Date   

All SIG Meetings canceled for the rest of 2020

Radhika Jandhyala
 

Hi everybody

As most people are out for the holidays, all SIG meetings including triage, arch, testing and attestation meetings are canceled for the rest of 2020. We will resume meetings as scheduled on the project calendar in January.

Thanks,
Radhika


Release: v0.13.0

Radhika Jandhyala
 

Hi Everybody

The 0.13.0 version of the Open Enclave SDK has been released.

You can find the release page for v0.13.0 in the link below, where you can download the packages/sources and find the changelog:

https://github.com/openenclave/openenclave/releases/tag/v0.13.0

For the Ubuntu 16.04 and 18.04 packages: they will be published to the production packages.microsoft.com APT repo (for each distro) later this week.

For the Windows NuGet packages: They will be on nuget.org later this week, but for now you can download the NuGet packages available in the "Assets" field in release link above.

Thank you so much to everyone in helping us drive and deliver this release! Please use our GitHub repo to report any issues that you may come across in your use of the SDK!

Thanks,
Radhika


From: Radhika Jandhyala
Sent: Thursday, December 10, 2020 8:54 PM
To: oesdk@lists.confidentialcomputing.io
Subject: Release: v0.13.0 RC2


Hi Everybody,



You can find the RC2 packages on GitHub below under the v0.13.0-rc2 tag:

https://github.com/openenclave/openenclave/releases<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fopenenclave%2Fopenenclave%2Freleases&data=04%7C01%7Cradhikaj%40microsoft.com%7Cee8691b885c74130597d08d884df9e03%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637405443245640784%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=RkKy6I2YDSLU1%2BxfQo%2BRs1od391lAQBgP43PCIJ29BE%3D&reserved=0>



Please test these packages and let us know if you come across any issues. Thank you so much for your help!



Issues fixed since RC1

* #3767<https://github.com/openenclave/openenclave/pull/3767> fixes a compiler warning observed while compiling the attested_tls sample on Windows. It has not been merged into master that the time of this release.
* #3772<https://github.com/openenclave/openenclave/pull/3772> fixes an illegal instruction problem observed on NUC7PJYH as described in #3762<https://github.com/openenclave/openenclave/issues/3762>



Thanks,

Radhika


From: Radhika Jandhyala
Sent: Tuesday, December 8, 2020 3:58 PM
To: oesdk@lists.confidentialcomputing.io<mailto:oesdk@lists.confidentialcomputing.io>
Subject: Release: v0.13.0 RC1

Hi,


Open Enclave version 0.13.0 will soon be published, and we want to send out some release candidate packages (for Windows Server 2016 and 2019, Ubuntu 16.04/18.04) for pre-release testing. You can find the release candidate packages on GitHub below under the v0.13.0-rc1 tag:

https://github.com/openenclave/openenclave/releases<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fopenenclave%2Fopenenclave%2Freleases&data=02%7C01%7Cradhikaj%40microsoft.com%7C9b906ec7b73c4fa7da1808d7a0826790%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637154354265332253&sdata=e0DQ36Qk5d2DJ3DrkM0ZjYzzPODpk8%2BjfpqD3tja1Ls%3D&reserved=0>

Please test these packages and let us know if you come across any issues. Thank you so much for your help!

To the Committers of the OE SDK: Please let us know if we have missed anything in the release notes. We should update our CHANGELOG if so.

Thank you so much to everyone in helping us drive and deliver this release! Please use our GitHub repo to report any issues that you may come across in your use of the SDK!

Thanks
Radhika


Release notes
-------------------
Breaking Changes

* liboecryptombed is now called liboecryptombedtls and will no longer be automatically included as a link dependency when linking liboeenclave in CMake.
* The openenclave-config.cmake and openenclave-lvi-mitigation-config.cmake will not specify the renamed liboecryptombedtls as a PUBLIC link requirement for liboeenclave.
* Enclave apps that are built with CMake and use the Open Enclave's CMake configurations must now explicitly include OE crypto wrapper library when linking openenclave::oeenclave.
* See the CMakeLists.txt in the helloworld sample for an example. Here OE_CRYPTO_LIB is set to mbedtls in parent CMakeList file.
* Enclave apps that are built with Make and rely on Open Enclave's pkgconfig must now explicitly include OE crypto wrapper library in linker dependency flags.
* See the Makefile in the helloworld sample for an example. Here OE_CRYPTO_LIB is set to mbedtls in parent MakeList file.

Added

* OpenSSL version 1.1.1 libraries are now available for an enclave to use. See the attested_tls sample<https://github.com/openenclave/openenclave/blob/v0.13.0-rc1/samples/attested_tls#build-and-run> for an example of building enclaves with OpenSSL.
* Enabled oe_verify_evidence() with a NULL format id to verify the legacy report generated by oe_get_report().
* Added the following SGX attestation claims from oe_verify_evidence():
OE_CLAIM_SGX_PF_GP_EXINFO_ENABLED
OE_CLAIM_SGX_ISV_EXTENDED_PRODUCT_ID
OE_CLAIM_SGX_IS_MODE64BIT
OE_CLAIM_SGX_HAS_PROVISION_KEY
OE_CLAIM_SGX_HAS_EINITTOKEN_KEY
OE_CLAIM_SGX_USES_KSS
OE_CLAIM_SGX_CONFIG_ID
OE_CLAIM_SGX_CONFIG_SVN
OE_CLAIM_SGX_ISV_FAMILY_ID
Added the following fields for SGX KSS (Key Separation and Sharing) support:
FamilyID
ExtendedProductID

Changed

* Syscalls are internally dispatched directly to their implementation functions instead of via a switch-case.

