SIG-Arch 02/15 Canceled
Radhika Jandhyala
Hi,
The SIG-Arch meeting scheduled to be held on 02/15 is canceled as many participants will be on vacation. Thanks, Radhika |
|
Now: Open Enclave SDK SIG-Attestation Meeting Series - 02/09/2022
#cal-notice
oesdk@lists.confidentialcomputing.io Calendar <noreply@...>
Open Enclave SDK SIG-Attestation Meeting Series When: Where: Organizer: Radhika Jandhyala radhikaj@... Description:
Agenda and Minutes: https://hackmd.io/Xj6GpDSKSwuz5cZgQ0yg1A Meeting ID: 995 5293 2630 Dial by your location |
|
SIG-Arch 2/8 Canceled
Radhika Jandhyala
Hi,
The SIG-Arch meeting scheduled to be held at 10:00 AM PST on 2/8 is canceled as there are no outstanding topics to discuss. Thanks, Radhika |
|
Open Enclave v0.17.6 Release
Rob Sanchez
Hi all,
Open Enclave version 0.17.6 is released and can be found at: Release v0.17.6 * openenclave/openenclave (github.com)<https://github.com/openenclave/openenclave/releases/tag/v0.17.6> The Ubuntu 18.04/20.04 packages has been published to the production packages.microsoft.com APT repository. The Windows Server 2019 package is available on nuget.org: NuGet Gallery | open-enclave 0.17.6<https://www.nuget.org/packages/open-enclave/> Thank you so much to everyone in helping us drive and deliver this release! Please use our GitHub repo (openenclave/openenclave: SDK for developing enclaves (github.com)<https://github.com/openenclave/openenclave>) to report any issues that you may come across in your use of the SDK! Thanks, Rob Release Notes: Added * Added support FIPS-enabled OpenSSL based on SymCrypt<https://github.com/Microsoft/SymCrypt>. * Add a new library oesymcryptengine, which is a customized build of SymCrypt OpenSSL engine<https://github.com/Microsoft/SymCrypt-OpenSSL>. * To use FIPS-enabled OpenSSL with SymCrypt, users need to link their enclave against both oesymcryptengine and libsymcrypt.so (part of SymCrypt<https://github.com/Microsoft/SymCrypt> release packages) in addition to OpenSSL libraries, and include entropy.edl in the edl file. Note that libsymcrypt.so needs to be placed under the same directory with the enclave binary. * See the attested_tls sample<https://github.com/openenclave/openenclave/blob/v0.17.6/samples/attested_tls#build-and-run> for an example of building enclaves with FIPS-enabled OpenSSL based on SymCrypt (set OE_CRYPTO_LIB to openssl_symcrypt_fips). * Added support for POSIX mmap and munmap. * Enabled MUSL conf functions. * Added callback option to capture and modify enclave logs. Security * Update mbedTLS to version 2.16.12. Refer to the 2.16.12<https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.12> release notes for the set of issues addressed. * Note: 2.16 LTS is at End Of Life. mbedTLS libs included with the Open Enclave SDK will move to use the 2.28 LTS branch in the next release. 2.28.0 has certain breaking changes. To understand how these changes will impact your application, please refer to the release notes for 2.28.0<https://github.com/ARMmbed/mbedtls/releases/tag/v2.28.0>. |
|
OE SDK SIG-Arch 2/1 10:00 AM PST Canceled
Radhika Jandhyala
Hi,
OE SDK SIG-Triage for 2/1 is canceled as there are no outstanding topics to discuss. Radhika |
|
OE SDK Triage meeting for 1/31-11:00 AM PST Canceled
Radhika Jandhyala
Hi,
We are canceling this meeting as there are no untriaged issues today. Thanks, Radhika |
|
Now: Open Enclave SDK SIG-Attestation Meeting Series - 01/26/2022
#cal-notice
oesdk@lists.confidentialcomputing.io Calendar <noreply@...>
Open Enclave SDK SIG-Attestation Meeting Series When: Where: Organizer: Radhika Jandhyala radhikaj@... Description:
Agenda and Minutes: https://hackmd.io/Xj6GpDSKSwuz5cZgQ0yg1A Meeting ID: 995 5293 2630 Dial by your location |
|
SIG-Attestation 1/26 Canceled
Yen Lee
Hi,
The SIG-Attestation meeting scheduled for January 26, 2022 is cancelled as there's no outstanding topics to be discussed. Thanks, Yen |
|
SIG-Arch on 1/25 Canceled
Radhika Jandhyala
Hi,
SIG-Arch meeting scheduled for 1/25 10:00 AM PST is canceled. Thanks, Radhika |
|
SIG Arch Canceled 01/18
Radhika Jandhyala
Hi,
SIG Arch for 1/18 is canceled as there are no topics to discuss. Thanks, Radhika |
|
Now: Open Enclave SDK SIG-Attestation Meeting Series - 01/12/2022
#cal-notice
oesdk@lists.confidentialcomputing.io Calendar <noreply@...>
Open Enclave SDK SIG-Attestation Meeting Series When: Where: Organizer: Radhika Jandhyala radhikaj@... Description:
Agenda and Minutes: https://hackmd.io/Xj6GpDSKSwuz5cZgQ0yg1A Meeting ID: 995 5293 2630 Dial by your location |
|
SIG-Attestation 1/12 Canceled
Yen Lee
Hi,
The SIG-Attestation meeting scheduled for January 12, 2022 is cancelled as there's no outstanding topics to be discussed. Thanks, Yen |
|
SIG-Arch 1/11 Canceled
Radhika Jandhyala
Hi,
SIG-Arch scheduled for 1/11 is canceled as there are no outstanding topics to discuss, Thanks, Radhika |
|
