Re: [Rats] [Teep] EAT claims needed by TEEP

Giridhar Mandyam <mandyam@qti.qualcomm.com> Thu, 11 November 2021 17:54 UTC

Return-Path: <mandyam@qti.qualcomm.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2E7F53A0DD8; Thu, 11 Nov 2021 09:54:24 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=qti.qualcomm.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sTcLi09f3hPi; Thu, 11 Nov 2021 09:54:19 -0800 (PST)
Received: from esa.hc3962-90.iphmx.com (esa.hc3962-90.iphmx.com [216.71.142.165]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2501C3A0DD9; Thu, 11 Nov 2021 09:54:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=qti.qualcomm.com; i=@qti.qualcomm.com; q=dns/txt; s=qccesdkim1; t=1636653259; x=1637258059; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=IOvEvdOkj+Z9CFi5IFCFGB4VYs6gej18zyTKSuNzsBI=; b=hOVvY5/97DNMsOWy5Dfce+xyslOTlWU62FmghbF30ge1/svKuaqHy2AU OWEdBLMV7ZV0Hwqx7CtBg4i0omNy2N8xEF1BnNfIV+DstaePxEc49zzo+ 74tz6hxbfL/iVdfrh7qx5IoRSI1IQYGCQsE4vDTsmp2LlEIRh+ChVPWq1 I=;
Received: from mail-dm3nam07lp2048.outbound.protection.outlook.com (HELO NAM02-DM3-obe.outbound.protection.outlook.com) ([104.47.56.48]) by ob1.hc3962-90.iphmx.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Nov 2021 17:54:08 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=E2LoNjoVVIjiuxwQnrl0nxjXpDm1GAmEBEn32B0TH8CQ33z4JETZl/hUL7Ox2pAPmPX21fWdypSPLQyiIwrG16g021fM0tOmhTE1Yi8ZiX5QBWdFBKcofmrr/fc6uTPnF3QP4w5O321UhRkgQKdTL4USkAchsRxtIWnM8M+ngirFx1LId866t7ohnqbd2hugBjH1gfmtSQZbpi6qL2qcO8tsB2P7c1CaG82UrWfsc2RJtrRZ9lwhoQtkt1xNumO6hyxOGU+S4X6dJ9F+ScyKUB6Osnv1YnHHE9+x0bB2GqDuDR8Muu3BdlL9jnHtI48W7IoJysdqIhSjcdKIfJ80Rw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=IOvEvdOkj+Z9CFi5IFCFGB4VYs6gej18zyTKSuNzsBI=; b=Y2QJqphpQ+Ol1gt6Gil+LtMQZn3rwJ3rJaTq2Q4BFkrTLRZVTP0a6XqiSpddFfo9eeyjjATxcQ6XaynGHtFaPw94ob0IuoHdcRkHyQVL8v+OV3Dy0A0ljsK1QGdo/oZbmRyhI0Y4nemYTJQcJnSIbbfSuLR6sjk0fYmvFh/oaPuZh8zeDsUVq0VfEB+7aScoh1ZWE3eltxht/+pIKfNQ7GOhbK0ntqfNccQt2D45I2ZPpoDVajbS03GH2itPzMB3+RTh9XiHrVk0+bnCdt9amwaSV3Kojpi5wiXrP/iJns7HsPQZ9ButO8j6eqzYSWcXjCj564pvymPhsxT9IKWnzA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=qti.qualcomm.com; dmarc=pass action=none header.from=qti.qualcomm.com; dkim=pass header.d=qti.qualcomm.com; arc=none
Received: from BYAPR02MB4422.namprd02.prod.outlook.com (2603:10b6:a03:5c::31) by BY5PR02MB6866.namprd02.prod.outlook.com (2603:10b6:a03:237::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4690.16; Thu, 11 Nov 2021 17:54:05 +0000
Received: from BYAPR02MB4422.namprd02.prod.outlook.com ([fe80::53f:eab7:38fd:806b]) by BYAPR02MB4422.namprd02.prod.outlook.com ([fe80::53f:eab7:38fd:806b%7]) with mapi id 15.20.4669.016; Thu, 11 Nov 2021 17:54:05 +0000
From: Giridhar Mandyam <mandyam@qti.qualcomm.com>
