Re: [Cwt-reg-review] Request to register set of claims for Arm CCA Attestation
Simon Frost <Simon.Frost@arm.com> Tue, 03 October 2023 12:22 UTC
Return-Path: <Simon.Frost@arm.com>
X-Original-To: cwt-reg-review@ietfa.amsl.com
Delivered-To: cwt-reg-review@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3CA2DC193339; Tue, 3 Oct 2023 05:22:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.904
X-Spam-Level:
X-Spam-Status: No, score=-1.904 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, UNPARSEABLE_RELAY=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b="kOo790Mq"; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b="kOo790Mq"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c_kHtnTsuY1I; Tue, 3 Oct 2023 05:22:40 -0700 (PDT)
Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on2075.outbound.protection.outlook.com [40.107.22.75]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 36042C19333B; Tue, 3 Oct 2023 05:22:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=m96n4vQP6zWOIPhcypLilYxJ9ikRDQIvoNYehAp2Z0E=; b=kOo790Mq9T0+Uds3tbAsgLMpDlpXR7AwZlpsaG/i6T4wsVEcMMdryeoSZcWQTfg9jjqEgxPypJO6Jce4+IB8pIOnWRELymqIHyNPL7M3dP0VZMl11GenjQZ0GnkJoGX1wFADVTBU/htBGbzLjKJw5nYrIYpP9CD89Z7NFTH6OB4=
Received: from DUZPR01CA0075.eurprd01.prod.exchangelabs.com (2603:10a6:10:3c2::7) by DB8PR08MB5451.eurprd08.prod.outlook.com (2603:10a6:10:113::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6838.33; Tue, 3 Oct 2023 12:22:36 +0000
Received: from DBAEUR03FT049.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:3c2:cafe::15) by DUZPR01CA0075.outlook.office365.com (2603:10a6:10:3c2::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6838.30 via Frontend Transport; Tue, 3 Oct 2023 12:22:36 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DBAEUR03FT049.mail.protection.outlook.com (100.127.142.192) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6863.24 via Frontend Transport; Tue, 3 Oct 2023 12:22:36 +0000
Received: ("Tessian outbound 9aeaca65ec26:v211"); Tue, 03 Oct 2023 12:22:36 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: d1ddc4b0c57e708d
X-CR-MTA-TID: 64aa7808
Received: from 980421b9563b.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 42B9765F-D037-4436-B007-D84BD06C4DA4.1; Tue, 03 Oct 2023 12:22:28 +0000
Received: from EUR03-DBA-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 980421b9563b.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Tue, 03 Oct 2023 12:22:28 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZnpWRAGpDNWzra78OKEhGogUjqnBP8EqE4QcksbjKd2uPzyH8oQw0vuce0i3UUsLpYkpmGlMnpd4jrsSNIuzrjQRIu4BXD8mbrWc6kv5SKXgB/CsjZD5XZ/ZZjkrLHtNvHQfvUVxjnXCct+fiHx9iWtugZ9kqFKQFEoXaXxk4QlXUtu8pIqlabO8RIMEl3NA+4R3ZPiTyASLcbzyYwVMt/S3aaJlI8jDZNksdWOl9TKHEWL+cNFkremTSWBHJUU8sXN1cX8zGiw8ZyC7qcMy6QxqxjQaI7c1lgjKyDqtgLcEfUNCZsHve8BODNueYlAvaQGqRKDbTd2FRwG/FbhD9A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=m96n4vQP6zWOIPhcypLilYxJ9ikRDQIvoNYehAp2Z0E=; b=cRPeguo3e56ZTYb2Heb+swXVKJq4PLc8QxZtw43VPP6+q/XyJt+5/uGJcgV/+hIJDMyp2yF/PfrdAdJwahaXnibeVbXShCEubwmbIY+TSu5l1sbCgR91AJHwho7hMAvMkeoOteveEgVfNlF21TLa5kIOR2mIfW4phDTe/3RbnkM2Gukr3oyRiXXOCEoSl4VAqUOr9L9VOitOy2kba8a4Q9wWE9l7IGL9PSroiX38+M7O7d7fD5qivzMVlsZVUdX3Y34o6cyPNkk/ul9jwfgLrevswr/FeoQNn5bANSjj19OpciB4hJtJxBfl+1xiymm+KBNEHLGWeV1DlTZWSh6o8g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=m96n4vQP6zWOIPhcypLilYxJ9ikRDQIvoNYehAp2Z0E=; b=kOo790Mq9T0+Uds3tbAsgLMpDlpXR7AwZlpsaG/i6T4wsVEcMMdryeoSZcWQTfg9jjqEgxPypJO6Jce4+IB8pIOnWRELymqIHyNPL7M3dP0VZMl11GenjQZ0GnkJoGX1wFADVTBU/htBGbzLjKJw5nYrIYpP9CD89Z7NFTH6OB4=