OE SDK Triage for 1/10 Canceled
Radhika Jandhyala
Hi Everybody,
Canceling this occurrence as there are no untriaged issues. Thanks, Radhika |
|
SIG-Arch 1/4 Canceled
Radhika Jandhyala
Hi Everybody,
SIG-Arch scheduled for Jan 4th is canceled as there were no topics added to the agenda. Thanks, Radhika |
|
Now: Open Enclave SDK SIG-Attestation Meeting Series - 12/29/2021
#cal-notice
oesdk@lists.confidentialcomputing.io Calendar <noreply@...>
Open Enclave SDK SIG-Attestation Meeting Series When: Where: Organizer: Radhika Jandhyala radhikaj@... Description:
Agenda and Minutes: https://hackmd.io/Xj6GpDSKSwuz5cZgQ0yg1A Meeting ID: 995 5293 2630 Dial by your location |
|
Now: Open Enclave SDK SIG-Attestation Meeting Series - 12/15/2021
#cal-notice
oesdk@lists.confidentialcomputing.io Calendar <noreply@...>
Open Enclave SDK SIG-Attestation Meeting Series When: Where: Organizer: Radhika Jandhyala radhikaj@... Description:
Agenda and Minutes: https://hackmd.io/Xj6GpDSKSwuz5cZgQ0yg1A Meeting ID: 995 5293 2630 Dial by your location |
|
Open Enclave SDK v0.17.5 Release
Rob Sanchez
Hi all,
Open Enclave version 0.17.5 is released and can be found at: Release v0.17.5 * openenclave/openenclave (github.com)<https://github.com/openenclave/openenclave/releases/tag/v0.17.5> The Ubuntu 18.04/20.04 packages has been published to the production packages.microsoft.com APT repository. The Windows Server 2019 package is available on nuget.org: NuGet Gallery | open-enclave 0.17.5<https://www.nuget.org/packages/open-enclave/> Thank you so much to everyone in helping us drive and deliver this release! Please use our GitHub repo (openenclave/openenclave: SDK for developing enclaves (github.com)<https://github.com/openenclave/openenclave>) to report any issues that you may come across in your use of the SDK! Thanks, Rob ________________________________ Release Notes: Added - Added MUSL time functions asctime, asctime_r, ctime, ctime_r, ftime, localtime, localtime_r, strptime, timespec_get, wcsftime Changed - Fix bug with incorrect layout of thread-local sections (tbss and tdata). Previous releases of OE had a bug where these sections will be laid out incorrectly in some cases where the tbss section had a lower alignment value than tdata section. - OpenSSL is now built with threads support (with the dependency on the host). Note that the previous versions of OpenSSL are not suitable for multi-threaded applications. |
|
Re: SIG-Arch 12/7 Canceled
Radhika Jandhyala
Correcting the date for the triage meeting in 2022. It is scheduled for 1/3/2022(Monday).
toggle quoted message
Show quoted text
-----Original Message-----
From: oesdk@... <oesdk@...> On Behalf Of Radhika Jandhyala via lists.confidentialcomputing.io Sent: Monday, December 6, 2021 11:17 AM To: oesdk@... Subject: [EXTERNAL] [oesdk] SIG-Arch 12/7 Canceled Hi, The SIG-Arch meeting scheduled for 12/7 is canceled. All public meetings for Open Enclave SDK are canceled for the rest of the year. Our first meeting in the new year will be the Triage and Community Meeting scheduled for 1/2/2022. Thanks, Radhika |
|
CFP: FOSDEM 2022 (Online) - Hardware-Aided Trusted Computing Devroom
Jo Van Bulck <jo.vanbulck@...>
Dear OpenEnclave community,
As you may or may not know, we are organizing the 3th (online) edition of a "hardware-aided trusted computing" devroom at the upcoming FOSDEM 22 conference. FOSDEM is one of the biggest open-source events in the world, which is attended each year by thousands of open-source enthusiasts, users, and contributors. The next FOSDEM will necessarily take place online, 5-6 February 2022. Last year OE was well represented on the devroom, and I personally think OE is one of the prominent and ambitious TEE open-source projects, so I just wanted to point you attention to this opportunity. This year's online edition allows to present your exciting open-source TEE research projects to a worldwide broad community and maybe even find new followers or contributors. The submission deadline for talk proposals (it can be a short title and abstract of a few sentences) is 23 December 2021, but you are encouraged to submit proposals asap to help organization going smooth. The talk recordings for accepted talks would be prepared first half of January, and the conference with live Q&A is Feb 5 2022. You can find the full CFP here (also pasted below for convenience): https://falder.org/fosdem22-cfp Feel free to reach out with any questions you may have. Best regards and wishing you all a happy end of the year! Jo —————— 8<—————— # FOSDEM 2022 (Online) - Hardware-Aided Trusted Computing Devroom Call For Participation -------- Submission deadline : 23/12/2021 -------- ## About FOSDEM [FOSDEM](https://fosdem.org/2022/) is a free event for software developers to meet, share ideas and collaborate. Every year, thousands of developers of free and open source software from all over the world