To: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>, Jeremy O'Donoghue <jodonogh@qti.qualcomm.com>, Brendan Moran <Brendan.Moran@arm.com>, Laurence Lundblade <lgl@island-resort.com>
CC: Michael Richardson <mcr+ietf@sandelman.ca>, teep <teep@ietf.org>, Dave Thaler <dthaler@microsoft.com>, "rats@ietf.org" <rats@ietf.org>
Thread-Topic: [Rats] [Teep] EAT claims needed by TEEP
Thread-Index: AQHX1u8/RrLJ4E2SS0CV8CALDSSxJKv+P4sAgAAK9YCAAE5NAA==
Date: Thu, 11 Nov 2021 17:54:05 +0000
Message-ID: <BYAPR02MB4422B64D5EE0990C4913439B81949@BYAPR02MB4422.namprd02.prod.outlook.com>
References: <BL0PR2101MB102770B8E03B95A44497004CA3190@BL0PR2101MB1027.namprd21.prod.outlook.com> <2D53BD60-4FA8-4153-B28B-585E902845AE@island-resort.com> <AM6PR08MB423141370A5CE9DEF6C732C69C140@AM6PR08MB4231.eurprd08.prod.outlook.com> <3370D92E-23C2-41C3-B86F-A65C168E9082@island-resort.com> <AM6PR08MB42311D76B24E866812171BDC9C140@AM6PR08MB4231.eurprd08.prod.outlook.com> <CH2PR21MB14640330E3DA58D2144659F7A3919@CH2PR21MB1464.namprd21.prod.outlook.com> <C9FCDB94-1734-4F6C-B6D9-DDB384827E06@island-resort.com> <CH2PR21MB146427B07435A5F36DAE5782A3919@CH2PR21MB1464.namprd21.prod.outlook.com> <27150.1636465193@localhost> <A40BE985-E12E-4B5E-8995-F4408134AEE4@island-resort.com> <398725.1636575788@dooku> <CH2PR21MB14646282D207490FD0C6D69BA3939@CH2PR21MB1464.namprd21.prod.outlook.com> <43D84D56-26B1-4726-A3AC-E918071592BB@island-resort.com> <EF42F5C1-91CC-4965-ABEF-FEDDE04454BF@arm.com> <PH0PR02MB72563446B396CC589FAC710AF2949@PH0PR02MB7256.namprd02.prod.outlook.com> <7ac10246-cc27-d564-609b-bf4ee034eae9@sit.fraunhofer.de>
In-Reply-To: <7ac10246-cc27-d564-609b-bf4ee034eae9@sit.fraunhofer.de>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=qti.qualcomm.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b0b877df-2c42-4a22-2f02-08d9a53c40e8
x-ms-traffictypediagnostic: BY5PR02MB6866:
x-microsoft-antispam-prvs: <BY5PR02MB68667437B2FDFF314036FA9281949@BY5PR02MB6866.namprd02.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:6790;
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BYAPR02MB4422.namprd02.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(83380400001)(508600001)(8936002)(186003)(38070700005)(9686003)(5660300002)(4326008)(66446008)(66946007)(122000001)(64756008)(7696005)(6506007)(52536014)(66556008)(66476007)(26005)(53546011)(38100700002)(71200400001)(33656002)(316002)(2906002)(76116006)(86362001)(966005)(8676002)(54906003)(55016002)(45080400002)(110136005); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: =?iso-8859-1?Q?zozZA2YiIicjSNBDu+ysq29ygGi80AM82OI4zt0cNX8qxDvIw3DZbZQE7k?= =?iso-8859-1?Q?IucYn/m3nYKNt1r9IH5Yvrz6+DTO9yefleRY/8gDfz22p6oWOXjBOD6LEH?= =?iso-8859-1?Q?mwlI6EgZaiId0oDvUMoHNR7uQz3e/OufFxijs5NnWOiTihdx38zHYVAIDH?= =?iso-8859-1?Q?GlcFWaHmIZ6nVAi0vk8OwJZZBQadZmUyN0iLi9QZ/5qr55LFtYRFLnwo9j?