Known issues

Please note that these will be fixed in the final v0.13.x release

* #3767<https://github.com/openenclave/openenclave/pull/3767> fixes a compiler warning observed while compiling the attested_tls sample on Windows. It has not been merged into master that the time of this release.
* #3772<https://github.com/openenclave/openenclave/pull/3772> has been merged into master but is not included in this RC release. It fixes an illegal instruction problem observed on NUC7PJYH as described in #3762<https://github.com/openenclave/openenclave/issues/3762>

As called out in the v0.12.0 release, the following are being deprecated:

* The Open Enclave SDK will be dropping support for Ubuntu 16.04 after Dec 2020.
Developers and partners using Ubuntu 16.04 will need to move to using Ubuntu 18.04 by then.
#3625<https://github.com/openenclave/openenclave/issues/3625> tracks this.
* The Open Enclave SDK will be dropping support for WS2016 after Dec 2020.
Developers and partners using WS2016 will need to move to using WS2019 by then.
#3539<https://github.com/openenclave/openenclave/issues/3539> tracks this.
* The Open Enclave SDK is deprecating support for gcc while building the SDK from source after Dec 2020.
The recommended compiler while building the SDK from source is Clang.
#3555<https://github.com/openenclave/openenclave/issues/3555> tracks this.


SIG-Attestation meetings cancelled

Yen Lee
 

Hi,



Most of the people are already on vacation and there's no immediate topic to discuss. All SIG-Attestation meetings for the rest of the year will be cancelled. The next SIG-Attestation meeting will be on 1/6/2021.



Happy holidays.



Yen


Release: v0.13.0 RC2

Radhika Jandhyala
 

Hi Everybody,



You can find the RC2 packages on GitHub below under the v0.13.0-rc2 tag:

https://github.com/openenclave/openenclave/releases<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fopenenclave%2Fopenenclave%2Freleases&data=04%7C01%7Cradhikaj%40microsoft.com%7Cee8691b885c74130597d08d884df9e03%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637405443245640784%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=RkKy6I2YDSLU1%2BxfQo%2BRs1od391lAQBgP43PCIJ29BE%3D&reserved=0>



Please test these packages and let us know if you come across any issues. Thank you so much for your help!



Issues fixed since RC1

* #3767<https://github.com/openenclave/openenclave/pull/3767> fixes a compiler warning observed while compiling the attested_tls sample on Windows. It has not been merged into master that the time of this release.
* #3772<https://github.com/openenclave/openenclave/pull/3772> fixes an illegal instruction problem observed on NUC7PJYH as described in #3762<https://github.com/openenclave/openenclave/issues/3762>



Thanks,

Radhika


From: Radhika Jandhyala
Sent: Tuesday, December 8, 2020 3:58 PM
To: oesdk@lists.confidentialcomputing.io
Subject: Release: v0.13.0 RC1

Hi,


Open Enclave version 0.13.0 will soon be published, and we want to send out some release candidate packages (for Windows Server 2016 and 2019, Ubuntu 16.04/18.04) for pre-release testing. You can find the release candidate packages on GitHub below under the v0.13.0-rc1 tag:

https://github.com/openenclave/openenclave/releases<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fopenenclave%2Fopenenclave%2Freleases&data=02%7C01%7Cradhikaj%40microsoft.com%7C9b906ec7b73c4fa7da1808d7a0826790%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637154354265332253&sdata=e0DQ36Qk5d2DJ3DrkM0ZjYzzPODpk8%2BjfpqD3tja1Ls%3D&reserved=0>

Please test these packages and let us know if you come across any issues. Thank you so much for your help!

To the Committers of the OE SDK: Please let us know if we have missed anything in the release notes. We should update our CHANGELOG if so.

Thank you so much to everyone in helping us drive and deliver this release! Please use our GitHub repo to report any issues that you may come across in your use of the SDK!

Thanks
Radhika


Release notes
-------------------
Breaking Changes

* liboecryptombed is now called liboecryptombedtls and will no longer be automatically included as a link dependency when linking liboeenclave in CMake.
* The openenclave-config.cmake and openenclave-lvi-mitigation-config.cmake will not specify the renamed liboecryptombedtls as a PUBLIC link requirement for liboeenclave.
* Enclave apps that are built with CMake and use the Open Enclave's CMake configurations must now explicitly include OE crypto wrapper library when linking openenclave::oeenclave.
* See the CMakeLists.txt in the helloworld sample for an example. Here OE_CRYPTO_LIB is set to mbedtls in parent CMakeList file.
* Enclave apps that are built with Make and rely on Open Enclave's pkgconfig must now explicitly include OE crypto wrapper library in linker dependency flags.
* See the Makefile in the helloworld sample for an example. Here OE_CRYPTO_LIB is set to mbedtls in parent MakeList file.

