Re: [Rats] UEID comments (was Re: Same claim in Evidence and Results (was Re: Second attempt at early allocation of CWT Labels (PR #152)))

"Smith, Ned" <ned.smith@intel.com> Tue, 22 February 2022 20:18 UTC

Return-Path: <ned.smith@intel.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 153AA3A0CF0 for <rats@ietfa.amsl.com>; Tue, 22 Feb 2022 12:18:07 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.673
X-Spam-Level:
X-Spam-Status: No, score=-7.673 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.576, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=intel.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ne5Rg6QKTCjd for <rats@ietfa.amsl.com>; Tue, 22 Feb 2022 12:18:02 -0800 (PST)
Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 26B013A1404 for <rats@ietf.org>; Tue, 22 Feb 2022 12:18:01 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1645561082; x=1677097082; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=kimBMlJTnOxdbo6y0yy/NN/xX6xoyDw7hKVoBtah39A=; b=CWQJgRyH4oF85tdKwmWRtE301CXICsCVL9dubjMM0Z/Lga3db3rTjYhy SpZWHUGo+IYkYzW891YcQxzTfgIxFe1kzyBGDZ88QaYwEqNizswz40C3/ u7fPUPbCWHmVY8G0QQONReGY3mb0eOkEgM/jkgu6PddxImRh0Adp9wlEq QyM2BZjKpg7TY8c8pnTtqgh76JRiL0IBX0W1beqJCqFmCb33w/xOyhEiJ CtztguEG0JfGVyPqmHQlPskA9unn+gRGNri+iZnQm5gwME9TSYmSSXtWT ZafDazWAP44vBVpHFJttrLgh4HO4bKAwKUq3nP8jQAUGkoWJ3xTBgd9vj A==;
X-IronPort-AV: E=McAfee;i="6200,9189,10266"; a="231777808"
X-IronPort-AV: E=Sophos;i="5.88,387,1635231600"; d="scan'208,217";a="231777808"
Received: from orsmga006.jf.intel.com ([10.7.209.51]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Feb 2022 12:18:01 -0800
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.88,387,1635231600"; d="scan'208,217";a="508137177"
Received: from orsmsx606.amr.corp.intel.com ([10.22.229.19]) by orsmga006.jf.intel.com with ESMTP; 22 Feb 2022 12:18:00 -0800
Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX606.amr.corp.intel.com (10.22.229.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.20; Tue, 22 Feb 2022 12:18:00 -0800
Received: from orsmsx607.amr.corp.intel.com (10.22.229.20) by ORSMSX610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.20; Tue, 22 Feb 2022 12:17:59 -0800
Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by orsmsx607.amr.corp.intel.com (10.22.229.20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.20 via Frontend Transport; Tue, 22 Feb 2022 12:17:59 -0800
Received: from NAM04-MW2-obe.outbound.protection.outlook.com (104.47.73.169) by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2308.20; Tue, 22 Feb 2022 12:17:59 -0800
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=bPvT6f+xI4gqG1QxkyCaEwZwbJq95kSDp0XN640aCjgtsB7EP3TSZWAlaN4TA3lvcM/6LkNKrnffJIPBi0UITXdt42RfFWeIysETjgEL2OiZ5VKJ3oDNbmVSAnS7kAHsDJehayPb3KiGe0bCE5lzXgrNm+rcOKQCwH5aN964al+vat1OcalYtfJ93WWad23imctaLmRArW0/jXBW2udkUXN9OFHRb4esFOc9xRtE/wg8+xzWZLUX2M0vGezzsK8LJjTp61ORtJr2qgtPhOpc6QF2z+qxQMqkvbk2vo310CrsuQ1WIs/Pj/FLZ1EIMlJDxaw3Roj0+YpUdwvBqhTAPw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=kimBMlJTnOxdbo6y0yy/NN/xX6xoyDw7hKVoBtah39A=; b=J4noOUWW+rAzQmulL9yjJEjIvHyQRznZtlomv+3WC0hxrEAJnI0MIRkDhB56J6RDNbTXP0dfcHZehMuEjoNiKU2jt6rVy2VLRVXWSboNzcYMElkzcMeSr6oJesY5Gn2o1Qcf5jqdJa+0CxKIftYGYnQWXqmGRCjENtiY3vKxR5GAjMGLU4czXdMjzupT9DM37rq8MTTnSYIl4Ov0jrUGPTG3eDtNjWpy27Yvue8v9wnMcNvRFCG/dlHs5s54TqWk+1+KYWEMyBxICCpmFAxX8PRXUNsigjcXyqs8yAeFTPyjlYks1Eq1WD53287Ymcn6giOM0KJlPVj8FhkofxJm1g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none
