[Acme] Re: [Rats] Re: Re: Questions about draft-liu-acme-rats-02
Carl Wallace <carl@redhoundsoftware.com> Mon, 15 December 2025 17:52 UTC
Return-Path: <carl@redhoundsoftware.com>
X-Original-To: acme@mail2.ietf.org
Delivered-To: acme@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 06E8D9AD411F for <acme@mail2.ietf.org>; Mon, 15 Dec 2025 09:52:25 -0800 (PST)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.098
X-Spam-Level:
X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=redhoundsoftware.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Nt5xHx5fiyee for <acme@mail2.ietf.org>; Mon, 15 Dec 2025 09:52:24 -0800 (PST)
Received: from mail-qv1-xf36.google.com (mail-qv1-xf36.google.com [IPv6:2607:f8b0:4864:20::f36]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 4356A9AD410D for <acme@ietf.org>; Mon, 15 Dec 2025 09:52:24 -0800 (PST)
Received: by mail-qv1-xf36.google.com with SMTP id 6a1803df08f44-88a346c284fso15938216d6.3 for <acme@ietf.org>; Mon, 15 Dec 2025 09:52:24 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhoundsoftware.com; s=google; t=1765821143; x=1766425943; darn=ietf.org; h=mime-version:in-reply-to:references:thread-topic:message-id:cc:to :from:subject:date:user-agent:from:to:cc:subject:date:message-id :reply-to; bh=+pjstthJUOcl4WWePxbqfO1uBlCvh3Ww7EOYggvrcyU=; b=zi2U/ZJyRYYse3k5m/GEzH9kSSXNhVNzOS2R0QyDiD+l6XjCvTS5QZO7Qeq+344Qvg YdSF4MhZzZTHIngLUf6Ij41k7RmP4fNjQnLoTPFWLi0xJ6eOPu++GMB2iB1qpKg0SH3z cCEzSG5E/RveWNKw2rmFg0Pwd0WAB6upUAMNA=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1765821143; x=1766425943; h=mime-version:in-reply-to:references:thread-topic:message-id:cc:to :from:subject:date:user-agent:x-gm-gg:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=+pjstthJUOcl4WWePxbqfO1uBlCvh3Ww7EOYggvrcyU=; b=bFvZmGAf/qypAWtkUDu3VaWBlevP7xr902DX+d8MDLcbeA4uaoA5r+c70Q/3sKqfsZ F+TehVz448FFOrZBaKC9/Q1DQrQpKEBT5Nz3uTI2E0TALQDhtvp2BZm76P842nXWdlK6 XqwCjrpTZIOZ8187CixW017XdS87enUPXgjFl1k6VbhwsyOSzGZP2buG+mJoXwaKIGT0 GFAMNTz6WXe1P9Pg9QxIOnpyb/7KLY80z2r6/izuiR8FXnH/oILsV75AoM4RiG1mhSiH oQrvN1RhbGwrXslxpdtTjY1G2dUg5Kmj7x6PiZx6e5qTMQVfkXg5MS8stAnTJgZhWnFf CRiA==
X-Forwarded-Encrypted: i=1; AJvYcCVNxChlLKWvZwHH1onkNPyN6KPR/++tW4t2a5kQlEUFYcvqDPQgRrxvYn9WNXuxM15cXiV+@ietf.org
X-Gm-Message-State: AOJu0YyzbBctVFpQdrCn4PCA7LHMqCKTMC5fpWXwe+2uXdM3FVbFmvn7 pLDSt4AhVUWddV0RrbrXhnsJr+WJUOLLL5c8TIW9PNTDIUqekkcZIIh/mtcwfoNU8OU=
X-Gm-Gg: AY/fxX5PAtneMI8HN/VIVKII3MbdOpHxPLMFLQHSd3vijjfuvek5Zs0dRfOCzNCl8Vu Izk+ibAhj/otX2pZ+3jJh8scUcoePJDMTYr7GM8AFyS57DcVVKJltyNc17v/zmD9KQqyTOteHMf 5+uZ1X1oo8e14Hn6DPqRzuAgFHMmjsZd++zPJR0prLtAPU80cl+3/xqEdQMUJdxU+VakjYTT04N 9mB5DLskc/zWXHhrRsjE5nIN6siQdkap77qQFwB9slw2q65J1LvOxFyXvwFVEA8nEN92qqlONUL Uuqcglc35APWZqHovlcFT5DU64nYgLJCFeCF70bk2TLnfIZ1tNwHZw7oYtXTixI5iskYIsylfyz EPwkOepEWBxxlGG7wGdnKeQGvcaytBBlnaD3pA35T8JI7oVAmNzYraYKXFpHTu5CB3mW25jLyeD WBFHHwocVXl9neBVbqwMmYrX5LG5gpUlYSRQ5d195sPynONJg2peTFEUrNFeCxSirzuDWIIPp3H nfb8huotQ==
X-Google-Smtp-Source: AGHT+IHRsFvlpFJEc/sh1tuPMERMsD75Uo9/LSwgCYOvgnHyBqd0tQIlbvAYjv4hqSaRfMcgdL612A==
X-Received: by 2002:a05:6214:3203:b0:87c:2c76:62a1 with SMTP id 6a1803df08f44-8887e16de4dmr170893966d6.67.1765821143226; Mon, 15 Dec 2025 09:52:23 -0800 (PST)
Received: from [192.168.4.77] (pool-96-255-232-167.washdc.fios.verizon.net. [96.255.232.167]) by smtp.gmail.com with ESMTPSA id 6a1803df08f44-889a860ffebsm60189216d6.57.2025.12.15.09.52.22 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Mon, 15 Dec 2025 09:52:22 -0800 (PST)
User-Agent: Microsoft-MacOutlook/16.103.25120717
Date: Mon, 15 Dec 2025 12:52:22 -0500
From: Carl Wallace <carl@redhoundsoftware.com>