Added

* OpenSSL version 1.1.1 libraries are now available for an enclave to use. See the attested_tls sample<https://github.com/openenclave/openenclave/blob/v0.13.0-rc1/samples/attested_tls#build-and-run> for an example of building enclaves with OpenSSL.
* Enabled oe_verify_evidence() with a NULL format id to verify the legacy report generated by oe_get_report().
* Added the following SGX attestation claims from oe_verify_evidence():
OE_CLAIM_SGX_PF_GP_EXINFO_ENABLED
OE_CLAIM_SGX_ISV_EXTENDED_PRODUCT_ID
OE_CLAIM_SGX_IS_MODE64BIT
OE_CLAIM_SGX_HAS_PROVISION_KEY
OE_CLAIM_SGX_HAS_EINITTOKEN_KEY
OE_CLAIM_SGX_USES_KSS
OE_CLAIM_SGX_CONFIG_ID
OE_CLAIM_SGX_CONFIG_SVN
OE_CLAIM_SGX_ISV_FAMILY_ID
Added the following fields for SGX KSS (Key Separation and Sharing) support:
FamilyID
ExtendedProductID

Changed

* Syscalls are internally dispatched directly to their implementation functions instead of via a switch-case.

Known issues

Please note that these will be fixed in the final v0.13.x release

* #3767<https://github.com/openenclave/openenclave/pull/3767> fixes a compiler warning observed while compiling the attested_tls sample on Windows. It has not been merged into master that the time of this release.
* #3772<https://github.com/openenclave/openenclave/pull/3772> has been merged into master but is not included in this RC release. It fixes an illegal instruction problem observed on NUC7PJYH as described in #3762<https://github.com/openenclave/openenclave/issues/3762>

As called out in the v0.12.0 release, the following are being deprecated:

* The Open Enclave SDK will be dropping support for Ubuntu 16.04 after Dec 2020.
Developers and partners using Ubuntu 16.04 will need to move to using Ubuntu 18.04 by then.
#3625<https://github.com/openenclave/openenclave/issues/3625> tracks this.
* The Open Enclave SDK will be dropping support for WS2016 after Dec 2020.
Developers and partners using WS2016 will need to move to using WS2019 by then.
#3539<https://github.com/openenclave/openenclave/issues/3539> tracks this.
* The Open Enclave SDK is deprecating support for gcc while building the SDK from source after Dec 2020.
The recommended compiler while building the SDK from source is Clang.
#3555<https://github.com/openenclave/openenclave/issues/3555> tracks this.


Open Enclave SDK SIG-Attestation Meeting Series - Wed, 12/09/2020 #cal-notice

oesdk@lists.confidentialcomputing.io Calendar <noreply@...>
 

Open Enclave SDK SIG-Attestation Meeting Series

When:
Wednesday, 9 December 2020
10:00am to 11:00am
(GMT-08:00) America/Los Angeles

Where:
https://zoom.us/j/99552932630?pwd=d1NCR2FkS2gwY0w3Wm9aK096cXZzUT09

Organizer:
radhikaj@...

Description:
Please join us for technical discussions related Attestation in the Open Enclave SDK.

Join Zoom Meeting
https://zoom.us/j/99552932630?pwd=d1NCR2FkS2gwY0w3Wm9aK096cXZzUT09

 

Agenda and Minutes:  https://hackmd.io/Xj6GpDSKSwuz5cZgQ0yg1A

Meeting ID: 995 5293 2630
Password: 010209
One tap mobile
+12532158782,,99552932630#,,1#,010209# US (Tacoma)
+13462487799,,99552932630#,,1#,010209# US (Houston)

Dial by your location
        +1 253 215 8782 US (Tacoma)
        +1 346 248 7799 US (Houston)
        +1 669 900 6833 US (San Jose)
        +1 312 626 6799 US (Chicago)
        +1 929 205 6099 US (New York)
        +1 301 715 8592 US (Germantown)
        877 853 5247 US Toll-free
        888 788 0099 US Toll-free
Meeting ID: 995 5293 2630
Password: 010209
Find your local number: https://zoom.us/u/au4r6sLy7


Release: v0.13.0 RC1

Radhika Jandhyala
 

Hi,


Open Enclave version 0.13.0 will soon be published, and we want to send out some release candidate packages (for Windows Server 2016 and 2019, Ubuntu 16.04/18.04) for pre-release testing. You can find the release candidate packages on GitHub below under the v0.13.0-rc1 tag:

https://github.com/openenclave/openenclave/releases<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fopenenclave%2Fopenenclave%2Freleases&data=02%7C01%7Cradhikaj%40microsoft.com%7C9b906ec7b73c4fa7da1808d7a0826790%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637154354265332253&sdata=e0DQ36Qk5d2DJ3DrkM0ZjYzzPODpk8%2BjfpqD3tja1Ls%3D&reserved=0>

Please test these packages and let us know if you come across any issues. Thank you so much for your help!

To the Committers of the OE SDK: Please let us know if we have missed anything in the release notes. We should update our CHANGELOG if so.