= =?iso-8859-1?Q?PThQA8zR9/CHXiKBwrJUB1g0VJIsofLvU9s7zlVDq/ZN2iAYG44M6gMeDy?= =?iso-8859-1?Q?a18zFLuk+f0cXcaWKhCLZ5wiSkriBpu7Ri/BVFxTKTLrN7Tpd7TU6MUALV?= =?iso-8859-1?Q?waiJ66i4MXuezUrGNqhzmuhRIxxDtcQOmsyhOKt3DAmgJdoc8PD2S7jGPi?= =?iso-8859-1?Q?86Vl9ETGP+rtNrT+lj0q6dORyZeezgIRUrcEFLYuGxiijs1N3P/6DRKK3p?= =?iso-8859-1?Q?l1qPr/pEB0ij2xm//3mVU5gW2cPQykeqGS7suvhhxvx02el6eggKfhekz3?= =?iso-8859-1?Q?fs7UycB7iCXVlvZrh5RIxIkDdLf5IXbYYng1FsxBRB+0MTUNv92SlysXWf?= =?iso-8859-1?Q?pwtHxtKp0johvXFSMMKlONywtmk5LhWa+B+gUM0FWPvgjA/PI7hgEJmz9I?= =?iso-8859-1?Q?joXXHLXbTG4WI/E4Up7Eorp/C6h8y8bmlmgjeeDYqa+tlwTKAsSaJqoj57?= =?iso-8859-1?Q?pvOabKQYbZQ4wBk06oxAApwH3aM1SPZXtIL1cqR8aN0kyTglhjS+EhYoqH?= =?iso-8859-1?Q?9mFNWZQBu9WcKlACWVrShHebwoYwHwBwnxozyQbKDziSmjMQ7WwiN20T+4?= =?iso-8859-1?Q?CnxILFPzd/xLiGWdtxH6yaSyEeLqvmoTJbn0m5cxvEvRV/i7pntUG+2iQr?= =?iso-8859-1?Q?sV2Z5j4SbZhVSso6AeHNN/oy3Qas1h8qUqs0yav9AXpTdsJGYBhv5V3uYs?= =?iso-8859-1?Q?WzGZ5EAn5CMuvHhMa3JDoFPlp/Rh29smr0WWp883KvfSwcSz0HxkvO9nHm?= =?iso-8859-1?Q?9LcJOGWDrlR6JxDjtysIvGgEHIyu/TUYMAQi0ODDrXGsMtwbF7fgpRcg1f?= =?iso-8859-1?Q?nCfLJUNKOdbA+krpQHhaDjbvCR9JULq/FM74nuY+Tw58grBZtYpeOC/o6i?= =?iso-8859-1?Q?6Ts14+mrGvwh241rFUmDMn85VhJcNK8yvLUvUlB25tPbRvdQ78+QuAWc2L?= =?iso-8859-1?Q?goK4FPaSCO3e/WOvsLWsjNcmpEg+rjdK8B5jIUfu/oy1AXFTxqqayYhYzY?= =?iso-8859-1?Q?7jY1YeE0MBJ90CaqHbgLsGINiniCz6+B2Wszo2gQHnVTnBl6sKJFJJQSsE?= =?iso-8859-1?Q?hBpHquXzylTcMWqDKRYVfolyqVT4eowUnmn0Z9qxGiO5pBqzrsJiDzRkPP?= =?iso-8859-1?Q?I8C5sIuRVuYMqB7OArZWmxkp2CmokbxQyoviWu0ik/kAKsGBC5xOLsoTm/?= =?iso-8859-1?Q?7mzXTRQEmYU4ao3juYHCmvs64c3EJOpIxYX+JpirVJYTP7yZ5gjDJvflcH?= =?iso-8859-1?Q?RpFZGUtllfqDwhc59yVGjyBgWI7p7IG5OsWijcOfOpl4b1f1Z7TLGdfYp8?= =?iso-8859-1?Q?4QInyLQQ/0e1kuvwugdGfUUj9LT35YvcIIbcDCsDtFGImJoACWzi7WoYx5?= =?iso-8859-1?Q?ykTTAARHr7ZQqbGLt728bIHt/aUerv47AOngAiQxFBif/nyYcLcnzzfBjT?= =?iso-8859-1?Q?6QnzGzs9OsJgjzMnx4T+Dmm6BE14O9720Fru/KH/OiL2wRSz0f6qsxj1Z6?= =?iso-8859-1?Q?Xakg=3D=3D?=
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: qti.qualcomm.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BYAPR02MB4422.namprd02.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b0b877df-2c42-4a22-2f02-08d9a53c40e8
X-MS-Exchange-CrossTenant-originalarrivaltime: 11 Nov 2021 17:54:05.4045 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 98e9ba89-e1a1-4e38-9007-8bdabc25de1d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: pd9a7cIQnUPW4WfreikbveKmsFgLwNayJ+IZG8F8kT3H23myI106YMhX5OlcO3RgDfpkM4mQxmzyXoik979Z0fCYxRRiuj0l2rfiLMs5h9Y=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: BY5PR02MB6866
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/0NFJC2huGUG2HwltYhPrys-yUgo>
Subject: Re: [Rats] [Teep] EAT claims needed by TEEP
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 11 Nov 2021 17:54:24 -0000