gather at the event in Brussels. In 2022, they will again gather online. FOSDEM is free to attend. There is no registration. ## Devroom overview and objectives Following the success of [last year's edition](https://archive.fosdem.org/2021/schedule/track/hardware_aided_trusted_computing/), we are for the 3rd time organizing a devroom devoted to the emerging open-source ecosystem around *hardware-based Trusted Execution Environments (TEEs)*. Under TEEs, we understand architectures that allow to isolate and attest trusted "enclave" software components running on top of a potentially compromised operating system. Over the last years, all major processor vendors have developed some form of TEE support, e.g., Intel's [Software Guard Extensions (SGX)](https://software.intel.com/content/www/us/en/develop/topics/software-guard-extensions.html) and [Trust Domain Extensions (TDX)](https://software.intel.com/content/www/us/en/develop/articles/intel-trust-domain-extensions.html), ARM's [TrustZone](https://developer.arm.com/ip-products/security-ip/trustzone) and upcoming [Confidential Compute Architecture (Arm CCA)](https://developer.arm.com/architectures/architecture-security-features/confidential-computing) as well as [Morello](https://developer.arm.com/architectures/cpu-architecture/a-profile/morello), AMD's [Secure Encrypted Virtualization (SEV)](https://developer.amd.com/sev/) and upcoming SEV-ES/SEV-SNP extensions, and IBM's [Protected Execution Facility (PEF)](https://www.kernel.org/doc/html/latest/powerpc/ultravisor.html). Hence, with today's mainstream consumer hardware being increasingly shipped with these advanced trusted computing technologies, this devroom wants to foster discussion on the much-needed open-source TEE ecosystem amongst industry players, academics, enthusiasts, hobbyists, and project maintainers. ## Desirable topics The devroom's topics of interest include, but are not limited to: * Programming frameworks for TEEs: how to develop free and open-source software that can run inside enclaves (e.g., library OSs, SDKs, Linux kernel support, etc.). * Compiler and language support for emerging trusted hardware extensions. * Open-source enclave processor designs (e.g., RISC-V TEEs). * Use cases and applications on top of TEEs. * TEE-specific attacks and defenses: reverse engineering, side-channels, vulnerabilities, exploits. * Vision: future TEEs (what is missed, proposals, wishes, discussions). ## New old rules: What (unfortunately) did not change since last year For obvious reasons, the event will still not take place in a physical location but online. * The reference time will again be [Brussels local lime (CET)](https://www.timeanddate.com/worldclock/belgium/brussels). * Talks will be pre-recorded in advance, and streamed during the event. If your talk is selected, you can expect a recording deadline around January 15. * Q/A session will be take live. * A facility will be provided for people watching to chat between themselves. * A facility will be provided for people watching to submit questions. * Once your talk was accepted, we will assign you a deputy to help you to produce the pre-recorded content. * During the stream of your talk, you must be available online for the Q/A session We had interesting discussions after the talks of last year, so we hope that this format will work well again. ## Key dates * Submission deadline: 23 December 2021 * Announcement of selected talks: 31 December 2021 * Deadline for the pre-recorded talks: Around January 15, 2022 * Conference dates 5 & 6 February 2022 **(online)** * Hardware-Aided Trusted Computing devroom date: Saturday 5 February 2022 **(online)** ## Submit a talk proposal Submissions are required to proceed through the [FOSDEM 2022 Pentabarf website](https://penta.fosdem.org/submission/FOSDEM22). If you do not know how to use Pentabarf yet, you can [read a beginner's guide here](https://medium.com/@maartjeme/beginners-guide-to-pentabarf-78808a1ce5bf). Your submission must include the following information: * Your contact email. * The title (and possible subtitle) of your talk: please be descriptive, as the audience will have to choose to attend your talk out of a listing with ~500 talks from other projects at FOSDEM. * Select "Hardware-Aided Trusted Computing devroom" as the track. * A short abstract of one paragraph. * A longer description if you wish to do so. * Links to related websites / blogs etc. You should target a talk duration of 20 minutes (pre-recorded) with 5 mins of live Q&A (leaves us with 5 mins change over for talks). ## Contact and organizers * Main organizer: Fritz Alder (fritz.alder@...) * Devroom URL on the FOSDEM website: <https://fosdem.org/2022/schedule/track/hardware_aided_trusted_computing/> * The devroom is supported by the [Confidential Computing Consortium](https://confidentialcomputing.io/). —————— 8<—————— |
|