Received: from SJ0PR11MB5184.namprd11.prod.outlook.com (2603:10b6:a03:2d5::5) by CO6PR11MB5649.namprd11.prod.outlook.com (2603:10b6:5:35b::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5017.21; Tue, 22 Feb 2022 20:17:58 +0000
Received: from SJ0PR11MB5184.namprd11.prod.outlook.com ([fe80::5cab:988d:9002:8251]) by SJ0PR11MB5184.namprd11.prod.outlook.com ([fe80::5cab:988d:9002:8251%5]) with mapi id 15.20.4975.011; Tue, 22 Feb 2022 20:17:58 +0000
From: "Smith, Ned" <ned.smith@intel.com>
To: Laurence Lundblade <lgl@island-resort.com>
CC: Henk Birkholz <henk.birkholz@sit.fraunhofer.de>, "rats@ietf.org" <rats@ietf.org>
Thread-Topic: UEID comments (was Re: Same claim in Evidence and Results (was Re: [Rats] Second attempt at early allocation of CWT Labels (PR #152)))
Thread-Index: AQHYKBoXtFegu9DYHESXXKc3gvUs3ayffD+A
Date: Tue, 22 Feb 2022 20:17:58 +0000
Message-ID: <820DE19F-A0AA-4190-9FAD-51084882860E@intel.com>
References: <AM6PR08MB43254A236E44B49C1DCD9F8C8E369@AM6PR08MB4325.eurprd08.prod.outlook.com> <4706A62A-DA9F-4FA7-9E65-B27748D3F408@island-resort.com> <c2ea51c0-baeb-14cf-1d32-40b2995bd1ce@sit.fraunhofer.de> <4DABED4B-01F0-4678-8974-DC914BC170C5@island-resort.com> <e8b0895b-e3d9-0e33-e4a2-7d5e8b5ecc5e@sit.fraunhofer.de> <F1D075F6-1704-4B04-B127-9BB590C38004@intel.com> <a2c808b6-e8e9-ff73-b834-8772c5d0c365@sit.fraunhofer.de> <543A724D-C060-43AC-82C6-489D57A898D2@island-resort.com> <C50E82F7-B9FE-48F3-9BF2-2BC05B2A9D51@intel.com> <B0F27C02-BAEB-4324-B444-26DF296A726B@island-resort.com>
In-Reply-To: <B0F27C02-BAEB-4324-B444-26DF296A726B@island-resort.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.58.22021501
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7721699d-3e9c-4ee6-adf9-08d9f6406b08
x-ms-traffictypediagnostic: CO6PR11MB5649:EE_
x-microsoft-antispam-prvs: <CO6PR11MB5649437724D32DA9863F5D17E53B9@CO6PR11MB5649.namprd11.prod.outlook.com>
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR11MB5184.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(8676002)(83380400001)(53546011)(33656002)(91956017)(4326008)(122000001)(71200400001)(36756003)(26005)(76116006)(6486002)(966005)(54906003)(186003)(66946007)(6506007)(2906002)(66476007)(38070700005)(66556008)(66446008)(64756008)(6916009)(5660300002)(316002)(30864003)(508600001)(2616005)(38100700002)(6512007)(166002)(86362001)(82960400001)(8936002)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_820DE19FA0AA41909FAD51084882860Eintelcom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR11MB5184.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7721699d-3e9c-4ee6-adf9-08d9f6406b08
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Feb 2022 20:17:58.2456 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: WvG2Msm18bKylSOmFJbpnQI2jaN2CO81NWYtv8gOm7AOH87taG+ZQqsacNSfBRtL9vidCF1nq5XxvV0TEtEMZg==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO6PR11MB5649
X-OriginatorOrg: intel.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/5TAiVFSDrlQV2SeAAFgzwqLBFAU>
Subject: Re: [Rats] UEID comments (was Re: Same claim in Evidence and Results (was Re: Second attempt at early allocation of CWT Labels (PR #152)))
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 22 Feb 2022 20:18:07 -0000

