Re: [Rats] CoTS and CoRIM

"Smith, Ned" <ned.smith@intel.com> Wed, 27 December 2023 18:18 UTC

Return-Path: <ned.smith@intel.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 68637C15199C for <rats@ietfa.amsl.com>; Wed, 27 Dec 2023 10:18:40 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.405
X-Spam-Level:
X-Spam-Status: No, score=-4.405 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-2.3, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=intel.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F9PCHTxC8v70 for <rats@ietfa.amsl.com>; Wed, 27 Dec 2023 10:18:36 -0800 (PST)
Received: from mgamail.intel.com (mgamail.intel.com [192.55.52.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 170D6C15152D for <rats@ietf.org>; Wed, 27 Dec 2023 10:18:35 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1703701116; x=1735237116; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=lZrkql14B7JnISkBDnjtxk/6/VUQKBuSGXvD2Lzmig8=; b=W9gqy4BK7KqRyuGUirMdWuh14lcMAvFkL3wcJcEL4sOJ0rS3EhKm7ggL X4M+h2in4AeMWuKJgVTg9RRQBLF5n943DReqdq+0WMMgqAk5eenAuy5vH ia6efhyLNFHNgtwundBGbq0SFPsmtXN2pEoBieZUdMNeY0qTrDPWOGrL4 SiL6VEBo0BT50ihmeW2LeuFcYK5u1goGiAChl2kfHwUkL6pUDQZ4bFtah V/LCp4MVIArHyaOxZQGvonxgXjKl+Jdkj4b0LoB9duqB6DPQAPB81ZQeI nhG3ealGPuBGchKJpVisNbZ8MMTRzZgN8mNB+ohv2WDwp1Vt43m76/IzI g==;
X-IronPort-AV: E=McAfee;i="6600,9927,10936"; a="482650959"
X-IronPort-AV: E=Sophos;i="6.04,310,1695711600"; d="scan'208,217";a="482650959"
Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Dec 2023 10:18:35 -0800
X-ExtLoop1: 1
X-IronPort-AV: E=McAfee;i="6600,9927,10936"; a="921895190"
X-IronPort-AV: E=Sophos;i="6.04,310,1695711600"; d="scan'208,217";a="921895190"
Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16]) by fmsmga001.fm.intel.com with ESMTP/TLS/AES256-GCM-SHA384; 27 Dec 2023 10:18:34 -0800
Received: from orsmsx611.amr.corp.intel.com (10.22.229.24) by ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Wed, 27 Dec 2023 10:18:33 -0800
Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX611.amr.corp.intel.com (10.22.229.24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Wed, 27 Dec 2023 10:18:33 -0800
Received: from orsedg603.ED.cps.intel.com (10.7.248.4) by orsmsx610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35 via Frontend Transport; Wed, 27 Dec 2023 10:18:33 -0800
Received: from NAM12-DM6-obe.outbound.protection.outlook.com (104.47.59.169) by edgegateway.intel.com (134.134.137.100) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2507.35; Wed, 27 Dec 2023 10:18:31 -0800
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=hbBgAB8aNRaStGzWoi1nK8y3STx/JapcnSSLU8By22mYF2aVNQpec3p4tvCNTOViNBFEdhBrWdY0PBYd426Jgu136D7caOEic951UnXZccmlEAab18g2U7FiokqaL6NKmdFC/0WAzJPLeuQj7PLT/+WOYtNyGBkRCez/K1VF7OQ61KpmUCV6GEtuckIjeBMo7yciM7bJTFacQRP217fJrXsUKheiUariXKjSUKfKHwnutrFfwyc3E3n6xL8/E3ldf+agGLQD7Ys2gyBs30s0DpikHQPf/ghm1255/UocEVkUzxdORKreB/5xrr0FNlEKt4EjengWN/GP/MGn61tUFw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=lZrkql14B7JnISkBDnjtxk/6/VUQKBuSGXvD2Lzmig8=; b=VQdDIxYlXjHbgoyKtcVofTRk+xJm3ibq3RUp2MXcCVxtkRyHRalewGy9AVnnwZb3E9WViBfUYmteFN4ehGFdPJXvJgqC8n2Q82zCs/1Lb+S4ADmLF7m2khukidk9n1rcf9atJ7gSK+5nHRLdfeBg+HSsVg1APwuDbz0Kn2tCJzmReJYYtNQmRE2mzgUojk1rW77ilVuJLXKsfSKRrCgm6CP3aLm7zNKuNAeDTnMAy+5mlWHNBn7tdb75YNNRicNEIeYpfkakWgmc2kqhsODF4deMDDNymsylF683/4HWbGobZultk4l4C121naVTbzkEy58bMpEixNV4U1aBJ20UJw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none