Thank you so much to everyone in helping us drive and deliver this release! Please use our GitHub repo to report any issues that you may come across in your use of the SDK!

Thanks
Radhika


Release notes
-------------------
Breaking Changes

* liboecryptombed is now called liboecryptombedtls and will no longer be automatically included as a link dependency when linking liboeenclave in CMake.
* The openenclave-config.cmake and openenclave-lvi-mitigation-config.cmake will not specify the renamed liboecryptombedtls as a PUBLIC link requirement for liboeenclave.
* Enclave apps that are built with CMake and use the Open Enclave's CMake configurations must now explicitly include OE crypto wrapper library when linking openenclave::oeenclave.
* See the CMakeLists.txt in the helloworld sample for an example. Here OE_CRYPTO_LIB is set to mbedtls in parent CMakeList file.
* Enclave apps that are built with Make and rely on Open Enclave's pkgconfig must now explicitly include OE crypto wrapper library in linker dependency flags.
* See the Makefile in the helloworld sample for an example. Here OE_CRYPTO_LIB is set to mbedtls in parent MakeList file.

Added

* OpenSSL version 1.1.1 libraries are now available for an enclave to use. See the attested_tls sample<https://github.com/openenclave/openenclave/blob/v0.13.0-rc1/samples/attested_tls#build-and-run> for an example of building enclaves with OpenSSL.
* Enabled oe_verify_evidence() with a NULL format id to verify the legacy report generated by oe_get_report().
* Added the following SGX attestation claims from oe_verify_evidence():
OE_CLAIM_SGX_PF_GP_EXINFO_ENABLED
OE_CLAIM_SGX_ISV_EXTENDED_PRODUCT_ID
OE_CLAIM_SGX_IS_MODE64BIT
OE_CLAIM_SGX_HAS_PROVISION_KEY
OE_CLAIM_SGX_HAS_EINITTOKEN_KEY
OE_CLAIM_SGX_USES_KSS
OE_CLAIM_SGX_CONFIG_ID
OE_CLAIM_SGX_CONFIG_SVN
OE_CLAIM_SGX_ISV_FAMILY_ID
Added the following fields for SGX KSS (Key Separation and Sharing) support:
FamilyID
ExtendedProductID

Changed

* Syscalls are internally dispatched directly to their implementation functions instead of via a switch-case.

Known issues

Please note that these will be fixed in the final v0.13.x release

* #3767<https://github.com/openenclave/openenclave/pull/3767> fixes a compiler warning observed while compiling the attested_tls sample on Windows. It has not been merged into master that the time of this release.
* #3772<https://github.com/openenclave/openenclave/pull/3772> has been merged into master but is not included in this RC release. It fixes an illegal instruction problem observed on NUC7PJYH as described in #3762<https://github.com/openenclave/openenclave/issues/3762>

As called out in the v0.12.0 release, the following are being deprecated:

* The Open Enclave SDK will be dropping support for Ubuntu 16.04 after Dec 2020.
Developers and partners using Ubuntu 16.04 will need to move to using Ubuntu 18.04 by then.
#3625<https://github.com/openenclave/openenclave/issues/3625> tracks this.
* The Open Enclave SDK will be dropping support for WS2016 after Dec 2020.
Developers and partners using WS2016 will need to move to using WS2019 by then.
#3539<https://github.com/openenclave/openenclave/issues/3539> tracks this.
* The Open Enclave SDK is deprecating support for gcc while building the SDK from source after Dec 2020.
The recommended compiler while building the SDK from source is Clang.
#3555<https://github.com/openenclave/openenclave/issues/3555> tracks this.


SIG-Attestation on 12/9 10:00 AM PST Canceled

Yen Lee
 

Hi,



The SIG-Attestation meeting scheduled for 10:00 AM PST 12/9 is canceled.



Thanks,



Yen


SIG-Arch on 12/8 5:00 PM PST Canceled

Radhika Jandhyala
 

Hi,

The SIG-Arch meeting scheduled for 5:00 PM PST 12/8 is canceled.

Thanks,
Radhika


Open Enclave SDK SIG-Attestation Meeting Series - Wed, 12/02/2020 #cal-notice

oesdk@lists.confidentialcomputing.io Calendar <noreply@...>
 

Open Enclave SDK SIG-Attestation Meeting Series

When:
Wednesday, 2 December 2020
10:00am to 11:00am
(GMT-08:00) America/Los Angeles

Where:
https://zoom.us/j/99552932630?pwd=d1NCR2FkS2gwY0w3Wm9aK096cXZzUT09

Organizer:
radhikaj@...

Description:
Please join us for technical discussions related Attestation in the Open Enclave SDK.

