Re: [CFRG] [EXTERNAL] pq firmware signing question

"Scott Fluhrer (sfluhrer)" <sfluhrer@cisco.com> Sun, 17 March 2024 21:56 UTC

Return-Path: <sfluhrer@cisco.com>
X-Original-To: cfrg@ietfa.amsl.com
Delivered-To: cfrg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AA916C14F603 for <cfrg@ietfa.amsl.com>; Sun, 17 Mar 2024 14:56:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -11.894
X-Spam-Level:
X-Spam-Status: No, score=-11.894 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, T_SPF_HELO_PERMERROR=0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0WJ5YIt8HKSf for <cfrg@ietfa.amsl.com>; Sun, 17 Mar 2024 14:56:02 -0700 (PDT)
Received: from alln-iport-8.cisco.com (alln-iport-8.cisco.com [173.37.142.95]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B408CC14F5FC for <Cfrg@irtf.org>; Sun, 17 Mar 2024 14:56:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; i=@cisco.com; l=10438; q=dns/txt; s=iport; t=1710712562; x=1711922162; h=from:to:subject:date:message-id:references:in-reply-to: mime-version; bh=XTHfxK6vmeOWgItYXM5hY13Ux2dnaKZ642dZhwgEKLg=; b=KYdN7JH45dj8FB//WM9jLENtkmRFA95p8afGUq/yAsB7ME+zARNNkvOd VcFMFrWA2gxvmmHB9l1J98NneJG7HklbTazKfXrtjigfChjol705ASI+G WiWG0Biswx7isue7Raa6lJ1AriKuAk9e4/+x7/abwg+CKPIv/oRjhu2E6 M=;
X-CSE-ConnectionGUID: EkOmwLS2TdCD/9IzygOQhA==
X-CSE-MsgGUID: 5+HrD11CTleRgyszBzHlpw==
X-IPAS-Result: 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
IronPort-PHdr: A9a23:b+MNzR181iqeY8cGsmDPY1BlVkEcU/3cNwoR7N8gk71RN/3l9JX5N 0uZ7vJo3xfFXoTevupNkPGe87vhVmoJ/YubvTgcfYZNWR4IhYRenwEpDMOfT0yuBPXrdCc9W s9FUQwt5Gm1ZHBcA922fFjOuju35D8WFA/4MF9uKODoGpTfley81vu5/NvYZAAbzDa4aKl5e Q2/th6Z9tFDm4ZgJ60tghfIuS5OfOJbhCtkcFmShB37oMy3+fZe
IronPort-Data: A9a23:hWzdWKB6uHuB7BVW/1vjw5YqxClBgxIJ4kV8jS/XYbTApGl31mEHy WAXUDjQP/ffMTShL49wYN+1/EoB78OEmNNjOVdlrnsFo1CmBibm6XV1Cm+qYkt+++WaFBoPA /02M4SGdIZsCCaE+n9BC5C5xVFkz6aEW7HgP+DNPyF1VGdMRTwo4f5Zs7ZRbrVA357hXGthh fuo+5eDYAT8hGYuWo4pw/vrRC1H7ayaVAww5jTSVdgT1HfCmn8cCo4oJK3ZBxMUlaENQ4ZW7 86apF2I1juxEyUFU7tJoZ6nGqE+eYM+CCDV4pZgtwdOtTAZzsA6+v5T2PPx8i67gR3R9zx64 I0lWZBd1W7FM4WU8NnxXSW0HAlTPopD55v8e0SzmuDUnmzUYnTL+vVHWRRe0Y0woo6bAElH8 fgebTsKdB3G16S9wamwTa9ngcFLwMvDZdxE/Co+i2iCS696GPgvQI2SjTNc9Cw+gt1OB/vET 8EYcjFoKh/HZnWjP39NU8tlxbvx2ySXnztw9RG1v4ZuukPvyAFL36n2IvDHWtiSWpAA9qqfj jmbpzuiWE5y2Mak4RGL6H2Eh/XTk2X8Qo16KVGj3vduhFvWzWsJBVhGE1C6uvK+zEW5XrqzN nD45AIDro8362iQFOXxdDH/8V+WrxE7Ytp5RrhSBB629oLY5AOQB24hRzFHacA7uMJeedDM/ gHR9z8OLWI12IB5WU6gGqGoQSRe0BX5wEcLYSsCCAAC+dSm8Mc4jwnESZBoF6vdYjzJ9dPYn GjiQMsW3ul7YSs3O0OTpwyvb9WE/cWhc+LNzl+LNl9JFysgDGJfW6Sm6ELA8dFLJ5uDQ1+Ks RAswpfHtL9WVcvSxH3cEI3h+Y1FAd7YblUwZnYyT/EcG8iFphZPgKgJuW4ueh01Wir6UW+xP ic/Rj+9FLcIYSP1NvUoC25AI88r1qPnXc/0TezZa8EGY556Mme6ENJGOyatM5TWuBF0y8kXY M7DGe71VCpyIfo8llKeGbxCuYLHMwhjnws/s7ihkUT+uVdfDVbIIYo43KymMLBkt/3f/FqLm zudXuPToyhivCTFSnC/2aYYLEsBKj4wApWeliCdXrfrztZOcI35N8Ls/A==
