pZXRmLm9yZzxtYWlsdG86ZHRoYWxlcj00MG1pY3Jvc29mdC5j b21AZG1hcmMuaWV0Zi5vcmc+PiB3cm90ZToNCg0KTGF1cmVuY2UgTHVuZGJsYWRlIHdyb3RlOg0K SSB0YWxrZWQgdG8gRGF2ZSB3aGljaCByZXN1bHRlZCBpbiByZW9yaWVudGF0aW9uIG9mIG15IHVu ZGVyc3RhbmRpbmcgb2YgQ2xhc3MgSUQgaW4gVEVFUC4NCg0KQ2xhc3MgSUQgYmFzaWNhbGx5IGlk ZW50aWZpZXMgSFcgSVAgZnJvbSBhIEhXIGRlc2lnbmVyIGxpa2UgQXJtIG9yIFN5bm9wc2lzIHRo YXQgaXMgaW50ZWdyYXRlZCBpbnRvIGNoaXBzIG1hZGUgYnkgdmFyaW91cyBIVyBPRU1zIGxpa2Ug UXVhbGNvbW0sIFNhbXN1bmcgYW5kIEFwcGxlLiBUaGUgdGVybSB1c2VkIGZyZXF1ZW50bHkgZm9y IHRoaXMgaXMgIklQIiAoSSBrbm93IHRoaXMgd2VsbCBmcm9tIG15IGRheXMgd29ya2luZyBvbiBI VyBhdCBRdWFsY29tbSkuDQoNCkkndmUgY3JlYXRlZCBhIFBSIGZvciBIVyBDbGFzcy4NCg0KU2lu Y2Ugd2hhdCBpcyBpZGVudGlmaWVkIHNwYW5zIE9FTXMsIHRoaXMgbXVzdCBiZSBhIGdsb2JhbGx5 IHVuaXF1ZSBpZGVudGlmaWVyLiBXZSBuZWVkIHRvIGJlIGV4cGxpY2l0IGFib3V0IHRoYXQuDQoN Ckkga25vdyBvZiBmb3VyIHdheXMgdG8gaGF2ZSBhIGdsb2JhbCBpZGVudGlmaWVyOg0KLSBVc2Ug T0lEcw0KLSBVc2UgRE5TIC8gVVJJDQotIFByb2JhYmlsaXN0aWNhbGx5IHVzaW5nIGEgYmlnIGVu b3VnaCBieXRlIHN0cmluZw0KLSBBIG5ldyByZWdpc3RyeSwgcGVyaGFwcyBJQU5BIChidXQgd2Ug cHJvYmFibHkgZG9uJ3Qgd2FudCB0aGlzKQ0KDQpUaGUgUFIgYWxsb3dzIGFsbCBidXQgdGhlIGxh c3QsIGJ1dCB0aGlzIGNvdWxkIGJlIHJlZHVjZWQgdG8ganVzdCBvbmUgb3IgdHdvIG9mIHRoZSBh Ym92ZS4NCg0KUFIgbG9va3MgZ3JlYXQgdG8gbWUsIGV4Y2VwdCB0aGF0IHdvdWxkIEkgYWdyZWUg d2l0aCByZWR1Y2luZyBpdCB0byBvbmUgb3IgdHdvLg0KU2luY2UgdGhlIGFiaWxpdHkgdG8gdGFr ZSBhIHZhbHVlIGFuZCByZXNvbHZlIGl0IHRvIHNvbWV0aGluZyBtZWFuaW5nZnVsIGlzIHVzZWZ1 bCBpbiBtYW55IGNhc2VzIChsb2dnaW5nLCB3aXJlc2hhcmsgYW5hbHlzaXMsIGV0Yy4pLCBJIHdv dWxkIHJlbW92ZSB0aGUgdGhpcmQgb3B0aW9uLg0KDQpPSURzLCBlbmNvZGVkIGFzIGludCBhcnJh eXMsIHByb2JhYmx5IGNvbXByZXNzIHRoZSBiZXN0IHNvIGlmIG9ubHkgb25lLCB0aGVuIEknZCBw aWNrIHRoYXQgb25lLiAgVVJJcyBhcmUgY29udmVuaWVudCB0aG91Z2ggYWxzbyBzbyBpZiB0d28s IHRoZW4gdGhhdCdzIG15IHNlY29uZCBwaWNrLg0KDQpJIGRvbid0IHNlZSB0aGlzIGNsYWltIGFz IGVzc2VudGlhbCBmb3IgRUFULCBidXQgSSBjb21taXR0ZWQgdG8gd29ya2luZyB0aHJvdWdoIHRo aXMgd2l0aCBURUVQLiBJJ20gZmluZSB3aXRoIHRoaXMgUFIgZ29pbmcgaW50byBhIFRFRVAgZG9j dW1lbnQgcmF0aGVyIHRoYW4gRUFULg0KDQpUaGUgbm90aW9uIG9mIEhXIGNsYXNzIElEIGlzIG5v dCBzcGVjaWZpYyB0byBURUVzLCBoZW5jZSB0aGUgcmVxdWVzdCB0byBwdXQgaXQgaW4gRUFUIHJh dGhlciB0aGFuIGluIGFueXRoaW5nIHRoYXQgd291bGQgaW1wbHkgdXNlIGlzIGxpbWl0ZWQgdG8g VEVFcyAoaGVuY2Ugbm90IGluIGEgVEVFUCBkb2N1bWVudCkuDQoNCi1EYXZlDQoNCl9fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fDQpURUVQIG1haWxpbmcgbGlz dA0KVEVFUEBpZXRmLm9yZzxtYWlsdG86VEVFUEBpZXRmLm9yZz4NCmh0dHBzOi8vd3d3LmlldGYu b3JnL21haWxtYW4vbGlzdGluZm8vdGVlcA0KDQpJTVBPUlRBTlQgTk9USUNFOiBUaGUgY29udGVu dHMgb2YgdGhpcyBlbWFpbCBhbmQgYW55IGF0dGFjaG1lbnRzIGFyZSBjb25maWRlbnRpYWwgYW5k IG1heSBhbHNvIGJlIHByaXZpbGVnZWQuIElmIHlvdSBhcmUgbm90IHRoZSBpbnRlbmRlZCByZWNp cGllbnQsIHBsZWFzZSBub3RpZnkgdGhlIHNlbmRlciBpbW1lZGlhdGVseSBhbmQgZG8gbm90IGRp c2Nsb3NlIHRoZSBjb250ZW50cyB0byBhbnkgb3RoZXIgcGVyc29uLCB1c2UgaXQgZm9yIGFueSBw dXJwb3NlLCBvciBzdG9yZSBvciBjb3B5IHRoZSBpbmZvcm1hdGlvbiBpbiBhbnkgbWVkaXVtLiBU aGFuayB5b3UuDQoNCg0KSU1QT1JUQU5UIE5PVElDRTogVGhlIGNvbnRlbnRzIG9mIHRoaXMgZW1h aWwgYW5kIGFueSBhdHRhY2htZW50cyBhcmUgY29uZmlkZW50aWFsIGFuZCBtYXkgYWxzbyBiZSBw cml2aWxlZ2VkLiBJZiB5b3UgYXJlIG5vdCB0aGUgaW50ZW5kZWQgcmVjaXBpZW50LCBwbGVhc2Ug bm90aWZ5IHRoZSBzZW5kZXIgaW1tZWRpYXRlbHkgYW5kIGRvIG5vdCBkaXNjbG9zZSB0aGUgY29u dGVudHMgdG8gYW55IG90aGVyIHBlcnNvbiwgdXNlIGl0IGZvciBhbnkgcHVycG9zZSwgb3Igc3Rv cmUgb3IgY29weSB0aGUgaW5mb3JtYXRpb24gaW4gYW55IG1lZGl1bS4gVGhhbmsgeW91Lg0K --_000_17B0A1241BDF41A18680B44C2A540941armcom_ Content-Type: text/html; charset="utf-8" Content-ID: <337D016FE7DE8847AA97E7B4BE6EDCDA@eurprd08.prod.outlook.com> Content-Transfer-Encoding: base64 PGh0bWw+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIgY29udGVudD0i dGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjwvaGVhZD4NCjxib2R5IHN0eWxlPSJ3b3JkLXdy YXA6IGJyZWFrLXdvcmQ7IC13ZWJraXQtbmJzcC1tb2RlOiBzcGFjZTsgbGluZS1icmVhazogYWZ0 ZXItd2hpdGUtc3BhY2U7IiBjbGFzcz0iIj4NCklNTywgYWRkaW5nIGEgbmV3IGNsYWltIGxpa2Ug dGhpcyBpcyBjb3VudGVycHJvZHVjdGl2ZS4gSXQgcHJlc3VwcG9zZXMgdGhhdCB3ZSBjYW4gcHJl ZGljdCBhbGwgY2xhc3NlcyB0aGF0IGEgZGV2aWNlIG1heSBiZWxvbmcgdG8uIFN1cmUsIHdlIGNh biBtYWtlIGEgcmVnaXN0cnkgb2YgZGlmZmVyZW50IGtpbmRzIG9mIGNsYXNzZXMgdGhhdCBhIGRl dmljZSBjYW4gYmVsb25nIHRvLCBidXQgd2h5PyBGcmFua2x5LCB0aGUgbmFpdmUgYXBwcm9hY2gN CiBpcyBiZXR0ZXIgdGhhbiB0aGlzOiB5b3UgaGF2ZSBhIGRhdGFiYXNlIHRoYXQgbWFwcyBPRU0g KyBtb2RlbCArIHJldmlzaW9uIGludG8gYW4gYXBwbGljYXRpb24tc3BlY2lmaWMgdGF4b25vbXku IE9mIGNvdXJzZSwgbm93IHNvbWVvbmUgaGFzIHRvIGFjdHVhbGx5IG1haW50YWluIHRoYXQgZGF0 YWJhc2UuIEhhdmUgZnVuLg0KPGRpdiBjbGFzcz0iIj48YnIgY2xhc3M9IiI+DQo8L2Rpdj4NCjxk aXYgY2xhc3M9IiI+V2h5IG5vdCB0YWtlIHRoZSBlYXN5IHJvdXRlPyBJdOKAmXMgZmFyIHNpbXBs ZXIgZm9yIGEgZGV2aWNlIHRvIGJlIHRoZSBpbnRlcnNlY3Rpb24gb2YgQU5ZIHByb3BlcnRpZXMg dGhhdCBtYWtlIGl0IGRpc3RpbmN0LiBUaGUgZW50aXR5IGNvbnN1bWluZyBhbiBFQVQgbmVlZHMg dGhvc2UgYW55d2F5LiBBbmQgYXMgdG8gd2h5IEkgZG9u4oCZdCB3YW50IGEgdGF4b25vbXk/IEJl Y2F1c2UgaXTigJlzIHVubmVjZXNzYXJ5LiBUbyB1c2UNCiBhbnkgb2YgdGhlc2UgaWRlbnRpZmll cnMsIHlvdSBoYXZlIHRvIHVzZSBhIGRhdGFiYXNlIHRvIGNvbnZlcnQgdGhlIGlkZW50aWZpZXIg aW50byB3aGF0ZXZlciBpdCBpcyB0aGF0IHlvdSBhY3R1YWxseSBjYXJlIGFib3V0LiBUaGF0IGRh dGFiYXNlIGNhbiBqdXN0IGFzIGVhc2lseSBjb250YWluIGFueSB0YXhvbm9teSB5b3UgbGlrZS48 L2Rpdj4NCjxkaXYgY2xhc3M9IiI+PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSIi Pldl4oCZcmUgdGFsa2luZyBhYm91dCBhZGRpbmcgbW9yZSBjb21wbGV4aXR5IHRvIGEgc3BlY2lm aWNhdGlvbiBpbiBvcmRlciB0byBkaXN0aW5ndWlzaCBiZXR3ZWVuOjwvZGl2Pg0KPGRpdiBjbGFz cz0iIj48YnIgY2xhc3M9IiI+DQo8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+U0VMRUNUICogRlJPTSBo d19pcF9pZGVudGlmaWVycyBXSEVSRSBpZD0ke0lEfTwvZGl2Pg0KPGRpdiBjbGFzcz0iIj5Wczwv ZGl2Pg0KPGRpdiBjbGFzcz0iIj5TRUxFQ1QgKiBGUk9NIGh3X2lkZW50aWZpZXJzIFdIRVJFIGlk PSR7SUR9IEFORCB0YXhvbm9teT3igJxod2lwJnF1b3Q7PGJyIGNsYXNzPSIiPg0KPGRpdiBjbGFz cz0iIj48YnIgY2xhc3M9IiI+DQo8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+V2h5IHdvdWxkIHdlIGNv bXBsaWNhdGUgdGhlIHNwZWMgdG8gYWRkIHRheG9ub21pZXMgaW4gb3JkZXIgdG8gc2ltcGxpZnkg YSBkYXRhYmFzZSBpbiBzdWNoIGEgdHJpdmlhbCB3YXk/PC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjxi ciBjbGFzcz0iIj4NCjwvZGl2Pg0KPGRpdiBjbGFzcz0iIj5JbiBteSBvcGluaW9uLCB3ZSBzaG91 bGQgbG9vayBhdCBhIHNpbmdsZSBwaHlzaWNhbCBkZXZpY2UgYXMgdGhlIGludGVyc2VjdGlvbiBv ZiBzZXZlcmFsIHNldHM6Jm5ic3A7PC9kaXY+DQo8ZGl2IGNsYXNzPSIiPiogdGhlIE9FTeKAmXMg bW9kZWwgaWRlbnRpZmllciAoaW5jbC4gSFcgcmV2aXNpb24pPC9kaXY+DQo8ZGl2IGNsYXNzPSIi PiogdGhlIFNvQyBpZGVudGlmaWVyIChpbmNsLiBTb0MgcmV2aXNpb24pPC9kaXY+DQo8ZGl2IGNs YXNzPSIiPiogdGhlIHByb2Nlc3NvcuKAmXMgdHlwZS92ZXJzaW9uL3JldmlzaW9uPC9kaXY+DQo8 ZGl2IGNsYXNzPSIiPiogdGhlIHRydXN0ZWQgT1PigJlzIHZlcnNpb24vcmV2aXNpb248L2Rpdj4N CjxkaXYgY2xhc3M9IiI+KiB0aGUgYm9vdCBsb2FkZXIgKGVzcGVjaWFsbHkgaWYgaXTigJlzIGlu IFJPTSkgdmVyc2lvbi9yZXZpc2lvbi48L2Rpdj4NCjxkaXYgY2xhc3M9IiI+PGJyIGNsYXNzPSIi Pg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPkFsbCBvZiB0aGVzZSBtYXR0ZXIgKEkgdGhpbmspIHRv IFRFRVAuIFdlIG5lZWQgdG8gcmVwb3J0IHRoZW0gYWxsLiBCdXQgaXMgdGhlIGxpc3QgZXhoYXVz dGl2ZT8gUHJvYmFibHkgbm90LiBXaGlsZSBhIHJlZ2lzdHJ5IGZvciB0aGUgZGlmZmVyZW50IHRh eG9ub21pZXMgbWF5IGJlIHJlbGV2YW50LCBJIGRvdWJ0IGl0IG1hdHRlcnMgaW4gRUFUIGl0c2Vs Zi4gVGhhdCBvbmx5IG1hdHRlcnMgd2hlbiBsb29raW5nIHVwIGFuDQogaWRlbnRpZmllci48L2Rp dj4NCjxkaXYgY2xhc3M9IiI+PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPldo YXQgaXMgdGhlIGNvbmNyZXRlIHZhbHVlIG9mIHNwZWNpZnlpbmcgdGhlIHRheG9ub215IG9mIGFu IG9wYXF1ZSBibG9iIGluIGFuIGludGVyY2hhbmdlIGRvY3VtZW50PzwvZGl2Pg0KPGRpdiBjbGFz cz0iIj48YnIgY2xhc3M9IiI+DQo8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+VGhhbmtzLDwvZGl2Pg0K PGRpdiBjbGFzcz0iIj5CcmVuZGFuPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4N CjwvZGl2Pg0KPGRpdiBjbGFzcz0iIj48YnIgY2xhc3M9IiI+DQo8ZGl2IGNsYXNzPSIiPjxiciBj bGFzcz0iIj4NCjwvZGl2Pg0KPGRpdiBjbGFzcz0iIj48YnIgY2xhc3M9IiI+DQo8ZGl2PjxiciBj bGFzcz0iIj4NCjxibG9ja3F1b3RlIHR5cGU9ImNpdGUiIGNsYXNzPSIiPg0KPGRpdiBjbGFzcz0i Ij5PbiA3IEphbiAyMDIyLCBhdCAyMzo1NiwgTGF1cmVuY2UgTHVuZGJsYWRlICZsdDs8YSBocmVm PSJtYWlsdG86bGdsQGlzbGFuZC1yZXNvcnQuY29tIiBjbGFzcz0iIj5sZ2xAaXNsYW5kLXJlc29y dC5jb208L2E+Jmd0OyB3cm90ZTo8L2Rpdj4NCjxiciBjbGFzcz0iQXBwbGUtaW50ZXJjaGFuZ2Ut bmV3bGluZSI+DQo8ZGl2IGNsYXNzPSIiPg0KPGRpdiBzdHlsZT0id29yZC13cmFwOiBicmVhay13 b3JkOyAtd2Via2l0LW5ic3AtbW9kZTogc3BhY2U7IGxpbmUtYnJlYWs6IGFmdGVyLXdoaXRlLXNw YWNlOyIgY2xhc3M9IiI+DQpTbyByYXRoZXIgdGhhbiBhIEhXIENsYXNzLCBob3cgYWJvdXQgYSBI VyBJUCBjbGFpbT8gSXQgd291bGQgcmV1c2UgdGhlIHNhbWUgdHJpcGxlIGZvciBpZGVudGlmeWlu ZyBIVywgT0VNLCBNb2RlbCwgVmVyc2lvbi4gSXQgY291bGQgb2NjdXIgYWxvbmcgc2lkZSB0aGUg SFcgT0VNLCBtb2RlbCBhbmQgdmVyc2lvbi4gVGhpcyBzZWVtcyBiZXR0ZXIgdGhhbiBteSBjdXJy ZW50IFBSIGFuZCBsaW5lcyB1cCBiZXR0ZXIgd2l0aCBCcmVuZGFu4oCZcyBleGFtcGxlcw0KIGFu ZCB3aXRoIHRoZSByZWFsaXR5IHRoYXQgSFcgSVAgY29tZXMgZnJvbSBhIHZlbmRvciwgaGFzIG1v ZGVscyBhbmQgdmVyc2lvbnMuIEnigJlsbCB3cml0ZSB1cCBhIFBSIGZvciBpdCBpZiBJIHJlY2Vp dmUgc29tZSBwb3NpdGl2ZSBmZWVkYmFjayBoZXJlLg0KPGRpdiBjbGFzcz0iIj48YnIgY2xhc3M9 IiI+DQo8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8ZGl2IGNs YXNzPSIiPlRoZSBkaXN0aW5jdGlvbiBiZXR3ZWVuIGNoaXAgYW5kIGRldmljZSBpcyBpbnRlbmRl ZCB0byBiZSBoYW5kbGVkIGJ5IHN1Ym1vZHVsZXMgaW4gRUFULiBTdWJtb2R1bGVzIGNhbiBleHBy ZXNzIGFyYml0cmFyaWx5IGNvbXBsZXggYXJjaGl0ZWN0dXJlcyBhbmQgZGV2aWNlIGNvbXBvc2l0 aW9ucy48L2Rpdj4NCjxkaXYgY2xhc3M9IiI+PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8ZGl2IGNs YXNzPSIiPkkgdGhpbmsgaXTigJlzIGNsZWFuZXIgdG8ga2VlcCB0aGUgSFctaWRlbnRpZnlpbmcg Y2xhaW1zIHNlcGFyYXRlIGZyb20gdGhlIFNXLWlkZW50aWZ5IGNsYWltcy4gV291bGQgcmVhbGx5 IGxpa2UgdGhlIGlkZW50aWZpY2F0aW9uIG9mIHRoZSBUcnVzdGVkIE9TIFZlbmRvciBiZSBoYW5k bGVkIGJ5IENvU1dJRCBhbmQgZnJpZW5kcy4gVHJ5aW5nIHRvIG1ha2Ugc29tZSBjbGFpbSBzdWl0 YWJsZSBmb3IgaWRlbnRpZnlpbmcgYm90aA0KIFNXIGFuZCBIVyBmb3IgYWxsIG9mIGF0dGVzdGF0 aW9uIHNlZW1zIG92ZXItYW1iaXRpb3VzLjwvZGl2Pg0KPGRpdiBjbGFzcz0iIj48YnIgY2xhc3M9 IiI+DQo8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+SSBhbHNvIHRoaW5rIGl04oCZcyBmaW5lIHRvIGRl ZmluZSBzb21lIGNsYWltcyBiZXR0ZXIgc3VpdGVkIHRvIHRoZSBURUUgd29ybGQgaW4gVEVFUCBp ZiB3ZSBjYW7igJl0IGZpbmQgZW5vdWdoIGNvbW1vbiBncm91bmQgYmV0d2VlbiBURUVQIGFuZCB0 aGUgdmVyeSBicm9hZGx5IGFwcGxpY2FibGUgc3R1ZmYgdGhhdCBnb2VzIGludG8gRUFULjwvZGl2 Pg0KPGRpdiBjbGFzcz0iIj48YnIgY2xhc3M9IiI+DQo8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+TEw8 L2Rpdj4NCjxkaXYgY2xhc3M9IiI+PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSIi PjxiciBjbGFzcz0iIj4NCjwvZGl2Pg0KPGRpdiBjbGFzcz0iIj5Ob3RlOiBJIGZpbmQgdGhlIHVz ZSBvZiB0aGUgd29yZCDigJxjbGFzc+KAnSBoZXJlIGNvbmZ1c2luZy4gSWYgSSB3ZXJlIHB1dHRp bmcgVFbigJlzIGludG8gY2xhc3NlcyBJ4oCZZCB1c2VzIGNsYXNzZXMgbGlrZSBzbWFydC9kdW1i LCBkaXNwbGF5IHR5cGUgKExDRCwgQ1JULCBPTEVEKSBhbmQgc3VjaCB0aGF0IGlkZW50aWZ5IGNo YXJhY3RlcmlzdGljcyBvZiBUVnMgaW5kZXBlbmRlbnQgb2YgdmVuZG9yIGFuZCBtb2RlbC4gJnF1 b3Q7U29ueSBCcmF2aWEmcXVvdDsNCiBpcyBub3QgYSBjbGFzcyBJTU8uIE5vciBpcyDigJxNaWNy b3NvZnQgV2luZG93c+KAnSAoYW4gT1MgdGhlIHJ1bnMgb24gbG90cyBvZiBIVyBwbGF0Zm9ybXMp LiBJ4oCZZCBsaWtlIHRvIG1vdmUgYXdheSBmcm9tIHRoZSB3b3JkLjwvZGl2Pg0KPGRpdiBjbGFz cz0iIj48YnIgY2xhc3M9IiI+DQo8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+PGJyIGNsYXNzPSIiPg0K PGRpdiBjbGFzcz0iIj48YnIgY2xhc3M9IiI+DQo8YmxvY2txdW90ZSB0eXBlPSJjaXRlIiBjbGFz cz0iIj4NCjxkaXYgY2xhc3M9IiI+T24gSmFuIDQsIDIwMjIsIGF0IDM6MDYgQU0sIEJyZW5kYW4g TW9yYW4gJmx0OzxhIGhyZWY9Im1haWx0bzpCcmVuZGFuLk1vcmFuQGFybS5jb20iIGNsYXNzPSIi PkJyZW5kYW4uTW9yYW5AYXJtLmNvbTwvYT4mZ3Q7IHdyb3RlOjwvZGl2Pg0KPGJyIGNsYXNzPSJB cHBsZS1pbnRlcmNoYW5nZS1uZXdsaW5lIj4NCjxkaXYgY2xhc3M9IiI+DQo8ZGl2IHN0eWxlPSJ3 b3JkLXdyYXA6IGJyZWFrLXdvcmQ7IC13ZWJraXQtbmJzcC1tb2RlOiBzcGFjZTsgbGluZS1icmVh azogYWZ0ZXItd2hpdGUtc3BhY2U7IiBjbGFzcz0iIj4NCkkgdGhpbmsgZGV2aWNlcyB3aWxsIG5l ZWQgdG8gcmVwb3J0IG11bHRpcGxlIHZlbmRvci9jbGFzcyBwYWlycy4NCjxkaXYgY2xhc3M9IiI+ PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPkZvciBleGFtcGxlLCBBIG1vYmls ZSBkZXZpY2UgY291bGQgcG90ZW50aWFsbHkgY29udGFpbjoNCjxkaXYgY2xhc3M9IiI+MS4gQSBN b2JpbGUgRGV2aWNlIE9FTSBWZW5kb3IgSUQ8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+Mi4gQSBTaWxp Y29uIHZlbmRvcuKAmXMgVmVuZG9yIElEPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjMuIEFuIElQIHZl bmRvcuKAmXMgVmVuZG9yIElEPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjwv ZGl2Pg0KPGRpdiBjbGFzcz0iIj5UaGlzIGlzIG5vdCBhbiBleGhhdXN0aXZlIGxpc3QuPC9kaXY+ DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjwvZGl2Pg0KPGRpdiBjbGFzcz0iIj5Gb3Ig QXJtIFRydXN0IFpvbmUgVEVFcywgSSB3b3VsZCBleHBlY3QgdG8gc2VlOjwvZGl2Pg0KPGRpdiBj bGFzcz0iIj4xLiBUaGUgQXJtIFZlbmRvciBJRCArIHRoZSBwcm9jZXNzb3IgY29yZeKAmXMgQ2xh c3MgSUQ8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+Mi4gVGhlIFRydXN0ZWQgT1MgVmVuZG9yIElEICsg dGhlIFRydXN0ZWQgT1MgQ2xhc3MgSUQ8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+My4gVGhlIFNpbGlj b24gdmVuZG9y4oCZcyBWZW5kb3IgSUQgKyB0aGUgcHJvY2Vzc29yIENsYXNzIElEPC9kaXY+DQo8 ZGl2IGNsYXNzPSIiPjQuIFRoZSBEZXZpY2UgT0VN4oCZcyBWZW5kb3IgSUQgKyB0aGUgZGV2aWNl IENsYXNzIElEPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjwvZGl2Pg0KPGRp diBjbGFzcz0iIj5DaGVlcnMsPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPkJyZW5kYW48L2Rpdj4NCjxk aXYgY2xhc3M9IiI+DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjxibG9ja3F1b3RlIHR5 cGU9ImNpdGUiIGNsYXNzPSIiPg0KPGRpdiBjbGFzcz0iIj5PbiAzIEphbiAyMDIyLCBhdCAyMTow MCwgRGF2ZSBUaGFsZXIgJmx0OzxhIGhyZWY9Im1haWx0bzpkdGhhbGVyPTQwbWljcm9zb2Z0LmNv bUBkbWFyYy5pZXRmLm9yZyIgY2xhc3M9IiI+ZHRoYWxlcj00MG1pY3Jvc29mdC5jb21AZG1hcmMu aWV0Zi5vcmc8L2E+Jmd0OyB3cm90ZTo8L2Rpdj4NCjxiciBjbGFzcz0iQXBwbGUtaW50ZXJjaGFu Z2UtbmV3bGluZSI+DQo8ZGl2IGNsYXNzPSIiPjxzcGFuIHN0eWxlPSJjYXJldC1jb2xvcjogcmdi KDAsIDAsIDApOyBmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZvbnQt c3R5bGU6IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6IG5v cm1hbDsgbGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7IHRleHQtaW5k ZW50OiAwcHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9ybWFsOyB3b3Jk LXNwYWNpbmc6IDBweDsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRlY29y YXRpb246IG5vbmU7IGZsb2F0OiBub25lOyBkaXNwbGF5OiBpbmxpbmUgIWltcG9ydGFudDsiIGNs YXNzPSIiPkxhdXJlbmNlDQogTHVuZGJsYWRlIHdyb3RlOjwvc3Bhbj48YnIgc3R5bGU9ImNhcmV0 LWNvbG9yOiByZ2IoMCwgMCwgMCk7IGZvbnQtZmFtaWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTog MTJweDsgZm9udC1zdHlsZTogbm9ybWFsOyBmb250LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250 LXdlaWdodDogbm9ybWFsOyBsZXR0ZXItc3BhY2luZzogbm9ybWFsOyB0ZXh0LWFsaWduOiBzdGFy dDsgdGV4dC1pbmRlbnQ6IDBweDsgdGV4dC10cmFuc2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNlOiBu b3JtYWw7IHdvcmQtc3BhY2luZzogMHB4OyAtd2Via2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7 IHRleHQtZGVjb3JhdGlvbjogbm9uZTsiIGNsYXNzPSIiPg0KPGJsb2NrcXVvdGUgdHlwZT0iY2l0 ZSIgc3R5bGU9ImZvbnQtZmFtaWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1z dHlsZTogbm9ybWFsOyBmb250LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDogbm9y bWFsOyBsZXR0ZXItc3BhY2luZzogbm9ybWFsOyBvcnBoYW5zOiBhdXRvOyB0ZXh0LWFsaWduOiBz dGFydDsgdGV4dC1pbmRlbnQ6IDBweDsgdGV4dC10cmFuc2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNl OiBub3JtYWw7IHdpZG93czogYXV0bzsgd29yZC1zcGFjaW5nOiAwcHg7IC13ZWJraXQtdGV4dC1z aXplLWFkanVzdDogYXV0bzsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRl Y29yYXRpb246IG5vbmU7IiBjbGFzcz0iIj4NCkkgdGFsa2VkIHRvIERhdmUgd2hpY2ggcmVzdWx0 ZWQgaW4gcmVvcmllbnRhdGlvbiBvZiBteSB1bmRlcnN0YW5kaW5nIG9mIENsYXNzIElEIGluIFRF RVAuPGJyIGNsYXNzPSIiPg0KPGJyIGNsYXNzPSIiPg0KQ2xhc3MgSUQgYmFzaWNhbGx5IGlkZW50 aWZpZXMgSFcgSVAgZnJvbSBhIEhXIGRlc2lnbmVyIGxpa2UgQXJtIG9yIFN5bm9wc2lzIHRoYXQg aXMgaW50ZWdyYXRlZCBpbnRvIGNoaXBzIG1hZGUgYnkgdmFyaW91cyBIVyBPRU1zIGxpa2UgUXVh bGNvbW0sIFNhbXN1bmcgYW5kIEFwcGxlLiBUaGUgdGVybSB1c2VkIGZyZXF1ZW50bHkgZm9yIHRo aXMgaXMgJnF1b3Q7SVAmcXVvdDsgKEkga25vdyB0aGlzIHdlbGwgZnJvbSBteSBkYXlzIHdvcmtp bmcgb24gSFcgYXQgUXVhbGNvbW0pLjxiciBjbGFzcz0iIj4NCjxiciBjbGFzcz0iIj4NCkkndmUg Y3JlYXRlZCBhIFBSIGZvciBIVyBDbGFzcy48YnIgY2xhc3M9IiI+DQo8YnIgY2xhc3M9IiI+DQo8 c3BhbiBjbGFzcz0iQXBwbGUtdGFiLXNwYW4iIHN0eWxlPSJ3aGl0ZS1zcGFjZTogcHJlOyI+PC9z cGFuPlNpbmNlIHdoYXQgaXMgaWRlbnRpZmllZCBzcGFucyBPRU1zLCB0aGlzIG11c3QgYmUgYSBn bG9iYWxseSB1bmlxdWUgaWRlbnRpZmllci4gV2UgbmVlZCB0byBiZSBleHBsaWNpdCBhYm91dCB0 aGF0LjxzcGFuIGNsYXNzPSJBcHBsZS1jb252ZXJ0ZWQtc3BhY2UiPiZuYnNwOzwvc3Bhbj48YnIg Y2xhc3M9IiI+DQo8c3BhbiBjbGFzcz0iQXBwbGUtdGFiLXNwYW4iIHN0eWxlPSJ3aGl0ZS1zcGFj ZTogcHJlOyI+PC9zcGFuPjxiciBjbGFzcz0iIj4NCkkga25vdyBvZiBmb3VyIHdheXMgdG8gaGF2 ZSBhIGdsb2JhbCBpZGVudGlmaWVyOjxiciBjbGFzcz0iIj4NCi0gVXNlIE9JRHM8YnIgY2xhc3M9 IiI+DQotIFVzZSBETlMgLyBVUkk8YnIgY2xhc3M9IiI+DQotIFByb2JhYmlsaXN0aWNhbGx5IHVz aW5nIGEgYmlnIGVub3VnaCBieXRlIHN0cmluZzxiciBjbGFzcz0iIj4NCi0gQSBuZXcgcmVnaXN0 cnksIHBlcmhhcHMgSUFOQSAoYnV0IHdlIHByb2JhYmx5IGRvbid0IHdhbnQgdGhpcyk8YnIgY2xh c3M9IiI+DQo8YnIgY2xhc3M9IiI+DQpUaGUgUFIgYWxsb3dzIGFsbCBidXQgdGhlIGxhc3QsIGJ1 dCB0aGlzIGNvdWxkIGJlIHJlZHVjZWQgdG8ganVzdCBvbmUgb3IgdHdvIG9mIHRoZSBhYm92ZS48 YnIgY2xhc3M9IiI+DQo8L2Jsb2NrcXVvdGU+DQo8YnIgc3R5bGU9ImNhcmV0LWNvbG9yOiByZ2Io MCwgMCwgMCk7IGZvbnQtZmFtaWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1z dHlsZTogbm9ybWFsOyBmb250LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDogbm9y bWFsOyBsZXR0ZXItc3BhY2luZzogbm9ybWFsOyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4dC1pbmRl bnQ6IDBweDsgdGV4dC10cmFuc2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7IHdvcmQt c3BhY2luZzogMHB4OyAtd2Via2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7IHRleHQtZGVjb3Jh dGlvbjogbm9uZTsiIGNsYXNzPSIiPg0KPHNwYW4gc3R5bGU9ImNhcmV0LWNvbG9yOiByZ2IoMCwg MCwgMCk7IGZvbnQtZmFtaWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1zdHls ZTogbm9ybWFsOyBmb250LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDogbm9ybWFs OyBsZXR0ZXItc3BhY2luZzogbm9ybWFsOyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4dC1pbmRlbnQ6 IDBweDsgdGV4dC10cmFuc2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7IHdvcmQtc3Bh Y2luZzogMHB4OyAtd2Via2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7IHRleHQtZGVjb3JhdGlv bjogbm9uZTsgZmxvYXQ6IG5vbmU7IGRpc3BsYXk6IGlubGluZSAhaW1wb3J0YW50OyIgY2xhc3M9 IiI+UFINCiBsb29rcyBncmVhdCB0byBtZSwgZXhjZXB0IHRoYXQgd291bGQgSSBhZ3JlZSB3aXRo IHJlZHVjaW5nIGl0IHRvIG9uZSBvciB0d28uPC9zcGFuPjxiciBzdHlsZT0iY2FyZXQtY29sb3I6 IHJnYigwLCAwLCAwKTsgZm9udC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAxMnB4OyBm b250LXN0eWxlOiBub3JtYWw7IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQtd2VpZ2h0 OiBub3JtYWw7IGxldHRlci1zcGFjaW5nOiBub3JtYWw7IHRleHQtYWxpZ246IHN0YXJ0OyB0ZXh0 LWluZGVudDogMHB4OyB0ZXh0LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUtc3BhY2U6IG5vcm1hbDsg d29yZC1zcGFjaW5nOiAwcHg7IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsgdGV4dC1k ZWNvcmF0aW9uOiBub25lOyIgY2xhc3M9IiI+DQo8c3BhbiBzdHlsZT0iY2FyZXQtY29sb3I6IHJn YigwLCAwLCAwKTsgZm9udC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAxMnB4OyBmb250 LXN0eWxlOiBub3JtYWw7IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQtd2VpZ2h0OiBu b3JtYWw7IGxldHRlci1zcGFjaW5nOiBub3JtYWw7IHRleHQtYWxpZ246IHN0YXJ0OyB0ZXh0LWlu ZGVudDogMHB4OyB0ZXh0LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUtc3BhY2U6IG5vcm1hbDsgd29y ZC1zcGFjaW5nOiAwcHg7IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsgdGV4dC1kZWNv cmF0aW9uOiBub25lOyBmbG9hdDogbm9uZTsgZGlzcGxheTogaW5saW5lICFpbXBvcnRhbnQ7IiBj bGFzcz0iIj5TaW5jZQ0KIHRoZSBhYmlsaXR5IHRvIHRha2UgYSB2YWx1ZSBhbmQgcmVzb2x2ZSBp dCB0byBzb21ldGhpbmcgbWVhbmluZ2Z1bCBpcyB1c2VmdWwgaW4gbWFueSBjYXNlcyAobG9nZ2lu Zywgd2lyZXNoYXJrIGFuYWx5c2lzLCBldGMuKSwgSSB3b3VsZCByZW1vdmUgdGhlIHRoaXJkIG9w dGlvbi48L3NwYW4+PGJyIHN0eWxlPSJjYXJldC1jb2xvcjogcmdiKDAsIDAsIDApOyBmb250LWZh bWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZvbnQtc3R5bGU6IG5vcm1hbDsgZm9u dC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6IG5vcm1hbDsgbGV0dGVyLXNwYWNp bmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7IHRleHQtaW5kZW50OiAwcHg7IHRleHQtdHJh bnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9ybWFsOyB3b3JkLXNwYWNpbmc6IDBweDsgLXdl YmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRlY29yYXRpb246IG5vbmU7IiBjbGFz cz0iIj4NCjxiciBzdHlsZT0iY2FyZXQtY29sb3I6IHJnYigwLCAwLCAwKTsgZm9udC1mYW1pbHk6 IEhlbHZldGljYTsgZm9udC1zaXplOiAxMnB4OyBmb250LXN0eWxlOiBub3JtYWw7IGZvbnQtdmFy aWFudC1jYXBzOiBub3JtYWw7IGZvbnQtd2VpZ2h0OiBub3JtYWw7IGxldHRlci1zcGFjaW5nOiBu b3JtYWw7IHRleHQtYWxpZ246IHN0YXJ0OyB0ZXh0LWluZGVudDogMHB4OyB0ZXh0LXRyYW5zZm9y bTogbm9uZTsgd2hpdGUtc3BhY2U6IG5vcm1hbDsgd29yZC1zcGFjaW5nOiAwcHg7IC13ZWJraXQt dGV4dC1zdHJva2Utd2lkdGg6IDBweDsgdGV4dC1kZWNvcmF0aW9uOiBub25lOyIgY2xhc3M9IiI+ DQo8c3BhbiBzdHlsZT0iY2FyZXQtY29sb3I6IHJnYigwLCAwLCAwKTsgZm9udC1mYW1pbHk6IEhl bHZldGljYTsgZm9udC1zaXplOiAxMnB4OyBmb250LXN0eWxlOiBub3JtYWw7IGZvbnQtdmFyaWFu dC1jYXBzOiBub3JtYWw7IGZvbnQtd2VpZ2h0OiBub3JtYWw7IGxldHRlci1zcGFjaW5nOiBub3Jt YWw7IHRleHQtYWxpZ246IHN0YXJ0OyB0ZXh0LWluZGVudDogMHB4OyB0ZXh0LXRyYW5zZm9ybTog bm9uZTsgd2hpdGUtc3BhY2U6IG5vcm1hbDsgd29yZC1zcGFjaW5nOiAwcHg7IC13ZWJraXQtdGV4 dC1zdHJva2Utd2lkdGg6IDBweDsgdGV4dC1kZWNvcmF0aW9uOiBub25lOyBmbG9hdDogbm9uZTsg ZGlzcGxheTogaW5saW5lICFpbXBvcnRhbnQ7IiBjbGFzcz0iIj5PSURzLA0KIGVuY29kZWQgYXMg aW50IGFycmF5cywgcHJvYmFibHkgY29tcHJlc3MgdGhlIGJlc3Qgc28gaWYgb25seSBvbmUsIHRo ZW4gSSdkIHBpY2sgdGhhdCBvbmUuICZuYnNwO1VSSXMgYXJlIGNvbnZlbmllbnQgdGhvdWdoIGFs c28gc28gaWYgdHdvLCB0aGVuIHRoYXQncyBteSBzZWNvbmQgcGljay48c3BhbiBjbGFzcz0iQXBw bGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PC9zcGFuPjxiciBzdHlsZT0iY2FyZXQt Y29sb3I6IHJnYigwLCAwLCAwKTsgZm9udC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAx MnB4OyBmb250LXN0eWxlOiBub3JtYWw7IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQt d2VpZ2h0OiBub3JtYWw7IGxldHRlci1zcGFjaW5nOiBub3JtYWw7IHRleHQtYWxpZ246IHN0YXJ0 OyB0ZXh0LWluZGVudDogMHB4OyB0ZXh0LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUtc3BhY2U6IG5v cm1hbDsgd29yZC1zcGFjaW5nOiAwcHg7IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsg dGV4dC1kZWNvcmF0aW9uOiBub25lOyIgY2xhc3M9IiI+DQo8YnIgc3R5bGU9ImNhcmV0LWNvbG9y OiByZ2IoMCwgMCwgMCk7IGZvbnQtZmFtaWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsg Zm9udC1zdHlsZTogbm9ybWFsOyBmb250LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdo dDogbm9ybWFsOyBsZXR0ZXItc3BhY2luZzogbm9ybWFsOyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4 dC1pbmRlbnQ6IDBweDsgdGV4dC10cmFuc2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7 IHdvcmQtc3BhY2luZzogMHB4OyAtd2Via2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7IHRleHQt ZGVjb3JhdGlvbjogbm9uZTsiIGNsYXNzPSIiPg0KPGJsb2NrcXVvdGUgdHlwZT0iY2l0ZSIgc3R5 bGU9ImZvbnQtZmFtaWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1zdHlsZTog bm9ybWFsOyBmb250LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDogbm9ybWFsOyBs ZXR0ZXItc3BhY2luZzogbm9ybWFsOyBvcnBoYW5zOiBhdXRvOyB0ZXh0LWFsaWduOiBzdGFydDsg dGV4dC1pbmRlbnQ6IDBweDsgdGV4dC10cmFuc2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3Jt YWw7IHdpZG93czogYXV0bzsgd29yZC1zcGFjaW5nOiAwcHg7IC13ZWJraXQtdGV4dC1zaXplLWFk anVzdDogYXV0bzsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRlY29yYXRp b246IG5vbmU7IiBjbGFzcz0iIj4NCkkgZG9uJ3Qgc2VlIHRoaXMgY2xhaW0gYXMgZXNzZW50aWFs IGZvciBFQVQsIGJ1dCBJIGNvbW1pdHRlZCB0byB3b3JraW5nIHRocm91Z2ggdGhpcyB3aXRoIFRF RVAuIEknbSBmaW5lIHdpdGggdGhpcyBQUiBnb2luZyBpbnRvIGEgVEVFUCBkb2N1bWVudCByYXRo ZXIgdGhhbiBFQVQuPGJyIGNsYXNzPSIiPg0KPC9ibG9ja3F1b3RlPg0KPGJyIHN0eWxlPSJjYXJl dC1jb2xvcjogcmdiKDAsIDAsIDApOyBmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6 IDEycHg7IGZvbnQtc3R5bGU6IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9u dC13ZWlnaHQ6IG5vcm1hbDsgbGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3Rh cnQ7IHRleHQtaW5kZW50OiAwcHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTog bm9ybWFsOyB3b3JkLXNwYWNpbmc6IDBweDsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4 OyB0ZXh0LWRlY29yYXRpb246IG5vbmU7IiBjbGFzcz0iIj4NCjxzcGFuIHN0eWxlPSJjYXJldC1j b2xvcjogcmdiKDAsIDAsIDApOyBmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEy cHg7IGZvbnQtc3R5bGU6IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13 ZWlnaHQ6IG5vcm1hbDsgbGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7 IHRleHQtaW5kZW50OiAwcHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9y bWFsOyB3b3JkLXNwYWNpbmc6IDBweDsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0 ZXh0LWRlY29yYXRpb246IG5vbmU7IGZsb2F0OiBub25lOyBkaXNwbGF5OiBpbmxpbmUgIWltcG9y dGFudDsiIGNsYXNzPSIiPlRoZQ0KIG5vdGlvbiBvZiBIVyBjbGFzcyBJRCBpcyBub3Qgc3BlY2lm aWMgdG8gVEVFcywgaGVuY2UgdGhlIHJlcXVlc3QgdG8gcHV0IGl0IGluIEVBVCByYXRoZXIgdGhh biBpbiBhbnl0aGluZyB0aGF0IHdvdWxkIGltcGx5IHVzZSBpcyBsaW1pdGVkIHRvIFRFRXMgKGhl bmNlIG5vdCBpbiBhIFRFRVAgZG9jdW1lbnQpLjwvc3Bhbj48YnIgc3R5bGU9ImNhcmV0LWNvbG9y OiByZ2IoMCwgMCwgMCk7IGZvbnQtZmFtaWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsg Zm9udC1zdHlsZTogbm9ybWFsOyBmb250LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdo dDogbm9ybWFsOyBsZXR0ZXItc3BhY2luZzogbm9ybWFsOyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4 dC1pbmRlbnQ6IDBweDsgdGV4dC10cmFuc2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7 IHdvcmQtc3BhY2luZzogMHB4OyAtd2Via2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7IHRleHQt ZGVjb3JhdGlvbjogbm9uZTsiIGNsYXNzPSIiPg0KPGJyIHN0eWxlPSJjYXJldC1jb2xvcjogcmdi KDAsIDAsIDApOyBmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZvbnQt c3R5bGU6IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6IG5v cm1hbDsgbGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7IHRleHQtaW5k ZW50OiAwcHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9ybWFsOyB3b3Jk LXNwYWNpbmc6IDBweDsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRlY29y YXRpb246IG5vbmU7IiBjbGFzcz0iIj4NCjxzcGFuIHN0eWxlPSJjYXJldC1jb2xvcjogcmdiKDAs IDAsIDApOyBmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZvbnQtc3R5 bGU6IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6IG5vcm1h bDsgbGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7IHRleHQtaW5kZW50 OiAwcHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9ybWFsOyB3b3JkLXNw YWNpbmc6IDBweDsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRlY29yYXRp b246IG5vbmU7IGZsb2F0OiBub25lOyBkaXNwbGF5OiBpbmxpbmUgIWltcG9ydGFudDsiIGNsYXNz PSIiPi1EYXZlPC9zcGFuPjxiciBzdHlsZT0iY2FyZXQtY29sb3I6IHJnYigwLCAwLCAwKTsgZm9u dC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAxMnB4OyBmb250LXN0eWxlOiBub3JtYWw7 IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQtd2VpZ2h0OiBub3JtYWw7IGxldHRlci1z cGFjaW5nOiBub3JtYWw7IHRleHQtYWxpZ246IHN0YXJ0OyB0ZXh0LWluZGVudDogMHB4OyB0ZXh0 LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUtc3BhY2U6IG5vcm1hbDsgd29yZC1zcGFjaW5nOiAwcHg7 IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsgdGV4dC1kZWNvcmF0aW9uOiBub25lOyIg Y2xhc3M9IiI+DQo8YnIgc3R5bGU9ImNhcmV0LWNvbG9yOiByZ2IoMCwgMCwgMCk7IGZvbnQtZmFt aWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1zdHlsZTogbm9ybWFsOyBmb250 LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDogbm9ybWFsOyBsZXR0ZXItc3BhY2lu Zzogbm9ybWFsOyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4dC1pbmRlbnQ6IDBweDsgdGV4dC10cmFu c2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7IHdvcmQtc3BhY2luZzogMHB4OyAtd2Vi a2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7IHRleHQtZGVjb3JhdGlvbjogbm9uZTsiIGNsYXNz PSIiPg0KPHNwYW4gc3R5bGU9ImNhcmV0LWNvbG9yOiByZ2IoMCwgMCwgMCk7IGZvbnQtZmFtaWx5 OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1zdHlsZTogbm9ybWFsOyBmb250LXZh cmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDogbm9ybWFsOyBsZXR0ZXItc3BhY2luZzog bm9ybWFsOyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4dC1pbmRlbnQ6IDBweDsgdGV4dC10cmFuc2Zv cm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7IHdvcmQtc3BhY2luZzogMHB4OyAtd2Via2l0 LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7IHRleHQtZGVjb3JhdGlvbjogbm9uZTsgZmxvYXQ6IG5v bmU7IGRpc3BsYXk6IGlubGluZSAhaW1wb3J0YW50OyIgY2xhc3M9IiI+X19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX188L3NwYW4+PGJyIHN0eWxlPSJjYXJldC1j b2xvcjogcmdiKDAsIDAsIDApOyBmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEy cHg7IGZvbnQtc3R5bGU6IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13 ZWlnaHQ6IG5vcm1hbDsgbGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7 IHRleHQtaW5kZW50OiAwcHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9y bWFsOyB3b3JkLXNwYWNpbmc6IDBweDsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0 ZXh0LWRlY29yYXRpb246IG5vbmU7IiBjbGFzcz0iIj4NCjxzcGFuIHN0eWxlPSJjYXJldC1jb2xv cjogcmdiKDAsIDAsIDApOyBmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7 IGZvbnQtc3R5bGU6IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWln aHQ6IG5vcm1hbDsgbGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7IHRl eHQtaW5kZW50OiAwcHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9ybWFs OyB3b3JkLXNwYWNpbmc6IDBweDsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0 LWRlY29yYXRpb246IG5vbmU7IGZsb2F0OiBub25lOyBkaXNwbGF5OiBpbmxpbmUgIWltcG9ydGFu dDsiIGNsYXNzPSIiPlRFRVANCiBtYWlsaW5nIGxpc3Q8L3NwYW4+PGJyIHN0eWxlPSJjYXJldC1j b2xvcjogcmdiKDAsIDAsIDApOyBmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEy cHg7IGZvbnQtc3R5bGU6IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13 ZWlnaHQ6IG5vcm1hbDsgbGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7 IHRleHQtaW5kZW50OiAwcHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9y bWFsOyB3b3JkLXNwYWNpbmc6IDBweDsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0 ZXh0LWRlY29yYXRpb246IG5vbmU7IiBjbGFzcz0iIj4NCjxhIGhyZWY9Im1haWx0bzpURUVQQGll dGYub3JnIiBzdHlsZT0iZm9udC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAxMnB4OyBm b250LXN0eWxlOiBub3JtYWw7IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQtd2VpZ2h0 OiBub3JtYWw7IGxldHRlci1zcGFjaW5nOiBub3JtYWw7IG9ycGhhbnM6IGF1dG87IHRleHQtYWxp Z246IHN0YXJ0OyB0ZXh0LWluZGVudDogMHB4OyB0ZXh0LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUt c3BhY2U6IG5vcm1hbDsgd2lkb3dzOiBhdXRvOyB3b3JkLXNwYWNpbmc6IDBweDsgLXdlYmtpdC10 ZXh0LXNpemUtYWRqdXN0OiBhdXRvOyAtd2Via2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7IiBj bGFzcz0iIj5URUVQQGlldGYub3JnPC9hPjxiciBzdHlsZT0iY2FyZXQtY29sb3I6IHJnYigwLCAw LCAwKTsgZm9udC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAxMnB4OyBmb250LXN0eWxl OiBub3JtYWw7IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQtd2VpZ2h0OiBub3JtYWw7 IGxldHRlci1zcGFjaW5nOiBub3JtYWw7IHRleHQtYWxpZ246IHN0YXJ0OyB0ZXh0LWluZGVudDog MHB4OyB0ZXh0LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUtc3BhY2U6IG5vcm1hbDsgd29yZC1zcGFj aW5nOiAwcHg7IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsgdGV4dC1kZWNvcmF0aW9u OiBub25lOyIgY2xhc3M9IiI+DQo8YSBocmVmPSJodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFu L2xpc3RpbmZvL3RlZXAiIHN0eWxlPSJmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6 IDEycHg7IGZvbnQtc3R5bGU6IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9u dC13ZWlnaHQ6IG5vcm1hbDsgbGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgb3JwaGFuczogYXV0bzsg dGV4dC1hbGlnbjogc3RhcnQ7IHRleHQtaW5kZW50OiAwcHg7IHRleHQtdHJhbnNmb3JtOiBub25l OyB3aGl0ZS1zcGFjZTogbm9ybWFsOyB3aWRvd3M6IGF1dG87IHdvcmQtc3BhY2luZzogMHB4OyAt d2Via2l0LXRleHQtc2l6ZS1hZGp1c3Q6IGF1dG87IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6 IDBweDsiIGNsYXNzPSIiPmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGluZm8vdGVl cDwvYT48L2Rpdj4NCjwvYmxvY2txdW90ZT4NCjwvZGl2Pg0KPGJyIGNsYXNzPSIiPg0KPC9kaXY+ DQo8L2Rpdj4NCklNUE9SVEFOVCBOT1RJQ0U6IFRoZSBjb250ZW50cyBvZiB0aGlzIGVtYWlsIGFu ZCBhbnkgYXR0YWNobWVudHMgYXJlIGNvbmZpZGVudGlhbCBhbmQgbWF5IGFsc28gYmUgcHJpdmls ZWdlZC4gSWYgeW91IGFyZSBub3QgdGhlIGludGVuZGVkIHJlY2lwaWVudCwgcGxlYXNlIG5vdGlm eSB0aGUgc2VuZGVyIGltbWVkaWF0ZWx5IGFuZCBkbyBub3QgZGlzY2xvc2UgdGhlIGNvbnRlbnRz IHRvIGFueSBvdGhlciBwZXJzb24sIHVzZSBpdCBmb3IgYW55IHB1cnBvc2UsDQogb3Igc3RvcmUg b3IgY29weSB0aGUgaW5mb3JtYXRpb24gaW4gYW55IG1lZGl1bS4gVGhhbmsgeW91LiA8L2Rpdj4N CjwvZGl2Pg0KPC9ibG9ja3F1b3RlPg0KPC9kaXY+DQo8YnIgY2xhc3M9IiI+DQo8L2Rpdj4NCjwv ZGl2Pg0KPC9kaXY+DQo8L2Jsb2NrcXVvdGU+DQo8L2Rpdj4NCjxiciBjbGFzcz0iIj4NCjwvZGl2 Pg0KPC9kaXY+DQo8L2Rpdj4NCklNUE9SVEFOVCBOT1RJQ0U6IFRoZSBjb250ZW50cyBvZiB0aGlz IGVtYWlsIGFuZCBhbnkgYXR0YWNobWVudHMgYXJlIGNvbmZpZGVudGlhbCBhbmQgbWF5IGFsc28g YmUgcHJpdmlsZWdlZC4gSWYgeW91IGFyZSBub3QgdGhlIGludGVuZGVkIHJlY2lwaWVudCwgcGxl YXNlIG5vdGlmeSB0aGUgc2VuZGVyIGltbWVkaWF0ZWx5IGFuZCBkbyBub3QgZGlzY2xvc2UgdGhl IGNvbnRlbnRzIHRvIGFueSBvdGhlciBwZXJzb24sIHVzZSBpdCBmb3IgYW55IHB1cnBvc2UsDQog b3Igc3RvcmUgb3IgY29weSB0aGUgaW5mb3JtYXRpb24gaW4gYW55IG1lZGl1bS4gVGhhbmsgeW91 Lg0KPC9ib2R5Pg0KPC9odG1sPg0K --_000_17B0A1241BDF41A18680B44C2A540941armcom_-- From nobody Mon Jan 10 14:18:08 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4ED503A12C2; Mon, 10 Jan 2022 14:18:01 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.899 X-Spam-Level: X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d6UfeTAZfBQj; Mon, 10 Jan 2022 14:17:56 -0800 (PST) Received: from gabriel-smtp.zfn.uni-bremen.de (gabriel-smtp.zfn.uni-bremen.de [IPv6:2001:638:708:32::15]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EAC813A12BB; Mon, 10 Jan 2022 14:17:55 -0800 (PST) Received: from [192.168.217.118] (p5089a436.dip0.t-ipconnect.de [80.137.164.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gabriel-smtp.zfn.uni-bremen.de (Postfix) with ESMTPSA id 4JXp9W4sSJzDCcm; Mon, 10 Jan 2022 23:17:51 +0100 (CET) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.7\)) From: Carsten Bormann In-Reply-To: <17B0A124-1BDF-41A1-8680-B44C2A540941@arm.com> Date: Mon, 10 Jan 2022 23:17:51 +0100 Cc: Laurence Lundblade , Dave Thaler , teep , rats X-Mao-Original-Outgoing-Id: 663545871.252178-981c359f904096e07011336e41318e84 Content-Transfer-Encoding: quoted-printable Message-Id: <3470AF46-D11A-4A92-A6CF-A6311B270ED7@tzi.org> References: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> <8466B6E2-C335-4173-A2A2-3CCA555D28CA@arm.com> <62743D24-49F4-4480-9561-F00DA513C9FF@island-resort.com> <17B0A124-1BDF-41A1-8680-B44C2A540941@arm.com> To: Brendan Moran X-Mailer: Apple Mail (2.3608.120.23.2.7) Archived-At: Subject: Re: [Teep] [Rats] Class ID claim (and other HW identification) X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 10 Jan 2022 22:18:02 -0000 On 2022-01-10, at 22:12, Brendan Moran wrote: >=20 > And as to why I don=E2=80=99t want a taxonomy? Because it=E2=80=99s = unnecessary. This. (Maybe slightly worse, actually, because it might be used by an attacker = to pretend that there is some semantics where there isn=E2=80=99t or it = isn=E2=80=99t well-defined.) Gr=C3=BC=C3=9Fe, Carsten From nobody Mon Jan 10 20:35:40 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3959D3A154F for ; Mon, 10 Jan 2022 20:35:38 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.549 X-Spam-Level: X-Spam-Status: No, score=-0.549 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_BL_SPAMCOP_NET=1.347, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OkoHeyoY7QLL for ; Mon, 10 Jan 2022 20:35:34 -0800 (PST) Received: from p3plsmtpa09-08.prod.phx3.secureserver.net (p3plsmtpa09-08.prod.phx3.secureserver.net [173.201.193.237]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 403563A154E for ; Mon, 10 Jan 2022 20:35:34 -0800 (PST) Received: from [192.168.1.7] ([75.80.148.243]) by :SMTPAUTH: with ESMTPA id 78qUnUisfWpoh78qVn6qov; Mon, 10 Jan 2022 21:33:19 -0700 X-CMAE-Analysis: v=2.4 cv=dZtFYVbe c=1 sm=1 tr=0 ts=61dd088f a=VPU1mRQhDhA4uSX60JRRww==:117 a=VPU1mRQhDhA4uSX60JRRww==:17 a=7CQSdrXTAAAA:8 a=K6EGIJCdAAAA:8 a=48vgC7mUAAAA:8 a=l8eZuzMOkO7Nm6fmmoAA:9 a=QEXdDO2ut3YA:10 a=3kdUERIxBfgAY2f4usAA:9 a=lVZB1P_sHl72bTAa:21 a=_W_S_7VecoQA:10 a=a-qgeE7W1pNrGK8U0ZQC:22 a=L6pVIi0Kn1GYQfi8-iRI:22 a=w1C3t2QeGrPiZgrLijVG:22 X-SECURESERVER-ACCT: lgl@island-resort.com From: Laurence Lundblade Message-Id: <2440B689-1943-4227-B96F-F9ABD046D252@island-resort.com> Content-Type: multipart/alternative; boundary="Apple-Mail=_8351C5CF-2B31-4F64-8985-ED21174ED0A7" Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.17\)) Date: Mon, 10 Jan 2022 20:33:18 -0800 In-Reply-To: <17B0A124-1BDF-41A1-8680-B44C2A540941@arm.com> Cc: Dave Thaler , rats , teep To: Brendan Moran References: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> <8466B6E2-C335-4173-A2A2-3CCA555D28CA@arm.com> <62743D24-49F4-4480-9561-F00DA513C9FF@island-resort.com> <17B0A124-1BDF-41A1-8680-B44C2A540941@arm.com> X-Mailer: Apple Mail (2.3445.104.17) X-CMAE-Envelope: MS4xfEROkSr+PgCnwBErrJnx8L0OI9N2o9IeZmDVDo2Jr2PeiHSsWa9IzbUVfHE3mwbpX8HQi6grBkVkNDmyncP4ctZkMncqg9GST9a7Z19ptMPVu0xKbCGS O7A1AE5N07fLQnc4dLAr9ITmqTSTlaic3ClicdOyX+OH2CBCMNSasehoqsMYpdm7du4dT+rjm4w52XZhOX6ZHGlWmY9wM8ocP1dsD1M1Av/ko5oVnWJ7QUMM cj2XspVwI1Q45QvHMDDykeaE4rw1lf/HMcbq/pniwvG+270c6rD1NUpjrunRlxho Archived-At: Subject: Re: [Teep] [Rats] Class ID claim (and other HW identification) X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 11 Jan 2022 04:35:38 -0000 --Apple-Mail=_8351C5CF-2B31-4F64-8985-ED21174ED0A7 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 Hey Brendan, I made the HW-IP PR as an educated guess, from talking to Dave, and from = a some text in section 7 of TEEP Architecture. I don=E2=80=99t have any = agenda here but to make EAT work well for SUIT and TEEP. Obviously, I=E2=80=99m missing the mark, so I=E2=80=99m graciously = bowing out. So no class ID in the EAT draft. LL P.S. I do appreciate the discussion as is resulted in adding the HW = Model ID claim to EAT, something that was missing. > On Jan 10, 2022, at 1:12 PM, Brendan Moran = wrote: >=20 > IMO, adding a new claim like this is counterproductive. It presupposes = that we can predict all classes that a device may belong to. Sure, we = can make a registry of different kinds of classes that a device can = belong to, but why? Frankly, the naive approach is better than this: you = have a database that maps OEM + model + revision into an = application-specific taxonomy. Of course, now someone has to actually = maintain that database. Have fun. >=20 > Why not take the easy route? It=E2=80=99s far simpler for a device to = be the intersection of ANY properties that make it distinct. The entity = consuming an EAT needs those anyway. And as to why I don=E2=80=99t want = a taxonomy? Because it=E2=80=99s unnecessary. To use any of these = identifiers, you have to use a database to convert the identifier into = whatever it is that you actually care about. That database can just as = easily contain any taxonomy you like. >=20 > We=E2=80=99re talking about adding more complexity to a specification = in order to distinguish between: >=20 > SELECT * FROM hw_ip_identifiers WHERE id=3D${ID} > Vs > SELECT * FROM hw_identifiers WHERE id=3D${ID} AND taxonomy=3D=E2=80=9Chw= ip" >=20 > Why would we complicate the spec to add taxonomies in order to = simplify a database in such a trivial way? >=20 > In my opinion, we should look at a single physical device as the = intersection of several sets:=20 > * the OEM=E2=80=99s model identifier (incl. HW revision) > * the SoC identifier (incl. SoC revision) > * the processor=E2=80=99s type/version/revision > * the trusted OS=E2=80=99s version/revision > * the boot loader (especially if it=E2=80=99s in ROM) = version/revision. >=20 > All of these matter (I think) to TEEP. We need to report them all. But = is the list exhaustive? Probably not. While a registry for the different = taxonomies may be relevant, I doubt it matters in EAT itself. That only = matters when looking up an identifier. >=20 > What is the concrete value of specifying the taxonomy of an opaque = blob in an interchange document? >=20 > Thanks, > Brendan >=20 >=20 >=20 >=20 >=20 >> On 7 Jan 2022, at 23:56, Laurence Lundblade > wrote: >>=20 >> So rather than a HW Class, how about a HW IP claim? It would reuse = the same triple for identifying HW, OEM, Model, Version. It could occur = along side the HW OEM, model and version. This seems better than my = current PR and lines up better with Brendan=E2=80=99s examples and with = the reality that HW IP comes from a vendor, has models and versions. = I=E2=80=99ll write up a PR for it if I receive some positive feedback = here. >>=20 >>=20 >> The distinction between chip and device is intended to be handled by = submodules in EAT. Submodules can express arbitrarily complex = architectures and device compositions. >>=20 >> I think it=E2=80=99s cleaner to keep the HW-identifying claims = separate from the SW-identify claims. Would really like the = identification of the Trusted OS Vendor be handled by CoSWID and = friends. Trying to make some claim suitable for identifying both SW and = HW for all of attestation seems over-ambitious. >>=20 >> I also think it=E2=80=99s fine to define some claims better suited to = the TEE world in TEEP if we can=E2=80=99t find enough common ground = between TEEP and the very broadly applicable stuff that goes into EAT. >>=20 >> LL >>=20 >>=20 >> Note: I find the use of the word =E2=80=9Cclass=E2=80=9D here = confusing. If I were putting TV=E2=80=99s into classes I=E2=80=99d uses = classes like smart/dumb, display type (LCD, CRT, OLED) and such that = identify characteristics of TVs independent of vendor and model. "Sony = Bravia" is not a class IMO. Nor is =E2=80=9CMicrosoft Windows=E2=80=9D = (an OS the runs on lots of HW platforms). I=E2=80=99d like to move away = from the word. >>=20 >>=20 >>=20 >>> On Jan 4, 2022, at 3:06 AM, Brendan Moran > wrote: >>>=20 >>> I think devices will need to report multiple vendor/class pairs. >>>=20 >>> For example, A mobile device could potentially contain: >>> 1. A Mobile Device OEM Vendor ID >>> 2. A Silicon vendor=E2=80=99s Vendor ID >>> 3. An IP vendor=E2=80=99s Vendor ID >>>=20 >>> This is not an exhaustive list. >>>=20 >>> For Arm Trust Zone TEEs, I would expect to see: >>> 1. The Arm Vendor ID + the processor core=E2=80=99s Class ID >>> 2. The Trusted OS Vendor ID + the Trusted OS Class ID >>> 3. The Silicon vendor=E2=80=99s Vendor ID + the processor Class ID >>> 4. The Device OEM=E2=80=99s Vendor ID + the device Class ID >>>=20 >>> Cheers, >>> Brendan >>>=20 >>>> On 3 Jan 2022, at 21:00, Dave Thaler = > wrote: >>>>=20 >>>> Laurence Lundblade wrote: >>>>> I talked to Dave which resulted in reorientation of my = understanding of Class ID in TEEP. >>>>>=20 >>>>> Class ID basically identifies HW IP from a HW designer like Arm or = Synopsis that is integrated into chips made by various HW OEMs like = Qualcomm, Samsung and Apple. The term used frequently for this is "IP" = (I know this well from my days working on HW at Qualcomm). >>>>>=20 >>>>> I've created a PR for HW Class. >>>>>=20 >>>>> Since what is identified spans OEMs, this must be a globally = unique identifier. We need to be explicit about that.=20 >>>>>=20 >>>>> I know of four ways to have a global identifier: >>>>> - Use OIDs >>>>> - Use DNS / URI >>>>> - Probabilistically using a big enough byte string >>>>> - A new registry, perhaps IANA (but we probably don't want this) >>>>>=20 >>>>> The PR allows all but the last, but this could be reduced to just = one or two of the above. >>>>=20 >>>> PR looks great to me, except that would I agree with reducing it to = one or two. >>>> Since the ability to take a value and resolve it to something = meaningful is useful in many cases (logging, wireshark analysis, etc.), = I would remove the third option. >>>>=20 >>>> OIDs, encoded as int arrays, probably compress the best so if only = one, then I'd pick that one. URIs are convenient though also so if two, = then that's my second pick.=20 >>>>=20 >>>>> I don't see this claim as essential for EAT, but I committed to = working through this with TEEP. I'm fine with this PR going into a TEEP = document rather than EAT. >>>>=20 >>>> The notion of HW class ID is not specific to TEEs, hence the = request to put it in EAT rather than in anything that would imply use is = limited to TEEs (hence not in a TEEP document). >>>>=20 >>>> -Dave >>>>=20 >>>> _______________________________________________ >>>> TEEP mailing list >>>> TEEP@ietf.org >>>> https://www.ietf.org/mailman/listinfo/teep = >>> IMPORTANT NOTICE: The contents of this email and any attachments are = confidential and may also be privileged. If you are not the intended = recipient, please notify the sender immediately and do not disclose the = contents to any other person, use it for any purpose, or store or copy = the information in any medium. Thank you. >>=20 >=20 > IMPORTANT NOTICE: The contents of this email and any attachments are = confidential and may also be privileged. If you are not the intended = recipient, please notify the sender immediately and do not disclose the = contents to any other person, use it for any purpose, or store or copy = the information in any medium. Thank you. --Apple-Mail=_8351C5CF-2B31-4F64-8985-ED21174ED0A7 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8 Hey = Brendan,