Received: from CO1PR11MB5169.namprd11.prod.outlook.com (2603:10b6:303:95::19) by PH7PR11MB6884.namprd11.prod.outlook.com (2603:10b6:510:203::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7113.27; Wed, 27 Dec 2023 18:18:28 +0000
Received: from CO1PR11MB5169.namprd11.prod.outlook.com ([fe80::1e79:a12c:3916:2398]) by CO1PR11MB5169.namprd11.prod.outlook.com ([fe80::1e79:a12c:3916:2398%4]) with mapi id 15.20.7135.019; Wed, 27 Dec 2023 18:18:28 +0000
From: "Smith, Ned" <ned.smith@intel.com>
To: Carl Wallace <carl@redhoundsoftware.com>, Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de>, Thomas Fossati <thomas.fossati@linaro.org>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
CC: "hannes.tschofenig=40gmx.net@dmarc.ietf.org" <hannes.tschofenig=40gmx.net@dmarc.ietf.org>, Yogesh Deshpande <Yogesh.Deshpande@arm.com>, "rats@ietf.org" <rats@ietf.org>
Thread-Topic: [Rats] CoTS and CoRIM
Thread-Index: AdouAROwOiptuSqcS027iEQuheLmzQAZVk+AAAZF7kAAA43WAAAC1DIAAAAvFgAAJlKhAAA575KAAAFhAwAAA9DFgAAA2UKAAAFmEwAAW3XmAAHB5qcA
Date: Wed, 27 Dec 2023 18:18:28 +0000
Message-ID: <9CE9100C-3739-4B1A-ABBE-8B667605A03A@intel.com>
References: <005701da2e02$6acec900$406c5b00$@gmx.net> <84e6047b-b87b-4053-8e5a-fb2c8347defc@tu-dresden.de> <AM6PR08MB43257B9CB8ECD1BF6768D2138E8CA@AM6PR08MB4325.eurprd08.prod.outlook.com> <013001da2e8d$bf3c08a0$3db419e0$@gmx.net> <66f72845-9aa8-3c05-0d89-4eea5652ae78@sit.fraunhofer.de> <4b9837d8-1975-e13f-3b67-db0e3da1ca46@sit.fraunhofer.de> <CA+1=6ye_X779HNQX9w91GVAZZXShVko4UwryHiU828KOPcKxxQ@mail.gmail.com> <0f3aff72-0f03-44ec-9ac1-187104bd5c82@tu-dresden.de> <46CBBC80-6C91-4994-A7B3-2E83E53F4E76@redhoundsoftware.com> <3af70a7d-7247-42ba-b90e-824b395dcae5@tu-dresden.de> <2EEC5C0C-44F5-4865-B14A-C9B8B840ACAD@redhoundsoftware.com> <ce88fbe4-7494-41c3-b47a-1cc4ee4c4f0f@tu-dresden.de> <751DE2F2-A4DF-4682-9254-070D2CFB792A@redhoundsoftware.com>
In-Reply-To: <751DE2F2-A4DF-4682-9254-070D2CFB792A@redhoundsoftware.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.80.23121017
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CO1PR11MB5169:EE_|PH7PR11MB6884:EE_
x-ms-office365-filtering-correlation-id: 55d8ff02-3601-421b-7e1e-08dc0708395b
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB5169.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(346002)(396003)(376002)(136003)(366004)(39860400002)(230922051799003)(451199024)(1800799012)(64100799003)(186009)(6506007)(26005)(2616005)(86362001)(38070700009)(36756003)(166002)(33656002)(82960400001)(122000001)(38100700002)(53546011)(83380400001)(4326008)(8676002)(5660300002)(6512007)(71200400001)(966005)(110136005)(76116006)(64756008)(6486002)(316002)(66556008)(66946007)(54906003)(66446008)(478600001)(66476007)(41300700001)(8936002)(2906002)(30864003)(45980500001); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_9CE9100C37394B1AABBE8B667605A03Aintelcom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB5169.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 55d8ff02-3601-421b-7e1e-08dc0708395b
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 Dec 2023 18:18:28.2949 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: xAtNMs6VHCDwZ5Eps/7cScM6H8B0mO0kqWR8nnMIFIC/aF5juFG2+gK3jX9QvJFC0e/0FSNesWcVJv2qXurhLQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH7PR11MB6884
X-OriginatorOrg: intel.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/5Xn1dvU2yO1V4i9ZkGUJ-SiHJuU>
Subject: Re: [Rats] CoTS and CoRIM
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 27 Dec 2023 18:18:40 -0000

