Re: [Rats] Composite Evidence

"Smith, Ned" <ned.smith@intel.com> Thu, 23 January 2020 23:11 UTC

Return-Path: <ned.smith@intel.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A5B41200C7 for <rats@ietfa.amsl.com>; Thu, 23 Jan 2020 15:11:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level:
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id B02dxRSPxEMn for <rats@ietfa.amsl.com>; Thu, 23 Jan 2020 15:11:31 -0800 (PST)
Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 47C201200BA for <rats@ietf.org>; Thu, 23 Jan 2020 15:11:31 -0800 (PST)
X-Amp-Result: SKIPPED(no attachment in message)
X-Amp-File-Uploaded: False
Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga106.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 23 Jan 2020 15:11:27 -0800
X-ExtLoop1: 1
X-IronPort-AV: E=Sophos;i="5.70,355,1574150400"; d="scan'208";a="220839052"
Received: from orsmsx101.amr.corp.intel.com ([10.22.225.128]) by orsmga008.jf.intel.com with ESMTP; 23 Jan 2020 15:11:27 -0800
Received: from orsmsx109.amr.corp.intel.com ([169.254.11.6]) by ORSMSX101.amr.corp.intel.com ([169.254.8.100]) with mapi id 14.03.0439.000; Thu, 23 Jan 2020 15:11:27 -0800
From: "Smith, Ned" <ned.smith@intel.com>
To: Michael Richardson <mcr@sandelman.ca>, "rats@ietf.org" <rats@ietf.org>
Thread-Topic: [Rats] Composite Evidence
Thread-Index: AdXRgB49sEcLGXWTRbyFhaWoEjRAwwAWWlWAAB2RpAD//6sSAIAAlNyA//+lU4A=
Date: Thu, 23 Jan 2020 23:11:26 +0000
Message-ID: <B7A7F7E5-EC09-44C4-AE02-C480E6D7F8D9@intel.com>
References: <BYAPR11MB2536867559E1A20682A1FC2BA10F0@BYAPR11MB2536.namprd11.prod.outlook.com> <25403.1579747229@localhost> <BYAPR11MB2536EEF62BD7B1C53EC59659A10F0@BYAPR11MB2536.namprd11.prod.outlook.com> <85492C6F-E854-448F-9507-BBAC25455392@intel.com> <14896.1579811757@localhost>
In-Reply-To: <14896.1579811757@localhost>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.21.0.200113
x-originating-ip: [10.24.11.54]
Content-Type: text/plain; charset="utf-8"
Content-ID: <31A52254A83E9B49B6E60480420AA5E3@intel.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/5hTVu5yFKun1-KcCkN7-HvCO09s>
Subject: Re: [Rats] Composite Evidence
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote Attestation Procedures <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Jan 2020 23:11:33 -0000

See [%] marker inline below.

On 1/23/20, 12:36 PM, "RATS on behalf of Michael Richardson" <rats-bounces@ietf.org on behalf of mcr@sandelman.ca> wrote:

    
    Smith, Ned <ned.smith@intel.com> wrote:
        > The semantics of 'union composite evidence' (below) seems to suggest
        > that the local Verifier that produced 'ar' is itself an attestable
        > claim. The Attester asserts that the Attestation Results from a local
        > Verifier are trustworthy and that they originated from a sub-component
        > of its Target environment.
    
    Yes.
    As explained by Eric in his diagram, the "ar" results might not be produced
    locally, they may be the result of a trip to a different (remote) verifier.
    Or as you suggest, they may be produced within some TEE, for which there are
    evidence claims about why it's trust worthy.
    
    I think that this all maps to what I understand about TEEP actually.
    
        > Another way to think about it is the Attesting environment knows that
        > the Target environment includes a Verifier and wants to assert that the
        > Verifier has trustworthiness properties - possibly by returning its
        > SWID tag value. The Remote Verifier can then evaluate the
        > trustworthiness of the SWID tag.
    
    Sure, that is a specific way.
    I think that the Chassis+Line Card situation also can work as an example.
    
