[Cwt-reg-review] Request to register set of claims for Arm CCA Attestation
Simon Frost <Simon.Frost@arm.com> Thu, 10 August 2023 13:01 UTC
Return-Path: <Simon.Frost@arm.com>
X-Original-To: cwt-reg-review@ietfa.amsl.com
Delivered-To: cwt-reg-review@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B5B17C13AE5B for <cwt-reg-review@ietfa.amsl.com>; Thu, 10 Aug 2023 06:01:22 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.905
X-Spam-Level:
X-Spam-Status: No, score=-1.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, UNPARSEABLE_RELAY=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b="qa2AMwCL"; dkim=pass (1024-bit key) header.d=armh.onmicrosoft.com header.b="qa2AMwCL"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JceEz1FIW-Ue for <cwt-reg-review@ietfa.amsl.com>; Thu, 10 Aug 2023 06:01:17 -0700 (PDT)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-db3eur04on2089.outbound.protection.outlook.com [40.107.6.89]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 42B81C15153F for <cwt-reg-review@ietf.org>; Thu, 10 Aug 2023 06:01:17 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Ggewkjtfm0hUlVNtsxxZ/Yv7CvEJS+MP1CZz4t/EcOM=; b=qa2AMwCL2Qkq61IMIW7RmaEhuZ25a97UraGHe2ztqwUTg5HQGx1pviauvs0qjpQbV6VkLt9S5mSDx90ZXPuPTV1dYH3gbXCQjMxEdYSihWE8x/MSaCxb05BnbZPOgp8nEINAkmL5lqKJCHhlbUyJBeOm+d8KhxCsiZys1CiLmGU=
Received: from DU2PR04CA0064.eurprd04.prod.outlook.com (2603:10a6:10:232::9) by AM0PR08MB5524.eurprd08.prod.outlook.com (2603:10a6:208:181::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6652.30; Thu, 10 Aug 2023 13:01:13 +0000
Received: from DBAEUR03FT007.eop-EUR03.prod.protection.outlook.com (2603:10a6:10:232:cafe::68) by DU2PR04CA0064.outlook.office365.com (2603:10a6:10:232::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6652.30 via Frontend Transport; Thu, 10 Aug 2023 13:01:13 +0000
X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=armh.onmicrosoft.com;dmarc=pass action=none header.from=arm.com;
Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C
Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DBAEUR03FT007.mail.protection.outlook.com (100.127.142.161) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6678.19 via Frontend Transport; Thu, 10 Aug 2023 13:01:13 +0000
Received: ("Tessian outbound 95df046a2e2c:v145"); Thu, 10 Aug 2023 13:01:13 +0000
X-CheckRecipientChecked: true
X-CR-MTA-CID: 7d84a57e0ee93e8d
X-CR-MTA-TID: 64aa7808
Received: from d8fe3afdd5d3.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id D3B9865D-85C4-40F5-B454-4EB462893B7B.1; Thu, 10 Aug 2023 13:01:06 +0000
Received: from EUR02-VI1-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id d8fe3afdd5d3.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Thu, 10 Aug 2023 13:01:06 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=mynKE4hyvfjGnumJ1O4ifrhWZ4hm3eybfm1RUIQlbP5h3AnYzSEb5Xi+aGIg384l1DSBrQMBVy+pAiDsPopqWxXYz10U9jIehfIFYOr7HVzNBomi+X6zc70tEMoa3qAehRs/Yz4pB2RVZYXWhczTLcirBJ9GQHO0V/6iilJqPt/aODFUgoIIC8JaX+f1su8uTkz6gkflXaHN7iydQeDSjxWJUFY376fxYTELvH/CYfOJhmKyLT1eigZYzvUCjAG6jNDioh4xpVDbTvxABYwxWloj2wkYHJCQXD7KhjXqlqgCkzzj5O3xxzs4ykVzBHKW0vRWIgUxKWokT3JkeH5vyA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Ggewkjtfm0hUlVNtsxxZ/Yv7CvEJS+MP1CZz4t/EcOM=; b=GYNmyR3cEl8cd+piSLOgaRmvybC+8vAp6UwoEr1WxCb6PeUxvOo2ZddVBI11WDkbWMBlRLlFWHwnLdpsO6Unkh4KzNDCttmQc2+3hR/5L6RjkX51ZDRbAbHwA7O+BW9giRBLVZy4Tj/boExQexjiay7fQY4rprFKBzNWVXW7VhaGs0l/Y4/Jd6aK6+Js53m94VJ6uDPdPdahempZaAVXwrympi1Bl7ki9jRYNMgKd1ygc8J3GRLc22okx2LnPs1MfQp3QXzhtVI6EkwraP/GSVs5mjs5c2Y/sjcLlvkefGM5Wban6LSmr7Z/XnzTRtcyiRDLCdqbu4Eqb4uv4o+9aQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=armh.onmicrosoft.com; s=selector2-armh-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Ggewkjtfm0hUlVNtsxxZ/Yv7CvEJS+MP1CZz4t/EcOM=; b=qa2AMwCL2Qkq61IMIW7RmaEhuZ25a97UraGHe2ztqwUTg5HQGx1pviauvs0qjpQbV6VkLt9S5mSDx90ZXPuPTV1dYH3gbXCQjMxEdYSihWE8x/MSaCxb05BnbZPOgp8nEINAkmL5lqKJCHhlbUyJBeOm+d8KhxCsiZys1CiLmGU=