I made the = HW-IP PR as an educated guess, from talking to Dave, and from a some = text in section 7 of TEEP Architecture. I don=E2=80=99t have any agenda = here but to make EAT work well for SUIT and TEEP.
Obviously, I=E2=80=99m missing the = mark, so I=E2=80=99m graciously bowing out. So no class ID in the EAT = draft.

LL


P.S. I do appreciate the = discussion as is resulted in adding the HW Model ID claim to EAT, = something that was missing.


On Jan 10, 2022, at 1:12 PM, = Brendan Moran <Brendan.Moran@arm.com> wrote:

IMO, adding a new claim like this is counterproductive. It presupposes = that we can predict all classes that a device may belong to. Sure, we = can make a registry of different kinds of classes that a device can = belong to, but why? Frankly, the naive approach is better than this: you have a database that maps OEM + model + = revision into an application-specific taxonomy. Of course, now someone = has to actually maintain that database. Have fun.

Why not take the easy route? It=E2=80=99s far simpler = for a device to be the intersection of ANY properties that make it = distinct. The entity consuming an EAT needs those anyway. And as to why = I don=E2=80=99t want a taxonomy? Because it=E2=80=99s unnecessary. To = use any of these identifiers, you have to use a database to convert the = identifier into whatever it is that you actually care about. That = database can just as easily contain any taxonomy you like.

We=E2=80=99re talking about adding more complexity to a = specification in order to distinguish between:

SELECT * FROM hw_ip_identifiers WHERE id=3D${ID}
Vs
SELECT * FROM hw_identifiers WHERE id=3D${ID} AND = taxonomy=3D=E2=80=9Chwip"

Why would we complicate the spec to add taxonomies in = order to simplify a database in such a trivial way?

In my opinion, we should look at a single physical = device as the intersection of several sets: 
* the OEM=E2=80=99s model identifier (incl. HW = revision)
* the SoC identifier (incl. SoC revision)
* the processor=E2=80=99s type/version/revision
* the trusted OS=E2=80=99s version/revision
* the boot loader (especially if it=E2=80=99s in ROM) = version/revision.

All of these matter (I think) to TEEP. We need to report = them all. But is the list exhaustive? Probably not. While a registry for = the different taxonomies may be relevant, I doubt it matters in EAT = itself. That only matters when looking up an identifier.

What is the concrete value of specifying the taxonomy of = an opaque blob in an interchange document?

Thanks,
Brendan





On 7 Jan 2022, at 23:56, Laurence Lundblade <lgl@island-resort.com> wrote:

So rather than a HW Class, how about a HW IP claim? It would reuse the = same triple for identifying HW, OEM, Model, Version. It could occur = along side the HW OEM, model and version. This seems better than my = current PR and lines up better with Brendan=E2=80=99s examples and with the reality that HW IP comes from a vendor, has models and = versions. I=E2=80=99ll write up a PR for it if I receive some positive = feedback here.


The distinction between chip and device is intended to = be handled by submodules in EAT. Submodules can express arbitrarily = complex architectures and device compositions.

I think it=E2=80=99s cleaner to keep the HW-identifying = claims separate from the SW-identify claims. Would really like the = identification of the Trusted OS Vendor be handled by CoSWID and = friends. Trying to make some claim suitable for identifying both SW and HW for all of attestation seems over-ambitious.

I also think it=E2=80=99s fine to define some claims = better suited to the TEE world in TEEP if we can=E2=80=99t find enough = common ground between TEEP and the very broadly applicable stuff that = goes into EAT.

LL


Note: I find the use of the word =E2=80=9Cclass=E2=80=9D = here confusing. If I were putting TV=E2=80=99s into classes I=E2=80=99d = uses classes like smart/dumb, display type (LCD, CRT, OLED) and such = that identify characteristics of TVs independent of vendor and model. = "Sony Bravia" is not a class IMO. Nor is =E2=80=9CMicrosoft Windows=E2=80=9D (an OS = the runs on lots of HW platforms). I=E2=80=99d like to move away from = the word.



On Jan 4, 2022, at 3:06 AM, Brendan Moran <Brendan.Moran@arm.com> wrote:

I think devices will need to report multiple vendor/class pairs.

For example, A mobile device could potentially contain:
1. A Mobile Device OEM Vendor ID
2. A Silicon vendor=E2=80=99s Vendor ID
3. An IP vendor=E2=80=99s Vendor ID

This is not an exhaustive list.

For Arm Trust Zone TEEs, I would expect to see:
1. The Arm Vendor ID + the processor core=E2=80=99s = Class ID
2. The Trusted OS Vendor ID + the Trusted OS Class = ID
3. The Silicon vendor=E2=80=99s Vendor ID + the = processor Class ID
4. The Device OEM=E2=80=99s Vendor ID + the device Class = ID

Cheers,
Brendan

On 3 Jan 2022, at 21:00, Dave Thaler <dthaler=3D40microsoft.com@dmarc.ietf.org> wrote:

Laurence Lundblade wrote:
I talked to Dave which resulted in reorientation of my understanding of = Class ID in TEEP.

Class ID basically identifies HW IP from a HW designer like Arm or = Synopsis that is integrated into chips made by various HW OEMs like = Qualcomm, Samsung and Apple. The term used frequently for this is "IP" = (I know this well from my days working on HW at Qualcomm).

I've created a PR for HW Class.

Since = what is identified spans OEMs, this must be a globally unique = identifier. We need to be explicit about that. 

I know of four ways to have a global identifier:
- Use OIDs
- Use DNS / URI
- Probabilistically using a big enough byte string
- A new registry, perhaps IANA (but we probably don't want this)

The PR allows all but the last, but this could be reduced to just one or = two of the above.

PR looks great to me, except that would I agree with reducing it to one or = two.
Since the ability to take a value and resolve it to something meaningful is = useful in many cases (logging, wireshark analysis, etc.), I would remove = the third option.

OIDs, encoded as int arrays, probably compress the best so if only one, then = I'd pick that one.  URIs are convenient though also so if two, then = that's my second pick. 

I don't see this claim as essential for EAT, but I committed to working = through this with TEEP. I'm fine with this PR going into a TEEP document = rather than EAT.

The notion of HW class ID is not specific to TEEs, hence the request to put = it in EAT rather than in anything that would imply use is limited to = TEEs (hence not in a TEEP document).

-Dave
_______________________________________________
TEEP mailing list
TEEP@ietf.org
https://www.ietf.org/mailman/listinfo/teep

IMPORTANT NOTICE: The contents of this email and any attachments are = confidential and may also be privileged. If you are not the intended = recipient, please notify the sender immediately and do not disclose the = contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.


IMPORTANT NOTICE: The contents of this email and any attachments are = confidential and may also be privileged. If you are not the intended = recipient, please notify the sender immediately and do not disclose the = contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.

