Re: [Gen-art] [Rats] [Last-Call] Genart last call review of draft-ietf-rats-architecture-21

Laurence Lundblade <lgl@island-resort.com> Sun, 21 August 2022 17:59 UTC

Return-Path: <lgl@island-resort.com>
X-Original-To: gen-art@ietfa.amsl.com
Delivered-To: gen-art@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2B1C0C1522A1; Sun, 21 Aug 2022 10:59:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.908
X-Spam-Level:
X-Spam-Status: No, score=-1.908 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id N13YTZ2XSF8V; Sun, 21 Aug 2022 10:59:33 -0700 (PDT)
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2128.outbound.protection.outlook.com [40.107.244.128]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4CFE6C14F734; Sun, 21 Aug 2022 10:59:31 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=B2QPkAI1fvp4rQw7ZAUps3R02XDkZ5PCoYSqQNlQ7Qm77MWV+QBRqeRt/1A2ISs57gqXVW1ksJ66eL7JzeOkjqeW1INgtnI8LGfmvbWeD8X9BuKPu1lqrml1/6atjX4DwfbJNRXykfYGFWYVF2Mi5/KH44C1538i9PeOOSj/IAH9vZAbposkaBRVoK5Pydqggr6N9HDlxug4ybC5xYLvo4iZ8rsPRKSu++gEAxBr7sWOkP3h6V8Rv8WotRtBHp9XTzcJorTNT9pwKpITP+EzsIkn3ojomDJ6tKULAYsHPagm66CUfkfhry6yxE+yyIOCIq4n1ZTAs08wgIfcXAkuVQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=L7SBi6C/kRWEERzqi/k1T55rvX3LZ5SoOyRYIfqRRV4=; b=EPnXG/HUMkhOfeTHOPxdabyOjN+n3WPgDgtkh3aHnvP5N7iOevONYRaMeZscO6vkNV2/2XS2/9A1ysr4HoeULplE8xvfpF80QGCPcL69gAwLHvvJMEFUuLvH9ScL0YKmYOVHQUtUtHGPybng9UmcCglRJ8F6oX6a/hRCzo4K3tmfgxxBBxFpIKrxRv49VZ5u/THQ4Jrzo+OiTtYwbZcpggWmyiLHjPyKlAwm5ECuejJe26UWindiBGJ/kC88yibZ/p2apJeW6VjZvdM56+aRhaboz/u2PZzVlZmVpAfDDeiKOqE/swZ4W8ml9sSIwP4lW8r0WmtQ1T1kOA18/8X4AA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=island-resort.com; dmarc=pass action=none header.from=island-resort.com; dkim=pass header.d=island-resort.com; arc=none
Authentication-Results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=island-resort.com;
Received: from PH7PR22MB3092.namprd22.prod.outlook.com (2603:10b6:510:13b::8) by CY4PR22MB1687.namprd22.prod.outlook.com (2603:10b6:910:80::26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5504.27; Sun, 21 Aug 2022 17:59:26 +0000
Received: from PH7PR22MB3092.namprd22.prod.outlook.com ([fe80::ac41:5a17:42c0:16dd]) by PH7PR22MB3092.namprd22.prod.outlook.com ([fe80::ac41:5a17:42c0:16dd%9]) with mapi id 15.20.5525.011; Sun, 21 Aug 2022 17:59:26 +0000
From: Laurence Lundblade <lgl@island-resort.com>
Message-Id: <150C6685-30CE-4376-85CC-3BA1D461198C@island-resort.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_02716F2D-C527-4C7D-B43D-D39A94B4B725"
Date: Sun, 21 Aug 2022 10:59:21 -0700
In-Reply-To: <C07517E2-07A1-435B-8A83-B8E4EBE9FEE5@island-resort.com>
Cc: Gyan Mishra <hayabusagsm@gmail.com>, gen-art@ietf.org, draft-ietf-rats-architecture.all@ietf.org, last-call@ietf.org, rats@ietf.org
To: Michael Richardson <mcr+ietf@sandelman.ca>
References: <166094621871.15611.17737520857699084804@ietfa.amsl.com> <30348.1661027881@localhost> <C07517E2-07A1-435B-8A83-B8E4EBE9FEE5@island-resort.com>
X-Mailer: Apple Mail (2.3608.120.23.2.4)
X-ClientProxiedBy: BN9PR03CA0841.namprd03.prod.outlook.com (2603:10b6:408:13d::6) To PH7PR22MB3092.namprd22.prod.outlook.com (2603:10b6:510:13b::8)
MIME-Version: 1.0
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: 716ab2d9-d144-4e60-ab2c-08da839ee2bd
X-MS-TrafficTypeDiagnostic: CY4PR22MB1687:EE_
X-MS-Exchange-SenderADCheck: 1
X-MS-Exchange-AntiSpam-Relay: 0
X-Microsoft-Antispam: BCL:0;
X-Microsoft-Antispam-Message-Info: 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