Join Zoom Meeting
https://zoom.us/j/99552932630?pwd=d1NCR2FkS2gwY0w3Wm9aK096cXZzUT09

 

Agenda and Minutes:  https://hackmd.io/Xj6GpDSKSwuz5cZgQ0yg1A

Meeting ID: 995 5293 2630
Password: 010209
One tap mobile
+12532158782,,99552932630#,,1#,010209# US (Tacoma)
+13462487799,,99552932630#,,1#,010209# US (Houston)

Dial by your location
        +1 253 215 8782 US (Tacoma)
        +1 346 248 7799 US (Houston)
        +1 669 900 6833 US (San Jose)
        +1 312 626 6799 US (Chicago)
        +1 929 205 6099 US (New York)
        +1 301 715 8592 US (Germantown)
        877 853 5247 US Toll-free
        888 788 0099 US Toll-free
Meeting ID: 995 5293 2630
Password: 010209
Find your local number: https://zoom.us/u/au4r6sLy7


5:30 PM PST SIG Testing Canceled

Radhika Jandhyala
 

Hi

The SiG Testing meeting scheduled for Dec 1st Is canceled.

Thanks
Radhika


Re: Marblerun - a service mesh for CC based on OE

Vikas Bhatia <Vikas.Bhatia@...>
 

Congratulations Felix and team! This is great!

-----Original Message-----
From: oesdk@lists.confidentialcomputing.io <oesdk@lists.confidentialcomputing.io> On Behalf Of Felix Schuster via lists.confidentialcomputing.io
Sent: Thursday, November 26, 2020 2:05 AM
To: oesdk@lists.confidentialcomputing.io
Subject: [EXTERNAL] [oesdk] Marblerun - a service mesh for CC based on OE

Hi everyone,

As you may or may not know, we at Edgeless Systems are building tools and apps with OE. (Thanks for the great work! :)

We are happy to share that we released our latest OE-based product as open source this week: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fmarblerun.sh%2F&;data=04%7C01%7CVikas.Bhatia%40microsoft.com%7Ca03a813e55994aab78ca08d8923e3f0a%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C1%7C637420144433244559%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=YZMspzYunEDB0X2z0rdqMdyT%2FA0H7BC1wmc39cUsDDw%3D&amp;reserved=0
In a nutshell, Marblerun is a “service mesh for CC”. It is written in 100% Go (our Edgeless RT brings support for Go to OE) and makes it easy to deploy, scale, and verify distributed OE-based applications on SGX-enabled Kubernetes. The website has demo video for AKS for a scalable web app and there is also a mini series of blog posts that discusses key concepts: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fedgelesssys.medium.com%2F&;data=04%7C01%7CVikas.Bhatia%40microsoft.com%7Ca03a813e55994aab78ca08d8923e3f0a%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C1%7C637420144433244559%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=HuwzuK6h4uoCsNVUete9az2Ee7OGF8WqgGMkFInNAFM%3D&amp;reserved=0

We hope you’ll find this interesting/useful and look forward to any issues, PRs, or stars.

Cheers,

Felix

--
Dr.-Ing. Felix Schuster
Managing Director & Co-Founder

[cid:image001.png@01D6C3CE.B9BFEA90]

Edgeless Systems GmbH
https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fedgeless.systems%2F&;data=04%7C01%7CVikas.Bhatia%40microsoft.com%7Ca03a813e55994aab78ca08d8923e3f0a%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C1%7C637420144433244559%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=vzmzp4HkzMU%2FMKsKyGKNgRnFIvc2nQ6%2B8s7%2FlRklu5o%3D&amp;reserved=0

fs@edgeless.systems<mailto:fs@edgeless.systems>
+49 1523 7323190

Castroper Str. 12
44791 Bochum, Germany


Marblerun - a service mesh for CC based on OE

Felix Schuster
 

Hi everyone,

As you may or may not know, we at Edgeless Systems are building tools and apps with OE. (Thanks for the great work! :)

We are happy to share that we released our latest OE-based product as open source this week: https://marblerun.sh/
In a nutshell, Marblerun is a “service mesh for CC”. It is written in 100% Go (our Edgeless RT brings support for Go to OE) and makes it easy to deploy, scale, and verify distributed OE-based applications on SGX-enabled Kubernetes. The website has demo video for AKS for a scalable web app and there is also a mini series of blog posts that discusses key concepts: https://edgelesssys.medium.com/

We hope you’ll find this interesting/useful and look forward to any issues, PRs, or stars.

Cheers,

Felix

--
Dr.-Ing. Felix Schuster
Managing Director & Co-Founder

[cid:image001.png@01D6C3CE.B9BFEA90]

Edgeless Systems GmbH
https://edgeless.systems/

fs@edgeless.systems<mailto:fs@edgeless.systems>
+49 1523 7323190

Castroper Str. 12
44791 Bochum, Germany


Open Enclave SDK SIG-Attestation Meeting Series - Wed, 11/25/2020 #cal-notice

oesdk@lists.confidentialcomputing.io Calendar <noreply@...>
 

Open Enclave SDK SIG-Attestation Meeting Series

When:
Wednesday, 25 November 2020
10:00am to 11:00am
(GMT-08:00) America/Los Angeles

Where:
https://zoom.us/j/99552932630?pwd=d1NCR2FkS2gwY0w3Wm9aK096cXZzUT09

Organizer:
radhikaj@...

Description:
Please join us for technical discussions related Attestation in the Open Enclave SDK.