= --Apple-Mail=_8351C5CF-2B31-4F64-8985-ED21174ED0A7-- From nobody Tue Jan 11 01:13:15 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BBE713A1F81; Tue, 11 Jan 2022 01:13:08 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.899 X-Spam-Level: X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=6NjdhX7A; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b=6NjdhX7A Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XLxFxeF7urHT; Tue, 11 Jan 2022 01:13:03 -0800 (PST) Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70051.outbound.protection.outlook.com [40.107.7.51]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 57E983A1F7E; Tue, 11 Jan 2022 01:13:03 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NYOrA2KRHpiPnR/JCrd06hMr9amAQvYwT1ZqXowWiKI=; b=6NjdhX7Ao/UnleQPjmBDsUL5BpfB+2T50EeBq7XkNY354xwp53IxvpzNOW+ZQSg1Tb29H4OKnZ8ejOBYdSNJSxP4tY0+7pgak1qn/BlcMilpcB2ZYP5jcZHyAdImt1+m2ax4P1/cnuBci4PfmAJ9Magy1CiX8bW5PaYcjJ+iij0= Received: from AS8PR04CA0196.eurprd04.prod.outlook.com (2603:10a6:20b:2f3::21) by AM0PR08MB3762.eurprd08.prod.outlook.com (2603:10a6:208:100::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4867.7; Tue, 11 Jan 2022 09:12:58 +0000 Received: from AM5EUR03FT003.eop-EUR03.prod.protection.outlook.com (2603:10a6:20b:2f3:cafe::59) by AS8PR04CA0196.outlook.office365.com (2603:10a6:20b:2f3::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4888.9 via Frontend Transport; Tue, 11 Jan 2022 09:12:58 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by AM5EUR03FT003.mail.protection.outlook.com (10.152.16.149) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4867.10 via Frontend Transport; Tue, 11 Jan 2022 09:12:57 +0000 Received: ("Tessian outbound a33f292be81b:v110"); Tue, 11 Jan 2022 09:12:57 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: c4e18c9887e4d65d X-CR-MTA-TID: 64aa7808 Received: from 7668baa31891.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 88350D34-A0F6-4E19-8BB4-37B4B60A1E84.1; Tue, 11 Jan 2022 09:12:49 +0000 Received: from EUR03-DB5-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 7668baa31891.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Tue, 11 Jan 2022 09:12:49 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=McImjFCncJP1n2dzuACCPlkmRRaZFPHwJzCY5aPGLkUyE0kbOMxB6r/ZmSFRJ3iX3RP9lOH/3iuF+ncbPHBwz+cC5POA45Xh/OjLQYrCRHKpY1mKNx4OC+JC/QjQj/2xA4fbImb5CiwA5CSSAv1cZ/qJX/GAtx3USBydhQByFExUUhTA9Dx7NEKNLFwvPvcoDhfvtBir5Gt9CLkKxyEsGmXZJL3HE8apRlCWS6LKQ9ZTcohnQneWxQyaz9HL8kUBj1+29GJmjeZj6QmEL+A4rKIjJbLY8ltYryufgwVhhA1R9sLSM+Z29mwysaKs6Jl2tFY9Y5MtgYqGIwiqde96vA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=NYOrA2KRHpiPnR/JCrd06hMr9amAQvYwT1ZqXowWiKI=; b=daGyoDuJWz0l4DWuA2vojuNLol3ux+9tlQvoZ1TsyXD6qL/hf5IpK2hvBL/W0lab9IX9dNooxnHRZEGH4D1zOzqnBs1vDUe/cGYWqChogwmEr2peFBXt9vEm0v2ewCGX53Htm7ggw6IL2WBDLsDXWAvBeaRYLgxt4EBAG9DrgWwf2QDa1rWVjZVUbBxAuF7G4fF7jzK0f+8jMp5EyFjK1TOBguxsfgIzlMmrqedY1CwFcfmLzu0AS4sPVbfJCFRB7Mis+0GbwgYg1wS//ERBbh3G5G3SfO8Tv70WQ9iXPLULNaRmqzzPWWnfR5B6ZVKeYtxTa9zVCcl2/GvwRAugeQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=NYOrA2KRHpiPnR/JCrd06hMr9amAQvYwT1ZqXowWiKI=; b=6NjdhX7Ao/UnleQPjmBDsUL5BpfB+2T50EeBq7XkNY354xwp53IxvpzNOW+ZQSg1Tb29H4OKnZ8ejOBYdSNJSxP4tY0+7pgak1qn/BlcMilpcB2ZYP5jcZHyAdImt1+m2ax4P1/cnuBci4PfmAJ9Magy1CiX8bW5PaYcjJ+iij0= Received: from DBAPR08MB5576.eurprd08.prod.outlook.com (2603:10a6:10:1ae::11) by DB6PR0802MB2183.eurprd08.prod.outlook.com (2603:10a6:4:84::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4867.9; Tue, 11 Jan 2022 09:12:48 +0000 Received: from DBAPR08MB5576.eurprd08.prod.outlook.com ([fe80::fd4a:977c:9338:5139]) by DBAPR08MB5576.eurprd08.prod.outlook.com ([fe80::fd4a:977c:9338:5139%4]) with mapi id 15.20.4867.012; Tue, 11 Jan 2022 09:12:47 +0000 From: Brendan Moran To: Laurence Lundblade CC: Dave Thaler , rats , teep Thread-Topic: [Teep] [Rats] Class ID claim (and other HW identification) Thread-Index: AQHYAOUGouUkDy+rI0mTtLLYj5LA6KxStIYAgAWOBoCABIk3AIAAeykAgABOFQA= Date: Tue, 11 Jan 2022 09:12:47 +0000 Message-ID: References: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> <8466B6E2-C335-4173-A2A2-3CCA555D28CA@arm.com> <62743D24-49F4-4480-9561-F00DA513C9FF@island-resort.com> <17B0A124-1BDF-41A1-8680-B44C2A540941@arm.com> <2440B689-1943-4227-B96F-F9ABD046D252@island-resort.com> In-Reply-To: <2440B689-1943-4227-B96F-F9ABD046D252@island-resort.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-mailer: Apple Mail (2.3654.120.0.1.13) Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; X-MS-Office365-Filtering-Correlation-Id: f9b2cb4a-767d-4247-2ebf-08d9d4e28efb x-ms-traffictypediagnostic: DB6PR0802MB2183:EE_|AM5EUR03FT003:EE_|AM0PR08MB3762:EE_ X-Microsoft-Antispam-PRVS: x-checkrecipientrouted: true nodisclaimer: true x-ms-oob-tlc-oobclassifiers: OLM:5797;OLM:5797; X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; X-Microsoft-Antispam-Message-Info-Original: 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 X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DBAPR08MB5576.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(91956017)(2616005)(45080400002)(86362001)(66946007)(8936002)(316002)(76116006)(508600001)(36756003)(54906003)(4326008)(71200400001)(6916009)(5660300002)(66446008)(64756008)(66556008)(66476007)(122000001)(38100700002)(8676002)(966005)(6512007)(33656002)(166002)(38070700005)(83380400001)(2906002)(186003)(26005)(6506007)(6486002)(53546011)(45980500001); DIR:OUT; SFP:1101; Content-Type: multipart/alternative; boundary="_000_E127B6FBD3264A1EB2337604596A3C3Earmcom_" MIME-Version: 1.0 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB6PR0802MB2183 Original-Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com; X-EOPAttributedMessage: 0 X-MS-Exchange-Transport-CrossTenantHeadersStripped: AM5EUR03FT003.eop-EUR03.prod.protection.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: b6fe3207-30c0-4d97-14ef-08d9d4e28928 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: CZrrpB71IZLZdEVxOCOKvv31jh52fcNPcuGDPM93QO08v3DXA30TouSN3TvU6GfL2LNMMXA4H2pzeZ5AHeDF/+L6v2fJFoCmqKHsA8EPof5VceGZ0R01Zs6B+548gjgB/RteC0pb/BCAsfDiJWOr9YB3w0AUluaUnFaMivdc4kzfpxfqCg7V22wcyEBrqvAI7Sy/g5ZqYjKvzjvP6g/Mt7qqE6l18So06UwT6hhfjGRh4HRJv68RT/OR9XlrFg0AFwYpe7CkBJ+Xk/DffAkJsjDfKAmYNzP+ltPsOiF1ihiEbC7pfFwSyylJd+qNk9jRStxQBJYc2x2HTw19waAcCW7Vadn7NxENxjy89BI82qVq7MPiXq7RqMN8QpJsiN2CQtxutgF3F3xFe7LlFPpDTpa/NeZw+KfyyB8ueMhTTb3jYyJ7I1EQf0PkwiKfR9SMKNO1LCQInKj3cV7JikcXRzmpOij/p7Nit8NBFxx6Khhx+abuWJABKSwBdBcRN9uyK6sW5TfCuF+nPIg7Vew9MAoM3lkq4XoErCeCr/D2MQ4vQkO2BH4GmCu+RCJ6dcniqLEQBas2SrWivf/L0LsoNwUSb3g/F5a6F9mqa44H+HoibQnepAAZC7ErCG4XyOPLe3Jz5GQFonLMtyjHswXTb6fwCTkaMFAKXiiPFgHCMliovlDsZfss7gJ2uNr+tGuKQ+TFMVMA3IFW6+aYZLzCeC5JeGkYKQJ67YAljI1Js4suAHWi3nMBCnyuTH7goNtFS78CHwxmFjIe+8afOHuZPi36AELcYeYfnv89vbKMOV6MtDQxcEM39Aurnaa1lHYGpioWhlKKW+R2k9nzpBppz7GZQsq8CSeQ+h3UyBCBdMI= X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(4636009)(36840700001)(40470700002)(46966006)(166002)(2616005)(6862004)(316002)(336012)(54906003)(186003)(40460700001)(6486002)(8676002)(33964004)(356005)(53546011)(6506007)(5660300002)(81166007)(33656002)(8936002)(70206006)(83380400001)(82310400004)(36756003)(26005)(86362001)(6512007)(70586007)(30864003)(450100002)(966005)(2906002)(47076005)(36860700001)(508600001)(4326008)(45080400002); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 11 Jan 2022 09:12:57.5221 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: f9b2cb4a-767d-4247-2ebf-08d9d4e28efb X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: AM5EUR03FT003.eop-EUR03.prod.protection.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB3762 Archived-At: Subject: Re: [Teep] [Rats] Class ID claim (and other HW identification) X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 11 Jan 2022 09:13:09 -0000 --_000_E127B6FBD3264A1EB2337604596A3C3Earmcom_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 SGkgTGF3cmVuY2UsDQoNCkkgZG9u4oCZdCB0aGluayBJIHdhcyBjbGVhci4gSSB3YXMgc2F5aW5n IHRoYXQgY2xhc3MgSURzIGFyZSBpbXBvcnRhbnQsIGJ1dCB0aGF0IHRoZXJl4oCZcyBubyBuZWVk IHRvIGRpZmZlcmVudGlhdGUgYmV0d2VlbiAvdHlwZXMgb2YgY2xhc3Nlcy8uIFdoZW4gY2xhc3Mg SURzIGFyZSBvcGFxdWUgYmxvYnMsIGEgbG9va3VwIG9mIHNvbWUgc29ydCBpcyBpbXBsaWVkLiBT aW5jZSBhIGxvb2t1cCBpcyBiZWluZyBkb25lLCB0aGUgL3R5cGUgb2YgY2xhc3MvIHNob3VsZCBi ZSBleHRyYWN0ZWQgaW4gdGhlIGxvb2t1cC4gVGhlcmXigJlzIG5vIG5lZWQgdG8gZGlmZmVyZW50 aWF0ZSBiZXR3ZWVuIHR5cGVzIG9mIGNsYXNzZXMgaW4gRUFUIGl0c2VsZiBzaW5jZSBpdOKAmXMg Zm9yIHRyYW5zcG9ydGluZyBpbmZvcm1hdGlvbiB0aGF0IHdpbGwgbGF0ZXIgaGF2ZSBhIGxvb2t1 cCBkb25lLg0KDQpCZXN0IFJlZ2FyZHMsDQpCcmVuZGFuDQoNCk9uIDExIEphbiAyMDIyLCBhdCAw NDozMywgTGF1cmVuY2UgTHVuZGJsYWRlIDxsZ2xAaXNsYW5kLXJlc29ydC5jb208bWFpbHRvOmxn bEBpc2xhbmQtcmVzb3J0LmNvbT4+IHdyb3RlOg0KDQpIZXkgQnJlbmRhbiwNCg0KSSBtYWRlIHRo ZSBIVy1JUCBQUiBhcyBhbiBlZHVjYXRlZCBndWVzcywgZnJvbSB0YWxraW5nIHRvIERhdmUsIGFu ZCBmcm9tIGEgc29tZSB0ZXh0IGluIHNlY3Rpb24gNyBvZiBURUVQIEFyY2hpdGVjdHVyZS4gSSBk b27igJl0IGhhdmUgYW55IGFnZW5kYSBoZXJlIGJ1dCB0byBtYWtlIEVBVCB3b3JrIHdlbGwgZm9y IFNVSVQgYW5kIFRFRVAuDQoNCk9idmlvdXNseSwgSeKAmW0gbWlzc2luZyB0aGUgbWFyaywgc28g SeKAmW0gZ3JhY2lvdXNseSBib3dpbmcgb3V0LiBTbyBubyBjbGFzcyBJRCBpbiB0aGUgRUFUIGRy YWZ0Lg0KDQpMTA0KDQoNClAuUy4gSSBkbyBhcHByZWNpYXRlIHRoZSBkaXNjdXNzaW9uIGFzIGlz IHJlc3VsdGVkIGluIGFkZGluZyB0aGUgSFcgTW9kZWwgSUQgY2xhaW0gdG8gRUFULCBzb21ldGhp bmcgdGhhdCB3YXMgbWlzc2luZy4NCg0KDQpPbiBKYW4gMTAsIDIwMjIsIGF0IDE6MTIgUE0sIEJy ZW5kYW4gTW9yYW4gPEJyZW5kYW4uTW9yYW5AYXJtLmNvbTxtYWlsdG86QnJlbmRhbi5Nb3JhbkBh cm0uY29tPj4gd3JvdGU6DQoNCklNTywgYWRkaW5nIGEgbmV3IGNsYWltIGxpa2UgdGhpcyBpcyBj b3VudGVycHJvZHVjdGl2ZS4gSXQgcHJlc3VwcG9zZXMgdGhhdCB3ZSBjYW4gcHJlZGljdCBhbGwg Y2xhc3NlcyB0aGF0IGEgZGV2aWNlIG1heSBiZWxvbmcgdG8uIFN1cmUsIHdlIGNhbiBtYWtlIGEg cmVnaXN0cnkgb2YgZGlmZmVyZW50IGtpbmRzIG9mIGNsYXNzZXMgdGhhdCBhIGRldmljZSBjYW4g YmVsb25nIHRvLCBidXQgd2h5PyBGcmFua2x5LCB0aGUgbmFpdmUgYXBwcm9hY2ggaXMgYmV0dGVy IHRoYW4gdGhpczogeW91IGhhdmUgYSBkYXRhYmFzZSB0aGF0IG1hcHMgT0VNICsgbW9kZWwgKyBy ZXZpc2lvbiBpbnRvIGFuIGFwcGxpY2F0aW9uLXNwZWNpZmljIHRheG9ub215LiBPZiBjb3Vyc2Us IG5vdyBzb21lb25lIGhhcyB0byBhY3R1YWxseSBtYWludGFpbiB0aGF0IGRhdGFiYXNlLiBIYXZl IGZ1bi4NCg0KV2h5IG5vdCB0YWtlIHRoZSBlYXN5IHJvdXRlPyBJdOKAmXMgZmFyIHNpbXBsZXIg Zm9yIGEgZGV2aWNlIHRvIGJlIHRoZSBpbnRlcnNlY3Rpb24gb2YgQU5ZIHByb3BlcnRpZXMgdGhh dCBtYWtlIGl0IGRpc3RpbmN0LiBUaGUgZW50aXR5IGNvbnN1bWluZyBhbiBFQVQgbmVlZHMgdGhv c2UgYW55d2F5LiBBbmQgYXMgdG8gd2h5IEkgZG9u4oCZdCB3YW50IGEgdGF4b25vbXk/IEJlY2F1 c2UgaXTigJlzIHVubmVjZXNzYXJ5LiBUbyB1c2UgYW55IG9mIHRoZXNlIGlkZW50aWZpZXJzLCB5 b3UgaGF2ZSB0byB1c2UgYSBkYXRhYmFzZSB0byBjb252ZXJ0IHRoZSBpZGVudGlmaWVyIGludG8g d2hhdGV2ZXIgaXQgaXMgdGhhdCB5b3UgYWN0dWFsbHkgY2FyZSBhYm91dC4gVGhhdCBkYXRhYmFz ZSBjYW4ganVzdCBhcyBlYXNpbHkgY29udGFpbiBhbnkgdGF4b25vbXkgeW91IGxpa2UuDQoNCldl 4oCZcmUgdGFsa2luZyBhYm91dCBhZGRpbmcgbW9yZSBjb21wbGV4aXR5IHRvIGEgc3BlY2lmaWNh dGlvbiBpbiBvcmRlciB0byBkaXN0aW5ndWlzaCBiZXR3ZWVuOg0KDQpTRUxFQ1QgKiBGUk9NIGh3 X2lwX2lkZW50aWZpZXJzIFdIRVJFIGlkPSR7SUR9DQpWcw0KU0VMRUNUICogRlJPTSBod19pZGVu dGlmaWVycyBXSEVSRSBpZD0ke0lEfSBBTkQgdGF4b25vbXk94oCcaHdpcCINCg0KV2h5IHdvdWxk IHdlIGNvbXBsaWNhdGUgdGhlIHNwZWMgdG8gYWRkIHRheG9ub21pZXMgaW4gb3JkZXIgdG8gc2lt cGxpZnkgYSBkYXRhYmFzZSBpbiBzdWNoIGEgdHJpdmlhbCB3YXk/DQoNCkluIG15IG9waW5pb24s IHdlIHNob3VsZCBsb29rIGF0IGEgc2luZ2xlIHBoeXNpY2FsIGRldmljZSBhcyB0aGUgaW50ZXJz ZWN0aW9uIG9mIHNldmVyYWwgc2V0czoNCiogdGhlIE9FTeKAmXMgbW9kZWwgaWRlbnRpZmllciAo aW5jbC4gSFcgcmV2aXNpb24pDQoqIHRoZSBTb0MgaWRlbnRpZmllciAoaW5jbC4gU29DIHJldmlz aW9uKQ0KKiB0aGUgcHJvY2Vzc29y4oCZcyB0eXBlL3ZlcnNpb24vcmV2aXNpb24NCiogdGhlIHRy dXN0ZWQgT1PigJlzIHZlcnNpb24vcmV2aXNpb24NCiogdGhlIGJvb3QgbG9hZGVyIChlc3BlY2lh bGx5IGlmIGl04oCZcyBpbiBST00pIHZlcnNpb24vcmV2aXNpb24uDQoNCkFsbCBvZiB0aGVzZSBt YXR0ZXIgKEkgdGhpbmspIHRvIFRFRVAuIFdlIG5lZWQgdG8gcmVwb3J0IHRoZW0gYWxsLiBCdXQg aXMgdGhlIGxpc3QgZXhoYXVzdGl2ZT8gUHJvYmFibHkgbm90LiBXaGlsZSBhIHJlZ2lzdHJ5IGZv ciB0aGUgZGlmZmVyZW50IHRheG9ub21pZXMgbWF5IGJlIHJlbGV2YW50LCBJIGRvdWJ0IGl0IG1h dHRlcnMgaW4gRUFUIGl0c2VsZi4gVGhhdCBvbmx5IG1hdHRlcnMgd2hlbiBsb29raW5nIHVwIGFu IGlkZW50aWZpZXIuDQoNCldoYXQgaXMgdGhlIGNvbmNyZXRlIHZhbHVlIG9mIHNwZWNpZnlpbmcg dGhlIHRheG9ub215IG9mIGFuIG9wYXF1ZSBibG9iIGluIGFuIGludGVyY2hhbmdlIGRvY3VtZW50 Pw0KDQpUaGFua3MsDQpCcmVuZGFuDQoNCg0KDQoNCg0KT24gNyBKYW4gMjAyMiwgYXQgMjM6NTYs IExhdXJlbmNlIEx1bmRibGFkZSA8bGdsQGlzbGFuZC1yZXNvcnQuY29tPG1haWx0bzpsZ2xAaXNs YW5kLXJlc29ydC5jb20+PiB3cm90ZToNCg0KU28gcmF0aGVyIHRoYW4gYSBIVyBDbGFzcywgaG93 IGFib3V0IGEgSFcgSVAgY2xhaW0/IEl0IHdvdWxkIHJldXNlIHRoZSBzYW1lIHRyaXBsZSBmb3Ig aWRlbnRpZnlpbmcgSFcsIE9FTSwgTW9kZWwsIFZlcnNpb24uIEl0IGNvdWxkIG9jY3VyIGFsb25n IHNpZGUgdGhlIEhXIE9FTSwgbW9kZWwgYW5kIHZlcnNpb24uIFRoaXMgc2VlbXMgYmV0dGVyIHRo YW4gbXkgY3VycmVudCBQUiBhbmQgbGluZXMgdXAgYmV0dGVyIHdpdGggQnJlbmRhbuKAmXMgZXhh bXBsZXMgYW5kIHdpdGggdGhlIHJlYWxpdHkgdGhhdCBIVyBJUCBjb21lcyBmcm9tIGEgdmVuZG9y LCBoYXMgbW9kZWxzIGFuZCB2ZXJzaW9ucy4gSeKAmWxsIHdyaXRlIHVwIGEgUFIgZm9yIGl0IGlm IEkgcmVjZWl2ZSBzb21lIHBvc2l0aXZlIGZlZWRiYWNrIGhlcmUuDQoNCg0KVGhlIGRpc3RpbmN0 aW9uIGJldHdlZW4gY2hpcCBhbmQgZGV2aWNlIGlzIGludGVuZGVkIHRvIGJlIGhhbmRsZWQgYnkg c3VibW9kdWxlcyBpbiBFQVQuIFN1Ym1vZHVsZXMgY2FuIGV4cHJlc3MgYXJiaXRyYXJpbHkgY29t cGxleCBhcmNoaXRlY3R1cmVzIGFuZCBkZXZpY2UgY29tcG9zaXRpb25zLg0KDQpJIHRoaW5rIGl0 4oCZcyBjbGVhbmVyIHRvIGtlZXAgdGhlIEhXLWlkZW50aWZ5aW5nIGNsYWltcyBzZXBhcmF0ZSBm cm9tIHRoZSBTVy1pZGVudGlmeSBjbGFpbXMuIFdvdWxkIHJlYWxseSBsaWtlIHRoZSBpZGVudGlm aWNhdGlvbiBvZiB0aGUgVHJ1c3RlZCBPUyBWZW5kb3IgYmUgaGFuZGxlZCBieSBDb1NXSUQgYW5k IGZyaWVuZHMuIFRyeWluZyB0byBtYWtlIHNvbWUgY2xhaW0gc3VpdGFibGUgZm9yIGlkZW50aWZ5 aW5nIGJvdGggU1cgYW5kIEhXIGZvciBhbGwgb2YgYXR0ZXN0YXRpb24gc2VlbXMgb3Zlci1hbWJp dGlvdXMuDQoNCkkgYWxzbyB0aGluayBpdOKAmXMgZmluZSB0byBkZWZpbmUgc29tZSBjbGFpbXMg YmV0dGVyIHN1aXRlZCB0byB0aGUgVEVFIHdvcmxkIGluIFRFRVAgaWYgd2UgY2Fu4oCZdCBmaW5k IGVub3VnaCBjb21tb24gZ3JvdW5kIGJldHdlZW4gVEVFUCBhbmQgdGhlIHZlcnkgYnJvYWRseSBh cHBsaWNhYmxlIHN0dWZmIHRoYXQgZ29lcyBpbnRvIEVBVC4NCg0KTEwNCg0KDQpOb3RlOiBJIGZp bmQgdGhlIHVzZSBvZiB0aGUgd29yZCDigJxjbGFzc+KAnSBoZXJlIGNvbmZ1c2luZy4gSWYgSSB3 ZXJlIHB1dHRpbmcgVFbigJlzIGludG8gY2xhc3NlcyBJ4oCZZCB1c2VzIGNsYXNzZXMgbGlrZSBz bWFydC9kdW1iLCBkaXNwbGF5IHR5cGUgKExDRCwgQ1JULCBPTEVEKSBhbmQgc3VjaCB0aGF0IGlk ZW50aWZ5IGNoYXJhY3RlcmlzdGljcyBvZiBUVnMgaW5kZXBlbmRlbnQgb2YgdmVuZG9yIGFuZCBt b2RlbC4gIlNvbnkgQnJhdmlhIiBpcyBub3QgYSBjbGFzcyBJTU8uIE5vciBpcyDigJxNaWNyb3Nv ZnQgV2luZG93c+KAnSAoYW4gT1MgdGhlIHJ1bnMgb24gbG90cyBvZiBIVyBwbGF0Zm9ybXMpLiBJ 4oCZZCBsaWtlIHRvIG1vdmUgYXdheSBmcm9tIHRoZSB3b3JkLg0KDQoNCg0KT24gSmFuIDQsIDIw MjIsIGF0IDM6MDYgQU0sIEJyZW5kYW4gTW9yYW4gPEJyZW5kYW4uTW9yYW5AYXJtLmNvbTxtYWls dG86QnJlbmRhbi5Nb3JhbkBhcm0uY29tPj4gd3JvdGU6DQoNCkkgdGhpbmsgZGV2aWNlcyB3aWxs IG5lZWQgdG8gcmVwb3J0IG11bHRpcGxlIHZlbmRvci9jbGFzcyBwYWlycy4NCg0KRm9yIGV4YW1w bGUsIEEgbW9iaWxlIGRldmljZSBjb3VsZCBwb3RlbnRpYWxseSBjb250YWluOg0KMS4gQSBNb2Jp bGUgRGV2aWNlIE9FTSBWZW5kb3IgSUQNCjIuIEEgU2lsaWNvbiB2ZW5kb3LigJlzIFZlbmRvciBJ RA0KMy4gQW4gSVAgdmVuZG9y4oCZcyBWZW5kb3IgSUQNCg0KVGhpcyBpcyBub3QgYW4gZXhoYXVz dGl2ZSBsaXN0Lg0KDQpGb3IgQXJtIFRydXN0IFpvbmUgVEVFcywgSSB3b3VsZCBleHBlY3QgdG8g c2VlOg0KMS4gVGhlIEFybSBWZW5kb3IgSUQgKyB0aGUgcHJvY2Vzc29yIGNvcmXigJlzIENsYXNz IElEDQoyLiBUaGUgVHJ1c3RlZCBPUyBWZW5kb3IgSUQgKyB0aGUgVHJ1c3RlZCBPUyBDbGFzcyBJ RA0KMy4gVGhlIFNpbGljb24gdmVuZG9y4oCZcyBWZW5kb3IgSUQgKyB0aGUgcHJvY2Vzc29yIENs YXNzIElEDQo0LiBUaGUgRGV2aWNlIE9FTeKAmXMgVmVuZG9yIElEICsgdGhlIGRldmljZSBDbGFz cyBJRA0KDQpDaGVlcnMsDQpCcmVuZGFuDQoNCk9uIDMgSmFuIDIwMjIsIGF0IDIxOjAwLCBEYXZl IFRoYWxlciA8ZHRoYWxlcj00MG1pY3Jvc29mdC5jb21AZG1hcmMuaWV0Zi5vcmc8bWFpbHRvOmR0 aGFsZXI9NDBtaWNyb3NvZnQuY29tQGRtYXJjLmlldGYub3JnPj4gd3JvdGU6DQoNCkxhdXJlbmNl IEx1bmRibGFkZSB3cm90ZToNCkkgdGFsa2VkIHRvIERhdmUgd2hpY2ggcmVzdWx0ZWQgaW4gcmVv cmllbnRhdGlvbiBvZiBteSB1bmRlcnN0YW5kaW5nIG9mIENsYXNzIElEIGluIFRFRVAuDQoNCkNs YXNzIElEIGJhc2ljYWxseSBpZGVudGlmaWVzIEhXIElQIGZyb20gYSBIVyBkZXNpZ25lciBsaWtl IEFybSBvciBTeW5vcHNpcyB0aGF0IGlzIGludGVncmF0ZWQgaW50byBjaGlwcyBtYWRlIGJ5IHZh cmlvdXMgSFcgT0VNcyBsaWtlIFF1YWxjb21tLCBTYW1zdW5nIGFuZCBBcHBsZS4gVGhlIHRlcm0g dXNlZCBmcmVxdWVudGx5IGZvciB0aGlzIGlzICJJUCIgKEkga25vdyB0aGlzIHdlbGwgZnJvbSBt eSBkYXlzIHdvcmtpbmcgb24gSFcgYXQgUXVhbGNvbW0pLg0KDQpJJ3ZlIGNyZWF0ZWQgYSBQUiBm b3IgSFcgQ2xhc3MuDQoNClNpbmNlIHdoYXQgaXMgaWRlbnRpZmllZCBzcGFucyBPRU1zLCB0aGlz IG11c3QgYmUgYSBnbG9iYWxseSB1bmlxdWUgaWRlbnRpZmllci4gV2UgbmVlZCB0byBiZSBleHBs aWNpdCBhYm91dCB0aGF0Lg0KDQpJIGtub3cgb2YgZm91ciB3YXlzIHRvIGhhdmUgYSBnbG9iYWwg aWRlbnRpZmllcjoNCi0gVXNlIE9JRHMNCi0gVXNlIEROUyAvIFVSSQ0KLSBQcm9iYWJpbGlzdGlj YWxseSB1c2luZyBhIGJpZyBlbm91Z2ggYnl0ZSBzdHJpbmcNCi0gQSBuZXcgcmVnaXN0cnksIHBl cmhhcHMgSUFOQSAoYnV0IHdlIHByb2JhYmx5IGRvbid0IHdhbnQgdGhpcykNCg0KVGhlIFBSIGFs bG93cyBhbGwgYnV0IHRoZSBsYXN0LCBidXQgdGhpcyBjb3VsZCBiZSByZWR1Y2VkIHRvIGp1c3Qg b25lIG9yIHR3byBvZiB0aGUgYWJvdmUuDQoNClBSIGxvb2tzIGdyZWF0IHRvIG1lLCBleGNlcHQg dGhhdCB3b3VsZCBJIGFncmVlIHdpdGggcmVkdWNpbmcgaXQgdG8gb25lIG9yIHR3by4NClNpbmNl IHRoZSBhYmlsaXR5IHRvIHRha2UgYSB2YWx1ZSBhbmQgcmVzb2x2ZSBpdCB0byBzb21ldGhpbmcg bWVhbmluZ2Z1bCBpcyB1c2VmdWwgaW4gbWFueSBjYXNlcyAobG9nZ2luZywgd2lyZXNoYXJrIGFu YWx5c2lzLCBldGMuKSwgSSB3b3VsZCByZW1vdmUgdGhlIHRoaXJkIG9wdGlvbi4NCg0KT0lEcywg ZW5jb2RlZCBhcyBpbnQgYXJyYXlzLCBwcm9iYWJseSBjb21wcmVzcyB0aGUgYmVzdCBzbyBpZiBv bmx5IG9uZSwgdGhlbiBJJ2QgcGljayB0aGF0IG9uZS4gIFVSSXMgYXJlIGNvbnZlbmllbnQgdGhv dWdoIGFsc28gc28gaWYgdHdvLCB0aGVuIHRoYXQncyBteSBzZWNvbmQgcGljay4NCg0KSSBkb24n dCBzZWUgdGhpcyBjbGFpbSBhcyBlc3NlbnRpYWwgZm9yIEVBVCwgYnV0IEkgY29tbWl0dGVkIHRv IHdvcmtpbmcgdGhyb3VnaCB0aGlzIHdpdGggVEVFUC4gSSdtIGZpbmUgd2l0aCB0aGlzIFBSIGdv aW5nIGludG8gYSBURUVQIGRvY3VtZW50IHJhdGhlciB0aGFuIEVBVC4NCg0KVGhlIG5vdGlvbiBv ZiBIVyBjbGFzcyBJRCBpcyBub3Qgc3BlY2lmaWMgdG8gVEVFcywgaGVuY2UgdGhlIHJlcXVlc3Qg dG8gcHV0IGl0IGluIEVBVCByYXRoZXIgdGhhbiBpbiBhbnl0aGluZyB0aGF0IHdvdWxkIGltcGx5 IHVzZSBpcyBsaW1pdGVkIHRvIFRFRXMgKGhlbmNlIG5vdCBpbiBhIFRFRVAgZG9jdW1lbnQpLg0K DQotRGF2ZQ0KDQpfX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f Xw0KVEVFUCBtYWlsaW5nIGxpc3QNClRFRVBAaWV0Zi5vcmc8bWFpbHRvOlRFRVBAaWV0Zi5vcmc+ DQpodHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL3RlZXANCg0KSU1QT1JUQU5U IE5PVElDRTogVGhlIGNvbnRlbnRzIG9mIHRoaXMgZW1haWwgYW5kIGFueSBhdHRhY2htZW50cyBh cmUgY29uZmlkZW50aWFsIGFuZCBtYXkgYWxzbyBiZSBwcml2aWxlZ2VkLiBJZiB5b3UgYXJlIG5v dCB0aGUgaW50ZW5kZWQgcmVjaXBpZW50LCBwbGVhc2Ugbm90aWZ5IHRoZSBzZW5kZXIgaW1tZWRp YXRlbHkgYW5kIGRvIG5vdCBkaXNjbG9zZSB0aGUgY29udGVudHMgdG8gYW55IG90aGVyIHBlcnNv biwgdXNlIGl0IGZvciBhbnkgcHVycG9zZSwgb3Igc3RvcmUgb3IgY29weSB0aGUgaW5mb3JtYXRp b24gaW4gYW55IG1lZGl1bS4gVGhhbmsgeW91Lg0KDQoNCklNUE9SVEFOVCBOT1RJQ0U6IFRoZSBj b250ZW50cyBvZiB0aGlzIGVtYWlsIGFuZCBhbnkgYXR0YWNobWVudHMgYXJlIGNvbmZpZGVudGlh bCBhbmQgbWF5IGFsc28gYmUgcHJpdmlsZWdlZC4gSWYgeW91IGFyZSBub3QgdGhlIGludGVuZGVk IHJlY2lwaWVudCwgcGxlYXNlIG5vdGlmeSB0aGUgc2VuZGVyIGltbWVkaWF0ZWx5IGFuZCBkbyBu b3QgZGlzY2xvc2UgdGhlIGNvbnRlbnRzIHRvIGFueSBvdGhlciBwZXJzb24sIHVzZSBpdCBmb3Ig YW55IHB1cnBvc2UsIG9yIHN0b3JlIG9yIGNvcHkgdGhlIGluZm9ybWF0aW9uIGluIGFueSBtZWRp dW0uIFRoYW5rIHlvdS4NCg0KDQpJTVBPUlRBTlQgTk9USUNFOiBUaGUgY29udGVudHMgb2YgdGhp cyBlbWFpbCBhbmQgYW55IGF0dGFjaG1lbnRzIGFyZSBjb25maWRlbnRpYWwgYW5kIG1heSBhbHNv IGJlIHByaXZpbGVnZWQuIElmIHlvdSBhcmUgbm90IHRoZSBpbnRlbmRlZCByZWNpcGllbnQsIHBs ZWFzZSBub3RpZnkgdGhlIHNlbmRlciBpbW1lZGlhdGVseSBhbmQgZG8gbm90IGRpc2Nsb3NlIHRo ZSBjb250ZW50cyB0byBhbnkgb3RoZXIgcGVyc29uLCB1c2UgaXQgZm9yIGFueSBwdXJwb3NlLCBv ciBzdG9yZSBvciBjb3B5IHRoZSBpbmZvcm1hdGlvbiBpbiBhbnkgbWVkaXVtLiBUaGFuayB5b3Uu DQo= --_000_E127B6FBD3264A1EB2337604596A3C3Earmcom_ Content-Type: text/html; charset="utf-8" Content-ID: <67C51CA0CB9CFF4FB3A56404B4BEE751@eurprd08.prod.outlook.com> Content-Transfer-Encoding: base64 PGh0bWw+DQo8aGVhZD4NCjxtZXRhIGh0dHAtZXF1aXY9IkNvbnRlbnQtVHlwZSIgY29udGVudD0i dGV4dC9odG1sOyBjaGFyc2V0PXV0Zi04Ij4NCjwvaGVhZD4NCjxib2R5IHN0eWxlPSJ3b3JkLXdy YXA6IGJyZWFrLXdvcmQ7IC13ZWJraXQtbmJzcC1tb2RlOiBzcGFjZTsgbGluZS1icmVhazogYWZ0 ZXItd2hpdGUtc3BhY2U7IiBjbGFzcz0iIj4NCkhpIExhd3JlbmNlLA0KPGRpdiBjbGFzcz0iIj48 YnIgY2xhc3M9IiI+DQo8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+SSBkb27igJl0IHRoaW5rIEkgd2Fz IGNsZWFyLiBJIHdhcyBzYXlpbmcgdGhhdCBjbGFzcyBJRHMgYXJlIGltcG9ydGFudCwgYnV0IHRo YXQgdGhlcmXigJlzIG5vIG5lZWQgdG8gZGlmZmVyZW50aWF0ZSBiZXR3ZWVuIC90eXBlcyBvZiBj bGFzc2VzLy4gV2hlbiBjbGFzcyBJRHMgYXJlIG9wYXF1ZSBibG9icywgYSBsb29rdXAgb2Ygc29t ZSBzb3J0IGlzIGltcGxpZWQuIFNpbmNlIGEgbG9va3VwIGlzIGJlaW5nIGRvbmUsIHRoZSAvdHlw ZQ0KIG9mIGNsYXNzLyBzaG91bGQgYmUgZXh0cmFjdGVkIGluIHRoZSBsb29rdXAuIFRoZXJl4oCZ cyBubyBuZWVkIHRvIGRpZmZlcmVudGlhdGUgYmV0d2VlbiB0eXBlcyBvZiBjbGFzc2VzIGluIEVB VCBpdHNlbGYgc2luY2UgaXTigJlzIGZvciB0cmFuc3BvcnRpbmcgaW5mb3JtYXRpb24gdGhhdCB3 aWxsIGxhdGVyIGhhdmUgYSBsb29rdXAgZG9uZS48L2Rpdj4NCjxkaXYgY2xhc3M9IiI+PGJyIGNs YXNzPSIiPg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPkJlc3QgUmVnYXJkcyw8L2Rpdj4NCjxkaXYg Y2xhc3M9IiI+QnJlbmRhbjxiciBjbGFzcz0iIj4NCjxkaXY+PGJyIGNsYXNzPSIiPg0KPGJsb2Nr cXVvdGUgdHlwZT0iY2l0ZSIgY2xhc3M9IiI+DQo8ZGl2IGNsYXNzPSIiPk9uIDExIEphbiAyMDIy LCBhdCAwNDozMywgTGF1cmVuY2UgTHVuZGJsYWRlICZsdDs8YSBocmVmPSJtYWlsdG86bGdsQGlz bGFuZC1yZXNvcnQuY29tIiBjbGFzcz0iIj5sZ2xAaXNsYW5kLXJlc29ydC5jb208L2E+Jmd0OyB3 cm90ZTo8L2Rpdj4NCjxiciBjbGFzcz0iQXBwbGUtaW50ZXJjaGFuZ2UtbmV3bGluZSI+DQo8ZGl2 IGNsYXNzPSIiPg0KPGRpdiBzdHlsZT0id29yZC13cmFwOiBicmVhay13b3JkOyAtd2Via2l0LW5i c3AtbW9kZTogc3BhY2U7IGxpbmUtYnJlYWs6IGFmdGVyLXdoaXRlLXNwYWNlOyIgY2xhc3M9IiI+ DQpIZXkgQnJlbmRhbiwNCjxkaXYgY2xhc3M9IiI+PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8ZGl2 IGNsYXNzPSIiPkkgbWFkZSB0aGUgSFctSVAgUFIgYXMgYW4gZWR1Y2F0ZWQgZ3Vlc3MsIGZyb20g