My comments in green font. -Ned

From: Laurence Lundblade <lgl@island-resort.com>
Date: Tuesday, February 22, 2022 at 10:29 AM
To: "Smith, Ned" <ned.smith@intel.com>
Cc: Henk Berkholz <henk.birkholz@sit.fraunhofer.de>, "rats@ietf.org" <rats@ietf.org>
Subject: UEID comments (was Re: Same claim in Evidence and Results (was Re: [Rats] Second attempt at early allocation of CWT Labels (PR #152)))

Hi Ned,

Forking this discussion to focus on the UEID issues.


On Feb 21, 2022, at 12:22 PM, Smith, Ned <ned.smith@intel.com<mailto:ned.smith@intel.com>> wrote:

(not as chair)
Laurence,
I wasn't advocating for limiting the scope of certain claims to a specific conceptual message. I'm suggesting that for a claim to be fully defined its definition should consider what the claim means in each conceptual message context.

For example, a computer that consists of a main board, cpu complex and nic / radio might have 3 UEIDs. Each component would be considered a 'device' by its manufacturer hence the requirement that only one UEID be used can be met. However, upon integration of these components, there are 3 UEIDs in the computer that could be reported in evidence. However, one of them will be considered the unique identifier for the computer from the perspective of identifying and authenticating the computer to a Verifier. Possibly the OEM would assert the OEM provided UEID is the computer identity or alternatively, the NIC UEID would be used considering it could be the logical endpoint of a secure connection.

This is just a simple example, but it highlights that context matters.

The EAT text "(Note that while devices with multiple network interfaces have multiple MAC addresses, there is only one UEID for a device)" if interpreted as normative could have profound impact on the supply chain if "device" is interpreted as "computer", in the above example, as it would require all the component vendors to remove their use of UEIDs. But in the context of the Verifier producing attestation results, the UEID that was used to establish the secure channel over which the computer was authenticated and appraised, then that UEID would likely be the right identifier to represent to the Relying Party - since that was the identifier that had the attestation credential.


There are issues like this for every claim in an EAT that is used to represent a composite device, not just UEIDs.
There could be clearer language about what constitutes a device, composite device, entity or a sub-module. I’ll use ‘entity’ to mean any of the above.  There are multiple structures that can represent the set of claims that belong to an entity.  For example, a token (CWT/JWT), UCCS or a submod could be used for the same or different entities.

But the language used to describe the claim (in some cases) implies a particular scope. I just picked on UEID as an example. Debug and hardware version are others as well. Since scope is defined by the entity that asserts the claims, it would be better to describe claims using terminology that doesn’t assume scope IMHO.

These composite device issues arise whether the EAT is Attestation Results or Evidence too. It is perfectly OK for some EATs to pass the deep structure of a complex device to a RP and for others to only pass a summary to the RP.

We’re not going to create any kind of protocol or system definition language here in RATS that can describe all composite devices. All we can do is provide basic constructs. Submods is the main construct for that.

Attestation systems based on EAT will vary widely. We can’t expect an attestation system that fully represents a complex mobile phone to also do small high-value IoT devices. Even on a mobile phone, there could be multiple implementations of EAT for different use cases that the mobile phone supports. Perhaps one for FIDO, one for the Android key store, several for content protection in different content handling apps...

There are other apparent contradictions in the UEID definition that require context to sort out. In the context of this wording "Several types are allowed to accommodate different industries and different manufacturing processes" it seems the intended context is Endorser / RVP.

All claims can be discussed from the manufacturer’s view separately from the consumer’s view. Someone has to generate them and someone has to consume them. Discussing the manufacturer’s view separately doesn’t imply semantics vary depending on who consumes them.
I guess I disagree. Someone implementing the spec wears the hat of one of the roles. It will be confusing if the descriptions randomly  switch hats.
The three types of UEID are from the manufacturer view only.
This then means the claims are asserted from an Endorser or RVP perspective. However, if the identifier was used to construct an identity (meaning the device could authenticate the identifier) then it is also a claim from the point of view of the device (entity).

Here are 4 examples:

(1)     a device might have an IMEI (UEID-A) and a type 1 random UEID (UEID-B). UEID-B is used in a device-id certificate while UEID-A is a value that exists in a NIC (and for the purposes of this example, doesn’t have an exposed interface to the code that is authenticating using UEID-B). A secure session between Verifier and Entity-B uses the certificate to associate UEID-B to entity-B. The UEID-B might not exist on the device at all. But the device is asserting UEID-B by using the private key of the certificate that contains UEID-B. Hence, there is both a mfg and a device perspective.

(2)     UEID-A exists on the device, but doesn’t appear in any evidence that entity-B generates. However, it could be included in a manifest or as an attribute to the certificate stating that the device (containing entity-A) has UEID-A. This is an endorsement since it doesn’t appear in evidence or a certificate. The fact that UEID-A exists on the device (even though the value wasn’t reported) means there is a device perspective.

(3)     Entity-A has an attesting environment that collects UEID-A as evidence. It isn’t used to authenticate the channel to the verifier so from the verifier’s perspective it isn’t an identity. From the device’s perspective it is evidence. This means the verifier should have a reference value claim for UEID-A, otherwise, it isn’t going to pass appraisal. This is a device perspective.

(4)     As a variation on (3), instead of including UEID-A in Evidence. It is included in a protocol data unit for a management interface that dumps configuration data. It isn’t endorsement or RV because it wasn’t signed by an Endorser / RVP. It isn’t evidence because it wasn’t signed by an Attesting Environment. But it did come from the device (entity), hence there’s a device perspective.


While another line "The consumer (the Relying Party) of a UEID MUST treat a UEID as a completely opaque string of bytes and not make any use of its internal structure." strongly implies Relying Party context.