Join Zoom Meeting
https://zoom.us/j/99552932630?pwd=d1NCR2FkS2gwY0w3Wm9aK096cXZzUT09

 

Agenda and Minutes:  https://hackmd.io/Xj6GpDSKSwuz5cZgQ0yg1A

Meeting ID: 995 5293 2630
Password: 010209
One tap mobile
+12532158782,,99552932630#,,1#,010209# US (Tacoma)
+13462487799,,99552932630#,,1#,010209# US (Houston)

Dial by your location
        +1 253 215 8782 US (Tacoma)
        +1 346 248 7799 US (Houston)
        +1 669 900 6833 US (San Jose)
        +1 312 626 6799 US (Chicago)
        +1 929 205 6099 US (New York)
        +1 301 715 8592 US (Germantown)
        877 853 5247 US Toll-free
        888 788 0099 US Toll-free
Meeting ID: 995 5293 2630
Password: 010209
Find your local number: https://zoom.us/u/au4r6sLy7


SIG-Attestation meeting next week (11/25) will be cancelled

Yen Lee
 

Hi,



Many people will be out next week so we will cancel the SIG-Attestation meeting scheduled for next Wednesday (11/25).



Thanks,
Yen


Open Enclave SDK SIG-Attestation Meeting Series - Wed, 11/18/2020 #cal-notice

oesdk@lists.confidentialcomputing.io Calendar <noreply@...>
 

Open Enclave SDK SIG-Attestation Meeting Series

When:
Wednesday, 18 November 2020
10:00am to 11:00am
(GMT-08:00) America/Los Angeles

Where:
https://zoom.us/j/99552932630?pwd=d1NCR2FkS2gwY0w3Wm9aK096cXZzUT09

Organizer:
radhikaj@...

Description:
Please join us for technical discussions related Attestation in the Open Enclave SDK.

Join Zoom Meeting
https://zoom.us/j/99552932630?pwd=d1NCR2FkS2gwY0w3Wm9aK096cXZzUT09

 

Agenda and Minutes:  https://hackmd.io/Xj6GpDSKSwuz5cZgQ0yg1A

Meeting ID: 995 5293 2630
Password: 010209
One tap mobile
+12532158782,,99552932630#,,1#,010209# US (Tacoma)
+13462487799,,99552932630#,,1#,010209# US (Houston)

Dial by your location
        +1 253 215 8782 US (Tacoma)
        +1 346 248 7799 US (Houston)
        +1 669 900 6833 US (San Jose)
        +1 312 626 6799 US (Chicago)
        +1 929 205 6099 US (New York)
        +1 301 715 8592 US (Germantown)
        877 853 5247 US Toll-free
        888 788 0099 US Toll-free
Meeting ID: 995 5293 2630
Password: 010209
Find your local number: https://zoom.us/u/au4r6sLy7


Community Survey for Open enclave SDK Project

Radhika Jandhyala
 

Hi Everybody,

The Confidential Computing Consortium(CCC) has created a community survey for the Open Enclave SDK Project. We request you to fill out OE SDK Project - CCC Community Survey<https://www.surveymonkey.com/r/DX2RQ8R> to share your experience with the OE SDK project.

Thanks,
Radhika


SIG-Arch today(11/17) at 5:30 PM PST

Radhika Jandhyala
 

Hi,

Instead of a SIG-Testing meeting, we will have a SIG-Architecture meeting today.


The agenda is here: https://hackmd.io/@aeva/oesdk-sig-arch.



Join Zoom Meeting
https://zoom.us/j/95309871627?pwd=K1RmbmZtUUowNFhRbWFZRVN4R2VmUT09

Meeting ID: 953 0987 1627
Password: 208079
One tap mobile
+12532158782,,95309871627#,,1#,208079# US (Tacoma)
+16699006833,,95309871627#,,1#,208079# US (San Jose)

Dial by your location
+1 253 215 8782 US (Tacoma)
+1 669 900 6833 US (San Jose)
+1 346 248 7799 US (Houston)
+1 301 715 8592 US (Germantown)
+1 312 626 6799 US (Chicago)
+1 929 205 6099 US (New York)
888 788 0099 US Toll-free
877 853 5247 US Toll-free
Meeting ID: 953 0987 1627
Password: 208079
Find your local number: https://zoom.us/u/abCkV8PQIw
Thanks,
Radhika


Open Enclave SDK SIG-Attestation Meeting Series - Wed, 11/11/2020 #cal-notice

oesdk@lists.confidentialcomputing.io Calendar <noreply@...>
 

Open Enclave SDK SIG-Attestation Meeting Series

When:
Wednesday, 11 November 2020
10:00am to 11:00am
(GMT-08:00) America/Los Angeles

Where:
https://zoom.us/j/99552932630?pwd=d1NCR2FkS2gwY0w3Wm9aK096cXZzUT09

Organizer:
radhikaj@...

Description:
Please join us for technical discussions related Attestation in the Open Enclave SDK.