To: Mike Ounsworth <ounsworth+ietf@gmail.com>, Henk Birkholz <henk.birkholz@ietf.contact>
Message-ID: <2570078A-230F-478A-9D9F-53976A14D118@redhoundsoftware.com>
Thread-Topic: [Rats] Re: [Acme] Re: Questions about draft-liu-acme-rats-02
References: <CA+1=6ye8ceCG_VuSWvP=oNwGW0nRxfcKvcWjbzWc5iXUwfur8A@mail.gmail.com> <96713eab0aa7472d974e4bbc920356fc@huawei.com> <CA+1=6ycm5zDKxr0sq9NqaHPvxViVRDQsphDjN6EmbYqO-DtCuA@mail.gmail.com> <14921.1765223805@obiwan.sandelman.ca> <CAKZgXHqkR=Lz78i8P5iSiiHs3RfDFXQ-05v=sPDokVDgRrJd2A@mail.gmail.com> <CA+1=6ychLfgiX3e3GLOar3fawk1008kUgjR2hb6Un6h5ae4Gig@mail.gmail.com> <CAKZgXHq_TVuxf4p5Ua90V0Vztj+t7JHRADQK3EfDXHL3+LMaJg@mail.gmail.com> <CA+1=6ydTZbVUdJGMEH4JKxzAGr6hn21hG1tyKsda_XeKConDVw@mail.gmail.com> <17220f4e-b795-487f-a54a-bb76d9efdfc7@ietf.contact> <CAKZgXHr7f7Ytu6jE8L0qSpKNKDPwknmQROQiEPCD29xEJM7u0Q@mail.gmail.com>
In-Reply-To: <CAKZgXHr7f7Ytu6jE8L0qSpKNKDPwknmQROQiEPCD29xEJM7u0Q@mail.gmail.com>
Mime-version: 1.0
Content-type: multipart/alternative; boundary="B_3848647942_1861064009"
Message-ID-Hash: AG7CNLEDFTNS7OL7O4EGWERVNY4QZWQJ
X-Message-ID-Hash: AG7CNLEDFTNS7OL7O4EGWERVNY4QZWQJ
X-MailFrom: carl@redhoundsoftware.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-acme.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Thomas Fossati <thomas.fossati@linaro.org>, Michael Richardson <mcr+ietf@sandelman.ca>, "acme@ietf.org" <acme@ietf.org>, RATS <rats@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [Acme] Re: [Rats] Re: Re: Questions about draft-liu-acme-rats-02
List-Id: Automated Certificate Management Environment <acme.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/acme/yfQN-bJtYjl3ZYNE3JH4qwcD3Bs>
List-Archive: <https://mailarchive.ietf.org/arch/browse/acme>
List-Help: <mailto:acme-request@ietf.org?subject=help>
List-Owner: <mailto:acme-owner@ietf.org>
List-Post: <mailto:acme@ietf.org>
List-Subscribe: <mailto:acme-join@ietf.org>
List-Unsubscribe: <mailto:acme-leave@ietf.org>
Inline… From: Mike Ounsworth <ounsworth+ietf@gmail.com> Date: Monday, December 15, 2025 at 12:24 PM To: Henk Birkholz <henk.birkholz@ietf.contact> Cc: Thomas Fossati <thomas.fossati@linaro.org>, Michael Richardson <mcr+ietf@sandelman.ca>, "acme@ietf.org" <acme@ietf.org>, RATS <rats@ietf.org> Subject: [Rats] Re: [Acme] Re: Questions about draft-liu-acme-rats-02 Hi Henk. I am going to make a maybe bold statement here. I have seen Evidence -- I've played with TPM attestation, I've seen PSA Tokens, I'm designing the PKIX-Key-Attest format. But I have never seen an AR. [CW] You have in the form of an API call that processes an attestation in your relying party with an integrated verifier. I've never actually held one in my hand. I find these discussions about what features should and should not be supported for ARs to be rather too abstract. [CW] +1 For example, would an AR satisfying the question "Prove that the device's secure boot chain is intact" be syntactically and semantically interoperable with one satisfying the question "Prove that the device is joined to the Corp Domain and that the currently logged-in user matches the CN in the cert request". Given that I have never actually seen an AR, I don't even know how to start thinking about this question. On Thu, 11 Dec 2025 at 03:19, Henk Birkholz <henk.birkholz@ietf.contact> wrote: On 10.12.25 17:07, Thomas Fossati wrote: > On Tue, 9 Dec 2025 at 16:28, Mike Ounsworth wrote: >> [...] >> Good point about requiring some kind of coordination between ACME and >> RATS layers. One example, is that I've been pushing that this draft >> include some sort of hint whereby the ACME