Received: from AS8PR08MB6677.eurprd08.prod.outlook.com (2603:10a6:20b:39a::16) by VI1PR08MB5519.eurprd08.prod.outlook.com (2603:10a6:803:133::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6652.30; Thu, 10 Aug 2023 13:01:04 +0000
Received: from AS8PR08MB6677.eurprd08.prod.outlook.com ([fe80::74f6:b4f6:4498:a0e5]) by AS8PR08MB6677.eurprd08.prod.outlook.com ([fe80::74f6:b4f6:4498:a0e5%4]) with mapi id 15.20.6652.029; Thu, 10 Aug 2023 13:01:04 +0000
From: Simon Frost <Simon.Frost@arm.com>
To: "cwt-reg-review@ietf.org" <cwt-reg-review@ietf.org>
Thread-Topic: Request to register set of claims for Arm CCA Attestation
Thread-Index: AdnLiOAOBY6j/ppeRoWVkIEY9M92Cg==
Date: Thu, 10 Aug 2023 13:01:03 +0000
Message-ID: <AS8PR08MB6677FAD036B479DCAE207AB5EF13A@AS8PR08MB6677.eurprd08.prod.outlook.com>
Accept-Language: en-GB, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ts-tracking-id: 56EFA8D2B5E8574C907B4D23F7A07A5A.0
Authentication-Results-Original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
x-ms-traffictypediagnostic: AS8PR08MB6677:EE_|VI1PR08MB5519:EE_|DBAEUR03FT007:EE_|AM0PR08MB5524:EE_
X-MS-Office365-Filtering-Correlation-Id: b0db1019-1be1-400e-9c75-08db99a1e008
x-checkrecipientrouted: true
nodisclaimer: true
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam-Untrusted: BCL:0;
X-Microsoft-Antispam-Message-Info-Original: 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
X-Forefront-Antispam-Report-Untrusted: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:AS8PR08MB6677.eurprd08.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(39860400002)(366004)(346002)(376002)(396003)(136003)(186006)(1800799006)(451199021)(83380400001)(26005)(6916009)(66476007)(66446008)(86362001)(66556008)(64756008)(316002)(55016003)(41300700001)(6506007)(76116006)(66946007)(122000001)(966005)(9686003)(38100700002)(71200400001)(2906002)(7696005)(166002)(38070700005)(33656002)(5660300002)(52536014)(8936002)(8676002)(478600001); DIR:OUT; SFP:1101;
Content-Type: multipart/alternative; boundary="_000_AS8PR08MB6677FAD036B479DCAE207AB5EF13AAS8PR08MB6677eurp_"
MIME-Version: 1.0
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR08MB5519
Original-Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
X-EOPAttributedMessage: 0
X-MS-Exchange-Transport-CrossTenantHeadersStripped: DBAEUR03FT007.eop-EUR03.prod.protection.outlook.com
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id-Prvs: 73c3d3c7-7f14-4d60-e9ec-08db99a1da7d
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230028)(4636009)(136003)(396003)(376002)(346002)(39860400002)(186006)(1800799006)(82310400008)(451199021)(36840700001)(40470700004)(46966006)(70586007)(70206006)(41300700001)(9686003)(7696005)(966005)(6916009)(52536014)(5660300002)(8676002)(8936002)(316002)(30864003)(40460700003)(478600001)(55016003)(40480700001)(2906002)(82740400003)(356005)(81166007)(36860700001)(47076005)(83380400001)(33656002)(6506007)(26005)(166002)(86362001)(336012); DIR:OUT; SFP:1101;
X-OriginatorOrg: arm.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Aug 2023 13:01:13.0346 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: b0db1019-1be1-400e-9c75-08db99a1e008
X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com]