dGFsa2luZyB0byBEYXZlLCBhbmQgZnJvbSBhIHNvbWUgdGV4dCBpbiBzZWN0aW9uIDcgb2YgVEVF UCBBcmNoaXRlY3R1cmUuIEkgZG9u4oCZdCBoYXZlIGFueSBhZ2VuZGEgaGVyZSBidXQgdG8gbWFr ZSBFQVQgd29yayB3ZWxsIGZvciBTVUlUIGFuZCBURUVQLjwvZGl2Pg0KPGRpdiBjbGFzcz0iIj48 YnIgY2xhc3M9IiI+DQo8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+T2J2aW91c2x5LCBJ4oCZbSBtaXNz aW5nIHRoZSBtYXJrLCBzbyBJ4oCZbSBncmFjaW91c2x5IGJvd2luZyBvdXQuIFNvIG5vIGNsYXNz IElEIGluIHRoZSBFQVQgZHJhZnQuPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4N CjwvZGl2Pg0KPGRpdiBjbGFzcz0iIj5MTDwvZGl2Pg0KPGRpdiBjbGFzcz0iIj48YnIgY2xhc3M9 IiI+DQo8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8ZGl2IGNs YXNzPSIiPlAuUy4gSSBkbyBhcHByZWNpYXRlIHRoZSBkaXNjdXNzaW9uIGFzIGlzIHJlc3VsdGVk IGluIGFkZGluZyB0aGUgSFcgTW9kZWwgSUQgY2xhaW0gdG8gRUFULCBzb21ldGhpbmcgdGhhdCB3 YXMgbWlzc2luZy48L2Rpdj4NCjxkaXYgY2xhc3M9IiI+PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8 ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjwvZGl2Pg0KPGRpdiBjbGFzcz0iIj4NCjxkaXYg Y2xhc3M9IiI+DQo8YmxvY2txdW90ZSB0eXBlPSJjaXRlIiBjbGFzcz0iIj4NCjxkaXYgY2xhc3M9 IiI+T24gSmFuIDEwLCAyMDIyLCBhdCAxOjEyIFBNLCBCcmVuZGFuIE1vcmFuICZsdDs8YSBocmVm PSJtYWlsdG86QnJlbmRhbi5Nb3JhbkBhcm0uY29tIiBjbGFzcz0iIj5CcmVuZGFuLk1vcmFuQGFy bS5jb208L2E+Jmd0OyB3cm90ZTo8L2Rpdj4NCjxiciBjbGFzcz0iQXBwbGUtaW50ZXJjaGFuZ2Ut bmV3bGluZSI+DQo8ZGl2IGNsYXNzPSIiPg0KPGRpdiBzdHlsZT0id29yZC13cmFwOiBicmVhay13 b3JkOyAtd2Via2l0LW5ic3AtbW9kZTogc3BhY2U7IGxpbmUtYnJlYWs6IGFmdGVyLXdoaXRlLXNw YWNlOyIgY2xhc3M9IiI+DQpJTU8sIGFkZGluZyBhIG5ldyBjbGFpbSBsaWtlIHRoaXMgaXMgY291 bnRlcnByb2R1Y3RpdmUuIEl0IHByZXN1cHBvc2VzIHRoYXQgd2UgY2FuIHByZWRpY3QgYWxsIGNs YXNzZXMgdGhhdCBhIGRldmljZSBtYXkgYmVsb25nIHRvLiBTdXJlLCB3ZSBjYW4gbWFrZSBhIHJl Z2lzdHJ5IG9mIGRpZmZlcmVudCBraW5kcyBvZiBjbGFzc2VzIHRoYXQgYSBkZXZpY2UgY2FuIGJl bG9uZyB0bywgYnV0IHdoeT8gRnJhbmtseSwgdGhlIG5haXZlIGFwcHJvYWNoDQogaXMgYmV0dGVy IHRoYW4gdGhpczogeW91IGhhdmUgYSBkYXRhYmFzZSB0aGF0IG1hcHMgT0VNICsgbW9kZWwgKyBy ZXZpc2lvbiBpbnRvIGFuIGFwcGxpY2F0aW9uLXNwZWNpZmljIHRheG9ub215LiBPZiBjb3Vyc2Us IG5vdyBzb21lb25lIGhhcyB0byBhY3R1YWxseSBtYWludGFpbiB0aGF0IGRhdGFiYXNlLiBIYXZl IGZ1bi4NCjxkaXYgY2xhc3M9IiI+PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSIi PldoeSBub3QgdGFrZSB0aGUgZWFzeSByb3V0ZT8gSXTigJlzIGZhciBzaW1wbGVyIGZvciBhIGRl dmljZSB0byBiZSB0aGUgaW50ZXJzZWN0aW9uIG9mIEFOWSBwcm9wZXJ0aWVzIHRoYXQgbWFrZSBp dCBkaXN0aW5jdC4gVGhlIGVudGl0eSBjb25zdW1pbmcgYW4gRUFUIG5lZWRzIHRob3NlIGFueXdh eS4gQW5kIGFzIHRvIHdoeSBJIGRvbuKAmXQgd2FudCBhIHRheG9ub215PyBCZWNhdXNlIGl04oCZ cyB1bm5lY2Vzc2FyeS4gVG8gdXNlDQogYW55IG9mIHRoZXNlIGlkZW50aWZpZXJzLCB5b3UgaGF2 ZSB0byB1c2UgYSBkYXRhYmFzZSB0byBjb252ZXJ0IHRoZSBpZGVudGlmaWVyIGludG8gd2hhdGV2 ZXIgaXQgaXMgdGhhdCB5b3UgYWN0dWFsbHkgY2FyZSBhYm91dC4gVGhhdCBkYXRhYmFzZSBjYW4g anVzdCBhcyBlYXNpbHkgY29udGFpbiBhbnkgdGF4b25vbXkgeW91IGxpa2UuPC9kaXY+DQo8ZGl2 IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjwvZGl2Pg0KPGRpdiBjbGFzcz0iIj5XZeKAmXJlIHRh bGtpbmcgYWJvdXQgYWRkaW5nIG1vcmUgY29tcGxleGl0eSB0byBhIHNwZWNpZmljYXRpb24gaW4g b3JkZXIgdG8gZGlzdGluZ3Vpc2ggYmV0d2Vlbjo8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+PGJyIGNs YXNzPSIiPg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPlNFTEVDVCAqIEZST00gaHdfaXBfaWRlbnRp ZmllcnMgV0hFUkUgaWQ9JHtJRH08L2Rpdj4NCjxkaXYgY2xhc3M9IiI+VnM8L2Rpdj4NCjxkaXYg Y2xhc3M9IiI+U0VMRUNUICogRlJPTSBod19pZGVudGlmaWVycyBXSEVSRSBpZD0ke0lEfSBBTkQg dGF4b25vbXk94oCcaHdpcCZxdW90OzxiciBjbGFzcz0iIj4NCjxkaXYgY2xhc3M9IiI+PGJyIGNs YXNzPSIiPg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPldoeSB3b3VsZCB3ZSBjb21wbGljYXRlIHRo ZSBzcGVjIHRvIGFkZCB0YXhvbm9taWVzIGluIG9yZGVyIHRvIHNpbXBsaWZ5IGEgZGF0YWJhc2Ug aW4gc3VjaCBhIHRyaXZpYWwgd2F5PzwvZGl2Pg0KPGRpdiBjbGFzcz0iIj48YnIgY2xhc3M9IiI+ DQo8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+SW4gbXkgb3Bpbmlvbiwgd2Ugc2hvdWxkIGxvb2sgYXQg YSBzaW5nbGUgcGh5c2ljYWwgZGV2aWNlIGFzIHRoZSBpbnRlcnNlY3Rpb24gb2Ygc2V2ZXJhbCBz ZXRzOiZuYnNwOzwvZGl2Pg0KPGRpdiBjbGFzcz0iIj4qIHRoZSBPRU3igJlzIG1vZGVsIGlkZW50 aWZpZXIgKGluY2wuIEhXIHJldmlzaW9uKTwvZGl2Pg0KPGRpdiBjbGFzcz0iIj4qIHRoZSBTb0Mg aWRlbnRpZmllciAoaW5jbC4gU29DIHJldmlzaW9uKTwvZGl2Pg0KPGRpdiBjbGFzcz0iIj4qIHRo ZSBwcm9jZXNzb3LigJlzIHR5cGUvdmVyc2lvbi9yZXZpc2lvbjwvZGl2Pg0KPGRpdiBjbGFzcz0i Ij4qIHRoZSB0cnVzdGVkIE9T4oCZcyB2ZXJzaW9uL3JldmlzaW9uPC9kaXY+DQo8ZGl2IGNsYXNz PSIiPiogdGhlIGJvb3QgbG9hZGVyIChlc3BlY2lhbGx5IGlmIGl04oCZcyBpbiBST00pIHZlcnNp b24vcmV2aXNpb24uPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjwvZGl2Pg0K PGRpdiBjbGFzcz0iIj5BbGwgb2YgdGhlc2UgbWF0dGVyIChJIHRoaW5rKSB0byBURUVQLiBXZSBu ZWVkIHRvIHJlcG9ydCB0aGVtIGFsbC4gQnV0IGlzIHRoZSBsaXN0IGV4aGF1c3RpdmU/IFByb2Jh Ymx5IG5vdC4gV2hpbGUgYSByZWdpc3RyeSBmb3IgdGhlIGRpZmZlcmVudCB0YXhvbm9taWVzIG1h eSBiZSByZWxldmFudCwgSSBkb3VidCBpdCBtYXR0ZXJzIGluIEVBVCBpdHNlbGYuIFRoYXQgb25s eSBtYXR0ZXJzIHdoZW4gbG9va2luZyB1cCBhbg0KIGlkZW50aWZpZXIuPC9kaXY+DQo8ZGl2IGNs YXNzPSIiPjxiciBjbGFzcz0iIj4NCjwvZGl2Pg0KPGRpdiBjbGFzcz0iIj5XaGF0IGlzIHRoZSBj b25jcmV0ZSB2YWx1ZSBvZiBzcGVjaWZ5aW5nIHRoZSB0YXhvbm9teSBvZiBhbiBvcGFxdWUgYmxv YiBpbiBhbiBpbnRlcmNoYW5nZSBkb2N1bWVudD88L2Rpdj4NCjxkaXYgY2xhc3M9IiI+PGJyIGNs YXNzPSIiPg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPlRoYW5rcyw8L2Rpdj4NCjxkaXYgY2xhc3M9 IiI+QnJlbmRhbjwvZGl2Pg0KPGRpdiBjbGFzcz0iIj48YnIgY2xhc3M9IiI+DQo8L2Rpdj4NCjxk aXYgY2xhc3M9IiI+PGJyIGNsYXNzPSIiPg0KPGRpdiBjbGFzcz0iIj48YnIgY2xhc3M9IiI+DQo8 L2Rpdj4NCjxkaXYgY2xhc3M9IiI+PGJyIGNsYXNzPSIiPg0KPGRpdiBjbGFzcz0iIj48YnIgY2xh c3M9IiI+DQo8YmxvY2txdW90ZSB0eXBlPSJjaXRlIiBjbGFzcz0iIj4NCjxkaXYgY2xhc3M9IiI+ T24gNyBKYW4gMjAyMiwgYXQgMjM6NTYsIExhdXJlbmNlIEx1bmRibGFkZSAmbHQ7PGEgaHJlZj0i bWFpbHRvOmxnbEBpc2xhbmQtcmVzb3J0LmNvbSIgY2xhc3M9IiI+bGdsQGlzbGFuZC1yZXNvcnQu Y29tPC9hPiZndDsgd3JvdGU6PC9kaXY+DQo8YnIgY2xhc3M9IkFwcGxlLWludGVyY2hhbmdlLW5l d2xpbmUiPg0KPGRpdiBjbGFzcz0iIj4NCjxkaXYgc3R5bGU9IndvcmQtd3JhcDogYnJlYWstd29y ZDsgLXdlYmtpdC1uYnNwLW1vZGU6IHNwYWNlOyBsaW5lLWJyZWFrOiBhZnRlci13aGl0ZS1zcGFj ZTsiIGNsYXNzPSIiPg0KU28gcmF0aGVyIHRoYW4gYSBIVyBDbGFzcywgaG93IGFib3V0IGEgSFcg SVAgY2xhaW0/IEl0IHdvdWxkIHJldXNlIHRoZSBzYW1lIHRyaXBsZSBmb3IgaWRlbnRpZnlpbmcg SFcsIE9FTSwgTW9kZWwsIFZlcnNpb24uIEl0IGNvdWxkIG9jY3VyIGFsb25nIHNpZGUgdGhlIEhX IE9FTSwgbW9kZWwgYW5kIHZlcnNpb24uIFRoaXMgc2VlbXMgYmV0dGVyIHRoYW4gbXkgY3VycmVu dCBQUiBhbmQgbGluZXMgdXAgYmV0dGVyIHdpdGggQnJlbmRhbuKAmXMgZXhhbXBsZXMNCiBhbmQg d2l0aCB0aGUgcmVhbGl0eSB0aGF0IEhXIElQIGNvbWVzIGZyb20gYSB2ZW5kb3IsIGhhcyBtb2Rl bHMgYW5kIHZlcnNpb25zLiBJ4oCZbGwgd3JpdGUgdXAgYSBQUiBmb3IgaXQgaWYgSSByZWNlaXZl IHNvbWUgcG9zaXRpdmUgZmVlZGJhY2sgaGVyZS4NCjxkaXYgY2xhc3M9IiI+PGJyIGNsYXNzPSIi Pg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjwvZGl2Pg0KPGRpdiBjbGFz cz0iIj5UaGUgZGlzdGluY3Rpb24gYmV0d2VlbiBjaGlwIGFuZCBkZXZpY2UgaXMgaW50ZW5kZWQg dG8gYmUgaGFuZGxlZCBieSBzdWJtb2R1bGVzIGluIEVBVC4gU3VibW9kdWxlcyBjYW4gZXhwcmVz cyBhcmJpdHJhcmlseSBjb21wbGV4IGFyY2hpdGVjdHVyZXMgYW5kIGRldmljZSBjb21wb3NpdGlv bnMuPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjwvZGl2Pg0KPGRpdiBjbGFz cz0iIj5JIHRoaW5rIGl04oCZcyBjbGVhbmVyIHRvIGtlZXAgdGhlIEhXLWlkZW50aWZ5aW5nIGNs YWltcyBzZXBhcmF0ZSBmcm9tIHRoZSBTVy1pZGVudGlmeSBjbGFpbXMuIFdvdWxkIHJlYWxseSBs aWtlIHRoZSBpZGVudGlmaWNhdGlvbiBvZiB0aGUgVHJ1c3RlZCBPUyBWZW5kb3IgYmUgaGFuZGxl ZCBieSBDb1NXSUQgYW5kIGZyaWVuZHMuIFRyeWluZyB0byBtYWtlIHNvbWUgY2xhaW0gc3VpdGFi bGUgZm9yIGlkZW50aWZ5aW5nIGJvdGgNCiBTVyBhbmQgSFcgZm9yIGFsbCBvZiBhdHRlc3RhdGlv biBzZWVtcyBvdmVyLWFtYml0aW91cy48L2Rpdj4NCjxkaXYgY2xhc3M9IiI+PGJyIGNsYXNzPSIi Pg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPkkgYWxzbyB0aGluayBpdOKAmXMgZmluZSB0byBkZWZp bmUgc29tZSBjbGFpbXMgYmV0dGVyIHN1aXRlZCB0byB0aGUgVEVFIHdvcmxkIGluIFRFRVAgaWYg d2UgY2Fu4oCZdCBmaW5kIGVub3VnaCBjb21tb24gZ3JvdW5kIGJldHdlZW4gVEVFUCBhbmQgdGhl IHZlcnkgYnJvYWRseSBhcHBsaWNhYmxlIHN0dWZmIHRoYXQgZ29lcyBpbnRvIEVBVC48L2Rpdj4N CjxkaXYgY2xhc3M9IiI+PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPkxMPC9k aXY+DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjwvZGl2Pg0KPGRpdiBjbGFzcz0iIj48 YnIgY2xhc3M9IiI+DQo8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+Tm90ZTogSSBmaW5kIHRoZSB1c2Ug b2YgdGhlIHdvcmQg4oCcY2xhc3PigJ0gaGVyZSBjb25mdXNpbmcuIElmIEkgd2VyZSBwdXR0aW5n IFRW4oCZcyBpbnRvIGNsYXNzZXMgSeKAmWQgdXNlcyBjbGFzc2VzIGxpa2Ugc21hcnQvZHVtYiwg ZGlzcGxheSB0eXBlIChMQ0QsIENSVCwgT0xFRCkgYW5kIHN1Y2ggdGhhdCBpZGVudGlmeSBjaGFy YWN0ZXJpc3RpY3Mgb2YgVFZzIGluZGVwZW5kZW50IG9mIHZlbmRvciBhbmQgbW9kZWwuICZxdW90 O1NvbnkgQnJhdmlhJnF1b3Q7DQogaXMgbm90IGEgY2xhc3MgSU1PLiBOb3IgaXMg4oCcTWljcm9z b2Z0IFdpbmRvd3PigJ0gKGFuIE9TIHRoZSBydW5zIG9uIGxvdHMgb2YgSFcgcGxhdGZvcm1zKS4g SeKAmWQgbGlrZSB0byBtb3ZlIGF3YXkgZnJvbSB0aGUgd29yZC48L2Rpdj4NCjxkaXYgY2xhc3M9 IiI+PGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjxiciBjbGFzcz0iIj4NCjxk aXYgY2xhc3M9IiI+PGJyIGNsYXNzPSIiPg0KPGJsb2NrcXVvdGUgdHlwZT0iY2l0ZSIgY2xhc3M9 IiI+DQo8ZGl2IGNsYXNzPSIiPk9uIEphbiA0LCAyMDIyLCBhdCAzOjA2IEFNLCBCcmVuZGFuIE1v cmFuICZsdDs8YSBocmVmPSJtYWlsdG86QnJlbmRhbi5Nb3JhbkBhcm0uY29tIiBjbGFzcz0iIj5C cmVuZGFuLk1vcmFuQGFybS5jb208L2E+Jmd0OyB3cm90ZTo8L2Rpdj4NCjxiciBjbGFzcz0iQXBw bGUtaW50ZXJjaGFuZ2UtbmV3bGluZSI+DQo8ZGl2IGNsYXNzPSIiPg0KPGRpdiBzdHlsZT0id29y ZC13cmFwOiBicmVhay13b3JkOyAtd2Via2l0LW5ic3AtbW9kZTogc3BhY2U7IGxpbmUtYnJlYWs6 IGFmdGVyLXdoaXRlLXNwYWNlOyIgY2xhc3M9IiI+DQpJIHRoaW5rIGRldmljZXMgd2lsbCBuZWVk IHRvIHJlcG9ydCBtdWx0aXBsZSB2ZW5kb3IvY2xhc3MgcGFpcnMuDQo8ZGl2IGNsYXNzPSIiPjxi ciBjbGFzcz0iIj4NCjwvZGl2Pg0KPGRpdiBjbGFzcz0iIj5Gb3IgZXhhbXBsZSwgQSBtb2JpbGUg ZGV2aWNlIGNvdWxkIHBvdGVudGlhbGx5IGNvbnRhaW46DQo8ZGl2IGNsYXNzPSIiPjEuIEEgTW9i aWxlIERldmljZSBPRU0gVmVuZG9yIElEPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjIuIEEgU2lsaWNv biB2ZW5kb3LigJlzIFZlbmRvciBJRDwvZGl2Pg0KPGRpdiBjbGFzcz0iIj4zLiBBbiBJUCB2ZW5k b3LigJlzIFZlbmRvciBJRDwvZGl2Pg0KPGRpdiBjbGFzcz0iIj48YnIgY2xhc3M9IiI+DQo8L2Rp dj4NCjxkaXYgY2xhc3M9IiI+VGhpcyBpcyBub3QgYW4gZXhoYXVzdGl2ZSBsaXN0LjwvZGl2Pg0K PGRpdiBjbGFzcz0iIj48YnIgY2xhc3M9IiI+DQo8L2Rpdj4NCjxkaXYgY2xhc3M9IiI+Rm9yIEFy bSBUcnVzdCBab25lIFRFRXMsIEkgd291bGQgZXhwZWN0IHRvIHNlZTo8L2Rpdj4NCjxkaXYgY2xh c3M9IiI+MS4gVGhlIEFybSBWZW5kb3IgSUQgKyB0aGUgcHJvY2Vzc29yIGNvcmXigJlzIENsYXNz IElEPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjIuIFRoZSBUcnVzdGVkIE9TIFZlbmRvciBJRCArIHRo ZSBUcnVzdGVkIE9TIENsYXNzIElEPC9kaXY+DQo8ZGl2IGNsYXNzPSIiPjMuIFRoZSBTaWxpY29u IHZlbmRvcuKAmXMgVmVuZG9yIElEICsgdGhlIHByb2Nlc3NvciBDbGFzcyBJRDwvZGl2Pg0KPGRp diBjbGFzcz0iIj40LiBUaGUgRGV2aWNlIE9FTeKAmXMgVmVuZG9yIElEICsgdGhlIGRldmljZSBD bGFzcyBJRDwvZGl2Pg0KPGRpdiBjbGFzcz0iIj48YnIgY2xhc3M9IiI+DQo8L2Rpdj4NCjxkaXYg Y2xhc3M9IiI+Q2hlZXJzLDwvZGl2Pg0KPGRpdiBjbGFzcz0iIj5CcmVuZGFuPC9kaXY+DQo8ZGl2 IGNsYXNzPSIiPg0KPGRpdiBjbGFzcz0iIj48YnIgY2xhc3M9IiI+DQo8YmxvY2txdW90ZSB0eXBl PSJjaXRlIiBjbGFzcz0iIj4NCjxkaXYgY2xhc3M9IiI+T24gMyBKYW4gMjAyMiwgYXQgMjE6MDAs IERhdmUgVGhhbGVyICZsdDs8YSBocmVmPSJtYWlsdG86ZHRoYWxlcj00MG1pY3Jvc29mdC5jb21A ZG1hcmMuaWV0Zi5vcmciIGNsYXNzPSIiPmR0aGFsZXI9NDBtaWNyb3NvZnQuY29tQGRtYXJjLmll dGYub3JnPC9hPiZndDsgd3JvdGU6PC9kaXY+DQo8YnIgY2xhc3M9IkFwcGxlLWludGVyY2hhbmdl LW5ld2xpbmUiPg0KPGRpdiBjbGFzcz0iIj48c3BhbiBzdHlsZT0iY2FyZXQtY29sb3I6IHJnYigw LCAwLCAwKTsgZm9udC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAxMnB4OyBmb250LXN0 eWxlOiBub3JtYWw7IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQtd2VpZ2h0OiBub3Jt YWw7IGxldHRlci1zcGFjaW5nOiBub3JtYWw7IHRleHQtYWxpZ246IHN0YXJ0OyB0ZXh0LWluZGVu dDogMHB4OyB0ZXh0LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUtc3BhY2U6IG5vcm1hbDsgd29yZC1z cGFjaW5nOiAwcHg7IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsgdGV4dC1kZWNvcmF0 aW9uOiBub25lOyBmbG9hdDogbm9uZTsgZGlzcGxheTogaW5saW5lICFpbXBvcnRhbnQ7IiBjbGFz cz0iIj5MYXVyZW5jZQ0KIEx1bmRibGFkZSB3cm90ZTo8L3NwYW4+PGJyIHN0eWxlPSJjYXJldC1j b2xvcjogcmdiKDAsIDAsIDApOyBmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEy cHg7IGZvbnQtc3R5bGU6IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13 ZWlnaHQ6IG5vcm1hbDsgbGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7 IHRleHQtaW5kZW50OiAwcHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9y bWFsOyB3b3JkLXNwYWNpbmc6IDBweDsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0 ZXh0LWRlY29yYXRpb246IG5vbmU7IiBjbGFzcz0iIj4NCjxibG9ja3F1b3RlIHR5cGU9ImNpdGUi IHN0eWxlPSJmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZvbnQtc3R5 bGU6IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6IG5vcm1h bDsgbGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgb3JwaGFuczogYXV0bzsgdGV4dC1hbGlnbjogc3Rh cnQ7IHRleHQtaW5kZW50OiAwcHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTog bm9ybWFsOyB3aWRvd3M6IGF1dG87IHdvcmQtc3BhY2luZzogMHB4OyAtd2Via2l0LXRleHQtc2l6 ZS1hZGp1c3Q6IGF1dG87IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsgdGV4dC1kZWNv cmF0aW9uOiBub25lOyIgY2xhc3M9IiI+DQpJIHRhbGtlZCB0byBEYXZlIHdoaWNoIHJlc3VsdGVk IGluIHJlb3JpZW50YXRpb24gb2YgbXkgdW5kZXJzdGFuZGluZyBvZiBDbGFzcyBJRCBpbiBURUVQ LjxiciBjbGFzcz0iIj4NCjxiciBjbGFzcz0iIj4NCkNsYXNzIElEIGJhc2ljYWxseSBpZGVudGlm aWVzIEhXIElQIGZyb20gYSBIVyBkZXNpZ25lciBsaWtlIEFybSBvciBTeW5vcHNpcyB0aGF0IGlz IGludGVncmF0ZWQgaW50byBjaGlwcyBtYWRlIGJ5IHZhcmlvdXMgSFcgT0VNcyBsaWtlIFF1YWxj b21tLCBTYW1zdW5nIGFuZCBBcHBsZS4gVGhlIHRlcm0gdXNlZCBmcmVxdWVudGx5IGZvciB0aGlz IGlzICZxdW90O0lQJnF1b3Q7IChJIGtub3cgdGhpcyB3ZWxsIGZyb20gbXkgZGF5cyB3b3JraW5n IG9uIEhXIGF0IFF1YWxjb21tKS48YnIgY2xhc3M9IiI+DQo8YnIgY2xhc3M9IiI+DQpJJ3ZlIGNy ZWF0ZWQgYSBQUiBmb3IgSFcgQ2xhc3MuPGJyIGNsYXNzPSIiPg0KPGJyIGNsYXNzPSIiPg0KPHNw YW4gY2xhc3M9IkFwcGxlLXRhYi1zcGFuIiBzdHlsZT0id2hpdGUtc3BhY2U6IHByZTsiPjwvc3Bh bj5TaW5jZSB3aGF0IGlzIGlkZW50aWZpZWQgc3BhbnMgT0VNcywgdGhpcyBtdXN0IGJlIGEgZ2xv YmFsbHkgdW5pcXVlIGlkZW50aWZpZXIuIFdlIG5lZWQgdG8gYmUgZXhwbGljaXQgYWJvdXQgdGhh dC48c3BhbiBjbGFzcz0iQXBwbGUtY29udmVydGVkLXNwYWNlIj4mbmJzcDs8L3NwYW4+PGJyIGNs YXNzPSIiPg0KPHNwYW4gY2xhc3M9IkFwcGxlLXRhYi1zcGFuIiBzdHlsZT0id2hpdGUtc3BhY2U6 IHByZTsiPjwvc3Bhbj48YnIgY2xhc3M9IiI+DQpJIGtub3cgb2YgZm91ciB3YXlzIHRvIGhhdmUg YSBnbG9iYWwgaWRlbnRpZmllcjo8YnIgY2xhc3M9IiI+DQotIFVzZSBPSURzPGJyIGNsYXNzPSIi Pg0KLSBVc2UgRE5TIC8gVVJJPGJyIGNsYXNzPSIiPg0KLSBQcm9iYWJpbGlzdGljYWxseSB1c2lu ZyBhIGJpZyBlbm91Z2ggYnl0ZSBzdHJpbmc8YnIgY2xhc3M9IiI+DQotIEEgbmV3IHJlZ2lzdHJ5 LCBwZXJoYXBzIElBTkEgKGJ1dCB3ZSBwcm9iYWJseSBkb24ndCB3YW50IHRoaXMpPGJyIGNsYXNz PSIiPg0KPGJyIGNsYXNzPSIiPg0KVGhlIFBSIGFsbG93cyBhbGwgYnV0IHRoZSBsYXN0LCBidXQg dGhpcyBjb3VsZCBiZSByZWR1Y2VkIHRvIGp1c3Qgb25lIG9yIHR3byBvZiB0aGUgYWJvdmUuPGJy IGNsYXNzPSIiPg0KPC9ibG9ja3F1b3RlPg0KPGJyIHN0eWxlPSJjYXJldC1jb2xvcjogcmdiKDAs IDAsIDApOyBmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZvbnQtc3R5 bGU6IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6IG5vcm1h bDsgbGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7IHRleHQtaW5kZW50 OiAwcHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9ybWFsOyB3b3JkLXNw YWNpbmc6IDBweDsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRlY29yYXRp b246IG5vbmU7IiBjbGFzcz0iIj4NCjxzcGFuIHN0eWxlPSJjYXJldC1jb2xvcjogcmdiKDAsIDAs IDApOyBmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZvbnQtc3R5bGU6 IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6IG5vcm1hbDsg bGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7IHRleHQtaW5kZW50OiAw cHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9ybWFsOyB3b3JkLXNwYWNp bmc6IDBweDsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRlY29yYXRpb246 IG5vbmU7IGZsb2F0OiBub25lOyBkaXNwbGF5OiBpbmxpbmUgIWltcG9ydGFudDsiIGNsYXNzPSIi PlBSDQogbG9va3MgZ3JlYXQgdG8gbWUsIGV4Y2VwdCB0aGF0IHdvdWxkIEkgYWdyZWUgd2l0aCBy ZWR1Y2luZyBpdCB0byBvbmUgb3IgdHdvLjwvc3Bhbj48YnIgc3R5bGU9ImNhcmV0LWNvbG9yOiBy Z2IoMCwgMCwgMCk7IGZvbnQtZmFtaWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9u dC1zdHlsZTogbm9ybWFsOyBmb250LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDog bm9ybWFsOyBsZXR0ZXItc3BhY2luZzogbm9ybWFsOyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4dC1p bmRlbnQ6IDBweDsgdGV4dC10cmFuc2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7IHdv cmQtc3BhY2luZzogMHB4OyAtd2Via2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7IHRleHQtZGVj b3JhdGlvbjogbm9uZTsiIGNsYXNzPSIiPg0KPHNwYW4gc3R5bGU9ImNhcmV0LWNvbG9yOiByZ2Io MCwgMCwgMCk7IGZvbnQtZmFtaWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1z dHlsZTogbm9ybWFsOyBmb250LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDogbm9y bWFsOyBsZXR0ZXItc3BhY2luZzogbm9ybWFsOyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4dC1pbmRl bnQ6IDBweDsgdGV4dC10cmFuc2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7IHdvcmQt c3BhY2luZzogMHB4OyAtd2Via2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7IHRleHQtZGVjb3Jh dGlvbjogbm9uZTsgZmxvYXQ6IG5vbmU7IGRpc3BsYXk6IGlubGluZSAhaW1wb3J0YW50OyIgY2xh c3M9IiI+U2luY2UNCiB0aGUgYWJpbGl0eSB0byB0YWtlIGEgdmFsdWUgYW5kIHJlc29sdmUgaXQg dG8gc29tZXRoaW5nIG1lYW5pbmdmdWwgaXMgdXNlZnVsIGluIG1hbnkgY2FzZXMgKGxvZ2dpbmcs IHdpcmVzaGFyayBhbmFseXNpcywgZXRjLiksIEkgd291bGQgcmVtb3ZlIHRoZSB0aGlyZCBvcHRp b24uPC9zcGFuPjxiciBzdHlsZT0iY2FyZXQtY29sb3I6IHJnYigwLCAwLCAwKTsgZm9udC1mYW1p bHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAxMnB4OyBmb250LXN0eWxlOiBub3JtYWw7IGZvbnQt dmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQtd2VpZ2h0OiBub3JtYWw7IGxldHRlci1zcGFjaW5n OiBub3JtYWw7IHRleHQtYWxpZ246IHN0YXJ0OyB0ZXh0LWluZGVudDogMHB4OyB0ZXh0LXRyYW5z Zm9ybTogbm9uZTsgd2hpdGUtc3BhY2U6IG5vcm1hbDsgd29yZC1zcGFjaW5nOiAwcHg7IC13ZWJr aXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsgdGV4dC1kZWNvcmF0aW9uOiBub25lOyIgY2xhc3M9 IiI+DQo8YnIgc3R5bGU9ImNhcmV0LWNvbG9yOiByZ2IoMCwgMCwgMCk7IGZvbnQtZmFtaWx5OiBI ZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1zdHlsZTogbm9ybWFsOyBmb250LXZhcmlh bnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDogbm9ybWFsOyBsZXR0ZXItc3BhY2luZzogbm9y bWFsOyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4dC1pbmRlbnQ6IDBweDsgdGV4dC10cmFuc2Zvcm06 IG5vbmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7IHdvcmQtc3BhY2luZzogMHB4OyAtd2Via2l0LXRl eHQtc3Ryb2tlLXdpZHRoOiAwcHg7IHRleHQtZGVjb3JhdGlvbjogbm9uZTsiIGNsYXNzPSIiPg0K PHNwYW4gc3R5bGU9ImNhcmV0LWNvbG9yOiByZ2IoMCwgMCwgMCk7IGZvbnQtZmFtaWx5OiBIZWx2 ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1zdHlsZTogbm9ybWFsOyBmb250LXZhcmlhbnQt Y2Fwczogbm9ybWFsOyBmb250LXdlaWdodDogbm9ybWFsOyBsZXR0ZXItc3BhY2luZzogbm9ybWFs OyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4dC1pbmRlbnQ6IDBweDsgdGV4dC10cmFuc2Zvcm06IG5v bmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7IHdvcmQtc3BhY2luZzogMHB4OyAtd2Via2l0LXRleHQt c3Ryb2tlLXdpZHRoOiAwcHg7IHRleHQtZGVjb3JhdGlvbjogbm9uZTsgZmxvYXQ6IG5vbmU7IGRp c3BsYXk6IGlubGluZSAhaW1wb3J0YW50OyIgY2xhc3M9IiI+T0lEcywNCiBlbmNvZGVkIGFzIGlu dCBhcnJheXMsIHByb2JhYmx5IGNvbXByZXNzIHRoZSBiZXN0IHNvIGlmIG9ubHkgb25lLCB0aGVu IEknZCBwaWNrIHRoYXQgb25lLiAmbmJzcDtVUklzIGFyZSBjb252ZW5pZW50IHRob3VnaCBhbHNv IHNvIGlmIHR3bywgdGhlbiB0aGF0J3MgbXkgc2Vjb25kIHBpY2suPHNwYW4gY2xhc3M9IkFwcGxl LWNvbnZlcnRlZC1zcGFjZSI+Jm5ic3A7PC9zcGFuPjwvc3Bhbj48YnIgc3R5bGU9ImNhcmV0LWNv bG9yOiByZ2IoMCwgMCwgMCk7IGZvbnQtZmFtaWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJw eDsgZm9udC1zdHlsZTogbm9ybWFsOyBmb250LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdl aWdodDogbm9ybWFsOyBsZXR0ZXItc3BhY2luZzogbm9ybWFsOyB0ZXh0LWFsaWduOiBzdGFydDsg dGV4dC1pbmRlbnQ6IDBweDsgdGV4dC10cmFuc2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3Jt YWw7IHdvcmQtc3BhY2luZzogMHB4OyAtd2Via2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7IHRl eHQtZGVjb3JhdGlvbjogbm9uZTsiIGNsYXNzPSIiPg0KPGJyIHN0eWxlPSJjYXJldC1jb2xvcjog cmdiKDAsIDAsIDApOyBmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZv bnQtc3R5bGU6IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6 IG5vcm1hbDsgbGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7IHRleHQt aW5kZW50OiAwcHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9ybWFsOyB3 b3JkLXNwYWNpbmc6IDBweDsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRl Y29yYXRpb246IG5vbmU7IiBjbGFzcz0iIj4NCjxibG9ja3F1b3RlIHR5cGU9ImNpdGUiIHN0eWxl PSJmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZvbnQtc3R5bGU6IG5v cm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6IG5vcm1hbDsgbGV0 dGVyLXNwYWNpbmc6IG5vcm1hbDsgb3JwaGFuczogYXV0bzsgdGV4dC1hbGlnbjogc3RhcnQ7IHRl eHQtaW5kZW50OiAwcHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9ybWFs OyB3aWRvd3M6IGF1dG87IHdvcmQtc3BhY2luZzogMHB4OyAtd2Via2l0LXRleHQtc2l6ZS1hZGp1 c3Q6IGF1dG87IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsgdGV4dC1kZWNvcmF0aW9u OiBub25lOyIgY2xhc3M9IiI+DQpJIGRvbid0IHNlZSB0aGlzIGNsYWltIGFzIGVzc2VudGlhbCBm b3IgRUFULCBidXQgSSBjb21taXR0ZWQgdG8gd29ya2luZyB0aHJvdWdoIHRoaXMgd2l0aCBURUVQ LiBJJ20gZmluZSB3aXRoIHRoaXMgUFIgZ29pbmcgaW50byBhIFRFRVAgZG9jdW1lbnQgcmF0aGVy IHRoYW4gRUFULjxiciBjbGFzcz0iIj4NCjwvYmxvY2txdW90ZT4NCjxiciBzdHlsZT0iY2FyZXQt Y29sb3I6IHJnYigwLCAwLCAwKTsgZm9udC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAx MnB4OyBmb250LXN0eWxlOiBub3JtYWw7IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQt d2VpZ2h0OiBub3JtYWw7IGxldHRlci1zcGFjaW5nOiBub3JtYWw7IHRleHQtYWxpZ246IHN0YXJ0 OyB0ZXh0LWluZGVudDogMHB4OyB0ZXh0LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUtc3BhY2U6IG5v cm1hbDsgd29yZC1zcGFjaW5nOiAwcHg7IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsg dGV4dC1kZWNvcmF0aW9uOiBub25lOyIgY2xhc3M9IiI+DQo8c3BhbiBzdHlsZT0iY2FyZXQtY29s b3I6IHJnYigwLCAwLCAwKTsgZm9udC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAxMnB4 OyBmb250LXN0eWxlOiBub3JtYWw7IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQtd2Vp Z2h0OiBub3JtYWw7IGxldHRlci1zcGFjaW5nOiBub3JtYWw7IHRleHQtYWxpZ246IHN0YXJ0OyB0 ZXh0LWluZGVudDogMHB4OyB0ZXh0LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUtc3BhY2U6IG5vcm1h bDsgd29yZC1zcGFjaW5nOiAwcHg7IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsgdGV4 dC1kZWNvcmF0aW9uOiBub25lOyBmbG9hdDogbm9uZTsgZGlzcGxheTogaW5saW5lICFpbXBvcnRh