Server can specify what >> property it needs attested -- ex.: some cert profiles might require >> proof that the private key is in a FIPS 140-3 module, while others >> might require attestation of the serial number of the device, while >> others might require proof that you are running the corporate >> anti-virus and which Windows domain user is currently logged-in. To >> your point: any mechanisms that accomplishes this will involve some >> bleed-through -- ie the ACME Server and Client will need at least some >> "RATS-awareness". > > Yes, that would likely simplify the appraisal policy for attestation > results, albeit at the cost of a more "coupled" Verifier. Perhaps, > before we start minting new ad hoc claims though, I suggest we should try to > see what can be achieved within the boundaries of the AR4SI information > model -- also adding specific new categories where appropriate (e.g., > "key protection" seems like a useful new AR4SI bucket). I'd like to put some emphasis on the importance of the topic that Thomas brought up here. Minimizing the number of AR Claims and designing them for re-use is crucial for RATS interoperability (and thereby simpler and also re-usable appraisal policies for ARs across systems and platforms). I really understand the appeal of "adding your claims to the list and be done", but if everybody does this it will ultimately lead to distinct appraisal procedures where every application will come (up) with its dedicated Claims sets that will be very hard to be re-used and interoped with, long term. AR4SI's approach is to design a Claims set layout that allows for semantic interoperability across applications and platforms. Requiring only simple policy, it already allows to be interpreted as a simple bool - even if multiple Claims with detailed values are expressed: as long as all of them are in the "affirming bucket" the whole AR can be appraised as "OK". If you require more detail appraisal for AR, the values in the trust vectors can be subject to more complex policy. This is very much in support of the Relying Party empathy that Mark is looking for. _______________________________________________ RATS mailing list -- rats@ietf.org To unsubscribe send an email to rats-leave@ietf.org
- [Acme] Questions about draft-liu-acme-rats-02 Thomas Fossati
- [Acme] Re: Questions about draft-liu-acme-rats-02 Liuchunchi(Peter)
- [Acme] Re: Questions about draft-liu-acme-rats-02 Thomas Fossati
- [Acme] Re: Questions about draft-liu-acme-rats-02 Michael Richardson
- [Acme] Re: Questions about draft-liu-acme-rats-02 Michael Richardson
- [Acme] Re: Questions about draft-liu-acme-rats-02 Mike Ounsworth
- [Acme] Re: Questions about draft-liu-acme-rats-02 Thomas Fossati
- [Acme] Re: Questions about draft-liu-acme-rats-02 Thomas Fossati
- [Acme] Re: Questions about draft-liu-acme-rats-02 Mike Ounsworth
- [Acme] Re: Questions about draft-liu-acme-rats-02 Michael Richardson
- [Acme] Re: Questions about draft-liu-acme-rats-02 Thomas Fossati
- [Acme] Re: Questions about draft-liu-acme-rats-02 Thomas Fossati
- [Acme] Re: [Rats] Re: Re: Questions about draft-l… Henk Birkholz
- [Acme] Re: [Rats] Re: Re: Questions about draft-l… Mike Ounsworth
- [Acme] Re: [Rats] Re: Re: Questions about draft-l… Michael Richardson
- [Acme] Re: Questions about draft-liu-acme-rats-02 Michael Richardson
- [Acme] Re: [Rats] Re: Re: Questions about draft-l… Carl Wallace
- [Acme] Re: Questions about draft-liu-acme-rats-02 Michael Richardson
- [Acme] Re: [Rats] Re: Re: Questions about draft-l… Henk Birkholz
- [Acme] Re: [Rats] Re: Re: Questions about draft-l… Thomas Fossati