Received: from AS8PR08MB6677.eurprd08.prod.outlook.com (2603:10a6:20b:39a::16) by DU2PR08MB10277.eurprd08.prod.outlook.com (2603:10a6:10:49b::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6838.28; Tue, 3 Oct 2023 12:22:25 +0000
Received: from AS8PR08MB6677.eurprd08.prod.outlook.com ([fe80::3e5:2d59:f7e9:6d1]) by AS8PR08MB6677.eurprd08.prod.outlook.com ([fe80::3e5:2d59:f7e9:6d1%7]) with mapi id 15.20.6838.033; Tue, 3 Oct 2023 12:22:25 +0000
From: Simon Frost <Simon.Frost@arm.com>
To: "cwt-reg-review@ietf.org" <cwt-reg-review@ietf.org>
CC: "iesg@ietf.org" <iesg@ietf.org>
Thread-Topic: Request to register set of claims for Arm CCA Attestation
Thread-Index: AdnLiOAOBY6j/ppeRoWVkIEY9M92CgqarrPQ
Date: Tue, 03 Oct 2023 12:22:23 +0000
Message-ID: <AS8PR08MB667798D65FDD3DCECD2F2464EFC4A@AS8PR08MB6677.eurprd08.prod.outlook.com>
References: <AS8PR08MB6677FAD036B479DCAE207AB5EF13A@AS8PR08MB6677.eurprd08.prod.outlook.com>
In-Reply-To: <AS8PR08MB6677FAD036B479DCAE207AB5EF13A@AS8PR08MB6677.eurprd08.prod.outlook.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 830E38389B6C334A8AF772AA7ACD9A48.0
Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
x-ms-traffictypediagnostic: AS8PR08MB6677:EE_|DU2PR08MB10277:EE_|DBAEUR03FT049:EE_|DB8PR08MB5451:EE_
X-MS-Office365-Filtering-Correlation-Id: 7734f029-4ac3-437b-75fd-08dbc40b6d8d
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS8PR08MB6677.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(346002)(376002)(366004)(136003)(39850400004)(396003)(230922051799003)(64100799003)(451199024)(186009)(1800799009)(55016003)(478600001)(6506007)(7696005)(53546011)(9686003)(966005)(38070700005)(38100700002)(122000001)(166002)(2906002)(316002)(83380400001)(26005)(6916009)(71200400001)(8676002)(86362001)(66946007)(33656002)(66556008)(450100002)(8936002)(64756008)(4326008)(5660300002)(52536014)(76116006)(66476007)(66446008)(41300700001); DIR:OUT; SFP:1101;
Content-Type: multipart/alternative; boundary="_000_AS8PR08MB667798D65FDD3DCECD2F2464EFC4AAS8PR08MB6677eurp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DU2PR08MB10277
Original-Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DBAEUR03FT049.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs: 804ca4a8-f23b-460e-8b59-08dbc40b65b8
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: gQn1ex5GMSPjs93jJk2MFN9aS3JuW5Y+vKCBuKjZl3LZm+hFZQjKlDEMUYzZopAcAxBBXL9jufuMrrbreC22ZKwcNqE27ERQobq9tsdiceo8R1rZf/w9LVcWtqu2sEj2+KuHfv6ffaUbWUBC43nf8blXhil0eCZBD8E9qIvFz56P3tPq8+Zh5RaL2v87oWGFx/p6CNE+4hrVELvk9svT/ree7Ok3WA7Z9ezTTNRgT1y6XQgobc6gkAlOiWTJOdPfX44UatriCRsBhLYVUndSw9Xcmxt3PJdv+g2e1SGeOE8Ci72/di66aeH3ZaAxeMATmNrauVSHCQWOc4aIxGqj0ml5oAtC4B2yv0FGRItgF+8Yk9pbBMUqBq+LzRsbjGHicVJvtLAmO06eTdKv9ZsBLVo76GeIuy+vKRHrLrxdV5Crm2iDX+7YYL6Q5ZuU1sv7c74Pz3KR5/cVFiWT6jWkqmFuQq5svOQ3EDfKiRifeKbOAQsvbjsqRgj7zNtuLrC9M3du2372440MbMXllBS/I7CMPd7rDFrEwPxEl6fCxoauyBYHNiMC9EK3V5LepPsMzvMdPLUa6WpUUVoEPRiEFNmX3SpkzzN2KRTvKp98fYmcijtwasBo69tinvjkFP9snf7j6NnvEasdCmMqFHzlq7irJkfAZd8rcZnjWuYHhFZdnIHqtLubCU5ceOQMeJIQT9Kq4bap4V9v6TgrKBb8CIp/yKjKCpI3hxA+qUNdWCoDvKXRN059JK31X0D9hOwm39ip5Lmm+5THhvQLNyM6RQ==
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230031)(4636009)(376002)(396003)(39860400002)(136003)(346002)(230922051799003)(82310400011)(451199024)(186009)(1800799009)(64100799003)(36840700001)(40470700004)(46966006)(53546011)(6506007)(9686003)(7696005)(966005)(478600001)(47076005)(83380400001)(26005)(336012)(2906002)(30864003)(6916009)(316002)(450100002)(4326008)(70206006)(70586007)(8936002)(8676002)(52536014)(5660300002)(41300700001)(33656002)(36860700001)(82740400003)(86362001)(166002)(81166007)(356005)(40460700003)(40480700001)(15843345004)(55016003); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 03 Oct 2023 12:22:36.4103 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: 7734f029-4ac3-437b-75fd-08dbc40b6d8d