>[CW] “My answer to this question is essentially no TAs are Endorsements. I’ve given references to sections in the architecture draft to explain why previously but will put the contents here in full and provide a few fictional examples. RFC 9334 defines an Endorsement … [snip]”

While 9334 provides a conceptual definition of endorsements, it should not be interpreted with any sort of mathematical precision. For example, it is not saying that an “endorser” can’t make assertions about things that fall outside of this definition and place them in “endorsements”.


The best advice I can give is that a key (aka principal – see [1] A Calculus for Access Control in Distributed MARTIN ABADI, MICHAEL BURROWS, and BUTLER LAMPSON) can say (assert) any claim it wishes. Assertions are limited only by the expressiveness of the claims schemas. The Verifier’s primary function is to keep track of which principal asserted which claims. The claims that are relevant to a RP are asserted by RP Owner (via the RP over an exchange between the RP and the Verifier) or via Verifier Owner in the form of appraisal policy for Evidence. But clearly, Verifier Owner will specify policy for how to trust Endorsers and RVPs as well as Attesters. Normally, this is accomplished using TA policies that direct which TAs to place in the Verifiers TA store.



RPs can either filter the verifier results (i.e., a statement tree of who said what), or the Verifier can filter results based on inputs from the RP. Either way, the RP processes only the claims that are most relevant to the RP use case.



Note, the Verifier is also a principal who can assert claims. This doesn’t mean the Verifier is/isn’t an endorser as a Verifier is also likely to be yet another entity in a broader supply chain context. 9334 simply provides a set of descriptions for roles and messages that facilitate information flows and processes that relate to attestation. It isn’t intended to be a formal model the way [1] is intended.



My personal view is RVPs are a special case of “Endorsers” where the RV claims are intended to match Attester asserted claims. In the simple case where an exact match is presumed, the only difference between the claims sets is who asserted them. The Verifier simply keeps track of both.



If there are claims that are not expected to “match” Evidence, then these are endorsements (even if they have nothing to do with trustworthiness attributes). It is assumed, these claims are asserted with some context about the Attester such that a Verifier can reason whether they apply to a known Attester. Hence, all endorsements are conditional upon some form of attester context (for example, the key the attester used to authenticate to a Verifier).



Attesters can assert any claims they wish. If none of the claims are a subset of RVs, then the claims are still relevant in that Verifiers primarily just keep track of who said what. An RP policy (aka claims that an RP asserts about what is relevant for a use case) could identify Attester asserted claims that were not part of the RVP claims. If so, these claims would not be filtered by the RP policy and would show up in Attestation Results. It would be the same as if an RP policy said to trust anything asserted by an Attester (based on Attester identity / credentials).