        > Based on that, if the Remote Verifier trusts the Local Verifier then
        > the local Attestation Results are not claims asserted by the Attesting
        > environment, but claims asserted by the Local Verifier. The only claim
        > that seems to make sense from the Attesting environment's perspective
        > is that an 'ar' value from its Target was forwarded to a Remote
        > Verifier. Signing the local Verifier's ar payload just asserts that the
        > forwarding action has taken place. This is an argument for defining an
        > 'Attestation Results forwarded' claim. Maybe this isn't that valuable
        > in terms of a trustworthiness claim?
    
    [%] I think you are saying that rather than documenting that we forward a union
    of evidence and attestation results, that we document that will create a kind
    of evidence, which includes attestation results?
Maybe. It really is a case of multiplexing several conversations over the same conveyance mechanism, but otherwise conversations could be de-multiplexed (without creating unnecessary cross-dependencies). For example in both Passport and BK-Check topology models, a message is simply relayed. The endpoints are still the way they're defined in the Roles Arch diagram. 

Email may not be the best way to try to illustrate but here goes. I assert that Eric's diagram can be recast into two graphs where graph (a) is the sub-component attester (A1), the local verifier (V1) and a relying party (RP). The second graph (b) consists of the top level Attester (A2), a remote verifier (V2) and the same relying party (RP). 
Looks something like:
(a) A1 --- E1 ---> V1 --- AR1 ---> RP;
(b) A2 --- E2 ---> V2 --- AR2 ---> RP.

However, since A1 and V1 don't have a conveyance path to RP, they use the one established by (b). The Combination topological model shows a case where the Attester is relying/forwarding attestation results. Normally, an attester doesn't consume attestation results. This same thing is happening in Eric's example because AR1 is piggy backed with E2 on its way to V2 and AR1 is also piggy backed with AR2 on its way to RP. 

I don't think we want to position that because AR1 is piggy backed with E2 that this creates a new type of Evidence (E3). It is still just (AR1, E2). 

If it makes sense to define "routing claims" that assert that A2 intended to piggy back AR1 with E2 then that should imply that if E2 = (c1) and c2 = routing claim then E2' = (c1, c2). The conveyance still carries (AR1, E2') , but possibly the c2 claim names AR1 as the piggy i.e. c2.name = "AR1".

V2 can verify the c2 claim and create an AR2' claim c3.name="AR1" and send (AR1, AR2'); where AR2 = (c4,...,cn) and AR2' = (c3, c4,...,cn). RP can similarly verify c3. Namely, the c3.name="AR1" claim is inspected to have payload AR1 as piggy. 

The "routing" claims are ancillary to the basic roles and messages that are the core basis for trust among the endpoint entities -  IMO. The core flows are separable from routing. Routing shouldn't lead us down a path of having new types of evidence (E3). 
    
        > If however the Attesting environment wanted to make a stronger
        > trustworthiness assertion it would have some other way to collect
        > Evidence about the Targeted sub-components (who must already have their
        > own Attesting environments). But if the Attesting environment could do
        > this then it must be the same environment as the sub-components'
        > Attesting environments. In which case, there is no need for a local
        > Verifier - it is just complexity for complexity's sake.
    
    I think that I agree.
    
    It could be that there are competitive or regulatory reasons why the Lead
    Attester does not wish to reveal the types of the line cards attached.
    Consider an automobile (or passenger rail car, or human-rated Rocket) that
    needs to attest that it has four good tires (which passed their 20,000km
    inspection), but which does not wish to reveal which manufacturer provided
    those tires.  Passing on evidence directly would be a problem.
[nms] Privacy is an important consideration. If Evidence is privacy sensitive, then it can be encrypted. The routing claims don't require transparent Evidence to name them. Could compute a hash of E or AR or if endpoints have security associations, then E and AR can be encrypted and a digest of ciphertext becomes its name for the purpose of routing claims (see my response above).
    
        > The case of a local Verifier working with a remote Verifier is
        > semantically the same as a Remote Verifier working with another Remote
        > Verifier. So, I don't see why Evidence and Attestation Results formats
        > need to do anything special - like 'union composite evidence'.  It just
        > says that Verifier1 may evaluate Evidence about Verifier2 before
        > trusting Attestation Results from Verifier2.
    
    Thus my query up at [%].