IronPort-HdrOrdr: A9a23:NCy46qCCQ+U4dyzlHej+sseALOsnbusQ8zAXPh9KOH9om52j9/ xGws576fatskdvZJhBo7y90dq7MA3hHP9OkMQs1NiZLXLbUQeTXeVfBM7ZskHd8k7Fh6JgPM VbAtJD4bTLZDAQ47eZkWyF+pQbsaS6GcuT9IHjJgJWPHlXgtZbnn5E42igYypLbTgDL6AUUL Cb4c1KrSehf3M4UuSXb0NuY8Hz4/fwuNbDexApOz4LgTPisdqv0tHHOind+i1bfyJEwL8k/2 SAuRf+/L+fv/ayzQKZ/3PP7rxN8eGRhOdrNYipsIw4Oz/sggGnaMBKQLuZpg04p+mp9RIDjM TMmRE9JM5+gkmhP11d4CGdmzUI4gxeqUMK+mXoxEcLZvaJAA7SPvAxxr6xtCGprHbI8usMlp 6jlFjpxqa/RSmw7BgVoeK4GC2DUiGP0CIfeSl5tQ0HbaIOLLBWtoAR50VTDdMJGz/78pkuFK 10ANjb/+s+SyLTU5n1hBgY/DWXZAV7Ij6WBkwZ/sCF2Tlfm350i0Me2cwEh38FsJYwUYNN6e jIOrlh0OgmdL5dUYttQOMaBcenAG3ERhzBdGqUPFT8DakCf3bAsYT+7rk57PyjPJYI0Jwxkp LcV04wjx94R2v+TcmVmJFb+BHER2uwGTzr18FF/pB8/qbxQbL6WBfzP2zGU/HQ18n3LverLs pbYqgmcMMLBVGea7p04w==
X-Talos-CUID: 9a23:85RTpmMVHo88O+5DdSpA8VEwIZoZflbxiybxMV63Ll9pYejA
X-Talos-MUID: 9a23:aW7QpQualkd0VgxBis2n2XJCLusxuo+SDE03noQdqeOWFShoJGLI
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-8.cisco.com ([173.36.13.141]) by alln-iport-8.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 Mar 2024 21:56:01 +0000
Received: from alln-opgw-1.cisco.com (alln-opgw-1.cisco.com [173.37.147.229]) by alln-core-8.cisco.com (8.15.2/8.15.2) with ESMTPS id 42HLu1sj027644 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <Cfrg@irtf.org>; Sun, 17 Mar 2024 21:56:01 GMT
X-CSE-ConnectionGUID: eOY/kwn3QqK2Qw1uLKsc8A==
X-CSE-MsgGUID: OhUu6WKZQACVHfgA1mIHqQ==
Authentication-Results: alln-opgw-1.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=sfluhrer@cisco.com; dmarc=pass (p=reject dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="6.07,133,1708387200"; d="scan'208,217";a="26312113"
Received: from mail-co1nam11lp2169.outbound.protection.outlook.com (HELO NAM11-CO1-obe.outbound.protection.outlook.com) ([104.47.56.169]) by alln-opgw-1.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 Mar 2024 21:56:01 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=YX/rvhOx0WISisIJy95Dx35CVlxZii02egtwSQTyUW1TU4YR6iu01EqXiODPtNGAq+6aUPQlZauKIJI2UjUt21OhJ6td5HS312yOBRrR+i6bYi8wdxzaVqArDsU/G5MJUVdL6kC3N5NSbgT6G0paKH1uQaxjGhSqq00Gd9DgfSlexpLPKpyIrh4wmDiAxIybv9aM7CWtLw3T71MYB79nn8u0oC+wNU8J/c2Y1gcpH5SbkRlO/RDPCiV+jezfefWzZmV2MhoA2Pt9dsq93qwrum/YdZ2xn7a/qx5jKk7Y5ZAwOJAtPJ7huYaqWXXOO+TL4WioTpGr/hEIUHYV1uxl6Q==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=XTHfxK6vmeOWgItYXM5hY13Ux2dnaKZ642dZhwgEKLg=; b=ZVK5of9crGtAaKGY4+zFnepFIxW78Q/3j2w+4npDOSrYm9xNrfXwfGlQpVEjF2VUnka/Fee38XY7jmpEqm1GndS6glHwCsmEKBqlGHNG6FzQkgkZLMnZrtQOHRkDgFwLYhfEzr/IZjibv62b6qTJy0LLzvqVhGyB5VhI8isKVxY1LrgVluhvmq73A6GLLMGb4YThn6F0k2pkprWszpae7Abl4h6narvWC1ObI0TsPkTIxnaOnD6ldfC39Me3YnHX8Sb8dwP6WLQ336p2HHvygsNQv7iLQ/9DA2gvDRbuch22KFeCTIl4gToYxbgiDIx9ew1rbJHAbLXkSKIzzPovtg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
Received: from CH0PR11MB5444.namprd11.prod.outlook.com (2603:10b6:610:d3::13) by SJ2PR11MB8369.namprd11.prod.outlook.com (2603:10b6:a03:53d::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7386.20; Sun, 17 Mar 2024 21:55:57 +0000
Received: from CH0PR11MB5444.namprd11.prod.outlook.com ([fe80::f061:a0b9:4a91:b27c]) by CH0PR11MB5444.namprd11.prod.outlook.com ([fe80::f061:a0b9:4a91:b27c%7]) with mapi id 15.20.7409.010; Sun, 17 Mar 2024 21:55:57 +0000
From: "Scott Fluhrer (sfluhrer)" <sfluhrer@cisco.com>