I am not seeing any consensus here.  

Since the TEEP Working Group (or at least persons who claim to speak for the TEEP WG) is the one making the assertion that EAT needs an additional claim, I think it is up to the TEEP Working Group to come back with a solid proposal and perhaps even create the corresponding PR.  There is a candidate PR (https://github.com/ietf-rats-wg/eat/pull/139) created by the EAT editorship, but it might make sense for this issue to be brought back into the TEEP WG and achieve consensus there.  Given that several persons who have commented on the PR and on this topic are active TEEP participants, I am lead to believe there is disagreement even within the TEEP WG currently.

RATS Chairs,

As a co-editor, I don't think we are in a position to generate a -12 draft of the EAT document to include this TEEP claim because proponents have not articulated what actually is required for such a claim.  I also don't believe this should be a LC blocking issue.  If the TEEP WG can decide on a formal proposal for a class claim, then this can be considered as part of Last Call comment resolution.

-Giri

-----Original Message-----
From: RATS <rats-bounces@ietf.org> On Behalf Of Henk Birkholz
Sent: Thursday, November 11, 2021 5:01 AM
To: Jeremy O'Donoghue <jodonogh@qti.qualcomm.com>om>; Brendan Moran <Brendan.Moran@arm.com>om>; Laurence Lundblade <lgl@island-resort.com>
Cc: Michael Richardson <mcr+ietf@sandelman.ca>ca>; teep <teep@ietf.org>rg>; Dave Thaler <dthaler@microsoft.com>om>; rats@ietf.org
Subject: Re: [Rats] [Teep] EAT claims needed by TEEP

WARNING: This email originated from outside of Qualcomm. Please be wary of any links or attachments, and do not enable macros.

Thanks Jeremy for you thorough summary,

the extensible type-choice highlighted by Thomas - and extended by your proposal - is based on:

> https://github.com/ietf-rats/ietf-corim-cddl/blob/main/concise-mid-tag
> .cddl

To Brendan's point here:

> https://github.com/ietf-rats-wg/eat/pull/139#issuecomment-966230941

Trying to alter the semantics of SUIT-related information elements in order to generalize to a CWT Claim registry applicable scope might exceed feasibility. I am not against specifying a Claim with a string value that intends to identify a kind of hardware class in a given scope in the EAT I-D. But years ago (before chartering RATS) some decisions were made in EAT to work with a flat list of Claims and not a taxonomy of assertions, which now leaves us with the issue that we cannot cram all the semantics into a single Claim nor can we define subclass trees of assertions.