Join Zoom Meeting
https://zoom.us/j/99552932630?pwd=d1NCR2FkS2gwY0w3Wm9aK096cXZzUT09

 

Agenda and Minutes:  https://hackmd.io/Xj6GpDSKSwuz5cZgQ0yg1A

Meeting ID: 995 5293 2630
Password: 010209
One tap mobile
+12532158782,,99552932630#,,1#,010209# US (Tacoma)
+13462487799,,99552932630#,,1#,010209# US (Houston)

Dial by your location
        +1 253 215 8782 US (Tacoma)
        +1 346 248 7799 US (Houston)
        +1 669 900 6833 US (San Jose)
        +1 312 626 6799 US (Chicago)
        +1 929 205 6099 US (New York)
        +1 301 715 8592 US (Germantown)
        877 853 5247 US Toll-free
        888 788 0099 US Toll-free
Meeting ID: 995 5293 2630
Password: 010209
Find your local number: https://zoom.us/u/au4r6sLy7


Re: CCC Webinar - Confidential Computing: Protecting Applications and Data in Use

Radhika Jandhyala
 

Thanks Dave and Nicolae.

I am pasting the summary below:

Today, data is often encrypted at rest in storage and in transit across the network, but not while in use in memory. Organizations that handle sensitive data such as Personally Identifiable Information (PII), financial data, or health information need to mitigate threats that target the confidentiality and integrity of either the application or the data in system memory.

In this webinar, experts from the Confidential Computing Consortium (CCC) will define confidential computing, discuss how businesses are using confidential computing today, and review the ecosystem of solutions and open-source projects available to enable applications to make use of confidential computing.

Key topics covered in the webinar include:
--------------------------------------------------------
The Confidential Computing definition and comparison to related technologies
Key properties of Trusted Execution Environments (TEEs) to look for
Threats mitigated by Confidential Computing technologies
Utilization paradigms: using application SDKs vs. runtime deployment systems
The ecosystem available to support confidential computing application development
Common real-world use cases for Confidential Computing

Speakers:
-------------
Moderator - Seth Knox, VP of Marketing, Fortanix (Outreach Chair)
Intro to CCC - Stephen Walli, Principal Program Manager, Microsoft (Board Chair)
CC Key Properties - Dave Thaler, Software Architect, Microsoft (TAC Chair)
Threats Mitigated - Mike Bursell, Chief Security Architect, Red Hat
Ecosystem - Aeva Black, Open Source Program Manager, Microsoft
Use Cases - Nelly Porter, Lead Product Manager, Google

-----Original Message-----
From: Dave Thaler <dthaler@microsoft.com>
Sent: Wednesday, November 4, 2020 10:36 AM
To: oesdk@lists.confidentialcomputing.io; nicolae@canarybit.eu; Radhika Jandhyala <radhikaj@microsoft.com>
Subject: RE: [oesdk] CCC Webinar - Confidential Computing: Protecting Applications and Data in Use

The registration link in Radhika's email works for me, again it should be https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fconfidentialcomputing.io%2Fwebinar%2F&;data=04%7C01%7Cradhikaj%40microsoft.com%7Ccec8a523c71544fa8eac08d880f0708f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637401117454223641%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=WgPHSkS3UQmkH0qzDtZ9UeecMjx%2BD5Si8Fr6TiszU2s%3D&amp;reserved=0

-----Original Message-----
From: oesdk@lists.confidentialcomputing.io <oesdk@lists.confidentialcomputing.io> On Behalf Of Nicolae Paladi via lists.confidentialcomputing.io
Sent: Wednesday, November 4, 2020 1:53 AM
To: oesdk@lists.confidentialcomputing.io; Radhika Jandhyala <radhikaj@microsoft.com>
Subject: Re: [oesdk] CCC Webinar - Confidential Computing: Protecting Applications and Data in Use

Hi Radhika,
thank you for the invite;
The registration link seems to be broken, I get a 404.
The link for the agenda is fine.

Best regards,
Nicolae

On 3 Nov 2020, at 23:48, Radhika Jandhyala via lists.confidentialcomputing.io <radhikaj=microsoft.com@lists.confidentialcomputing.io> wrote:

Hi Everybody,

You are invited to attend the Confidential Computing Consortium (CCC) webinar "Confidential Computing: Protecting Applications and Data in Use".

In this webinar, experts from the CCC will define confidential computing, discuss how businesses are using Confidential Computing today, and review the ecosystem of solutions and open-source projects available to enable applications to make use of confidential computing.

Key topics covered in the webinar include:

* The Confidential Computing definition and comparison to related technologies
* Key properties of Trusted Execution Environments (TEEs) to look for
* Threats mitigated by Confidential Computing technologies
* Utilization paradigms: using application SDKs vs. runtime deployment systems
* The ecosystem available to support confidential computing application development
* Common real-world use cases for Confidential Computing

The webinar will take place live on Tuesday, November 10th, 2020 at 8:30AM Pacific Time (4:30PM BST) and will be recorded for on-demand viewing. If you would like to attend live or received a link to the recording after the event, please register now.