However, a normal use case anticipates RPs that have policies that identify RVPs and Endorsers that are trusted to make authoritative assertions about an Attester device.



According to [1] a principal “speaks” using cryptographic keys. Anything that can be digitally signed could be regarded as a claimset. Hence, it isn’t wrong to read 9334 and interpret it to be inclusive of X.509 certificates, XML-DSIG, COSE, JOSE, CWT, JWT, …. Or any other format of signed data. A TA isn’t a TA until it is written into the principal’s secure storage that is used to terminate path validation. Otherwise, keys can be asserted as endorsements, evidence, reference values, and attestation results freely. It is a reasonable use case if vendor A asserts that vendor B is authorized to assert a claim set X. A RP policy that accepts this statement might process it by writing vendor B’s public key into a TA store. It becomes a TA policy at that point.



Cheers,

Ned



[1] https://homepages.inf.ed.ac.uk/gdp/publications/Calculus_for_Access_Control.pdf

From: RATS <rats-bounces@ietf.org> on behalf of Carl Wallace <carl@redhoundsoftware.com>
Date: Monday, December 18, 2023 at 3:36 AM
To: Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de>, Thomas Fossati <thomas.fossati@linaro.org>, Henk Berkholz <henk.birkholz@sit.fraunhofer.de>
Cc: "hannes.tschofenig=40gmx.net@dmarc.ietf.org" <hannes.tschofenig=40gmx.net@dmarc.ietf.org>, Yogesh Deshpande <Yogesh.Deshpande@arm.com>, "rats@ietf.org" <rats@ietf.org>
Subject: Re: [Rats] CoTS and CoRIM

Aside from editorial comments about use of the word “data” where “value” would have been better, most of this thread relates to differences of opinion regarding whether a TA is an endorsement, as in this comment plucked from below).

[MUS] Is there any TA/CA public key in the context of this draft which should not be considered Endorsement? If yes, which one and why?

[CW] My answer to this question is essentially no TAs are Endorsements. I’ve given references to sections in the architecture draft to explain why previously but will put the contents here in full and provide a few fictional examples. RFC 9334 defines an Endorsement as follows:


“A secure statement that an Endorser vouches for the integrity of an Attester's various capabilities, such as Claims collection and Evidence signing.
Consumed By:
Verifier
Produced By:
Endorser”

The attester role is defined as:


“A role performed by an entity (typically a device) whose Evidence must be appraised in order to infer the extent to which the Attester is considered trustworthy, such as when deciding whether it is authorized to perform some operation.
Produces:
Evidence”

RFC9334 addresses trust anchors in the Trust Model section. I don’t see why it is desirable to transitively extend the endorsement definition up through the trust model.

A typical certification path may look like this: TA -> CA1 (off device) -> CA2 (on device) -> End Entity. In my mind, the terms in the architecture draft apply like this: TA (trust model) -> CA1 (trust model) -> CA2 (endorsement from CA1 for attester CA2) -> End Entity (evidence). The indirection and the fact that the Verifier chooses its own TA store contents do not fit with labeling a TA as an Endorsement.

For sake of argument, suppose a group of manufacturers have defined a trust model like the bridge CAs uses in pharma and aerospace industries. Each vendor has their own root, with a bridge CA used to establish trust between vendors. In this example, let’s say there are two devices from two different vendors:

Vendor A Root -> CA A1 -> CA A2 -> End Entity A
Vendor B Root -> CA B1 -> CA B2 -> End Entity B

When these are verified via the notional consortium’s trust model you could end up with the following in a Verifier from Vendor C:

Vendor C TA -> Bridge CA -> Vendor A Root -> CA A1 -> CA A2 -> End Entity A.

If we say *all* trust anchors and CA certs are endorsements, Vendor C TA and Bridge CA would be an Endorsement for End Entity A.