bnQ7IiBjbGFzcz0iIj5UaGUNCiBub3Rpb24gb2YgSFcgY2xhc3MgSUQgaXMgbm90IHNwZWNpZmlj IHRvIFRFRXMsIGhlbmNlIHRoZSByZXF1ZXN0IHRvIHB1dCBpdCBpbiBFQVQgcmF0aGVyIHRoYW4g aW4gYW55dGhpbmcgdGhhdCB3b3VsZCBpbXBseSB1c2UgaXMgbGltaXRlZCB0byBURUVzIChoZW5j ZSBub3QgaW4gYSBURUVQIGRvY3VtZW50KS48L3NwYW4+PGJyIHN0eWxlPSJjYXJldC1jb2xvcjog cmdiKDAsIDAsIDApOyBmb250LWZhbWlseTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZv bnQtc3R5bGU6IG5vcm1hbDsgZm9udC12YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6 IG5vcm1hbDsgbGV0dGVyLXNwYWNpbmc6IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7IHRleHQt aW5kZW50OiAwcHg7IHRleHQtdHJhbnNmb3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9ybWFsOyB3 b3JkLXNwYWNpbmc6IDBweDsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRl Y29yYXRpb246IG5vbmU7IiBjbGFzcz0iIj4NCjxiciBzdHlsZT0iY2FyZXQtY29sb3I6IHJnYigw LCAwLCAwKTsgZm9udC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAxMnB4OyBmb250LXN0 eWxlOiBub3JtYWw7IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQtd2VpZ2h0OiBub3Jt YWw7IGxldHRlci1zcGFjaW5nOiBub3JtYWw7IHRleHQtYWxpZ246IHN0YXJ0OyB0ZXh0LWluZGVu dDogMHB4OyB0ZXh0LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUtc3BhY2U6IG5vcm1hbDsgd29yZC1z cGFjaW5nOiAwcHg7IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsgdGV4dC1kZWNvcmF0 aW9uOiBub25lOyIgY2xhc3M9IiI+DQo8c3BhbiBzdHlsZT0iY2FyZXQtY29sb3I6IHJnYigwLCAw LCAwKTsgZm9udC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAxMnB4OyBmb250LXN0eWxl OiBub3JtYWw7IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQtd2VpZ2h0OiBub3JtYWw7 IGxldHRlci1zcGFjaW5nOiBub3JtYWw7IHRleHQtYWxpZ246IHN0YXJ0OyB0ZXh0LWluZGVudDog MHB4OyB0ZXh0LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUtc3BhY2U6IG5vcm1hbDsgd29yZC1zcGFj aW5nOiAwcHg7IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsgdGV4dC1kZWNvcmF0aW9u OiBub25lOyBmbG9hdDogbm9uZTsgZGlzcGxheTogaW5saW5lICFpbXBvcnRhbnQ7IiBjbGFzcz0i Ij4tRGF2ZTwvc3Bhbj48YnIgc3R5bGU9ImNhcmV0LWNvbG9yOiByZ2IoMCwgMCwgMCk7IGZvbnQt ZmFtaWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1zdHlsZTogbm9ybWFsOyBm b250LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDogbm9ybWFsOyBsZXR0ZXItc3Bh Y2luZzogbm9ybWFsOyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4dC1pbmRlbnQ6IDBweDsgdGV4dC10 cmFuc2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7IHdvcmQtc3BhY2luZzogMHB4OyAt d2Via2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7IHRleHQtZGVjb3JhdGlvbjogbm9uZTsiIGNs YXNzPSIiPg0KPGJyIHN0eWxlPSJjYXJldC1jb2xvcjogcmdiKDAsIDAsIDApOyBmb250LWZhbWls eTogSGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZvbnQtc3R5bGU6IG5vcm1hbDsgZm9udC12 YXJpYW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6IG5vcm1hbDsgbGV0dGVyLXNwYWNpbmc6 IG5vcm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7IHRleHQtaW5kZW50OiAwcHg7IHRleHQtdHJhbnNm b3JtOiBub25lOyB3aGl0ZS1zcGFjZTogbm9ybWFsOyB3b3JkLXNwYWNpbmc6IDBweDsgLXdlYmtp dC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRlY29yYXRpb246IG5vbmU7IiBjbGFzcz0i Ij4NCjxzcGFuIHN0eWxlPSJjYXJldC1jb2xvcjogcmdiKDAsIDAsIDApOyBmb250LWZhbWlseTog SGVsdmV0aWNhOyBmb250LXNpemU6IDEycHg7IGZvbnQtc3R5bGU6IG5vcm1hbDsgZm9udC12YXJp YW50LWNhcHM6IG5vcm1hbDsgZm9udC13ZWlnaHQ6IG5vcm1hbDsgbGV0dGVyLXNwYWNpbmc6IG5v cm1hbDsgdGV4dC1hbGlnbjogc3RhcnQ7IHRleHQtaW5kZW50OiAwcHg7IHRleHQtdHJhbnNmb3Jt OiBub25lOyB3aGl0ZS1zcGFjZTogbm9ybWFsOyB3b3JkLXNwYWNpbmc6IDBweDsgLXdlYmtpdC10 ZXh0LXN0cm9rZS13aWR0aDogMHB4OyB0ZXh0LWRlY29yYXRpb246IG5vbmU7IGZsb2F0OiBub25l OyBkaXNwbGF5OiBpbmxpbmUgIWltcG9ydGFudDsiIGNsYXNzPSIiPl9fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fPC9zcGFuPjxiciBzdHlsZT0iY2FyZXQtY29s b3I6IHJnYigwLCAwLCAwKTsgZm9udC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAxMnB4 OyBmb250LXN0eWxlOiBub3JtYWw7IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQtd2Vp Z2h0OiBub3JtYWw7IGxldHRlci1zcGFjaW5nOiBub3JtYWw7IHRleHQtYWxpZ246IHN0YXJ0OyB0 ZXh0LWluZGVudDogMHB4OyB0ZXh0LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUtc3BhY2U6IG5vcm1h bDsgd29yZC1zcGFjaW5nOiAwcHg7IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsgdGV4 dC1kZWNvcmF0aW9uOiBub25lOyIgY2xhc3M9IiI+DQo8c3BhbiBzdHlsZT0iY2FyZXQtY29sb3I6 IHJnYigwLCAwLCAwKTsgZm9udC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAxMnB4OyBm b250LXN0eWxlOiBub3JtYWw7IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQtd2VpZ2h0 OiBub3JtYWw7IGxldHRlci1zcGFjaW5nOiBub3JtYWw7IHRleHQtYWxpZ246IHN0YXJ0OyB0ZXh0 LWluZGVudDogMHB4OyB0ZXh0LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUtc3BhY2U6IG5vcm1hbDsg d29yZC1zcGFjaW5nOiAwcHg7IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsgdGV4dC1k ZWNvcmF0aW9uOiBub25lOyBmbG9hdDogbm9uZTsgZGlzcGxheTogaW5saW5lICFpbXBvcnRhbnQ7 IiBjbGFzcz0iIj5URUVQDQogbWFpbGluZyBsaXN0PC9zcGFuPjxiciBzdHlsZT0iY2FyZXQtY29s b3I6IHJnYigwLCAwLCAwKTsgZm9udC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAxMnB4 OyBmb250LXN0eWxlOiBub3JtYWw7IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQtd2Vp Z2h0OiBub3JtYWw7IGxldHRlci1zcGFjaW5nOiBub3JtYWw7IHRleHQtYWxpZ246IHN0YXJ0OyB0 ZXh0LWluZGVudDogMHB4OyB0ZXh0LXRyYW5zZm9ybTogbm9uZTsgd2hpdGUtc3BhY2U6IG5vcm1h bDsgd29yZC1zcGFjaW5nOiAwcHg7IC13ZWJraXQtdGV4dC1zdHJva2Utd2lkdGg6IDBweDsgdGV4 dC1kZWNvcmF0aW9uOiBub25lOyIgY2xhc3M9IiI+DQo8YSBocmVmPSJtYWlsdG86VEVFUEBpZXRm Lm9yZyIgc3R5bGU9ImZvbnQtZmFtaWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9u dC1zdHlsZTogbm9ybWFsOyBmb250LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDog bm9ybWFsOyBsZXR0ZXItc3BhY2luZzogbm9ybWFsOyBvcnBoYW5zOiBhdXRvOyB0ZXh0LWFsaWdu OiBzdGFydDsgdGV4dC1pbmRlbnQ6IDBweDsgdGV4dC10cmFuc2Zvcm06IG5vbmU7IHdoaXRlLXNw YWNlOiBub3JtYWw7IHdpZG93czogYXV0bzsgd29yZC1zcGFjaW5nOiAwcHg7IC13ZWJraXQtdGV4 dC1zaXplLWFkanVzdDogYXV0bzsgLXdlYmtpdC10ZXh0LXN0cm9rZS13aWR0aDogMHB4OyIgY2xh c3M9IiI+VEVFUEBpZXRmLm9yZzwvYT48YnIgc3R5bGU9ImNhcmV0LWNvbG9yOiByZ2IoMCwgMCwg MCk7IGZvbnQtZmFtaWx5OiBIZWx2ZXRpY2E7IGZvbnQtc2l6ZTogMTJweDsgZm9udC1zdHlsZTog bm9ybWFsOyBmb250LXZhcmlhbnQtY2Fwczogbm9ybWFsOyBmb250LXdlaWdodDogbm9ybWFsOyBs ZXR0ZXItc3BhY2luZzogbm9ybWFsOyB0ZXh0LWFsaWduOiBzdGFydDsgdGV4dC1pbmRlbnQ6IDBw eDsgdGV4dC10cmFuc2Zvcm06IG5vbmU7IHdoaXRlLXNwYWNlOiBub3JtYWw7IHdvcmQtc3BhY2lu ZzogMHB4OyAtd2Via2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAwcHg7IHRleHQtZGVjb3JhdGlvbjog bm9uZTsiIGNsYXNzPSIiPg0KPGEgaHJlZj0iaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9s aXN0aW5mby90ZWVwIiBzdHlsZT0iZm9udC1mYW1pbHk6IEhlbHZldGljYTsgZm9udC1zaXplOiAx MnB4OyBmb250LXN0eWxlOiBub3JtYWw7IGZvbnQtdmFyaWFudC1jYXBzOiBub3JtYWw7IGZvbnQt d2VpZ2h0OiBub3JtYWw7IGxldHRlci1zcGFjaW5nOiBub3JtYWw7IG9ycGhhbnM6IGF1dG87IHRl eHQtYWxpZ246IHN0YXJ0OyB0ZXh0LWluZGVudDogMHB4OyB0ZXh0LXRyYW5zZm9ybTogbm9uZTsg d2hpdGUtc3BhY2U6IG5vcm1hbDsgd2lkb3dzOiBhdXRvOyB3b3JkLXNwYWNpbmc6IDBweDsgLXdl YmtpdC10ZXh0LXNpemUtYWRqdXN0OiBhdXRvOyAtd2Via2l0LXRleHQtc3Ryb2tlLXdpZHRoOiAw cHg7IiBjbGFzcz0iIj5odHRwczovL3d3dy5pZXRmLm9yZy9tYWlsbWFuL2xpc3RpbmZvL3RlZXA8 L2E+PC9kaXY+DQo8L2Jsb2NrcXVvdGU+DQo8L2Rpdj4NCjxiciBjbGFzcz0iIj4NCjwvZGl2Pg0K PC9kaXY+DQpJTVBPUlRBTlQgTk9USUNFOiBUaGUgY29udGVudHMgb2YgdGhpcyBlbWFpbCBhbmQg YW55IGF0dGFjaG1lbnRzIGFyZSBjb25maWRlbnRpYWwgYW5kIG1heSBhbHNvIGJlIHByaXZpbGVn ZWQuIElmIHlvdSBhcmUgbm90IHRoZSBpbnRlbmRlZCByZWNpcGllbnQsIHBsZWFzZSBub3RpZnkg dGhlIHNlbmRlciBpbW1lZGlhdGVseSBhbmQgZG8gbm90IGRpc2Nsb3NlIHRoZSBjb250ZW50cyB0 byBhbnkgb3RoZXIgcGVyc29uLCB1c2UgaXQgZm9yIGFueSBwdXJwb3NlLA0KIG9yIHN0b3JlIG9y IGNvcHkgdGhlIGluZm9ybWF0aW9uIGluIGFueSBtZWRpdW0uIFRoYW5rIHlvdS4gPC9kaXY+DQo8 L2Rpdj4NCjwvYmxvY2txdW90ZT4NCjwvZGl2Pg0KPGJyIGNsYXNzPSIiPg0KPC9kaXY+DQo8L2Rp dj4NCjwvZGl2Pg0KPC9ibG9ja3F1b3RlPg0KPC9kaXY+DQo8YnIgY2xhc3M9IiI+DQo8L2Rpdj4N CjwvZGl2Pg0KPC9kaXY+DQpJTVBPUlRBTlQgTk9USUNFOiBUaGUgY29udGVudHMgb2YgdGhpcyBl bWFpbCBhbmQgYW55IGF0dGFjaG1lbnRzIGFyZSBjb25maWRlbnRpYWwgYW5kIG1heSBhbHNvIGJl IHByaXZpbGVnZWQuIElmIHlvdSBhcmUgbm90IHRoZSBpbnRlbmRlZCByZWNpcGllbnQsIHBsZWFz ZSBub3RpZnkgdGhlIHNlbmRlciBpbW1lZGlhdGVseSBhbmQgZG8gbm90IGRpc2Nsb3NlIHRoZSBj b250ZW50cyB0byBhbnkgb3RoZXIgcGVyc29uLCB1c2UgaXQgZm9yIGFueSBwdXJwb3NlLA0KIG9y IHN0b3JlIG9yIGNvcHkgdGhlIGluZm9ybWF0aW9uIGluIGFueSBtZWRpdW0uIFRoYW5rIHlvdS4g PC9kaXY+DQo8L2Rpdj4NCjwvYmxvY2txdW90ZT4NCjwvZGl2Pg0KPGJyIGNsYXNzPSIiPg0KPC9k aXY+DQo8L2Rpdj4NCjwvZGl2Pg0KPC9ibG9ja3F1b3RlPg0KPC9kaXY+DQo8YnIgY2xhc3M9IiI+ DQo8L2Rpdj4NCklNUE9SVEFOVCBOT1RJQ0U6IFRoZSBjb250ZW50cyBvZiB0aGlzIGVtYWlsIGFu ZCBhbnkgYXR0YWNobWVudHMgYXJlIGNvbmZpZGVudGlhbCBhbmQgbWF5IGFsc28gYmUgcHJpdmls ZWdlZC4gSWYgeW91IGFyZSBub3QgdGhlIGludGVuZGVkIHJlY2lwaWVudCwgcGxlYXNlIG5vdGlm eSB0aGUgc2VuZGVyIGltbWVkaWF0ZWx5IGFuZCBkbyBub3QgZGlzY2xvc2UgdGhlIGNvbnRlbnRz IHRvIGFueSBvdGhlciBwZXJzb24sIHVzZSBpdCBmb3IgYW55IHB1cnBvc2UsDQogb3Igc3RvcmUg b3IgY29weSB0aGUgaW5mb3JtYXRpb24gaW4gYW55IG1lZGl1bS4gVGhhbmsgeW91Lg0KPC9ib2R5 Pg0KPC9odG1sPg0K --_000_E127B6FBD3264A1EB2337604596A3C3Earmcom_-- From nobody Wed Jan 12 10:41:14 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0481D3A1866 for ; Wed, 12 Jan 2022 10:41:12 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -6.896 X-Spam-Level: X-Spam-Status: No, score=-6.896 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8NA5xkPXOa_M for ; Wed, 12 Jan 2022 10:41:08 -0800 (PST) Received: from p3plsmtpa09-09.prod.phx3.secureserver.net (p3plsmtpa09-09.prod.phx3.secureserver.net [173.201.193.238]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id ADA713A1867 for ; Wed, 12 Jan 2022 10:41:07 -0800 (PST) Received: from [192.168.1.7] ([75.80.148.243]) by :SMTPAUTH: with ESMTPA id 7iYTnEXm3ONYO7iYTn9no7; Wed, 12 Jan 2022 11:41:05 -0700 X-CMAE-Analysis: v=2.4 cv=OpSKdwzt c=1 sm=1 tr=0 ts=61df20c2 a=VPU1mRQhDhA4uSX60JRRww==:117 a=VPU1mRQhDhA4uSX60JRRww==:17 a=7CQSdrXTAAAA:8 a=K6EGIJCdAAAA:8 a=48vgC7mUAAAA:8 a=SIKdgms2ATSLiGHBBWQA:9 a=QEXdDO2ut3YA:10 a=ezOrDc_Y3cq2Y5Z9pX4A:9 a=VKuW4HIFzdLg1z7B:21 a=_W_S_7VecoQA:10 a=a-qgeE7W1pNrGK8U0ZQC:22 a=L6pVIi0Kn1GYQfi8-iRI:22 a=w1C3t2QeGrPiZgrLijVG:22 X-SECURESERVER-ACCT: lgl@island-resort.com From: Laurence Lundblade Message-Id: <9063E62C-4A3B-4C24-ABCF-BDDA64068AA1@island-resort.com> Content-Type: multipart/alternative; boundary="Apple-Mail=_9F342500-62B2-431A-B54A-5A91C53A3533" Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.17\)) Date: Wed, 12 Jan 2022 10:41:05 -0800 In-Reply-To: Cc: Dave Thaler , rats , teep To: Brendan Moran References: <392AEEF5-C182-490A-92CA-F7D9B365C217@island-resort.com> <8466B6E2-C335-4173-A2A2-3CCA555D28CA@arm.com> <62743D24-49F4-4480-9561-F00DA513C9FF@island-resort.com> <17B0A124-1BDF-41A1-8680-B44C2A540941@arm.com> <2440B689-1943-4227-B96F-F9ABD046D252@island-resort.com> X-Mailer: Apple Mail (2.3445.104.17) X-CMAE-Envelope: MS4xfCkRr1QmqUjjm0rFr5THm+Za4CY5gwSd7T4EZ7Cr7vAOJpT4O0hJaVw/kgkMdZ0FTFFIfOpdXuK2cfZiT7BGNtjX0/xVk2Erztb8kGISufqlNL4d/bo2 2AuA06h95h4W6Lvldt+76p/8hF8EfomSczIOpym/Ls+SHOdAEj/kEGKU/ty+wq1LsgIUCo4qT6vNCHTmURCiSlBMfYahToM48ualdKnQTlYd0+to2QP/QCq7 wXfZZI3nGMNP0Y04yeuAzqRwSQtZcT9TD1lh62jnRe4QBbRZ6EF+sV1fU/8AzcCP Archived-At: Subject: Re: [Teep] [Rats] Class ID claim (and other HW identification) X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 12 Jan 2022 18:41:12 -0000 --Apple-Mail=_9F342500-62B2-431A-B54A-5A91C53A3533 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=utf-8 I can=E2=80=99t seem to be able to understand what is to be classified = or typed or how and why this claim would be used by the RP or Verifier, = so I=E2=80=99m not the one to write the definition of this claim. I=E2=80=99= ve made several attempts that didn=E2=80=99t work out. Maybe if I = understood TEEP better, but at this point I need to spend time on = getting EAT through last call. You can put a claim in the TEEP document and have it be used by lots of = others. Doesn=E2=80=99t have to be in the EAT document to be of general = use. LL > On Jan 11, 2022, at 1:12 AM, Brendan Moran = wrote: >=20 > Hi Lawrence, >=20 > I don=E2=80=99t think I was clear. I was saying that class IDs are = important, but that there=E2=80=99s no need to differentiate between = /types of classes/. When class IDs are opaque blobs, a lookup of some = sort is implied. Since a lookup is being done, the /type of class/ = should be extracted in the lookup. There=E2=80=99s no need to = differentiate between types of classes in EAT itself since it=E2=80=99s = for transporting information that will later have a lookup done. >=20 > Best Regards, > Brendan >=20 >> On 11 Jan 2022, at 04:33, Laurence Lundblade > wrote: >>=20 >> Hey Brendan, >>=20 >> I made the HW-IP PR as an educated guess, from talking to Dave, and = from a some text in section 7 of TEEP Architecture. I don=E2=80=99t have = any agenda here but to make EAT work well for SUIT and TEEP. >>=20 >> Obviously, I=E2=80=99m missing the mark, so I=E2=80=99m graciously = bowing out. So no class ID in the EAT draft. >>=20 >> LL >>=20 >>=20 >> P.S. I do appreciate the discussion as is resulted in adding the HW = Model ID claim to EAT, something that was missing. >>=20 >>=20 >>> On Jan 10, 2022, at 1:12 PM, Brendan Moran > wrote: >>>=20 >>> IMO, adding a new claim like this is counterproductive. It = presupposes that we can predict all classes that a device may belong to. = Sure, we can make a registry of different kinds of classes that a device = can belong to, but why? Frankly, the naive approach is better than this: = you have a database that maps OEM + model + revision into an = application-specific taxonomy. Of course, now someone has to actually = maintain that database. Have fun. >>>=20 >>> Why not take the easy route? It=E2=80=99s far simpler for a device = to be the intersection of ANY properties that make it distinct. The = entity consuming an EAT needs those anyway. And as to why I don=E2=80=99t = want a taxonomy? Because it=E2=80=99s unnecessary. To use any of these = identifiers, you have to use a database to convert the identifier into = whatever it is that you actually care about. That database can just as = easily contain any taxonomy you like. >>>=20 >>> We=E2=80=99re talking about adding more complexity to a = specification in order to distinguish between: >>>=20 >>> SELECT * FROM hw_ip_identifiers WHERE id=3D${ID} >>> Vs >>> SELECT * FROM hw_identifiers WHERE id=3D${ID} AND taxonomy=3D=E2=80=9C= hwip" >>>=20 >>> Why would we complicate the spec to add taxonomies in order to = simplify a database in such a trivial way? >>>=20 >>> In my opinion, we should look at a single physical device as the = intersection of several sets:=20 >>> * the OEM=E2=80=99s model identifier (incl. HW revision) >>> * the SoC identifier (incl. SoC revision) >>> * the processor=E2=80=99s type/version/revision >>> * the trusted OS=E2=80=99s version/revision >>> * the boot loader (especially if it=E2=80=99s in ROM) = version/revision. >>>=20 >>> All of these matter (I think) to TEEP. We need to report them all. = But is the list exhaustive? Probably not. While a registry for the = different taxonomies may be relevant, I doubt it matters in EAT itself. = That only matters when looking up an identifier. >>>=20 >>> What is the concrete value of specifying the taxonomy of an opaque = blob in an interchange document? >>>=20 >>> Thanks, >>> Brendan >>>=20 >>>=20 >>>=20 >>>=20 >>>=20 >>>> On 7 Jan 2022, at 23:56, Laurence Lundblade > wrote: >>>>=20 >>>> So rather than a HW Class, how about a HW IP claim? It would reuse = the same triple for identifying HW, OEM, Model, Version. It could occur = along side the HW OEM, model and version. This seems better than my = current PR and lines up better with Brendan=E2=80=99s examples and with = the reality that HW IP comes from a vendor, has models and versions. = I=E2=80=99ll write up a PR for it if I receive some positive feedback = here. >>>>=20 >>>>=20 >>>> The distinction between chip and device is intended to be handled = by submodules in EAT. Submodules can express arbitrarily complex = architectures and device compositions. >>>>=20 >>>> I think it=E2=80=99s cleaner to keep the HW-identifying claims = separate from the SW-identify claims. Would really like the = identification of the Trusted OS Vendor be handled by CoSWID and = friends. Trying to make some claim suitable for identifying both SW and = HW for all of attestation seems over-ambitious. >>>>=20 >>>> I also think it=E2=80=99s fine to define some claims better suited = to the TEE world in TEEP if we can=E2=80=99t find enough common ground = between TEEP and the very broadly applicable stuff that goes into EAT. >>>>=20 >>>> LL >>>>=20 >>>>=20 >>>> Note: I find the use of the word =E2=80=9Cclass=E2=80=9D here = confusing. If I were putting TV=E2=80=99s into classes I=E2=80=99d uses = classes like smart/dumb, display type (LCD, CRT, OLED) and such that = identify characteristics of TVs independent of vendor and model. "Sony = Bravia" is not a class IMO. Nor is =E2=80=9CMicrosoft Windows=E2=80=9D = (an OS the runs on lots of HW platforms). I=E2=80=99d like to move away = from the word. >>>>=20 >>>>=20 >>>>=20 >>>>> On Jan 4, 2022, at 3:06 AM, Brendan Moran > wrote: >>>>>=20 >>>>> I think devices will need to report multiple vendor/class pairs. >>>>>=20 >>>>> For example, A mobile device could potentially contain: >>>>> 1. A Mobile Device OEM Vendor ID >>>>> 2. A Silicon vendor=E2=80=99s Vendor ID >>>>> 3. An IP vendor=E2=80=99s Vendor ID >>>>>=20 >>>>> This is not an exhaustive list. >>>>>=20 >>>>> For Arm Trust Zone TEEs, I would expect to see: >>>>> 1. The Arm Vendor ID + the processor core=E2=80=99s Class ID >>>>> 2. The Trusted OS Vendor ID + the Trusted OS Class ID >>>>> 3. The Silicon vendor=E2=80=99s Vendor ID + the processor Class ID >>>>> 4. The Device OEM=E2=80=99s Vendor ID + the device Class ID >>>>>=20 >>>>> Cheers, >>>>> Brendan >>>>>=20 >>>>>> On 3 Jan 2022, at 21:00, Dave Thaler = > wrote: >>>>>>=20 >>>>>> Laurence Lundblade wrote: >>>>>>> I talked to Dave which resulted in reorientation of my = understanding of Class ID in TEEP. >>>>>>>=20 >>>>>>> Class ID basically identifies HW IP from a HW designer like Arm = or Synopsis that is integrated into chips made by various HW OEMs like = Qualcomm, Samsung and Apple. The term used frequently for this is "IP" = (I know this well from my days working on HW at Qualcomm). >>>>>>>=20 >>>>>>> I've created a PR for HW Class. >>>>>>>=20 >>>>>>> Since what is identified spans OEMs, this must be a globally = unique identifier. We need to be explicit about that.=20 >>>>>>>=20 >>>>>>> I know of four ways to have a global identifier: >>>>>>> - Use OIDs >>>>>>> - Use DNS / URI >>>>>>> - Probabilistically using a big enough byte string >>>>>>> - A new registry, perhaps IANA (but we probably don't want this) >>>>>>>=20 >>>>>>> The PR allows all but the last, but this could be reduced to = just one or two of the above. >>>>>>=20 >>>>>> PR looks great to me, except that would I agree with reducing it = to one or two. >>>>>> Since the ability to take a value and resolve it to something = meaningful is useful in many cases (logging, wireshark analysis, etc.), = I would remove the third option. >>>>>>=20 >>>>>> OIDs, encoded as int arrays, probably compress the best so if = only one, then I'd pick that one. URIs are convenient though also so if = two, then that's my second pick.=20 >>>>>>=20 >>>>>>> I don't see this claim as essential for EAT, but I committed to = working through this with TEEP. I'm fine with this PR going into a TEEP = document rather than EAT. >>>>>>=20 >>>>>> The notion of HW class ID is not specific to TEEs, hence the = request to put it in EAT rather than in anything that would imply use is = limited to TEEs (hence not in a TEEP document). >>>>>>=20 >>>>>> -Dave >>>>>>=20 >>>>>> _______________________________________________ >>>>>> TEEP mailing list >>>>>> TEEP@ietf.org >>>>>> https://www.ietf.org/mailman/listinfo/teep = >>>>> IMPORTANT NOTICE: The contents of this email and any attachments = are confidential and may also be privileged. If you are not the intended = recipient, please notify the sender immediately and do not disclose the = contents to any other person, use it for any purpose, or store or copy = the information in any medium. Thank you.=20 >>>>=20 >>>=20 >>> IMPORTANT NOTICE: The contents of this email and any attachments are = confidential and may also be privileged. If you are not the intended = recipient, please notify the sender immediately and do not disclose the = contents to any other person, use it for any purpose, or store or copy = the information in any medium. Thank you.=20 >>=20 >=20 > IMPORTANT NOTICE: The contents of this email and any attachments are = confidential and may also be privileged. If you are not the intended = recipient, please notify the sender immediately and do not disclose the = contents to any other person, use it for any purpose, or store or copy = the information in any medium. Thank you. --Apple-Mail=_9F342500-62B2-431A-B54A-5A91C53A3533 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=utf-8 I = can=E2=80=99t seem to be able to understand what is to be classified or = typed or how and why this claim would be used by the RP or Verifier, so = I=E2=80=99m not the one to write the definition of this claim. I=E2=80=99v= e made several attempts that didn=E2=80=99t work out. Maybe if I = understood TEEP better, but at this point I need to spend time on = getting EAT through last call.

