Re: [Rats] Entity vs. role

Laurence Lundblade <lgl@island-resort.com> Tue, 22 March 2022 20:31 UTC

Return-Path: <lgl@island-resort.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 55F603A1030 for <rats@ietfa.amsl.com>; Tue, 22 Mar 2022 13:31:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.905
X-Spam-Level:
X-Spam-Status: No, score=-1.905 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_MSPIKE_H4=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ISc4HXqFaShi for <rats@ietfa.amsl.com>; Tue, 22 Mar 2022 13:31:28 -0700 (PDT)
Received: from p3plsmtpa12-07.prod.phx3.secureserver.net (p3plsmtpa12-07.prod.phx3.secureserver.net [68.178.252.236]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 52B7D3A1011 for <rats@ietf.org>; Tue, 22 Mar 2022 13:31:27 -0700 (PDT)
Received: from [192.168.8.106] ([213.225.36.78]) by :SMTPAUTH: with ESMTPSA id WlA4nhnHrujDEWlA5nes4r; Tue, 22 Mar 2022 13:31:27 -0700
X-CMAE-Analysis: v=2.4 cv=G4bZr/o5 c=1 sm=1 tr=0 ts=623a321f a=73sqJBfw4EOcj9Wd6QYAcA==:117 a=73sqJBfw4EOcj9Wd6QYAcA==:17 a=pGLkceISAAAA:8 a=K6EGIJCdAAAA:8 a=H7F6nMXwi3yoLfq52DUA:9 a=QEXdDO2ut3YA:10 a=CdHvZy1TYmtphA6o:21 a=_W_S_7VecoQA:10 a=L6pVIi0Kn1GYQfi8-iRI:22
X-SECURESERVER-ACCT: lgl@island-resort.com
From: Laurence Lundblade <lgl@island-resort.com>
Message-Id: <2BC14C43-80D0-4611-BEA0-9D9B9948BE0C@island-resort.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_9CC634A8-BBFC-47F9-BA87-03B2268CED8D"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.1\))
Date: Tue, 22 Mar 2022 21:31:24 +0100
In-Reply-To: <CAObGJnOv8ePE=R6vvdg5uib3Y9=WS8A5vcOdpWY0sREXA98aPQ@mail.gmail.com>
Cc: "Smith, Ned" <ned.smith@intel.com>, "rats@ietf.org" <rats@ietf.org>
To: Thomas Fossati <tho.ietf@gmail.com>
References: <3407CFB9-B713-4E13-BDA3-08EC7B5A905E@intel.com> <CAObGJnOxU0vfxzzZ9tv1J64KHDigxLcEMrgx0gDy97bE7NQJcA@mail.gmail.com> <E20F61DD-8775-4E68-8E56-E6EC92682A18@island-resort.com> <CAObGJnOv8ePE=R6vvdg5uib3Y9=WS8A5vcOdpWY0sREXA98aPQ@mail.gmail.com>
X-Mailer: Apple Mail (2.3608.120.23.2.1)
X-CMAE-Envelope: MS4xfB2rSuar2/4O7gANj9xFFYj4/ab6KJyz1Bk333HPrZW2HgaNjcu2b8uWJpg6Otn4Ds9cgOWwjvgbAcWCppCkc4Jshi/O6Vv55dIp8uwAA021rjG48ltl 8ObVk5m1HGlx/S62FDA1jjlSXRz+LXflF1JmWXca5ZHc/Nm1ILhECv7X9uaBkmVYqP0W9xAfSqQAwcmpfybr55CyFYeuM6QOOcdCN2/M82xPPlVMcKzprkCS VBRAQssb8uRwn+N4NJylPw==
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/-RKwMtw5bBrDXv69srD_Q19rFoU>
Subject: Re: [Rats] Entity vs. role
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Mar 2022 20:31:34 -0000

Hi Thomas,

Miss having you here in Vienna.

> On Mar 22, 2022, at 9:12 PM, Thomas Fossati <tho.ietf@gmail.com> wrote:
> 
> On Tue, Mar 22, 2022 at 6:42 PM Laurence Lundblade
> <lgl@island-resort.com <mailto:lgl@island-resort.com>> wrote:
>> 
>> Agree entirely with what’s below, but it doesn’t quite address what I am on about.
>> 
>> RATS architecture clearly separates two polices:
>>   1) Appraisal Policy for Evidence
>>   2) Appraisal Policy for Results
>> 
>> The first one is used only by the Verifier role and never by the Relying Party role. It can only be use to process Attestation Evidence, never to process Attestation Results. In a chain of Verifiers all the intermediate results are Attestation Evidence, never Attestation Results.
>> 
>> When all the Verifiers are done, then you have Attestation Results.
>> 
>> Similarly, the Appraisal Policy for Results is used only by the Relying Part role, never by the Verifier role. It can never be applied to Attestation Evidence.
>> 
>> Since we are talking roles not entities, here, the Relying Party can *never* by definition receive Attestation Evidence. Again, since we’re talking *roles* not entities, a Relying Party can *never* host a Verifier.
>> 
>> Said another way, the definition of the Verifier and Relying Party roles gives a hard one-way transition from Evidence to Results.
>> 
>> 
>> I think the Verifier and the Appraisal Policy for Evidence is all about the device/implementation/attester.
>> - Who made the device?
>> - Is it configured correctly?
>> - Is it in the right state?
>> - Does it have the right SW?
>> - What certifications does it have?
>> 
>> This is represented in the Attestation Results, perhaps in summary or in detail.
>> 
>> Then the RP and the Appraisal Policy for Results is about the application-specific stuff:
>>  - Is this device OK for this dollar amount (the RP knows the $ amount, not the Verifier)
>>  - Can this content be played on this device — the RP knows which device and what characteristics it requires for the content
>>  - Is the sensor data accurate — the RP knows which sensors it can trust
> 
> I think that the terminology choice made by the architecture is quite
> precise: "AP for attestation results."
> 
> The appraisal logic you are describing above covers more ground than
> just attestation results.  The way I picture myself the "complete"
> appraisal process done by the RP looks more or less like:
> 
>          AP for AR
>              |
>       .------v-------.    .--------------------------------.
> AR -> | AR appraisal | -> | Application-specific appraisal | -> [0..1]
>  :    '--------------'    '--^--------^---------^----------'
>  :                           :        |         |
>  '- - - - - - - - - - - - - -'        other     application-
>                                       input     specific
>                                                 policy


Yes, we can depict it like that conceptually, but in reality it could be one big machine learning engine or similar where you can’t separate it (you could even put unverified measurements in AR so they can be fed into a machine learning engine).

And RATS architecture doesn’t care about what’s in AP for AR and shouldn’t care about it. We’re only mentioning AP for AR for the sake of completeness. We’re not going to put any requirements on it or say anything more about it than it exists, right? Hope that right. 

LL