Let’s consider another case, where there is a long-lived device.

Vendor L TA -> CA L1 -> CA L2 -> End Entity L

Maybe in this case, the Verifier is provisioned with CA L1 (or even CA L2) as a trust anchor for sake of efficiency. In this case, I could see a trust anchor being an endorsement.

In my opinion, it is better to leave Trust Anchors as part of the Trust Model, which is really part of Appraisal Policy, instead of trying to label TAs as endorsements. CA certificates are blurrier in terms of the definitions, and I don’t think it’s necessary to try to say all CA certificates are endorsements either.

From: Muhammad Usama Sardar <muhammad_usama.sardar@tu-dresden.de>
Date: Saturday, December 16, 2023 at 10:57 AM
To: Carl Wallace <carl@redhoundsoftware.com>, Thomas Fossati <thomas.fossati@linaro.org>, Henk Birkholz <henk.birkholz@sit.fraunhofer.de>
Cc: <hannes.tschofenig=40gmx.net@dmarc.ietf.org>, Yogesh Deshpande <Yogesh.Deshpande@arm.com>, <rats@ietf.org>
Subject: Re: [Rats] CoTS and CoRIM


Hi Carl,
On 16.12.23 16:17, Carl Wallace wrote:
<snip>
[CW] This is because the first sentence is setting up the next sentence which gives an example of a typically short-lived reference value type and contrasts this with typically long-lived TAs and CAs. Why is it necessary to mention endorsements in the sentence you reference?
[MUS] because public keys are Endorsements and a direct comparison with Reference Values alone does not sound very logical to me.

[CW] It is not a direct comparison with reference values.
[MUS] At least to me, it clearly is: "Trust anchor (TA) and certification authority (CA) public keys may be less dynamic than the reference values"
The sentence is part of rationale for conveying trust anchors independent of CoRIMs. CoRIMs convey reference data, which are often shorter lived.
[MUS] Please avoid non-standard terms such as "reference data" which are neither defined in draft nor in RFC9334. That only adds confusion. CoRIMs convey not only Reference Values but also Endorsements.
While I don’t agree that all public keys are endorsements (or even that all private key holders are endorsers),
[MUS] Is there any TA/CA public key in the context of this draft which should not be considered Endorsement? If yes, which one and why?
if that is how the group wants to view them that’s fine. Labeling them in this way does not alter their function.
and seems to create exactly the same misunderstanding that Hannes pointed.
<snip>
The point here isn’t that all reference values or endorsements are short-lived but that often they are shorter lived than trust anchors.

[MUS] I assume "they" in your statement includes Endorsements (and not only Reference Values)?

[CW] In this statement, yes, “they” included “reference values or endorsements.”

If yes, there is a very simple fix, something likes this:

"Trust anchor (TA) and certification authority (CA) public keys may be less dynamic than other types of endorsements and the reference values"


[CW] OK. I don’t see where that changes much but if others find that this adds clarity it seems fine to me despite the intimation that all public keys are endorsements. I’d really rather we not backdoor the “all public keys are endorsements” notion in this way, though. If that is generally held, it should be written more clearly. Something like: “All trust anchors and certificate authority certificates are endorsements.”


[MUS] I think this is exactly what the issue #3 requested. "Please clarify that trust anchors are Endorsements and not Reference Values." If this is clearly specified before third paragraph, then the above suggested change in third paragraph is not required.
Given trust anchor lifespans are often measured in decades I really don’t see this as a controversial notion. This is not to say that there may not be some reference values or endorsements that are similarly long-lived.

Cheers,

Usama
On 15.12.23 09:45, Thomas Fossati wrote:

Usama, Hannes, could you have a look at the clarifying edits in

[1] and tell us if it's OK to merge them?



Thanks for raising this.



cheers, t



[1] https://ietf-rats-wg.github.io/draft-wallace-rats-concise-ta-stores/tas-are-not-refvals/draft-ietf-rats-concise-ta-stores.html#section-1