You can put a claim in the TEEP document and = have it be used by lots of others. Doesn=E2=80=99t have to be in the EAT = document to be of general use.

LL




On Jan 11, 2022, at 1:12 AM, = Brendan Moran <Brendan.Moran@arm.com> wrote:

Hi Lawrence,

I don=E2=80=99t think I was clear. I was saying = that class IDs are important, but that there=E2=80=99s no need to = differentiate between /types of classes/. When class IDs are opaque = blobs, a lookup of some sort is implied. Since a lookup is being done, = the /type of class/ should be extracted in the lookup. There=E2=80=99s = no need to differentiate between types of classes in EAT itself since = it=E2=80=99s for transporting information that will later have a lookup = done.

Best = Regards,
Brendan

On 11 = Jan 2022, at 04:33, Laurence Lundblade <lgl@island-resort.com> wrote:

Hey Brendan,

I made the HW-IP PR as an educated guess, from talking to = Dave, and from a some text in section 7 of TEEP Architecture. I don=E2=80=99= t have any agenda here but to make EAT work well for SUIT and = TEEP.

Obviously,= I=E2=80=99m missing the mark, so I=E2=80=99m graciously bowing out. So = no class ID in the EAT draft.

LL


P.S.= I do appreciate the discussion as is resulted in adding the HW Model ID = claim to EAT, something that was missing.


On Jan = 10, 2022, at 1:12 PM, Brendan Moran <Brendan.Moran@arm.com> wrote:

IMO, adding a new claim like this is = counterproductive. It presupposes that we can predict all classes that a = device may belong to. Sure, we can make a registry of different kinds of = classes that a device can belong to, but why? Frankly, the naive = approach is better than this: you have a database that maps OEM + model = + revision into an application-specific taxonomy. Of course, now someone = has to actually maintain that database. Have fun.

Why not take the easy route? It=E2=80=99s= far simpler for a device to be the intersection of ANY properties that = make it distinct. The entity consuming an EAT needs those anyway. And as = to why I don=E2=80=99t want a taxonomy? Because it=E2=80=99s = unnecessary. To use any of these identifiers, you have to use a database = to convert the identifier into whatever it is that you actually care = about. That database can just as easily contain any taxonomy you = like.

We=E2=80=99= re talking about adding more complexity to a specification in order to = distinguish between:

SELECT * FROM hw_ip_identifiers WHERE id=3D${ID}
Vs
SELECT * FROM hw_identifiers WHERE = id=3D${ID} AND taxonomy=3D=E2=80=9Chwip"
Why would we complicate the spec to = add taxonomies in order to simplify a database in such a trivial = way?

In my = opinion, we should look at a single physical device as the intersection = of several sets: 
* the OEM=E2=80=99s model = identifier (incl. HW revision)
* the SoC identifier = (incl. SoC revision)
* the processor=E2=80=99s = type/version/revision
* the trusted OS=E2=80=99s = version/revision
* the boot loader (especially if = it=E2=80=99s in ROM) version/revision.

All of these matter (I think) to TEEP. = We need to report them all. But is the list exhaustive? Probably not. = While a registry for the different taxonomies may be relevant, I doubt = it matters in EAT itself. That only matters when looking up an = identifier.

What= is the concrete value of specifying the taxonomy of an opaque blob in = an interchange document?

Thanks,
Brendan





On 7 Jan = 2022, at 23:56, Laurence Lundblade <lgl@island-resort.com> wrote:

So rather than a HW Class, how about a HW IP claim? = It would reuse the same triple for identifying HW, OEM, Model, Version. = It could occur along side the HW OEM, model and version. This seems = better than my current PR and lines up better with Brendan=E2=80=99s = examples and with the reality that HW IP comes from a vendor, has models = and versions. I=E2=80=99ll write up a PR for it if I receive some = positive feedback here.


The distinction between = chip and device is intended to be handled by submodules in EAT. = Submodules can express arbitrarily complex architectures and device = compositions.

I = think it=E2=80=99s cleaner to keep the HW-identifying claims separate = from the SW-identify claims. Would really like the identification of the = Trusted OS Vendor be handled by CoSWID and friends. Trying to make some = claim suitable for identifying both SW and HW for all of attestation = seems over-ambitious.

I also think it=E2=80=99s fine to define some claims better = suited to the TEE world in TEEP if we can=E2=80=99t find enough common = ground between TEEP and the very broadly applicable stuff that goes into = EAT.

LL


Note: I find the use of = the word =E2=80=9Cclass=E2=80=9D here confusing. If I were putting = TV=E2=80=99s into classes I=E2=80=99d uses classes like smart/dumb, = display type (LCD, CRT, OLED) and such that identify characteristics of = TVs independent of vendor and model. "Sony Bravia" is not a class IMO. = Nor is =E2=80=9CMicrosoft Windows=E2=80=9D (an OS the runs on lots of HW = platforms). I=E2=80=99d like to move away from the word.



On Jan 4, 2022, at 3:06 AM, Brendan Moran <Brendan.Moran@arm.com> wrote:

I think devices will need to report multiple = vendor/class pairs.

For example, A mobile device could potentially contain:
1. A Mobile Device OEM Vendor ID
2. A = Silicon vendor=E2=80=99s Vendor ID
3. An IP = vendor=E2=80=99s Vendor ID

This is not an exhaustive list.

For Arm Trust Zone TEEs, I would expect = to see:
1. The Arm Vendor ID + the processor = core=E2=80=99s Class ID
2. The Trusted OS Vendor ID = + the Trusted OS Class ID
3. The Silicon vendor=E2=80= =99s Vendor ID + the processor Class ID
4. The = Device OEM=E2=80=99s Vendor ID + the device Class ID

Cheers,
Brendan

On 3 Jan = 2022, at 21:00, Dave Thaler <dthaler=3D40microsoft.com@dmarc.ietf.org> = wrote:

Laurence Lundblade = wrote:
I talked to Dave which resulted in reorientation = of my understanding of Class ID in TEEP.

Class ID basically identifies HW IP from a HW designer like = Arm or Synopsis that is integrated into chips made by various HW OEMs = like Qualcomm, Samsung and Apple. The term used frequently for this is = "IP" (I know this well from my days working on HW at Qualcomm).

I've created a PR for HW Class.

Since what is identified spans OEMs, = this must be a globally unique identifier. We need to be explicit about = that. 

I know of four ways to have a global = identifier:
- Use OIDs
- Use DNS / URI
- Probabilistically using a big enough byte string
- A new registry, perhaps IANA (but we probably don't want = this)

The PR allows all but the last, but = this could be reduced to just one or two of the above.

PR = looks great to me, except that would I agree with reducing it to one or = two.
Since = the ability to take a value and resolve it to something meaningful is = useful in many cases (logging, wireshark analysis, etc.), I would remove = the third option.

OIDs, = encoded as int arrays, probably compress the best so if only one, then = I'd pick that one.  URIs are convenient though also so if two, then = that's my second pick. 

I don't see this = claim as essential for EAT, but I committed to working through this with = TEEP. I'm fine with this PR going into a TEEP document rather than = EAT.

The = notion of HW class ID is not specific to TEEs, hence the request to put = it in EAT rather than in anything that would imply use is limited to = TEEs (hence not in a TEEP document).

-Dave

_______________________________________________
TEEP mailing = list
TEEP@ietf.org
https://www.ietf.org/mailman/listinfo/teep

IMPORTANT NOTICE: The contents of this = email and any attachments are confidential and may also be privileged. = If you are not the intended recipient, please notify the sender = immediately and do not disclose the contents to any other person, use it = for any purpose, or store or copy the information in any medium. Thank = you. 


IMPORTANT NOTICE: The contents of this = email and any attachments are confidential and may also be privileged. = If you are not the intended recipient, please notify the sender = immediately and do not disclose the contents to any other person, use it = for any purpose, or store or copy the information in any medium. Thank = you. 


IMPORTANT = NOTICE: The contents of this email and any attachments are confidential = and may also be privileged. If you are not the intended recipient, = please notify the sender immediately and do not disclose the contents to = any other person, use it for any purpose, or store or copy the = information in any medium. Thank you.