Registration page : https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fconfidentialcomputing.io%2Fwebinar%2F&;data=04%7C01%7Cradhikaj%40microsoft.com%7Ccec8a523c71544fa8eac08d880f0708f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637401117454223641%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=WgPHSkS3UQmkH0qzDtZ9UeecMjx%2BD5Si8Fr6TiszU2s%3D&amp;reserved=0<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fconfidentialcomputing.io%2Fwebinar%2F&;data=04%7C01%7Cradhikaj%40microsoft.com%7Ccec8a523c71544fa8eac08d880f0708f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637401117454223641%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=WgPHSkS3UQmkH0qzDtZ9UeecMjx%2BD5Si8Fr6TiszU2s%3D&amp;reserved=0>

Agenda: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.google.com%2Fdocument%2Fd%2F1jvgt5PRwvs402aEYmMQgitauiKW71EZRsZwn71Zvj70%2Fedit%3Fusp%3Dsharing&;data=04%7C01%7Cradhikaj%40microsoft.com%7Ccec8a523c71544fa8eac08d880f0708f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637401117454223641%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=8F%2Bsy%2BKmi2CsLl2Rv5lzhf5jaqfTBFaS4IUQcO4L%2BUw%3D&amp;reserved=0<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.google.com%2Fdocument%2Fd%2F1jvgt5PRwvs402aEYmMQgitauiKW71EZRsZwn71Zvj70%2Fedit%3Fusp%3Dsharing&;data=04%7C01%7Cradhikaj%40microsoft.com%7Ccec8a523c71544fa8eac08d880f0708f%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637401117454223641%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=8F%2Bsy%2BKmi2CsLl2Rv5lzhf5jaqfTBFaS4IUQcO4L%2BUw%3D&amp;reserved=0>

Thanks,
Radhika







Re: CCC Webinar - Confidential Computing: Protecting Applications and Data in Use

Dave Thaler
 

The registration link in Radhika's email works for me, again it should be https://confidentialcomputing.io/webinar/

-----Original Message-----
From: oesdk@lists.confidentialcomputing.io <oesdk@lists.confidentialcomputing.io> On Behalf Of Nicolae Paladi via lists.confidentialcomputing.io
Sent: Wednesday, November 4, 2020 1:53 AM
To: oesdk@lists.confidentialcomputing.io; Radhika Jandhyala <radhikaj@microsoft.com>
Subject: Re: [oesdk] CCC Webinar - Confidential Computing: Protecting Applications and Data in Use

Hi Radhika,
thank you for the invite;
The registration link seems to be broken, I get a 404.
The link for the agenda is fine.

Best regards,
Nicolae

On 3 Nov 2020, at 23:48, Radhika Jandhyala via lists.confidentialcomputing.io <radhikaj=microsoft.com@lists.confidentialcomputing.io> wrote:

Hi Everybody,

You are invited to attend the Confidential Computing Consortium (CCC) webinar "Confidential Computing: Protecting Applications and Data in Use".

In this webinar, experts from the CCC will define confidential computing, discuss how businesses are using Confidential Computing today, and review the ecosystem of solutions and open-source projects available to enable applications to make use of confidential computing.

Key topics covered in the webinar include:

* The Confidential Computing definition and comparison to related technologies
* Key properties of Trusted Execution Environments (TEEs) to look for
* Threats mitigated by Confidential Computing technologies
* Utilization paradigms: using application SDKs vs. runtime deployment systems
* The ecosystem available to support confidential computing application development
* Common real-world use cases for Confidential Computing

The webinar will take place live on Tuesday, November 10th, 2020 at 8:30AM Pacific Time (4:30PM BST) and will be recorded for on-demand viewing. If you would like to attend live or received a link to the recording after the event, please register now.

Registration page : https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fconfidentialcomputing.io%2Fwebinar%2F&;data=04%7C01%7Cdthaler%40microsoft.com%7C8270d70d17ab4631e4d708d880e9ecb6%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637401089473616057%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=OGRjZeexXCNVBwfYQw0P7tUqg9sa2Z9PMI%2F26hW0Kno%3D&amp;reserved=0<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fconfidentialcomputing.io%2Fwebinar%2F&;data=04%7C01%7Cdthaler%40microsoft.com%7C8270d70d17ab4631e4d708d880e9ecb6%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637401089473616057%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=OGRjZeexXCNVBwfYQw0P7tUqg9sa2Z9PMI%2F26hW0Kno%3D&amp;reserved=0>

Agenda: https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.google.com%2Fdocument%2Fd%2F1jvgt5PRwvs402aEYmMQgitauiKW71EZRsZwn71Zvj70%2Fedit%3Fusp%3Dsharing&;data=04%7C01%7Cdthaler%40microsoft.com%7C8270d70d17ab4631e4d708d880e9ecb6%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637401089473616057%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=1V%2FQI4G0Kie%2Fj7lHmgGwGaR%2FfIG6E3UeQn3yxMHzkgE%3D&amp;reserved=0<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.google.com%2Fdocument%2Fd%2F1jvgt5PRwvs402aEYmMQgitauiKW71EZRsZwn71Zvj70%2Fedit%3Fusp%3Dsharing&;data=04%7C01%7Cdthaler%40microsoft.com%7C8270d70d17ab4631e4d708d880e9ecb6%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637401089473616057%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&amp;sdata=1V%2FQI4G0Kie%2Fj7lHmgGwGaR%2FfIG6E3UeQn3yxMHzkgE%3D&amp;reserved=0>

Thanks,
Radhika






101 - 120 of 227