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: DBAEUR03FT049.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB8PR08MB5451
Archived-At: <https://mailarchive.ietf.org/arch/msg/cwt-reg-review/0_hoTP0PoJiSLy6mm0GfC9bHomk>
Subject: Re: [Cwt-reg-review] Request to register set of claims for Arm CCA Attestation
X-BeenThere: cwt-reg-review@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: CWT Registry Review <cwt-reg-review.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cwt-reg-review>, <mailto:cwt-reg-review-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cwt-reg-review/>
List-Post: <mailto:cwt-reg-review@ietf.org>
List-Help: <mailto:cwt-reg-review-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cwt-reg-review>, <mailto:cwt-reg-review-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 03 Oct 2023 12:22:44 -0000
Greetings, I have not had any response to the submission below. Copying in iesg@ietf.org<mailto:iesg@ietf.org> as recommended in RFC 8392. Best Regards Simon From: Simon Frost Sent: Thursday, August 10, 2023 2:01 PM To: cwt-reg-review@ietf.org Subject: Request to register set of claims for Arm CCA Attestation Dear CWT claims registry experts, Please find below a submission to register a set of claims for the CWT registry. I hope that I have followed the instructions & template from RFC8392 satisfactorily, please let me know if any updates or clarifications are required. The background to this request is that the Arm Confidential Compute Architecture supports the creation of attestation tokens. The construction of these tokens uses CWT construction and follows the IETF EAT draft (https://datatracker.ietf.org/doc/draft-ietf-rats-eat/) for attestation tokens. The work extends the set of claims previously registered as psa_* and claims requested for registration as part of EAT standardization. This request adds additional claims specific to the CCA attestation target. The reference implementation of Arm CCA attestation only produces a CBOR encoded token and as such there are not matched requests in the JWT registry. I have specified the Change Controller for all of these claims as being the support.developer.arm.com website rather than an individual email address as that should be more resilient. The DEN0137 specification document, being common to all these requests, contains information on how to provide feedback using that site. 1. Platform Config Claim Note: The Arm CCA Platform Attestation token reuses Claim Keys already in the CWT IANA registry in the PSA range (currently 2394 - 2400). This claim is logically grouped with those other platform claims and hence requests a consecutive value. Claim Name: psa-platform-config Claim Description: encoding of the implementation options of the hardware platform JWT Claim Name: N/A Claim Key: (requested value) 2401 Claim Value Type(s): byte string Change Controller: https://support.developer.arm.com Specification Document: https://developer.arm.com/documentation/den0137/latest Section A7.2.3.2.5 2. CCA Platform Token Note: There are a group of related claims use in Arm CCA Attestation. This claim forms the base of a new consecutive range for those claim keys. The choice for the base of this range was intended to keep away from other related sets previously registered (and key value starts at 0xACCA). Further claims for future developments of the architecture would be requested consecutive to this range. Claim Name: cca-platform-token Claim Description: byte string encoding of the Arm CCA platform token JWT