X-MS-Exchange-CrossTenant-AuthSource: DBAEUR03FT007.eop-EUR03.prod.protection.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Anonymous
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM0PR08MB5524
Archived-At: <https://mailarchive.ietf.org/arch/msg/cwt-reg-review/Jv0y_Uygm8lbQ2K_DopVt1o0EiE>
Subject: [Cwt-reg-review] Request to register set of claims for Arm CCA Attestation
X-BeenThere: cwt-reg-review@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: CWT Registry Review <cwt-reg-review.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cwt-reg-review>, <mailto:cwt-reg-review-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/cwt-reg-review/>
List-Post: <mailto:cwt-reg-review@ietf.org>
List-Help: <mailto:cwt-reg-review-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cwt-reg-review>, <mailto:cwt-reg-review-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Aug 2023 13:01:22 -0000
Dear CWT claims registry experts, Please find below a submission to register a set of claims for the CWT registry. I hope that I have followed the instructions & template from RFC8392 satisfactorily, please let me know if any updates or clarifications are required. The background to this request is that the Arm Confidential Compute Architecture supports the creation of attestation tokens. The construction of these tokens uses CWT construction and follows the IETF EAT draft (https://datatracker.ietf.org/doc/draft-ietf-rats-eat/) for attestation tokens. The work extends the set of claims previously registered as psa_* and claims requested for registration as part of EAT standardization. This request adds additional claims specific to the CCA attestation target. The reference implementation of Arm CCA attestation only produces a CBOR encoded token and as such there are not matched requests in the JWT registry. I have specified the Change Controller for all of these claims as being the support.developer.arm.com website rather than an individual email address as that should be more resilient. The DEN0137 specification document, being common to all these requests, contains information on how to provide feedback using that site. 1. Platform Config Claim Note: The Arm CCA Platform Attestation token reuses Claim Keys already in the CWT IANA registry in the PSA range (currently 2394 - 2400). This claim is logically grouped with those other platform claims and hence requests a consecutive value. Claim Name: psa-platform-config Claim Description: encoding of the implementation options of the hardware platform JWT Claim Name: N/A Claim Key: (requested value) 2401 Claim Value Type(s): byte string Change Controller: https://support.developer.arm.com Specification Document: https://developer.arm.com/documentation/den0137/latest Section A7.2.3.2.5 2. CCA Platform Token Note: There are a group of related claims use in Arm CCA Attestation. This claim forms the base of a new consecutive range for those claim keys. The choice for the base of this range was intended to keep away from other related sets previously registered (and key value starts at 0xACCA). Further claims for future developments of the architecture would be requested consecutive to this range. Claim Name: cca-platform-token Claim Description: byte string encoding of the Arm CCA platform token JWT Claim Name: N/A Claim Key: (requested value) 44234 Claim Value Type(s): byte string Change Controller: https://support.developer.arm.com Specification Document: https://developer.arm.com/documentation/den0137/latest Section A7.2.3 3. CCA Realm Personalisation Value Note that 'Realm' is the name used for a Confidential VM