To: Mike Ounsworth <Mike.Ounsworth=40entrust.com@dmarc.ietf.org>, Stephen Farrell <stephen.farrell@cs.tcd.ie>, "cfrg@irtf.org" <Cfrg@irtf.org>
Thread-Topic: [CFRG] [EXTERNAL] pq firmware signing question
Thread-Index: AQHaeLSV6cIMtIWGb0SQZ4MOnb9HLLE8ejPw
Date: Sun, 17 Mar 2024 21:55:57 +0000
Message-ID: <CH0PR11MB5444D732D1619268DB3353B8C12E2@CH0PR11MB5444.namprd11.prod.outlook.com>
References: <73126498-47c2-4f8a-9425-18a3d9cce22c@cs.tcd.ie> <CH0PR11MB5739FD074FF5337C8E4E3DFB9F2E2@CH0PR11MB5739.namprd11.prod.outlook.com>
In-Reply-To: <CH0PR11MB5739FD074FF5337C8E4E3DFB9F2E2@CH0PR11MB5739.namprd11.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CH0PR11MB5444:EE_|SJ2PR11MB8369:EE_
x-ms-office365-filtering-correlation-id: c105dab9-1d06-433c-b5cf-08dc46cd0693
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: Lr9v78drMPFpuWP1YSi48w2Jfp7znL0DtyaHkGOpyTyJOhnmVAFHihWGfjyeJkpkdwQ8xWoDYmjIBwtcnmvIsPVIQLzz8sMBs3nr+LEOazdBkd1qDpsgBGhXPpLLttuF5Zetw3ZcCxC6CgMAkJNygv43d+y7DYk5W3d8z4BD64ovBbOU1bAT3ecdi76HWCxdY2BFZFtfAQZjjpv6K8xDnsqzato8KAp7g/qA/v9tR27Z0w3HWsSd/cjW8HEDpTTLr1VDmk58/DcRsPzMkz+P+Mh2jMXTm76h8MZMM9miiurLI92mv0iP9eSaTLJBZucmuySgE9pwkAu9Hnm26OBL1U5HUZ2JPCmNuTOuUSIVzINYCMeG1gUPI7JEeU0DESsN/VCM+ax53Ga5i6bukj4GnHwKVGYmoeKKZB/AlEsHT+3zGjGqTFZb3Ge0AvGlyYTYwbKUhXhfgZOW9ZQFgUuNikDzdzWb7G3hWLShZjE5kmI/+JIbxUHVj1jXXVUeN1Yn4xixnyrhOBDfO62H2izf6+WcxwXWvaQCve+Dl3m1meNjeuRI4whllEqKil1IZf5hG9ZdT7cyCA//z2QeLi5+ssqZUHZftd6V/os6V1nJVHghomV5r6A5z43+nC0kf0vnbmz9f1k83DX6ny0wF+8re+GXj0sNe4IrgVhHLY6cCiIs67EP7mkNEcgqudghKNEpuGs8y/1oavIi6T+aHaYGkhIKV579b2ll1/pzWHryrUs=
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CH0PR11MB5444.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(376005)(1800799015)(366007)(38070700009); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CH0PR11MB5444D732D1619268DB3353B8C12E2CH0PR11MB5444namp_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH0PR11MB5444.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: c105dab9-1d06-433c-b5cf-08dc46cd0693
X-MS-Exchange-CrossTenant-originalarrivaltime: 17 Mar 2024 21:55:57.1815 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: mcExnZwB3lsMVCoixufPqCfyhrL8B1ISS6RJATLRZvBIXb1WlfnBBZh3a63T8/AFxyuX+M/iYMDbGE2DSeh5Pw==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ2PR11MB8369
X-Outbound-SMTP-Client: 173.37.147.229, alln-opgw-1.cisco.com
X-Outbound-Node: alln-core-8.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/cfrg/YKiyjOcGVRYrc4y968ViSW_XrrE>
Subject: Re: [CFRG] [EXTERNAL] pq firmware signing question
X-BeenThere: cfrg@irtf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Crypto Forum Research Group <cfrg.irtf.org>
List-Unsubscribe: <https://mailman.irtf.org/mailman/options/cfrg>, <mailto:cfrg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cfrg/>
List-Post: <mailto:cfrg@irtf.org>
List-Help: <mailto:cfrg-request@irtf.org?subject=help>
List-Subscribe: <https://mailman.irtf.org/mailman/listinfo/cfrg>, <mailto:cfrg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Sun, 17 Mar 2024 21:56:06 -0000