X-Forefront-Antispam-Report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH7PR22MB3092.namprd22.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230016)(366004)(346002)(136003)(396003)(376002)(39830400003)(316002)(6506007)(52116002)(8936002)(5660300002)(6666004)(53546011)(33964004)(2906002)(2616005)(41300700001)(66574015)(6512007)(186003)(26005)(33656002)(86362001)(36756003)(83380400001)(66556008)(66476007)(66946007)(8676002)(4326008)(478600001)(6486002)(38100700002)(38350700002)(166002)(45980500001); DIR:OUT; SFP:1102;
X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1
X-MS-Exchange-AntiSpam-MessageData-0: nZNsajuRqVY301A534ls8IzAcNhoi/KV3lwZSe2Bx+kGAPGFezF1K9Ql1oHJ701gTvy/nt42LqppsALhREt7gq/jfR1uo4XQGLoJfvJHySc+ZvhJSqC3yI/c8AP/7TyqxDfyvltS1lErJLuz30/30C2qEY6MMng8vw9Q41KmKOA1WTTnT0Jurwu0xpIsWN2Hkwd5wKmEAl+boMXHqFtJiOEgtofvhk6bF6YZBdqRqbLRP78B6iDX9qS9MHhsu8LZ/GjhFG7MKfi6w5H1/3S2ddMBNuqAz4SdX3Y6C4IwdqqlOvoPGDJ5SMkfXonsAtirKzt9xdnCGpAAvd0swUP58WHV+UCbrEaRlUhvrn6Y4hFGYd+07y1RSEA5b1GluT+D9BVvjsgScZqnLTnj5qWv7hWdXKKgFzR0XAfSK/bq62nir8736IU2p4a3gAkOJvGP9+P+OIfP5KW4NbpstVj3Ba/Orw4dZ7W6uzAJI55LUZxePcFr4nfL6OopRMHUyuVtYIexK4z3BN5F+nbzUqNRsDkJ5cdbSENUe+MsuWfG2ltQoNSferD4EHfepupHIFyYdCK3mHMpZ8icYMYUXMr47xlo6G5klaTeMhdvXMwD5cyc704pmBQYInOvVtfoJbPbNXq5Z0DPlCJOYMqolwYnloVx0+OOKLUPongq/4rJmLBg8faKG6SsmSFpcJTDQ8Ng7fdc1QemnC9Dn2Et2KyRqcHaHbon22ruM/Dy39+C3N9xAyyAIfUfbAljisnyHq8kUG16/m/qJJNl+Wv+JJfHdPAoRXlMQ7gQ7Xej8feM64SaiGI5wb3mYm2BOll7k7THLZfj80LlIUezLyxn5G/h/cg+Qj1rwdE44Q9QzAkslRMnUAQ8C8fM52gJCsu9f48LKLhv0WNmOarP6RtJfNRSMhRGYVWopkizHYoyoMpIDmSl7u+DqQgXn11z1B1XUIhdVxSv+bx6J/Og8/MGGqmKr6WQZwOhfA0fbFCN9RoSoUVeWiknZC/YF726ZKfEeYAE9zh2sitfKyvlUjvbh4iqGva93p/A05wJGemH2/XqfgfSDhpYwG98foSr0gORN2GcDhvmoc+LNXb9pVYtLBOz4Yva7v9Kpw2yo97cDsJ8FVBE/PkojDx7lLhsuh+39NK4UySex7c81E9+wNO7Ra/IepceWB3n685t8CTKjBdrBNgDJW41hL00FssVUxiNo5LDe+2HrXGmMM9HojJ/Y72bI1mq8HawaF1qHe0yTIy1/jUv/Oo1xmLrn0Y/kb2dzwon86byo1VzAm0yFZx0EOMin3ZGgyOuvrs7BPCgP/Z4MagqdMHewRJjlwRvghqLbNa3gVisk1dl5ou68CwH55TBmWqPF/xla7cuZIQyfljbmJ1wTvrkk3TeeS9QOAqOkZlFkTMdskjYScrh3VwXbLn9006l2VhtJU/GWNRqbbGosEMdsIekukvgBMUTkyUHO0Sl1oE/tXw7414BpKIRbNhgGjociDl5bpc1vV2pmPoeDZCw6M7zhHJjWtA3uckoaaB7IXZFIct7s742nBSvDZf1LNkpH+10EvD2NkLYDyCCldw+0PaNX52f+DNeEocJ+Jix
X-OriginatorOrg: island-resort.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 716ab2d9-d144-4e60-ab2c-08da839ee2bd
X-MS-Exchange-CrossTenant-AuthSource: PH7PR22MB3092.namprd22.prod.outlook.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 21 Aug 2022 17:59:25.9591 (UTC)
X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted
X-MS-Exchange-CrossTenant-Id: ad4b5b91-a549-4435-8c42-a30bf94d14a8
X-MS-Exchange-CrossTenant-MailboxType: HOSTED
X-MS-Exchange-CrossTenant-UserPrincipalName: SwytL1wLbdF5aJedZkpXf8D5DBkKcjIzpypHb2VqIzSTXuC7lXCZVGQbhh1YbS3FwHEQCjDkmIi9lyuFhudGlA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CY4PR22MB1687
Archived-At: <https://mailarchive.ietf.org/arch/msg/gen-art/lLWEtZiXjMyyaZVTSCp6WlnZ4C0>
Subject: Re: [Gen-art] [Rats] [Last-Call] Genart last call review of draft-ietf-rats-architecture-21
X-BeenThere: gen-art@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "GEN-ART: General Area Review Team" <gen-art.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/gen-art>, <mailto:gen-art-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/gen-art/>
List-Post: <mailto:gen-art@ietf.org>
List-Help: <mailto:gen-art-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/gen-art>, <mailto:gen-art-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 21 Aug 2022 17:59:37 -0000