In summary, we can define a HW class Claim in EAT that uses a string value now and move forward. The other HW class identifiers can be handled by the corresponding documents where they are specified and used. Adding corresponding CWT Claims registry requests when these documents progress seems sensible to me.

What do others think?

Viele Grüße,

Henk

On 11.11.21 13:21, Jeremy O'Donoghue wrote:
> Almost every point that has been made is reasonable, but I think we 
> are typing to boil the ocean if we attempt to create a universal (or 
> even "very widely applicable" HW class in EAT). Unfortunately we also 
> have existing standards for HW where human readable strings form 
> all/part of a normative HW definition - I do not think it is 
> reasonable to simply disallow them, even if the approach is, as 
> Brendan rightly states, not ideal.
>
> Since the thread started by stating that being able to attest a TEE is 
> a good idea, I will add that one relevant example where strings are 
> used in this way is the GlobalPlatform TEE Management Framework (and 
> GlobalPlatform OTrP management framework). These definitions cannot be 
> changed in a backward-incompatible way (GlobalPlatform 
> interoperability rules), so we are already in a position where what 
> are almost certainly the most extensively commercially deployed TEE 
> management frameworks in the world have a normative structure which 
> employs strings (for those interested the relevant claims are in 
> sections 9.1.3, 9.1.4, 9.1.5 and
> 9.1.6 of the GlobalPlatform TEE Management Framework)
>
> To summarize what I have proposed in the PR
> (https://github.com/ietf-rats-wg/eat/pull/139/commits/d4e19b4a091cbbd6
> f94545688e2d1fc33c39a136 
> <https://github.com/ietf-rats-wg/eat/pull/139/commits/d4e19b4a091cbbd6f94545688e2d1fc33c39a136>).
>
>   * EAT should define two or three ways to encode HW class which are
>     known to be collision-resistant. Thomas Fossati has suggested OID,
>     UUID and URL in the PR, and this seems reasonable to me.
>   * EAT should allow profiles to extend the HW class type.
>       o My suggestion is that this pluggable type should be CBOR encoded
>         so that a verifier that does not know how to decode a particular
>         pluggable type can at least treat it is a somewhat-significant
>         stream of bytes.
>       o Further, plugable type SHOULD be used in conjunction with
>         profile claim
>       o Where pluggable type is used with profile claim, the combination
>         profile claim + bstr encoding of pluggable type SHALL uniquely
>         identify HW
>
> I think this places us in a reasonable position from a standardization 
> perspective without trying to cover all bases, and remembering that 
> having a mechanism to enable EAT to be used with existing schemes that 
> may have infelicitous characteristics is a useful goal.
>
> In CDDL my proposal looks like:
>
> hardware-class-label => $hardware-class-type
>
> $hardware-class-type /= tagged-oid
>
> $hardware-class-type /= tagged-uuid
>
> $hardware-class-type /= tagged-url
>
> $hardware-class-type /= bytes .cbor pluggable-x-hw-class-type
>
> Best regards
>
> Jeremy
>
> On 11/11/2021, 11:28, "TEEP" <teep-bounces@ietf.org> wrote:
>
> *WARNING:*This email originated from outside of Qualcomm. Please be 
> wary of any links or attachments, and do not enable macros.
>
> Strings are not the right choice for machine readable fields. There 
> are extremely good reasons not to use them. Please do not use strings 
> for model IDs.
>
> When you have a string, it is inevitable that someone in marketing 
> will realise that it's human-readable. The next step is that it must 
> be controlled to preserve brand image. When this happens, it is also 
> inevitable that *wildly incompatible hardware* with *the same 
> function* will be forced into the same "model number."
>
> By making model identification explicitly non-parseable by humans, we 
> prohibit its use as a controllable, human facing identifier. This 
> ensures that it has a better chance of being used correctly as a means 
> to distinguish between mutually incompatible versions.