I do work for a hardware manufacturer; I can confirm that this is what we do.

From: CFRG <cfrg-bounces@irtf.org> On Behalf Of Mike Ounsworth
Sent: Sunday, March 17, 2024 5:46 PM
To: Stephen Farrell <stephen.farrell@cs.tcd.ie>; cfrg@irtf.org
Subject: Re: [CFRG] [EXTERNAL] pq firmware signing question

Stephen.

Short answer: firmware verification keys burned into ROM or some other immutable trust store which is itself outside the memory space of the firmware that you can update.

I am not myself a hardware manufacturer, but I have been lead to believe that this is common practice.

- Mike Ounsworth
________________________________
From: CFRG <cfrg-bounces@irtf.org<mailto:cfrg-bounces@irtf.org>> on behalf of Stephen Farrell <stephen.farrell@cs.tcd.ie<mailto:stephen.farrell@cs.tcd.ie>>
Sent: Monday, March 18, 2024 7:41:33 AM
To: cfrg@irtf.org<mailto:cfrg@irtf.org> <Cfrg@irtf.org<mailto:Cfrg@irtf.org>>
Subject: [EXTERNAL] [CFRG] pq firmware signing question


Hiya,

A number of people have asserted that firmware signing implies
distributing a public value now, (or soon) on which they may
still have to rely after a CRQC might exist. The implication being
that we should start to do this kind of thing now, based on some
composite sig-alg, verification of which is assumed to be implemented
below the crypto APIs used by relevant applications.

I'd like to try tease bits of that apart to better understand
what's required.

ISTM that firmware signing entirely does allow one to update the
signature keys/algs needed for the next signed firmware update and that
there is no need, given ongoing updates, to continue to depend on
the original key/alg for the public value with which a device was
shipped. IOW, update N can update anything, including the sig
alg required for update N+1.

I don't understand what class of device might be able to load new
firmware but not change the verification alg for sigs on subsequent
updates. If there are such devices, can someone describe 'em?

There does seem to be an exception - a factory-reset of a device
would imply returning to depending on the original public value
and alg. However, a factory reset also seems to imply that a human
can "touch"/control a specific device at a specific point in time
so is not an unattended upgrade. And if someone can touch the
device, then in many cases it'd be cheaper to replace the whole
thing than do a factory reset in the field.

And then there's the issue of the specific signing key - it's hard
to imagine a system where that can be changed but the verification
alg cannot. Are there such systems?

All in all, it seems like a lot of firmware signing deployments
should be able to allow for the evolution of verification algs, and
the set of devices where we now (or soon) need to embed a forever-fixed
alg and key for sig verification has to be very small.

What am I getting wrong there?

Ta,
S.
Any email and files/attachments transmitted with it are intended solely for the use of the individual or entity to whom they are addressed. If this message has been sent to you in error, you must not copy, distribute or disclose of the information it contains. Please notify Entrust immediately and delete the message from your system.