If we make the text “The consumer (e.g., the Verifier or the RP) of a UEID…” then the text is fine. It is a minor adjustment to the text.

The text still holds. The consumer, be it the Verify or the RP, still treats the UEID exactly the same. There is no variance by context for UEID.
Since verifier and RP are supposed to treat UEID as opaque, there is nothing they can (should) do other than check binary equivalence. That means they only care about the number of bytes and byte order convention. Everything in the UEID type tables should be regarded as informative. But since the typing exists and the language for how the various types of UEIDs are constructed exists, it seems to contradict the idea that UEID values are opaque. It appears the normative language is aimed at manufacturers (Endorsers or RVPs), but there is no way to verify these properties are valid. A description of the properties in a document isn’t enforcement.


The type 2 UEID indicates the Endorser / RVP identity is included: "This makes use of the IEEE company identification registry." A type 2 UEID could be used to avoid having to use a separate vendor identity claim. But if the relying party must treat it as opaque, then something has to supply a vendor identity claim in some other way. Possibly, the Verifier extracts the vendor ID from the UEID and recasts it in some other form?

The separate vendor ID claims exists. It is the HW OEM ID. The document mentions this explicitly. There is no issue here.
The issue is that the draft requires a type 2 UEID to include a manufacturer identifier. If it isn’t used (at the end of the day) why put it in the document? It should at least be marked as informative.



Another apparent contradiction is:
"Device manufacturers are allowed to change from one type of UEID to another anytime they want."
And
"The UEID is permanent. It never change for a given device / entity."

If a manufacturer changes the device identity, say because they re-manufactured the device after deployment by retiring an embedded key that possibly has worn out or was compromised, and therefore wanted to give the device a new identity. Then it is unclear which of these statements normatively applies. Possibly, the first statement applies in the context of Endorsement / Reference Values while the second statement applies in the context of Evidence collection (where an observed change in UEID would be a red flag if it changed from one attestation event to the next).

There is no contradiction here.

A manufacturer can’t change the UEID of a device once it is made, but it can switch to a new type of UEID for new devices it makes in the future.
A manufacture can change a UEID value. Writing text in a document doesn’t enforce the behavior described in the text.
But this wasn’t my point above. There are valid use cases for changing the identity of an entity from the manufacturers perspective. However, changing a device identity from the entity’s perspective is an indication that an unauthorized change was made to an identifier.

IMO, given the EAT authors were not intending to describe Endorsement / RVP perspectives or requirements, it makes sense to revisit the text that describes claims from a manufacturers perspective.

I filed an issue <https://github.com/ietf-rats-wg/eat/issues/170> to clarify this.




It might make sense for EAT draft to clarify that "the claims definitions focus on an encoding. Their use in conceptual messages may introduce additional semantics."
Including a caveat like this would make the scope of the EAT draft clearer and possibly easier to make progress toward RFC.

BTW: I noticed the definition of type 3 UEID refers to "SVN" but doesn't (apparently?) define it.

SVN is defined by 3GPP. It is part of the IMEI encoding thing like the Luhn check. While you can’t easily get the 3GPP document referenced, you can see it here https://en.wikipedia.org/wiki/International_Mobile_Equipment_Identity.

LL






Thx,
Ned


On 2/19/22, 6:15 PM, "Laurence Lundblade" <lgl@island-resort.com<mailto:lgl@island-resort.com>> wrote:

   Branching the thread away from early allocation...

   I’d like to understand the motivation and principles behind restricting claims to either evidence or results.

   Maybe you can describe some principles that govern when a claim can be in evidence and when it can be in results?

   What about claims like GPS location or UEID that originate in the Attester and often need to end up at the RP? How would those be handled?


   This seems to be really about allowed Verifier behavior. It seems that if certain types of claims can only be in evidence and other only in results, then you are starting to narrow Verifier behavior. A change to RATS architecture?

   Is there anything wrong with a pure passthrough Verifier. One that only verifies the signature? I can’t think of anything wrong with that and I think it is allowed by the descriptions in RATS architecture.

   Maybe some examples of claims that are evidence-only and results-only?

   LL



On Feb 18, 2022, at 6:00 AM, Henk Birkholz <henk.birkholz@sit.fraunhofer.de<mailto:henk.birkholz@sit.fraunhofer.de>> wrote:

Hi Ned,

I'd agree with the notion that "the same claim in different conceptual messages" requires separate definitions for each conceptual messages. Alternatively, Claims could be explicitly restricted to one type of conceptual messages. This is the reason why I am so cautious about early allocation recently, as I afraid their definition has to change in the future in order to address the issue.

In essence, the fashion the Claim's semantic scope is specified today has to change, I think.

And even if that would be cleared, I am missing a clear way how to express which type of conceptual message an EAT is supposed to represent.
   ...