= --Apple-Mail=_9F342500-62B2-431A-B54A-5A91C53A3533-- From nobody Sun Jan 16 11:05:40 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9C6443A091E for ; Sun, 16 Jan 2022 11:05:39 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -14.595 X-Spam-Level: X-Spam-Status: No, score=-14.595 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=PzGljxHz; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=y4S1KF6L Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qrgHDmryLw-p for ; Sun, 16 Jan 2022 11:05:35 -0800 (PST) Received: from rcdn-iport-5.cisco.com (rcdn-iport-5.cisco.com [173.37.86.76]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 211053A091B for ; Sun, 16 Jan 2022 11:05:35 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=6795; q=dns/txt; s=iport; t=1642359935; x=1643569535; h=from:to:subject:date:message-id:mime-version; bh=sD/oHxfwNu9rvpIJrijT2eF7GeHf7+9LULbgzXYyVqc=; b=PzGljxHz4qOC7KhGf4l58ZL6Gj5yJSlL/eEN3bqUKonaKcG1YRUGqg+8 Ep5dhUksw5PcYxQ7PatTEG9zuxgOywUz7JuVusB/r+KsaehpJJKugsF2N MDlCe6pjG5YE1SKk3gKzy207NPZa6hoWBqUUdYEmW07NICdhKemGiJ7XR s=; IronPort-PHdr: =?us-ascii?q?A9a23=3ADn9WIhMaK9i+oUx9u10l6ncDWUAX0o4cdiYZ6?= =?us-ascii?q?Zsi3rRJdKnrv5HvJ1fW6vgliljVFZ7a5PRJh6uz0ejgVGUM7IzHvCUEd5pBB?= =?us-ascii?q?BMAgN8dygonBsPNAEbnLfnsOio9GskKVFJs83yhd0ZPH8OrbFzJqXr05jkXS?= =?us-ascii?q?X3C?= IronPort-Data: =?us-ascii?q?A9a23=3AiMf4CK6qmcI+KhZ/T7iL9wxRtCvFchMFZxGqf?= =?us-ascii?q?qrLsTDasY5as4F+vmAdDDuGOamLY2Onctp1O42w8UsEvpfcndJkTQM6qnsxZ?= =?us-ascii?q?n8b8sCt6fZ1gavT04J+FiBIJa5ex512huLocYZkHhcwmj/3auK79SAli/nRL?= =?us-ascii?q?lbBILes1h5ZFFcMpBgJ0XqPq8Zh6mJZqYDR7zGl4LsekOWHULOR4AOYB0pPg?= =?us-ascii?q?061RLyDi9yp0N8QlgRWifmmJzYynVFNZH4UDfnZw3cV3uBp8uCGq+brlNlV/?= =?us-ascii?q?0vD9BsrT9iiiLu+IwsBQ6XZOk6FjX8+t6qK20cZ4HdtlPdgcqNANC+7iB3R9?= =?us-ascii?q?zx14NNGvJmvSAEmFqbNg+8aFRJfFkmSOIUZoeObfSXn65D7I0ruNiGEL+9VJ?= =?us-ascii?q?F07MJUw++trDydJ7/NwFdynRnhvnMqsy769D+JrnMlmfY/gPZgUvTdryjSxM?= =?us-ascii?q?BrveribK42i2DOS9GtYahhyIMvj?= IronPort-HdrOrdr: =?us-ascii?q?A9a23=3A0bdfMKyEN3E9Teo+Jdb9KrPxnOskLtp133?= =?us-ascii?q?Aq2lEZdPULSK2lfpGV8sjziyWatN9IYgBbpTnyAtj8fZq8z+843WB1B9eftW?= =?us-ascii?q?bdyROVxe1ZnO7fKl7bamLDH4xmpNxdmsFFYbWaZzUX/KWKgjVQeOxQp+VvhZ?= =?us-ascii?q?rY/Ns2uE0dKz2CBZsQiztRO0K+KAlbVQNGDZ02GN63/cxcvQetfnwRc4CSGm?= =?us-ascii?q?QFd/KrnayEqLvWJTo9QzI34giHij2lrJTgFQKD4xsYWzRThZ8/7Gn+lRDj7K?= =?us-ascii?q?nLiYD79vac7R6S031loqqi9jJxPr3ItiHTEESptu+cXvUjZ1RFhkFznAjg0i?= =?us-ascii?q?dtrDCGmWZdAy060QKvQojym2q15+EluwxesEMLDjSj8CPeSIXCNUMH44Aqv/?= =?us-ascii?q?MmTjLJr0Unp91yy6RNwiaQsIdWFwrJmGDn68HPTAwCrDv+nZMOq59bs5Vka/?= =?us-ascii?q?pXVFaRl/1rwGpFVJMbWC7q4oEuF+djSMna+fZNaFufK3TUpHNmztCgVmk6Wk?= =?us-ascii?q?7ueDlOhuWFlzxN2HxpxUoRw8IS2n8G6ZImUpFBo+DJKL5hmr1CRtIfKah9GO?= =?us-ascii?q?ACS82qDXGle2OHDEuCZVD8UK0XMXPErJD6pL0z+eGxYZQNiIA/nZzQOWkow1?= =?us-ascii?q?Lau3iefvFm8Kc7gSwlcV/NKQgFkPsul6SRkoeMNobWDQ=3D=3D?= X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: =?us-ascii?q?A0BhCQA3bORh/5FdJa1agmKBITFWB3d?= =?us-ascii?q?aNzGER4NHA4U5hQ5dmDiFDoJTA1QLAQEBDQEBQQQBAYUegzMCJTcGDgECBAE?= =?us-ascii?q?BARIBAQUBAQECAQYEgQkThWgBDIZbER0BATgRAUoCBDAnBDWCYgGCDlcDLgG?= =?us-ascii?q?gKAGBOgKKH3qBMYEBgggBAQYEBIJSgjsYgjcJgTqDDoQcAQGCfYQxHIINgRU?= =?us-ascii?q?nDBCEKgGGVzeCLpE3giGBVJYIiUSgSgqDRZ9QBS6ncZZCIKEqhGwCBAIEBQI?= =?us-ascii?q?OAQEGgXclgVlwFWUBgj5RGQ+ON4Nail50OAIGCwEBAwmQLQEB?= X-IronPort-AV: E=Sophos;i="5.88,293,1635206400"; d="scan'208,217";a="714445024" Received: from rcdn-core-9.cisco.com ([173.37.93.145]) by rcdn-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 16 Jan 2022 19:05:15 +0000 Received: from mail.cisco.com (xbe-aln-002.cisco.com [173.36.7.17]) by rcdn-core-9.cisco.com (8.15.2/8.15.2) with ESMTPS id 20GJ5FrU010423 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=OK) for ; Sun, 16 Jan 2022 19:05:15 GMT Received: from xfe-rcd-004.cisco.com (173.37.227.252) by xbe-aln-002.cisco.com (173.36.7.17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Sun, 16 Jan 2022 13:05:14 -0600 Received: from xfe-aln-001.cisco.com (173.37.135.121) by xfe-rcd-004.cisco.com (173.37.227.252) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14; Sun, 16 Jan 2022 13:05:14 -0600 Received: from NAM10-DM6-obe.outbound.protection.outlook.com (173.37.151.57) by xfe-aln-001.cisco.com (173.37.135.121) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.14 via Frontend Transport; Sun, 16 Jan 2022 13:05:14 -0600 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=LXgsi+EV0993twU9ku/Nt577hQXrxVPVLLqEQTa4Yv+W8226UBv8YKR9FlTRfyB41hJLw+12E3S4mQIk/yFcmz83Dzku2Zk/nTw26oB84eDRevMVa+nF9LKyXPweuHB6F31+lLv8fqiRL9dtLjg6jPGxBM4n9Aj2205JWxo07jMLp5JNsjMyFeyPSYpGi7x3zJjSiAOvSRzHRCFHkz5Tv2DNk/C6fq/IZI/m6U9puJvoRTMTSDt9hoEYKDQWmuY7PMKc3Ztus9+d7eKDP8Z3nQNjKVbUy7otWA1i4oLMof0Xb3GBL+XikU5ix4W6BY/ACv2eGwjRR+eB6azi+aiceg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=sD/oHxfwNu9rvpIJrijT2eF7GeHf7+9LULbgzXYyVqc=; b=ScNfUT/OSq0/qNBk0UKDMc5bU5plI1on6vNJqvVgdPTJllCnUbFmUKDlwAbEshY09UE2+TQXY1W17ZYbtFiixnDDWYXH0PNZnDn/1mW+q+gotGiAMHxCz94+6sfSMR5ywJAMBIAyMeWN4OSnr1E5yEms7/L4O2LOKSQLMkEB9J1qUyYP3f/F7uzyGj6G6Kz0lMLwX88cme5KUPEBp/n+E/SfWCfQddRkBXVwB9HDed9lgxu1FF7bZFnQInzWVmovxyJd9b1cWgGtWXu+IMQ+zlIy+bwvmZVKtq48R3K5afLGdZwlLXlWxbQBqmLuD+jdbXSKv6Hkbu8sT2BRwR7iHA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=sD/oHxfwNu9rvpIJrijT2eF7GeHf7+9LULbgzXYyVqc=; b=y4S1KF6Lbo8BDo9IOEbmpJojbZoQswWJIniZgEFy6tWzMStVL0uTSZ1qQJIbulWoHIL423ouuQtSTZo6ZNGM7rJgKrDpWjL5nPuBXN4PD4DG8/d1ggvjmf8YDzwew1jZUUz3kovx2wBgsYpWRtWq1M0P44vrR+1UBFEQWUW8OZI= Received: from BYAPR11MB2919.namprd11.prod.outlook.com (2603:10b6:a03:8d::21) by BY5PR11MB4225.namprd11.prod.outlook.com (2603:10b6:a03:1ba::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4888.12; Sun, 16 Jan 2022 19:05:13 +0000 Received: from BYAPR11MB2919.namprd11.prod.outlook.com ([fe80::a58c:cf0f:73de:5979]) by BYAPR11MB2919.namprd11.prod.outlook.com ([fe80::a58c:cf0f:73de:5979%5]) with mapi id 15.20.4888.013; Sun, 16 Jan 2022 19:05:13 +0000 From: "Nancy Cam-Winget (ncamwing)" To: "teep@ietf.org" Thread-Topic: IETF 113 attendance and agenda requests Thread-Index: AQHYCwv9OJyhSEcPcEWO2h0mi7ZcGQ== Date: Sun, 16 Jan 2022 19:05:13 +0000 Message-ID: <30D7E251-AF7D-4621-93F8-5B1327FC2A48@cisco.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/16.57.22011101 authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=cisco.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 28e264db-4c9d-441b-0fd8-08d9d9231ff5 x-ms-traffictypediagnostic: BY5PR11MB4225:EE_ x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:10000; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 7mXYuMRVMPlPbYVWjPnmpad9uja9arlgyuJFcf5C63RkqaUK4cfCxB752tvWz6w+49CUEK3hbW+MzdRfK5RNMSef/qb/bKnIeb0iWw7EPjCtYJJBokVl3Ap89vG2hlWJ3c3nVDWSegQe8OFVdwh/7ymSswWEqVDkmt1RKzrEiye9ld015qBbV8qGt2zPNucc1OsOZ0qA9XGqlCwNM6ygkuy6I9wAkmWLxrgMYrfB4tKJhFAu8dL39zJ+KRFm8ZE0MMtGqts1maDE7AfSmSjLQWPMW9dVrqSauZWdMwK2eB5bbhRqw6RVwxdNjbET2HgXzKikIjRvIVnyIamK2XfabFIBJElp/j1REmMJ5r7/gN57j0hP3qa45EdCcoO7tHyWETJ8AB72W6wwc+yBGZoYmLz2FRP/F54dhiVmETzVkeNqxU0KmbF5D21vbuQvxug1ELZRkhQSvRvoa169wkiqVERqVgAMKoBSPVzXf6YqdVuEDWZOvnA/14vy92JMa8SV65URZSXaQZFEiXxV1Y1wZyk/hbqLxuWYm4zyn2fftYnSjRFsjyC5I2Wx5wueeaS/PdJnrw/Vo/ckb4HH651rXI9fT9LS+bS9ggULnppWrg/SBrc1+oqITF0/1/uLO/AZksh60migG/yvWdkAna7blg0hnawH7OiNXJyKqB2VERqK5mYBKp750Akt4S5ZnS/qmPgDsacBrsO9WrryVXAoldGSywgmbwSKZ/6jd2wNRQJdVBvJeC5VfXksdBk3w4CE x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR11MB2919.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(366004)(86362001)(33656002)(2616005)(508600001)(38100700002)(6916009)(6486002)(66476007)(2906002)(4744005)(6506007)(8936002)(122000001)(316002)(66556008)(6512007)(186003)(36756003)(83380400001)(5660300002)(71200400001)(8676002)(64756008)(66946007)(38070700005)(4743002)(26005)(66446008)(76116006)(45980500001); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?B?MXNhclJ4ek84RndXNEdINGhMNitSWEJjbzJBRFFxa3NxQ1A4V3hjNTM2QktJ?= =?utf-8?B?ZkZVM0RXRkRaaWtYMU5mRC80UklTSnduWUVnOEgxQXRrbXR0SmdOQWxkbXRQ?= =?utf-8?B?VENXdGFSd2Z2RG5IWVJRVysyWVRtU2RaRzZ2cUl6UHhOSEFlQkl6elg0b0lw?= =?utf-8?B?Wlhud0x1UzVsSGJwZ3NmNFQrTDIxdW9vdjUwQlZKaDVDdU1rbm4vQnF5aTYw?= =?utf-8?B?VmJ4bVh1QkhZV2JldEZFTUU2bzRRWEM3bzhIWU1GOEV3MUVWek9CbG9xcHor?= =?utf-8?B?Ky9kSkM0SG5kcjc0cUtSWjl3NnZHWmpQbVNFVHljbEhJS3FmMi9DeXZUeTR1?= =?utf-8?B?RWd6ZHU5dk11Z1R0TWpIOW5wRUNXc1FtYzdhbTFCRTZOcDBwL2VWY3hmWUJq?= =?utf-8?B?Y2Nmb2J5RkphdzZKNlBBK2tRRExQdnMrZ2xnOUJBSVh2MmoxREcxazZNSUxX?= =?utf-8?B?ZDM4aUNmWDFZRkU1ZDdTcTJGbEV4WXc0dnN3VHlObFY0dWVIWFE2eGs4TEk0?= =?utf-8?B?b2xjMEt2MHlUejNVNUxMdmQrU1F2aU9xalo4MHpacVF4a0dZUXF2eWlzQ2dR?= =?utf-8?B?VGR2TU9GM3g5bDFLdEt4QnB3blBYZ2JWVEhlNFJNMmxPa1hsMklUZmM4MEk3?= =?utf-8?B?RktsVy9lK21xbllDNXdBQUR5OEFQdVVEUEN6SEJ5REpnUGZ6Sk1DMlA1THdt?= =?utf-8?B?TFUvREUySmtzS25MWjZtMnRBUkdsMTM2NS9tVTY3MmtId0FHR2dSaytMQzB2?= =?utf-8?B?MWdEWHVBUmtURWpwUStMaXpOaGVwTkkxQ2s2ZFNhUlYwT1IvT25ZTS9vVlhk?= =?utf-8?B?TjdrRUFiYTB4NlFuK0hGaHcwMmJ3dVNwU1g5ZS9FUG1xaDFKV0RFRWk1L0Fh?= =?utf-8?B?bmdnalBoQVpiWnNFS1ZhR3EvQ0hFSEpmYTNTOCtQRWxlUk14aGZjeFkrSjVo?= =?utf-8?B?Njd2eGpEdk5hZEh1UzdYNysyemF2UWM5V2x6a1VKVlZPdkpsSXZXTjZ2WXRm?= =?utf-8?B?Ny9GelNmd2ZGZnhMYVpxQVRldm1xaVl2UGQ1bEQ1c003S2JidzhXYUNEWGtX?= =?utf-8?B?TXYxOURWM1R4R2xsZGh3RVJuN0pWUEp6K04vVFg0U3Ewc2dNV3pFZlphWnEv?= =?utf-8?B?R0N0L1IvRXMvZVQrYm8vU0svSlZDeUZlRkJPalFvRUMxS0JWWjNjdUtmelB4?= =?utf-8?B?UnFhcVV6WkJyZWhicVRUVklHa0N2U0l3SmVPakVCN3ZHMTYzdU85K1V1em1O?= =?utf-8?B?RmNpWEowa0t4SThMazZJLzAvMjNzOU94MHJRQzNwL0dQc1pkNFMydEx2RFVI?= =?utf-8?B?b0IxTXpEMFBDZFppVWNwOEt2RTZzdThOaFJ1SDFrYjl0WDdwcW04blVUOElk?= =?utf-8?B?VzhJRWo5ay9OYVFUYnJwUWREVXVlUW4zQXVQQ21KMG5SR1hSZmpVcytZazJY?= =?utf-8?B?Z1ZrY3U5a0tvUmVHMFhjR0QvdWU4cjJ5cUh5RWI3dDNZZmlSOU5QTnlJVmE5?= =?utf-8?B?cEtFdEp3djBpcmlMdHY0RDRqazVYS1JzeUMxK3hJTldGdjNNSFVYQ2lvY1hu?= =?utf-8?B?T3V3SGMxNE5vQ3pDcGdoRUVYQ01VS1FPMzltVWl2OGxTbVN3THhObTh6cDJX?= =?utf-8?B?QXdmaXlYQXJjZlhSTlZrbG9tVmFZeXVSK3hJS1Y2QjEzVVlJZzBtS21NL2JU?= =?utf-8?B?WVczMXZyb01lUEJlR0pqYUxvVWhUNGNXZngwYTBPYTRXTFV5ZWNvMVlOWWhC?= =?utf-8?B?akp2MWMzbzhBeWV1SjkyNG96b0M0S3VLZytkWG5mQTRFb3lYOFVQT3psNlA4?= =?utf-8?B?VFpZZW5xZFlMWjRnY0h2Z3k0NDdnUzNMUlU3YSs5RktVT25kTFBwQmxNdTZw?= =?utf-8?B?R0kxajE4TThqdi9uT3RIQmc4dGpyai9wbHJhUVJJa1JDdWplR3NVL1UrV3c4?= =?utf-8?B?bi9YM0tiQWdxYURsL2pkcStHODdYcXMwYXdBWmtjSzl0TUhHZGQvUFhhSCty?= =?utf-8?B?cE1CclUzM2s3aFVRZFlrSzdPdmo2QVk5TExrbjlyTVhxMUJWLy80NE82c1d2?= =?utf-8?B?Y0VTaEVPNHhTM25KOWZGTEdzQnAyUmt2L3VSMUYzQk1CZU5Bem94QVVoa21W?= =?utf-8?B?Ti9iQytPVnFXMkkwdnNqK201cDJzWTNJTVNySnlXMHVrTVBxK0NKK3VCWCtp?= =?utf-8?Q?9liNaFwgdQ+RBIZKuOgcoTI=3D?= Content-Type: multipart/alternative; boundary="_000_30D7E251AF7D462193F85B1327FC2A48ciscocom_" MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BYAPR11MB2919.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 28e264db-4c9d-441b-0fd8-08d9d9231ff5 X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Jan 2022 19:05:13.1310 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: lD8sBcU/lx12lwS047diFTduvqGyYp3ys7t1nMsvXwRxUIGEbsutgKF0n24W6HBOcFyaozzPig5gs+hzcxq1pw== X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR11MB4225 X-OriginatorOrg: cisco.com X-Outbound-SMTP-Client: 173.36.7.17, xbe-aln-002.cisco.com X-Outbound-Node: rcdn-core-9.cisco.com Archived-At: Subject: [Teep] IETF 113 attendance and agenda requests X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 16 Jan 2022 19:05:40 -0000 --_000_30D7E251AF7D462193F85B1327FC2A48ciscocom_ Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 SGkgVEVFUCBwYXJ0aWNpcGFudHMsDQoNCldpdGggSUVURiAxMTMgYmVpbmcgYSBoeWJyaWQsIHdl IG5lZWQgdG8gZXN0aW1hdGUgaW4gcGVyc29uIGF0dGVuZGFuY2UgZm9yIHJvb20gc2l6aW5nLiAg VGhvdWdoIHRoZSBzaXR1YXRpb24gbWF5IGNoYW5nZSwgaXQgd291bGQgYmUgaGVscGZ1bCB0byBr bm93IHdoaWNoIHBhcnRpY2lwYW50cyAoYW5kIHByZXNlbnRlcnMpIGFyZSBwbGFubmluZyBvbiBi ZWluZyBpbiBwZXJzb24uICBJIHJlYWxpemUgcGxhbnMgY2FuIGNoYW5nZSwgYnV0IHRoaXMgaXMg dG8gaGVscCB3aXRoIG91ciBzZXNzaW9uIG1lZXRpbmcgcmVxdWVzdC4NCg0KVGhlIHNlY29uZCBh c2sgaXMgZm9yIGFnZW5kYSByZXF1ZXN0cywgdGhlcmUgYXJlIGF0IGxlYXN0IHR3byBzbG90cyB0 aGF0IEkgYmVsaWV2ZSB3aWxsIGJlIG5lZWRlZDoNCg0KICAxLiAgVXBkYXRlcyB0byB0aGUgcHJv dG9jb2wgc3BlYw0KICAyLiAgSGFja2F0aG9uIHVwZGF0ZXMNCg0KVGhhbmtzLCAgTmFuY3kNCg== --_000_30D7E251AF7D462193F85B1327FC2A48ciscocom_ Content-Type: text/html; charset="utf-8" Content-ID: Content-Transfer-Encoding: base64 PGh0bWwgeG1sbnM6bz0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6b2ZmaWNlIiB4 bWxuczp3PSJ1cm46c2NoZW1hcy1taWNyb3NvZnQtY29tOm9mZmljZTp3b3JkIiB4bWxuczptPSJo dHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL29mZmljZS8yMDA0LzEyL29tbWwiIHhtbG5zPSJo dHRwOi8vd3d3LnczLm9yZy9UUi9SRUMtaHRtbDQwIj4NCjxoZWFkPg0KPG1ldGEgaHR0cC1lcXVp dj0iQ29udGVudC1UeXBlIiBjb250ZW50PSJ0ZXh0L2h0bWw7IGNoYXJzZXQ9dXRmLTgiPg0KPG1l dGEgbmFtZT0iR2VuZXJhdG9yIiBjb250ZW50PSJNaWNyb3NvZnQgV29yZCAxNSAoZmlsdGVyZWQg bWVkaXVtKSI+DQo8c3R5bGU+PCEtLQ0KLyogRm9udCBEZWZpbml0aW9ucyAqLw0KQGZvbnQtZmFj ZQ0KCXtmb250LWZhbWlseToiQ2FtYnJpYSBNYXRoIjsNCglwYW5vc2UtMToyIDQgNSAzIDUgNCA2 IDMgMiA0O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6Q2FsaWJyaTsNCglwYW5vc2UtMToy IDE1IDUgMiAyIDIgNCAzIDIgNDt9DQovKiBTdHlsZSBEZWZpbml0aW9ucyAqLw0KcC5Nc29Ob3Jt YWwsIGxpLk1zb05vcm1hbCwgZGl2Lk1zb05vcm1hbA0KCXttYXJnaW46MGluOw0KCWZvbnQtc2l6 ZToxMi4wcHQ7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLHNhbnMtc2VyaWY7fQ0KcC5Nc29MaXN0 UGFyYWdyYXBoLCBsaS5Nc29MaXN0UGFyYWdyYXBoLCBkaXYuTXNvTGlzdFBhcmFncmFwaA0KCXtt c28tc3R5bGUtcHJpb3JpdHk6MzQ7DQoJbWFyZ2luLXRvcDowaW47DQoJbWFyZ2luLXJpZ2h0OjBp bjsNCgltYXJnaW4tYm90dG9tOjBpbjsNCgltYXJnaW4tbGVmdDouNWluOw0KCWZvbnQtc2l6ZTox Mi4wcHQ7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLHNhbnMtc2VyaWY7fQ0Kc3Bhbi5FbWFpbFN0 eWxlMTcNCgl7bXNvLXN0eWxlLXR5cGU6cGVyc29uYWwtY29tcG9zZTsNCglmb250LWZhbWlseToi Q2FsaWJyaSIsc2Fucy1zZXJpZjsNCgljb2xvcjp3aW5kb3d0ZXh0O30NCi5Nc29DaHBEZWZhdWx0 DQoJe21zby1zdHlsZS10eXBlOmV4cG9ydC1vbmx5Ow0KCWZvbnQtc2l6ZToxMi4wcHQ7DQoJZm9u dC1mYW1pbHk6IkNhbGlicmkiLHNhbnMtc2VyaWY7fQ0KQHBhZ2UgV29yZFNlY3Rpb24xDQoJe3Np emU6OC41aW4gMTEuMGluOw0KCW1hcmdpbjoxLjBpbiAxLjBpbiAxLjBpbiAxLjBpbjt9DQpkaXYu V29yZFNlY3Rpb24xDQoJe3BhZ2U6V29yZFNlY3Rpb24xO30NCi8qIExpc3QgRGVmaW5pdGlvbnMg Ki8NCkBsaXN0IGwwDQoJe21zby1saXN0LWlkOjE0OTI1OTgzNTU7DQoJbXNvLWxpc3QtdHlwZTpo eWJyaWQ7DQoJbXNvLWxpc3QtdGVtcGxhdGUtaWRzOi0xODY4NDE1MDc4IDY3Njk4NzAzIDY3Njk4 NzEzIDY3Njk4NzE1IDY3Njk4NzAzIDY3Njk4NzEzIDY3Njk4NzE1IDY3Njk4NzAzIDY3Njk4NzEz IDY3Njk4NzE1O30NCkBsaXN0IGwwOmxldmVsMQ0KCXttc28tbGV2ZWwtdGFiLXN0b3A6bm9uZTsN Cgltc28tbGV2ZWwtbnVtYmVyLXBvc2l0aW9uOmxlZnQ7DQoJdGV4dC1pbmRlbnQ6LS4yNWluO30N CkBsaXN0IGwwOmxldmVsMg0KCXttc28tbGV2ZWwtbnVtYmVyLWZvcm1hdDphbHBoYS1sb3dlcjsN Cgltc28tbGV2ZWwtdGFiLXN0b3A6bm9uZTsNCgltc28tbGV2ZWwtbnVtYmVyLXBvc2l0aW9uOmxl ZnQ7DQoJdGV4dC1pbmRlbnQ6LS4yNWluO30NCkBsaXN0IGwwOmxldmVsMw0KCXttc28tbGV2ZWwt bnVtYmVyLWZvcm1hdDpyb21hbi1sb3dlcjsNCgltc28tbGV2ZWwtdGFiLXN0b3A6bm9uZTsNCglt c28tbGV2ZWwtbnVtYmVyLXBvc2l0aW9uOnJpZ2h0Ow0KCXRleHQtaW5kZW50Oi05LjBwdDt9DQpA bGlzdCBsMDpsZXZlbDQNCgl7bXNvLWxldmVsLXRhYi1zdG9wOm5vbmU7DQoJbXNvLWxldmVsLW51 bWJlci1wb3NpdGlvbjpsZWZ0Ow0KCXRleHQtaW5kZW50Oi0uMjVpbjt9DQpAbGlzdCBsMDpsZXZl bDUNCgl7bXNvLWxldmVsLW51bWJlci1mb3JtYXQ6YWxwaGEtbG93ZXI7DQoJbXNvLWxldmVsLXRh Yi1zdG9wOm5vbmU7DQoJbXNvLWxldmVsLW51bWJlci1wb3NpdGlvbjpsZWZ0Ow0KCXRleHQtaW5k ZW50Oi0uMjVpbjt9DQpAbGlzdCBsMDpsZXZlbDYNCgl7bXNvLWxldmVsLW51bWJlci1mb3JtYXQ6 cm9tYW4tbG93ZXI7DQoJbXNvLWxldmVsLXRhYi1zdG9wOm5vbmU7DQoJbXNvLWxldmVsLW51bWJl ci1wb3NpdGlvbjpyaWdodDsNCgl0ZXh0LWluZGVudDotOS4wcHQ7fQ0KQGxpc3QgbDA6bGV2ZWw3 DQoJe21zby1sZXZlbC10YWItc3RvcDpub25lOw0KCW1zby1sZXZlbC1udW1iZXItcG9zaXRpb246 bGVmdDsNCgl0ZXh0LWluZGVudDotLjI1aW47fQ0KQGxpc3QgbDA6bGV2ZWw4DQoJe21zby1sZXZl bC1udW1iZXItZm9ybWF0OmFscGhhLWxvd2VyOw0KCW1zby1sZXZlbC10YWItc3RvcDpub25lOw0K CW1zby1sZXZlbC1udW1iZXItcG9zaXRpb246bGVmdDsNCgl0ZXh0LWluZGVudDotLjI1aW47fQ0K QGxpc3QgbDA6bGV2ZWw5DQoJe21zby1sZXZlbC1udW1iZXItZm9ybWF0OnJvbWFuLWxvd2VyOw0K CW1zby1sZXZlbC10YWItc3RvcDpub25lOw0KCW1zby1sZXZlbC1udW1iZXItcG9zaXRpb246cmln aHQ7DQoJdGV4dC1pbmRlbnQ6LTkuMHB0O30NCm9sDQoJe21hcmdpbi1ib3R0b206MGluO30NCnVs DQoJe21hcmdpbi1ib3R0b206MGluO30NCi0tPjwvc3R5bGU+DQo8L2hlYWQ+DQo8Ym9keSBsYW5n PSJFTi1VUyIgbGluaz0iIzA1NjNDMSIgdmxpbms9IiM5NTRGNzIiIHN0eWxlPSJ3b3JkLXdyYXA6 YnJlYWstd29yZCI+DQo8ZGl2IGNsYXNzPSJXb3JkU2VjdGlvbjEiPg0KPHAgY2xhc3M9Ik1zb05v cm1hbCI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMS4wcHQiPkhpIFRFRVAgcGFydGljaXBhbnRz LDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIHN0eWxl PSJmb250LXNpemU6MTEuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFz cz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdCI+V2l0aCBJRVRGIDEx MyBiZWluZyBhIGh5YnJpZCwgd2UgbmVlZCB0byBlc3RpbWF0ZSBpbiBwZXJzb24gYXR0ZW5kYW5j ZSBmb3Igcm9vbSBzaXppbmcuJm5ic3A7IFRob3VnaCB0aGUgc2l0dWF0aW9uIG1heSBjaGFuZ2Us IGl0IHdvdWxkIGJlIGhlbHBmdWwgdG8ga25vdyB3aGljaCBwYXJ0aWNpcGFudHMgKGFuZCBwcmVz ZW50ZXJzKSBhcmUgcGxhbm5pbmcgb24gYmVpbmcNCiBpbiBwZXJzb24uJm5ic3A7IEkgcmVhbGl6 ZSBwbGFucyBjYW4gY2hhbmdlLCBidXQgdGhpcyBpcyB0byBoZWxwIHdpdGggb3VyIHNlc3Npb24g bWVldGluZyByZXF1ZXN0LjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3Jt YWwiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bh bj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBw dCI+VGhlIHNlY29uZCBhc2sgaXMgZm9yIGFnZW5kYSByZXF1ZXN0cywgdGhlcmUgYXJlIGF0IGxl YXN0IHR3byBzbG90cyB0aGF0IEkgYmVsaWV2ZSB3aWxsIGJlIG5lZWRlZDo8bzpwPjwvbzpwPjwv c3Bhbj48L3A+DQo8b2wgc3R5bGU9Im1hcmdpbi10b3A6MGluIiBzdGFydD0iMSIgdHlwZT0iMSI+ DQo8bGkgY2xhc3M9Ik1zb0xpc3RQYXJhZ3JhcGgiIHN0eWxlPSJtYXJnaW4tbGVmdDowaW47bXNv LWxpc3Q6bDAgbGV2ZWwxIGxmbzEiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0Ij5VcGRh dGVzIHRvIHRoZSBwcm90b2NvbCBzcGVjPG86cD48L286cD48L3NwYW4+PC9saT48bGkgY2xhc3M9 Ik1zb0xpc3RQYXJhZ3JhcGgiIHN0eWxlPSJtYXJnaW4tbGVmdDowaW47bXNvLWxpc3Q6bDAgbGV2 ZWwxIGxmbzEiPjxzcGFuIHN0eWxlPSJmb250LXNpemU6MTEuMHB0Ij5IYWNrYXRob24gdXBkYXRl czxvOnA+PC9vOnA+PC9zcGFuPjwvbGk+PC9vbD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFu IHN0eWxlPSJmb250LXNpemU6MTEuMHB0Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8 cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjExLjBwdCI+VGhhbmtz LCZuYnNwOyBOYW5jeTxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjwvZGl2Pg0KPC9ib2R5Pg0KPC9o dG1sPg0K --_000_30D7E251AF7D462193F85B1327FC2A48ciscocom_-- From nobody Wed Jan 26 09:36:04 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F28433A191A; Wed, 26 Jan 2022 09:35:56 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.678 X-Spam-Level: X-Spam-Status: No, score=-2.678 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.576, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yEuUg2q51IN0; Wed, 26 Jan 2022 09:35:52 -0800 (PST) Received: from NAM11-CO1-obe.outbound.protection.outlook.com (mail-co1nam11on2106.outbound.protection.outlook.com [40.107.220.106]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 829FF3A1918; Wed, 26 Jan 2022 09:35:52 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=GLRp52LAQqc1epbde7Sim2h2JQ6pgmFoxSPS7oyvVna7sGumdMKGvAe28P8RSQQz8aPCH211y5yNOif7nUNrMSvgKXzMFdViELoGZTsiN0AJNpXJSmcgWlwkQzbJsEsUEa/ftiJpCu30IevnYSUR9cQ9IR9VS6Gbu28c5ND8yuRFr1IbB0ZOeakhj6bLiBNxNLO0S08Dem7AezaM8ww75f9cQDi0nM+rQlsSunwz2AYRBw3KLI/SVBRlNpkGn+V5Z9XHh++FBlalqAX+1U/j/Kc7D5HEeeMmBgFUCtQAThCVjAgzFUIhljpoa5oDfKYhFriA9oOck/mPKzO7/bhr3g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=pBABTFGWilC1hqTYBxZwpXbZPU0K5dl3wq7+m+no7bs=; b=gmD34QNMqd6QvxEUHySVmq+GJKYxYhL8e9z/PZVgWhGTOX7pBNelOWKIxu7dh5MYDxbJpziR7ANdWZHjfOgg96Fl1ZQ+76HLTZHeezHsfCgzd8bwhwQyKQXtYZZRSyZCeAoRxResmCuGqFCmIIiRd603PXibbm2n5+kBB2CfkR/QvRss1m4yic6jICCdhvUCD41dNiHJLtWCi98VFM76trIafNmLtcTW56IJsTqXmb5rZFzLV6UZR4rIpYrO6VYLSJZlHAKpc5huY1KmIDyIUGHGU2q387cnKERfzPobV3CNZggcY7T4YZWX76vWz/RtsI2LMkOBsZR5I9hi0U6pZg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=pBABTFGWilC1hqTYBxZwpXbZPU0K5dl3wq7+m+no7bs=; b=YwG7rwTGQJa0VLYRdcg3p5UbhVLZGsl9bds3Rt4ZA3joiKfsPw6/eDyKIk4LkFGn3UPBojrqMNzBMf28qZ/1r/TL94DdSw72HnLN4+Q1lbqzbOcw/Ur6V+KR6UcqHri6ZbGS3RVjLh9LxlpQRSW0nQQTt/fgEdtsRxvapt9BqQc= Received: from CH2PR21MB1464.namprd21.prod.outlook.com (2603:10b6:610:89::16) by DM5PR21MB0187.namprd21.prod.outlook.com (2603:10b6:3:a6::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4951.5; Wed, 26 Jan 2022 17:35:44 +0000 Received: from CH2PR21MB1464.namprd21.prod.outlook.com ([fe80::ad0c:429c:ba5d:5ba4]) by CH2PR21MB1464.namprd21.prod.outlook.com ([fe80::ad0c:429c:ba5d:5ba4%3]) with mapi id 15.20.4951.005; Wed, 26 Jan 2022 17:35:44 +0000 From: Dave Thaler To: "suit@ietf.org" , "TEEP@ietf.org" Thread-Topic: [Rats] Remote ATtestation ProcedureS (rats) WG Virtual Meeting: 2022-01-26 Thread-Index: AQHYA9dQzC5k48lEIkiSw6fQrMeHrax1oBIAgAAOOoA= Date: Wed, 26 Jan 2022 17:35:44 +0000 Message-ID: References: <164156762305.16132.15824191398075013206@ietfa.amsl.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=01052371-0637-4016-934b-21735b7acdfa; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2022-01-26T17:34:37Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 77b1275c-436b-4e3f-0c7a-08d9e0f24814 x-ms-traffictypediagnostic: DM5PR21MB0187:EE_ x-ms-exchange-atpmessageproperties: SA|SL x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:7219; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH2PR21MB1464.namprd21.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(7696005)(71200400001)(6506007)(508600001)(8676002)(33656002)(83380400001)(10290500003)(55016003)(8936002)(66446008)(64756008)(82960400001)(82950400001)(38070700005)(186003)(110136005)(9686003)(122000001)(316002)(966005)(86362001)(66946007)(66556008)(66476007)(76116006)(38100700002)(53546011)(450100002)(5660300002)(8990500004)(52536014)(2906002)(20210929001); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?utf-8?B?S2M3Z0RUcGY0N0lTeGtQMlA1WmEyL25DbDlacTlIMTlwUmNHNlRMQnFFWnY3?= =?utf-8?B?MFdKWUgrb0ZZMEF0aEhUckV2dEZUdzdiMXE5Q0V6MVlBZ2Mvb2E4V3pRS2ZQ?= =?utf-8?B?Qk1LS2IvcHhQdm5GM1g0STh2dmVqK2pMVGlFaCtpMnpnZkc5TmhybkZ1WThL?= =?utf-8?B?Yk9pZFNvR2hrUDZsVDNteGdrQXVHNE0zcUJZZTM3UjllY0pnVytCTWFQMHcz?= =?utf-8?B?WDFNQ3FXUHArdVZZZFRVajRjaVF3RWo4MkFGVzdHY2FyNmkxbHg4eTJEaUVC?= =?utf-8?B?WDJDdnA1Wk1MVHNXK0ZsczNsQWhWYmRHMllsbmxhakRGVUpydjRPaEpWVE9p?= =?utf-8?B?MGE2aDcrK1VIRnZNZ25DK1VTa1R4UFYyOGtOR1JjalQzTVFXMFdnUGRHdFJj?= =?utf-8?B?OG5VM01rL0tFbzgyTy9UV2EwS1hZSmFBNENVTjR2dEw5Q0tiMi9ZWjFtY0RW?= =?utf-8?B?bXlKMkR2K2JPRjRwWUVRQ2VGdzErN0ZhaWs1RFdVUE5MdkpYZDRRa3BUbm1r?= =?utf-8?B?WURjMEY4T0hNQ0QvYnNiYTZMbk1JVFlvSmJETzZjQ2svaGF5OE1lOTBXUVBD?= =?utf-8?B?V2NvRk1ZT2xOVjY5VWFDYmZ4djcxZE9zTGI0Vm5Na1hCR0RDaFp6U1ZyS3My?= =?utf-8?B?UzlHRS9TMDlDYWwwRmZlYytyaVNGdDJsNEJxd3FsYi9zaWlaVjlGaWQyZHVs?= =?utf-8?B?V3BwTE82bm1EekNxOTlyTGRvdVdsWkdiTUJCYVpxdmV5bWN5WWFzTWpuUlZZ?= =?utf-8?B?aXIzQlhXbjIzeHlqOE05OHVSZ3NQazdva3dQZFBuWElWeXdLWFlYMDVvZTVZ?= =?utf-8?B?K3ZqRmtmUTdvdkN5bThkWHBFMHFUNWppWVlMYlVxaHZRbGV4NEpoSm84cm9q?= =?utf-8?B?dFFqcGw4dUhmczRHMWc1YkF3c3ZkMkV3YisvRWhYR3IvdG13RE9vZlVqOWFM?= =?utf-8?B?TjEzUHlDOGZubUp5VDB1Titva1lsTW9tRjVMYlN3QWhOanBoVXFkMW10eWIw?= =?utf-8?B?clRXUUc3eVRhc1FFWjU3ZlVjUnNwbWVOck4zMkxCQjl1eXFaeTRhNUJkLzJa?= =?utf-8?B?MzMydU5UOTg5QnRyRVh5OEdtUnFFZkJhTER1SE01TTFOeUNuclFwMEdTRVhQ?= =?utf-8?B?TG5ORlZwVjloK3hCek9Ra3BpNTRxSE5ReW92Sy9UREJGYmQ5Zy9yY0tnc3NE?= =?utf-8?B?MSt0U2QwbVNIbURtblpHUGVaZ0FXVkJNdGdOZjNVZm1ZZXgydlhSK1NFeFVN?= =?utf-8?B?YVJOYjJZMk5SRUlZdnVBOVBkaHRVOGg1ZVh2YXQwZjNOaW5peFVTM3B5aXhV?= =?utf-8?B?bXhOTklUWFdLK1hzOFZaS3VvRHFaRUJabW0ybFVFM3NwUmpSQnpFTktneEZa?= =?utf-8?B?TU9JRVVBYkMzVTQwamU0Zy9EYlV3WTdTZHp3K1A0TUZKeFY4SDRDMWNRZktw?= =?utf-8?B?ZmxlYU1vOEdjMWJkSTZxMGFmNDVCaUU3S2lVdWJMVWVRY0RWVE9mSStuZzJI?= =?utf-8?B?K0JLeUpIcEJyMzd5eGhuOHpCaEhWT0xMV0p4SEM3TGp4TktMckhkUEpIbkwr?= =?utf-8?B?MTZwNitEQnZRcFVQRnpGWXllT25QMFlvTEd1b3lzMXQ2amdITFhIUUlldW0v?= =?utf-8?B?bDNua2tBRm9UQTdFdkcxQkd2OXVvc1dlVkJtTXhGc1RmUmt5SlR4SWVOVVo5?= =?utf-8?B?RVJRTldzYTBlb0VLZmFpbmtnSkgzdDJhQ0IrdjdodXFHK3Y4bEVuU1MvcDU3?= =?utf-8?B?L0ZmQi9LRVpoaVFOS3IrazFNcHhNUy9kZklkUFhzSlZ0SlBjVWFmWDdHbFN3?= =?utf-8?B?NUJnRlVCZ3NyUkF4Rjc4dXplMC9rakRwQmtaOUNYQTlpWXU3a2hNREswcDdz?= =?utf-8?B?bDltWlZaN1U0dVVhTmcxZHROcUpCekRvUm5rVGt2a0ZYTzNMV2tVTisxUDg3?= =?utf-8?B?ZTVqODNwSDdnck9mTUhjREZGTExWNFp6MFZGeG9DcFp0WFdFYXFRWURBWkR0?= =?utf-8?B?bURqS0pzQlNGK0ttaHozZ3VMZU9SekYwaExKNHppWXd6TTdMbHh5NSt6c0t1?= =?utf-8?B?TTJFWENBajFLb2VuV0c3Q1ZiUFhTNEsydWZxRHU2bzYzVXJyMEFiWENoQjNa?= =?utf-8?B?TGJXUnFjZVhkYVFMRWxTWXdZS1N6aFNKVTJQR3E3djBmZWNZZ0pwSmdKbnZS?= =?utf-8?B?UDlsakNKaVNRWHkwcmN4cU5NREtITFN1ZTVURkxzSFd0ZDkrUDZ5bnExV2V6?= =?utf-8?B?eTlCSXNaTFNKaWJBK2tHTzFYUXJmcUUzZGcyUkFkNFo5YW9USHA3SjFrdGZ5?= =?utf-8?B?azRseW5ZT2ZkbVhDZ3BxdXBPVGxKWGhzVERxeFUwYk5QRTQrM0xJdz09?= Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 MIME-Version: 1.0 X-OriginatorOrg: microsoft.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CH2PR21MB1464.namprd21.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 77b1275c-436b-4e3f-0c7a-08d9e0f24814 X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Jan 2022 17:35:44.4667 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: ptkkBELBvcek9KC8y8O68dJahPaUie1GLp8XwlsVVVER0YPQwSQP2+l14nqMTPZUeSoylSa/6kfcp4zgSJmk83OT2vmfjl+6BwiUOORj2II= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR21MB0187 Archived-At: Subject: [Teep] FW: [Rats] Remote ATtestation ProcedureS (rats) WG Virtual Meeting: 2022-01-26 X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 26 Jan 2022 17:35:57 -0000 Rm9yd2FyZGluZyBpbiB0aGUgaG9wZXMgdGhhdCB3ZSB3aWxsIGdldCBTVUlUIGFuZCBURUVQIGZv bGtzIHJlbGV2YW50IHRvIHRoZSBkaXNjdXNzaW9uIG9mIFJBVFMgY2xhaW1zIGZvciBURUVQL1NV SVQuDQoNCkRhdmUNCg0KLS0tLS1PcmlnaW5hbCBNZXNzYWdlLS0tLS0NCkZyb206IFJBVFMgPHJh dHMtYm91bmNlc0BpZXRmLm9yZz4gT24gQmVoYWxmIE9mIFNtaXRoLCBOZWQNClNlbnQ6IFdlZG5l c2RheSwgSmFudWFyeSAyNiwgMjAyMiA4OjQ0IEFNDQpUbzogcmF0c0BpZXRmLm9yZw0KU3ViamVj dDogUmU6IFtSYXRzXSBSZW1vdGUgQVR0ZXN0YXRpb24gUHJvY2VkdXJlUyAocmF0cykgV0cgVmly dHVhbCBNZWV0aW5nOiAyMDIyLTAxLTI2DQoNClJlbWluZGVyIHRoYXQgd2UgaGF2ZSBhIGpvaW50 IHZpcnR1YWwgaW50ZXJpbSB0b2RheS4gDQoNCkxvb2tpbmcgZm9yIHZvbHVudGVlcnMgdG8gc2Ny aWJlIG1lZXRpbmcgbm90ZXMuDQoNCkdyZWF0bHkgYXBwcmVjaWF0ZWQgaWYgd2UgY2FuIGdldCAy IHZvbHVudGVlcnMgYmVmb3JlIHRoZSBtZWV0aW5nIHN0YXJ0cyENCg0KVGh4LA0KTmVkDQoNCu+7 v09uIDEvNy8yMiwgNzowMCBBTSwgIlJBVFMgb24gYmVoYWxmIG9mIElFU0cgU2VjcmV0YXJ5IiA8 cmF0cy1ib3VuY2VzQGlldGYub3JnIG9uIGJlaGFsZiBvZiBpZXNnLXNlY3JldGFyeUBpZXRmLm9y Zz4gd3JvdGU6DQoNCiAgICBUaGUgUmVtb3RlIEFUdGVzdGF0aW9uIFByb2NlZHVyZVMgKHJhdHMp IFdHIHdpbGwgaG9sZA0KICAgIGEgdmlydHVhbCBpbnRlcmltIG1lZXRpbmcgb24gMjAyMi0wMS0y NiBmcm9tIDEwOjAwIHRvIDExOjAwIEFtZXJpY2EvTG9zX0FuZ2VsZXMgKDE4OjAwIHRvIDE5OjAw IFVUQykuDQoNCiAgICBBZ2VuZGE6DQogICAgRGlzY3VzcyBJLUQgaHR0cHM6Ly9uYW0wNi5zYWZl bGlua3MucHJvdGVjdGlvbi5vdXRsb29rLmNvbS8/dXJsPWh0dHBzJTNBJTJGJTJGZGF0YXRyYWNr ZXIuaWV0Zi5vcmclMkZkb2MlMkZkcmFmdC1iaXJraG9sei1yYXRzLXN1aXQtY2xhaW1zJTJGJmFt cDtkYXRhPTA0JTdDMDElN0NkdGhhbGVyJTQwbWljcm9zb2Z0LmNvbSU3QzQ4NDQ0ZWQ5Mzg2NDRk MmM0OTVjMDhkOWUwZWIwZDFhJTdDNzJmOTg4YmY4NmYxNDFhZjkxYWIyZDdjZDAxMWRiNDclN0Mx JTdDMCU3QzYzNzc4ODEyMzE1NDA3MDczNiU3Q1Vua25vd24lN0NUV0ZwYkdac2IzZDhleUpXSWpv aU1DNHdMakF3TURBaUxDSlFJam9pVjJsdU16SWlMQ0pCVGlJNklrMWhhV3dpTENKWFZDSTZNbjAl M0QlN0MzMDAwJmFtcDtzZGF0YT0lMkJaMGdvTjlWcVpuRHd2REFpdEVGd2xuWGtvMnVObnZNeTlU ZUZqVGIyN2MlM0QmYW1wO3Jlc2VydmVkPTAgDQoNCiAgICBJbmZvcm1hdGlvbiBhYm91dCByZW1v dGUgcGFydGljaXBhdGlvbjoNCiAgICBSZW1vdGUgcGFydGljaXBhdGlvbiBpbmZvcm1hdGlvbiB3 aWxsIGJlIG9idGFpbmVkIGF0IHRoZSB0aW1lIG9mIGFwcHJvdmFsDQoNCiAgICBKb2ludCBtZWV0 aW5nIGJldHdlZW4gUkFUUytTVUlUDQoNCiAgICBfX19fX19fX19fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fXw0KICAgIFJBVFMgbWFpbGluZyBsaXN0DQogICAgUkFUU0BpZXRm Lm9yZw0KICAgIGh0dHBzOi8vbmFtMDYuc2FmZWxpbmtzLnByb3RlY3Rpb24ub3V0bG9vay5jb20v P3VybD1odHRwcyUzQSUyRiUyRnd3dy5pZXRmLm9yZyUyRm1haWxtYW4lMkZsaXN0aW5mbyUyRnJh dHMmYW1wO2RhdGE9MDQlN0MwMSU3Q2R0aGFsZXIlNDBtaWNyb3NvZnQuY29tJTdDNDg0NDRlZDkz ODY0NGQyYzQ5NWMwOGQ5ZTBlYjBkMWElN0M3MmY5ODhiZjg2ZjE0MWFmOTFhYjJkN2NkMDExZGI0 NyU3QzElN0MwJTdDNjM3Nzg4MTIzMTU0MDcwNzM2JTdDVW5rbm93biU3Q1RXRnBiR1pzYjNkOGV5 SldJam9pTUM0d0xqQXdNREFpTENKUUlqb2lWMmx1TXpJaUxDSkJUaUk2SWsxaGFXd2lMQ0pYVkNJ Nk1uMCUzRCU3QzMwMDAmYW1wO3NkYXRhPW4wMTBZSE92eEVZQ0o1Mm1VNllJZDBRQnBDY1pFbG1y cSUyQlolMkZWQkVXeGxvJTNEJmFtcDtyZXNlcnZlZD0wDQoNCl9fX19fX19fX19fX19fX19fX19f X19fX19fX19fX19fX19fX19fX19fX19fX19fDQpSQVRTIG1haWxpbmcgbGlzdA0KUkFUU0BpZXRm Lm9yZw0KaHR0cHM6Ly9uYW0wNi5zYWZlbGlua3MucHJvdGVjdGlvbi5vdXRsb29rLmNvbS8/dXJs PWh0dHBzJTNBJTJGJTJGd3d3LmlldGYub3JnJTJGbWFpbG1hbiUyRmxpc3RpbmZvJTJGcmF0cyZh bXA7ZGF0YT0wNCU3QzAxJTdDZHRoYWxlciU0MG1pY3Jvc29mdC5jb20lN0M0ODQ0NGVkOTM4NjQ0 ZDJjNDk1YzA4ZDllMGViMGQxYSU3QzcyZjk4OGJmODZmMTQxYWY5MWFiMmQ3Y2QwMTFkYjQ3JTdD MSU3QzAlN0M2Mzc3ODgxMjMxNTQxMjA3MjAlN0NVbmtub3duJTdDVFdGcGJHWnNiM2Q4ZXlKV0lq b2lNQzR3TGpBd01EQWlMQ0pRSWpvaVYybHVNeklpTENKQlRpSTZJazFoYVd3aUxDSlhWQ0k2TW4w JTNEJTdDMzAwMCZhbXA7c2RhdGE9MUFoT1lVVTF0bjFxZm5IT25OOUxMYk04QnFQdjllTU4yY0Qz SjhsWWhFUSUzRCZhbXA7cmVzZXJ2ZWQ9MA0K From nobody Wed Jan 26 11:31:29 2022 Return-Path: X-Original-To: teep@ietfa.amsl.com Delivered-To: teep@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A0753A1D2A; Wed, 26 Jan 2022 11:31:27 -0800 (PST) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -1.883 X-Spam-Level: X-Spam-Status: No, score=-1.883 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.576, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RDNS_NONE=0.793, SPF_PASS=-0.001] autolearn=no autolearn_force=no Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=microsoft.com Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O4JFpqSN7sMm; Wed, 26 Jan 2022 11:31:25 -0800 (PST) Received: from na01-obe.outbound.protection.outlook.com (unknown [IPv6:2a01:111:f403:c110::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 13E0C3A1D28; Wed, 26 Jan 2022 11:31:25 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=bXkLlHX5nEmM1B6GqCJIUT75M3NihZUpECf4CV70q+MdxoEB1hVwYktUy4joGCA4ZIyHWlcoroFoAijfxYiC3HbCSJ50S1B3LIMbrNcARYIDj1Sp/s/ABptbKkICzzJZzZLRtOG0PeHxR7vw5WaUEPywpRUgfG46AE+fZ2Pevvg2BcWS6j8+9h8tuNWKY13AgHUYS2TRz10KygJ73hL8Z+fQ932vSu4I8+rf2nyoE7g/MfVTb8XiOsLGdu1h53ke+dloyy+lSQ2Gi1/s0debJQiQrU0eY2daNkJq8U6/zPsoIktuCpRGoN9AsOUzmcx2byzOYqUIkJH4hBFqgKtjsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Uwt3SOqt6XWtQZXMOcJN97w6EWMLBiQrGRa4Oj1PjoE=; b=eejEItEY3Dkkh7jqd6MtupRl++VUjNbgSF6FXEFH+OE6cDhjyYKnB6tPyF1riBU+3M1nrJDSbZjkbOjYUFD33DB5oTv4pXKdgWH1NEWSPVGWUpXPHeU9rlV+kKKWquPEmh+NGZXOLcqx5CXWSVBWaEcF4wdgsLLFePdh6v8gbu9zQWVDa6CUE2hklE8z9N8UJbHiliCdpSdWjexC4VCqFl3DRXqB/UWUOwGWD0LHWxv+I376p2uizx8z/8YmQqsJd6E0n5jRMBSWMBoHcboJFgu1z+1eD8p6JZVc/BqULqKQtHfE3dy1Ylt27TtrGRybFg143dUyK9Q6qOR09y/dHA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Uwt3SOqt6XWtQZXMOcJN97w6EWMLBiQrGRa4Oj1PjoE=; b=Fk/X+MgShAchxbPfX1mgov/hwYcyayybofQuR/FPchp4OtnydOUMNhutUYbNtCMEgG4RF9XJC2k7t6+hqg+ktdMX53IrSCkbqR/UkFekuXbzTTgBF9qG8k0GiHvzZdB8qIjLHt74/9muBVqicWyp3DQKSdjfp1g2PfPywk3Q4IY= Received: from CH2PR21MB1464.namprd21.prod.outlook.com (2603:10b6:610:89::16) by SJ0PR21MB1886.namprd21.prod.outlook.com (2603:10b6:a03:299::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4930.4; Wed, 26 Jan 2022 19:31:19 +0000 Received: from CH2PR21MB1464.namprd21.prod.outlook.com ([fe80::ad0c:429c:ba5d:5ba4]) by CH2PR21MB1464.namprd21.prod.outlook.com ([fe80::ad0c:429c:ba5d:5ba4%3]) with mapi id 15.20.4951.005; Wed, 26 Jan 2022 19:31:19 +0000 From: Dave Thaler To: "rats@ietf.org" , "suit@ietf.org" CC: "TEEP@ietf.org" Thread-Topic: Mapping draft-birkholz-rats-suit-claims system properties Thread-Index: AdgS6XITWPT6B91jRuKmpGOYYHzbsA== Date: Wed, 26 Jan 2022 19:31:19 +0000 Message-ID: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: msip_labels: MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ActionId=176bce1d-8d58-47bf-968f-eefc9da14b38; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_ContentBits=0; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Enabled=true; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Method=Standard; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_Name=Internal; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SetDate=2022-01-26T19:17:26Z; MSIP_Label_f42aa342-8706-4288-bd11-ebb85995028c_SiteId=72f988bf-86f1-41af-91ab-2d7cd011db47; authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=microsoft.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 65d1c276-f97e-462d-4783-08d9e1026dc9 x-ms-traffictypediagnostic: SJ0PR21MB1886:EE_ x-ms-exchange-atpmessageproperties: SA|SL x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:2733; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH2PR21MB1464.namprd21.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(4636009)(366004)(5660300002)(55016003)(33656002)(110136005)(83380400001)(52536014)(10290500003)(82950400001)(508600001)(82960400001)(71200400001)(122000001)(66556008)(64756008)(66476007)(76116006)(186003)(8990500004)(66946007)(7696005)(38100700002)(316002)(2906002)(6506007)(86362001)(450100002)(9686003)(4326008)(66446008)(38070700005)(8936002)(8676002)(20210929001); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?VKk4HXMPtKmRqxz5IGFNXKp+TqE90P9Mk0X1OIrrw7MgqnbnjAavdPCoUi+x?= =?us-ascii?Q?5QtKSCHcseb8p+E+Rf8n+fuNUu6tHnwfYTK9Yluryr5E1NOLGm45NA4tFV7k?= =?us-ascii?Q?YbmHqtw7ToYJP0VT4TAy68GNEliE4jygeQ3W0r+BmlPGQXKQ3damPYZ7M6OV?= =?us-ascii?Q?k5hIAsa+zaRbYH7u6a0Yz7YSsJwFh6lXfgIGDdZKclh2udKZe2Z4gQT9ZcTT?= =?us-ascii?Q?XRPEvkX7NYnnVRUqBqvhQ36gq9mTBXAqHzMuPtrROOV5WIV191MQd94bD3Vn?= =?us-ascii?Q?CIYqvc9gfsYTQcQQFRKFVMk+dySaycvxVFdSO/SiERop0/IO9QJTi9K7vf75?= =?us-ascii?Q?bkckWaUpbSr38i9QC1qmZo8VNWQJ/49PMQ5n9eOvlzqvf0BALo9k7kMFkyJU?= =?us-ascii?Q?C/hDO98vZJBS6xSDLrTOqyEuxHHFxqWR+04V4WL42aKaD6f+bp7SaNhg+dW2?= =?us-ascii?Q?6z/TPb2xwLLCxYcaGGjqSN8saiY5YpUjpsDcs5GL9gwMSCh37gYGUpMAD77s?= =?us-ascii?Q?AJ0FO0UinGUTdjWTveookffJAQ0Q9v0xZGj2ANQXSY8EQR1Ae8MqkgsWX8AY?= =?us-ascii?Q?eQVNjUfUXlHI4xe5Uvr1BaAeQwyVeVJtITmXBcz2eOhXMEV+rggI47hDW3q7?= =?us-ascii?Q?D5Nl3NFd3yismQe7Qt/UlC5jR8YVV6HgM44Jah2upOwkSbznI3PpM/rnSE8M?= =?us-ascii?Q?AupFHpProX46WTjKJDobrxhwDUrDNfZmIhW90obWrSqQ82SKcqEIqYw4mXO8?= =?us-ascii?Q?b12kNrso00wGCpjpUewTsSPZAxqgD+1DjsznFcuKz08+Ob4NebS8TcC9wslU?= =?us-ascii?Q?ctJGj+uU8SIJwIACHh4lbq08vcLbpsUFM86QEauWry8eiafBRuB9aqOI/X+1?= =?us-ascii?Q?aOWUfouqhIPMeMaHrcZnzQ9Y1rQJa/vMotNv31OJbz4gHxeDTIU4/j4/Y1XS?= =?us-ascii?Q?IhtEmywDCvh87kDEzTq+JbfMbA2cF1T1uTGN1fn3MH32R5bnY5TxHI7vFrpc?= =?us-ascii?Q?ObfQpxeIT+i1QzHeP9V98hYCxW/77mnsGQgaDJvv9jmGGuB8qxc+wbPsOPAp?= =?us-ascii?Q?Kz4hNsi1s1TUQPpzVRDLgugh0BasgAX33JwNffr0STxvSNteRtDu23ugRRZc?= =?us-ascii?Q?JDeNvuSdHBOLLC0YG+qOCDur7Zq+TcGag2CxsEHSlhJQDbgfq6ZguwpL7rkq?= =?us-ascii?Q?sP7B+qN14eqnlCu5wG4vYzorD9xEqXW2eoVdujwlFphFOGKY2Es6yioclVUY?= =?us-ascii?Q?3xlAjZnCaCrmw7MWI6hbB9vmWESmDpY2B9q4k+8+7QxfRlEzkPiTp70c/Nt0?= =?us-ascii?Q?wrNjGMHstQ9K6t/FiVeviMzgt03td4JxX/DvlC+BwDPz1epPujex0V1wZYc3?= =?us-ascii?Q?RRp34Om5g2wlsT/lzJ9VZSLi8wLK88RYZNM/DW1H0e/s0KqgcuVosg6yXY6r?= =?us-ascii?Q?/PH+LiEHqM6UdUm2gVpic9ZZfasnpN2OV8jJGCpUh3wAMMv3Ce/wIjP1Gy3c?= =?us-ascii?Q?sliVxPveIrcQ1QOIvE95tMYGwTjVXpzkVj96WbvEI2hl8xcsS12ynMFMiAHR?= =?us-ascii?Q?Zx5QQ3ySten3EBWqzBE6RekUVEzwNHf7BSFrQHpnbtGhxvopo/0+OHWib24C?= =?us-ascii?Q?mrUYcod7USbwtnK3t6cBWsKkj3ZCnwLZCBq0ISfRcSeif00+meNJxVaUtl60?= =?us-ascii?Q?0mliURjz3vVyXjnEA0cSyW25YbzUFoXPYMuuGIY8nA+b4599kjKhNKEyi4Up?= =?us-ascii?Q?2Q+fep+eCg=3D=3D?= Content-Type: multipart/alternative; boundary="_000_CH2PR21MB146449C0E2DFD38D79BB338BA3209CH2PR21MB1464namp_" MIME-Version: 1.0 X-OriginatorOrg: microsoft.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CH2PR21MB1464.namprd21.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 65d1c276-f97e-462d-4783-08d9e1026dc9 X-MS-Exchange-CrossTenant-originalarrivaltime: 26 Jan 2022 19:31:19.6978 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 72f988bf-86f1-41af-91ab-2d7cd011db47 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: BPfBItI2ULPACAI5DJhoWMPTiYBpgB/f7lXEjFNiyEid4InhNiu/XMxbgtx1smNO4LIEYafSokx+AsRe6cQ32OCzXn7qQnOb/Wq3ZcB3C2Y= X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR21MB1886 Archived-At: Subject: [Teep] Mapping draft-birkholz-rats-suit-claims system properties X-BeenThere: teep@ietf.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: A Protocol for Dynamic Trusted Execution Environment Enablement List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 26 Jan 2022 19:31:27 -0000 --_000_CH2PR21MB146449C0E2DFD38D79BB338BA3209CH2PR21MB1464namp_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable As requested at the end of the joint interim meeting, below is my (now upda= ted with the latest section numbers) table mapping properties between draft= -birkholz-rats-suit-claims and draft-ietf-rats-eat, and by extension draft-= ietf-sacm-coswid which EAT references for format within some claims like sw= evidence. The mapping isn't exactly 1:1 but my reading is things do map. For example= , EAT separates hw and sw properties into separate claim ids in hw vs sw clai= msets, whereas draft-birkholz-rats-suit-claims combines them by proposing t= he same claim id in both claimsets. SUIT EAT CoSWID =3D=3D=3D=3D=3D =3D=3D=3D =3D=3D=3D=3D=3D=3D 3.1.1 3.6 (hw) vendor-identifier oemid 3.21 (sw) 2.6 swevidence reg-id 3.1.2 class-identifier (no mapping) 3.1.3 3.4 device-identifier ueid 3.1.4 3.21 2.6 image-digest swevidence thumbprint 3.1.5 3.21 2.9.2 image-size swevidence size 3.1.6 3.7 (hw) version hardware-version-claims 3.9 (sw) sw-version-type Please check my work, as I believe all of above except class-identifier can be deleted from the SUIT document and just use the corresponding claims in the EAT document. Dave --_000_CH2PR21MB146449C0E2DFD38D79BB338BA3209CH2PR21MB1464namp_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