>
> Human readable strings used as machine-readable distinguishing tokens 
> are a bad idea. Don't do it.
>
> Brendan
>
>
>
>     On 10 Nov 2021, at 21:25, Laurence Lundblade <lgl@island-resort.com
>     <mailto:lgl@island-resort.com>> wrote:
>
>     An advantage of a string over a UUID is that it can be very short if
>     that's all the OEM needs, "S", "3, "X" and "Y" in the case of Tesla.
>
>     LL
>
>
>
>         On Nov 10, 2021, at 1:03 PM, Dave Thaler <dthaler@microsoft.com
>         <mailto:dthaler@microsoft.com>> wrote:
>
>         If it's a string, I think it should be up to the vendor
>         specified by the oemid,
>         rather than by a vendor-agnostic profile.
>         If it's a UUID then that's not needed.
>
>         Personally I would argue for treating it as opaque in either case
>         and a verifier should only compare it for equality, rather than
>         permitting
>         semantic structure in it.   That's because I think some hardware
>         implementation
>         may fillvin values that can be used for multiple profiles.
>
>         Dave
>
>         -----Original Message-----
>         From: RATS <rats-bounces@ietf.org
>         <mailto:rats-bounces@ietf.org>> On Behalf Of Michael Richardson
>         Sent: Wednesday, November 10, 2021 12:23 PM
>         To: Laurence Lundblade <lgl@island-resort.com
>         <mailto:lgl@island-resort.com>>;rats@ietf.org
>         <mailto:rats@ietf.org>; teep <teep@ietf.org <mailto:teep@ietf.org>>
>         Subject: Re: [Rats] EAT claims needed by TEEP
>
>
>         Laurence Lundblade <lgl@island-resort.com
>         <mailto:lgl@island-resort.com>> wrote:
>
>             Appreciate the comments.  Think it is important to keep this
>             generic
>             since it is going in EAT. TEEP can have specific ways it
>             uses HW class,
>             but don't think we should be referencing TEEP in EAT.
>
>
>         Then I suggest that:
>
>              "There is no global scheme or format for this claim."
>         ->
>              "The format for this scheme will need to be specified
>         within profiles that
>               use it."
>
>         --
>         ]               Never tell me the odds!                 | ipv6
>         mesh networks [
>         ]   Michael Richardson, Sandelman Software Works        |
>         network architect  [
>         ] mcr@sandelman.ca
>         <mailto:mcr@sandelman.ca>https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.sandelman.ca%2F&amp;data=04%7C01%7Cdthaler%40microsoft.com%7C47461df1d4ae4c6cc7f208d9a487f27c%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637721726675767230%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=%2BOIH8fZw6zju18DcoR9hQ4HkrtDsMkhTXwQTitkKsSQ%3D&amp;reserved=0
>         <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.sandelman.ca%2F&amp;data=04%7C01%7Cdthaler%40microsoft.com%7C47461df1d4ae4c6cc7f208d9a487f27c%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637721726675767230%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;sdata=%2BOIH8fZw6zju18DcoR9hQ4HkrtDsMkhTXwQTitkKsSQ%3D&amp;reserved=0>       |
>            ruby on rails    [
>
>
>         --
>         Michael Richardson <mcr+IETF@sandelman.ca
>         <mailto:mcr+IETF@sandelman.ca>>, Sandelman Software Works  -=
>         IPv6 IoT consulting =-
>
>     _______________________________________________
>     TEEP mailing list
>     TEEP@ietf.org <mailto:TEEP@ietf.org>
>     https://www.ietf.org/mailman/listinfo/teep
>
> IMPORTANT NOTICE: The contents of this email and any attachments are 
> confidential and may also be privileged. If you are not the intended 
> recipient, please notify the sender immediately and do not disclose 
> the contents to any other person, use it for any purpose, or store or 
> copy the information in any medium. Thank you.
>
>
> _______________________________________________
> TEEP mailing list
> TEEP@ietf.org
> https://www.ietf.org/mailman/listinfo/teep
>

_______________________________________________
RATS mailing list
RATS@ietf.org
https://www.ietf.org/mailman/listinfo/rats