On Aug 20, 2022, at 8:23 PM, Laurence Lundblade <lgl@island-resort.com> wrote:
> 
> I don’t know anything about router architecture, but do about mobile phone architecture which I consider a candidate for composite attestation.
> 
> A mobile phone based on a chip like a Qualcomm Snapdragon has many subsystems. Something like this:
> - A TEE and/or HW root of trust, perhaps controlled by the chip vendor, not the phone vendor
> - A Secure Element for payments or eSIM
> - A SIM card 
> - The general purpose CPU running Android and is controlled by the phone vendor
> - A video playback subsystem that does content protection and is isolated from the main CPU
> - A cellular modem
> - A Bluetooth subsystem isolated from the modem
> - …
> 
> There are several tiers of security and multiple vendors.
> 


To go on a bit further, there are many attestation architecture possible here for various use cases. Maybe even one phone has more than one implementation of attestation.

The TEE is likely the lead attester in many. For example, in a content protection application it may collect measurements from the video playback subsystem and from Android and report to the video distribution server.

Or go for further to have nesting and have a HW root of trust (like a TPM, but more capable) and have it attest to the TEE and then the TEE attests to other parts.

Samsung Knox TIMA <https://www.engr.ncsu.edu/news/2014/11/19/tima-technology-is-core-to-samsungs-state-of-the-art-knox-platform/> is an implementation of this that includes taking *and* evaluating them on the device.

Simple Android applications may want to include attestation that is either shallow (just the app) or deep (down to HW root of trust) so their associated servers know it’s really the authentication application. Qualcomm’s product here <https://www.qualcomm.com/products/features/mobile-security> does some of that.

When the secure element is included, it will probably produce its own signed stand-alone attestation. That attestation can be included as a nested token in a TEE-based attestation of the TEE and other parts of the device. This cryptographically binds that particular secure element attestation to the rest of the parts of the phone, perhaps for top-bottom (user interface to secured key material) attestation of a financial transaction.

LL