As requested at the end of the joint interim meeting= , below is my (now updated with the latest section numbers) table mapping p= roperties between draft-birkholz-rats-suit-claims and draft-ietf-rats-eat, = and by extension draft-ietf-sacm-coswid which EAT references for format within some claims like swevidence.

 

The mapping isn’t exactly 1:1 but my reading i= s things do map.  For example,

EAT separates hw and sw properties into separate cla= im ids in hw vs sw claimsets, whereas draft-birkholz-rats-suit-claims combi= nes them by proposing the same claim id in both claimsets.

 

SUIT  = ;             &= nbsp;EAT            =  CoSWID

=3D=3D=3D=3D=3D=              &n= bsp; =3D=3D=3D          &= nbsp;  =3D=3D=3D=3D=3D=3D

3.1.1 &nbs= p;             = 3.6 (hw)

vendor-identifi= er   oemid

  &nb= sp;            =      3.21 (sw)       2.6<= o:p>

  &nb= sp;            =      swevidence      reg-id

3.1.2 &nbs= p;            <= /o:p>

class-identifie= r    (no mapping)

 

3.1.3 &nbs= p;             = 3.4

device-identifi= er   ueid

 

3.1.4 &nbs= p;             = 3.21            2.6<= o:p>

image-digest&nb= sp;       swevidence     =  thumbprint

 

3.1.5 &nbs= p;             = 3.21            2.9.= 2
image-size          swevidence=      size

 

3.1.6 &nbs= p;             = 3.7 (hw)
version            &= nbsp;hardware-version-claims

  &nb= sp;             = ;    3.9 (sw)

  &nb= sp;             = ;    sw-version-type

 

Please check my work, as I believe all of above exce= pt
class-identifier can be deleted from the SUIT document
and just use the corresponding claims in the EAT document.

 

Dave

--_000_CH2PR21MB146449C0E2DFD38D79BB338BA3209CH2PR21MB1464namp_--