Re: [Rats] draft-chen-rats-tee-identification-01 and IDevID

"yangpenglin@chinamobile.com" <yangpenglin@chinamobile.com> Wed, 04 August 2021 04:10 UTC

Return-Path: <yangpenglin@chinamobile.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 672003A084D for <rats@ietfa.amsl.com>; Tue, 3 Aug 2021 21:10:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.088
X-Spam-Level:
X-Spam-Status: No, score=-1.088 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RCVD_IN_SORBS_WEB=1.5, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6MBwJoEVzl5t for <rats@ietfa.amsl.com>; Tue, 3 Aug 2021 21:10:52 -0700 (PDT)
Received: from cmccmta1.chinamobile.com (cmccmta1.chinamobile.com [221.176.66.79]) by ietfa.amsl.com (Postfix) with ESMTP id 138533A084A for <rats@ietf.org>; Tue, 3 Aug 2021 21:10:48 -0700 (PDT)
Received: from spf.mail.chinamobile.com (unknown[172.16.121.15]) by rmmx-syy-dmz-app02-12002 (RichMail) with SMTP id 2ee2610a1341bf5-ff724; Wed, 04 Aug 2021 12:10:45 +0800 (CST)
X-RM-TRANSID: 2ee2610a1341bf5-ff724
X-RM-TagInfo: emlType=0
X-RM-SPAM-FLAG: 00000000
Received: from cmcc-PC (unknown[221.130.253.135]) by rmsmtp-syy-appsvr08-12008 (RichMail) with SMTP id 2ee8610a134426d-b4054; Wed, 04 Aug 2021 12:10:45 +0800 (CST)
X-RM-TRANSID: 2ee8610a134426d-b4054
Date: Wed, 04 Aug 2021 12:10:44 +0800
From: "yangpenglin@chinamobile.com" <yangpenglin@chinamobile.com>
To: Laurence Lundblade <lgl@island-resort.com>
Cc: rats <rats@ietf.org>, chenmeiling <chenmeiling@chinamobile.com>, 粟栗 <suli@chinamobile.com>
References: <0264979E-551B-41FE-BFAC-5A2A70A4C3AB@island-resort.com>, <2021080310515807143522@chinamobile.com>, <DB8101D3-AEA7-4733-9274-C52839B62F20@island-resort.com>
X-Priority: 3
X-Has-Attach: no
X-Mailer: Foxmail 7.2.16.188[cn]
Mime-Version: 1.0
Message-ID: <2021080412104368388352@chinamobile.com>
Content-Type: multipart/alternative; boundary="----=_001_NextPart756631787374_=----"
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/-ojuY4l3FuWpM6od568HhiqJHZs>
Subject: Re: [Rats] draft-chen-rats-tee-identification-01 and IDevID
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 04 Aug 2021 04:10:58 -0000

Hello LL,
        Like I said "If the TEE resource is sufficient, the whole network stack and EAP-TLS client could be involved in TEE". But if the TEE resource is restricted like IoT devices, there may have a demand to identify a device's ID in minimum cost and in trustworthiness. IDevID is a module for ID generation and storage, and it suggests to use EAP-TLS as authentication protocol. But IDevID cannot protect the EAP-TLS protocol during processing. In another word, if an ID was sent out from IDevID and used for identification, the REE environment may steal this ID and use it for replay or spoofing attack.
        In the Annex B.1 of document IEEE Std 802.1AR™-2018 also illustrate the use of IDevID with EAP-TLS, and I think it is different from this draft.
        Thank you for your comment, welcome to cooperate and talk about this topic in any way.  : )



BR
Penglin Yang
China  Mobile

 
From: Laurence Lundblade
Date: 2021-08-04 03:25
To: yangpenglin
CC: rats; chenmeiling; 粟栗
Subject: Re: [Rats] draft-chen-rats-tee-identification-01 and IDevID
Hello,

My primary observation is that the goals of the two protocols are very similar. I didn’t know whether you had looked at IDevID or not.

Also, I think an implementation of IDevID could be put in a TEE. Then your security goals would be met, I think.

This is just to offer a few thoughts and ideas. :-)

LL




On Aug 2, 2021, at 7:51 PM, yangpenglin@chinamobile.com wrote:

Hello there,as one of the authors, thank you very much for your advice, and it helps a lot. I made a comparison below to make a clarification about the difference and the meaning of TEE identification.
Architecture of IDevID
<CatchA81D.jpg>


Architecture of TEE Identification
<Catch04E1.jpg>
    In figure 1,the identity of IDevID will be exposed during the interface which is shown in arrow. In another word, there is no trusted binding between the ID and EAP-TLS server. If the attestation device is compromised, the attackers could obtain the ID and use it in other authentication scenarios.
In figure 2, all the ID related data will be encrypted by EAP-TLS handshake keys. The Inner middle layer could only export the handshake secret key encrypted certificate after verifying the credentials of EAP-TLS server. Since the EAP-TLS server will generate a random during every connection, so this architecture could also prevent replay attack.
The above is the fundamental distinction of these two architectures. This TEE identification architecture also indicates that this draft mostly focuses on the Inner middle layer and external middle layer design to provide a mechanism that could build a trusted connection between TEE and EAP-TLS Server. 
In the webinar there is a question about which identity should be supported in the architecture. Because of time limitation we cannot communicate very well. I think that the draft doesn’t restrict the type of identities since it can use X509 or RPK to identify during the process of EAP-TLS establishment. Or other identities could be sent out as encrypted application layer data after the EAP-TLS establishment.
AS a summary, the meaning of this architecture is to build a trusted authentication procedure with EAP-TLS server when the TEE resource is restricted. (If the TEE resource is sufficient, the whole network stack and EAP-TLS client could be involved in TEE.) And based on the protection of TEE, the sensitive data like IDs, keys will never be exposed in REE as plaintext.   




BR 

Penglin Yang 
China Mobile

 
From: Laurence Lundblade
Date: 2021-07-31 06:33
To: rats
CC: chenmeiling; suli
Subject: [Rats] draft-chen-rats-tee-identification-01 and IDevID
This is just to note that draft-chen-rats-tee-identification-01 seems conceptually similar to IDevID which is described in 
IEEE Std 802.1ARTM-2018, the title of which is "Secure Device Identity”.
 
LL