executing within an Arm CCA system Claim Name: cca-realm-personalization-value Claim Description: data personalization value provided at Realm creation time JWT Claim Name: N/A Claim Key: (requested value) 44235 Claim Value Type(s): byte string Change Controller: https://support.developer.arm.com Specification Document: https://developer.arm.com/documentation/den0137/latest Section A7.2.3.1.2 4. CCA Realm Hash Algorithm Claim Name: cca-realm-hash-algo-id Claim Description: identity of the hash algm used for values in the CCA Realm attestation token JWT Claim Name: N/A Claim Key: (requested value) 44236 Claim Value Type(s): text Change Controller: https://support.developer.arm.com Specification Document: https://developer.arm.com/documentation/den0137/latest Section A7.2.3.1.5 5. CCA Realm Public Key Claim Name: cca-realm-public-key Claim Description: identity of the key used to sign the CCA Realm attestation token JWT Claim Name: N/A Claim Key: (requested value) 44237 Claim Value Type(s): byte string Change Controller: https://support.developer.arm.com Specification Document: https://developer.arm.com/documentation/den0137/latest Section A7.2.3.1.6 6. CCA Realm Initial Measurement Claim Name: cca-realm-initial-measurement Claim Description: measurment of the Realm at activation JWT Claim Name: N/A Claim Key: (requested value) 44238 Claim Value Type(s): byte string Change Controller: https://support.developer.arm.com Specification Document: https://developer.arm.com/documentation/den0137/latest Section A7.2.3.1.3 7. CCA Realm Extensible Measurements Claim Name: cca-realm-extensible-measurements Claim Description: extensible measurement set for Realm values JWT Claim Name: N/A Claim Key: (requested value) 44239 Claim Value Type(s): array Change Controller: https://support.developer.arm.com Specification Document: https://developer.arm.com/documentation/den0137/latest Section A7.2.3.1.4 8. CCA Realm Public Key Hash Algorithm ID Claim Name: cca-realm-public-key-hash-algo-id Claim Description: algorithm used to calculate hash of key from cca-realm-public-key JWT Claim Name: N/A Claim Key: (requested value) 44240 Claim Value Type(s): array Change Controller: https://support.developer.arm.com Specification Document: https://developer.arm.com/documentation/den0137/latest Section A7.2.3.1.7 9. CCA Realm Delegated Token Claim Name: cca-realm-delegated-token Claim Description: byte string encoding of the Arm CCA delegated model Realm attestation token JWT Claim Name: N/A Claim Key: (requested value) 44241 Claim Value Type(s): array Change Controller: https://support.developer.arm.com Specification Document: https://developer.arm.com/documentation/den0137/latest Section A7.2.3 Best Regards Simon Simon Frost Senior Principal Systems Solution Architect, ATG, Arm Mob: +44 7855 265691 IMPORTANT NOTICE: The contents of this email and any attachments are confidential and may also be privileged. If you are not the intended recipient, please notify the sender immediately and do not disclose the contents to any other person, use it for any purpose, or store or copy the information in any medium. Thank you.
- [Cwt-reg-review] Request to register set of claim… Simon Frost
- Re: [Cwt-reg-review] Request to register set of c… Simon Frost
- Re: [Cwt-reg-review] Request to register set of c… Lars Eggert
- Re: [Cwt-reg-review] Request to register set of c… Lars Eggert
- Re: [Cwt-reg-review] Request to register set of c… Michael Jones
- Re: [Cwt-reg-review] Request to register set of c… Michael Jones
- Re: [Cwt-reg-review] Request to register set of c… Simon Frost