Claim Name: N/A Claim Key: (requested value) 44234 Claim Value Type(s): byte string Change Controller: https://support.developer.arm.com Specification Document: https://developer.arm.com/documentation/den0137/latest Section A7.2.3 3. CCA Realm Personalisation Value Note that 'Realm' is the name used for a Confidential VM executing within an Arm CCA system Claim Name: cca-realm-personalization-value Claim Description: data personalization value provided at Realm creation time JWT Claim Name: N/A Claim Key: (requested value) 44235 Claim Value Type(s): byte string Change Controller: https://support.developer.arm.com Specification Document: https://developer.arm.com/documentation/den0137/latest Section A7.2.3.1.2 4. CCA Realm Hash Algorithm Claim Name: cca-realm-hash-algo-id Claim Description: identity of the hash algm used for values in the CCA Realm attestation token JWT Claim Name: N/A Claim Key: (requested value) 44236 Claim Value Type(s): text Change Controller: https://support.developer.arm.com Specification Document: https://developer.arm.com/documentation/den0137/latest Section A7.2.3.1.5 5. CCA Realm Public Key Claim Name: cca-realm-public-key Claim Description: identity of the key used to sign the CCA Realm attestation token JWT Claim Name: N/A Claim Key: (requested value) 44237 Claim Value Type(s): byte string Change Controller: https://support.developer.arm.com Specification Document: https://developer.arm.com/documentation/den0137/latest Section A7.2.3.1.6 6. CCA Realm Initial Measurement Claim Name: cca-realm-initial-measurement Claim Description: measurment of the Realm at activation JWT Claim Name: N/A Claim Key: (requested value) 44238 Claim Value Type(s): byte string Change Controller: https://support.developer.arm.com Specification Document: https://developer.arm.com/documentation/den0137/latest Section A7.2.3.1.3 7. CCA Realm Extensible Measurements Claim Name: cca-realm-extensible-measurements Claim Description: extensible measurement set for Realm values JWT Claim Name: N/A Claim Key: (requested value) 44239 Claim Value Type(s): array Change Controller: https://support.developer.arm.com Specification Document: https://developer.arm.com/documentation/den0137/latest Section A7.2.3.1.4 8. CCA Realm Public Key Hash Algorithm ID Claim Name: cca-realm-public-key-hash-algo-id Claim Description: algorithm used to calculate hash of key from cca-realm-public-key JWT Claim Name: N/A Claim Key: (requested value) 44240 Claim Value Type(s): array Change Controller: https://support.developer.arm.com Specification Document: https://developer.arm.com/documentation/den0137/latest Section A7.2.3.1.7 9. CCA Realm Delegated Token Claim Name: cca-realm-delegated-token Claim Description: byte string encoding of the Arm CCA delegated model Realm attestation token JWT Claim Name: N/A Claim Key: (requested value) 44241 Claim Value Type(s): array Change Controller: https://support.developer.arm.com Specification Document: https://developer.arm.com/documentation/den0137/latest Section A7.2.3 Best Regards Simon Simon Frost Senior Principal Systems Solution Architect, ATG, Arm Mob: +44 7855 265691 IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.
- [Cwt-reg-review] Request to register set of claim… Simon Frost
- Re: [Cwt-reg-review] Request to register set of c… Simon Frost
- Re: [Cwt-reg-review] Request to register set of c… Lars Eggert
- Re: [Cwt-reg-review] Request to register set of c… Lars Eggert
- Re: [Cwt-reg-review] Request to register set of c… Michael Jones
- Re: [Cwt-reg-review] Request to register set of c… Michael Jones
- Re: [Cwt-reg-review] Request to register set of c… Simon Frost